CN116562896A - Product anti-fleeing checking method, equipment and medium based on trusted identification - Google Patents
Product anti-fleeing checking method, equipment and medium based on trusted identification Download PDFInfo
- Publication number
- CN116562896A CN116562896A CN202310530084.9A CN202310530084A CN116562896A CN 116562896 A CN116562896 A CN 116562896A CN 202310530084 A CN202310530084 A CN 202310530084A CN 116562896 A CN116562896 A CN 116562896A
- Authority
- CN
- China
- Prior art keywords
- identification
- product
- code
- determining
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000012795 verification Methods 0.000 claims abstract description 54
- 238000004458 analytical method Methods 0.000 claims abstract description 25
- 238000003860 storage Methods 0.000 claims abstract description 18
- 238000003032 molecular docking Methods 0.000 claims abstract description 11
- 230000006870 function Effects 0.000 claims description 14
- 238000007689 inspection Methods 0.000 claims description 5
- 230000008859 change Effects 0.000 claims description 4
- 238000012216 screening Methods 0.000 claims description 4
- 238000005516 engineering process Methods 0.000 abstract description 8
- 238000004422 calculation algorithm Methods 0.000 description 9
- 238000004519 manufacturing process Methods 0.000 description 8
- 238000012986 modification Methods 0.000 description 8
- 230000004048 modification Effects 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 5
- 230000008901 benefit Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 239000011248 coating agent Substances 0.000 description 2
- 238000000576 coating method Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 239000002994 raw material Substances 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 235000013361 beverage Nutrition 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000005465 channeling Effects 0.000 description 1
- 230000001627 detrimental effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 238000009776 industrial production Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 150000003839 salts Chemical class 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Marketing (AREA)
- Finance (AREA)
- Electromagnetism (AREA)
- Strategic Management (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- General Business, Economics & Management (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Databases & Information Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application discloses a product anti-channel conflict checking method, equipment and medium based on a trusted identifier, wherein the method comprises the following steps: determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on the package of the product; determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value; and verifying the identification two-dimensional code according to the verification value, and obtaining product information of the product according to the product identification code so as to check the corresponding flow of the product according to the product information. The method and the device simplify the business flow of anti-channel conflict checking by integrating the identification analysis and the blockchain technology and combining the blockchain evidence storage technology, reduce the manpower and fund investment of enterprises on the anti-channel conflict business, realize the full life cycle supervision of products and improve the brand value of the enterprises.
Description
Technical Field
The application relates to the technical field of industrial Internet, in particular to a product anti-channel conflict checking method, equipment and medium based on a trusted identifier.
Background
With the national economic development, the production capacity and the consumption capacity of products are unbalanced, and the phenomenon is common to products such as household appliances, daily chemicals, beverages and the like. The sales prices and marketing strategies of products of the same manufacturer are also not the same in different areas, resulting in the existence of a blow-by behavior between distributors, which would allow the distributors to obtain economic benefits in the short term, but which is detrimental to the overall sales of the product and the benefits of the distributors in the long term. At present, the goods channeling is avoided in an on-line manual supervision mode in the market, but the supervision work is very complicated due to various products and huge product quantity, so that more manpower is input and the workload is huge.
Disclosure of Invention
In order to solve the above problems, the present application proposes a product anti-fleeing inspection method based on trusted identification, including: determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on a package of the product; determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value; and verifying the identification two-dimensional code according to the verification value, and obtaining the product information of the product according to the product identification code so as to check the flow corresponding to the product according to the product information.
In one example, determining a product identification code for a product specifically includes: determining an enterprise corresponding to the product, and determining an identification prefix of the enterprise; and determining a product code according to a preset code rule, and splicing the identification prefix and the product code to obtain the product identification code.
In one example, determining the two-dimensional code according to the product identification code specifically includes: determining a preset identification resolution address, and splicing the product identification code and the identification resolution address to obtain the identification two-dimensional code.
In one example, the enterprise node of the identification parsing system is docked according to the product data to complete identification registration, which specifically includes: sorting the product data through the enterprise node, and determining a summary according to the sorted product data; the product identification code, the verification code and the abstract are sent to a blockchain for verification, so that identification registration is completed; and determining identification data from the product data.
In one example, the method further comprises: determining a key according to the product identification code, and encrypting the certificate of the blockchain according to the key; and determining a forensic transaction hash value according to the forensic of the blockchain, and adding the forensic transaction hash value into the identification data.
In one example, verifying the identification two-dimensional code according to the verification value specifically includes: scanning the two-dimensional code through a preset applet to obtain identification data; and designating the stored transaction hash value as the check value, and checking the identification data according to the stored transaction hash value.
In one example, the method further comprises: acquiring the authority of a user through the applet, and determining the verification range of the user according to the authority; and screening the identification data and the authority function according to the verification range, so that the user can check and/or change the screened identification data through the screened authority function.
In one example, the method further comprises: and determining the flow of the product, and screening the authority of the user according to the flow to determine the right user corresponding to the flow, so that the right user can check the identification data.
On the other hand, the application also provides a product anti-fleeing checking device based on the trusted identification, which comprises: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the one trusted identification based product anti-tamper verification device to perform: determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on a package of the product; determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value; and verifying the identification two-dimensional code according to the verification value, and obtaining the product information of the product according to the product identification code so as to check the flow corresponding to the product according to the product information.
In another aspect, the present application also proposes a non-volatile computer storage medium storing computer-executable instructions configured to: determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on a package of the product; determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value; and verifying the identification two-dimensional code according to the verification value, and obtaining the product information of the product according to the product identification code so as to check the flow corresponding to the product according to the product information.
According to the method, through the integration of the identification analysis and the blockchain technology, the registration and analysis functions of the identification analysis technology are utilized, the characteristic that the blockchain certificate storage data cannot be tampered is combined, beaconing identification codes and corresponding identification two-dimensional codes are generated for single products of enterprises, after enterprise users finish identification registration through an identification analysis system, the identification analysis system stores product information and identification codes in the blockchain certificate storage, and certificate storage transaction information is stored in a product identification registration information center. The enterprise anti-fleeing inspector and the common consumer acquire product information including a sales area in a mode of scanning code identification two-dimensional codes, and the product information is compared with actual sales and receiving addresses of products, so that whether the condition of product fleeing exists can be determined, and whether the product information is correct can be checked through blockchain transaction data in the identification information. Therefore, consumers have the opportunity to become anti-counterfeiting and anti-channeling inspectors, and enterprises can monitor through the mode of collecting consumer feedback and random spot check, so that the monitoring step is simplified, the actual human input is reduced, the enterprise input cost is reduced, and the brand value of the enterprises is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
FIG. 1 is a schematic flow chart of a method for inspecting anti-fleeing goods of products based on trusted identification in an embodiment of the application;
fig. 2 is a schematic diagram of a product anti-fleeing inspection device based on trusted identification according to an embodiment of the present application.
Detailed Description
For the purposes, technical solutions and advantages of the present application, the technical solutions of the present application will be clearly and completely described below with reference to specific embodiments of the present application and corresponding drawings. It will be apparent that the described embodiments are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The following describes in detail the technical solutions provided by the embodiments of the present application with reference to the accompanying drawings.
As shown in fig. 1, in order to solve the above problem, a method for checking anti-fleeing goods of a product according to an embodiment of the present application includes:
s101, determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on a package of the product.
The trusted identification code is a fusion product of identification analysis and a blockchain technology, the identification analysis technology assigns a unique identification code for each product and is used as an 'identity card', registration and analysis of identification data are realized, data sharing among enterprises, industries, regions and countries is realized, and the distributed consistency and cryptography verification advantages of the blockchain are applied to the storage and verification business of the identification data, so that the trusted cooperation and trusted verification problems of the identification data are mainly solved.
In one embodiment, an enterprise obtains an identification prefix in an identification resolution system, and generates a code for each product in the production process according to industry or enterprise product coding rules. For example, a business's product code is 30 bits total, and the rules from left to right are: bits 1-5 are industry code, bits 6-10 are enterprise code, bits 11-15 are enterprise product major, bits 16-20 are product minor, bits 21-24 are product lot number, and bits 25-30 are product serial number. The product code is spliced with the enterprise identification prefix to form a product identification code; and splicing the product identification codes with the identification resolution addresses to generate the identification two-dimensional codes. Wherein the identification resolution address is an interface address for providing enterprise identification resolution service, and the enterprise maintains its service operation. For example, the identity resolved address: https:// xxxxx/praseloghandle = { handle }, or https:// xxxxx/praselog/{ handle }. And splicing a product identification code after the identification analysis address to analyze the product data. Meanwhile, for anti-counterfeiting, an enterprise can define an algorithm to generate a respective verification code for each product identification code. The algorithm has wide selection range, such as a symmetric encryption algorithm and a digest algorithm after salt addition. The algorithm is used to quickly calculate the result and intercept some bit verification codes in the result.
In one embodiment, the enterprise prints the identification two-dimensional code of the product, the verification code of the identification code, on the product package, and also covers the coating on the verification code.
S102, determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value.
In one embodiment, the enterprise organizes the product data according to an identification data template, wherein the identification data template is a preset template, and comprises product details of a product sales area, a product identification code and a verification code of the identification code. And then the enterprise node of the docking identification analysis system completes identification registration.
In one embodiment, the identification data template comprises product raw material information, product production information, product circulation information and product use introduction; product consumption area information, product identification verification codes, identification data certification transaction hash (hash) values and the like are also included.
In one embodiment, the enterprise node, upon receiving the product data, parses it as identification data. At this time, the identification data is presented in a JSON form, the enterprise node program sorts JSON data by using a specific rule, and because the JSON data is not concerned about the sequence, only the data items are complete, but the sequence of the data items is different, the result calculated by adopting the abstract algorithm is different, so that the result calculated by the abstract algorithm is consistent after the JSON data with the same data content is necessarily sorted, the specific rule can be customized, and more commonly, the JSON data is sorted according to the key value of the data items and the character sequence. And calculating the abstract of the identification data by using the identification code or other data which can be obtained by calculating the identification code as a key and adopting a national cryptographic abstract algorithm. The identification code, the identification verification code and the abstract of the identification data are stored in the blockchain, the identification code is used as a key, and then the stored transaction hash value is added into the identification data. After the identification data is stored, the enterprise node completes the registration of the identification data.
In one embodiment, since the industrial production efficiency of enterprises is high, the identification code, the identification two-dimensional code and the identification verification code should be generated in advance so as not to cause the situation that the production efficiency is slow due to slow data generation. The registration efficiency of the enterprise node may not keep pace with the production efficiency, so the registration of the identifier and the production of the product should be completed asynchronously.
And S103, checking the identification two-dimensional code according to the check value, and obtaining product information of the product according to the product identification code so as to check a flow corresponding to the product according to the product information.
In one embodiment, an enterprise develops a code scanning applet identifying a two-dimensional code in advance, and the code scanning identification two-dimensional code queries and displays identification data. Clicking the identification data to store the transaction hash value, checking whether the identification data is forged or not, and modifying, submitting and the like the identification data of the flow link. When checking, the block chain data area only stores the abstract of the identification data, after the identification data is obtained, the calculation result of the identification data is compared with the abstract information of the identification data in the block chain by using the abstract algorithm which is the same as that of the block chain end, and whether the data is consistent with the abstract of the identification data can be checked. In the circulation process of the product, circulation information of the product needs to be added and modified at any time, and the change of the circulation information does not relate to the product information. Through the modification function of the applet end identifier, an operator can perfect the data related to the identifier circulation, then submit the data, the applet end invokes the interface of the identifier analysis enterprise node to complete the modification of the identifier data, and the certificate storage information is synchronously modified at the blockchain side.
In one embodiment, authentication of the user's rights is required. The functions of inquiring the identification two-dimensional code and verifying the identification data are opened to all users, while the identification data modification function is opened only to operators with rights in storage, circulation links and the like, and is not opened to consumers. The query identification data is connected with an identification analysis function of the identification analysis system, and the identification modification function is connected with enterprise nodes in the identification analysis system, and is data certification logic same as that of creation when in modification.
In one embodiment, in the post-product warehouse and circulation link, an operator can add circulation information of the product through an enterprise identification two-dimensional code scanning applet.
In the sales and consumption links, inspectors and consumers of the enterprise anti-channel conflict can scan the product identification two-dimensional codes through the enterprise identification two-dimensional code scanning applet to acquire complete identification data, so as to acquire product information, such as product raw material information, product production information, product circulation information, product use introduction, product sales area information, product identification verification codes, identification data certificate transaction hash values and the like. If the product information is not found, the product is falsified.
In one embodiment, after the identification data is obtained by inquiry, a consumer or an enterprise anti-channel conflict inspector can compare the product sales area with the actual consumption area to obtain whether channel conflict exists, the consumer can scrape off the coating of the product identification anti-fake code, compare the displayed identification anti-fake code with the identification anti-fake code in the identification data to see whether the product is counterfeit, and can check whether the identification data is counterfeit or whether illegal modification exists by clicking the identification data certification transaction hash value.
As shown in fig. 2, an embodiment of the present application further provides a product anti-blowby inspection device based on a trusted identifier, including:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores instructions executable by the at least one processor to enable the at least one trusted identification-based product anti-tamper verification device to perform:
determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on a package of the product;
determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value;
and verifying the identification two-dimensional code according to the verification value, and obtaining the product information of the product according to the product identification code so as to check the flow corresponding to the product according to the product information.
The embodiments also provide a non-volatile computer storage medium storing computer executable instructions configured to:
determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on a package of the product;
determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value;
and verifying the identification two-dimensional code according to the verification value, and obtaining the product information of the product according to the product identification code so as to check the flow corresponding to the product according to the product information.
All embodiments in the application are described in a progressive manner, and identical and similar parts of all embodiments are mutually referred, so that each embodiment mainly describes differences from other embodiments. In particular, for the apparatus and medium embodiments, the description is relatively simple, as it is substantially similar to the method embodiments, with reference to the section of the method embodiments being relevant.
The devices and media provided in the embodiments of the present application are in one-to-one correspondence with the methods, so that the devices and media also have similar beneficial technical effects as the corresponding methods, and since the beneficial technical effects of the methods have been described in detail above, the beneficial technical effects of the devices and media are not described in detail herein.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and changes may be made to the present application by those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. which are within the spirit and principles of the present application are intended to be included within the scope of the claims of the present application.
Claims (10)
1. A method for tamper-proof inspection of a product based on a trusted identification, comprising:
determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on a package of the product;
determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value;
and verifying the identification two-dimensional code according to the verification value, and obtaining the product information of the product according to the product identification code so as to check the flow corresponding to the product according to the product information.
2. The method according to claim 1, characterized in that determining a product identification code of a product, in particular comprises:
determining an enterprise corresponding to the product, and determining an identification prefix of the enterprise;
and determining a product code according to a preset code rule, and splicing the identification prefix and the product code to obtain the product identification code.
3. The method of claim 1, wherein determining an identification two-dimensional code from the product identification code, specifically comprises:
determining a preset identification resolution address, and splicing the product identification code and the identification resolution address to obtain the identification two-dimensional code.
4. The method of claim 1, wherein the product data interfaces with enterprise nodes of an identity resolution hierarchy to complete identity registration, comprising:
sorting the product data through the enterprise node, and determining a summary according to the sorted product data;
the product identification code, the verification code and the abstract are sent to a blockchain for verification, so that identification registration is completed;
and determining identification data from the product data.
5. The method according to claim 4, wherein the method further comprises:
determining a key according to the product identification code, and encrypting the certificate of the blockchain according to the key;
and determining a forensic transaction hash value according to the forensic of the blockchain, and adding the forensic transaction hash value into the identification data.
6. The method of claim 5, wherein verifying the identification two-dimensional code according to the verification value specifically comprises:
scanning the two-dimensional code through a preset applet to obtain identification data;
and designating the stored transaction hash value as the check value, and checking the identification data according to the stored transaction hash value.
7. The method of claim 6, wherein the method further comprises:
acquiring the authority of a user through the applet, and determining the verification range of the user according to the authority;
and screening the identification data and the authority function according to the verification range, so that the user can check and/or change the screened identification data through the screened authority function.
8. The method of claim 7, wherein the method further comprises:
and determining the flow of the product, and screening the authority of the user according to the flow to determine the right user corresponding to the flow, so that the right user can check the identification data.
9. A tamper-evident product inspection device based on trusted identification, comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores instructions executable by the at least one processor to enable the at least one trusted identification-based product anti-tamper verification device to perform:
determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on a package of the product;
determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value;
and verifying the identification two-dimensional code according to the verification value, and obtaining the product information of the product according to the product identification code so as to check the flow corresponding to the product according to the product information.
10. A non-transitory computer storage medium storing computer-executable instructions, the computer-executable instructions configured to:
determining a product identification code of a product, determining an identification two-dimensional code and a verification code according to the product identification code, and printing the identification two-dimensional code and the verification code on a package of the product;
determining a preset identification data template, determining product data according to the identification data template, and docking enterprise nodes of an identification analysis system according to the product data to finish identification registration so as to obtain a check value;
and verifying the identification two-dimensional code according to the verification value, and obtaining the product information of the product according to the product identification code so as to check the flow corresponding to the product according to the product information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310530084.9A CN116562896A (en) | 2023-05-10 | 2023-05-10 | Product anti-fleeing checking method, equipment and medium based on trusted identification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310530084.9A CN116562896A (en) | 2023-05-10 | 2023-05-10 | Product anti-fleeing checking method, equipment and medium based on trusted identification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116562896A true CN116562896A (en) | 2023-08-08 |
Family
ID=87489344
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310530084.9A Pending CN116562896A (en) | 2023-05-10 | 2023-05-10 | Product anti-fleeing checking method, equipment and medium based on trusted identification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116562896A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116703430A (en) * | 2023-08-09 | 2023-09-05 | 山东未来网络研究院(紫金山实验室工业互联网创新应用基地) | Commodity channeling early warning method and system based on identification analysis |
-
2023
- 2023-05-10 CN CN202310530084.9A patent/CN116562896A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116703430A (en) * | 2023-08-09 | 2023-09-05 | 山东未来网络研究院(紫金山实验室工业互联网创新应用基地) | Commodity channeling early warning method and system based on identification analysis |
CN116703430B (en) * | 2023-08-09 | 2024-02-06 | 山东未来网络研究院(紫金山实验室工业互联网创新应用基地) | Commodity channeling early warning method and system based on identification analysis |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9436923B1 (en) | Tracking unitization occurring in a supply chain | |
CN111414429B (en) | Block chain-based commodity information management method, electronic equipment and storage medium | |
CN109978573B (en) | Information traceability system based on block chain | |
CN109583917A (en) | A kind of two dimensional code source tracing method and system based on block chain | |
CN111415170A (en) | Block chain-based food tracing method and equipment and related storage medium | |
CN116562896A (en) | Product anti-fleeing checking method, equipment and medium based on trusted identification | |
CN111783127B (en) | Block chain-based steel quality book privacy protection and sharing method and system | |
CN111008853A (en) | Block chain-based fast-selling product tracing method, equipment and medium | |
He et al. | A decentralized and non-reversible traceability system for storing commodity data | |
CN110874749A (en) | Certified tracing method based on block chaining | |
Lavanya et al. | Fake product detection using blockchain | |
CN112036786A (en) | Supply chain control method, device and medium based on block chain | |
CN110472707A (en) | Product certification system and product certification method | |
Hasan et al. | A novel blockchain federated safety-as-a-service scheme for industrial IoT using machine learning | |
CN114386988A (en) | Anti-counterfeiting tracing method and device and electronic equipment | |
CN105427112A (en) | Encryption two-dimension code technology-based label anti-fake system and method thereof | |
CN111292097A (en) | Supply chain tracing method, equipment and medium based on block chain | |
CN110069937A (en) | Data source tracing method, system and device based on block chain | |
CN114782063B (en) | Fast-moving goods fleeing monitoring method, equipment and medium based on identification analysis | |
CN111127041A (en) | Block chain-based detection sample management method, equipment and medium | |
CN112529593A (en) | Washing machine circulation tracing method and system based on block chain | |
CN111091392A (en) | Furniture tracing method, equipment and medium based on block chain | |
CN111177320A (en) | Class case simultaneous judging method, equipment and medium based on block chain | |
US20240231324A1 (en) | Systems and methods for enabling trusted on-demand distributed manufacturing | |
CN114140133B (en) | Method for processing tracing data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |