WO2020056597A1 - Item identity management method, terminal, micro-processing unit, identification device and system - Google Patents

Item identity management method, terminal, micro-processing unit, identification device and system Download PDF

Info

Publication number
WO2020056597A1
WO2020056597A1 PCT/CN2018/106287 CN2018106287W WO2020056597A1 WO 2020056597 A1 WO2020056597 A1 WO 2020056597A1 CN 2018106287 W CN2018106287 W CN 2018106287W WO 2020056597 A1 WO2020056597 A1 WO 2020056597A1
Authority
WO
WIPO (PCT)
Prior art keywords
item
signature
information
processing unit
terminal
Prior art date
Application number
PCT/CN2018/106287
Other languages
French (fr)
Chinese (zh)
Inventor
王健
谢辉
Original Assignee
王健
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 王健 filed Critical 王健
Priority to PCT/CN2018/106287 priority Critical patent/WO2020056597A1/en
Priority to CN201880097523.9A priority patent/CN112689979B/en
Publication of WO2020056597A1 publication Critical patent/WO2020056597A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present disclosure relates to the technical field of article management, and in particular, to an article identity management method, terminal, micro-processing unit, identification device, and system.
  • the present disclosure provides an article identity management method, terminal, micro-processing unit, identification device, and system.
  • a first aspect of the present disclosure provides a method for managing an article identity, which is applied to a terminal, and the method includes:
  • the first signature is the micro-processing unit using the private key of the first item stored in the micro-processing unit to pair the target
  • the information is obtained after digitally signing the information
  • the validity of the first identity information of the first item recorded in the micro-processing unit is determined by verifying the first signature by using the public key of the first item.
  • the receiving the first signature of the target information sent by the micro-processing unit in the first item, the first signature is the micro-processing unit using the first item stored in the micro-processing unit.
  • the private key obtained after digitally signing the target information includes:
  • the micro processing unit After the micro processing unit digitally signs the target information by using the private key of the first item, the micro processing unit receives the first signature sent by the micro processing unit.
  • the receiving the first signature of the target information sent by the micro-processing unit in the first item, the first signature is the micro-processing unit using the first item stored in the micro-processing unit.
  • the private key obtained after digitally signing the target information includes:
  • the micro processing unit After the micro processing unit generates the target information and digitally signs the target information by using the private key of the first item, receiving the first signature and the target information sent by the micro processing unit ; Wherein the target information includes a random number or identity information of the first item.
  • the method further includes:
  • Determining whether the first identity information is authentic by verifying the second signature by using the public key of the first item and the second identity information;
  • data update information is sent to the blockchain, and the data update information is used by the blockchain to update an identity use state of the first item to a used state.
  • the method further comprises: performing a query in the blockchain again according to the first identity information to obtain the identity usage status of the first item from the blockchain;
  • the first item is identified as the item identity used.
  • the target information is identification information of the first article
  • the first signature is used by the microprocessing unit. Said method is obtained by digitally signing said identification information by said private key of said first item, said method further comprising:
  • the method further includes:
  • the method further includes: generating an information update request for the first item, where the information update request is used to update the information of the first item stored on the blockchain, and the first The information of an item includes the first identity information and / or attribute information;
  • the information of the first item on the blockchain is updated according to the information update request, and the update operation includes at least one of the following: information addition, information deletion, information modification, and / or information abolition.
  • an article identity management method which is applied to a micro-processing unit, the method includes:
  • Digitally signing target information by using a private key of a first item stored in the micro processing unit to obtain a first signature of the target information, where the first item is an item in which the micro processing unit is located;
  • obtaining the first signature of the target information by digitally signing the target information by using the private key of the first item stored in the micro processing unit includes:
  • the first signature is obtained by digitally signing the target information by using the private key of the first item.
  • obtaining the first signature of the target information by digitally signing the target information by using the private key of the first item stored in the micro processing unit includes:
  • the target information includes a random number or identity information of the first item
  • the first signature is obtained by digitally signing the target information by using the private key of the first item.
  • the method further includes:
  • the method before the digitally signing the target information by using the private key of the first item stored in the micro processing unit, the method further includes:
  • the private key of the first item and the first identity information of the first item are stored locally in the micro processing unit.
  • the method further includes: setting a private key of the first item stored locally in the micro processing unit to prohibit external devices from reading and writing.
  • an article identity management method is provided, which is applied to a tagging device, the method comprising: driving a micro processing unit in a first article to generate a public key and a private key of the first article;
  • a terminal including:
  • a first receiving module configured to receive a first signature of target information sent by a micro-processing unit in a first item, where the first signature is the micro-processing unit using the first item stored in the micro-processing unit Obtained by digitally signing the target information with a private key of
  • a first obtaining module configured to obtain a public key of the first item from a blockchain
  • a first verification module is configured to determine the validity of the first identity information of the first item recorded in the micro-processing unit by verifying the first signature by using the public key of the first item.
  • the receiving module is configured to:
  • the micro processing unit After the micro processing unit digitally signs the target information by using the private key of the first item, the micro processing unit receives the first signature sent by the micro processing unit.
  • the receiving module is configured to:
  • the micro processing unit After the micro processing unit generates the target information and digitally signs the target information by using the private key of the first item, receiving the first signature and the target information sent by the micro processing unit ; Wherein the target information includes a random number or identity information of the first item.
  • the terminal further includes:
  • a second acquisition module configured to acquire the first identity information of the first item from the micro processing unit
  • a query module configured to perform a query in the blockchain according to the first identity information to obtain second identity information of the first item from the blockchain;
  • the first receiving module is further configured to receive a second signature of the first identity information sent by the microprocessing unit, where the second signature is a private key pair used by the microprocessing unit to use the first item Obtained by digitally signing the first identity information;
  • a second verification module configured to determine whether the first identity information is authentic by verifying the second signature by using the public key of the first item and the second identity information
  • a first update module configured to: when it is determined that the first identity information is true, send data update information to the blockchain, the data update information being used by the blockchain to use the identity status of the first item Updated to Used.
  • the terminal further includes:
  • the query module is further configured to query the blockchain again according to the first identity information to obtain the identity usage status of the first item from the blockchain;
  • An identification module configured to identify the first item as the used item identity when the status of the use of the identity of the first item obtained from the blockchain is used.
  • the terminal is a first node located on the first item circulation link
  • the target information is identification information of the first item
  • the first signature is the micro processing unit using the It is obtained by digitally signing the identification information with the private key of the first item
  • the terminal further includes:
  • a signature module configured to digitally sign the first signature by using the private key of the terminal to obtain a second signature
  • a sending module is configured to send the first signature and the second signature to the blockchain, so that the first signature and the second signature are stored in the blockchain.
  • the terminal is a terminal of an intermediate node in the first article circulation link, and the terminal further includes:
  • a second receiving module configured to receive a third signature sent by a previous node device in the first article circulation link
  • a signature module configured to digitally sign the third signature by using the private key of the terminal to obtain a fourth signature
  • a sending module configured to send the third signature and the fourth signature to the blockchain, so that the third signature and the fourth signature are stored in the blockchain.
  • the apparatus further includes:
  • a second update module configured to generate an information update request for the first item, where the information update request is used to update the information of the first item stored on the blockchain,
  • the information includes the first identity information and / or attribute information;
  • a signature module configured to digitally sign the information update request by using the private key of the terminal to obtain a fifth signature
  • a sending module configured to send the information update request and the fifth signature to the blockchain, and be used by a smart contract on the blockchain to verify the fifth signature through the public key of the terminal And, after passing the verification, perform an update operation on the information of the first item on the blockchain according to the information update request, the update operation includes at least one of the following: information addition, information deletion, information modification, and / Or the information is discontinued.
  • a microprocessing unit including:
  • a signature module configured to digitally sign target information by using a private key of a first item stored in the micro processing unit to obtain a first signature of the target information, where the first item is where the micro processing unit is located Items
  • a sending module configured to send the first signature to a terminal, for the terminal to determine the micro signature by verifying the first signature by using a public key of the first item obtained from a blockchain Validity of the first identity information of the first item recorded in the processing unit.
  • the signature module is configured to:
  • the first signature is obtained by digitally signing the target information by using the private key of the first item.
  • the signature module is configured to generate the target information, where the target information includes a random number or identity information of the first item;
  • the first signature is obtained by digitally signing the target information by using the private key of the first item.
  • a sending module configured to send the first identity information of the first item to the terminal for the terminal to query in the blockchain according to the first identity information ;
  • the signature module is further configured to digitally sign the first identity information by using the private key of the first item to obtain a second signature of the first identity information;
  • the sending module is further configured to send the second signature to the terminal for the terminal to obtain the second identity information of the first item from the blockchain by using the first signature A public key of an item and the second identity information verify the second signature to determine whether the first identity information is authentic.
