CN116562896A - Product anti-fleeing checking method, equipment and medium based on trusted identification - Google Patents

Product anti-fleeing checking method, equipment and medium based on trusted identification Download PDF

Info

Publication number
CN116562896A
CN116562896A CN202310530084.9A CN202310530084A CN116562896A CN 116562896 A CN116562896 A CN 116562896A CN 202310530084 A CN202310530084 A CN 202310530084A CN 116562896 A CN116562896 A CN 116562896A
Authority
CN
China
Prior art keywords
identification
product
code
determining
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310530084.9A
Other languages
Chinese (zh)
Inventor
胡建仁
肖雪
商广勇
李程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Yunwan Industrial Internet Co ltd
Original Assignee
Guangdong Yunwan Industrial Internet Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Yunwan Industrial Internet Co ltd filed Critical Guangdong Yunwan Industrial Internet Co ltd
Priority to CN202310530084.9A priority Critical patent/CN116562896A/en
Publication of CN116562896A publication Critical patent/CN116562896A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Marketing (AREA)
  • Finance (AREA)
  • Electromagnetism (AREA)
  • Strategic Management (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a product anti-channel conflict checking method, equipment and medium based on a trusted identifier, wherein the method comprises the following steps: determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on the package of the product; determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value; and verifying the identification two-dimensional code according to the verification value, and obtaining product information of the product according to the product identification code so as to check the corresponding flow of the product according to the product information. The method and the device simplify the business flow of anti-channel conflict checking by integrating the identification analysis and the blockchain technology and combining the blockchain evidence storage technology, reduce the manpower and fund investment of enterprises on the anti-channel conflict business, realize the full life cycle supervision of products and improve the brand value of the enterprises.

Description

Product anti-fleeing checking method, equipment and medium based on trusted identification
Technical Field
The application relates to the technical field of industrial Internet, in particular to a product anti-channel conflict checking method, equipment and medium based on a trusted identifier.
Background
With the national economic development, the production capacity and the consumption capacity of products are unbalanced, and the phenomenon is common to products such as household appliances, daily chemicals, beverages and the like. The sales prices and marketing strategies of products of the same manufacturer are also not the same in different areas, resulting in the existence of a blow-by behavior between distributors, which would allow the distributors to obtain economic benefits in the short term, but which is detrimental to the overall sales of the product and the benefits of the distributors in the long term. At present, the goods channeling is avoided in an on-line manual supervision mode in the market, but the supervision work is very complicated due to various products and huge product quantity, so that more manpower is input and the workload is huge.
Disclosure of Invention
In order to solve the above problems, the present application proposes a product anti-fleeing inspection method based on trusted identification, including: determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on a package of the product; determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value; and verifying the identification two-dimensional code according to the verification value, and obtaining the product information of the product according to the product identification code so as to check the flow corresponding to the product according to the product information.
In one example, determining a product identification code for a product specifically includes: determining an enterprise corresponding to the product, and determining an identification prefix of the enterprise; and determining a product code according to a preset code rule, and splicing the identification prefix and the product code to obtain the product identification code.
In one example, determining the two-dimensional code according to the product identification code specifically includes: determining a preset identification resolution address, and splicing the product identification code and the identification resolution address to obtain the identification two-dimensional code.
In one example, the enterprise node of the identification parsing system is docked according to the product data to complete identification registration, which specifically includes: sorting the product data through the enterprise node, and determining a summary according to the sorted product data; the product identification code, the verification code and the abstract are sent to a blockchain for verification, so that identification registration is completed; and determining identification data from the product data.
In one example, the method further comprises: determining a key according to the product identification code, and encrypting the certificate of the blockchain according to the key; and determining a forensic transaction hash value according to the forensic of the blockchain, and adding the forensic transaction hash value into the identification data.
In one example, verifying the identification two-dimensional code according to the verification value specifically includes: scanning the two-dimensional code through a preset applet to obtain identification data; and designating the stored transaction hash value as the check value, and checking the identification data according to the stored transaction hash value.
In one example, the method further comprises: acquiring the authority of a user through the applet, and determining the verification range of the user according to the authority; and screening the identification data and the authority function according to the verification range, so that the user can check and/or change the screened identification data through the screened authority function.
In one example, the method further comprises: and determining the flow of the product, and screening the authority of the user according to the flow to determine the right user corresponding to the flow, so that the right user can check the identification data.
On the other hand, the application also provides a product anti-fleeing checking device based on the trusted identification, which comprises: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the one trusted identification based product anti-tamper verification device to perform: determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on a package of the product; determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value; and verifying the identification two-dimensional code according to the verification value, and obtaining the product information of the product according to the product identification code so as to check the flow corresponding to the product according to the product information.
In another aspect, the present application also proposes a non-volatile computer storage medium storing computer-executable instructions configured to: determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on a package of the product; determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value; and verifying the identification two-dimensional code according to the verification value, and obtaining the product information of the product according to the product identification code so as to check the flow corresponding to the product according to the product information.
According to the method, through the integration of the identification analysis and the blockchain technology, the registration and analysis functions of the identification analysis technology are utilized, the characteristic that the blockchain certificate storage data cannot be tampered is combined, beaconing identification codes and corresponding identification two-dimensional codes are generated for single products of enterprises, after enterprise users finish identification registration through an identification analysis system, the identification analysis system stores product information and identification codes in the blockchain certificate storage, and certificate storage transaction information is stored in a product identification registration information center. The enterprise anti-fleeing inspector and the common consumer acquire product information including a sales area in a mode of scanning code identification two-dimensional codes, and the product information is compared with actual sales and receiving addresses of products, so that whether the condition of product fleeing exists can be determined, and whether the product information is correct can be checked through blockchain transaction data in the identification information. Therefore, consumers have the opportunity to become anti-counterfeiting and anti-channeling inspectors, and enterprises can monitor through the mode of collecting consumer feedback and random spot check, so that the monitoring step is simplified, the actual human input is reduced, the enterprise input cost is reduced, and the brand value of the enterprises is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
FIG. 1 is a schematic flow chart of a method for inspecting anti-fleeing goods of products based on trusted identification in an embodiment of the application;
fig. 2 is a schematic diagram of a product anti-fleeing inspection device based on trusted identification according to an embodiment of the present application.
Detailed Description
For the purposes, technical solutions and advantages of the present application, the technical solutions of the present application will be clearly and completely described below with reference to specific embodiments of the present application and corresponding drawings. It will be apparent that the described embodiments are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The following describes in detail the technical solutions provided by the embodiments of the present application with reference to the accompanying drawings.
As shown in fig. 1, in order to solve the above problem, a method for checking anti-fleeing goods of a product according to an embodiment of the present application includes:
s101, determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on a package of the product.
The trusted identification code is a fusion product of identification analysis and a blockchain technology, the identification analysis technology assigns a unique identification code for each product and is used as an 'identity card', registration and analysis of identification data are realized, data sharing among enterprises, industries, regions and countries is realized, and the distributed consistency and cryptography verification advantages of the blockchain are applied to the storage and verification business of the identification data, so that the trusted cooperation and trusted verification problems of the identification data are mainly solved.
In one embodiment, an enterprise obtains an identification prefix in an identification resolution system, and generates a code for each product in the production process according to industry or enterprise product coding rules. For example, a business's product code is 30 bits total, and the rules from left to right are: bits 1-5 are industry code, bits 6-10 are enterprise code, bits 11-15 are enterprise product major, bits 16-20 are product minor, bits 21-24 are product lot number, and bits 25-30 are product serial number. The product code is spliced with the enterprise identification prefix to form a product identification code; and splicing the product identification codes with the identification resolution addresses to generate the identification two-dimensional codes. Wherein the identification resolution address is an interface address for providing enterprise identification resolution service, and the enterprise maintains its service operation. For example, the identity resolved address: https:// xxxxx/praseloghandle = { handle }, or https:// xxxxx/praselog/{ handle }. And splicing a product identification code after the identification analysis address to analyze the product data. Meanwhile, for anti-counterfeiting, an enterprise can define an algorithm to generate a respective verification code for each product identification code. The algorithm has wide selection range, such as a symmetric encryption algorithm and a digest algorithm after salt addition. The algorithm is used to quickly calculate the result and intercept some bit verification codes in the result.
In one embodiment, the enterprise prints the identification two-dimensional code of the product, the verification code of the identification code, on the product package, and also covers the coating on the verification code.
S102, determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value.
In one embodiment, the enterprise organizes the product data according to an identification data template, wherein the identification data template is a preset template, and comprises product details of a product sales area, a product identification code and a verification code of the identification code. And then the enterprise node of the docking identification analysis system completes identification registration.
In one embodiment, the identification data template comprises product raw material information, product production information, product circulation information and product use introduction; product consumption area information, product identification verification codes, identification data certification transaction hash (hash) values and the like are also included.
In one embodiment, the enterprise node, upon receiving the product data, parses it as identification data. At this time, the identification data is presented in a JSON form, the enterprise node program sorts JSON data by using a specific rule, and because the JSON data is not concerned about the sequence, only the data items are complete, but the sequence of the data items is different, the result calculated by adopting the abstract algorithm is different, so that the result calculated by the abstract algorithm is consistent after the JSON data with the same data content is necessarily sorted, the specific rule can be customized, and more commonly, the JSON data is sorted according to the key value of the data items and the character sequence. And calculating the abstract of the identification data by using the identification code or other data which can be obtained by calculating the identification code as a key and adopting a national cryptographic abstract algorithm. The identification code, the identification verification code and the abstract of the identification data are stored in the blockchain, the identification code is used as a key, and then the stored transaction hash value is added into the identification data. After the identification data is stored, the enterprise node completes the registration of the identification data.
In one embodiment, since the industrial production efficiency of enterprises is high, the identification code, the identification two-dimensional code and the identification verification code should be generated in advance so as not to cause the situation that the production efficiency is slow due to slow data generation. The registration efficiency of the enterprise node may not keep pace with the production efficiency, so the registration of the identifier and the production of the product should be completed asynchronously.
And S103, checking the identification two-dimensional code according to the check value, and obtaining product information of the product according to the product identification code so as to check a flow corresponding to the product according to the product information.
In one embodiment, an enterprise develops a code scanning applet identifying a two-dimensional code in advance, and the code scanning identification two-dimensional code queries and displays identification data. Clicking the identification data to store the transaction hash value, checking whether the identification data is forged or not, and modifying, submitting and the like the identification data of the flow link. When checking, the block chain data area only stores the abstract of the identification data, after the identification data is obtained, the calculation result of the identification data is compared with the abstract information of the identification data in the block chain by using the abstract algorithm which is the same as that of the block chain end, and whether the data is consistent with the abstract of the identification data can be checked. In the circulation process of the product, circulation information of the product needs to be added and modified at any time, and the change of the circulation information does not relate to the product information. Through the modification function of the applet end identifier, an operator can perfect the data related to the identifier circulation, then submit the data, the applet end invokes the interface of the identifier analysis enterprise node to complete the modification of the identifier data, and the certificate storage information is synchronously modified at the blockchain side.
In one embodiment, authentication of the user's rights is required. The functions of inquiring the identification two-dimensional code and verifying the identification data are opened to all users, while the identification data modification function is opened only to operators with rights in storage, circulation links and the like, and is not opened to consumers. The query identification data is connected with an identification analysis function of the identification analysis system, and the identification modification function is connected with enterprise nodes in the identification analysis system, and is data certification logic same as that of creation when in modification.
In one embodiment, in the post-product warehouse and circulation link, an operator can add circulation information of the product through an enterprise identification two-dimensional code scanning applet.
In the sales and consumption links, inspectors and consumers of the enterprise anti-channel conflict can scan the product identification two-dimensional codes through the enterprise identification two-dimensional code scanning applet to acquire complete identification data, so as to acquire product information, such as product raw material information, product production information, product circulation information, product use introduction, product sales area information, product identification verification codes, identification data certificate transaction hash values and the like. If the product information is not found, the product is falsified.
In one embodiment, after the identification data is obtained by inquiry, a consumer or an enterprise anti-channel conflict inspector can compare the product sales area with the actual consumption area to obtain whether channel conflict exists, the consumer can scrape off the coating of the product identification anti-fake code, compare the displayed identification anti-fake code with the identification anti-fake code in the identification data to see whether the product is counterfeit, and can check whether the identification data is counterfeit or whether illegal modification exists by clicking the identification data certification transaction hash value.
As shown in fig. 2, an embodiment of the present application further provides a product anti-blowby inspection device based on a trusted identifier, including:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores instructions executable by the at least one processor to enable the at least one trusted identification-based product anti-tamper verification device to perform:
determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on a package of the product;
determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value;
and verifying the identification two-dimensional code according to the verification value, and obtaining the product information of the product according to the product identification code so as to check the flow corresponding to the product according to the product information.
The embodiments also provide a non-volatile computer storage medium storing computer executable instructions configured to:
determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on a package of the product;
determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value;
and verifying the identification two-dimensional code according to the verification value, and obtaining the product information of the product according to the product identification code so as to check the flow corresponding to the product according to the product information.
All embodiments in the application are described in a progressive manner, and identical and similar parts of all embodiments are mutually referred, so that each embodiment mainly describes differences from other embodiments. In particular, for the apparatus and medium embodiments, the description is relatively simple, as it is substantially similar to the method embodiments, with reference to the section of the method embodiments being relevant.
The devices and media provided in the embodiments of the present application are in one-to-one correspondence with the methods, so that the devices and media also have similar beneficial technical effects as the corresponding methods, and since the beneficial technical effects of the methods have been described in detail above, the beneficial technical effects of the devices and media are not described in detail herein.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and changes may be made to the present application by those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. which are within the spirit and principles of the present application are intended to be included within the scope of the claims of the present application.

Claims (10)

1. A method for tamper-proof inspection of a product based on a trusted identification, comprising:
determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on a package of the product;
determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value;
and verifying the identification two-dimensional code according to the verification value, and obtaining the product information of the product according to the product identification code so as to check the flow corresponding to the product according to the product information.
2. The method according to claim 1, characterized in that determining a product identification code of a product, in particular comprises:
determining an enterprise corresponding to the product, and determining an identification prefix of the enterprise;
and determining a product code according to a preset code rule, and splicing the identification prefix and the product code to obtain the product identification code.
3. The method of claim 1, wherein determining an identification two-dimensional code from the product identification code, specifically comprises:
determining a preset identification resolution address, and splicing the product identification code and the identification resolution address to obtain the identification two-dimensional code.
4. The method of claim 1, wherein the product data interfaces with enterprise nodes of an identity resolution hierarchy to complete identity registration, comprising:
sorting the product data through the enterprise node, and determining a summary according to the sorted product data;
the product identification code, the verification code and the abstract are sent to a blockchain for verification, so that identification registration is completed;
and determining identification data from the product data.
5. The method according to claim 4, wherein the method further comprises:
determining a key according to the product identification code, and encrypting the certificate of the blockchain according to the key;
and determining a forensic transaction hash value according to the forensic of the blockchain, and adding the forensic transaction hash value into the identification data.
6. The method of claim 5, wherein verifying the identification two-dimensional code according to the verification value specifically comprises:
scanning the two-dimensional code through a preset applet to obtain identification data;
and designating the stored transaction hash value as the check value, and checking the identification data according to the stored transaction hash value.
7. The method of claim 6, wherein the method further comprises:
acquiring the authority of a user through the applet, and determining the verification range of the user according to the authority;
and screening the identification data and the authority function according to the verification range, so that the user can check and/or change the screened identification data through the screened authority function.
8. The method of claim 7, wherein the method further comprises:
and determining the flow of the product, and screening the authority of the user according to the flow to determine the right user corresponding to the flow, so that the right user can check the identification data.
9. A tamper-evident product inspection device based on trusted identification, comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores instructions executable by the at least one processor to enable the at least one trusted identification-based product anti-tamper verification device to perform:
determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on a package of the product;
determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value;
and verifying the identification two-dimensional code according to the verification value, and obtaining the product information of the product according to the product identification code so as to check the flow corresponding to the product according to the product information.
10. A non-transitory computer storage medium storing computer-executable instructions, the computer-executable instructions configured to:
determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on a package of the product;
determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value;
and verifying the identification two-dimensional code according to the verification value, and obtaining the product information of the product according to the product identification code so as to check the flow corresponding to the product according to the product information.
CN202310530084.9A 2023-05-10 2023-05-10 Product anti-fleeing checking method, equipment and medium based on trusted identification Pending CN116562896A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310530084.9A CN116562896A (en) 2023-05-10 2023-05-10 Product anti-fleeing checking method, equipment and medium based on trusted identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310530084.9A CN116562896A (en) 2023-05-10 2023-05-10 Product anti-fleeing checking method, equipment and medium based on trusted identification

Publications (1)

Publication Number Publication Date
CN116562896A true CN116562896A (en) 2023-08-08

Family

ID=87489344

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310530084.9A Pending CN116562896A (en) 2023-05-10 2023-05-10 Product anti-fleeing checking method, equipment and medium based on trusted identification

Country Status (1)

Country Link
CN (1) CN116562896A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116703430A (en) * 2023-08-09 2023-09-05 山东未来网络研究院(紫金山实验室工业互联网创新应用基地) Commodity channeling early warning method and system based on identification analysis

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116703430A (en) * 2023-08-09 2023-09-05 山东未来网络研究院(紫金山实验室工业互联网创新应用基地) Commodity channeling early warning method and system based on identification analysis
CN116703430B (en) * 2023-08-09 2024-02-06 山东未来网络研究院(紫金山实验室工业互联网创新应用基地) Commodity channeling early warning method and system based on identification analysis

Similar Documents

Publication Publication Date Title
US9436923B1 (en) Tracking unitization occurring in a supply chain
CN111414429B (en) Block chain-based commodity information management method, electronic equipment and storage medium
CN109978573B (en) Information traceability system based on block chain
CN109583917A (en) A kind of two dimensional code source tracing method and system based on block chain
CN111415170A (en) Block chain-based food tracing method and equipment and related storage medium
CN116562896A (en) Product anti-fleeing checking method, equipment and medium based on trusted identification
CN111783127B (en) Block chain-based steel quality book privacy protection and sharing method and system
CN111008853A (en) Block chain-based fast-selling product tracing method, equipment and medium
He et al. A decentralized and non-reversible traceability system for storing commodity data
CN110874749A (en) Certified tracing method based on block chaining
Lavanya et al. Fake product detection using blockchain
CN112036786A (en) Supply chain control method, device and medium based on block chain
CN110472707A (en) Product certification system and product certification method
Hasan et al. A novel blockchain federated safety-as-a-service scheme for industrial IoT using machine learning
CN114386988A (en) Anti-counterfeiting tracing method and device and electronic equipment
CN105427112A (en) Encryption two-dimension code technology-based label anti-fake system and method thereof
CN111292097A (en) Supply chain tracing method, equipment and medium based on block chain
CN110069937A (en) Data source tracing method, system and device based on block chain
CN114782063B (en) Fast-moving goods fleeing monitoring method, equipment and medium based on identification analysis
CN111127041A (en) Block chain-based detection sample management method, equipment and medium
CN112529593A (en) Washing machine circulation tracing method and system based on block chain
CN111091392A (en) Furniture tracing method, equipment and medium based on block chain
CN111177320A (en) Class case simultaneous judging method, equipment and medium based on block chain
US20240231324A1 (en) Systems and methods for enabling trusted on-demand distributed manufacturing
CN114140133B (en) Method for processing tracing data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination