CN113554441B - Anti-counterfeiting system and method for cold chain product and RFID reader-writer - Google Patents

Anti-counterfeiting system and method for cold chain product and RFID reader-writer Download PDF

Info

Publication number
CN113554441B
CN113554441B CN202010270310.0A CN202010270310A CN113554441B CN 113554441 B CN113554441 B CN 113554441B CN 202010270310 A CN202010270310 A CN 202010270310A CN 113554441 B CN113554441 B CN 113554441B
Authority
CN
China
Prior art keywords
product
verification
server
rfid reader
counterfeiting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010270310.0A
Other languages
Chinese (zh)
Other versions
CN113554441A (en
Inventor
田姗
尚渭萍
王岳彪
刘禹
李挺
吴向军
吴露
史丽娜
孟萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Shangpin Information Technology Co ltd
Original Assignee
Shaanxi Shangpin Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Shangpin Information Technology Co ltd filed Critical Shaanxi Shangpin Information Technology Co ltd
Priority to CN202010270310.0A priority Critical patent/CN113554441B/en
Publication of CN113554441A publication Critical patent/CN113554441A/en
Application granted granted Critical
Publication of CN113554441B publication Critical patent/CN113554441B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K1/00Methods or arrangements for marking the record carrier in digital fashion
    • G06K1/12Methods or arrangements for marking the record carrier in digital fashion otherwise than by punching
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses an anti-counterfeiting system and method for a cold chain product and an RFID reader-writer; the system comprises: the system comprises a first RFID reader, a second RFID reader and a server; the first RFID reader-writer is used for responding to the product verification information input instruction and writing the product verification information into the product RFID chip; encrypting the product verification information and uploading the encrypted data to a blockchain network through a server; the second RFID reader-writer is used for responding to the anti-counterfeiting verification request for the target product and reading the identification and the product verification information of the target product from the RFID chip of the target product; the read identifier is sent to a server, and encrypted data corresponding to the identifier is obtained from a blockchain network through the server; decrypting the encrypted data; and determining the anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information. The application can avoid the failure of anti-counterfeiting measures for cold chain products.

Description

Anti-counterfeiting system and method for cold chain product and RFID reader-writer
Technical Field
The application belongs to the technical field of cold chain product anti-counterfeiting, and particularly relates to an anti-counterfeiting system and method of a cold chain product and an RFID (Radio Frequency Identification ) reader-writer.
Background
Cold chain products generally have higher selling prices due to higher requirements for transportation and storage environments, and high selling prices tend to attract bad vendors to make counterfeits to the cold chain products. Since the counterfeit cold chain products are introduced into the market, the economic loss is caused by light weight, and the life health of people or animals is endangered by heavy weight, anti-counterfeiting measures are necessary to be taken to inhibit the counterfeiting behavior of the cold chain products.
Currently, anti-counterfeiting measures taken by manufacturers of cold chain products include: the cold chain product is provided with an RFID tag which has a unique identifier, the unique identifier can not be tampered, and one product can be realized. The manufacturer then saves the unique identification of all cold chain products in its own maintained server. When the cold chain product needs to be subjected to anti-counterfeiting verification, reading a unique identifier of an RFID tag of the cold chain product through an RFID reader or NFC (NEAR FIELD Communication) device, and then sending the unique identifier to a server of a manufacturer; if the server can find the unique identification, the verification is passed, otherwise, the verification is not passed.
However, when a security hole exists in a server maintained by a manufacturer, the unique identification stored in the server may be easily tampered with, thereby disabling anti-counterfeit measures taken by the manufacturer.
Disclosure of Invention
In order to avoid failure of anti-counterfeiting measures for cold chain products, the application provides an anti-counterfeiting system and an anti-counterfeiting method for cold chain products and an RFID reader-writer.
The technical problems to be solved by the application are realized by the following technical scheme:
In a first aspect, the present application provides an anti-counterfeiting system for a cold chain product, the product having an identification, and the identification of the product being a unique identification of an RFID chip of the product; the system comprises: at least one first RFID reader, at least one second RFID reader, and a server accessing the blockchain network;
Each first RFID reader-writer is used for responding to the product verification information input instruction and writing the product verification information into the RFID chip of the product; encrypting the product verification information by using an encryption algorithm, and taking the encrypted product verification information as encrypted data corresponding to the identification of the product; the identification of the product and the encrypted data corresponding to the identification are sent to the server, so that the server uploads the identification of the product and the encrypted data corresponding to the identification to the blockchain network;
Each second RFID reader-writer is used for responding to an anti-counterfeiting verification request aiming at a target product and reading the identification and the product verification information of the target product from an RFID chip of the target product; the read identifier is sent to the server, so that the server obtains and returns encrypted data corresponding to the identifier from the blockchain network; decrypting the encrypted data returned by the server to obtain decrypted product verification information; determining an anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information; wherein, the target product is: product verification information has been written into its own RFID chip and product verification information has been uploaded to products in the blockchain network.
In the anti-counterfeiting system of the cold chain product, the first RFID reader-writer responds to the product verification information input instruction and writes the product verification information into an RFID chip of the product; then, the identification of the product and the encrypted data containing the product verification information are uploaded to the blockchain network through a server accessing the blockchain network. The data in the block chain network has the characteristic of non-falsification, so that the data security of the anti-counterfeiting system provided by the application at the server side can be ensured. On the other hand, in the application, the first RFID reader-writer respectively writes the product verification information into the RFID chip of the product and the blockchain network; thus, when the second RFID reader responds to the anti-counterfeiting verification request, decrypted product verification information is obtained from the blockchain network, and the anti-counterfeiting verification result of the target product is determined according to the decrypted product verification information and the product verification information read from the RFID chip, if the product verification information in the RFID chip is tampered, the product verification information can be effectively identified by the second RFID reader. Therefore, a counterfeiter does not need to tamper with the product verification information in the RFID chip, so that the data security of the anti-counterfeiting system provided by the application on one side of the cold chain product is ensured. In addition, in the application, when the first RFID reader-writer and the second RFID reader-writer interact with the server respectively, the transmitted or received encrypted data encrypted by the encryption algorithm further ensures the safety in the data transmission process. Therefore, the anti-counterfeiting system of the cold chain product provided by the application has higher safety, and can not cause easy failure of anti-counterfeiting measures for the cold chain product.
In an optional implementation manner of the present application, each of the second RFID readers is further configured to:
After the anti-counterfeiting verification result of the target product is determined, the determined anti-counterfeiting verification result is used as a verification record of the target product to be written into an RFID chip of the target product.
In the application, the anti-counterfeiting verification result is written into the RFID chip as the verification record, and the historical verification record can be provided as a reference for the subsequent anti-counterfeiting verification link of the target product.
In an optional implementation manner of the present application, each of the second RFID readers is specifically configured to:
Responding to an anti-counterfeiting verification request for the target product, and reading the identification of the target product, the product verification information and all verification records existing in the RFID chip of the target product from the RFID chip of the target product;
When the statistical number of the verification records does not reach a preset threshold value and verification records which do not pass the verification are not available in the all verification records, the read identification is sent to the server, so that the server acquires and returns encrypted data corresponding to the identification from the blockchain network; the threshold value is a positive integer;
decrypting the encrypted data returned by the server to obtain decrypted product verification information; determining an anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information;
and writing the determined anti-counterfeiting verification result into an RFID chip of the target product as a verification record of the target product.
In the application, when the second RFID reader-writer performs anti-counterfeiting verification on a target product, when the statistical number of verification records does not reach a preset threshold value in all verification records existing in an RFID chip of the target product and verification records which do not pass verification do not exist, the read identification is sent to a server, so that the server acquires and returns encrypted data corresponding to the identification from a blockchain network. In this way, the number of interactions between the second RFID reader-writer and the server can be reduced, so that the verification efficiency is improved. This is because when the statistics number of all existing verification records has reached a preset threshold or verification records that fail verification exist, the anti-counterfeit verification result that fails verification can be directly obtained without interaction with the server.
In addition, for a cold chain product counterfeited by multiplexing an RFID chip, the number of verification records existing in the RFID chip can easily reach a preset threshold. Therefore, by counting all the verification records of the target product, the counterfeit cold chain product can be effectively identified. Therefore, the anti-counterfeiting system of the cold chain product can effectively inhibit the cold chain product counterfeiting phenomenon implemented by multiplexing the RFID chip.
In an optional implementation manner of the present application, each of the second RFID readers is further configured to:
After the anti-counterfeiting verification result of the target product is determined, the determined anti-counterfeiting verification result is used as a verification record corresponding to the read identifier to be sent to the server, so that the server uploads the identifier and the verification record to the blockchain network.
In the application, the anti-counterfeiting verification result is used as a verification record to be uploaded to the blockchain network through the server, and the historical verification record can be provided for the subsequent anti-counterfeiting verification link of the target product as a reference.
In an optional implementation manner of the present application, each of the second RFID readers is specifically configured to:
responding to an anti-counterfeiting verification request aiming at the target product, and reading the identification and the product verification information of the target product from an RFID chip of the target product;
The read identifier is sent to the server, so that the server obtains and returns encrypted data corresponding to the identifier and all verification records corresponding to the identifier existing in the blockchain network from the blockchain network;
When the statistical number of the verification records does not reach a preset threshold value in all the verification records and verification records which do not pass the verification are not available, decrypting the encrypted data returned by the server to obtain decrypted product verification information; the threshold value is a positive integer;
determining an anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information;
and sending the determined anti-counterfeiting verification result to the server as a verification record corresponding to the read identifier, so that the server uploads the identifier and the verification record to the blockchain network.
In the application, when the second RFID reader-writer performs anti-counterfeiting verification on a target product, when the server returns all the existing verification records corresponding to the identification of the target product, the statistical number of the verification records does not reach a preset threshold value, and no verification record which does not pass the verification exists, the encrypted data returned by the server is decrypted, so that decrypted product verification information is obtained; and then determining the anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information. Therefore, the number of times of decrypting the encrypted data and the number of times of determining the anti-counterfeiting verification result according to the read product verification information and the decrypted product verification information can be reduced, and the verification efficiency is improved. This is because when the statistical number of all the verification records has reached a preset threshold value or there are verification records that fail verification, it is unnecessary to decrypt the encrypted data and determine the anti-counterfeit verification result according to the read product verification information and the decrypted product verification information, and the anti-counterfeit verification result that fails verification can be directly obtained.
In addition, for cold chain products counterfeited by multiplexing RFID chips, the number of verification records that pass verification existing in the blockchain network easily reaches a preset threshold. Therefore, by counting all the verification records of the target product, the counterfeit cold chain product can be effectively identified. Therefore, the anti-counterfeiting system of the cold chain product can effectively inhibit the cold chain product counterfeiting phenomenon implemented by multiplexing the RFID chip.
In an alternative implementation manner of the application, the product is provided with a plurality of refrigeration management links, and the second RFID reader-writer started in any refrigeration management link comprises one or more than one RFID reader-writer;
The at least one second RFID reader includes: and all second RFID readers/writers started in the plurality of refrigeration management links.
In the anti-counterfeiting system of the cold chain product, the second RFID reader-writer can be used for anti-counterfeiting verification of the cold chain product in each refrigeration management link of the product, so that the whole-course management of the circulation of the cold chain product is facilitated, and the phenomenon of counterfeiting of the cold chain product is effectively restrained.
In an alternative implementation of the present application, each of the second RFID readers is further configured to: after the read identifier is sent to the server, when a message without encrypted data corresponding to the identifier fed back by the server is received, the target product is determined to not pass anti-counterfeiting verification.
In an alternative implementation of the application, the product is a pharmaceutical product.
In the application, for a cold chain product which uses a fake RFID chip to perform fake making, because the encryption data corresponding to the unique identification of the RFID chip is not stored in the blockchain network, when the second RFID reader-writer receives a message returned by the server and without the encryption data corresponding to the identification, the cold chain product can be determined to not pass the anti-fake verification. Therefore, the anti-counterfeiting system of the cold chain product provided by the application can also effectively inhibit the cold chain product counterfeiting phenomenon implemented by using the counterfeit RFID chip.
In an optional implementation manner of the present application, each of the second RFID readers is further configured to output the determined anti-counterfeit verification result.
In the anti-counterfeiting system of the cold chain product, the anti-counterfeiting verification result is output through the second RFID reader-writer, so that a user can conveniently learn the authenticity of the cold chain product.
In a second aspect, the present application provides an anti-counterfeiting method for a cold chain product, applied to an anti-counterfeiting system for a cold chain product, the system comprising: at least one first RFID reader, at least one second RFID reader, and a server accessing the blockchain network; the product is provided with an identifier, and the identifier of the product is the unique identifier of the RFID chip of the product; the method comprises the following steps:
Each first RFID reader-writer responds to a product verification information input instruction and writes product verification information into an RFID chip of a product; encrypting the product verification information by using an encryption algorithm, and taking the encrypted product verification information as encrypted data corresponding to the identification of the product; the identification of the product and the encrypted data corresponding to the identification are sent to a server connected with a blockchain network, so that the server uploads the identification of the product and the encrypted data corresponding to the identification to the blockchain network;
Each second RFID reader-writer responds to an anti-counterfeiting verification request aiming at a target product, and reads the identification and the product verification information of the target product from an RFID chip of the target product; the read identifier is sent to the server, so that the server obtains and returns encrypted data corresponding to the identifier from the blockchain network; decrypting the encrypted data returned by the server to obtain decrypted product verification information; determining an anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information; wherein, the target product is: product verification information has been written into its own RFID chip and product verification information has been uploaded to products in the blockchain network.
In an alternative implementation of the present application, the method further includes:
after each second RFID reader-writer determines the anti-counterfeiting verification result of the target product, the determined anti-counterfeiting verification result is used as a verification record of the target product to be written into an RFID chip of the target product.
In an optional implementation manner of the present application, each of the second RFID readers reads the identifier and the product verification information of the target product from the RFID chip of the target product in response to the anti-counterfeit verification request for the target product, and the method includes:
The second RFID reader-writer responds to an anti-counterfeiting verification request for a target product, and reads the identification of the target product, the product verification information and all verification records existing in the RFID chip of the target product from the RFID chip of the target product;
each second RFID reader sends the read identifier to the server, so that the server obtains and returns encrypted data corresponding to the identifier from the blockchain network, and the method comprises the following steps:
And when the statistical number of the verification records does not reach a preset threshold value in all the verification records read by the second RFID reader-writer and the verification records which do not pass the verification are not available, the read identification is sent to the server, so that the server acquires and returns the encrypted data corresponding to the identification from the blockchain network, and the threshold value is a positive integer.
In an alternative implementation of the present application, the method further includes:
After each second RFID reader-writer determines the anti-counterfeiting verification result of the target product, the determined anti-counterfeiting verification result is used as a verification record corresponding to the read identifier to be sent to the server, so that the server uploads the identifier and the verification record to the blockchain network.
In an optional implementation manner of the present application, each of the second RFID readers sends the read identifier to the server, so that the server obtains and returns encrypted data corresponding to the identifier from the blockchain network, and the method includes the steps of:
The second RFID reader-writer sends the read identifier to the server so that the server obtains and returns encrypted data corresponding to the identifier and all verification records corresponding to the identifier in the blockchain network from the blockchain network;
each second RFID reader decrypts the encrypted data returned by the server to obtain decrypted product verification information, including:
When the statistical number of verification records does not reach a preset threshold value in all verification records acquired by the second RFID reader-writer and verification records which do not pass verification do not exist, decrypting the encrypted data returned by the server to obtain decrypted product verification information; the threshold is a positive integer.
In an alternative implementation manner of the application, the product is provided with a plurality of refrigeration management links, and the second RFID reader-writer started in any refrigeration management link comprises one or more than one RFID reader-writer;
The at least one second RFID reader includes: and all second RFID readers/writers started in the plurality of refrigeration management links.
In an alternative implementation of the present application, the method further includes:
After each second RFID reader-writer sends the read identifier to the server, when receiving the information returned by the server without the encrypted data corresponding to the identifier, the second RFID reader-writer determines that the target product fails anti-counterfeiting verification.
In an alternative implementation of the present application, the method further includes: and the second RFID reader-writer outputs the determined anti-counterfeiting verification result.
In an alternative implementation of the application, the product is a pharmaceutical product.
In the anti-counterfeiting method of the cold chain product, the first RFID reader-writer responds to the product verification information input instruction and writes the product verification information into an RFID chip of the product; then, the identification of the product and the encrypted data containing the product verification information are uploaded to the blockchain network through a server accessing the blockchain network. The data in the block chain network has the characteristic of non-falsification, so that the data security at the server side can be ensured. On the other hand, in the application, the first RFID reader-writer respectively writes the product verification information into the RFID chip of the product and the blockchain network; thus, when the second RFID reader responds to the anti-counterfeiting verification request, decrypted product verification information is obtained from the blockchain network, and the anti-counterfeiting verification result of the target product is determined according to the decrypted product verification information and the product verification information read from the RFID chip, if the product verification information in the RFID chip is tampered, the product verification information can be effectively identified by the second RFID reader. Thus, the counterfeiter does not need to tamper with the product verification information in the RFID chip, thereby ensuring the data security on the cold chain product side. In addition, in the application, when the first RFID reader-writer and the second RFID reader-writer interact with the server respectively, the transmitted or received encrypted data encrypted by the encryption algorithm further ensures the safety in the data transmission process. Therefore, the anti-counterfeiting method of the cold chain product provided by the application can not cause easy failure of anti-counterfeiting measures for the cold chain product.
And by writing the anti-counterfeiting verification result of the cold chain product into the RFID chip or uploading the anti-counterfeiting verification result to the blockchain network, the anti-counterfeiting system of the cold chain product can effectively identify the cold chain product which is counterfeited by multiplexing the RFID chip.
In a third aspect, the present application provides an RFID reader, wherein a memory of the RFID reader stores one or more computer programs, and when a processor of the RFID reader executes the computer programs, the following steps are implemented:
Writing product verification information into an RFID chip of the product in response to the product verification information input command; the product is provided with an identifier, and the identifier of the product is the unique identifier of the RFID chip of the product;
encrypting the product verification information by using an encryption algorithm, and taking the encrypted product verification information as encrypted data corresponding to the identification of the product;
the identification of the product and the encrypted data corresponding to the identification are sent to a server connected with a blockchain network, so that the server uploads the identification of the product and the encrypted data corresponding to the identification to the blockchain network;
responding to an anti-counterfeiting verification request aiming at a target product, and reading the identification and the product verification information of the target product from an RFID chip of the target product; the target product is as follows: product verification information has been written into its own RFID chip and product verification information has been uploaded to products in the blockchain network;
transmitting the read identifier to a server accessing a blockchain network, so that the server acquires and returns encrypted data corresponding to the identifier from the blockchain network;
decrypting the encrypted data returned by the server to obtain decrypted product verification information;
And determining an anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information.
The RFID reader-writer provided by the application responds to a product verification information input instruction and writes the product verification information into an RFID chip of a product; then, the identification of the product and the encrypted data containing the product verification information are uploaded to the blockchain network through a server accessing the blockchain network. The data in the block chain network has the characteristic of non-falsification, and the data security of the product verification information on the server side can be ensured. On the other hand, the application provides an RFID reader-writer which respectively writes the product verification information into the RFID chip of the product and the blockchain network; thus, when the RFID reader-writer responds to the anti-counterfeiting verification request, decrypted product verification information is obtained from the blockchain network, and the anti-counterfeiting verification result of the target product is determined according to the decrypted product verification information and the product verification information read from the RFID chip, if the product verification information in the RFID chip is tampered, the product verification information can be effectively identified by the RFID reader-writer. Therefore, a counterfeiter does not need to tamper with the product verification information in the RFID chip, so that the data security of the product verification information on one side of the cold chain product is ensured. In addition, when the RFID reader-writer provided by the application interacts with the server, the transmitted and received encrypted data encrypted by the encryption algorithm further ensures the safety in the data transmission process. Therefore, the RFID reader-writer provided by the application can be used for implementing anti-counterfeiting measures for cold chain products, which are not easy to fail.
In a fourth aspect, the present application provides a computer readable storage medium having a computer program stored therein, which when executed by a processor, implements the method steps of the anti-counterfeiting method of any one of the cold chain products described above.
In a further aspect of the application, there is also provided a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method steps of the anti-counterfeiting method of any one of the cold chain products described above.
The present application will be described in further detail with reference to the accompanying drawings.
Drawings
Fig. 1 is a schematic structural diagram of an anti-counterfeiting system for a cold chain product according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an interface for a user to enter product verification information entry instructions in a touch screen of a first RFID reader-writer shown in an exemplary manner;
FIG. 3 is another interface schematic of a user entering a product verification information entry order in a touch screen of a first RFID reader/writer, shown schematically;
FIG. 4 is a schematic diagram of an anti-counterfeiting system for another cold chain product according to an embodiment of the present application;
FIG. 5 is a schematic diagram of an operator interface for selecting an operational mode in the touch screen of the exemplary third RFID reader;
FIG. 6 is a schematic diagram of an anti-counterfeiting system for a cold chain product according to an embodiment of the present application;
FIG. 7 is a schematic flow chart of an anti-counterfeiting method for a cold chain product according to an embodiment of the present application;
FIG. 8 is a flow chart of an anti-counterfeiting method for a cold chain product according to an embodiment of the present application;
FIG. 9 is a schematic diagram of the workflow of a second RFID reader in the method of FIG. 8;
FIG. 10 is a flow chart of an anti-counterfeiting method for a cold chain product according to an embodiment of the present application;
fig. 11 is a schematic diagram of the workflow of the second RFID reader in the method of fig. 10.
Detailed Description
The present application will be described in further detail with reference to specific examples, but embodiments of the present application are not limited thereto.
In order to avoid failure of anti-counterfeiting measures for cold chain products, the application provides an anti-counterfeiting system and an anti-counterfeiting method for cold chain products and an RFID reader-writer. Wherein the product may be a medicine or food, etc., but is not limited thereto.
First, the anti-counterfeiting system of the cold chain product provided by the application is described in detail. As shown in fig. 1, the system may include: at least one first RFID reader 10, a server 20 accessing the blockchain network, and at least one second RFID reader 30. In this system, the products each have an identification, and the identification of the product is the unique identification UID (Unique Identification) of the RFID chip of the product. It is understood that the products referred to herein are cold chain products. Wherein the RFID chip of the product is typically disposed on the outer package of the product or the outer package of the minimum unit level.
Each first RFID reader 10 is configured to write product verification information into an RFID chip of a product in response to a product verification information entry command; encrypting the product verification information by using an encryption algorithm, and taking the encrypted product verification information as encrypted data corresponding to the identification of the product; and sending the identification of the product and the encrypted data corresponding to the identification to a server so that the server can upload the identification of the product and the encrypted data corresponding to the identification to a blockchain network.
Among them, there are various contents of the product authentication information. For example, the product authentication information may include product basic information including a product identification code, a product common name, a product home code, a package specification, a product approval document, a product registration classification, a product manufacturer name, a product marketing licensee name, and the like. In addition, the product verification information may further include production information of the product; here, the production information may include product manufacturing company information, product production license information, product basic information lot related information produced, product traceability codes and package level association relationship information thereof, and the like. In an alternative implementation, the product verification information may further include: development information of the product, supplier information of materials required for producing the product, qualification information of the product, and the like. It will be appreciated that any product-related information may be stored as product verification information on the product's RFID chip and the blockchain network described above. In practical application, the content of the product verification information can be set according to specific requirements.
It will be appreciated that the product verification information entry instructions may be user entered. In a specific application, the first RFID reader 10 may provide a key for the user to input a product verification information input instruction, and when the user clicks the key, the operation of inputting the product verification information input instruction to the first RFID reader 10 is completed. Or the first RFID reader-writer 10 may be integrated with a touch screen, in which a virtual key for inputting the product verification information input instruction by the user may be provided, and when the user clicks the virtual key, the operation of inputting the product verification information input instruction to the first RFID reader-writer 10 is completed. Fig. 2 schematically illustrates an interface of an interface where a virtual key for inputting product verification information input instructions by a user is located in a touch screen of the first RFID reader-writer 10. As can be seen from fig. 2, the interface may include, in addition to the virtual key "enter product verification information", further virtual keys such as virtual key a, virtual key b, and virtual key c. Here, other virtual keys such as "set", "clock", "calendar", and "toolbox" are virtual keys. The virtual key of the 'setting' can be configured with specific content of the product verification information.
When the first RFID reader 10 writes product verification information into an RFID chip of a product, the UID of the RFID chip may be read first; then, data including the UID read by the first RFID reader/writer 10 and product authentication information is transmitted to the space through a software interface protocol with the RFID chip. After capturing the data transmitted by the first RFID reader-writer 10, the RFID chip can first determine whether the UID in the data is consistent with the UID of the RFID reader-writer itself, and if so, store the product verification information in the data in the storage space of the RFID reader-writer itself; if not, the save operation is not performed.
When the first RFID reader 10 encrypts the product authentication information using an encryption algorithm, there are various encryption algorithms that can be used. The encryption algorithm may be, for example, a symmetric encryption algorithm, an asymmetric encryption algorithm, a hash algorithm, or the like. Wherein the hash algorithm is also called a hash algorithm; the symmetric encryption algorithm mainly comprises a DES (Data Encryption Standard ) algorithm, a 3DES algorithm, an AES (Advanced Encryption Standard ) algorithm and the like; the asymmetric algorithm mainly comprises RSA algorithm, DSA (Digital Signature Algorithm ) and the like; the hash Algorithm mainly includes SHA-1 (Secure Hash Algorithm ), MD5 (Message-Digest Algorithm), hash salt Algorithm, and the like.
The specific implementation manner in which the first RFID reader 10 sends the identifier of the product and the encrypted data corresponding to the identifier to the server mainly depends on the communication connection manner between the first RFID reader 10 and the server 20. For example, when the first RFID reader/writer 10 is integrated with a mobile communication module, the first RFID reader/writer 10 may transmit the identification of the product and the encrypted data corresponding to the identification to the server 20 through the mobile communication network. In another alternative implementation manner, when the first RFID reader 10 is integrated with a Wi-Fi (Wireless Fidelity) module and is located within the coverage area of the Wireless local area network, the first RFID reader 10 may also send the identifier of the product and the encrypted data corresponding to the identifier to the server 20 through the internet. In yet another alternative implementation, when the first RFID reader/writer 10 is located closer to the server 20, the first RFID reader/writer 10 may send the identifier of the product and the encrypted data corresponding to the identifier to the server 20 through any one of the integrated communication interfaces. The communication interface as referred to herein may comprise: bluetooth interface, USB (Universal Serial Bus ) interface, serial data communication interface or ethernet interface, etc. It will be appreciated that the server 20 is integrated with the same communication interface as used by the first RFID read-write 10.
Regarding the specific implementation manner of uploading the identifier of the product and the encrypted data corresponding to the identifier to the blockchain network by the server 20, the manner of writing the data into the blockchain network by the node server of the blockchain network in the related art may be referred to, and the embodiments of the present application will not be described in detail.
In an alternative implementation, when the user presses the above key for a long time without loosening his hand, the product verification information input command issued by the user may be a command for setting the first RFID reader/writer 10 to continuously operate. At this time, after the first RFID reader 10 finishes sending the identifier of one product and the encrypted data corresponding to the identifier to the server, so that the server uploads the identifier of the product and the encrypted data corresponding to the identifier to the blockchain network, the product verification information can be written into the RFID chip of the next product continuously, so that the next product is subjected to product verification information input, and so on until the user releases the key. It will be appreciated that when the user presses the key for a long time, the first RFID reader 10 operates in a continuous mode of operation.
Similarly, when the user presses the virtual key on the touch screen for a long time, the first RFID reader 10 may enter the continuous operation mode until the user clicks the virtual key again, and the continuous operation mode is ended. Or on the basis of the interface schematic diagram shown in fig. 2, as shown in fig. 3, a virtual key for continuously inputting product verification information can be further provided in the touch screen of the first RFID reader-writer 10; when the user clicks the virtual key of the "continuously enter product authentication information", the first RFID reader 10 enters a continuous operation mode.
Each second RFID reader 30 is configured to read, in response to an anti-counterfeit verification request for a target product, an identification of the target product and product verification information from an RFID chip of the target product; the read identifier is sent to a server, so that the server obtains and returns encrypted data corresponding to the identifier from a blockchain network; decrypting the encrypted data returned by the server to obtain decrypted product verification information; and determining the anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information.
Wherein, the target product is: the product authentication information has been written into its own RFID chip by a first RFID reader and the product authentication information has been uploaded to the product in the blockchain network by the first RFID reader.
The anti-counterfeit authentication request for the target product is also given by the user of the second RFID reader 30. And, similar to the user inputting the product authentication information input instruction to the first RFID reader/writer 10, the user may also input the anti-counterfeit authentication request to the second RFID reader/writer 30 through a key on the second RFID reader/writer 30 or a virtual key in the touch screen. And, when the user presses the key on the second RFID reader-writer 30 for a long time without loosening his hands or pressing the virtual key on the touch screen for a long time, the second RFID reader-writer 30 can also continuously work, so that anti-counterfeit verification is continuously performed on a plurality of products until the user releases the key on the second RFID reader-writer 30 or clicks the virtual key on the touch screen of the second RFID reader-writer 30 again. The interface schematic diagram of the interface where the virtual key in the touch screen of the second RFID reader 30 is located may be designed with reference to the interface shown in fig. 2 or fig. 3, and will not be described herein again.
The specific implementation manner of the second RFID reader/writer 30 for transmitting the read identifier to the server 20 may refer to any one of the implementation manners of the first RFID reader/writer 10 for transmitting the identifier of the product and the encrypted data corresponding to the identifier of the product to the server 20, which will not be described herein.
It will be appreciated that the decryption algorithm used when the second RFID reader/writer 30 decrypts the encrypted data returned from the server is a decryption algorithm corresponding to the encryption algorithm used by the first RFID reader/writer 10 to encrypt the product verification information.
The second RFID reader 30 determines that there are various specific implementations of the anti-counterfeit verification result of the target product according to the read product verification information and the decrypted product verification information. Illustratively, in one implementation, the determining, by the second RFID reader 30, the anti-counterfeit verification result of the target product according to the read product verification information and the decrypted product verification information may include:
Judging whether the content of the read product verification information is the same as the content of the decrypted product verification information; if the target product passes the anti-counterfeiting verification, the target product is determined to pass the anti-counterfeiting verification, otherwise, the target product is determined to not pass the anti-counterfeiting verification.
It can be understood that the target product passes the anti-counterfeiting verification, namely, the target product is a genuine product; and if the target product fails the anti-counterfeiting verification, the target product is not genuine, namely the target product is counterfeit.
In another implementation, the first RFID reader 10 writes the product verification information in the RFID chip of the product with a time stamp, and the product verification information sent by the first RFID reader 10 to the server also with a time stamp.
Accordingly, the second RFID reader 30 determines an anti-counterfeit verification result of the target product according to the read product verification information and the decrypted product verification information, and may include:
Judging whether the content of the read product verification information is the same as the content of the decrypted product verification information, and judging whether the interval between the time point indicated by the timestamp of the read product verification information and the time point indicated by the timestamp of the decrypted product verification information meets the requirement of the preset duration; and when the two judging results are yes, determining that the target product passes the anti-counterfeiting verification, otherwise, determining that the target product does not pass the anti-counterfeiting verification. The preset time length can be determined according to time length required by each link in the circulation of the cold chain product.
In yet another implementation, the product verification information written in the RFID chip of the product by the first RFID reader/writer 10 may further include product revocation information; accordingly, the second RFID reader 30 determines an anti-counterfeit verification result of the target product according to the read product verification information and the decrypted product verification information, and may include:
Judging whether the read content of the product verification information and the decrypted product verification information both contain product revocation information; if the product revocation information is contained, determining that the target product fails anti-counterfeit verification; if the product revocation information is not contained, further judging whether the content of the read product verification information is the same as the content of the decrypted product verification information; if the target product passes the anti-counterfeiting verification, the target product is determined to pass the anti-counterfeiting verification, otherwise, the target product is determined to not pass the anti-counterfeiting verification.
It can be understood that, except that the product manufacturer can use the first RFID reader/writer held by the manufacturer to input the above-mentioned various product verification information, the main body responsible for managing the product in the subsequent refrigeration management link of the product can use the first RFID reader/writer 10 held by the manufacturer to input the product verification information. For example, in the last refrigeration management link, the main body having management responsibility on the product can use the first RFID reader-writer 10 held by the main body to record the product verification information containing the product revocation information. Here, the information content of the product revocation information may be plural. For example, the product revocation information may include, in addition to information content indicating that the product has been revoked, a subject name, personnel information, execution time, and revocation reason, etc., for performing revocation processing on the product, without being limited thereto. Where the reasons for revocation are such as the product being sold to an average user, the product being out of date or the product having been used, etc.
In the anti-counterfeiting system of the cold chain product, the first RFID reader-writer responds to the product verification information input instruction and writes the product verification information into an RFID chip of the product; then, the identification of the product and the encrypted data containing the product verification information are uploaded to the blockchain network through a server accessing the blockchain network. The data in the block chain network has the characteristic of non-falsification, so that the data security of the anti-counterfeiting system provided by the application at the server side can be ensured. On the other hand, in the application, the first RFID reader-writer respectively writes the product verification information into the RFID chip of the product and the blockchain network; thus, when the second RFID reader responds to the anti-counterfeiting verification request, decrypted product verification information is obtained from the blockchain network, and the anti-counterfeiting verification result of the target product is determined according to the decrypted product verification information and the product verification information read from the RFID chip, if the product verification information in the RFID chip is tampered, the product verification information can be effectively identified by the second RFID reader. Therefore, a counterfeiter does not need to tamper with the product verification information in the RFID chip, so that the data security of the anti-counterfeiting system provided by the application on one side of the cold chain product is ensured. In addition, in the application, when the first RFID reader-writer and the second RFID reader-writer interact with the server respectively, the transmitted or received encrypted data encrypted by the encryption algorithm further ensures the safety in the data transmission process. Therefore, the anti-counterfeiting system of the cold chain product provided by the application has higher safety, and can not cause easy failure of anti-counterfeiting measures for the cold chain product.
In an alternative implementation, each second RFID reader may also be configured to:
After the anti-counterfeiting verification result of the target product is determined, the anti-counterfeiting verification result is used as a verification record of the target product to be written into the RFID chip of the target product.
Here, after the second RFID reader-writer determines the anti-counterfeiting verification result of the target product, the anti-counterfeiting verification result of the target product is written into the RFID chip, so that a historical verification record can be provided for a subsequent anti-counterfeiting verification link of the target product as a reference. The subsequent anti-counterfeiting verification link refers to a link that a user performs anti-counterfeiting verification on the target product again by using the same or different second RFID reader-writer.
In addition, among the counterfeiting of cold chain products, there is a counterfeiting phenomenon implemented by multiplexing RFID chips. Here, the cold chain product counterfeited by multiplexing the RFID chip is, for example, a cold chain product counterfeited by recovering the exterior package of a normal cold chain product, or a cold chain product counterfeited by recovering the RFID chip of a normal cold chain product. Since the recovered RFID chip or the RFID chip on the recovered outer package is the RFID chip of the normal cold chain product, such a counterfeited product is difficult to be suppressed by a general anti-counterfeit means.
In order to inhibit cold chain product counterfeiting by multiplexing the RFID chip, the embodiment of the application provides a scheme for performing anti-counterfeiting verification by taking all existing verification records as references. Specifically, in the anti-counterfeiting system of the cold chain product provided by the embodiment of the application, on the basis that the second RFID reader can write the anti-counterfeiting verification result into the RFID chip as the verification record, each second RFID reader can be specifically used for:
(1) And in response to the anti-counterfeiting verification request aiming at the target product, reading the identification of the target product, the product verification information and all verification records existing in the RFID chip of the target product from the RFID chip of the target product.
(2) When the statistics number of the verification records does not reach a preset threshold value in all the read verification records and the verification records which do not pass the verification are not available, the read identification is sent to the server, so that the server acquires and returns encrypted data corresponding to the identification from the blockchain network; wherein the preset threshold is a positive integer.
(3) Decrypting the encrypted data returned by the server to obtain decrypted product verification information.
(4) And determining the anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information.
(5) And writing the determined anti-counterfeiting verification result into the RFID chip of the target product as a verification record of the target product.
It can be understood that, for the target product forged by multiplexing the RFID chip, since the normal cold chain product corresponding to the multiplexed RFID chip is already subjected to multiple anti-counterfeit verifications during circulation, the number of verification records existing in the RFID chip can easily reach the preset threshold. Therefore, when all verification records read have verification records which do not pass verification or the statistical number of all verification records reaches a preset threshold, the second RFID reader-writer can directly obtain the anti-counterfeiting verification result that the target product does not pass verification. And when the statistical number of the verification records does not reach the preset threshold value in all the verification records and the verification records which do not pass the verification are not present, the second RFID reader-writer executes the steps (2) - (5) again. Therefore, the embodiment of the application can identify the product forged by multiplexing the RFID chip by counting all the existing verification records of the target product, thereby inhibiting the cold chain product counterfeiting phenomenon implemented by multiplexing the RFID chip, reducing the interaction times of the second RFID reader-writer and the server and improving the verification efficiency.
After the anti-counterfeiting verification result is obtained, the second RFID reader-writer can write the obtained anti-counterfeiting verification result into the RFID chip of the target product as a verification record of the target product.
For clarity of the solution, taking the preset threshold value equal to 10 as an example, the following is exemplified:
Example 1, assuming that there is a target product a, 10 pieces of all existing verification records read by the second RFID reader from the RFID chip thereof are total, and the 10 pieces are verification records passing verification; at this time, since the statistics number of all the existing verification records of the target product a reaches the preset threshold, the second RFID reader-writer can directly obtain the anti-counterfeit verification result that the target product a fails to pass verification, and no further interaction with the server is needed.
Example 2, assuming that there is a target product B, the second RFID reader reads 10 total existing verification records from its RFID chip, 7 of which are verification records passing verification, and the last 3 of which are verification records failing verification; it can be seen that all the verification records of the target product B meet the condition that the statistical number reaches the preset threshold 10, and meet the condition that verification records which do not pass verification exist. As any condition can directly judge that the target product B is counterfeit, the second RFID reader-writer can directly obtain the anti-counterfeit verification result that the target product B fails to pass verification without further interaction with a server.
Example 3, assuming that there is a target product C, the second RFID reader reads a total of 8 existing verification records from its RFID chip; wherein 7 pieces of verification records pass verification, and the latest first piece of verification records fail verification. Because all the verification records of the target product C meet the condition that verification records which fail verification exist, the second RFID reader-writer can directly obtain the anti-counterfeiting verification result that the target product C fails verification without further interaction with a server.
Example 4, assuming that there is a target product D, the second RFID reader reads a total of 8 existing verification records from its RFID chip; wherein 8 pieces of the verification records pass through the verification. It can be seen that, in all the existing verification records of the target product D, the statistical number of the verification records does not reach the preset threshold 10, and no verification records that do not pass the verification exist. At this time, the second RFID reader-writer may further interact with the server, and finally obtain the anti-counterfeit verification result of the target product D. Specific interaction steps can be seen from step (2) to step (5) above.
Based on examples 1-4, it can be seen that the anti-counterfeiting verification result is directly obtained by taking all the existing verification records in the RFID chip of the target product as references, so that the cold chain product counterfeiting phenomenon can be effectively inhibited from being implemented by multiplexing the RFID chip, and the verification efficiency of the second RFID reader-writer can be improved.
In another alternative implementation, on the basis of the embodiment shown in fig. 1, unlike the embodiment in which the anti-counterfeit verification result is written into the RFID chip as the verification record, each second RFID reader may be further configured to:
after the anti-counterfeiting verification result of the target product is determined, the determined anti-counterfeiting verification result is used as a verification record corresponding to the read identifier to be sent to the server, so that the server uploads the identifier and the verification record to the blockchain network.
Here, the second RFID reader uploads the anti-counterfeiting verification result to the blockchain network through the server, and can also provide a historical verification record for a subsequent anti-counterfeiting verification link of the target product as a reference. And the inquiry service of the anti-counterfeiting verification record of the product can be further developed on the server conveniently. Therefore, after the user of the common terminal equipment reads the RFID tag of the product by utilizing the NFC function on the terminal equipment, the terminal equipment sends the read unique identifier to the server, so that the verification record of the product can be obtained from the server and displayed to the user.
On the basis that the second RFID reader-writer can upload the anti-counterfeiting verification result as verification records to the blockchain network, in order to inhibit cold chain product counterfeiting phenomenon implemented by multiplexing the RFID chips, the embodiment of the application also provides another anti-counterfeiting verification scheme for carrying out anti-counterfeiting verification by taking all the existing verification records as references. Specifically, each second RFID reader may specifically be configured to:
(a) And responding to the anti-counterfeiting verification request aiming at the target product, and reading the identification and the product verification information of the target product from the RFID chip of the target product.
(B) And sending the read identifier to a server so that the server acquires and returns the encrypted data corresponding to the identifier and all verification records corresponding to the identifier in the blockchain network.
(C) When the statistical number of the verification records does not reach a preset threshold value in all the verification records returned by the server and the verification records which do not pass the verification are not available, decrypting the encrypted data returned by the server to obtain decrypted product verification information; the threshold is a positive integer.
(D) And determining the anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information.
(E) And sending the determined anti-counterfeiting verification result to a server as a verification record corresponding to the read identifier, so that the server uploads the identifier and the verification record to the blockchain network.
It can be understood that, because the number of verification records corresponding to the UID of the RFID chip of the counterfeited product easily reaches the preset threshold, when the verification records which fail verification exist in all verification records returned by the server or the statistical number of all verification records reaches the preset threshold, the second RFID reader can directly obtain the anti-counterfeiting verification result that the target product fails verification. And when the statistical number of the verification records does not reach the preset threshold value in all the verification records returned by the server and verification records which do not pass the verification are not available, the second RFID reader-writer executes the steps (c) - (e). Therefore, the anti-counterfeiting system provided by the embodiment of the application can identify the product forged by multiplexing the RFID chip and has higher verification efficiency.
After the anti-counterfeiting verification result is obtained, the second RFID reader-writer can send the obtained anti-counterfeiting verification result to the server as a verification record of the target product, so that the server uploads the identifier and the verification record to the blockchain network.
For the sake of clarity of the solution, the following is still exemplified by the preset threshold value equal to 10:
Example 5, assuming that there is a target product E, after the second RFID reader sends the identifier of the target product E to the server, 10 verification records corresponding to the identifier returned by the server are all 10, and the 10 verification records are verification records passing verification; at this time, since the statistics number of all the existing verification records of the target product E reaches the preset threshold 10, the second RFID reader-writer can directly obtain the anti-counterfeit verification result that the target product E fails to pass the verification, without executing steps (c) - (E).
Example 6, assuming that there is a target product F, after the second RFID reader sends the identifier of the target product F to the server, 10 verification records corresponding to the identifier returned by the server are all obtained, wherein 9 verification records passing verification are obtained, and the latest 1 verification record not passing verification is obtained; it can be seen that all the verification records of the target product F satisfy both the condition that the statistical number reaches the preset threshold 10 and the condition that the verification records which do not pass the verification exist. The second RFID reader-writer can directly obtain the anti-counterfeiting verification result that the target product F fails to pass verification without executing the steps (c) - (e) because any condition can directly judge that the target product F is counterfeit.
In example 7, assuming that there is a target product G, after the second RFID reader sends the identifier of the target product G to the server, all verification records corresponding to the identifier returned by the server have 1 verification record, and the verification record is a verification record that fails verification. Because all the verification records of the target product G meet the condition that verification records which fail verification exist, the second RFID reader-writer can directly obtain the anti-counterfeiting verification result that the target product G fails verification without executing the steps (c) - (e).
Example 8, assuming that there is a target product H, after the second RFID reader sends the identifier of the target product H to the server, the total of 5 verification records corresponding to the identifier returned by the server; wherein 5 pieces of the verification record pass through the verification. It can be seen that, in all the existing verification records of the target product H, the statistical number of the verification records does not reach the preset threshold 10, and no verification records that do not pass the verification exist. At this time, the second RFID reader may continue to perform steps (c) - (e), and finally obtain the anti-counterfeit verification result of the target product D.
Based on examples 5-8, it can be seen that the anti-counterfeiting verification result is directly obtained by taking all verification records corresponding to the identifications of the existing target products in the blockchain network as references, so that the cold chain product counterfeiting phenomenon can be effectively inhibited from being implemented by multiplexing the RFID chips, and the verification efficiency of the second RFID reader-writer can be improved.
In addition, in the embodiment of uploading the anti-counterfeiting verification result as the verification record to the blockchain network by the second RFID reader-writer, on the basis that the server can provide inquiry service of the anti-counterfeiting verification record for users of common terminal equipment, the anti-counterfeiting measures of the anti-counterfeiting system provided by the embodiment of the application are more abundant, and the counterfeiting activity of cold chain products can be further restrained. At this time, the anti-counterfeiting system provided by the embodiment of the present application may further include a plurality of terminal devices 40 as shown in fig. 4.
It can be appreciated that the embodiment of the second RFID reader described above that writes the anti-counterfeit verification result as a verification record to the RFID chip of the product or uploads to the blockchain network may be used as two parallel alternatives. Of course, in an alternative implementation, these two parallel schemes may exist simultaneously in the anti-counterfeiting system of the cold chain product.
Specifically, after the second RFID reader-writer determines the anti-counterfeiting verification result of the product, the anti-counterfeiting verification result is used as a verification record of the product to be written into an RFID tag of the product, and the verification record is uploaded to the blockchain network through the server. When the second RFID reader receives the anti-counterfeit verification request for the target product, it may first detect whether the second RFID reader is currently connected to the server, and if the second RFID reader is not connected to the server, acquire the existing verification record of the target product from the RFID chip by adopting the above method of writing the verification record into the embodiment of the RFID chip, and correspondingly determine the anti-counterfeit verification result of the target product. If the second RFID reader can be currently connected to the server, the second RFID reader can acquire the existing verification record of the target product from the blockchain network by adopting the method of uploading the verification record to the blockchain network in the embodiment, and correspondingly determining the anti-counterfeiting verification result of the target product. Thus, when the second RFID reader-writer cannot be connected to the server, the anti-counterfeiting verification service can be provided. In this case, the verification record of the target product cannot be uploaded to the blockchain network, and at this time, the second RFID reader-writer may write the verification record into the RFID tag of the target product first, and generate a verification record to be uploaded to the blockchain network. After the second RFID reader-writer can be connected to the server, the second RFID reader-writer sends the verification record to be uploaded to the blockchain network to the server, and the verification record is uploaded to the blockchain network through the server. In this way, consistency of the verification record in the blockchain network and the verification record in the RFID chip of the product can be ensured.
In addition, after the second RFID reader sends the identifier of the target product to the server, if the server returns a message without encrypted data corresponding to the identifier, the second RFID reader can directly determine that the target product fails anti-counterfeit verification.
It can be understood that, for a cold chain product that uses a counterfeit RFID chip to perform counterfeiting, since the blockchain network does not store the encrypted data corresponding to the unique identifier of the RFID chip, when the second RFID reader receives the message returned by the server without the encrypted data corresponding to the identifier, it can be directly determined that the target product fails the anti-counterfeiting verification. Therefore, the anti-counterfeiting system of the cold chain product provided by the embodiment of the application can also effectively identify the cold chain product manufactured by using the counterfeit RFID chip, thereby inhibiting the cold chain product counterfeiting phenomenon implemented by using the counterfeit RFID chip.
For cold chain products, there may be multiple refrigeration management links. In order to further improve the anti-counterfeiting effect of the anti-counterfeiting system provided by the application, a second RFID reader-writer can be started in each refrigeration management link of the cold chain product. Therefore, the second RFID reader-writer started in each refrigeration management link can be used for anti-counterfeiting verification of the cold chain product, so that the whole-course management of circulation of the cold chain product is facilitated, and the counterfeiting phenomenon of the cold chain product is further restrained. The number of the RFID readers specifically enabled by any refrigeration management link can be determined according to the requirement of the refrigeration management link, and the number of the RFID readers can be one or a plurality of RFID readers. Therefore, the second RFID reader-writer of the anti-counterfeiting system provided by the application comprises all second RFID reader-writers started in a plurality of refrigeration management links of the product.
At this time, the threshold value used when the second RFID reader counts the verification record may be set with reference to the number of all the second RFID readers that are enabled in the plurality of refrigeration management links of the product.
For example, when one second RFID reader is enabled in each refrigeration management link, the threshold used in the second RFID reader to count the verification record may be equal to the number of all second RFID readers enabled in multiple refrigeration management links of the product. In this case, each second RFID reader may perform one anti-counterfeit verification on the target product. After the second RFID reader-writer started in the last refrigeration management link completes anti-counterfeiting verification on the target product, the statistical number of verification records of the target product reaches a threshold value. From this point on, even if the RFID chip of this target product is multiplexed onto the cold chain product of forging, this cold chain product of forging starts the circulation after, arbitrary second RFID reader writer can discern this cold chain product of forging.
In addition, on the basis that the product verification information can contain the product revocation information, the threshold value used by the second RFID reader-writer in the process of counting verification records can be equal to the total number of the second RFID reader-writers in a plurality of refrigeration management links of the product, and a certain margin is added, wherein the margin is a positive integer and can be determined according to the requirement of the refrigeration management links on the number of times of anti-counterfeiting verification on the target product. Thus, each second RFID reader-writer can perform anti-counterfeiting verification on the target product more than once. Even if the margin is set slightly larger, the product that is forged by multiplexing the RFID chip cannot be recognized by counting all the existing verification records, and the second RFID reader-writer can subsequently recognize the forged product according to the read product verification information and the decrypted product verification information, the condition that the forged product is recognized as a normal product does not occur.
In addition, after the second RFID reader-writer determines the anti-counterfeiting verification result of the target product, the second RFID reader-writer can further output the anti-counterfeiting verification result. Specifically, when the second RFID reader is integrated with the touch screen, the anti-counterfeiting verification result may be output in the touch screen. Or when the second RFID reader-writer is not integrated with the touch screen and any display screen, the second RFID reader-writer can also output the anti-counterfeiting verification result in a voice broadcasting mode.
In an alternative implementation, the first RFID reader 10 and the second RFID reader 30 may be the same RFID reader having multiple modes of operation. The RFID reader-writer can be used for inputting the product verification information as the first RFID reader-writer 10 and can be used for realizing the product anti-counterfeiting verification as the second RFID reader-writer 30. For the sake of clarity of the scheme, the RFID reader is referred to as a third RFID reader, and the third RFID reader has two working modes of "entering product verification information" and "product anti-counterfeiting verification". The two working modes respectively correspond to the working mode of the first RFID reader-writer and the working mode of the second RFID reader-writer.
In practical application, the third RFID reader may be provided with 2 keys, where one key is used to select a working mode of "enter product verification information", and the other key is used to select a working mode of "product anti-counterfeit verification". Or if the third RFID reader is integrated with a touch screen, a virtual key for the user to select both modes of operation may be provided in the touch screen. Fig. 5 is an interface schematic diagram illustrating an interface where a virtual key of a working mode of the third RFID reader is located in a touch screen of the third RFID reader for a user to select. Based on the embodiment of the third RFID reader, the anti-counterfeiting system for a cold chain product provided in the embodiment of the present application may be as shown in fig. 6, and includes: at least one third RFID reader 50 and a server 20 joining the blockchain network.
For the specific operation manner of the third RFID reader 50, reference may be made to the operation manners of the first RFID reader and the second RFID reader, respectively, which are not described herein.
Based on the same inventive concept, the embodiment of the application also provides an anti-counterfeiting method of the cold chain product, the method is applied to an anti-counterfeiting system of the cold chain product, and the system comprises the following steps: at least one first RFID reader, at least one second RFID reader, and a server accessing the blockchain network. The cold chain product may be a cold chain pharmaceutical product, a cold chain food product, or the like. As shown in fig. 7, the method may include the steps of:
S10: the first RFID reader-writer responds to a product verification information input instruction and writes product verification information into an RFID chip of a product; encrypting the product verification information by using an encryption algorithm, and taking the encrypted product verification information as encrypted data corresponding to the identification of the product; and sending the identification of the product and the encrypted data corresponding to the identification to a server accessed to the blockchain network, so that the server uploads the identification of the product and the encrypted data corresponding to the identification to the blockchain network.
Wherein the identification of the product is the UID of the RFID tag of the product; the product verification information input instruction can be input into the first RFID reader-writer by a user through a key on the first RFID reader-writer or a touch screen of the first RFID reader-writer.
S20: the second RFID reader-writer responds to the anti-counterfeiting verification request aiming at the target product, and reads the identification and the product verification information of the target product from the RFID chip of the target product; the read identifier is sent to a server, so that the server obtains and returns encrypted data corresponding to the identifier from a blockchain network; decrypting the encrypted data returned by the server to obtain decrypted product verification information; and determining the anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information.
In step S20, the target product is: the product verification information has been written into its own RFID chip and the product verification information has been uploaded to the product in the blockchain network. The anti-counterfeiting verification request aiming at the target product is also input into the second RFID reader-writer by a user through a key on the second RFID reader-writer or a touch screen of the second RFID reader-writer.
It can be understood that when the second RFID reader decrypts the encrypted data returned by the server, the decryption algorithm adopted corresponds to the decryption algorithm used by the first RFID reader for encrypting the product verification information. In addition, regarding the specific implementation manner of the second RFID reader-writer to determine the anti-counterfeit verification result of the target product according to the read product verification information and the decrypted product verification information, reference may be made to the implementation manner of the second RFID reader-writer 20 in the anti-counterfeit system shown in fig. 1, which is not described herein again.
It can be appreciated that the first RFID reader enables entry of product authentication information of a product into an RFID chip of the product and uploading of the product authentication information of the product to the blockchain network. The second RFID reader-writer realizes anti-counterfeiting verification of the target product based on the product verification information input by the first RFID reader-writer. On one hand, the data in the blockchain network has the characteristic of non-falsification, so that the data security of the product verification information on the server side is ensured; on the other hand, the second RFID reader-writer determines the anti-counterfeiting verification result according to the product verification information obtained from the blockchain network and the product verification information read from the RFID chip, so that a counterfeiter does not need to tamper with the product verification information in the RFID chip, and the data security of the product verification information on the cold chain product side is ensured. And when the first RFID reader-writer and the second RFID reader-writer interact with the server respectively, the transmitted or received encrypted data encrypted by an encryption algorithm further ensures the data security in the data transmission process. Therefore, by utilizing the anti-counterfeiting method of the cold chain product, safer and more reliable anti-counterfeiting measures can be realized, and the anti-counterfeiting measures cannot be easily disabled.
Optionally, in one implementation manner, as shown in fig. 8, the anti-counterfeiting method of the cold chain product provided in the embodiment of the present application may further include the following steps after the step S20:
S30: after the second RFID reader-writer determines the anti-counterfeiting verification result of the target product, the anti-counterfeiting verification result is used as a verification record of the target product to be written into an RFID chip of the target product.
Here, the second RFID reader writes the anti-counterfeiting verification result as a verification record into the RFID chip, and can provide a historical verification record for the subsequent anti-counterfeiting verification link of the target product as a reference.
In addition, in order to suppress the cold chain product counterfeiting phenomenon implemented by multiplexing the RFID chip on the basis of the method shown in fig. 8, the method provided by the embodiment of the application identifies the product counterfeited by multiplexing the RFID chip by counting the existing verification records of the product. Specifically, the step of reading the identifier of the target product and the product verification information from the RFID chip of the target product by each second RFID reader-writer in response to the anti-counterfeit verification request for the target product may include:
the second RFID reader-writer responds to the anti-counterfeiting verification request aiming at the target product, and reads the identification of the target product, the product verification information and all verification records existing in the RFID chip of the target product from the RFID chip of the target product.
Correspondingly, the step of each second RFID reader transmitting the read identifier to the server, so that the server obtains and returns the encrypted data corresponding to the identifier from the blockchain network may include:
and when the statistical number of the verification records does not reach a preset threshold value and verification records which do not pass through verification do not exist in all the verification records read by the second RFID reader-writer, the read identification is sent to the server, so that the server acquires and returns encrypted data corresponding to the identification from the blockchain network. The threshold is a positive integer.
It can be understood that, for the target product forged by multiplexing the RFID chip, since the normal cold chain product corresponding to the multiplexed RFID chip is already subjected to multiple anti-counterfeit verifications during circulation, the number of verification records existing in the RFID chip can easily reach the preset threshold. Therefore, when all verification records read by the second RFID reader-writer have verification records which do not pass verification, or the statistical number of all verification records reaches a preset threshold, the second RFID reader-writer can directly obtain the anti-counterfeiting verification result that the target product does not pass verification. And when the statistical number of the verification records does not reach the preset threshold value in all the verification records and the verification records which do not pass the verification are not present, the second RFID reader-writer further executes the step of sending the read identifier to the server so that the server obtains and returns the encrypted data corresponding to the identifier from the blockchain network and the subsequent steps. Therefore, by counting all the existing verification records of the target product, the method provided by the embodiment of the application can not only identify the product forged by multiplexing the RFID chip so as to inhibit the cold chain product counterfeiting phenomenon implemented by multiplexing the RFID chip, but also reduce the interaction times of the second RFID reader-writer and the server and improve the verification efficiency.
After the anti-counterfeiting verification result is obtained, the second RFID reader-writer writes the anti-counterfeiting verification result into the RFID chip of the target product as a verification record of the target product.
For clarity of the solution, fig. 9 exemplarily shows a workflow of the second RFID reader in the method shown in fig. 8, which may include the steps of:
S901: and in response to the anti-counterfeiting verification request aiming at the target product, reading the identification of the target product, the product verification information and all verification records existing in the RFID chip of the target product from the RFID chip of the target product.
S902: counting all the read verification records; when verification records which do not pass verification exist in all verification records, or when the statistical number of all verification records reaches a preset threshold value, executing step S903 and step S907; when the statistical number in all the verification records does not reach the preset threshold value and there is no verification record that fails verification, step S904-step S907 are performed.
S903: and determining that the target product fails anti-counterfeiting verification.
S904: and sending the read identifier to a server, and acquiring encrypted data corresponding to the identifier from the blockchain network through the server.
It can be understood that the specific process of the second RFID reader obtaining the encrypted data corresponding to the identifier from the blockchain network through the server is as follows: and the second RFID reader-writer sends the read identifier to the server so that the server acquires and returns the encrypted data corresponding to the identifier from the blockchain network.
S905: and decrypting the obtained encrypted data to obtain decrypted product verification information.
S906: and determining the anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information.
S907: and writing the determined anti-counterfeiting verification result into the RFID chip of the target product as a verification record of the target product.
In another alternative implementation manner, based on the method shown in fig. 7, as shown in fig. 10, the anti-counterfeiting method for a cold chain product provided by the embodiment of the present application may further include the following steps after the step S20:
S30': after the second RFID reader-writer determines the anti-counterfeiting verification result of the target product, the determined anti-counterfeiting verification result is used as a verification record corresponding to the read identifier to be sent to the server, so that the server uploads the identifier and the verification record to the blockchain network.
Here, the second RFID reader uploads the anti-counterfeiting verification result as a verification record to the blockchain network through the server, and can provide a historical verification record as a reference for a subsequent anti-counterfeiting verification link of the target product. And the inquiry service of the anti-counterfeiting verification record of the product can be further developed on the server conveniently. Therefore, after the user of the common terminal equipment reads the RFID tag of the product by utilizing the NFC function on the terminal equipment, the read unique identifier is sent to the server, and the verification record of the product can be obtained from the server.
Based on the method shown in fig. 10, in order to suppress cold chain product counterfeiting by multiplexing RFID chips, another implementation manner may be adopted in the embodiment of the present application. Specifically, the step of each second RFID reader transmitting the read identifier to the server, so that the server obtains and returns the encrypted data corresponding to the identifier from the blockchain network may include:
the second RFID reader-writer sends the read identifier to the server so that the server can acquire and return the encrypted data corresponding to the identifier and all verification records corresponding to the identifier in the blockchain network from the blockchain network.
Each second RFID reader decrypts the encrypted data returned from the server to obtain decrypted product verification information, which may include:
when the statistical number of the verification records does not reach a preset threshold value in all verification records acquired by the second RFID reader-writer and verification records which do not pass the verification are not present, decrypting the encrypted data returned by the server to obtain decrypted product verification information; the threshold is a positive integer.
It can be understood that, for a target product forged by multiplexing an RFID chip, since the normal cold chain product corresponding to the multiplexed RFID chip has been subjected to multiple anti-counterfeit verifications during circulation, the number of verification records corresponding to the UID of the RFID chip in the blockchain network easily reaches a preset threshold. Therefore, when all verification records returned by the server have verification records which do not pass verification or the statistical number of all verification records reaches a preset threshold, the second RFID reader-writer can directly obtain the anti-counterfeiting verification result that the target product does not pass verification. And when the statistical number of the verification records does not reach the preset threshold value in all the verification records and the verification records which do not pass the verification exist, the second RFID reader-writer executes the step of determining the anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information and the subsequent steps. Therefore, by counting all the existing verification records of the target product, the method provided by the embodiment of the application can not only identify the product forged by multiplexing the RFID chip so as to inhibit the cold chain product counterfeiting phenomenon implemented by multiplexing the RFID chip, but also reduce the processing steps of the second RFID reader-writer and improve the verification efficiency.
For clarity of the solution, fig. 11 exemplarily shows a workflow of the second RFID reader in the method shown in fig. 10, which may include the steps of:
S1101: and responding to the anti-counterfeiting verification request aiming at the target product, and reading the identification and the product verification information of the target product from the RFID chip of the target product.
S1102: and sending the read identifier to a server, and obtaining the encrypted data corresponding to the identifier and all verification records corresponding to the identifier in the blockchain network from the blockchain network through the server.
Here, the specific process of the second RFID reader obtaining, from the blockchain network through the server, the encrypted data and all the verification records corresponding to the identifier is: the second RFID reader-writer sends the read identifier to the server so that the server can acquire and return the encrypted data and all verification records corresponding to the identifier from the blockchain network.
S1103: counting all verification records returned by the server; when verification records which do not pass verification exist in all verification records, or when the statistical number of all verification records reaches a preset threshold value, executing step S1104 and step S1107; when the statistical number of all the verification records does not reach the preset threshold value and there is no verification record that fails verification, step S1105-step S1107 are performed.
S1104: and determining that the target product fails anti-counterfeiting verification.
S1105: and decrypting the obtained encrypted data to obtain decrypted product verification information.
S1106: and determining the anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information.
S1107: and sending the determined anti-counterfeiting verification result to a server as a verification record corresponding to the read identifier, and uploading the identifier and the verification record to a blockchain network through the server.
Here, the specific process of uploading the identifier and the verification record to the blockchain network by the second RFID reader through the server is as follows: the second RFID reader-writer sends the identification and the verification record to the server, and the server uploads the identification and the verification record to the blockchain network.
Optionally, in an implementation manner, in order to further improve the anti-counterfeiting effect of the anti-counterfeiting method provided by the application, the second RFID reader-writer may be started in a plurality of refrigeration management links of the cold chain product, and the specific starting number of each refrigeration management link is determined according to the requirement of the refrigeration management link. Therefore, the cold chain product anti-counterfeiting management method has the opportunity of anti-counterfeiting verification on the cold chain product in each refrigeration management link, is favorable for whole-course management on the circulation of the cold chain product, and further inhibits the phenomenon of counterfeiting the cold chain product.
When each refrigeration management link starts one second RFID reader-writer, the threshold value used by the second RFID reader-writer in statistics verification record can be equal to the total number of the second RFID reader-writers in a plurality of refrigeration management links of the product. Or on the basis that the product verification information can comprise the product voiding information, the threshold value can be equal to the total number of the second RFID readers-writers in a plurality of refrigeration management links of the product plus a certain margin, and the margin is a positive integer.
On the basis of the method shown in fig. 7, fig. 8 or fig. 10, the method provided by the embodiment of the application may further include the following steps:
After the second RFID reader-writer sends the identifier of the target product to the server, when the server returns a message without the encrypted data corresponding to the identifier, the second RFID reader-writer determines that the target product fails anti-counterfeiting verification.
It can be understood that, for a cold chain product that uses a counterfeit RFID chip to perform counterfeiting, since the blockchain network does not store the encrypted data corresponding to the unique identifier of the RFID chip, when the second RFID reader receives the message returned by the server without the encrypted data corresponding to the identifier, it can be determined that the cold chain product fails the anti-counterfeiting verification. Therefore, the cold chain product manufactured by using the counterfeit RFID chip can be effectively identified by using the anti-counterfeiting method of the cold chain product provided by the embodiment of the application, so that the cold chain product counterfeiting phenomenon implemented by using the counterfeit RFID chip is restrained.
In addition, after the second RFID reader-writer determines the anti-counterfeiting verification result of the target product, the second RFID reader-writer can further output the anti-counterfeiting verification result. Specifically, when the second RFID reader is integrated with the touch screen, the anti-counterfeiting verification result may be displayed in the touch screen. Or when the second RFID reader-writer is not integrated with the touch screen and any display screen, the second RFID reader-writer can also output the anti-counterfeiting verification result in a voice broadcasting mode.
It should be noted that, in the anti-counterfeiting method for a cold chain product provided by the embodiment of the present application, the first RFID reader-writer and the second RFID reader-writer may be the first RFID reader-writer 10 and the second RFID reader-writer 30 in the anti-counterfeiting system shown in fig. 1 or fig. 4. Or the first RFID reader and the second RFID reader may be two third RFID readers 50 in the anti-counterfeiting system shown in fig. 6. Or the first RFID reader and the second RFID reader may be the same third RFID reader 50 in the anti-counterfeiting system shown in fig. 6.
It can be understood that, for the anti-counterfeiting system to which the anti-counterfeiting method provided by the embodiment of the application is applicable, more than one first RFID reader and one second RFID reader in the system can be used.
Corresponding to the anti-counterfeiting method of the cold chain product provided by the embodiment of the application, the embodiment of the application also provides an anti-counterfeiting device of the cold chain product, and the device is applied to an RFID reader-writer; the device comprises: a processor and a memory storing one or more computer programs, the processor implementing the following steps when executing the computer programs:
1) Writing product verification information into an RFID chip of the product in response to the product verification information input command; the product has an identification, and the identification of the product is a unique identification of the RFID chip of the product.
2) And encrypting the product verification information by using an encryption algorithm, and taking the encrypted product verification information as encrypted data corresponding to the identification of the product.
3) And sending the identification of the product and the encrypted data corresponding to the identification to a server accessed to the blockchain network, so that the server uploads the identification of the product and the encrypted data corresponding to the identification to the blockchain network.
4) And responding to the anti-counterfeiting verification request aiming at the target product, and reading the identification and the product verification information of the target product from the RFID chip of the target product.
5) And sending the read identifier to a server accessing the blockchain network so that the server acquires and returns encrypted data corresponding to the identifier from the blockchain network.
6) Decrypting the encrypted data returned by the server to obtain decrypted product verification information.
7) And determining the anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information.
It will be appreciated that in step 3) and step 5), the RFID reader may be communicatively connected to the server via a self-integrated communication module or communication interface. The communication module is a mobile communication module, a WIFI module and the like. Such as a bluetooth interface, a USB interface, a serial data communication interface, or an ethernet interface, etc.
The Memory may include random access Memory (Random Access Memory, RAM) or Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; but may also be a digital signal processor (DIGITAL SIGNAL Processing, DSP), application SPECIFIC INTEGRATED Circuit (ASIC), field-Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware components.
Based on the same inventive concept, the embodiment of the application also provides an RFID reader-writer, wherein the memory of the RFID reader-writer stores one or more computer programs, and the processor of the RFID reader-writer realizes the following steps when executing the computer programs:
1) Writing product verification information into an RFID chip of the product in response to the product verification information input command; the product has an identification, and the identification of the product is a unique identification of the RFID chip of the product.
2) And encrypting the product verification information by using an encryption algorithm, and taking the encrypted product verification information as encrypted data corresponding to the identification of the product.
3) And sending the identification of the product and the encrypted data corresponding to the identification to a server accessed to the blockchain network, so that the server uploads the identification of the product and the encrypted data corresponding to the identification to the blockchain network.
4) And responding to the anti-counterfeiting verification request aiming at the target product, and reading the identification and the product verification information of the target product from the RFID chip of the target product.
5) And sending the read identifier to a server accessing the blockchain network so that the server acquires and returns encrypted data corresponding to the identifier from the blockchain network.
6) Decrypting the encrypted data returned by the server to obtain decrypted product verification information.
7) And determining the anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information.
It will be appreciated that in step 3) and step 5), the RFID reader may be communicatively connected to the server via a self-integrated communication module or communication interface. The communication module is a mobile communication module, a WIFI module and the like. Such as a bluetooth interface, a USB interface, a serial data communication interface, or an ethernet interface, etc.
The memory of the RFID reader may include RAM or NVM, such as at least one disk memory. Optionally, the memory may also be at least one memory device located remotely from the processor of the RFID reader.
The processor of the RFID reader may be a general purpose processor including CPU, DSP, ASIC, FPGA or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
Optionally, the RFID reader provided in the embodiment of the present application may be specifically the third RFID reader described above.
The application also provides a computer readable storage medium. The computer readable storage medium stores a computer program which, when executed by a processor, implements the method steps described in any of the anti-counterfeiting methods for cold chain products.
Alternatively, the computer readable storage medium may be an NVM, such as at least one disk memory.
Optionally, the computer readable memory may also be at least one memory device located remotely from the aforementioned processor.
In yet another embodiment of the application, there is also provided a computer program product containing instructions that, when run on a computer, cause the computer to perform the method steps of the anti-counterfeiting method of any one of the cold chain products described above.
It should be noted that, for the method/apparatus/RFID reader/storage medium/computer program product embodiments, the description is relatively simple as it is substantially similar to the system embodiments, and the relevant points are found in the partial description of the system embodiments.
It should be noted that the terms "first," "second," and "second" are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implying a number of technical features being indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more features. In the description of the present application, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Further, one skilled in the art can engage and combine the different embodiments or examples described in this specification.
Although the application is described herein in connection with various embodiments, other variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed application, from a study of the drawings, the disclosure, and the appended claims. In the claims, the word "comprising" does not exclude other elements or steps, and the "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
The foregoing is a further detailed description of the application in connection with the preferred embodiments, and it is not intended that the application be limited to the specific embodiments described. It will be apparent to those skilled in the art that several simple deductions or substitutions may be made without departing from the spirit of the application, and these should be considered to be within the scope of the application.

Claims (15)

1. An anti-counterfeiting system of a cold chain product is characterized in that the product is provided with an identifier, and the identifier of the product is a unique identifier of an RFID chip of the product; the system comprises: at least one first RFID reader, at least one second RFID reader, and a server accessing the blockchain network;
Each first RFID reader-writer is used for responding to the product verification information input instruction and writing the product verification information into the RFID chip of the product; encrypting the product verification information by using an encryption algorithm, and taking the encrypted product verification information as encrypted data corresponding to the identification of the product; the identification of the product and the encrypted data corresponding to the identification are sent to the server, so that the server uploads the identification of the product and the encrypted data corresponding to the identification to the blockchain network;
Each second RFID reader is specifically configured to:
Responding to an anti-counterfeiting verification request aiming at a target product, and reading the identification of the target product, the product verification information and all verification records existing in the RFID chip of the target product from the RFID chip of the target product;
When the statistics number of verification records which do not pass verification or all verification records in all verification records reaches a preset threshold value, indicating that the target product is a fake product implemented by multiplexing the RFID chip, and obtaining an anti-fake verification result that the target product does not pass verification;
When the statistical number of the verification records does not reach a preset threshold value and verification records which do not pass the verification do not exist in the all verification records, indicating that the target product does not belong to a fake product implemented by multiplexing the RFID chip, and sending the read identifier to the server so that the server acquires and returns encrypted data corresponding to the identifier from the blockchain network; the threshold value is a positive integer;
decrypting the encrypted data returned by the server to obtain decrypted product verification information; determining an anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information;
and writing the determined anti-counterfeiting verification result into an RFID chip of the target product as a verification record of the target product.
2. The system of claim 1, wherein each of the second RFID readers is further configured to:
After the anti-counterfeiting verification result of the target product is determined, the determined anti-counterfeiting verification result is used as a verification record corresponding to the read identifier to be sent to the server, so that the server uploads the identifier and the verification record to the blockchain network.
3. The system according to claim 2, wherein each of said second RFID readers is specifically configured to:
responding to an anti-counterfeiting verification request aiming at the target product, and reading the identification and the product verification information of the target product from an RFID chip of the target product;
The read identifier is sent to the server, so that the server obtains and returns encrypted data corresponding to the identifier and all verification records corresponding to the identifier existing in the blockchain network from the blockchain network;
When the statistical number of the verification records does not reach a preset threshold value in all the verification records and verification records which do not pass the verification are not available, decrypting the encrypted data returned by the server to obtain decrypted product verification information; the threshold value is a positive integer;
determining an anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information;
and sending the determined anti-counterfeiting verification result to the server as a verification record corresponding to the read identifier, so that the server uploads the identifier and the verification record to the blockchain network.
4. The system of claim 1 or 2, wherein the product has a plurality of refrigeration management segments, the second RFID reader enabled in any of the refrigeration management segments comprising one or more;
The at least one second RFID reader includes: and all second RFID readers/writers started in the plurality of refrigeration management links.
5. The system of claim 1, wherein each of the second RFID readers is further configured to:
After the read identifier is sent to the server, when a message without encrypted data corresponding to the identifier fed back by the server is received, the target product is determined to not pass anti-counterfeiting verification.
6. The system of claim 1, 3 or 5, wherein each of the second RFID readers is further configured to: outputting the determined anti-counterfeiting verification result.
7. The system of claim 4, wherein the product is a pharmaceutical product.
8. A method of anti-counterfeiting of a cold chain product, the method comprising: at least one first RFID reader, at least one second RFID reader, and a server accessing the blockchain network; the product is provided with an identifier, and the identifier of the product is the unique identifier of the RFID chip of the product; the method comprises the following steps:
Each first RFID reader-writer responds to a product verification information input instruction and writes product verification information into an RFID chip of a product; encrypting the product verification information by using an encryption algorithm, and taking the encrypted product verification information as encrypted data corresponding to the identification of the product; the identification of the product and the encrypted data corresponding to the identification are sent to a server connected with a blockchain network, so that the server uploads the identification of the product and the encrypted data corresponding to the identification to the blockchain network;
Each second RFID reader-writer responds to an anti-counterfeiting verification request for a target product, and reads the identification of the target product, product verification information and all verification records existing in the RFID chip of the target product from the RFID chip of the target product; when all verification records read by the second RFID reader-writer have verification records which do not pass verification or the statistical number of all verification records reaches a preset threshold value, indicating that the target product is a fake product implemented by multiplexing the RFID chip, and obtaining an anti-fake verification result of the target product which does not pass verification; when the statistics number of the verification records does not reach a preset threshold value and verification records which do not pass verification do not exist in all the verification records read by the second RFID reader-writer, indicating that the target product does not belong to a fake product implemented by multiplexing the RFID chip, and sending the read identification to the server so that the server acquires and returns encrypted data corresponding to the identification from the blockchain network; decrypting the encrypted data returned by the server to obtain decrypted product verification information; determining an anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information; writing the determined anti-counterfeiting verification result into an RFID chip of the target product as a verification record of the target product; wherein, the target product is: product verification information has been written into its own RFID chip and product verification information has been uploaded to products in the blockchain network; the threshold is a positive integer.
9. The method of claim 8, wherein the method further comprises:
After each second RFID reader-writer determines the anti-counterfeiting verification result of the target product, the determined anti-counterfeiting verification result is used as a verification record corresponding to the read identifier to be sent to the server, so that the server uploads the identifier and the verification record to the blockchain network.
10. The method of claim 9, wherein the step of each of the second RFID readers transmitting the read identifier to the server to cause the server to obtain and return encrypted data corresponding to the identifier from the blockchain network includes:
The second RFID reader-writer sends the read identifier to the server so that the server obtains and returns encrypted data corresponding to the identifier and all verification records corresponding to the identifier in the blockchain network from the blockchain network;
each second RFID reader decrypts the encrypted data returned by the server to obtain decrypted product verification information, including:
When the statistical number of verification records does not reach a preset threshold value in all verification records acquired by the second RFID reader-writer and verification records which do not pass verification do not exist, decrypting the encrypted data returned by the server to obtain decrypted product verification information; the threshold is a positive integer.
11. The method of claim 8 or 10, wherein the product has a plurality of refrigeration management segments, the second RFID reader enabled in any of the refrigeration management segments comprising one or more;
The at least one second RFID reader includes: and all second RFID readers/writers started in the plurality of refrigeration management links.
12. The method of claim 8, wherein the method further comprises:
After each second RFID reader-writer sends the read identifier to the server, when receiving the information returned by the server without the encrypted data corresponding to the identifier, the second RFID reader-writer determines that the target product fails anti-counterfeiting verification.
13. The method according to claim 8, 10 or 12, wherein the method further comprises: and each second RFID reader-writer outputs the determined anti-counterfeiting verification result.
14. The method of claim 11, wherein the product is a pharmaceutical product.
15. An RFID reader, wherein the memory of the RFID reader stores one or more computer programs, and the processor of the RFID reader executes the computer programs to implement the following steps:
Writing product verification information into an RFID chip of the product in response to the product verification information input command; the product is provided with an identifier, and the identifier of the product is the unique identifier of the RFID chip of the product;
encrypting the product verification information by using an encryption algorithm, and taking the encrypted product verification information as encrypted data corresponding to the identification of the product;
the identification of the product and the encrypted data corresponding to the identification are sent to a server connected with a blockchain network, so that the server uploads the identification of the product and the encrypted data corresponding to the identification to the blockchain network;
Responding to an anti-counterfeiting verification request aiming at a target product, and reading the identification of the target product, the product verification information and all verification records existing in the RFID chip of the target product from the RFID chip of the target product; the target product is as follows: product verification information has been written into its own RFID chip and product verification information has been uploaded to products in the blockchain network;
When the statistics number of verification records which do not pass verification or all verification records in all the read verification records reaches a preset threshold value, indicating that the target product is a fake product implemented by multiplexing the RFID chip, and obtaining an anti-fake verification result of the target product which does not pass verification;
when the statistics number of the verification records does not reach a preset threshold value and verification records which do not pass the verification do not exist in all the read verification records, indicating that the target product does not belong to a fake product implemented by multiplexing the RFID chip, and sending the read identification to a server accessing the blockchain network so that the server acquires and returns encrypted data corresponding to the identification from the blockchain network;
decrypting the encrypted data returned by the server to obtain decrypted product verification information;
determining an anti-counterfeiting verification result of the target product according to the read product verification information and the decrypted product verification information;
and writing the determined anti-counterfeiting verification result into an RFID chip of the target product as a verification record of the target product.
CN202010270310.0A 2020-04-08 2020-04-08 Anti-counterfeiting system and method for cold chain product and RFID reader-writer Active CN113554441B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010270310.0A CN113554441B (en) 2020-04-08 2020-04-08 Anti-counterfeiting system and method for cold chain product and RFID reader-writer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010270310.0A CN113554441B (en) 2020-04-08 2020-04-08 Anti-counterfeiting system and method for cold chain product and RFID reader-writer

Publications (2)

Publication Number Publication Date
CN113554441A CN113554441A (en) 2021-10-26
CN113554441B true CN113554441B (en) 2024-06-18

Family

ID=78129287

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010270310.0A Active CN113554441B (en) 2020-04-08 2020-04-08 Anti-counterfeiting system and method for cold chain product and RFID reader-writer

Country Status (1)

Country Link
CN (1) CN113554441B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109345267A (en) * 2018-09-19 2019-02-15 北京沃杰知识产权有限公司 The method for anti-counterfeit and system of wine based on block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107079036A (en) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 Registration and authorization method, apparatus and system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109345267A (en) * 2018-09-19 2019-02-15 北京沃杰知识产权有限公司 The method for anti-counterfeit and system of wine based on block chain

Also Published As

Publication number Publication date
CN113554441A (en) 2021-10-26

Similar Documents

Publication Publication Date Title
CN108053001B (en) Information security authentication method and system for electronic warehouse receipt
CN102609846B (en) Anti-false verification method and system based on communication network
CN106529969B (en) Method and system for checking fake source by NFC
US8296852B2 (en) Transponder, RFID system, and method for RFID system with key management
CN113627958B (en) NFC anti-counterfeiting tracing method and server
US20080191882A1 (en) Radio frequency identification system and method
US9473303B2 (en) Method and system for product authentication
JP4974613B2 (en) IC memory, access device for IC memory, and validity verification method
CN102831529A (en) Radio frequency based commodity information identification method and system
CN102855574A (en) Method and system for identifying commodity information based on NFC (Near Field Communication)
CN202870898U (en) Radio frequency-based commodity information identification system
CN103888439A (en) Secure active network
CN113554441B (en) Anti-counterfeiting system and method for cold chain product and RFID reader-writer
JP4978180B2 (en) Wireless tag, tag system, wireless tag control method, and management method
CN114140133B (en) Method for processing tracing data
CN111210229A (en) Product circulation authenticity verification method
CN114492491A (en) Data management system for NFC label application
WO2007036901A1 (en) Method and device for privacy protection of rfid tags
CN113095844A (en) Anti-counterfeiting method and device, storage medium and terminal
JP5177053B2 (en) Service providing system, server, gateway, user device, and service providing method
JP2008233975A (en) Information communicating device, information collectively managing device, and information processing system
CN103530780A (en) Intelligent compressor controller based on RFID (Radio Frequency Identification) technology and anti-counterfeiting verifying method for compressor spare part
WO2022195824A1 (en) Evidence collection system, evidence collection method, evidence provision device, evidence provision method, and computer-readable medium
JP2009009421A (en) Method for handling encryption id, and crm system
CN117593021A (en) Anti-counterfeiting method, system, medium and equipment for filter element

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant