WO2019062530A1 - Commodity tracing and anti-counterfeiting method and device - Google Patents

Commodity tracing and anti-counterfeiting method and device Download PDF

Info

Publication number
WO2019062530A1
WO2019062530A1 PCT/CN2018/104822 CN2018104822W WO2019062530A1 WO 2019062530 A1 WO2019062530 A1 WO 2019062530A1 CN 2018104822 W CN2018104822 W CN 2018104822W WO 2019062530 A1 WO2019062530 A1 WO 2019062530A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
electronic tag
inner cover
package
goods
Prior art date
Application number
PCT/CN2018/104822
Other languages
French (fr)
Chinese (zh)
Inventor
朝鲁
Original Assignee
浙江鑫泊物流科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 浙江鑫泊物流科技有限公司 filed Critical 浙江鑫泊物流科技有限公司
Priority to JP2020517551A priority Critical patent/JP7022821B2/en
Publication of WO2019062530A1 publication Critical patent/WO2019062530A1/en
Priority to JP2022017439A priority patent/JP2022081481A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Definitions

  • the invention relates to the technical field of logistics, in particular to a method and a device for traceability of goods.
  • Haitao's goods "Fake goods become a sea tao authentic", taking cosmetics as an example: on the second-hand trading platform, bulk purchase of large-name cosmetics empty bottles, after forging foreign express orders and purchasing small tickets, forging logistics information and production areas After reaching the goal of “overseas gold plating”, it appeared on the major sales platforms as a genuine purchasing agent.
  • the traditional technology only scans in various logistics links, and informs the consumer of the logistics information after the face sheet is recognized, and the consumer is not clear about the actual state of the goods in the middle.
  • a method for traceability of goods comprising the following steps:
  • the goods information is written in the electronic tag, the first encryption key is obtained, and the goods information is encrypted by the first encryption key; wherein the electronic tag is set on the package or package for packaging the goods, At the same time, a tampering device is provided, and the tampering device destroys the electronic tag when the package is opened;
  • the logistics information is written in the electronic tag, the second encryption key is obtained, and the logistics information is encrypted by the second encryption key;
  • the decryption key is obtained, the target information in the electronic tag is read by the decryption key, and the source is verified by the source according to the target information; wherein the decryption key is respectively associated with the first encryption key and the second encryption key
  • the key matches, and the target information includes goods information or logistics information
  • the goods information is written in the electronic tag, and the goods information is encrypted by using the first encryption key; in the logistics transportation stage, the logistics information is written in the electronic tag, And using the second encryption key to encrypt the logistics information; since the goods information and the logistics information are encrypted by the encryption key, which is equivalent to setting the read and write authority, the information in the electronic tag is generally difficult to forge, and the accuracy of the information is ensured;
  • the information in the electronic tag is read by using the decryption key matched with the encryption key, the target information is obtained to verify the source of the goods, and the goods information and the logistics information are encrypted and decrypted by the matched key.
  • the tamper device will destroy the electronic tag and use the tamper device to ensure the integrity of the electronic tag. Prevent the goods in the package from being replaced.
  • the tamper device comprises a mechanical tamper device, the mechanical tamper device is disposed at the opening of the package of the packaged goods, the electronic tag is located in the mechanical tamper device, and the mechanical tamper device is destroyed when the package opening is opened Electronic tags.
  • the mechanical tamper device includes an inner cover, an outer cover, and a fixed plug
  • the upper end surface of the inner cover is provided with an annular cutting groove and an electronic tag.
  • the chip of the electronic tag is located inside the annular cutting groove, and the antenna of the electronic tag extends across the annular cutting groove to the periphery of the inner cover, and the lower end surface of the inner cover is fixed.
  • a tooth, a lower portion of the inner cover and the fixing plug are provided with a matching guiding mechanism for rotating the fixing plug relative to the inner cover in a first direction;
  • the outer cover is disposed outside the inner cover, and the lower end surface of the outer cover is fixed with a cutter,
  • the cutter is located in the annular cutting groove, and at least one of the inner cover and the outer cover is threadedly coupled to the fixing plug.
  • a first limiting mechanism and a second limiting mechanism are disposed between the inner cover and the outer cover, and the first limiting mechanism prevents the inner cover from rotating relative to the outer cover in the first direction, and the second limiting mechanism The inner cover is partially prevented from rotating in the second direction relative to the outer cover, and when the force applied to the inner cover or the outer cover in the second direction is greater than a preset value, the inner cover is rotated in the second direction relative to the outer cover.
  • the second encryption key is multiple, and the logistics transportation phase is divided into multiple sub-phases, and the plurality of second encryption keys respectively correspond to the plurality of sub-phases one by one;
  • the corresponding logistics information is written in the electronic tag, the corresponding second encryption key is obtained, and the corresponding logistics information is encrypted by the corresponding second encryption key.
  • the cargo traceability anti-counterfeiting method further comprises the following steps:
  • the first encryption key is obtained from the blockchain server, and the package information is uploaded to the blockchain server;
  • the decryption key and the package information of the goods are obtained from the blockchain server, wherein the package information of the goods is used for comparison with the physical package of the goods, and the comparison result is used for source verification of the goods.
  • the package information includes a video slice of the package of the item, wherein the video slice is taken during the packing of the item, the package of the item, the writing of the electronic tag or the data check.
  • the cargo traceability anti-counterfeiting method further comprises the following steps:
  • the logistics information is uploaded to the blockchain server; wherein the logistics information includes whether the electronic tag is destroyed.
  • a cargo traceability anti-counterfeiting device comprising the above electronic tag.
  • the electronic tag is set on the package or package for packaging the goods; in the delivery phase, the goods information is written in the electronic tag, and the goods information is encrypted by using the first encryption key; In the logistics transportation stage, the logistics information is written in the electronic tag, and the logistics information is encrypted by using the second encryption key; since the goods information and the logistics information are encrypted by the encryption key, the read/write permission is set, and the electronic tag is The information is generally difficult to forge, to ensure the accuracy of the information; in the receiving phase, the information in the electronic tag is read by using the decryption key matching the encryption key, and the target information is verified to trace the source, and the matching is performed.
  • the key encrypts and decrypts the goods information and the logistics information, which can avoid information forgery, ensure the authenticity of the traceability of the goods and the true and complete state of the goods during transportation.
  • the cargo traceability anti-counterfeiting device further includes a writing device and a reading device;
  • the writing device writes the goods information in the electronic tag, obtains the first encryption key, and encrypts the goods information by using the first encryption key;
  • the writing device writes the logistics information in the electronic tag, acquires the second encryption key, and encrypts the logistics information through the second encryption key;
  • the reading device acquires the decryption key, reads the target information in the electronic tag through the decryption key, and performs traceability verification on the product according to the target information; wherein the decryption key and the first encryption key respectively The two encryption keys are matched, and the target information includes goods information or logistics information.
  • the cargo traceability anti-counterfeiting device further includes a tampering device that destroys the electronic tag when the package is opened.
  • the tamper device comprises a mechanical tamper device, the mechanical tamper device is disposed at the opening of the package of the packaged goods, the electronic tag is located in the mechanical tamper device, and the mechanical tamper device is destroyed when the package opening is opened Electronic tags.
  • the mechanical tamper device includes an inner cover, an outer cover, and a fixed plug
  • the upper end surface of the inner cover is provided with an annular cutting groove and an electronic tag.
  • the chip of the electronic tag is located inside the annular cutting groove, and the antenna of the electronic tag extends across the annular cutting groove to the periphery of the inner cover, and the lower end surface of the inner cover is fixed.
  • a tooth, a lower portion of the inner cover and the fixing plug are provided with a matching guiding mechanism for rotating the fixing plug relative to the inner cover in a first direction;
  • the outer cover is disposed outside the inner cover, and the lower end surface of the outer cover is fixed with a cutter,
  • the cutter is located in the annular cutting groove, and at least one of the inner cover and the outer cover is threadedly coupled to the fixing plug.
  • a first limiting mechanism and a second limiting mechanism are disposed between the inner cover and the outer cover, and the first limiting mechanism prevents the inner cover from rotating relative to the outer cover in the first direction, and the second limiting mechanism The inner cover is partially prevented from rotating in the second direction relative to the outer cover, and when the force applied to the inner cover or the outer cover in the second direction is greater than a preset value, the inner cover is rotated in the second direction relative to the outer cover.
  • the cargo traceability anti-counterfeiting device further includes a buckle locking device, the buckle locking device is disposed on the package or the package of the packaged goods, and is connected with the pulse generator, and the buckle locking device is opened when the package is opened. At the same time, the buckle lock device triggers the pulse generator.
  • FIG. 1 is a schematic diagram of an application scenario of a method for tracking source anti-counterfeiting in an embodiment
  • FIG. 2 is a schematic flow chart of a method for tracking source anti-counterfeiting in an embodiment
  • FIG. 3 is a schematic structural diagram of an AES module in an embodiment
  • FIG. 4 is a schematic structural diagram of a data path in an embodiment
  • FIG. 5-a is a schematic diagram of an encryption process of an authentication server in an embodiment
  • FIG. 5-b is a schematic diagram of a decryption process of an authentication label in an embodiment
  • FIG. 5-c is a schematic diagram of an encryption process of an authentication label in an embodiment
  • FIG. 5-d is a schematic diagram of a decryption process of an authentication server in an embodiment
  • FIG. 6 is a schematic diagram of an AES module architecture in an embodiment
  • Figure 7 is a longitudinal cross-sectional view of the mechanical tampering device in one embodiment
  • Figure 8 is a schematic transverse cross-sectional view of the mechanical tampering device in one embodiment
  • Figure 9 is a partial cross-sectional view showing the mechanical tampering device in one embodiment
  • FIG. 10 is a schematic structural view of a product traceability anti-counterfeiting device in an embodiment
  • FIG. 11 is a schematic structural view of a cargo traceability anti-counterfeiting device in another embodiment
  • FIG. 12 is a schematic structural view of a cargo traceability anti-counterfeiting device in still another embodiment
  • FIG. 13 is a schematic structural diagram of a product traceability anti-counterfeiting device in still another embodiment
  • FIG. 14 is a schematic diagram of a package wrapping process in an embodiment
  • Figure 15 is a schematic view showing the process of shipment and transportation of goods in one embodiment
  • 16 is a schematic diagram of an abnormal processing flow of a parcel shipment in an embodiment
  • Figure 17 is a schematic view showing the process of receiving goods in an embodiment.
  • first ⁇ second is merely an object that distinguishes similar objects, and does not represent a specific ordering for an object. It can be understood that “first ⁇ second” is allowed. In this case, a specific order or order can be interchanged. It is to be understood that the "first/second" distinguished objects may be interchanged as appropriate to enable the embodiments of the invention described herein to be carried out in a sequence other than those illustrated or described herein.
  • the traceability anti-counterfeiting method provided by the present application can be applied to the application environment as shown in FIG.
  • the shipper writes the goods information in the electronic tag, obtains the first encryption key, encrypts the goods information by using the first encryption key, and the carrier writes the logistics information in the electronic tag to obtain the second encryption key.
  • the logistics information is encrypted by the second encryption key; the consignee obtains the decryption key, reads the target information in the electronic tag through the decryption key, and verifies the authenticity of the goods according to the target information, and also sets the defense Disassemble the device and the tamper device destroys the electronic tag when the package is opened.
  • the electronic tag can be read and written by a dedicated reader and a key.
  • FIG. 2 is a schematic flowchart of a method for source-originating anti-counterfeiting according to an embodiment of the present invention.
  • the method for tracking source anti-counterfeiting in the embodiment includes the following steps:
  • Step S110 In the delivery phase, the goods information is written in the electronic tag, the first encryption key is obtained, and the goods information is encrypted by the first encryption key; wherein the electronic tag is set on the package for packaging the goods or In the package, a tampering device is also provided, and the tamper device destroys the electronic tag when the package is opened;
  • the electronic tag can be set on the package or in the package, and is disposed on the package.
  • the process of attaching the electronic tag is relatively simple, and the package is disposed in the package to protect the electronic tag and prevent the electronic tag from being damaged;
  • the product information mainly includes BOM (Bill of Material) information, factory time information, identification code and GPS (Global Positioning System) positioning information;
  • the function of the tamper is to prevent the package from being opened. Open, can destroy the electronic label, at this time the electronic label will be invalid;
  • Step S120 In the logistics transportation phase, the logistics information is written in the electronic tag, the second encryption key is obtained, and the logistics information is encrypted by the second encryption key;
  • the logistics information mainly includes the receiving time, the receiving address, the inspection status, the transit time and the receiver code of the goods;
  • Step S130 In the receiving phase, acquiring a decryption key, reading the target information in the electronic tag through the decryption key, and performing source verification on the product according to the target information; wherein the decryption key and the first encryption key respectively The second encryption key is matched, and the target information includes the goods information or the logistics information; if the electronic tag is destroyed, it is determined that the goods traceability fails.
  • the decryption key is matched with the first encryption key and the second encryption key, and the decrypted key can decrypt the encrypted item information or the logistics information in the electronic tag; if the electronic tag is destroyed The information in it can not be read, the packaging of the goods has been opened in the middle, and it can be determined that the traceability of the goods has failed.
  • the goods information is written in the electronic tag, and the goods information is encrypted by using the first encryption key; in the logistics transportation stage, the logistics information is written in the electronic tag, and the The second encryption key encrypts the logistics information; since the goods information and the logistics information are encrypted by the encryption key, it is equivalent to setting the read and write authority, and the information in the electronic tag is generally difficult to forge, ensuring the accuracy of the information;
  • the information in the electronic tag is read by using the decryption key matched with the encryption key, the target information is obtained to verify the source of the goods, and the goods information and the logistics information are encrypted and decrypted by the matched key, thereby avoiding the information.
  • the tamper device will destroy the electronic tag, and the tamper device is used to ensure the integrity of the electronic tag, which can prevent the package from being damaged. The goods were replaced.
  • the encryption key and the decryption key may be provided in advance by a service provider.
  • AES Advanced Encryption Standard
  • a plurality of key pairs are generated. Each key pair includes a public key B and a private key A, and a key N attached to A, and the private key A is assigned to the delivery.
  • a person as the first encryption key; assigning the key N to the carrier as the second encryption key; assigning the private key B to the consignee as the decryption key;
  • the electronic tag may be an RFID (Radio Frequency Identification) electronic tag, and the RFID electronic tag is provided with a plurality of blocks (block areas) for writing product information or logistics information respectively; and has been written into the RFID electronic tag. Product information and logistics information can only be read by combining the corresponding key.
  • RFID Radio Frequency Identification
  • the RFID electronic tag includes an analog front end and an AES module; the AES module includes a controller, a RAM module, and a data path; a sub-module is built in the data path, and the sub-module performs only one-quarter of the MixColumns operation, as shown in FIG. And Figure 4 shows.
  • the authentication process for RFID electronic tags involves an authentication server, an authentication reader, and an authentication tag (ie, an RFID tag).
  • the encryption unit of the authentication server includes an XOR execution unit 201.
  • the XOR execution unit 201 performs an XOR operation on the 0 to 15 bits of the acknowledgment data 203 and the output key 205 to be encrypted, through the bit unit for generating the cryptographic confirmation data 207.
  • the encryption confirmation data 207 is transmitted to the authentication reader together with the input key (InputKey_RN), and the confirmation data 207 and the input key (InputKey_RN) transmitted to the authentication reader are generated as one message and transmitted to the authentication tag.
  • the decryption unit of the authentication tag includes an XOR execution unit 211.
  • the XOR execution unit 211 performs an XOR operation with respect to bits 0 to 15 of the output key 215 and the encryption confirmation data 213 included in the Sec_Auth command message, and the unit 217 is configured to generate decryption confirmation data.
  • the output key 215 is used by the key processor of the authentication tag to use the input key (InputKey_RN) included in the Sec_Auth command message and the AES key included in the authentication memory.
  • the encryption unit of the authentication tag includes an XOR execution unit 221.
  • the XOR execution unit 221 performs XOR on the acknowledgment data 223 to be encrypted and the bits 16 to 31 of the output key 225, and performs an XOR operation in bit units to generate cryptographic confirmation data 227.
  • the confirmation data 223 to be encrypted may be the confirmation data 217 decrypted from the decryption unit of the authentication tag. Therefore, the XOR execution unit 221 re-encrypts the decrypted confirmation data 217 to generate the encrypted confirmation data 227.
  • the encryption confirmation data 227 is composed of a Sec_auth response message and is sent to the authentication reader. Further, the confirmation data 227 sent to the authentication reader is transmitted to the authentication server.
  • the decryption unit of the authentication server includes an XOR execution unit 231.
  • the XOR execution unit 231 performs an XOR operation on the bits 16 to 31 of the encryption confirmation data 233 and the output key 235, and generates decrypted confirmation data 237 in units of bits.
  • the authentication server compares the confirmation data 203 generated in the authentication server with the decryption confirmation data 237 received from the authentication reader, thereby verifying the authenticity of the authentication tag.
  • the RFID authentication system includes an authentication server 301, an authentication reader 321 and an authentication tag 331; the authentication server 301 includes a key database 302, a key processor 303, an authentication data generator 304, an encryption unit 305, a tag authentication unit 306, and a decryption unit 307.
  • the key processor 303 uses the authentication information to determine the AES key.
  • the authentication information includes an electronic product code (EPC) and SecParam. That is, the key processor 303 determines the AES key corresponding to the AES key index of the SecParam in the key database 302.
  • EPC electronic product code
  • the key processor 303 generates an output key by using an AES key and an input key (InputKey_RN) randomly generated in the authentication server 301.
  • the input key (InputKey_RN) can be a public key.
  • the confirmation data generator 304 generates confirmation data of a predetermined length, and encrypts the confirmation data by using the encryption unit 305. Subsequently, the confirmation data generator 304 transmits the input key and the encryption confirmation data to the authentication reader 321.
  • the encryption unit 305 performs exclusive OR (XOR) for the confirmation data and the output key for encrypting the confirmation data.
  • the tag authentication unit 306 Upon receiving the encrypted acknowledgment response data from the authentication reader 321, the tag authentication unit 306 decrypts the encrypted acknowledgment response data by using the decryption unit 307, and compares the acknowledgment data with the decrypted acknowledgment response data to verify the authentication tag 331.
  • the authenticity that is, when the confirmation data and the decrypted confirmation response data are the same, the authentication tag 331 is authenticated by the authentication reader 321 , and therefore, the tag authentication unit 305 verifies that the authentication tag 331 is authentic, indicating that the authentication tag 331 is Produced by legal producers.
  • the authentication reader 321 does not authenticate the authentication tag 331, so the tag authentication unit 305 verifies that the authentication tag 331 is not authentic, indicating that the authentication tag 331 is not generated by the legal producer. . Subsequently, the tag authentication unit 305 can transmit the authentication result to the authentication reader 321.
  • the decryption unit 307 can perform XOR on the encrypted acknowledgment response data and the output key for decrypting the encrypted acknowledgment response data.
  • the encryption unit 305 performs XOR on the input data by using the output key, and performs an encryption key on the input data in the same manner as the decryption unit 307 performs XOR with respect to the input data using the output to decrypt the input data, and thus, the encryption unit 305 and The decryption unit 307 can have the same structure.
  • the authentication reader 321 may further include an authentication information transmission unit 323 and an acknowledgment information transmission unit 325.
  • the authentication information transmission unit 323 transmits a part of the authentication information when receiving the authentication information from the authentication tag 331.
  • the authentication information includes Protocol Control (PC), Extended Protocol Control (XPC), EPC, and a SecParam.
  • the authentication information transmission unit 323 can receive the PC, XPC, EPC, and SecParam transmitted after the ST bit of the XPC is identified as T through the authentication tag 331.
  • the authentication information transmission unit 323 first receives the PC, XPC and EPC in the authentication information, and the authentication information transmitting unit 323 determines that the ST bit XPC of the authentication information transmitting unit 323 is identified as "1". Subsequently, the authentication information transmission unit 323 can receive the SecParam from the authentication tag 331 by using the Get_SecParam command and the response message.
  • the consignee first confirms whether the parcel has physical damage, and if there is physical damage, it can directly reject the product, that is, the traceability of the product fails, otherwise the RFID is read through the assigned public key.
  • the goods information or logistics information in the electronic label will be signed after confirmation.
  • the tamper device includes a mechanical tamper device, the mechanical tamper device is disposed at the opening of the package of the packaged goods, and the electronic tag is located in the mechanical tamper device, and the mechanical tamper device destroys the electronic device when the package opening is opened label.
  • a mechanical tampering device is disposed at the opening of the package of the packaged goods, and the electronic tag is disposed therein.
  • the mechanical tamper device destroys the electronic tag, and the electronic tag is destroyed and cannot be normal.
  • the information indicates that the goods are opened by unknown persons during the delivery or logistics transportation stage, and there is a risk of damage or replacement of the goods.
  • the tampering device can prevent the goods from being received before receiving the goods. Opened by others to reduce the possibility of goods replacement.
  • the above reading device can be used to read the information in the electronic tag. If the information can be read normally, it indicates that the product is not opened after being packaged; otherwise, Indicates that the goods have been opened, the goods can be rejected, and the consignor or carrier is liable; in addition, the mechanical tampering device is located at the normal opening of the package of the packaged goods. Under normal circumstances, the goods are from Enter or leave the parcel at the opening. If the parcel has an opening at other locations, indicating that the parcel is violently opened, the goods can be rejected.
  • the mechanical tamper device includes an inner cover, an outer cover, and a fixed plug
  • the upper end surface of the inner cover is provided with an annular cutting groove and an electronic tag.
  • the chip of the electronic tag is located inside the annular cutting groove, and the antenna of the electronic tag extends across the annular cutting groove to the periphery of the inner cover, and the lower end surface of the inner cover is fixed.
  • a tooth, a lower portion of the inner cover and the fixing plug are provided with a matching guiding mechanism for rotating the fixing plug relative to the inner cover in a first direction;
  • the outer cover is disposed outside the inner cover, and the lower end surface of the outer cover is fixed with a cutter,
  • the cutter is located in the annular cutting groove, and at least one of the inner cover and the outer cover is threadedly coupled to the fixing plug.
  • the mechanical tampering device comprises an inner cover, an outer cover and a fixing plug, the upper end surface of the inner cover is provided with an annular cutting groove and an electronic tag, the outer cover is disposed outside the inner cover, and the lower end surface of the outer cover is fixedly cut
  • the inner cover or the outer cover is screwed to the fixed plug, and the antenna of the electronic tag at the periphery of the inner cover can be cut when rotating, thereby destroying the electronic tag when the mechanical tampering device is operated.
  • a first limiting mechanism and a second limiting mechanism are disposed between the inner cover and the outer cover, the first limiting mechanism prevents the inner cover from rotating relative to the outer cover in the first direction, and the second limiting mechanism portion The inner cover is prevented from rotating in the second direction relative to the outer cover, and when the force applied to the inner cover or the outer cover in the second direction is greater than a preset value, the inner cover is rotated in the second direction relative to the outer cover.
  • a first limiting mechanism and a second limiting mechanism are disposed between the inner cover and the outer cover to limit the rotation range of the inner cover so that it can only rotate in the second direction relative to the outer cover, and needs to be applied. Appropriate force can be rotated to prevent the mechanical tamper from being opened by vibration.
  • the structure of the mechanical tampering device please refer to FIG. 7 and FIG. 8, including the inner cover 2, the outer cover 1 and the fixed plug 3;
  • the upper end surface of the inner cover 2 is provided with an annular cutting groove 25 and an RFID electronic tag 4, the chip 41 of the RFID electronic tag is located inside the annular cutting groove 25, and the antenna 42 of the RFID electronic tag extends across the annular cutting groove 25 to the inner cover
  • the lower end surface of the inner cover 2 is provided with fixing teeth 5 for fixing the package seal 34.
  • the lower portion of the inner cover 2 and the fixing plug are provided with a matching guiding mechanism, and only the fixing plug 3 is allowed to be along the inner cover 2
  • the first direction (clockwise or counterclockwise, in the clockwise direction in this embodiment) is rotated. As shown in FIG.
  • the guiding mechanism includes a reversely disposed inner cover rotation guide tooth 21 and a fixed plug rotation guide tooth 31;
  • the fixed plug rotation guide teeth 31 are rotatable in the counterclockwise direction, but when they are rotated clockwise, the inner cover rotation guide teeth 21 and the fixed plug rotation guide teeth 31 are caught by each other.
  • the outer cover 1 is disposed outside the inner cover, the lower end surface of the outer cover 1 is fixed with a cutter 11, and the cutter 11 is located in the annular cutting groove 25. When the outer cover 1 is rotated, the cutter 11 makes a circumference in the annular cutting groove 25. Movement, cutting the antenna of the RFID electronic tag to achieve the purpose of destroying the RFID electronic tag and making it unable to work normally.
  • a first limiting mechanism and a second limiting mechanism are disposed between the inner cover 2 and the outer cover 1.
  • the first limiting mechanism completely prevents the inner cover 2 from rotating relative to the outer cover 1 in the first direction
  • the second limiting mechanism partially blocks
  • the inner cover 2 is rotated relative to the outer cover 1 in a second direction (clockwise or counterclockwise, in this embodiment may be counterclockwise), and only the force applied to the inner or outer cover in the second direction is greater than a threshold At this time, the inner cover 2 is rotated in the second direction with respect to the outer cover 1.
  • the first limiting member includes a first protrusion 23 on the outer peripheral side of the inner cover 2 and a second protrusion 14 disposed on the inner peripheral side of the outer cover 1 against the first protrusion 23, and the second protrusion 14 is located on the first protrusion 23
  • the outer cover 1 is further provided with a fourth protrusion 15 which is located in the clockwise direction of the first protrusion 23 and functions as a second limiting mechanism.
  • the implementation is partially defined.
  • the second limiting mechanism includes a plurality of recesses 24 disposed on the outer peripheral side of the inner cover 2 and third projections 13 disposed on the inner peripheral side of the outer cover 1 to engage the recesses 24.
  • the number of the recesses 24 is six, evenly
  • the outer cover 1 is provided with a certain elasticity to rotate the outer cover in a clockwise or counterclockwise direction.
  • the third protrusion 13 is disengaged from the groove 24 to realize the outer cover 1
  • the third bump 13 intersects the antenna 42 of the RFID electronic tag in the vertical direction. When the third bump 13 is turned to the position of the antenna 42, the third bump 13 presses the antenna to achieve secondary damage.
  • At least one of the inner cover 2 and the outer cover 1 is threadedly coupled to the fixed plug.
  • the fixing plug 3 and the inner cover 2 are connected by a thread 22 and a thread 33, and the fixing plug 3 is connected to the outer cover 1 via a thread 12 and a thread 32.
  • Step A1 Combining the inner cover and the outer cover, and pressing the inner cover into the outer cover by using the elasticity of the outer cover, and limiting by the second limiting mechanism to prevent the outer cover from falling off;
  • Step A2 aligning the package seal with the fixed teeth in the inner cover, the package seal includes a bag mouth of the package bag or a tongue portion extending from the package cover;
  • Step A3 screwing the fixing plug into the inner cover and the outer cover in the first direction to the bottom to realize packaging of the package sealing;
  • Step B1 rotating the outer cover in the second direction, the fixed plug and the inner cover are relatively fixed due to the action of the guiding mechanism;
  • Step B2 gradually increase the strength, when the threshold is reached, the outer cover rotates along the inner cover, and the cutter moves in the annular cutting groove;
  • Step B3 When the cutter touches the antenna of the RFID electronic tag, the antenna is cut off.
  • the second encryption key is multiple, and the logistics transportation phase is divided into multiple sub-phases, and the plurality of second encryption keys respectively correspond to the plurality of sub-phases one by one;
  • the corresponding logistics information is written in the electronic tag, the corresponding second encryption key is obtained, and the corresponding logistics information is encrypted by the corresponding second encryption key.
  • the logistics transportation phase can be carried out by multiple carriers respectively, and each carrier is in the sub-phase of transportation when the goods are carried.
  • the corresponding logistics information can be written.
  • the electronic label is encrypted by the corresponding second encryption key, so that the logistics and transportation information of each carrier can be independent of each other, which facilitates the division and definition of subsequent transportation responsibility.
  • the method for tracking source anti-counterfeiting further includes the following steps:
  • the first encryption key is obtained from the blockchain server, and the package information is uploaded to the blockchain server;
  • the decryption key and the package information of the goods are obtained from the blockchain server, wherein the package information of the goods is used for comparison with the physical package of the goods, and the comparison result is used for source verification of the goods.
  • data storage and invocation are performed in conjunction with the blockchain server.
  • the blockchain ensures that the service request cannot be tampered with during the transmission process through the asymmetrically encrypted digital signature.
  • the publicity mechanism ensures that the data of each node is consistently stored.
  • the self-checking function of the node of the node and the multi-node quasi-real-time data check function ensure that the stored data record cannot be modified, the first encryption key, the second encryption key and the decryption key.
  • the key can be specified by the shipper and stored in the blockchain server in advance to ensure that the key cannot be modified, and the confidentiality and integrity of the information can be enhanced.
  • the package information can also be uploaded for receipt. The party compares the packaging information at the time of receipt to further verify the goods.
  • the blockchain has the self-checking function of the node: the blockchain uses the blockchain structure to store the data record, and the modification of the partial record destroys the integrity of the blockchain structure, and can be quickly verified and from other nodes. Restore the data.
  • each billing node of the blockchain has its own private key, and each block header contains the signature of the private key of the node, and the modification of the data in the block can be verified by the signature;
  • the blockchain also has a multi-node quasi-real-time data check function: when the private key of the node is stolen, the malicious user has the possibility of modifying all the data on the ledger chain, and the blockchain provides quasi-real-time between multiple nodes.
  • the data comparison mechanism can timely find out that a certain node's account book data has been tampered with.
  • User information and blockchain addresses in the blockchain are isolated. From the record storage of each node, the associated user information cannot be obtained.
  • User information storage has multiple layers of protection such as access control, access authentication, and encrypted storage. Users with higher transaction confidentiality can also choose the transaction irrelevance mechanism. Each transaction of the same user is mapped to different addresses on the blockchain, thus ensuring that multiple users of a user cannot be obtained on the transaction book. The relevance of the transaction.
  • a key safe and a user account delegation function are provided to ensure the security of the key.
  • the key safe uses the user information to encrypt and divide the key and store it on multiple different nodes.
  • the key safe is not accessed under the normal business process. After the user key is lost, the key can be found after the user information is authenticated. return.
  • the account entrustment is to realize the account retrieving function by entrusting the account to operate the entrusted account. All the entrusted account operations in the blockchain are independently recorded on the blockchain, and the operation of the entrusted account has strict frequency restriction and independent.
  • the risk control strategy can strictly control the operational risk of the entrusted account.
  • the package information includes a video slice of the package of the item, wherein the video slice is taken during shipment of the item, package of the item, data writing of the electronic tag, or data inspection.
  • the package information includes a video slice of the product at the time of packaging, and the video slice can truly reflect the packaging process of the product, and can be used to assist in verifying the product.
  • the goods are packaged on the packaging line, and an image system is set on the packaging table to record and trace back the packaging process, as well as the comparison function.
  • a camera is mounted on the packaging table.
  • the key action is completed (packing completion, packaging and packaging, data writing, data checking, etc.)
  • the HD camera framing action is triggered, and the video slice is generated after the image recording, and stored in the image.
  • the blockchain server In the blockchain server.
  • the video slice may also indicate the location, environment, time, and data security watermark for auxiliary verification; in the receiving phase, the video slice is obtained through the blockchain server to perform auxiliary verification on the product.
  • the method for tracking source anti-counterfeiting further includes the following steps:
  • the logistics information is uploaded to the blockchain server; wherein the logistics information includes whether the electronic tag is destroyed.
  • the carrier in the logistics stage, can read the information of the electronic tag, determine whether the electronic tag is destroyed, and use it as part of the logistics information, upload the logistics information to the blockchain server, and record the logistics information. And to prevent being tampered with, in the goods receipt verification stage, you can trace the failure of the goods verification according to the logistics information, so as to identify the relevant responsible person.
  • the embodiment of the present invention further provides a cargo traceability anti-counterfeiting device, and the following describes an embodiment of the cargo traceability anti-counterfeiting device.
  • FIG. 10 it is a schematic structural view of a cargo traceability anti-counterfeiting device of one embodiment.
  • the cargo traceability anti-counterfeiting device in this embodiment includes the above-described electronic tag 200.
  • the electronic tag 200 is disposed on a package or package for packaging goods; in the delivery phase, the goods information is written in the electronic tag 200, and the goods information is encrypted by using the first encryption key; In the logistics transportation phase, the logistics information is written in the electronic tag 200, and the logistics information is encrypted by using the second encryption key; since the goods information and the logistics information are encrypted by the encryption key, the read/write permission is set, and the electronic The information in the tag 200 is generally difficult to forge, ensuring the accuracy of the information; in the receiving phase, the information in the electronic tag 200 is read using the decryption key matching the encryption key, and the target information is verified to trace the source.
  • the tampering device By encrypting and decrypting the goods information and the logistics information through the matching key, information forgery can be avoided, the authenticity of the goods and the true and complete state of the goods in the transportation process can be ensured; in addition, when the package is opened midway, the tampering device will Destroy electronic tags, use tamper-proof devices to ensure the integrity of electronic tags, and prevent the replacement of goods in the package
  • the cargo traceability anti-counterfeiting device further includes a writing device 300 and a reading device 400;
  • the writing device 300 writes the goods information in the electronic tag 200, acquires the first encryption key, and encrypts the goods information by using the first encryption key;
  • the writing device 300 writes the logistics information in the electronic tag 200, acquires the second encryption key, and encrypts the logistics information by using the second encryption key;
  • the reading device 400 acquires the decryption key, reads the target information in the electronic tag 200 through the decryption key, and performs source verification on the product according to the target information; wherein the decryption key and the first encryption key respectively The second encryption key is matched, and the target information includes goods information or logistics information.
  • the writing device 300 and the reading device 400 can perform processing in cooperation with the server when performing operations, and the specific process is as described above.
  • the cargo traceability anti-counterfeiting device further includes a tamper-evident device 500 that tampers the electronic tag 200 when the package is opened.
  • the tamper device 500 includes a mechanical tamper device 510 disposed at the opening of the package of the packaged goods, and the electronic tag 200 is located in the mechanical tamper device 510.
  • the mechanical tamper device 510 destroys the electronic tag 200 when the package opening is opened.
  • the mechanical tamper device includes an inner cover, an outer cover, and a fixed plug
  • the upper end surface of the inner cover is provided with an annular cutting groove and an electronic tag.
  • the chip of the electronic tag is located inside the annular cutting groove, and the antenna of the electronic tag extends across the annular cutting groove to the periphery of the inner cover, and the lower end surface of the inner cover is fixed.
  • a tooth, a lower portion of the inner cover and the fixing plug are provided with a matching guiding mechanism for rotating the fixing plug relative to the inner cover in a first direction;
  • the outer cover is disposed outside the inner cover, and the lower end surface of the outer cover is fixed with a cutter,
  • the cutter is located in the annular cutting groove, and at least one of the inner cover and the outer cover is threadedly coupled to the fixing plug.
  • a first limiting mechanism and a second limiting mechanism are disposed between the inner cover and the outer cover, the first limiting mechanism prevents the inner cover from rotating relative to the outer cover in the first direction, and the second limiting mechanism portion The inner cover is prevented from rotating in the second direction relative to the outer cover, and when the force applied to the inner cover or the outer cover in the second direction is greater than a preset value, the inner cover is rotated in the second direction relative to the outer cover.
  • the cargo traceability anti-counterfeiting device of the embodiment of the present invention corresponds to the above-mentioned product traceability anti-counterfeiting method, and the technical features and the beneficial effects thereof described in the embodiment of the above-described cargo traceability anti-counterfeiting method are applicable to the embodiment of the cargo traceability anti-counterfeiting device.
  • the item traceability anti-counterfeiting method can be applied to a scene of logistics transportation.
  • the packaged goods are registered into the account book server produced by the blockchain technology.
  • the blockchain issues a delivery statement to the designated carrier link, and each carrier confirms the receipt in the respective blockchain account. Goods and parcels that continue to be shipped as a technical unit.
  • the AES continuous key is authenticated by the blockchain server and passed to the link one by one. For example, after the first carrier authenticates the identity through the blockchain, the blockchain server transmits the holding sequence key N and uses the key. After a write operation, the blockchain server will recognize the transfer of the carrier responsibility and will abolish the key seal and issue the consecutive key N+1 that the next carrier should hold on the next link.
  • the carrier Each time a carrier is changed in the transport path, the carrier writes the RFID chip with the phase key N+X held by him, and writes the carrier's receiver information (such as identification number, GPS information, receiving goods). Operator, license plate number, time, etc.) to the specified block, and write the operation to its own blockchain server account, recognize the occurrence of its own responsibility, form a blockchain accounting contract mechanism, and synchronize the upstream and downstream data of the ledger.
  • the carrier's receiver information such as identification number, GPS information, receiving goods.
  • the consignee When the parcel is delivered to the final consignee, the consignee has received the delivery statement and the consignee key B from the consignor's blockchain server, and the consignee can register with the card reader held by the consignee.
  • the terminal with the identity binding reads the encrypted data on the RFID chip and interprets it, and reads all the information of the consignor and the carrier information on the terminal.
  • the confirmation information After the confirmation information is correct, the actual temporary key B and the key A and the carrier continuous key N, N+1...N+X are simultaneously invalidated after the customer receives the goods, and are The mark is invalid and cannot be reused for a limited period of time, and these keys will be cancelled after the expiration date.
  • both the carrier and the final consignee should check the packaging intact to judge whether the packaged goods are received by the most traditional rules. If the packaging is intact, further read the chips that have not been destroyed. If the packaging is damaged, you can investigate the transportation and storage responsibility of the packaged goods without having to read the chip.
  • the chip is protected by the outer packaging and its own protection device during transportation. If the chip is damaged, it means that the packaging is damaged or the chip protection device is violently destroyed, or the package is opened in the middle. Any state occurs, which means The carrier violates the carrier’s liability or is liable for damage to the parcel, and our system limits the carrier’s liability to the current carrier.
  • the next carrier refuses to accept the goods and marks the parcel goods as current carrier liability in the blockchain and announces them to the upstream and downstream links. At this time, the consignor will know the abnormal situation, the parcel goods will be handled abnormally and the responsibility will be clearly defined. The bearer, the final consignee will not be damaged or unpacked parcels.
  • Such a rule guarantees the end-to-end integrity of the technical unit under the protection of the AES encryption protection and the RFID protection device as a blockchain accounting, so that the packaged goods cannot be replaced in the middle, avoiding The generation of intermediate fakes accurately locates the ultimate responsible person of the packaged goods.
  • each package has become a non-counterfeit, data-unchangeable, and directional IoT offline mobile technology unit.
  • This technology unit transfers the responsibility through the blockchain accounting mechanism.
  • the responsibility for the preservation changes as the technical unit registers in the path, forming a blockchain contract.
  • the consignor in the process 1, if there is an e-commerce order corresponding, the consignor generates a distribution list (BOM) according to the e-commerce order (CO), and completes the BOM unloading and packing. If there is no e-commerce order, it can be packaged according to the manufacturer's BOM information, the factory packaged goods BOM content, etc.
  • the data format is agreed by the technical service provider and the shipper. It must contain the valid identification information of the shipper, packaging production line information, BOM, geographic information, etc., in which the shipper can customize random information such as greetings and random gifts. Etc., this information is registered with the image capture information of the packaged package on the blockchain ledger server deployed by the service provider and cannot be changed.
  • This information is also synchronized to the third-party virtual carrier's blockchain server. After registration, both parties can't change it. At the same time, the data is synchronized to the client terminal, and it cannot be changed. (The synchronization in the blockchain is the unreadable information of the encrypted translation. At the same time, it cannot be changed, except that the consignor and the consignee are not readable.
  • the data packet generated as the previous step is combined with the image capture data, combined into a composite data packet, and registered and stored in the blockchain server.
  • the BOM packing completion signal is used as a trigger to generate the key A, and the data packet generated by the previous process is translated into the encrypted compression code, and the key A is encapsulated and written into the original system.
  • the information terminal of the end user pointed to by the order number is obtained at the time of delivery, and the technology is bound, and the address of the recipient or the network communication mode is also obtained.
  • the start of the delivery process is the holder of the package that is packaged by technology at the moment, perhaps a manufacturer or trader, at which point they:
  • the system sends a one-time decryption Key B to the consignee terminal through the blockchain server, and the Key B can only be used for decryption to be paired.
  • the key A points to a specific technology encapsulation unit that contains the customer's order items.
  • the terminal binding activation procedure is executed first, and then the process described in the previous paragraph is executed, so that the specific package encapsulated by the technology can form an end-to-end closed loop with the legal recipient binding terminal. contact.
  • the shipper server When the system sends Key B and binds the recipient terminal, the shipper server sends a continuous key N attached to Key A to the first carrier, and the blockchain server issues a delivery statement.
  • the first carrier reads the count value in the RFID chip wrapped as a technical package unit. If the technical and physical verification is normal, the first carrier holds the Key N and writes the block to the system of the RFID chip pointed by Key N.
  • the own receipt information after the successful verification of the write, is sent to the consignor blockchain server by the blockchain server deployed to the first carrier (which can be the SAAS server bound to the first carrier)
  • the notification is also the flow 1 in Figure 15.
  • the first carrier forwards the package, it issues a delivery statement to the shipper (flow 2 in Figure 15), triggering process 3 (see Figure 15), and the next time Key N+1 is sent to the second by the shipper server.
  • the carrier, the second carrier repeats the operation of the first carrier, and after successful, proceeds to process 4 (see Figure 15), and sends the receipt confirmation to the first carrier, while the current carrier of the first carrier and the second carrier
  • the package retention responsibility status change triggers the process 5, and both parties register the status change with the shipper server.
  • This mechanism will be implemented backwards until the Xth carrier as the last carrier bears the responsibility of serving the consignee, where the change in the status of the responsibility and the process data are shipped to the various carriers on the entire logistics link.
  • the human server registers and synchronizes the data until the last carrier delivers to the consignee and issues a delivery statement to the consignor server.
  • Key N-N+X is specified for the number of uses and the validity period. It can be pre-warned before the expiration of the validity period. When the usage count is exhausted, it will be marked abnormally in the following data synchronization.
  • the exception handling will notify the previous carrier Y-1 server and send an abnormal status, notifying Y-1 that the package was rejected and notifying the shipper server.
  • the subsequent warranty is limited to the carrier Y-1, and the consignor issues an agreement with Y-1 for the claim and the notification that the technology package unit has failed. Further, after judging that the technical unit is indeed damaged by physical or technical means (such as chip damage and its minor probability event), the shipper revokes the key B of the technology packaging unit and releases the Key B and the consignee registration. Binding of the terminal.
  • Further processing can be a customer return or the shipper re-delivery.
  • the last carrier X assumes the responsibility of serving the consignee.
  • the specific dispatcher picks up the goods
  • the final judgment is that the goods are in good condition
  • the card is normal with the handheld terminal, and a delivery statement is issued, stating that the goods are delivered.
  • the server of person X is sent to the shipper server.
  • the shipper server sends the data image registered with the binding technical unit to the legal consignee binding terminal.
  • the terminal data is complete, and the pre-issued data does not include the image description, such as the package color of the batch.
  • the shipper server Prior to this, the shipper server has registered the encapsulated technical unit information encapsulated in the blockchain and has been sent to the legal consignee binding terminal with Key B.
  • the consignee activates the APP or computer program (both through the binding terminal), and uses the NFC or dedicated card reader to read the RFID data on the package of the technology package unit using the held Key B, and with the received data. Data comparison
  • the intermediate logistics carrier can also retrieve the original image of the package through the legal interface, which is applied in the definition of responsibility and the search of goods.
  • the packaging platform software system adds a watermark that can indicate the location, environment, time, and identity of the camera when capturing the scene, and retains the “fingerprint” evidence of the image as another means of auxiliary verification packaging in addition to RFID encryption.
  • a watermark that can indicate the location, environment, time, and identity of the camera when capturing the scene, and retains the “fingerprint” evidence of the image as another means of auxiliary verification packaging in addition to RFID encryption.
  • the program can be stored in a readable storage medium.
  • the program when executed, includes the steps described in the above methods.
  • the storage medium includes: a ROM/RAM, a magnetic disk, an optical disk, and the like.
  • the partial data encryption and data protection steps in the method of the foregoing embodiment may be implemented by AES, RSA, and blockchain, and may also pass other remaining internationally recognized reliable encryption algorithms and other reliable and proven class blockchains (such as doubles). Music function) technology to protect.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Development Economics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Computing Systems (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

A commodity tracing and anti-counterfeiting method and device. The method comprises: in the delivery stage, write commodity information in an electronic tag, and use a first encryption key to encrypt the commodity information (S110); in the logistics transport stage, write logistics information in the electronic tag, and use a second encryption key to encrypt the logistics information (S120); since the commodity information and the logistics information are encrypted by the encryption key, it is generally difficult to counterfeit the information in the electronic tag, thereby ensuring the accuracy of the information; and in the receiving stage, use a decryption key matching the encryption key to read the information in the electronic tag, and obtain target information to perform traceability verification on the commodity, encrypt and decrypt the commodity information and the logistics information by means of the matched keys to ensure the traceability authenticity of the commodity and the real complete state of the commodity in the transport process, and if a package is opened in midway, a tamper device may damage the electronic tag, and the completeness of the electronic tag can be ensured by using the tamper device, so as to prevent the commodity in the package from being replaced (S130).

Description

货品溯源防伪方法和装置Product traceability anti-counterfeiting method and device
相关申请Related application
本申请要求2017年9月30日申请的,申请号为201710937946.4,名称为“一种用加密射频识别技术对物流进行追溯与包装保真方法”的中国专利申请的优先权,在此将其全文引入作为参考。This application claims priority from Chinese Patent Application No. 201710937946.4, entitled "A Method for Traceability and Packaging Fidelity of Logistics with Encrypted Radio Frequency Identification Technology", which is filed on September 30, 2017. Introduced as a reference.
技术领域Technical field
本发明涉及物流技术领域,特别是涉及一种货品溯源防伪方法和装置。The invention relates to the technical field of logistics, in particular to a method and a device for traceability of goods.
背景技术Background technique
在代购、海淘等网络消费的过程中,当消费者决定在一个陌生的商家手中购物的时候,消费者在收到货品时很难鉴别货品真伪,其中的原因多样,如当消费者通过电子途径下货品订单时,难以确保购买的货品是从原产地发货;在运输过程中经常发生运输丢件,难以得知运输信息等问题。In the process of purchasing, Haitao and other online consumption, when consumers decide to shop in the hands of a stranger, it is difficult for consumers to identify the authenticity of the goods when they receive the goods. The reasons are various, such as when the consumers pass When ordering goods under the electronic route, it is difficult to ensure that the purchased goods are shipped from the place of origin; in the course of transportation, transportation is often lost, and it is difficult to know the transportation information.
现在海淘商品现状:“假货摇身一变成海淘正品”,以化妆品为例:在二手交易平台上,大批量购买大牌化妆品空瓶,经过伪造国外快递单和采购小票,伪造物流信息和出产地来达到“海外镀金”目的后,以代购正品的身份出现在各大销售平台。Now the current status of Haitao's goods: "Fake goods become a sea tao authentic", taking cosmetics as an example: on the second-hand trading platform, bulk purchase of large-name cosmetics empty bottles, after forging foreign express orders and purchasing small tickets, forging logistics information and production areas After reaching the goal of “overseas gold plating”, it appeared on the major sales platforms as a genuine purchasing agent.
传统技术对此只是在各物流环节扫描,通过面单识别后告知消费者物流信息,而消费者并不清楚货品在当中的具体真实状态。The traditional technology only scans in various logistics links, and informs the consumer of the logistics information after the face sheet is recognized, and the consumer is not clear about the actual state of the goods in the middle.
申请内容Application content
基于此,有必要针对传统的物流技术中,难以知晓货品在运输过程中的真实状态的问题,提供一种货品溯源防伪方法和装置。Based on this, it is necessary to provide a method and device for traceability of goods in the traditional logistics technology, which is difficult to know the true state of the goods during transportation.
一种货品溯源防伪方法,包括以下步骤:A method for traceability of goods, comprising the following steps:
在发货阶段,在电子标签中写入货品信息,获取第一加密密钥,通过第一加密密钥对货品信息进行加密;其中,电子标签设置在用于包装货品的包裹上或包裹中,同时还设置有防拆装置,防拆装置在包裹被打开时,破坏电子标签;In the delivery phase, the goods information is written in the electronic tag, the first encryption key is obtained, and the goods information is encrypted by the first encryption key; wherein the electronic tag is set on the package or package for packaging the goods, At the same time, a tampering device is provided, and the tampering device destroys the electronic tag when the package is opened;
在物流运输阶段,在电子标签中写入物流信息,获取第二加密密钥,通过第二加密密钥对物流信息进行加密;In the logistics transportation phase, the logistics information is written in the electronic tag, the second encryption key is obtained, and the logistics information is encrypted by the second encryption key;
在收货阶段,获取解密密钥,通过解密密钥读取电子标签中的目标信息,并根据目标信息对货品进行溯源验证;其中,解密密钥分别与第一加密密钥、第二加密密钥相匹配,目标信息包括货品信息或物流信息;In the receiving phase, the decryption key is obtained, the target information in the electronic tag is read by the decryption key, and the source is verified by the source according to the target information; wherein the decryption key is respectively associated with the first encryption key and the second encryption key The key matches, and the target information includes goods information or logistics information;
若电子标签被破坏,判定货品溯源失败。If the electronic tag is destroyed, it is determined that the traceability of the product has failed.
根据上述货品溯源防伪方法,其是在发货阶段,在电子标签中写入货品信息,并利用第一加密 密钥对货品信息进行加密;在物流运输阶段,在电子标签中写入物流信息,并利用第二加密密钥对物流信息进行加密;由于货品信息和物流信息有加密密钥进行加密,相当于设置了读写权限,电子标签中的信息一般难以伪造,保证信息的准确性;在收货阶段,利用与加密密钥相匹配的解密密钥对电子标签中的信息进行读取,得到目标信息对货品进行溯源验证,通过匹配的密钥对货品信息和物流信息进行加密和解密,可以避免信息伪造,保证货品的真实性和货品在运输过程中的真实完整状态;另外,当包裹中途打开时,防拆装置会破坏电子标签,利用防拆装置来保证电子标签的完整性,可以防止包装中的货品被置换。According to the above-mentioned product traceability anti-counterfeiting method, in the delivery phase, the goods information is written in the electronic tag, and the goods information is encrypted by using the first encryption key; in the logistics transportation stage, the logistics information is written in the electronic tag, And using the second encryption key to encrypt the logistics information; since the goods information and the logistics information are encrypted by the encryption key, which is equivalent to setting the read and write authority, the information in the electronic tag is generally difficult to forge, and the accuracy of the information is ensured; In the receiving phase, the information in the electronic tag is read by using the decryption key matched with the encryption key, the target information is obtained to verify the source of the goods, and the goods information and the logistics information are encrypted and decrypted by the matched key. It can avoid information forgery, ensure the authenticity of the goods and the true and complete state of the goods during transportation; in addition, when the package is opened midway, the tamper device will destroy the electronic tag and use the tamper device to ensure the integrity of the electronic tag. Prevent the goods in the package from being replaced.
在其中一个实施例中,防拆装置包括机械防拆装置,机械防拆装置设置在包装货品的包裹的开口处,电子标签位于机械防拆装置中,在包裹开口打开时,机械防拆装置破坏电子标签。In one embodiment, the tamper device comprises a mechanical tamper device, the mechanical tamper device is disposed at the opening of the package of the packaged goods, the electronic tag is located in the mechanical tamper device, and the mechanical tamper device is destroyed when the package opening is opened Electronic tags.
在其中一个实施例中,机械防拆装置包括内盖、外盖和固定塞;In one embodiment, the mechanical tamper device includes an inner cover, an outer cover, and a fixed plug;
内盖的上端面设置有环形切割槽和电子标签,电子标签的芯片位于环形切割槽的内侧,电子标签的天线跨过环形切割槽延伸至内盖的周部,内盖的下端面设置有固定齿,内盖的下部与固定塞设置有相互配合的导向机构,以使固定塞相对于内盖沿第一方向转动;外盖设置在内盖的外部,外盖的下端面固定有切割器,切割器位于环形切割槽内,内盖和外盖中至少一个与固定塞经螺纹连接。The upper end surface of the inner cover is provided with an annular cutting groove and an electronic tag. The chip of the electronic tag is located inside the annular cutting groove, and the antenna of the electronic tag extends across the annular cutting groove to the periphery of the inner cover, and the lower end surface of the inner cover is fixed. a tooth, a lower portion of the inner cover and the fixing plug are provided with a matching guiding mechanism for rotating the fixing plug relative to the inner cover in a first direction; the outer cover is disposed outside the inner cover, and the lower end surface of the outer cover is fixed with a cutter, The cutter is located in the annular cutting groove, and at least one of the inner cover and the outer cover is threadedly coupled to the fixing plug.
在其中一个实施例中,内盖和外盖间设置有第一限位机构和第二限位机构,第一限位机构阻止内盖相对于外盖沿第一方向转动,第二限位机构部分阻止内盖相对于外盖沿第二方向转动,在沿第二方向施加在内盖或外盖上的力大于预设值时,内盖相对于外盖沿第二方向转动。In one embodiment, a first limiting mechanism and a second limiting mechanism are disposed between the inner cover and the outer cover, and the first limiting mechanism prevents the inner cover from rotating relative to the outer cover in the first direction, and the second limiting mechanism The inner cover is partially prevented from rotating in the second direction relative to the outer cover, and when the force applied to the inner cover or the outer cover in the second direction is greater than a preset value, the inner cover is rotated in the second direction relative to the outer cover.
在其中一个实施例中,第二加密密钥为多个,物流运输阶段分为多个子阶段,多个第二加密密钥分别与多个子阶段一一对应;In one embodiment, the second encryption key is multiple, and the logistics transportation phase is divided into multiple sub-phases, and the plurality of second encryption keys respectively correspond to the plurality of sub-phases one by one;
在每个子阶段中,在电子标签中写入相应的物流信息,获取对应的第二加密密钥,通过对应的第二加密密钥对相应的物流信息进行加密。In each sub-phase, the corresponding logistics information is written in the electronic tag, the corresponding second encryption key is obtained, and the corresponding logistics information is encrypted by the corresponding second encryption key.
在其中一个实施例中,货品溯源防伪方法还包括以下步骤:In one embodiment, the cargo traceability anti-counterfeiting method further comprises the following steps:
在发货阶段,从区块链服务器中获取第一加密密钥,并将货品包装信息上传至区块链服务器;In the delivery phase, the first encryption key is obtained from the blockchain server, and the package information is uploaded to the blockchain server;
在物流运输阶段,从区块链服务器中获取第二加密密钥;Obtaining a second encryption key from the blockchain server during the logistics transportation phase;
在收货阶段,从区块链服务器中获取解密密钥和货品包装信息,其中,货品包装信息用于与货品包装实物进行对比,对比结果用于对货品进行溯源验证。In the receiving phase, the decryption key and the package information of the goods are obtained from the blockchain server, wherein the package information of the goods is used for comparison with the physical package of the goods, and the comparison result is used for source verification of the goods.
在其中一个实施例中,其特征在于,货品包装信息包括货品包装的视频切片,其中,视频切片是在货品装箱、货品封装、电子标签写入数据或数据检查时拍摄的。In one embodiment, the package information includes a video slice of the package of the item, wherein the video slice is taken during the packing of the item, the package of the item, the writing of the electronic tag or the data check.
在其中一个实施例中,货品溯源防伪方法还包括以下步骤:In one embodiment, the cargo traceability anti-counterfeiting method further comprises the following steps:
在物流运输阶段,将物流信息上传至区块链服务器;其中,物流信息包括电子标签中是否被破坏。In the logistics transportation phase, the logistics information is uploaded to the blockchain server; wherein the logistics information includes whether the electronic tag is destroyed.
一种货品溯源防伪装置,包括上述的电子标签。A cargo traceability anti-counterfeiting device, comprising the above electronic tag.
根据上述货品溯源防伪装置,电子标签设置在用于包装货品的包裹上或包裹中;在发货阶段, 在电子标签中写入货品信息,并利用第一加密密钥对货品信息进行加密;在物流运输阶段,在电子标签中写入物流信息,并利用第二加密密钥对物流信息进行加密;由于货品信息和物流信息有加密密钥进行加密,相当于设置了读写权限,电子标签中的信息一般难以伪造,保证信息的准确性;在收货阶段,利用与加密密钥相匹配的解密密钥对电子标签中的信息进行读取,得到目标信息对货品进行溯源验证,通过匹配的密钥对货品信息和物流信息进行加密和解密,可以避免信息伪造,保证货品的溯源真实性和货品在运输过程中的真实完整状态。According to the above-mentioned goods traceability anti-counterfeiting device, the electronic tag is set on the package or package for packaging the goods; in the delivery phase, the goods information is written in the electronic tag, and the goods information is encrypted by using the first encryption key; In the logistics transportation stage, the logistics information is written in the electronic tag, and the logistics information is encrypted by using the second encryption key; since the goods information and the logistics information are encrypted by the encryption key, the read/write permission is set, and the electronic tag is The information is generally difficult to forge, to ensure the accuracy of the information; in the receiving phase, the information in the electronic tag is read by using the decryption key matching the encryption key, and the target information is verified to trace the source, and the matching is performed. The key encrypts and decrypts the goods information and the logistics information, which can avoid information forgery, ensure the authenticity of the traceability of the goods and the true and complete state of the goods during transportation.
在其中一个实施例中,货品溯源防伪装置还包括写入设备和读取设备;In one embodiment, the cargo traceability anti-counterfeiting device further includes a writing device and a reading device;
在发货阶段,写入设备在电子标签中写入货品信息,获取第一加密密钥,通过第一加密密钥对货品信息进行加密;In the delivery phase, the writing device writes the goods information in the electronic tag, obtains the first encryption key, and encrypts the goods information by using the first encryption key;
在物流运输阶段,写入设备在电子标签中写入物流信息,获取第二加密密钥,通过第二加密密钥对物流信息进行加密;In the logistics transportation phase, the writing device writes the logistics information in the electronic tag, acquires the second encryption key, and encrypts the logistics information through the second encryption key;
在收货阶段,读取设备获取解密密钥,通过解密密钥读取电子标签中的目标信息,并根据目标信息对货品进行溯源验证;其中,解密密钥分别与第一加密密钥、第二加密密钥相匹配,目标信息包括货品信息或物流信息。In the receiving phase, the reading device acquires the decryption key, reads the target information in the electronic tag through the decryption key, and performs traceability verification on the product according to the target information; wherein the decryption key and the first encryption key respectively The two encryption keys are matched, and the target information includes goods information or logistics information.
在其中一个实施例中,货品溯源防伪装置还包括防拆装置,防拆装置在包裹被打开时,破坏电子标签。In one of the embodiments, the cargo traceability anti-counterfeiting device further includes a tampering device that destroys the electronic tag when the package is opened.
在其中一个实施例中,防拆装置包括机械防拆装置,机械防拆装置设置在包装货品的包裹的开口处,电子标签位于机械防拆装置中,在包裹开口打开时,机械防拆装置破坏电子标签。In one embodiment, the tamper device comprises a mechanical tamper device, the mechanical tamper device is disposed at the opening of the package of the packaged goods, the electronic tag is located in the mechanical tamper device, and the mechanical tamper device is destroyed when the package opening is opened Electronic tags.
在其中一个实施例中,机械防拆装置包括内盖、外盖和固定塞;In one embodiment, the mechanical tamper device includes an inner cover, an outer cover, and a fixed plug;
内盖的上端面设置有环形切割槽和电子标签,电子标签的芯片位于环形切割槽的内侧,电子标签的天线跨过环形切割槽延伸至内盖的周部,内盖的下端面设置有固定齿,内盖的下部与固定塞设置有相互配合的导向机构,以使固定塞相对于内盖沿第一方向转动;外盖设置在内盖的外部,外盖的下端面固定有切割器,切割器位于环形切割槽内,内盖和外盖中至少一个与固定塞经螺纹连接。The upper end surface of the inner cover is provided with an annular cutting groove and an electronic tag. The chip of the electronic tag is located inside the annular cutting groove, and the antenna of the electronic tag extends across the annular cutting groove to the periphery of the inner cover, and the lower end surface of the inner cover is fixed. a tooth, a lower portion of the inner cover and the fixing plug are provided with a matching guiding mechanism for rotating the fixing plug relative to the inner cover in a first direction; the outer cover is disposed outside the inner cover, and the lower end surface of the outer cover is fixed with a cutter, The cutter is located in the annular cutting groove, and at least one of the inner cover and the outer cover is threadedly coupled to the fixing plug.
在其中一个实施例中,内盖和外盖间设置有第一限位机构和第二限位机构,第一限位机构阻止内盖相对于外盖沿第一方向转动,第二限位机构部分阻止内盖相对于外盖沿第二方向转动,在沿第二方向施加在内盖或外盖上的力大于预设值时,内盖相对于外盖沿第二方向转动。In one embodiment, a first limiting mechanism and a second limiting mechanism are disposed between the inner cover and the outer cover, and the first limiting mechanism prevents the inner cover from rotating relative to the outer cover in the first direction, and the second limiting mechanism The inner cover is partially prevented from rotating in the second direction relative to the outer cover, and when the force applied to the inner cover or the outer cover in the second direction is greater than a preset value, the inner cover is rotated in the second direction relative to the outer cover.
在其中一个实施例中,货品溯源防伪装置还包括搭扣闭锁装置,搭扣闭锁装置设置在包装货品的包裹上或包裹中,并与脉冲发生器连接,在包裹被打开时,搭扣闭锁装置同时被打开,搭扣闭锁装置触发脉冲发生器。In one embodiment, the cargo traceability anti-counterfeiting device further includes a buckle locking device, the buckle locking device is disposed on the package or the package of the packaged goods, and is connected with the pulse generator, and the buckle locking device is opened when the package is opened. At the same time, the buckle lock device triggers the pulse generator.
附图说明DRAWINGS
图1为一个实施例中的货品溯源防伪方法的应用场景示意图;1 is a schematic diagram of an application scenario of a method for tracking source anti-counterfeiting in an embodiment;
图2为一个实施例中的货品溯源防伪方法的流程示意图;2 is a schematic flow chart of a method for tracking source anti-counterfeiting in an embodiment;
图3为一个实施例中的AES模块的架构图示意图;3 is a schematic structural diagram of an AES module in an embodiment;
图4为一个实施例中的数据路径的架构示意图;4 is a schematic structural diagram of a data path in an embodiment;
图5-a为一个实施例中的认证服务器的加密流程示意图;FIG. 5-a is a schematic diagram of an encryption process of an authentication server in an embodiment; FIG.
图5-b为一个实施例中的认证标签的解密流程示意图;FIG. 5-b is a schematic diagram of a decryption process of an authentication label in an embodiment; FIG.
图5-c为一个实施例中的认证标签的加密流程示意图;FIG. 5-c is a schematic diagram of an encryption process of an authentication label in an embodiment;
图5-d为一个实施例中的认证服务器的解密流程示意图;FIG. 5-d is a schematic diagram of a decryption process of an authentication server in an embodiment;
图6为一个实施例中的AES模块架构原理图;6 is a schematic diagram of an AES module architecture in an embodiment;
图7为一个实施例中的机械防拆装置的纵向剖面示意图;Figure 7 is a longitudinal cross-sectional view of the mechanical tampering device in one embodiment;
图8为一个实施例中的机械防拆装置的横向截面示意图;Figure 8 is a schematic transverse cross-sectional view of the mechanical tampering device in one embodiment;
图9为一个实施例中的机械防拆装置的局部截面示意图;Figure 9 is a partial cross-sectional view showing the mechanical tampering device in one embodiment;
图10为一个实施例中的货品溯源防伪设备的结构示意图;10 is a schematic structural view of a product traceability anti-counterfeiting device in an embodiment;
图11为另一个实施例中的货品溯源防伪设备的结构示意图;11 is a schematic structural view of a cargo traceability anti-counterfeiting device in another embodiment;
图12为又一个实施例中的货品溯源防伪设备的结构示意图;12 is a schematic structural view of a cargo traceability anti-counterfeiting device in still another embodiment;
图13为再一个实施例中的货品溯源防伪设备的结构示意图;FIG. 13 is a schematic structural diagram of a product traceability anti-counterfeiting device in still another embodiment; FIG.
图14为一个实施例中的货品包裹封装流程示意图;14 is a schematic diagram of a package wrapping process in an embodiment;
图15为一个实施例中的货品包裹发货与运输流程示意图;Figure 15 is a schematic view showing the process of shipment and transportation of goods in one embodiment;
图16为一个实施例中的货品包裹运输异常处理流程示意图;16 is a schematic diagram of an abnormal processing flow of a parcel shipment in an embodiment;
图17为一个实施例中的货品收货流程示意图。Figure 17 is a schematic view showing the process of receiving goods in an embodiment.
具体实施方式Detailed ways
为使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步的详细说明。应当理解,此处所描述的具体实施方式仅仅用以解释本发明,并不限定本发明的保护范围。另外还需要说明的是,为了便于描述,附图中仅示出了与本发明相关的部分而非全部内容。The present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It is understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the scope of the invention. It should also be noted that, for ease of description, only some, but not all, of the present invention are shown in the drawings.
需要说明的是,本发明实施例所涉及的术语“第一\第二”仅仅是是区别类似的对象,不代表针对对象的特定排序,可以理解地,“第一\第二”在允许的情况下可以互换特定的顺序或先后次序。应该理解“第一\第二”区分的对象在适当情况下可以互换,以使这里描述的本发明的实施例能够以除了在这里图示或描述的那些以外的顺序实施。It should be noted that the term “first\second” according to the embodiment of the present invention is merely an object that distinguishes similar objects, and does not represent a specific ordering for an object. It can be understood that “first\second” is allowed. In this case, a specific order or order can be interchanged. It is to be understood that the "first/second" distinguished objects may be interchanged as appropriate to enable the embodiments of the invention described herein to be carried out in a sequence other than those illustrated or described herein.
本申请提供的货品溯源防伪方法,可以应用于如图1所示的应用环境中。其中,发货人在电子标签中写入货品信息,获取第一加密密钥,通过第一加密密钥对货品信息进行加密;承运人在电子标签中写入物流信息,获取第二加密密钥,通过第二加密密钥对物流信息进行加密;收货人获取解密密钥,通过解密密钥读取电子标签中的目标信息,并根据目标信息对货品进行溯源真实性验证,还设置有防拆装置,防拆装置在包裹被打开时,破坏电子标签。其中,可以通过专用的读写器配合密钥对电子标签进行读写操作。The traceability anti-counterfeiting method provided by the present application can be applied to the application environment as shown in FIG. The shipper writes the goods information in the electronic tag, obtains the first encryption key, encrypts the goods information by using the first encryption key, and the carrier writes the logistics information in the electronic tag to obtain the second encryption key. The logistics information is encrypted by the second encryption key; the consignee obtains the decryption key, reads the target information in the electronic tag through the decryption key, and verifies the authenticity of the goods according to the target information, and also sets the defense Disassemble the device and the tamper device destroys the electronic tag when the package is opened. Among them, the electronic tag can be read and written by a dedicated reader and a key.
参见图2所示,为本发明一个实施例的货品溯源防伪方法的流程示意图,该实施例中的货品溯源防伪方法,包括以下步骤:2 is a schematic flowchart of a method for source-originating anti-counterfeiting according to an embodiment of the present invention. The method for tracking source anti-counterfeiting in the embodiment includes the following steps:
步骤S110:在发货阶段,在电子标签中写入货品信息,获取第一加密密钥,通过第一加密密钥对货品信息进行加密;其中,电子标签设置在用于包装货品的包裹上或包裹中,同时还设置有防拆装置,防拆装置在包裹被打开时,破坏电子标签;Step S110: In the delivery phase, the goods information is written in the electronic tag, the first encryption key is obtained, and the goods information is encrypted by the first encryption key; wherein the electronic tag is set on the package for packaging the goods or In the package, a tampering device is also provided, and the tamper device destroys the electronic tag when the package is opened;
在本步骤中,电子标签可以设置在包裹上或包裹中,设置在包裹上,电子标签的装贴过程较为简单,设置在包裹中,可以保护电子标签,避免电子标签受损;货品信息主要包括货品的生产BOM(Bill of Material,物料清单)信息、出厂时间信息、身份码和发货地GPS(Global Positioning System,全球定位系统)定位信息等;防拆装置的作用在于避免包裹被打开,一旦打开,可以破坏电子标签,此时电子标签会失效;In this step, the electronic tag can be set on the package or in the package, and is disposed on the package. The process of attaching the electronic tag is relatively simple, and the package is disposed in the package to protect the electronic tag and prevent the electronic tag from being damaged; the product information mainly includes BOM (Bill of Material) information, factory time information, identification code and GPS (Global Positioning System) positioning information; the function of the tamper is to prevent the package from being opened. Open, can destroy the electronic label, at this time the electronic label will be invalid;
步骤S120:在物流运输阶段,在电子标签中写入物流信息,获取第二加密密钥,通过第二加密密钥对物流信息进行加密;Step S120: In the logistics transportation phase, the logistics information is written in the electronic tag, the second encryption key is obtained, and the logistics information is encrypted by the second encryption key;
在本步骤中,物流信息主要包括货品的接货时间、接货地址、验货情况、转运时间和接货商代码等;In this step, the logistics information mainly includes the receiving time, the receiving address, the inspection status, the transit time and the receiver code of the goods;
步骤S130:在收货阶段,获取解密密钥,通过解密密钥读取电子标签中的目标信息,并根据目标信息对货品进行溯源验证;其中,解密密钥分别与第一加密密钥、第二加密密钥相匹配,目标信息包括货品信息或物流信息;若电子标签被破坏,判定货品溯源失败。Step S130: In the receiving phase, acquiring a decryption key, reading the target information in the electronic tag through the decryption key, and performing source verification on the product according to the target information; wherein the decryption key and the first encryption key respectively The second encryption key is matched, and the target information includes the goods information or the logistics information; if the electronic tag is destroyed, it is determined that the goods traceability fails.
在本步骤中,解密密钥与第一加密密钥、第二加密密钥相匹配,通过解密密钥可以对电子标签中已加密的货品信息或物流信息进行解密读取;若电子标签被破坏,其中的信息也就无法进行读取,货品的包装已在中途打开,可以判定货品溯源失败。In this step, the decryption key is matched with the first encryption key and the second encryption key, and the decrypted key can decrypt the encrypted item information or the logistics information in the electronic tag; if the electronic tag is destroyed The information in it can not be read, the packaging of the goods has been opened in the middle, and it can be determined that the traceability of the goods has failed.
在本实施例中,在发货阶段,在电子标签中写入货品信息,并利用第一加密密钥对货品信息进行加密;在物流运输阶段,在电子标签中写入物流信息,并利用第二加密密钥对物流信息进行加密;由于货品信息和物流信息有加密密钥进行加密,相当于设置了读写权限,电子标签中的信息一般难以伪造,保证信息的准确性;在收货阶段,利用与加密密钥相匹配的解密密钥对电子标签中的信息进行读取,得到目标信息对货品进行溯源验证,通过匹配的密钥对货品信息和物流信息进行加密和解密,可以避免信息伪造,保证货品的真实性和货品在运输过程中的真实完整状态;另外,当包裹中途打开时,防拆装置会破坏电子标签,利用防拆装置来保证电子标签的完整性,可以防止包装中的货品被置换。In this embodiment, in the delivery phase, the goods information is written in the electronic tag, and the goods information is encrypted by using the first encryption key; in the logistics transportation stage, the logistics information is written in the electronic tag, and the The second encryption key encrypts the logistics information; since the goods information and the logistics information are encrypted by the encryption key, it is equivalent to setting the read and write authority, and the information in the electronic tag is generally difficult to forge, ensuring the accuracy of the information; The information in the electronic tag is read by using the decryption key matched with the encryption key, the target information is obtained to verify the source of the goods, and the goods information and the logistics information are encrypted and decrypted by the matched key, thereby avoiding the information. Forgery, to ensure the authenticity of the goods and the true and complete state of the goods during transportation; in addition, when the package is opened midway, the tamper device will destroy the electronic tag, and the tamper device is used to ensure the integrity of the electronic tag, which can prevent the package from being damaged. The goods were replaced.
进一步的,加密密钥和解密密钥可以由技术服务商预先提供。根据AES(Advanced Encryption Standard,高级加密技术)生成若干密钥对,每一密钥对包括一公钥B和一私钥A,以及附属于A的密钥N,将私钥A分配至发货人,作为第一加密密钥;将密钥N分配至承运人,作为第二加密密钥;将私钥B分配至收货人,作为解密密钥;Further, the encryption key and the decryption key may be provided in advance by a service provider. According to AES (Advanced Encryption Standard), a plurality of key pairs are generated. Each key pair includes a public key B and a private key A, and a key N attached to A, and the private key A is assigned to the delivery. a person, as the first encryption key; assigning the key N to the carrier as the second encryption key; assigning the private key B to the consignee as the decryption key;
若承运人有多个,可以生成附属于A的多个连续密钥N、N+1......N+X,将多个连续密钥N、N+1......N+X分别分配至各承运人,用于加密各自的物流信息。If there are multiple carriers, you can generate multiple consecutive keys N, N+1...N+X attached to A, and multiple consecutive keys N, N+1... N+X is assigned to each carrier to encrypt their respective logistics information.
进一步的,电子标签可以是RFID(Radio Frequency Identification,射频识别)电子标签,RFID电子标签内设置有若干Block(块区域)分别用于写入货品信息或物流信息;已被写入RFID电子标签的货品信息和物流信息只有结合对应的密钥才能读取。Further, the electronic tag may be an RFID (Radio Frequency Identification) electronic tag, and the RFID electronic tag is provided with a plurality of blocks (block areas) for writing product information or logistics information respectively; and has been written into the RFID electronic tag. Product information and logistics information can only be read by combining the corresponding key.
RFID电子标签包括模拟前端和AES模块;AES模块包括控制器、RAM模块和数据路径;数据路径内构建一子模块,子模块只执行四分之一的MixColumns(列混合变换)操作,如图3和图4所示。The RFID electronic tag includes an analog front end and an AES module; the AES module includes a controller, a RAM module, and a data path; a sub-module is built in the data path, and the sub-module performs only one-quarter of the MixColumns operation, as shown in FIG. And Figure 4 shows.
对RFID电子标签的认证过程涉及认证服务器、认证读取器和认证标签(即RFID电子标签)。参考图5-a,认证服务器的加密单元包括XOR执行单元201。XOR执行单元201对于要加密的确认数据203和输出密钥205的0至15位执行XOR操作,通过用于生成加密确认数据207的位单元。加密确认数据207与输入键(InputKey_RN)一起被发送到认证读取器,并且发送到认证读取器的确认数据207和输入键(InputKey_RN)被生成为一个消息并传送给认证标签。The authentication process for RFID electronic tags involves an authentication server, an authentication reader, and an authentication tag (ie, an RFID tag). Referring to FIG. 5-a, the encryption unit of the authentication server includes an XOR execution unit 201. The XOR execution unit 201 performs an XOR operation on the 0 to 15 bits of the acknowledgment data 203 and the output key 205 to be encrypted, through the bit unit for generating the cryptographic confirmation data 207. The encryption confirmation data 207 is transmitted to the authentication reader together with the input key (InputKey_RN), and the confirmation data 207 and the input key (InputKey_RN) transmitted to the authentication reader are generated as one message and transmitted to the authentication tag.
如图5-b所示,认证标签(即RFID电子标签)的解密单元包括XOR执行单元211。XOR执行单元211相对于输出密钥215的位0至15和包含在Sec_Auth命令消息中的加密确认数据213执行XOR操作,单元217用于产生解密确认数据。在这种情况下,输出密钥215由认证标签的密钥处理器使用包括在Sec_Auth命令消息中的输入密钥(InputKey_RN)和包括在认证存储器中的AES密钥。As shown in FIG. 5-b, the decryption unit of the authentication tag (ie, the RFID electronic tag) includes an XOR execution unit 211. The XOR execution unit 211 performs an XOR operation with respect to bits 0 to 15 of the output key 215 and the encryption confirmation data 213 included in the Sec_Auth command message, and the unit 217 is configured to generate decryption confirmation data. In this case, the output key 215 is used by the key processor of the authentication tag to use the input key (InputKey_RN) included in the Sec_Auth command message and the AES key included in the authentication memory.
此外,如图5-c所示,认证标签的加密单元包括XOR执行单元221。XOR执行单元221对要加密的确认数据223和输出键225的位16到31执行XOR,以位单位执行XOR操作生成加密确认数据227。在这种情况下,要加密的确认数据223可以是从认证标签的解密单元解密的确认数据217。因此,XOR执行单元221重新加密解密的确认数据217以生成加密确认数据227。Further, as shown in FIG. 5-c, the encryption unit of the authentication tag includes an XOR execution unit 221. The XOR execution unit 221 performs XOR on the acknowledgment data 223 to be encrypted and the bits 16 to 31 of the output key 225, and performs an XOR operation in bit units to generate cryptographic confirmation data 227. In this case, the confirmation data 223 to be encrypted may be the confirmation data 217 decrypted from the decryption unit of the authentication tag. Therefore, the XOR execution unit 221 re-encrypts the decrypted confirmation data 217 to generate the encrypted confirmation data 227.
加密确认数据227由Sec_auth响应消息构成,并被发送给认证读取器。此外,发送到认证读取器的确认数据227被发送到认证服务器。The encryption confirmation data 227 is composed of a Sec_auth response message and is sent to the authentication reader. Further, the confirmation data 227 sent to the authentication reader is transmitted to the authentication server.
此外,如图5-d所示,认证服务器的解密单元包括XOR执行单元231。XOR执行单元231对于加密确认数据233和输出密钥235的位16至31执行XOR操作,以比特为单位来生成解密的确认数据237。Further, as shown in FIG. 5-d, the decryption unit of the authentication server includes an XOR execution unit 231. The XOR execution unit 231 performs an XOR operation on the bits 16 to 31 of the encryption confirmation data 233 and the output key 235, and generates decrypted confirmation data 237 in units of bits.
随后,认证服务器将认证服务器中生成的确认数据203与从认证读取器接收的解密确认数据237进行比较,从而验证认证标签的真实性。Subsequently, the authentication server compares the confirmation data 203 generated in the authentication server with the decryption confirmation data 237 received from the authentication reader, thereby verifying the authenticity of the authentication tag.
图6是具有认证功能的RFID认证系统的配置的框图。RFID认证系统包括认证服务器301,认证读取器321和认证标签331;认证服务器301包括键数据库302,键处理器303,确认数据生成器304,加密单元305,标签认证单元306和解密单元307。6 is a block diagram of a configuration of an RFID authentication system having an authentication function. The RFID authentication system includes an authentication server 301, an authentication reader 321 and an authentication tag 331; the authentication server 301 includes a key database 302, a key processor 303, an authentication data generator 304, an encryption unit 305, a tag authentication unit 306, and a decryption unit 307.
当从认证读取器321接收认证信息时,键处理器303使用认证信息来确定AES密钥。这里,认证信息包括电子产品代码(EPC)和SecParam。也就是说,键处理器303确定与键数据库302中的SecParam的AES密钥索引相对应的AES密钥。When receiving the authentication information from the authentication reader 321, the key processor 303 uses the authentication information to determine the AES key. Here, the authentication information includes an electronic product code (EPC) and SecParam. That is, the key processor 303 determines the AES key corresponding to the AES key index of the SecParam in the key database 302.
随后,键处理器303通过使用AES密钥和在认证服务器301中随机生成的输入密钥 (InputKey_RN)生成输出密钥。在这种情况下,输入键(InputKey_RN)可以是公钥。Subsequently, the key processor 303 generates an output key by using an AES key and an input key (InputKey_RN) randomly generated in the authentication server 301. In this case, the input key (InputKey_RN) can be a public key.
确认数据生成器304生成预定长度的确认数据,并且通过使用加密单元305对确认数据进行加密。随后,确认数据生成器304向认证读取器321发送输入密钥和加密确认数据。这里,加密单元305针对确认数据和用于加密确认数据的输出密钥执行异或(XOR)。The confirmation data generator 304 generates confirmation data of a predetermined length, and encrypts the confirmation data by using the encryption unit 305. Subsequently, the confirmation data generator 304 transmits the input key and the encryption confirmation data to the authentication reader 321. Here, the encryption unit 305 performs exclusive OR (XOR) for the confirmation data and the output key for encrypting the confirmation data.
当从认证读取器321接收到加密的确认响应数据时,标签认证单元306通过使用解密单元307对加密的确认响应数据进行解密,并比较确认数据和解密的确认响应数据,以验证认证标签331的真实性,也就是说,当确认数据和解密的确认响应数据相同时,通过认证读取器321认证认证标签331,因此,标签认证单元305验证认证标签331是真实的,表示认证标签331是由合法生产者生产。相反,当确认数据和解密的确认响应数据不相同时,通过认证读取器321不认证认证标签331,因此标签认证单元305验证认证标签331不可信,表示认证标签331未被产生由合法生产者。随后,标签认证单元305可以向认证读取器321发送认证结果。这里,解密单元307可以对加密的确认响应数据和用于解密加密的确认响应数据的输出密钥执行XOR。Upon receiving the encrypted acknowledgment response data from the authentication reader 321, the tag authentication unit 306 decrypts the encrypted acknowledgment response data by using the decryption unit 307, and compares the acknowledgment data with the decrypted acknowledgment response data to verify the authentication tag 331. The authenticity, that is, when the confirmation data and the decrypted confirmation response data are the same, the authentication tag 331 is authenticated by the authentication reader 321 , and therefore, the tag authentication unit 305 verifies that the authentication tag 331 is authentic, indicating that the authentication tag 331 is Produced by legal producers. On the contrary, when the confirmation data and the decrypted confirmation response data are different, the authentication reader 321 does not authenticate the authentication tag 331, so the tag authentication unit 305 verifies that the authentication tag 331 is not authentic, indicating that the authentication tag 331 is not generated by the legal producer. . Subsequently, the tag authentication unit 305 can transmit the authentication result to the authentication reader 321. Here, the decryption unit 307 can perform XOR on the encrypted acknowledgment response data and the output key for decrypting the encrypted acknowledgment response data.
因此,加密单元305通过使用输出键对输入数据执行XOR,以与解密单元307相对于使用输出的输入数据执行XOR来解密输入数据相同的方式对输入数据进行加密密钥,因此,加密单元305和解密单元307可以具有相同的结构。Therefore, the encryption unit 305 performs XOR on the input data by using the output key, and performs an encryption key on the input data in the same manner as the decryption unit 307 performs XOR with respect to the input data using the output to decrypt the input data, and thus, the encryption unit 305 and The decryption unit 307 can have the same structure.
认证读取器321还可以包括认证信息传输单元323和确认信息传输单元325。The authentication reader 321 may further include an authentication information transmission unit 323 and an acknowledgment information transmission unit 325.
认证信息传输单元323在从认证标签331接收到认证信息时,发送认证信息的一部分。这里,认证信息包括协议控制(PC),扩展协议控制(XPC),EPC,和一个SecParam。The authentication information transmission unit 323 transmits a part of the authentication information when receiving the authentication information from the authentication tag 331. Here, the authentication information includes Protocol Control (PC), Extended Protocol Control (XPC), EPC, and a SecParam.
在这种情况下,认证信息传输单元323可以通过认证标签331接收在XPC的ST位被识别为T之后发送的PC,XPC,EPC和SecParam。In this case, the authentication information transmission unit 323 can receive the PC, XPC, EPC, and SecParam transmitted after the ST bit of the XPC is identified as T through the authentication tag 331.
此外,认证信息传输单元323首先在认证信息中接收PC,XPC和EPC,并且认证信息发送单元323确定在认证信息发送单元323的ST位XPC被识别为“1”。随后,认证信息传输单元323可以通过使用Get_SecParam命令和响应消息从认证标签331接收SecParam。Further, the authentication information transmission unit 323 first receives the PC, XPC and EPC in the authentication information, and the authentication information transmitting unit 323 determines that the ST bit XPC of the authentication information transmitting unit 323 is identified as "1". Subsequently, the authentication information transmission unit 323 can receive the SecParam from the authentication tag 331 by using the Get_SecParam command and the response message.
进一步的,在收货阶段,收货人在收到包裹后,首先确认包裹是否存在物理损坏,若有物理损坏则可以直接拒收,即货品溯源失败,否则通过被分配的公钥读取RFID电子标签内的货品信息或物流信息,确认无误后进行签收。Further, in the receiving phase, after receiving the parcel, the consignee first confirms whether the parcel has physical damage, and if there is physical damage, it can directly reject the product, that is, the traceability of the product fails, otherwise the RFID is read through the assigned public key. The goods information or logistics information in the electronic label will be signed after confirmation.
在一个实施例中,防拆装置包括机械防拆装置,机械防拆装置设置在包装货品的包裹的开口处,电子标签位于机械防拆装置中,在包裹开口打开时,机械防拆装置破坏电子标签。In one embodiment, the tamper device includes a mechanical tamper device, the mechanical tamper device is disposed at the opening of the package of the packaged goods, and the electronic tag is located in the mechanical tamper device, and the mechanical tamper device destroys the electronic device when the package opening is opened label.
在本实施例中,包装货品的包裹的开口处设置有机械防拆装置,电子标签设置在其中,在包裹被打开的同时,机械防拆装置破坏电子标签,此时电子标签被破坏,无法正常其中的信息,代表货品包裹在发货或物流运输阶段被未知人员开启,存在损坏或置换货品的风险,在收货时,可以判定货品溯源验证失败;利用防拆装置可以避免货品在收货之前被他人打开,减小货品置换的可能。In this embodiment, a mechanical tampering device is disposed at the opening of the package of the packaged goods, and the electronic tag is disposed therein. When the package is opened, the mechanical tamper device destroys the electronic tag, and the electronic tag is destroyed and cannot be normal. The information indicates that the goods are opened by unknown persons during the delivery or logistics transportation stage, and there is a risk of damage or replacement of the goods. When receiving the goods, it can be judged that the goods have failed to verify the source. The tampering device can prevent the goods from being received before receiving the goods. Opened by others to reduce the possibility of goods replacement.
具体的,在实际应用中,当收货人在收货时,可以利用上述的读取装置读取电子标签中的信息, 若能正常读取信息,表明货品在封装之后未被开启;否则,表明货品已被打开过,可以拒收货品,对发货人或承运人进行追责;另外,机械防拆装置所在的位置是在包装货品的包裹的正常开口处,正常情况下货品是从该开口处进入或离开包裹,若是包裹在其他位置有开口,表明包裹被暴力开启,可以拒收货品。Specifically, in practical applications, when the consignee receives the goods, the above reading device can be used to read the information in the electronic tag. If the information can be read normally, it indicates that the product is not opened after being packaged; otherwise, Indicates that the goods have been opened, the goods can be rejected, and the consignor or carrier is liable; in addition, the mechanical tampering device is located at the normal opening of the package of the packaged goods. Under normal circumstances, the goods are from Enter or leave the parcel at the opening. If the parcel has an opening at other locations, indicating that the parcel is violently opened, the goods can be rejected.
在一个实施例中,机械防拆装置包括内盖、外盖和固定塞;In one embodiment, the mechanical tamper device includes an inner cover, an outer cover, and a fixed plug;
内盖的上端面设置有环形切割槽和电子标签,电子标签的芯片位于环形切割槽的内侧,电子标签的天线跨过环形切割槽延伸至内盖的周部,内盖的下端面设置有固定齿,内盖的下部与固定塞设置有相互配合的导向机构,以使固定塞相对于内盖沿第一方向转动;外盖设置在内盖的外部,外盖的下端面固定有切割器,切割器位于环形切割槽内,内盖和外盖中至少一个与固定塞经螺纹连接。The upper end surface of the inner cover is provided with an annular cutting groove and an electronic tag. The chip of the electronic tag is located inside the annular cutting groove, and the antenna of the electronic tag extends across the annular cutting groove to the periphery of the inner cover, and the lower end surface of the inner cover is fixed. a tooth, a lower portion of the inner cover and the fixing plug are provided with a matching guiding mechanism for rotating the fixing plug relative to the inner cover in a first direction; the outer cover is disposed outside the inner cover, and the lower end surface of the outer cover is fixed with a cutter, The cutter is located in the annular cutting groove, and at least one of the inner cover and the outer cover is threadedly coupled to the fixing plug.
在本实施例中,机械防拆装置包括内盖、外盖和固定塞,内盖的上端面设置有环形切割槽和电子标签,外盖设置在内盖外部,外盖的下端面固定有切割器,内盖或外盖与固定塞经螺纹连接,在转动时可以对内盖周部的电子标签的天线进行切割,实现对机械防拆装置进行操作时破坏电子标签。In this embodiment, the mechanical tampering device comprises an inner cover, an outer cover and a fixing plug, the upper end surface of the inner cover is provided with an annular cutting groove and an electronic tag, the outer cover is disposed outside the inner cover, and the lower end surface of the outer cover is fixedly cut The inner cover or the outer cover is screwed to the fixed plug, and the antenna of the electronic tag at the periphery of the inner cover can be cut when rotating, thereby destroying the electronic tag when the mechanical tampering device is operated.
在一个实施例中,内盖和外盖间设置有第一限位机构和第二限位机构,第一限位机构阻止内盖相对于外盖沿第一方向转动,第二限位机构部分阻止内盖相对于外盖沿第二方向转动,在沿第二方向施加在内盖或外盖上的力大于预设值时,内盖相对于外盖沿第二方向转动。In one embodiment, a first limiting mechanism and a second limiting mechanism are disposed between the inner cover and the outer cover, the first limiting mechanism prevents the inner cover from rotating relative to the outer cover in the first direction, and the second limiting mechanism portion The inner cover is prevented from rotating in the second direction relative to the outer cover, and when the force applied to the inner cover or the outer cover in the second direction is greater than a preset value, the inner cover is rotated in the second direction relative to the outer cover.
在本实施例中,内盖和外盖间设置有第一限位机构和第二限位机构,限制内盖的转动范围,使其只能相对于外盖沿第二方向转动,并需要施加适当的力才能转动,防止机械防拆装置被震动开启。In this embodiment, a first limiting mechanism and a second limiting mechanism are disposed between the inner cover and the outer cover to limit the rotation range of the inner cover so that it can only rotate in the second direction relative to the outer cover, and needs to be applied. Appropriate force can be rotated to prevent the mechanical tamper from being opened by vibration.
具体的,机械防拆装置的结构请参照图7和图8,包括内盖2、外盖1和固定塞3;Specifically, the structure of the mechanical tampering device, please refer to FIG. 7 and FIG. 8, including the inner cover 2, the outer cover 1 and the fixed plug 3;
内盖2的上端面设置有设置有环形切割槽25和RFID电子标签4,RFID电子标签的芯片41位于环形切割槽25的内侧,RFID电子标签的天线42跨过环形切割槽25延伸至内盖2的周部,内盖2的下端面设置有用于固定包装封口34的固定齿5,内盖2的下部与固定塞设置有相互配合的导向机构,只允许固定塞3相对于内盖2沿第一方向(顺时针或逆时针,于本实施例为顺时针方向)转动,如图9所示,导向机构包括反向设置的内盖旋转导向齿21和固定塞旋转导向齿31;该实施例中,固定塞旋转导向齿31可沿逆时针方向转动,但其顺时针转动时,内盖旋转导向齿21和固定塞旋转导向齿31会相互卡住。The upper end surface of the inner cover 2 is provided with an annular cutting groove 25 and an RFID electronic tag 4, the chip 41 of the RFID electronic tag is located inside the annular cutting groove 25, and the antenna 42 of the RFID electronic tag extends across the annular cutting groove 25 to the inner cover The lower end surface of the inner cover 2 is provided with fixing teeth 5 for fixing the package seal 34. The lower portion of the inner cover 2 and the fixing plug are provided with a matching guiding mechanism, and only the fixing plug 3 is allowed to be along the inner cover 2 The first direction (clockwise or counterclockwise, in the clockwise direction in this embodiment) is rotated. As shown in FIG. 9, the guiding mechanism includes a reversely disposed inner cover rotation guide tooth 21 and a fixed plug rotation guide tooth 31; In the example, the fixed plug rotation guide teeth 31 are rotatable in the counterclockwise direction, but when they are rotated clockwise, the inner cover rotation guide teeth 21 and the fixed plug rotation guide teeth 31 are caught by each other.
外盖1设置在内盖的外部,外盖1的下端面固定有切割器11,切割器11位于环形切割槽25内,当外盖1转动时,切割器11在环形切割槽25内做圆周运动,对RFID电子标签的天线进行切割,从而达到破坏RFID电子标签使其不能正常工作的目的。内盖2和外盖1间设置有第一限位机构和第二限位机构,第一限位机构完全阻止内盖2相对于外盖1沿第一方向转动,第二限位机构部分阻止内盖2相对于外盖1沿第二方向(顺时针或逆时针,在本实施例中可以为逆时针方向)转动,只有沿第二方向施加在内盖或外盖上的力大于一阈值时,内盖2相对于外盖1沿第二方向转动。The outer cover 1 is disposed outside the inner cover, the lower end surface of the outer cover 1 is fixed with a cutter 11, and the cutter 11 is located in the annular cutting groove 25. When the outer cover 1 is rotated, the cutter 11 makes a circumference in the annular cutting groove 25. Movement, cutting the antenna of the RFID electronic tag to achieve the purpose of destroying the RFID electronic tag and making it unable to work normally. A first limiting mechanism and a second limiting mechanism are disposed between the inner cover 2 and the outer cover 1. The first limiting mechanism completely prevents the inner cover 2 from rotating relative to the outer cover 1 in the first direction, and the second limiting mechanism partially blocks The inner cover 2 is rotated relative to the outer cover 1 in a second direction (clockwise or counterclockwise, in this embodiment may be counterclockwise), and only the force applied to the inner or outer cover in the second direction is greater than a threshold At this time, the inner cover 2 is rotated in the second direction with respect to the outer cover 1.
第一限位机构包括内盖2外周侧的第一凸块23及外盖1内周侧紧贴第一凸块23设置的第二凸块14,第二凸块14位于第一凸块23的逆时针方向上;于另一实施例中,外盖1上还设置有第四凸块 15,第四土块位于第一凸块23的顺时针方向上,其作用与第二限位机构类似,实现部分限定。The first limiting member includes a first protrusion 23 on the outer peripheral side of the inner cover 2 and a second protrusion 14 disposed on the inner peripheral side of the outer cover 1 against the first protrusion 23, and the second protrusion 14 is located on the first protrusion 23 In a further embodiment, the outer cover 1 is further provided with a fourth protrusion 15 which is located in the clockwise direction of the first protrusion 23 and functions as a second limiting mechanism. Similarly, the implementation is partially defined.
第二限位机构包括若干设置在内盖2外周侧的凹槽24及设置在外盖1内周侧上卡入凹槽24的第三凸块13,凹槽24的个数为6个,均匀设置在内盖2的周部,外盖1带有一定的弹性,沿顺时针或逆时针方向转动外盖,当力度达到一定值时,第三凸块13脱离凹槽24,实现外盖1和内盖2的相对转动。另外,第三凸块13的竖直方向上与RFID电子标签的天线42相交,当第三凸块13转至天线42的位置,第三凸块13对天线进行挤压,实现二次破坏。The second limiting mechanism includes a plurality of recesses 24 disposed on the outer peripheral side of the inner cover 2 and third projections 13 disposed on the inner peripheral side of the outer cover 1 to engage the recesses 24. The number of the recesses 24 is six, evenly The outer cover 1 is provided with a certain elasticity to rotate the outer cover in a clockwise or counterclockwise direction. When the force reaches a certain value, the third protrusion 13 is disengaged from the groove 24 to realize the outer cover 1 The relative rotation with the inner cover 2. In addition, the third bump 13 intersects the antenna 42 of the RFID electronic tag in the vertical direction. When the third bump 13 is turned to the position of the antenna 42, the third bump 13 presses the antenna to achieve secondary damage.
内盖2和外盖1中至少一个与固定塞经螺纹连接。固定塞3与内盖2经螺纹22和螺纹33连接,固定塞3与外盖1经螺纹12和螺纹32连接。At least one of the inner cover 2 and the outer cover 1 is threadedly coupled to the fixed plug. The fixing plug 3 and the inner cover 2 are connected by a thread 22 and a thread 33, and the fixing plug 3 is connected to the outer cover 1 via a thread 12 and a thread 32.
以下对机械防拆装置的使用方法进行介绍,包括封装过程和解封过程,The following describes the use of mechanical tamper-evident devices, including the packaging process and the unsealing process.
封装过程:Packaging process:
步骤A1:将内盖和外盖组合在一起,利用外盖的弹性,将内盖按入外盖中,经第二限位机构进行限定,防止其脱落;Step A1: Combining the inner cover and the outer cover, and pressing the inner cover into the outer cover by using the elasticity of the outer cover, and limiting by the second limiting mechanism to prevent the outer cover from falling off;
步骤A2:将包装封口对准固定齿放置在内盖中,包装封口包括包装袋的袋口或者包装箱封口延伸出的舌部;Step A2: aligning the package seal with the fixed teeth in the inner cover, the package seal includes a bag mouth of the package bag or a tongue portion extending from the package cover;
步骤A3:将固定塞沿第一方向旋入内盖和外盖中直至底部,实现包装封口的封装;Step A3: screwing the fixing plug into the inner cover and the outer cover in the first direction to the bottom to realize packaging of the package sealing;
解封过程:Unblocking process:
步骤B1:沿第二方向转动外盖,由于导向机构的作用,固定塞与内盖相对固定;Step B1: rotating the outer cover in the second direction, the fixed plug and the inner cover are relatively fixed due to the action of the guiding mechanism;
步骤B2:逐步加大力度,当达到阈值时,外盖沿内盖转动,同时切割器在环形切割槽内运动;Step B2: gradually increase the strength, when the threshold is reached, the outer cover rotates along the inner cover, and the cutter moves in the annular cutting groove;
步骤B3:当切割器碰到RFID电子标签的天线后,切断天线。Step B3: When the cutter touches the antenna of the RFID electronic tag, the antenna is cut off.
在一个实施例中,第二加密密钥为多个,物流运输阶段分为多个子阶段,多个第二加密密钥分别与多个子阶段一一对应;In one embodiment, the second encryption key is multiple, and the logistics transportation phase is divided into multiple sub-phases, and the plurality of second encryption keys respectively correspond to the plurality of sub-phases one by one;
在每个子阶段中,在电子标签中写入相应的物流信息,获取对应的第二加密密钥,通过对应的第二加密密钥对相应的物流信息进行加密。In each sub-phase, the corresponding logistics information is written in the electronic tag, the corresponding second encryption key is obtained, and the corresponding logistics information is encrypted by the corresponding second encryption key.
在本实施例中,物流运输阶段可以由多个承运人分别承担物流运输,每个承运人在承运货品时就是处于运输的子阶段,在每个子阶段中,都可以将相应的物流信息写入电子标签,并通过相应的第二加密密钥进行加密,使各个承运人的物流运输信息可以相互独立,便于后续运输责任的划分和界定。In this embodiment, the logistics transportation phase can be carried out by multiple carriers respectively, and each carrier is in the sub-phase of transportation when the goods are carried. In each sub-phase, the corresponding logistics information can be written. The electronic label is encrypted by the corresponding second encryption key, so that the logistics and transportation information of each carrier can be independent of each other, which facilitates the division and definition of subsequent transportation responsibility.
在一个实施例中,货品溯源防伪方法还包括以下步骤:In one embodiment, the method for tracking source anti-counterfeiting further includes the following steps:
在发货阶段,从区块链服务器中获取第一加密密钥,并将货品包装信息上传至区块链服务器;In the delivery phase, the first encryption key is obtained from the blockchain server, and the package information is uploaded to the blockchain server;
在物流运输阶段,从区块链服务器中获取第二加密密钥;Obtaining a second encryption key from the blockchain server during the logistics transportation phase;
在收货阶段,从区块链服务器中获取解密密钥和货品包装信息,其中,货品包装信息用于与货品包装实物进行对比,对比结果用于对货品进行溯源验证。In the receiving phase, the decryption key and the package information of the goods are obtained from the blockchain server, wherein the package information of the goods is used for comparison with the physical package of the goods, and the comparison result is used for source verification of the goods.
在本实施例中,结合区块链服务器进行数据存储和调用。区块链通过非对称加密的数字签名保证业务请求在传输过程中不能被篡改,通过公示机制保证各节点的数据一致的存储。对于已经存储的数 据记录通过节点的节点的自校验功能和多节点准实时的数据校验功能来保证已经存储的数据记录不能被修改,第一加密密钥、第二加密密钥和解密密钥可以由发货方指定,并预先保存在区块链服务器中,确保密钥无法被修改,加强信息的保密性和完整性;在发货阶段,还可以上传货品包装信息,用于收货方在收货时比对包装信息,进一步验证货品。In this embodiment, data storage and invocation are performed in conjunction with the blockchain server. The blockchain ensures that the service request cannot be tampered with during the transmission process through the asymmetrically encrypted digital signature. The publicity mechanism ensures that the data of each node is consistently stored. For the already stored data record, the self-checking function of the node of the node and the multi-node quasi-real-time data check function ensure that the stored data record cannot be modified, the first encryption key, the second encryption key and the decryption key. The key can be specified by the shipper and stored in the blockchain server in advance to ensure that the key cannot be modified, and the confidentiality and integrity of the information can be enhanced. In the delivery phase, the package information can also be uploaded for receipt. The party compares the packaging information at the time of receipt to further verify the goods.
需要说明的是,区块链具有节点的自校验功能:区块链采用块链结构存储数据记录,其中部分记录的修改会破坏块链结构的完整性,可以快速校验出来并从其他节点将数据恢复。另外区块链每个记账节点都有自己的私钥,每个区块头中包含了本节点私钥的签名,区块内数据的修改都可以通过签名校验出来;It should be noted that the blockchain has the self-checking function of the node: the blockchain uses the blockchain structure to store the data record, and the modification of the partial record destroys the integrity of the blockchain structure, and can be quickly verified and from other nodes. Restore the data. In addition, each billing node of the blockchain has its own private key, and each block header contains the signature of the private key of the node, and the modification of the data in the block can be verified by the signature;
区块链还具有多节点准实时的数据校验功能:当节点的私钥被盗取,恶意用户是存在修改账本链上所有数据的可能性的,区块链提供了多节点间准实时的数据对比机制,可以及时发现某个节点账本数据被篡改的情况。The blockchain also has a multi-node quasi-real-time data check function: when the private key of the node is stolen, the malicious user has the possibility of modifying all the data on the ledger chain, and the blockchain provides quasi-real-time between multiple nodes. The data comparison mechanism can timely find out that a certain node's account book data has been tampered with.
区块链中用户信息和区块链地址是隔离的。从各节点的记录存储中,无法获取到相关联的用户信息。用户信息存储有权限控制,访问认证,加密存储等多层保护。对交易保密程度较高的用户还可以选择交易不相关性机制,同一个用户的每次交易都映射到区块链上不同的地址上,从而保证了在交易账本上无法获取一个用户的多笔交易的关联性。User information and blockchain addresses in the blockchain are isolated. From the record storage of each node, the associated user information cannot be obtained. User information storage has multiple layers of protection such as access control, access authentication, and encrypted storage. Users with higher transaction confidentiality can also choose the transaction irrelevance mechanism. Each transaction of the same user is mapped to different addresses on the blockchain, thus ensuring that multiple users of a user cannot be obtained on the transaction book. The relevance of the transaction.
在区块链的密钥管理解决方案中,提供了密钥保险箱和用户账户委托的功能来保证密钥的安全。密钥保险箱使用用户信息对密钥加密并分割存储在多个不同的节点上,正常业务流程下不会访问密钥保险箱,当用户密钥丢失后,可以通过对用户信息认证之后将密钥找回。账户委托是通过委托账户来操作被委托账户来实现账户找回的功能,区块链所有委托账户操作会独立记录在区块链上,并且对委托账户的操作有严格的频度限制和独立的风控策略,可以严格控制委托账户的操作风险。In the key management solution of the blockchain, a key safe and a user account delegation function are provided to ensure the security of the key. The key safe uses the user information to encrypt and divide the key and store it on multiple different nodes. The key safe is not accessed under the normal business process. After the user key is lost, the key can be found after the user information is authenticated. return. The account entrustment is to realize the account retrieving function by entrusting the account to operate the entrusted account. All the entrusted account operations in the blockchain are independently recorded on the blockchain, and the operation of the entrusted account has strict frequency restriction and independent. The risk control strategy can strictly control the operational risk of the entrusted account.
在一个实施例中,货品包装信息包括货品包装的视频切片,其中,视频切片是在货品装箱、货品封装、电子标签写入数据或数据检查时拍摄的。In one embodiment, the package information includes a video slice of the package of the item, wherein the video slice is taken during shipment of the item, package of the item, data writing of the electronic tag, or data inspection.
在本实施例中,货品包装信息包括货品在包装时的视频切片,该视频切片可以真实反映货品的包装过程,可以用于辅助验证货品。In this embodiment, the package information includes a video slice of the product at the time of packaging, and the video slice can truly reflect the packaging process of the product, and can be used to assist in verifying the product.
具体的,货品包装在包装台流水线上进行,在包装台上设置影像系统,对包装过程进行记录与回溯,以及比对功能。Specifically, the goods are packaged on the packaging line, and an image system is set on the packaging table to record and trace back the packaging process, as well as the comparison function.
包装台上安装有摄像机,在实际操作中,在完成关键动作时(装箱完毕、包装封装、数据写入、数据检查等动作),触发高清摄像机取景动作,影像记录后生成视频切片,存储于区块链服务器中。A camera is mounted on the packaging table. In actual operation, when the key action is completed (packing completion, packaging and packaging, data writing, data checking, etc.), the HD camera framing action is triggered, and the video slice is generated after the image recording, and stored in the image. In the blockchain server.
进一步的,视频切片还可以标明取景地点、环境、时间、数据防伪水印,以便进行辅助验证;在收货阶段,通过区块链服务器获取视频切片,对货品进行辅助验证。Further, the video slice may also indicate the location, environment, time, and data security watermark for auxiliary verification; in the receiving phase, the video slice is obtained through the blockchain server to perform auxiliary verification on the product.
在一个实施例中,货品溯源防伪方法还包括以下步骤:In one embodiment, the method for tracking source anti-counterfeiting further includes the following steps:
在物流运输阶段,将物流信息上传至区块链服务器;其中,物流信息包括电子标签中是否被破坏。In the logistics transportation phase, the logistics information is uploaded to the blockchain server; wherein the logistics information includes whether the electronic tag is destroyed.
在本实施例中,在物流阶段,承运人可以读取电子标签的信息,判断电子标签是否被破坏,并将其作为物流信息的一部分,将物流信息上传至区块链服务器,可以记录物流信息并防止被篡改,在收货阶段货品验证时,可以根据物流信息对货品验证失败进行追溯,便于认定相关的责任人。In this embodiment, in the logistics stage, the carrier can read the information of the electronic tag, determine whether the electronic tag is destroyed, and use it as part of the logistics information, upload the logistics information to the blockchain server, and record the logistics information. And to prevent being tampered with, in the goods receipt verification stage, you can trace the failure of the goods verification according to the logistics information, so as to identify the relevant responsible person.
根据上述货品溯源防伪方法,本发明实施例还提供一种货品溯源防伪装置,以下就货品溯源防伪装置的实施例进行详细说明。According to the above-mentioned product traceability anti-counterfeiting method, the embodiment of the present invention further provides a cargo traceability anti-counterfeiting device, and the following describes an embodiment of the cargo traceability anti-counterfeiting device.
参见图10所示,为一个实施例的货品溯源防伪装置的结构示意图。该实施例中的货品溯源防伪装置包括上述的电子标签200。Referring to FIG. 10, it is a schematic structural view of a cargo traceability anti-counterfeiting device of one embodiment. The cargo traceability anti-counterfeiting device in this embodiment includes the above-described electronic tag 200.
在本实施例中,电子标签200设置在用于包装货品的包裹上或包裹中;在发货阶段,在电子标签200中写入货品信息,并利用第一加密密钥对货品信息进行加密;在物流运输阶段,在电子标签200中写入物流信息,并利用第二加密密钥对物流信息进行加密;由于货品信息和物流信息有加密密钥进行加密,相当于设置了读写权限,电子标签200中的信息一般难以伪造,保证信息的准确性;在收货阶段,利用与加密密钥相匹配的解密密钥对电子标签200中的信息进行读取,得到目标信息对货品进行溯源验证,通过匹配的密钥对货品信息和物流信息进行加密和解密,可以避免信息伪造,保证货品的真实性和货品在运输过程中的真实完整状态;另外,当包裹中途打开时,防拆装置会破坏电子标签,利用防拆装置来保证电子标签的完整性,可以防止包装中的货品被置换。In this embodiment, the electronic tag 200 is disposed on a package or package for packaging goods; in the delivery phase, the goods information is written in the electronic tag 200, and the goods information is encrypted by using the first encryption key; In the logistics transportation phase, the logistics information is written in the electronic tag 200, and the logistics information is encrypted by using the second encryption key; since the goods information and the logistics information are encrypted by the encryption key, the read/write permission is set, and the electronic The information in the tag 200 is generally difficult to forge, ensuring the accuracy of the information; in the receiving phase, the information in the electronic tag 200 is read using the decryption key matching the encryption key, and the target information is verified to trace the source. By encrypting and decrypting the goods information and the logistics information through the matching key, information forgery can be avoided, the authenticity of the goods and the true and complete state of the goods in the transportation process can be ensured; in addition, when the package is opened midway, the tampering device will Destroy electronic tags, use tamper-proof devices to ensure the integrity of electronic tags, and prevent the replacement of goods in the package
在一个实施例中,如图11所示,货品溯源防伪装置还包括写入设备300和读取设备400;In one embodiment, as shown in FIG. 11, the cargo traceability anti-counterfeiting device further includes a writing device 300 and a reading device 400;
在发货阶段,写入设备300在电子标签200中写入货品信息,获取第一加密密钥,通过第一加密密钥对货品信息进行加密;In the delivery phase, the writing device 300 writes the goods information in the electronic tag 200, acquires the first encryption key, and encrypts the goods information by using the first encryption key;
在物流运输阶段,写入设备300在电子标签200中写入物流信息,获取第二加密密钥,通过第二加密密钥对物流信息进行加密;In the logistics transportation phase, the writing device 300 writes the logistics information in the electronic tag 200, acquires the second encryption key, and encrypts the logistics information by using the second encryption key;
在收货阶段,读取设备400获取解密密钥,通过解密密钥读取电子标签200中的目标信息,并根据目标信息对货品进行溯源验证;其中,解密密钥分别与第一加密密钥、第二加密密钥相匹配,目标信息包括货品信息或物流信息。In the receiving phase, the reading device 400 acquires the decryption key, reads the target information in the electronic tag 200 through the decryption key, and performs source verification on the product according to the target information; wherein the decryption key and the first encryption key respectively The second encryption key is matched, and the target information includes goods information or logistics information.
具体的,写入设备300和读取设备400在执行操作时,可以配合服务器进行处理,具体过程如上所述。Specifically, the writing device 300 and the reading device 400 can perform processing in cooperation with the server when performing operations, and the specific process is as described above.
在一个实施例中,如图12所示,货品溯源防伪装置还包括防拆装置500,防拆装置500在包裹被打开时,破坏电子标签200。In one embodiment, as shown in FIG. 12, the cargo traceability anti-counterfeiting device further includes a tamper-evident device 500 that tampers the electronic tag 200 when the package is opened.
在一个实施例中,如图13所示,防拆装置500包括机械防拆装置510,机械防拆装置510设置在包装货品的包裹的开口处,电子标签200位于机械防拆装置510中,在包裹开口打开时,机械防拆装置510破坏电子标签200。In one embodiment, as shown in FIG. 13, the tamper device 500 includes a mechanical tamper device 510 disposed at the opening of the package of the packaged goods, and the electronic tag 200 is located in the mechanical tamper device 510. The mechanical tamper device 510 destroys the electronic tag 200 when the package opening is opened.
在一个实施例中,机械防拆装置包括内盖、外盖和固定塞;In one embodiment, the mechanical tamper device includes an inner cover, an outer cover, and a fixed plug;
内盖的上端面设置有环形切割槽和电子标签,电子标签的芯片位于环形切割槽的内侧,电子标签的天线跨过环形切割槽延伸至内盖的周部,内盖的下端面设置有固定齿,内盖的下部与固定塞设置有 相互配合的导向机构,以使固定塞相对于内盖沿第一方向转动;外盖设置在内盖的外部,外盖的下端面固定有切割器,切割器位于环形切割槽内,内盖和外盖中至少一个与固定塞经螺纹连接。The upper end surface of the inner cover is provided with an annular cutting groove and an electronic tag. The chip of the electronic tag is located inside the annular cutting groove, and the antenna of the electronic tag extends across the annular cutting groove to the periphery of the inner cover, and the lower end surface of the inner cover is fixed. a tooth, a lower portion of the inner cover and the fixing plug are provided with a matching guiding mechanism for rotating the fixing plug relative to the inner cover in a first direction; the outer cover is disposed outside the inner cover, and the lower end surface of the outer cover is fixed with a cutter, The cutter is located in the annular cutting groove, and at least one of the inner cover and the outer cover is threadedly coupled to the fixing plug.
在一个实施例中,内盖和外盖间设置有第一限位机构和第二限位机构,第一限位机构阻止内盖相对于外盖沿第一方向转动,第二限位机构部分阻止内盖相对于外盖沿第二方向转动,在沿第二方向施加在内盖或外盖上的力大于预设值时,内盖相对于外盖沿第二方向转动。In one embodiment, a first limiting mechanism and a second limiting mechanism are disposed between the inner cover and the outer cover, the first limiting mechanism prevents the inner cover from rotating relative to the outer cover in the first direction, and the second limiting mechanism portion The inner cover is prevented from rotating in the second direction relative to the outer cover, and when the force applied to the inner cover or the outer cover in the second direction is greater than a preset value, the inner cover is rotated in the second direction relative to the outer cover.
本发明实施例的货品溯源防伪装置与上述货品溯源防伪方法相对应,在上述货品溯源防伪方法的实施例阐述的技术特征及其有益效果均适用于货品溯源防伪装置的实施例中。The cargo traceability anti-counterfeiting device of the embodiment of the present invention corresponds to the above-mentioned product traceability anti-counterfeiting method, and the technical features and the beneficial effects thereof described in the embodiment of the above-described cargo traceability anti-counterfeiting method are applicable to the embodiment of the cargo traceability anti-counterfeiting device.
在一个实施例中,货品溯源防伪方法可以应用于物流运输的场景中。In one embodiment, the item traceability anti-counterfeiting method can be applied to a scene of logistics transportation.
封装好的货品登记进入区块链技术制作的账本服务器,而后发货指令发出时,由区块链向指定承运人链路发出发货声明,由各承运人在各自区块链账本逐次确认收货和继续发运同时作为技术单元的包裹货品。同时,AES连续密钥通过区块链服务器认证并向链路逐次传递,例如第一承运人通过区块链认证身份后,通过区块链服务器传递持有顺序密钥N,并使用密钥进行一次写操作,操作后区块链服务器将认可承运责任的转移,并将这段密钥封存废止,向下一个链路发出下一承运人应该持有的连续密钥N+1。The packaged goods are registered into the account book server produced by the blockchain technology. When the delivery order is issued, the blockchain issues a delivery statement to the designated carrier link, and each carrier confirms the receipt in the respective blockchain account. Goods and parcels that continue to be shipped as a technical unit. At the same time, the AES continuous key is authenticated by the blockchain server and passed to the link one by one. For example, after the first carrier authenticates the identity through the blockchain, the blockchain server transmits the holding sequence key N and uses the key. After a write operation, the blockchain server will recognize the transfer of the carrier responsibility and will abolish the key seal and issue the consecutive key N+1 that the next carrier should hold on the next link.
在运输路径中每换一个承运人,此承运人用他持有的阶段密钥N+X对RFID芯片进行写操作,写入承运人的接货人信息(如识别号、GPS信息、接货操作人、车牌号、时间等)到指定Block,并将操作写入自己的区块链服务器账本,认可自身责任的发生,形成区块链记账合约机制,账本向上下游数据同步。Each time a carrier is changed in the transport path, the carrier writes the RFID chip with the phase key N+X held by him, and writes the carrier's receiver information (such as identification number, GPS information, receiving goods). Operator, license plate number, time, etc.) to the specified block, and write the operation to its own blockchain server account, recognize the occurrence of its own responsibility, form a blockchain accounting contract mechanism, and synchronize the upstream and downstream data of the ledger.
包裹货品送达最终收货人时,收货人已经从发货人的区块链服务器收到了发货声明和收货人密钥B,收货人可以用所持有的读卡器配合注册时绑定身份的终端读取RFID芯片上所进行加密的数据,并进行解读,将发货人全部信息、各承运人信息全部在终端上读取出来。在确认信息无误,客户收货操作后,这个实际上的临时密钥B和密钥A以及承运人连续密钥N、N+1......N+X同时失效,在系统中被标志为失效并在限定期限内不可以被再次使用,在失效追溯期后这些密钥将会被注销。When the parcel is delivered to the final consignee, the consignee has received the delivery statement and the consignee key B from the consignor's blockchain server, and the consignee can register with the card reader held by the consignee. The terminal with the identity binding reads the encrypted data on the RFID chip and interprets it, and reads all the information of the consignor and the carrier information on the terminal. After the confirmation information is correct, the actual temporary key B and the key A and the carrier continuous key N, N+1...N+X are simultaneously invalidated after the customer receives the goods, and are The mark is invalid and cannot be reused for a limited period of time, and these keys will be cancelled after the expiration date.
此前必然的,无论是各阶段承运人和最终收货人都要检查包装完好无损,来以最传统的规则来判断是否收包裹货品,如果包装完好,则进一步读取没有被破坏的芯片,如果包装被破坏则不必读取芯片即可追究包裹货品运输与保管责任。Previously, it is inevitable that both the carrier and the final consignee should check the packaging intact to judge whether the packaged goods are received by the most traditional rules. If the packaging is intact, further read the chips that have not been destroyed. If the packaging is damaged, you can investigate the transportation and storage responsibility of the packaged goods without having to read the chip.
芯片在运输过程中受到外包装和自身保护装置的保护,如果芯片被损坏则意味着包装被破坏或者芯片保护装置被暴力破坏,或者包装被中间打开过,任何一种状态的发生,都意味着承运人违反了承运人的责任或要承担包裹货品损坏的赔偿责任,而我们的系统将承运责任限定为当前承运人。下一承运人拒绝收货将包裹货品在区块链中标记为当前承运人责任,并向上下游链路公布,此时发货人将得知异常状况,包裹货品将被异常处理和明确责任承担人,最终收货人将不会受到破损或被拆开过的包裹货品。The chip is protected by the outer packaging and its own protection device during transportation. If the chip is damaged, it means that the packaging is damaged or the chip protection device is violently destroyed, or the package is opened in the middle. Any state occurs, which means The carrier violates the carrier’s liability or is liable for damage to the parcel, and our system limits the carrier’s liability to the current carrier. The next carrier refuses to accept the goods and marks the parcel goods as current carrier liability in the blockchain and announces them to the upstream and downstream links. At this time, the consignor will know the abnormal situation, the parcel goods will be handled abnormally and the responsibility will be clearly defined. The bearer, the final consignee will not be damaged or unpacked parcels.
这样的规则保证了包裹货品同时作为一个区块链记账的处于AES加密保护和RFID技术保护装置防护下的技术单元的端到端完整性,使包裹货品不可能被中间被换掉,避免了中间假货的产生,精 准定位了包裹货品的最终责任人。Such a rule guarantees the end-to-end integrity of the technical unit under the protection of the AES encryption protection and the RFID protection device as a blockchain accounting, so that the packaged goods cannot be replaced in the middle, avoiding The generation of intermediate fakes accurately locates the ultimate responsible person of the packaged goods.
从逻辑上而言,每个包裹通过技术封装,都成为了不可仿冒,数据无法更改,带有指向性的IoT离线移动技术单元,这个技术单元通过区块链记账机制的责任转移,让包裹保全责任随技术单元在路径中的登记而传递变化,形成了区块链合约。Logically, each package has become a non-counterfeit, data-unchangeable, and directional IoT offline mobile technology unit. This technology unit transfers the responsibility through the blockchain accounting mechanism. The responsibility for the preservation changes as the technical unit registers in the path, forming a blockchain contract.
在具体应用时,如图14所示,在过程1中,如果有电商订单对应,则发货人按照电商订单(CO)生成配货清单(BOM),完成BOM捡货装箱。如果没有电商订单,可按照生产商生产BOM信息,出厂包装货品BOM内容等进行包装。数据格式由技术服务商与发货人约定,必须包含发货人有效的身份识别信息,包装流水线生产信息,BOM,地理信息等,其中发货人可以自定义随机的信息如问候语、随机赠品等,这些信息与被封装包裹的影像抓拍信息一起登记在技术服务商所部署的区块链账本服务器上而后不能更改。这些信息也同步给了第三方虚拟承运人的区块链服务器,登记后双方都不能再更改,同时数据同步给了客户终端,也不能更改(区块链中同步是加密转译的不可读信息,同时也不可改,除了发货人和收货人其余人不可读)。In the specific application, as shown in FIG. 14, in the process 1, if there is an e-commerce order corresponding, the consignor generates a distribution list (BOM) according to the e-commerce order (CO), and completes the BOM unloading and packing. If there is no e-commerce order, it can be packaged according to the manufacturer's BOM information, the factory packaged goods BOM content, etc. The data format is agreed by the technical service provider and the shipper. It must contain the valid identification information of the shipper, packaging production line information, BOM, geographic information, etc., in which the shipper can customize random information such as greetings and random gifts. Etc., this information is registered with the image capture information of the packaged package on the blockchain ledger server deployed by the service provider and cannot be changed. This information is also synchronized to the third-party virtual carrier's blockchain server. After registration, both parties can't change it. At the same time, the data is synchronized to the client terminal, and it cannot be changed. (The synchronization in the blockchain is the unreadable information of the encrypted translation. At the same time, it cannot be changed, except that the consignor and the consignee are not readable.
在过程2中,根据BOM生产包装产生的数据,作为上一步骤生成的数据包结合影像抓拍数据,结合成复合数据包,在区块链服务器注册存储。In the process 2, according to the data generated by the BOM production package, the data packet generated as the previous step is combined with the image capture data, combined into a composite data packet, and registered and stored in the blockchain server.
在过程3中,通过BOM装箱完成信号作为触发,生成密钥A,结合上一过程产生的数据包,将数据包关键部分转译为加密压缩编码,用密钥A封装写入系统规定的原始发运人持有的RFID芯片中RAM Block指定块。In the process 3, the BOM packing completion signal is used as a trigger to generate the key A, and the data packet generated by the previous process is translated into the encrypted compression code, and the key A is encapsulated and written into the original system. The RAM block specified block in the RFID chip held by the shipper.
设计一个比较结实物流包装箱,比如PE/PP塑料或者木箱,将一个带有RFID芯片和电池,并带有防拆装置安装在包装闭合处,做一个类似报警电路中常闭电路的搭扣锁闭装置。一旦箱子开启,除非暴力破坏箱体造成不可恢复的损失,否则搭扣锁闭装置打开时将彻底破坏了RFID的RAM部分,会导致芯片和线路板一起损毁。无论是箱体,芯片的损坏,都是软件或物理可见的,异常情况可以被及时处理,责任阶段可以锁定的,这就充分保护了作为技术封装包裹的完整性与过程可信。Design a relatively solid logistics package, such as PE/PP plastic or wooden box, with an RFID chip and battery, with a tamper-proof device installed in the package closure, to make a buckle lock similar to the normally closed circuit in the alarm circuit Closed device. Once the box is opened, unless the violent destruction of the box causes irreparable damage, the buckle locking device will completely destroy the RAM portion of the RFID, which will cause the chip and the circuit board to be destroyed together. Whether it is the cabinet or the damage of the chip, it is software or physically visible. The abnormal situation can be handled in time, and the responsibility phase can be locked. This fully protects the integrity and process reliability of the package as a technology package.
如图15所示,通过与电商系统的对接,发货时获得了订单号指向的最终用户的信息终端,并进行技术绑定,也获得了收件人的地址或网络通讯方式等信息。As shown in FIG. 15, through the docking with the e-commerce system, the information terminal of the end user pointed to by the order number is obtained at the time of delivery, and the technology is bound, and the address of the recipient or the network communication mode is also obtained.
启动发货流程的是此刻被技术封装好包裹的持有人,也许是制造商或者贸易商,此时他们:The start of the delivery process is the holder of the package that is packaged by technology at the moment, perhaps a manufacturer or trader, at which point they:
(1)持有已经绑定了电商用户订单的包裹;(1) Holding a package that has been bound with an e-commerce user order;
(2)持有了一个已经被技术封装的包裹,这个包裹符合订单号指向的最终用户需求。(2) Holds a package that has been packaged by technology, and this package meets the end-user requirements pointed to by the order number.
此时如果是情况(1),则收货人的终端已经被技术绑定,则系统通过区块链服务器向收货人终端发出一次性解密用Key B,Key B只能用于解密被配对密钥A指向的具体某一个装有客户订单物品的技术封装单元。At this time, if it is the case (1), the consignee's terminal has been bound by technology, then the system sends a one-time decryption Key B to the consignee terminal through the blockchain server, and the Key B can only be used for decryption to be paired. The key A points to a specific technology encapsulation unit that contains the customer's order items.
如果是情况(2),则首先执行终端绑定激活程序,而后再执行上一段描述的过程,使得这个具体的被技术封装的包裹得以与合法收件人绑定终端形成端到端封闭闭环的联系。If it is case (2), the terminal binding activation procedure is executed first, and then the process described in the previous paragraph is executed, so that the specific package encapsulated by the technology can form an end-to-end closed loop with the legal recipient binding terminal. contact.
在系统发送Key B,绑定收件人终端的同时,发货人服务器发出附属于Key A的连续密钥N 发至第一个承运人,由区块链服务器发出发货声明。When the system sends Key B and binds the recipient terminal, the shipper server sends a continuous key N attached to Key A to the first carrier, and the blockchain server issues a delivery statement.
第1承运人读取作为技术封装单元包裹的RFID芯片中的计数数值,如果技术和物理验证一切正常,第1承运人持有Key N,向RFID芯片的由Key N指向的系统规定Block写入自己的收货信息,在写入成功验证后由部署给第1承运人的区块链服务器(可以是绑定第1承运人身份的SAAS服务器)向发货人区块链服务器发出收货确认通知,也就是图15中的流程1。The first carrier reads the count value in the RFID chip wrapped as a technical package unit. If the technical and physical verification is normal, the first carrier holds the Key N and writes the block to the system of the RFID chip pointed by Key N. The own receipt information, after the successful verification of the write, is sent to the consignor blockchain server by the blockchain server deployed to the first carrier (which can be the SAAS server bound to the first carrier) The notification is also the flow 1 in Figure 15.
第1承运人转发包裹时,发出发货声明给发货人(图15中的流程2),触发流程3(见图15),由发货人服务器将下一段Key N+1发给第2承运人,第2承运人重复第1承运人的操作,成功后进行流程4(见图15),将收货确认发给第1承运人,而第1承运人和第2承运人服务器的当前包裹保全责任状态变化触发流程5,双方都向发货人服务器登记状态变化。When the first carrier forwards the package, it issues a delivery statement to the shipper (flow 2 in Figure 15), triggering process 3 (see Figure 15), and the next time Key N+1 is sent to the second by the shipper server. The carrier, the second carrier repeats the operation of the first carrier, and after successful, proceeds to process 4 (see Figure 15), and sends the receipt confirmation to the first carrier, while the current carrier of the first carrier and the second carrier The package retention responsibility status change triggers the process 5, and both parties register the status change with the shipper server.
这一机制将向后执行,直到第X个承运人作为最后承运人承担送达收货人的责任,此间的保全责任状态变化与过程数据都向全物流链路上的各承运人,发货人服务器进行登记与数据同步,直到最后一个承运人向收货人派送,向发货人服务器发出派送声明。过程中Key N-N+X被规定使用次数和有效期,在有效期到期前可以提前预警,使用次数用尽后将在紧跟着的数据同步中被标记异常。This mechanism will be implemented backwards until the Xth carrier as the last carrier bears the responsibility of serving the consignee, where the change in the status of the responsibility and the process data are shipped to the various carriers on the entire logistics link. The human server registers and synchronizes the data until the last carrier delivers to the consignee and issues a delivery statement to the consignor server. During the process, Key N-N+X is specified for the number of uses and the validity period. It can be pre-warned before the expiration of the validity period. When the usage count is exhausted, it will be marked abnormally in the following data synchronization.
如图16所示,每个承运人收到包裹后,假设当前承运人为Y,Y首先确认包裹是否存在物理损坏,若有物理损坏则直接拒收,否则读取RFID芯片中的标志位判断技术封装完好与否,以及判断有无非法开启,如果全部正常则登记收货,否则发出异常声明启动异常处理。As shown in Figure 16, after each carrier receives the package, it is assumed that the current carrier is Y, Y first confirms whether the package has physical damage, and if there is physical damage, it directly rejects it; otherwise, it reads the flag judgment technology in the RFID chip. Whether the package is intact or not, and whether it is illegally opened. If all is normal, the receipt is registered. Otherwise, an exception statement is issued to start the exception handling.
异常处理将通知上一承运人Y-1服务器并将异常状态发送,通知Y-1本包裹被拒收,同时也通知发货人服务器。The exception handling will notify the previous carrier Y-1 server and send an abnormal status, notifying Y-1 that the package was rejected and notifying the shipper server.
而后保全责任被限定在承运人Y-1,发货人向Y-1发出协议索赔和通告本技术封装单元失效。进一步的在判断技术单元确实受到物理或技术损坏后(例如芯片损坏这种及其微小的概率事件发生),发货人废止本技术封装单元的密钥B,并解除Key B和收货人注册终端的绑定。The subsequent warranty is limited to the carrier Y-1, and the consignor issues an agreement with Y-1 for the claim and the notification that the technology package unit has failed. Further, after judging that the technical unit is indeed damaged by physical or technical means (such as chip damage and its minor probability event), the shipper revokes the key B of the technology packaging unit and releases the Key B and the consignee registration. Binding of the terminal.
进一步的处理可以是客户退货或发货人重新发货。Further processing can be a customer return or the shipper re-delivery.
如图17所示,最后一个承运人X,承担送达收货人的职责,在具体派送员接货,开始派送时最后判断货物完好,用手持终端读卡正常,发出派送声明,声明通过承运人X的服务器发给发货人服务器。此时发货人服务器将绑定技术单元一起登记的数据影像发给合法收货人绑定终端,此时终端数据才完整,预先发出的数据不包含影像描述,如批次的包装颜色。As shown in Figure 17, the last carrier X assumes the responsibility of serving the consignee. When the specific dispatcher picks up the goods, the final judgment is that the goods are in good condition, the card is normal with the handheld terminal, and a delivery statement is issued, stating that the goods are delivered. The server of person X is sent to the shipper server. At this time, the shipper server sends the data image registered with the binding technical unit to the legal consignee binding terminal. At this time, the terminal data is complete, and the pre-issued data does not include the image description, such as the package color of the batch.
在此之前,发货人服务器将登记过的封装在区块链中的被封装的技术单元信息已经和Key B发给了合法收货人绑定终端。Prior to this, the shipper server has registered the encapsulated technical unit information encapsulated in the blockchain and has been sent to the legal consignee binding terminal with Key B.
收货人收货时,确认收货操作为:When the consignee receives the goods, confirm that the goods receipt operation is:
(1)收货人启动APP或电脑程序(都通过绑定终端),通过NFC或专用读卡器,使用持有的Key B读取技术封装单元包裹上的RFID数据,并与已经收到的数据比对;(1) The consignee activates the APP or computer program (both through the binding terminal), and uses the NFC or dedicated card reader to read the RFID data on the package of the technology package unit using the held Key B, and with the received data. Data comparison
(2)进一步的,还可以进行影像图像数据的查看进行视觉比对。(2) Further, it is also possible to perform visual comparison by viewing the image image data.
(3)在APP或客户端上操作,确认收货。(3) Operate on the APP or client to confirm the receipt.
当收货人收货后,KeyA、B、N-N+X全部被废止,芯片被锁定禁用,此时芯片也已经被破坏。When the consignee receives the goods, KeyA, B, N-N+X are all abolished, the chip is locked and disabled, and the chip has been destroyed.
通过包装工作台配套的摄像机和包装工作台软件,给包装拍照,如可通过摄像头抓取到货物品的影像,在收货时进行验证。这将极大地推高复制难度和成本,让复制工作不具备经济性,也不具备批量复制的能力。中间的物流承运人,也可以通过合法接口调取货品封装的原始图像,应用在责任界定、货品查找方面。Photograph the package by the camera and packaging workbench software that is packaged on the workbench. If the image of the goods can be captured by the camera, it will be verified at the time of receipt. This will greatly increase the difficulty and cost of copying, making the copying work uneconomical and not capable of bulk copying. The intermediate logistics carrier can also retrieve the original image of the package through the legal interface, which is applied in the definition of responsibility and the search of goods.
包装台软件系统在摄像机取景时,加上可以标明取景地点、环境、时间、身份的水印,留取图像的“指纹”证据,做为除了RFID加密之外的另一项辅助验证包装的手段之一。The packaging platform software system adds a watermark that can indicate the location, environment, time, and identity of the camera when capturing the scene, and retains the “fingerprint” evidence of the image as another means of auxiliary verification packaging in addition to RFID encryption. One.
以上所述实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。The technical features of the above-described embodiments may be arbitrarily combined. For the sake of brevity of description, all possible combinations of the technical features in the above embodiments are not described. However, as long as there is no contradiction between the combinations of these technical features, All should be considered as the scope of this manual.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成。所述的程序可以存储于可读取存储介质中。该程序在执行时,包括上述方法所述的步骤。所述的存储介质,包括:ROM/RAM、磁碟、光盘等。One of ordinary skill in the art will appreciate that all or part of the steps in implementing the above-described embodiments may be accomplished by a program instructing the associated hardware. The program can be stored in a readable storage medium. The program, when executed, includes the steps described in the above methods. The storage medium includes: a ROM/RAM, a magnetic disk, an optical disk, and the like.
上述实施例方法中的部分数据加密、数据保护步骤是可以通过AES、RSA、区块链来实现,也可以未来通过其余的国际公认可靠加密算法与其余可靠经过论证的类区块链(如双曲函数)技术来防护。The partial data encryption and data protection steps in the method of the foregoing embodiment may be implemented by AES, RSA, and blockchain, and may also pass other remaining internationally recognized reliable encryption algorithms and other reliable and proven class blockchains (such as doubles). Music function) technology to protect.
以上所述实施例仅表达了本发明的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干变形和改进,这些都属于本发明的保护范围。因此,本发明专利的保护范围应以所附权利要求为准。The above-described embodiments are merely illustrative of several embodiments of the present invention, and the description thereof is more specific and detailed, but is not to be construed as limiting the scope of the invention. It should be noted that a number of variations and modifications may be made by those skilled in the art without departing from the spirit and scope of the invention. Therefore, the scope of the invention should be determined by the appended claims.

Claims (14)

  1. 一种货品溯源防伪方法,其特征在于,包括以下步骤:A method for tracking source anti-counterfeiting, characterized in that the method comprises the following steps:
    在发货阶段,在电子标签中写入货品信息,获取第一加密密钥,通过所述第一加密密钥对所述货品信息进行加密;其中,所述电子标签设置在用于包装货品的包裹上或包裹中,同时还设置有防拆装置,所述防拆装置在包裹被打开时,破坏所述电子标签;In the delivery phase, the goods information is written in the electronic tag, the first encryption key is obtained, and the goods information is encrypted by the first encryption key; wherein the electronic tag is set in the package for the goods. Having a tamper-proof device on the package or in the package, the tamper-proof device destroying the electronic tag when the package is opened;
    在物流运输阶段,在电子标签中写入物流信息,获取第二加密密钥,通过所述第二加密密钥对所述物流信息进行加密;In the logistics transportation phase, the logistics information is written in the electronic tag, the second encryption key is obtained, and the logistics information is encrypted by the second encryption key;
    在收货阶段,获取解密密钥,通过解密密钥读取电子标签中的目标信息,并根据所述目标信息对货品进行溯源验证;其中,所述解密密钥分别与所述第一加密密钥、所述第二加密密钥相匹配,所述目标信息包括所述货品信息或所述物流信息;In the receiving phase, acquiring a decryption key, reading the target information in the electronic tag through the decryption key, and performing source verification on the product according to the target information; wherein the decryption key is respectively associated with the first encryption key Key, the second encryption key is matched, and the target information includes the goods information or the logistics information;
    若所述电子标签被破坏,判定所述货品溯源失败。If the electronic tag is destroyed, it is determined that the product traceability has failed.
  2. 根据权利要求1所述的货品溯源防伪方法,其特征在于,所述防拆装置包括机械防拆装置,所述机械防拆装置设置在包装货品的包裹的开口处,所述电子标签位于所述机械防拆装置中,在所述包裹开口打开时,所述机械防拆装置破坏所述电子标签。The method according to claim 1, wherein the tampering device comprises a mechanical tampering device, the mechanical tampering device is disposed at an opening of a package of the packaged goods, and the electronic tag is located at the In the mechanical tampering device, the mechanical tamper device breaks the electronic tag when the package opening is opened.
  3. 根据权利要求2所述的货品溯源防伪方法,其特征在于,所述机械防拆装置包括内盖、外盖和固定塞;The anti-counterfeiting method for goods according to claim 2, wherein the mechanical tampering device comprises an inner cover, an outer cover and a fixed plug;
    所述内盖的上端面设置有环形切割槽和所述电子标签,所述电子标签的芯片位于所述环形切割槽的内侧,所述电子标签的天线跨过所述环形切割槽延伸至内盖的周部,所述内盖的下端面设置有固定齿,所述内盖的下部与所述固定塞设置有相互配合的导向机构,以使所述固定塞相对于所述内盖沿第一方向转动;所述外盖设置在所述内盖的外部,所述外盖的下端面固定有切割器,所述切割器位于所述环形切割槽内,所述内盖和外盖中至少一个与所述固定塞经螺纹连接。The upper end surface of the inner cover is provided with an annular cutting groove and the electronic tag, the chip of the electronic tag is located inside the annular cutting groove, and the antenna of the electronic tag extends across the annular cutting groove to the inner cover a lower end surface of the inner cover is provided with fixing teeth, and a lower portion of the inner cover and the fixing plug are provided with a matching guiding mechanism, so that the fixing plug is first with respect to the inner cover Rotating direction; the outer cover is disposed outside the inner cover, the lower end surface of the outer cover is fixed with a cutter, the cutter is located in the annular cutting groove, and at least one of the inner cover and the outer cover The fixed plug is threadedly connected.
  4. 根据权利要求3所述的货品溯源防伪方法,其特征在于,所述内盖和所述外盖间设置有第一限位机构和第二限位机构,所述第一限位机构阻止所述内盖相对于所述外盖沿所述第一方向转动,所述第二限位机构部分阻止所述内盖相对于所述外盖沿第二方向转动,在沿第二方向施加在所述内盖或所述外盖上的力大于预设值时,所述内盖相对于所述外盖沿所述第二方向转动。The anti-counterfeiting method for goods according to claim 3, wherein a first limiting mechanism and a second limiting mechanism are disposed between the inner cover and the outer cover, and the first limiting mechanism blocks the The inner cover rotates in the first direction relative to the outer cover, the second limiting mechanism portion prevents the inner cover from rotating in a second direction relative to the outer cover, and is applied in the second direction When the force on the inner cover or the outer cover is greater than a preset value, the inner cover rotates in the second direction relative to the outer cover.
  5. 根据权利要求1所述的货品溯源防伪方法,其特征在于,所述第二加密密钥为多个,物流运输阶段分为多个子阶段,多个第二加密密钥分别与多个子阶段一一对应;The method according to claim 1, wherein the second encryption key is plural, and the logistics transportation phase is divided into a plurality of sub-stages, and the plurality of second encryption keys are respectively separated from the plurality of sub-stages. correspond;
    在每个子阶段中,在所述电子标签中写入相应的物流信息,获取对应的第二加密密钥,通过对应的第二加密密钥对相应的物流信息进行加密。In each sub-phase, the corresponding logistics information is written in the electronic tag, the corresponding second encryption key is obtained, and the corresponding logistics information is encrypted by the corresponding second encryption key.
  6. 根据权利要求1至5中任意一项所述的货品溯源防伪方法,其特征在于,还包括以下步骤:The method for tracking source anti-counterfeiting according to any one of claims 1 to 5, further comprising the steps of:
    在发货阶段,从区块链服务器中获取所述第一加密密钥,并将货品包装信息上传至所述区块链服务器;In the delivery phase, the first encryption key is obtained from the blockchain server, and the package information is uploaded to the blockchain server;
    在物流运输阶段,从所述区块链服务器中获取所述第二加密密钥;Obtaining the second encryption key from the blockchain server in a logistics transportation phase;
    在收货阶段,从所述区块链服务器中获取所述解密密钥和所述货品包装信息,其中,所述货品包装信息用于与货品包装实物进行对比,对比结果用于对货品进行溯源验证。In the receiving phase, the decryption key and the package information are obtained from the blockchain server, wherein the package information is used for comparison with the physical package, and the comparison result is used to trace the product. verification.
  7. 根据权利要求6所述的货品溯源防伪方法,其特征在于,所述货品包装信息包括货品包装的视频切片,其中,所述视频切片是在货品装箱、货品封装、电子标签写入数据或数据检查时拍摄的。The anti-counterfeiting method for goods according to claim 6, wherein the package information comprises a video slice of a package of goods, wherein the video slice is data, data, or data in a package, a package, or an electronic tag. Photographed during inspection.
  8. 根据权利要求6所述的货品溯源防伪方法,其特征在于,还包括以下步骤:The method according to claim 6, further comprising the steps of:
    在物流运输阶段,将所述物流信息上传至所述区块链服务器;其中,所述物流信息包括所述电子标签中是否被破坏。In the logistics transportation phase, the logistics information is uploaded to the blockchain server; wherein the logistics information includes whether the electronic tag is damaged.
  9. 一种货品溯源防伪装置,其特征在于,包括权利要求1至8任意一项中的电子标签。A cargo traceability anti-counterfeiting device comprising the electronic tag of any one of claims 1 to 8.
  10. 根据权利要求9所述的货品溯源防伪装置,其特征在于,还包括写入设备和读取设备;The anti-counterfeiting device for goods according to claim 9, further comprising a writing device and a reading device;
    在发货阶段,所述写入设备在电子标签中写入货品信息,获取第一加密密钥,通过所述第一加密密钥对所述货品信息进行加密;In the delivery phase, the writing device writes the product information in the electronic tag, acquires the first encryption key, and encrypts the goods information by using the first encryption key;
    在物流运输阶段,所述写入设备在电子标签中写入物流信息,获取第二加密密钥,通过所述第二加密密钥对所述物流信息进行加密;In the logistics transportation phase, the writing device writes the logistics information in the electronic tag, acquires a second encryption key, and encrypts the logistics information by using the second encryption key;
    在收货阶段,所述读取设备获取解密密钥,通过解密密钥读取电子标签中的目标信息,并根据所述目标信息对货品进行溯源验证;其中,所述解密密钥分别与所述第一加密密钥、所述第二加密密钥相匹配,所述目标信息包括所述货品信息或所述物流信息。In the receiving phase, the reading device acquires a decryption key, reads target information in the electronic tag through the decryption key, and performs source verification on the product according to the target information; wherein the decryption key is respectively The first encryption key and the second encryption key are matched, and the target information includes the goods information or the logistics information.
  11. 根据权利要求9所述的货品溯源防伪装置,其特征在于,还包括防拆装置,所述防拆装置在包裹被打开时,破坏所述电子标签。The cargo traceability anti-counterfeiting device according to claim 9, further comprising a tampering device that destroys the electronic tag when the package is opened.
  12. 根据权利要求9所述的货品溯源防伪装置,其特征在于,所述防拆装置包括机械防拆装置,所述机械防拆装置设置在包装货品的包裹的开口处,所述电子标签位于所述机械防拆装置中,在所述包裹开口打开时,所述机械防拆装置破坏所述电子标签。The item tracking anti-counterfeiting device according to claim 9, wherein the tampering device comprises a mechanical tampering device, the mechanical tampering device is disposed at an opening of the package of the packaged goods, and the electronic tag is located at the In the mechanical tampering device, the mechanical tamper device breaks the electronic tag when the package opening is opened.
  13. 根据权利要求12所述的货品溯源防伪装置,其特征在于,所述机械防拆装置包括内盖、外盖和固定塞;The item tracking anti-counterfeiting device according to claim 12, wherein the mechanical tampering device comprises an inner cover, an outer cover and a fixing plug;
    所述内盖的上端面设置有环形切割槽和所述电子标签,所述电子标签的芯片位于所述环形切割槽的内侧,所述电子标签的天线跨过所述环形切割槽延伸至内盖的周部,所述内盖的下端面设置有固定齿,所述内盖的下部与所述固定塞设置有相互配合的导向机构,以使所述固定塞相对于所述内盖沿第一方向转动;所述外盖设置在所述内盖的外部,所述外盖的下端面固定有切割器,所述切割器位于所述环形切割槽内,所述内盖和外盖中至少一个与所述固定塞经螺纹连接。The upper end surface of the inner cover is provided with an annular cutting groove and the electronic tag, the chip of the electronic tag is located inside the annular cutting groove, and the antenna of the electronic tag extends across the annular cutting groove to the inner cover a lower end surface of the inner cover is provided with fixing teeth, and a lower portion of the inner cover and the fixing plug are provided with a matching guiding mechanism, so that the fixing plug is first with respect to the inner cover Rotating direction; the outer cover is disposed outside the inner cover, the lower end surface of the outer cover is fixed with a cutter, the cutter is located in the annular cutting groove, and at least one of the inner cover and the outer cover The fixed plug is threadedly connected.
  14. 根据权利要求13所述的货品溯源防伪装置,其特征在于,所述内盖和所述外盖间设置有第一限位机构和第二限位机构,所述第一限位机构阻止所述内盖相对于所述外盖沿所述第一方向转动,所述第二限位机构部分阻止所述内盖相对于所述外盖沿第二方向转动,在沿第二方向施加在所述内盖或所述外盖上的力大于预设值时,所述内盖相对于所述外盖沿所述第二方向转动。The cargo traceability anti-counterfeiting device according to claim 13, wherein a first limiting mechanism and a second limiting mechanism are disposed between the inner cover and the outer cover, and the first limiting mechanism blocks the The inner cover rotates in the first direction relative to the outer cover, the second limiting mechanism portion prevents the inner cover from rotating in a second direction relative to the outer cover, and is applied in the second direction When the force on the inner cover or the outer cover is greater than a preset value, the inner cover rotates in the second direction relative to the outer cover.
PCT/CN2018/104822 2017-09-30 2018-09-10 Commodity tracing and anti-counterfeiting method and device WO2019062530A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2020517551A JP7022821B2 (en) 2017-09-30 2018-09-10 Product traceability Anti-counterfeiting methods and equipment
JP2022017439A JP2022081481A (en) 2017-09-30 2022-02-07 Product traceability anti-counterfeiting method and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710937946.4A CN107730276A (en) 2017-09-30 2017-09-30 It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method
CN201710937946.4 2017-09-30

Publications (1)

Publication Number Publication Date
WO2019062530A1 true WO2019062530A1 (en) 2019-04-04

Family

ID=61210118

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/104822 WO2019062530A1 (en) 2017-09-30 2018-09-10 Commodity tracing and anti-counterfeiting method and device

Country Status (3)

Country Link
JP (2) JP7022821B2 (en)
CN (1) CN107730276A (en)
WO (1) WO2019062530A1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110502922A (en) * 2019-08-13 2019-11-26 上海域乎信息技术有限公司 Item circulation link retroactive method, device and electronic equipment based on block chain
CN110876502A (en) * 2019-10-22 2020-03-13 厦门理工学院 Intelligent helmet suitable for express delivery, and express delivery goods checking method and system
CN111080311A (en) * 2019-10-24 2020-04-28 广州运通链达金服科技有限公司 Commodity tracing method and device based on block chain
CN111539671A (en) * 2020-04-26 2020-08-14 上海火卫信息科技有限公司 Device, system and method for realizing illegal unsealing prevention and process tracing functions in article transportation process
CN111639729A (en) * 2020-05-28 2020-09-08 深圳威尔智能系统有限公司 Anti-counterfeiting tracing method based on RFID and block chain
CN111680330A (en) * 2020-04-17 2020-09-18 航天云网科技发展有限责任公司 Traceability system and traceability method based on block chain data exchange
CN111784361A (en) * 2020-04-02 2020-10-16 北京京东尚科信息技术有限公司 Product tracing method, device, system and storage medium
CN113362079A (en) * 2021-05-31 2021-09-07 中国科学技术大学 Traceable transaction method based on block chain, environment and commodity fingerprint
TWI748627B (en) * 2020-09-01 2021-12-01 林庠序 Logistics information management system and related computer program product
CN116957611A (en) * 2023-09-18 2023-10-27 长沙睿展数据科技有限公司 Batch goods inspection traceability equipment and system based on RFID
CN116993373A (en) * 2023-09-27 2023-11-03 青岛君盛食品股份有限公司 Infant food information safety traceability management system
JP7475494B2 (en) 2020-05-19 2024-04-26 京▲東▼科技信息技▲術▼有限公司 Method and apparatus for blockchain-based transaction tracking
US11991284B1 (en) 2020-07-02 2024-05-21 Steven Ali Ghabel Blockchain-based authentication system and method

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107730276A (en) * 2017-09-30 2018-02-23 浙江鑫泊新能源科技有限公司 It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method
CN108537558A (en) * 2018-04-08 2018-09-14 中国联合网络通信集团有限公司 Food quality method for tracing in logistics and system
CN108256875A (en) * 2018-04-09 2018-07-06 王先笨 A kind of safe traceability system based on product supply chain
CN110503499B (en) * 2018-05-17 2022-12-06 上海富脉实业有限公司 Method and system for confirming product information
CN108711063A (en) * 2018-05-27 2018-10-26 黄晓峰 A kind of packaging based on block chain is actively anti-fake and traces upper cable architecture
CN110689292A (en) * 2018-07-06 2020-01-14 北京信用达互联网信息技术有限公司 Supply chain management system and method
CN110533799A (en) * 2018-11-08 2019-12-03 朱胜 A kind of smart lock method for anti-counterfeit based on block chain technology
CN110020946A (en) * 2018-11-28 2019-07-16 阿里巴巴集团控股有限公司 Resource object distribution method and device and electronic equipment based on block chain
CN110598433B (en) * 2019-09-10 2024-03-15 腾讯科技(深圳)有限公司 Block chain-based anti-fake information processing method and device
CN112825205A (en) * 2019-11-19 2021-05-21 阿里健康信息技术有限公司 Vending machine, and packaging method and device for vending machine
CN111461788B (en) * 2020-04-03 2021-09-07 深圳市承和润文化传播股份有限公司 RFID-based path control method
CN112070459A (en) * 2020-08-10 2020-12-11 国网甘肃省电力公司信息通信公司 Power grid data responsibility confirmation and source tracing method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2734655Y (en) * 2004-09-07 2005-10-19 王景琳 Bidirectional opened bottle
CN1728162A (en) * 2005-07-07 2006-02-01 复旦大学 Method for anti false verification based on identification technique in radio frequency, and anti false system
CN201023809Y (en) * 2007-04-25 2008-02-20 上海复旦天臣新技术有限公司 Unscrewing-invalidating false-proof bottle cap with wireless radio frequency identification label
CN106971288A (en) * 2017-05-31 2017-07-21 无锡井通网络科技有限公司 A kind of distributed material flow tracking method based on block chain
CN107038594A (en) * 2017-04-12 2017-08-11 广州品聚网络科技股份有限公司 A kind of commodity counterfeit prevention traceability system based on two-dimensional bar code
CN107730276A (en) * 2017-09-30 2018-02-23 浙江鑫泊新能源科技有限公司 It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006124115A (en) 2004-10-29 2006-05-18 Sun Corp Physical distribution management system
US7592953B2 (en) * 2005-12-30 2009-09-22 Comtech Mobile Datacom Corporation Mobile satellite communications
CN102395986A (en) * 2009-04-14 2012-03-28 原田秀昭 Wireless tag attached article, wireless tag batch reading device, and network article management system
TWM440942U (en) 2012-05-11 2012-11-11 Wander Plastic Co Anti-counterfeiting bottle cap
CN202765511U (en) * 2012-09-13 2013-03-06 上海天臣防伪技术股份有限公司 Wireless radio frequency anti-fake bottle cap
EP3056450B1 (en) 2013-10-08 2018-02-14 Toyo Seikan Group Holdings, Ltd. External member for container lid
CN106934639A (en) * 2017-03-08 2017-07-07 章哲成 A kind of false proof retroactive method of paper diaper based on RFID and Quick Response Code

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2734655Y (en) * 2004-09-07 2005-10-19 王景琳 Bidirectional opened bottle
CN1728162A (en) * 2005-07-07 2006-02-01 复旦大学 Method for anti false verification based on identification technique in radio frequency, and anti false system
CN201023809Y (en) * 2007-04-25 2008-02-20 上海复旦天臣新技术有限公司 Unscrewing-invalidating false-proof bottle cap with wireless radio frequency identification label
CN107038594A (en) * 2017-04-12 2017-08-11 广州品聚网络科技股份有限公司 A kind of commodity counterfeit prevention traceability system based on two-dimensional bar code
CN106971288A (en) * 2017-05-31 2017-07-21 无锡井通网络科技有限公司 A kind of distributed material flow tracking method based on block chain
CN107730276A (en) * 2017-09-30 2018-02-23 浙江鑫泊新能源科技有限公司 It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110502922B (en) * 2019-08-13 2024-01-16 上海域乎信息技术有限公司 Article circulation link tracing method and device based on block chain and electronic equipment
CN110502922A (en) * 2019-08-13 2019-11-26 上海域乎信息技术有限公司 Item circulation link retroactive method, device and electronic equipment based on block chain
CN110876502A (en) * 2019-10-22 2020-03-13 厦门理工学院 Intelligent helmet suitable for express delivery, and express delivery goods checking method and system
CN110876502B (en) * 2019-10-22 2023-04-18 厦门理工学院 Intelligent helmet suitable for express delivery, and express delivery goods checking method and system
CN111080311A (en) * 2019-10-24 2020-04-28 广州运通链达金服科技有限公司 Commodity tracing method and device based on block chain
CN111080311B (en) * 2019-10-24 2024-04-26 广州运通链达金服科技有限公司 Commodity tracing method and device based on blockchain
CN111784361A (en) * 2020-04-02 2020-10-16 北京京东尚科信息技术有限公司 Product tracing method, device, system and storage medium
CN111784361B (en) * 2020-04-02 2024-05-24 北京京东尚科信息技术有限公司 Product tracing method, device, system and storage medium
CN111680330A (en) * 2020-04-17 2020-09-18 航天云网科技发展有限责任公司 Traceability system and traceability method based on block chain data exchange
CN111539671A (en) * 2020-04-26 2020-08-14 上海火卫信息科技有限公司 Device, system and method for realizing illegal unsealing prevention and process tracing functions in article transportation process
JP7475494B2 (en) 2020-05-19 2024-04-26 京▲東▼科技信息技▲術▼有限公司 Method and apparatus for blockchain-based transaction tracking
CN111639729A (en) * 2020-05-28 2020-09-08 深圳威尔智能系统有限公司 Anti-counterfeiting tracing method based on RFID and block chain
CN111639729B (en) * 2020-05-28 2023-10-27 深圳威尔智能系统有限公司 RFID and blockchain-based anti-counterfeiting tracing method
US11991284B1 (en) 2020-07-02 2024-05-21 Steven Ali Ghabel Blockchain-based authentication system and method
TWI748627B (en) * 2020-09-01 2021-12-01 林庠序 Logistics information management system and related computer program product
CN113362079B (en) * 2021-05-31 2023-07-18 中国科学技术大学 Traceable transaction method based on blockchain, environment and commodity fingerprint
CN113362079A (en) * 2021-05-31 2021-09-07 中国科学技术大学 Traceable transaction method based on block chain, environment and commodity fingerprint
CN116957611B (en) * 2023-09-18 2023-12-22 长沙睿展数据科技有限公司 Batch goods inspection traceability equipment and system based on RFID
CN116957611A (en) * 2023-09-18 2023-10-27 长沙睿展数据科技有限公司 Batch goods inspection traceability equipment and system based on RFID
CN116993373B (en) * 2023-09-27 2023-12-22 青岛君盛食品股份有限公司 Infant food information safety traceability management system
CN116993373A (en) * 2023-09-27 2023-11-03 青岛君盛食品股份有限公司 Infant food information safety traceability management system

Also Published As

Publication number Publication date
JP2020536415A (en) 2020-12-10
JP2022081481A (en) 2022-05-31
CN107730276A (en) 2018-02-23
JP7022821B2 (en) 2022-02-18

Similar Documents

Publication Publication Date Title
WO2019062530A1 (en) Commodity tracing and anti-counterfeiting method and device
US20240144161A1 (en) Counterparty physical proximity verification for digital asset transfers
US11900306B2 (en) Verifiable parcel distributed ledger shipping and tracking system
US11429921B2 (en) Tracking shipments with a local and remote blockchain
US9858569B2 (en) Systems and methods in support of authentication of an item
JP5139415B2 (en) Article information acquisition method and apparatus
US9686082B2 (en) Generating and processing an authentication certificate
US9882722B2 (en) Product authentication using end-to-end cryptographic scheme
WO2019062531A1 (en) Commodity tracing, anti-counterfeiting and verifying method and device
US20180019872A1 (en) Open registry for internet of things including sealed materials
US20060174129A1 (en) Authentication method and system for tagged items
US20100033300A1 (en) Apparatus, systems and methods for authentication of objects having multiple components
US10755285B2 (en) Secured mutual confirmation method and system for tracing and verifying product identity, origin and authentication
Shaik Preventing counterfeit products using cryptography, qr code and webservice
CN110503499B (en) Method and system for confirming product information
KR101527582B1 (en) System for verifying product genuineness using double security key and method thereof
WO2018064329A1 (en) Open registry for internet of things including sealed materials
US20240056438A1 (en) Using globally-unique numbers for all secure unique transactions, authentications, verifications, and messaging identities
Saha et al. Protected QR Code-based Anti-counterfeit System for Pharmaceutical Manufacturing
Auliaa et al. Protected QR Code-based Anti-counterfeit System for Pharmaceutical Manufacturing.
CN118070348A (en) Method and system for protecting technical secrets by using intelligent electronic tag
CN117785996A (en) Block chain-based service data processing method, device, equipment and medium
GB2567186A (en) A method and system for authenticating a product
JP2006048353A (en) Authentication system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18861126

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2020517551

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18861126

Country of ref document: EP

Kind code of ref document: A1