  • a generating module configured to generate the first information under the drive of a labeling device before digitally signing the target information by using the private key of the first item stored in the micro processing unit.
  • the public and private keys of the item are configured to generate the first information under the drive of a labeling device before digitally signing the target information by using the private key of the first item stored in the micro processing unit.
  • the storage module is configured to store a private key of the first item and the first identity information of the first item locally in the micro processing unit.
  • it further includes a setting module, configured to set a private key of the first item stored locally in the micro processing unit to prohibit external devices from reading and writing.
  • a setting module configured to set a private key of the first item stored locally in the micro processing unit to prohibit external devices from reading and writing.
  • a marking device including:
  • An uploading module is used to upload the public key of the first item to the blockchain.
  • a computer-readable storage medium on which a computer program is stored, characterized in that when the computer program is executed by a processor, the steps of the method according to the first aspect are implemented.
  • An eighth aspect provides a terminal, including:
  • a processor configured to execute the computer program in the memory to implement the steps of the method according to the first aspect.
  • a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, implements the steps of the method in the second aspect.
  • a microprocessing unit including:
  • a processor configured to execute the computer program in the memory to implement the steps of the method according to the second aspect.
  • a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the steps of the method according to the third aspect are implemented.
  • a microprocessing unit including:
  • a processor configured to execute the computer program in the memory to implement the steps of the method according to the third aspect.
  • an article management system including: a terminal, a micro-processing unit located in the article, and an identification device;
  • the terminal is configured to implement the steps of the method according to the first aspect
  • the micro processing unit is configured to implement the steps of the method according to the second aspect
  • the identification device is configured to implement the steps of the method according to the third aspect.
  • the micro-processing unit can be driven by the tagging device to generate the public and private keys of the article, and the public key of the article is sent to the blockchain for storage via the tagging device.
  • the micro-processing unit in the item can use the private key of the item stored in the micro-processing unit to digitally sign the target information and send it to the terminal, so that the terminal according to the blockchain
  • the public key of the item obtained on the Internet is used to verify the received signature, so that the validity of the identity information of the item recorded in the micro processing unit can be determined.
  • the public key of the item is stored in the blockchain by the tagging device, the item and its corresponding public key have an untamperable binding relationship, and the private key of the item is set in the microprocessing unit in the item, which is difficult when the item is complete
  • the micro processing unit is easy to obtain, so the problem of identity forgery or application can be avoided, and when verifying, only the terminal and the item of the blockchain can be accessed, and no additional knowledge or additional equipment is required. Therefore, the learning cost of the object audience in anti-counterfeit identification will not be increased.
  • the verification method based on the blockchain is used, it is possible to avoid errors caused by the centralized authentication method.
  • Fig. 1 is a schematic flowchart of an article identity management method according to an exemplary embodiment of the present disclosure.
  • Fig. 2 is a schematic flowchart of an article identity management method according to an exemplary embodiment of the present disclosure.
  • FIG. 3 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 1.
  • FIG. 4 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 2.
  • Fig. 5 is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure.
  • Fig. 6a is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure.
  • Fig. 6b is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure.
  • Fig. 7 is a schematic diagram of a commodity circulation link according to an exemplary embodiment of the present disclosure.
  • Fig. 8 is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure.
  • Fig. 9 is a schematic flowchart of an article identity management method according to an exemplary embodiment of the present disclosure.
  • FIG. 10 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 9.
  • FIG. 11 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 9.
  • Fig. 12 is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure.
  • Fig. 13 is a block diagram showing a terminal according to an exemplary embodiment of the present disclosure.
  • Fig. 14 is a block diagram showing another terminal according to an exemplary embodiment of the present disclosure.
  • Fig. 15 is a block diagram showing still another terminal according to an exemplary embodiment of the present disclosure.
  • Fig. 16 is a block diagram showing still another terminal according to an exemplary embodiment of the present disclosure.
  • Fig. 17 is a block diagram showing still another terminal according to an exemplary embodiment of the present disclosure.
  • Fig. 18 is a block diagram showing still another terminal according to an exemplary embodiment of the present disclosure.
  • Fig. 19 is a block diagram showing a micro processing unit according to an exemplary embodiment of the present disclosure.
  • Fig. 20 is a block diagram showing another micro processing unit according to an exemplary embodiment of the present disclosure.
  • Fig. 21 is a block diagram showing a labeling device according to an exemplary embodiment of the present disclosure.
  • Fig. 22 is a structural diagram of an article management system according to an exemplary embodiment of the present disclosure.
  • Fig. 23 is a structural diagram of another article management system according to an exemplary embodiment of the present disclosure.
  • Fig. 24 is a structural diagram of an electronic device according to an exemplary embodiment of the present disclosure.
  • Fig. 1 is a schematic flowchart of an article identity management method according to an exemplary embodiment of the present disclosure. The method is applied to a labeling device. As shown in Fig. 1, the method includes the following steps:
  • step 101 the micro processing unit in the first article is driven to generate a public key and a private key of the first article.
  • the first item may be any item or commodity, and the micro processing unit is disposed inside the first item.
  • the micro processing unit may be installed in the first item in the following manner: After the first item is formed, the An installation method in which the first article can be physically removed before being removed.
  • the micro processing unit may be a micro processing chip, which may include a microprocessor and an antenna / contact.
  • an applet for implementing the method may be installed inside the microprocessor, the applet may be used to generate a public-private key pair of the first item, or the function of the applet may also be implemented by hardware.
  • a hardware module for generating a public-private key pair of the first item is provided inside the microprocessor.
  • the communication method between the micro processing unit and the terminal may adopt NFC (Near Field Communication).
  • NFC Near Field Communication
  • the tagging device can initiate a tagging (or registration) process, and the micro processing unit can be driven to generate the first A key pair for an item, including the public and private keys of the first item.
  • Step 102 After obtaining the public key of the first item from the micro processing unit, upload the public key of the first item to the blockchain.
  • the marking device uploads the public key of the first item from the micro processing unit to the blockchain for storage, and the private key of the first item It is stored locally in the micro processing unit, and the private key of the first item stored in the micro processing unit may be set to prohibit external devices from reading and writing, and the micro processing unit may read the private key of the first item, The private key of the first item cannot be written.
  • the identity information and attribute information of the first item may also be uploaded to the blockchain for storage.
  • the micro-processing unit may also store the identity information and attribute information of the first item, and optionally, the identity information and attribute information of the first item may also be stored. Instead of uploading to the blockchain, it is only stored in the micro-processing unit of the first item.
  • the subsequent terminal for identifying the item verifies that the identity information of the first item is valid, the item can be obtained from the micro-processing unit Identity information, attribute information.
  • the identification information and attribute information of the first item stored in the micro-processing unit may be sent to the micro-processing unit by the tagging device, or the micro-processing unit may be assembled for the first item by other devices. Write to the chip.
  • Fig. 2 is a schematic flowchart of an article identity management method according to an exemplary embodiment of the present disclosure. The method is applied to a terminal. As shown in Fig. 2, the method includes the following steps:
  • Step 201 Receive a first signature of target information sent by a micro-processing unit in a first item, where the first signature is the micro-processing unit using the private key of the first item stored in the micro-processing unit to perform the target information on the target information. Obtained after digital signature.
  • Step 202 Obtain the public key of the first item from the blockchain.
  • Step 203 Determine the validity of the first identity information of the first item recorded in the micro-processing unit by verifying the first signature by using the public key of the first item.
  • the first signature can be verified by the terminal through the original text of the target information and the public key of the first item obtained from the blockchain during verification.
  • the micro processing unit can be confirmed.
  • the first identity information of the first item recorded in the valid is valid, but the first signature fails to be verified, it is confirmed that the first identity information is invalid.
  • the public key of the item is stored in the blockchain by the tagging device, the item and its corresponding public key have an untamperable binding relationship, and the private key of the item is set in the microprocessing unit in the item, which is difficult when the item is complete
  • the micro processing unit is easy to obtain, so the problem of identity forgery or application can be avoided, and when verifying, only the terminal and the item of the blockchain can be accessed, and no additional knowledge or additional equipment is required. Therefore, the learning cost of the object audience in anti-counterfeit identification will not be increased.
  • the verification method based on the blockchain is used, it is possible to avoid errors caused by the centralized authentication method.
  • the target information may be generated by the terminal and sent to the micro processing unit in the first item, or may be generated by the micro processing unit, or the information stored in the micro processing unit may be used as the target information.
  • An example can be shown in Figures 3 and 4.
  • FIG. 3 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 1. The method is applied to a terminal. As shown in FIG. 3, as described in step 201: receiving a micro-processing unit in a first article The step of sending the first signature of the target information may include:
  • step 2011 the target information is generated, and the target information includes a random number.
  • Step 2012 Send the target information to the micro processing unit.
  • Step 2013 After the micro processing unit digitally signs the target information by using the private key of the first item, receive the first signature sent by the micro processing unit.
  • the terminal randomly generates a random number, and then sends the random number to the micro processing unit in the first item.
  • the micro processing unit uses the private key pair of the first item stored in the micro processing unit.
  • the random number can be digitally signed to obtain the first signature, and then the micro processing unit returns the first signature to the terminal for the terminal to verify the first signature.
  • FIG. 4 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 2. The method is applied to a terminal.
  • step 201 receiving a micro-processing unit in a first article
  • the step of sending the first signature of the target information may include:
  • step 2014 after the micro processing unit generates the target information and digitally signs the target information by using the private key of the first item, the micro processing unit receives the first signature and the target information sent by the micro processing unit.
  • the target information includes a random number or identity information of the first item.
  • the micro-processing unit may generate a random number under the drive of the terminal, and use the stored in the micro-processing unit.
  • the first signature is obtained by digitally signing the random number of the first item's private key, and then the microprocessing unit returns the first signature and the random number to the terminal for the terminal to verify the first signature.
  • the micro processing unit may use existing information stored in the micro processing unit, such as the first identity information of the first item, and the micro processing unit may obtain the first identity information by digitally signing the first identity information using the first item ’s private key. The first signature, and then the micro processing unit returns the first signature to the terminal together with the random number.
  • FIG. 5 is a schematic flowchart of another method for managing an item's identity according to an exemplary embodiment of the present disclosure.
  • the method is applied to a terminal.
  • the method provides a method for checking the authenticity of an item's identity, as shown in FIG. 5.
  • the method also includes the following steps:
  • Step 204 Obtain the first identity information of the first item from the micro processing unit.
  • Step 205 Query in the blockchain according to the first identity information to obtain the second identity information of the first item from the blockchain.
  • the first identity information stored in the micro-processing unit of the first item is first obtained, and the first identity information is used as a query basis to find the first item stored in the blockchain in the blockchain.
  • the second identity information which is stored in the blockchain by the identification device by the method shown in step 102, is the real identity information of the first item, so it can be used to verify the micro The authenticity of the first identity information in the processing unit.
  • Step 206 Receive a second signature of the first identity information sent by the microprocessing unit, where the second signature is obtained after the microprocessing unit digitally signs the first identity information by using the private key of the first item.
  • Step 207 Determine whether the first identity information is authentic by verifying the second signature by using the public key of the first item and the second identity information.
  • the micro processing unit may first confirm whether the terminal is an authorized terminal.
  • an authentication method for confirming whether the terminal is an authorized terminal may be implemented by, for example, a password, a secret key, or the like.
  • Step 208 When it is determined that the first identity information is true, send data update information to the blockchain, and the data update information is used by the blockchain to update the identity use status of the first item to a used status.
  • step 208 may be performed, that is, the first item After the identity information is true or false, data update information needs to be sent to the blockchain in order to update the identity usage status of the first item to the used status in the blockchain.
  • the first item is an electronic product, such as a mobile phone.
  • the terminal obtains the second signature of the first identity information of the mobile phone from the micro-processing unit in the mobile phone that is used to execute the above method, it retrieves the block from the block. Query the second identity information of the mobile phone on the chain and verify the second signature. When the verification is passed, it is confirmed that the first identity information is true, and the mobile phone is updated to be activated on the blockchain.
  • the first identity information of the mobile phone may be information such as IMEI (International Mobile Equipment Identity), SN (Serial Number, serial number), and the like.
  • the item may be a non-electronic product, such as a bottle of wine
  • the first identity information may be an identification code of the bottle of wine (the identification code is unique).
  • Traditional identification codes are mostly password-coated cards (commonly known as Attached to the product in the form of a scratch card), or placed inside the product packaging in the form of a two-dimensional code or a laser code.
  • the identification code can be stored in a micro-processing unit inside the bottle of wine.
  • the verification method is the same as the above-mentioned mobile phone, and will not be described again.
  • it may further include the following steps:
  • Step 209 Query the blockchain again according to the first identity information to obtain the identity usage status of the first item from the blockchain.
  • Step 210 When the status of using the identity of the first item obtained from the blockchain is used, the first item is identified as being used for the identity of the item.
  • the identity usage status of the first item is updated to the used status on the blockchain
  • a query is again performed in the blockchain based on the first identity information in order to confirm the identity of the first item in the blockchain. Whether the identity usage status was successfully updated to the used status.
  • the first item may be identified as the item identity used, for example, the first item is displayed as the item identity used on the identification page of the terminal.
  • FIG. 6a is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure.
  • the method is applied to a terminal.
  • the target information is identification information of the first item
  • the first signature is obtained after the microprocessing unit digitally signs the identification information by using the private key of the first item.
  • the method further includes The following steps:
  • Step 211 Digitally sign the first signature by using the private key of the terminal to obtain a second signature.
  • Step 212 Send the first signature and the second signature to the blockchain, so that the first signature and the second signature are stored in the blockchain.
  • the first signature and the second signature can be obtained from the end of the blockchain, and the second signature is verified by using the public key of the terminal.
  • the verification it can be confirmed that the first item and the first item circulation link have indeed passed the node where the terminal is located, that is, the first node.
  • the verification fails, it can be confirmed that the first item does not pass the first node.
  • Fig. 6b is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure. The method is applied to a terminal.
  • the terminal is a terminal of an intermediate node on the first article circulation link, such as As shown in FIG. 6b, the method further includes the following steps:
  • Step 213 Receive a third signature sent by a previous node device in the first article circulation link.
  • Step 214 Digitally sign the third signature by using the private key of the terminal to obtain a fourth signature.
  • Step 215 Send the third signature and the fourth signature to the blockchain, so that the third signature and the fourth signature are stored in the blockchain.
  • steps 211-215 described above describe that each time a first item passes through a node in its circulation link, it must sign the signature sent by the previous node and synchronize it to the blockchain to ensure that the first item can be detected. The node that an item actually passes through.
  • each node in the circulation of the first item can be regarded as a dealer (equipment).
  • Nodes include Dealer A, Dealer B, and Dealer C.
  • the product's private key can be used to identify the product itself when it leaves the factory Digitally sign, the identification information can be the public key of the product, or other identifications, such as barcode number, product name, etc.
  • Dealer A After the goods pass through Dealer A, if it reaches Dealer B, Dealer A will send signature T2 to Dealer B.
  • T2 performs verification.
  • the dealer C After the goods pass through the dealer B, if the goods reach the dealer C, the dealer C can get the signature T3 from the dealer B by the same way.
  • Fig. 8 is a schematic flow chart showing still another method for managing the identity of an article according to an exemplary embodiment of the present disclosure. The method is applied to a terminal. When the terminal is a terminal of an intermediate node on the first article circulation link, as shown in Fig. As shown in FIG. 8, the method further includes the following steps:
  • Step 216 Generate an information update request for the first item, where the information update request is used to update the information of the first item stored on the blockchain, and the information of the first item includes the first identity information and / Or attribute information.
  • Step 217 Digitally sign the information update request by using the private key of the terminal to obtain a fifth signature.
  • Step 218 Send the information update request and the fifth signature to the blockchain, and the smart contract on the blockchain uses the public key of the terminal to verify the fifth signature, and after passing the verification, the fifth signature is verified according to the
  • the information update request updates the information of the first item on the blockchain.
  • the update operation includes at least one of the following: information addition, information deletion, information modification, and / or information revocation.
  • the terminal can generate the information update request to digitally sign it, and then send the obtained signature to the blockchain.
  • the smart contract on the blockchain passes The public key of the terminal verifies the signature, and after passing the verification, the information of the first item can be updated according to the requirements of the information update request.
  • the identity information of the first article may be suspended or abolished, or the attribute information of the first article may be updated, such as correction of error information, supplementation of incomplete information, or deletion of certain attribute information.
  • Fig. 9 is a schematic flowchart of an article identity management method according to an exemplary embodiment of the present disclosure. The method is applied to a microprocessing unit. As shown in Fig. 9, the method includes the following steps:
  • a first signature of the target information is obtained by digitally signing the target information by using a private key of the first item stored in the microprocessing unit, and the first item is an item in which the microprocessing unit is located.
  • micro-processing unit is disposed inside the first article, and its installation manner may be the same as that described in step 101, and details are not described again.
  • Step 902 Send the first signature to the terminal for the terminal to verify the first signature by using the public key of the first item obtained from the blockchain to determine the first signature recorded in the microprocessing unit. The validity of the first identity of an item.
  • FIG. 10 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 9. The method is applied to a micro processing unit. As shown in FIG. 10 and described in step 901: receiving micro The first signature of the target information sent by the processing unit may include:
  • Step 9011 Receive the target information generated by the terminal and sent by the terminal, where the target information includes a random number.
  • Step 9012 Digitally sign the target information by using the private key of the first item to obtain the first signature.
  • the terminal randomly generates a random number, and then sends the random number to the micro processing unit in the first item.
  • the micro processing unit uses the private key pair of the first item stored in the micro processing unit.
  • the random number can be digitally signed to obtain the first signature, and then the micro processing unit returns the first signature to the terminal for the terminal to verify the first signature.
  • FIG. 11 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 9. The method is applied to a micro processing unit. As shown in FIG. 11, step 901: receiving micro The first signature of the target information sent by the processing unit may include:
  • Step 9013 Generate the target information, where the target information includes a random number or identity information of the first item.
  • Step 9014 Digitally sign the target information by using the private key of the first item to obtain the first signature.
  • the micro-processing unit may generate a random number under the driving of the terminal, and use the The first signature is obtained by digitally signing the random number of the first item's private key, and then the microprocessing unit returns the first signature and the random number to the terminal for the terminal to verify the first signature.
  • the micro processing unit may use existing information stored in the micro processing unit, such as the first identity information of the first item, and the micro processing unit may obtain the first identity information by digitally signing the first identity information using the first item ’s private key. The first signature, and then the micro processing unit returns the first signature to the terminal together with the random number.
  • FIG. 12 is a schematic flowchart of another item identity management method according to an exemplary embodiment of the present disclosure.
  • the method is applied to a microprocessing unit.
  • the method provides a method for checking the authenticity of an item identity, such as As shown in Figure 12, the method further includes the following steps:
  • Step 903 Send the first identity information of the first item to the terminal for the terminal to query in the blockchain according to the first identity information.
  • Step 904 Use the private key of the first item to digitally sign the first identity information to obtain a second signature of the first identity information.
  • Step 905 Send the second signature to the terminal for the terminal to use the public key of the first item and the second identity information after obtaining the second identity information of the first item from the blockchain.
  • the second signature is verified to determine whether the first identity information is authentic.
  • the first identity information needs to be consistent with the second identity information, and then the second signature of the first identity information can pass verification. Therefore, if the second signature is verified using the public key of the first item, if the second signature can pass the verification, the first identity information can be determined to be authentic; otherwise, if the verification fails, the The first identity information is not real.
  • the terminal When it is determined that the first identity information is true, the terminal also needs to update the identity use status of the first item to the used status in the blockchain. Specifically, steps 208 to 210 may be referred to, and details are not described herein again.
  • the method may further include:
  • a public key and a private key of the first item are generated under the driving of the labeling device. Reference may be made to step 101, and details are not described again.
  • the private key of the first item and the first identity information of the first item are stored locally in the micro processing unit.
  • the private key of the first item stored locally in the micro processing unit may be set to prohibit external devices from reading and writing, the micro processing unit may read the private key of the first item, and may not The private key is written.
  • the public key of the first item is uploaded to the blockchain by the identification device, and reference may be made to step 102, which will not be described again.
  • Fig. 13 is a block diagram of a terminal according to an exemplary embodiment of the present disclosure.
  • the terminal 1300 may include:
  • the first receiving module 1301 is configured to receive a first signature of the target information sent by the micro processing unit in the first item, where the first signature is a private key of the first item stored by the micro processing unit by the micro processing unit. Obtained after digitally signing the target information;
  • a first verification module 1303 is configured to determine the validity of the first identity information of the first item recorded in the micro processing unit by verifying the first signature by using the public key of the first item.
  • the receiving module 1301 is configured to:
  • the target information including a random number
  • the micro processing unit After the micro processing unit digitally signs the target information using the private key of the first item, the micro processing unit receives the first signature sent by the micro processing unit.
  • the receiving module 1301 is configured to:
  • micro-processing unit After the micro-processing unit generates the target information and digitally signs the target information by using the private key of the first item, receiving the first signature and the target information sent by the micro-processing unit;
  • the target information includes a random number or identity information of the first item.
  • FIG. 14 is a block diagram of another terminal according to an exemplary embodiment of the present disclosure. As shown in FIG. 14, the terminal 1300 further includes:
  • a query module 1305, configured to perform a query in the blockchain according to the first identity information to obtain the second identity information of the first item from the blockchain;
  • the first receiving module 1301 is further configured to receive a second signature of the first identity information sent by the micro-processing unit, where the second signature is the first identity information of the micro-processing unit using the private key of the first item. Obtained after digital signature;
  • a second verification module 1306, configured to determine whether the first identity information is authentic by verifying the second signature by using the public key of the first item and the second identity information;
  • a first update module 1307 is configured to send data update information to the blockchain when it is determined that the first identity information is true, and the data update information is used by the blockchain to update the identity use status of the first item to already status of use.
  • FIG. 15 is a block diagram of another terminal according to an exemplary embodiment of the present disclosure. As shown in FIG. 15, the terminal further includes:
  • the query module 1305 is further configured to query the blockchain again according to the first identity information to obtain the identity usage status of the first item from the blockchain;
  • the identification module 1306 is configured to identify the first item as the used item identity when the identity use status of the first item obtained from the blockchain is used.
  • the terminal is the first node located on the circulation of the first article
  • the target information is identification information of the first article
  • the first signature is a private key pair used by the microprocessing unit to use the first article
  • the identification information is obtained after being digitally signed.
  • FIG. 16 is a block diagram of another terminal according to an exemplary embodiment of the present disclosure. As shown in FIG. 16, the terminal further includes:
  • a signature module 1307 configured to digitally sign the first signature by using the private key of the terminal to obtain a second signature
  • a sending module 1308 is configured to send the first signature and the second signature to the blockchain, so that the first signature and the second signature are stored in the blockchain.
  • the terminal is a terminal of an intermediate node in the first article circulation link.
  • FIG. 17 is a block diagram of another terminal according to an exemplary embodiment of the present disclosure. As shown in FIG. 17, the terminal further includes :
  • a second receiving module 1309 configured to receive a third signature sent by a previous node device in the first article circulation link
  • a signature module 1307 configured to digitally sign the third signature by using the private key of the terminal to obtain a fourth signature
  • a sending module 1308 is configured to send the third signature and the fourth signature to the blockchain, so that the third signature and the fourth signature are stored in the blockchain.
  • FIG. 18 is a block diagram of another terminal according to an exemplary embodiment of the present disclosure. As shown in FIG. 18, the terminal further includes:
  • a second update module 1310 is configured to generate an information update request for the first item, where the information update request is used to update the information of the first item stored on the blockchain, and the information of the first item includes the first item -Identity information and / or attribute information;
  • a signature module 1307 configured to digitally sign the information update request by using the private key of the terminal to obtain a fifth signature
  • a sending module 1308 is configured to send the information update request and the fifth signature to the blockchain, and the smart contract on the blockchain uses the public key of the terminal to verify the fifth signature and passes the verification. Then, the information of the first item on the blockchain is updated according to the information update request, and the update operation includes at least one of the following: information addition, information deletion, information modification, and / or information abolition.
  • Fig. 19 is a block diagram of a micro processing unit according to an exemplary embodiment of the present disclosure. As shown in Fig. 19, the micro processing unit 1900 includes:
  • a signature module 1901 configured to digitally sign target information by using a private key of a first item stored in the micro processing unit to obtain a first signature of the target information, where the first item is an item in which the micro processing unit is located;
  • a sending module 1902 is configured to send the first signature to a terminal, which is used by the terminal to determine the record in the micro processing unit by using the public key of the first item obtained from the blockchain to verify the first signature. The validity of the first identity information of the first item.
  • the signature module 1901 is used to:
  • the first signature is obtained by digitally signing the target information by using the private key of the first item.
  • the signature module 1901 is used to:
  • the target information including a random number or identity information of the first item
  • the first signature is obtained by digitally signing the target information by using the private key of the first item.
  • the sending module 1902 is configured to send the first identity information of the first item to the terminal for the terminal to query in the blockchain according to the first identity information;
  • the signature module 1901 is further configured to digitally sign the first identity information by using the private key of the first item to obtain a second signature of the first identity information;
  • the sending module 1902 is further configured to send the second signature to the terminal, which is used by the terminal to obtain the second identity information of the first item from the blockchain by using the public key of the first item and The second identity information verifies the second signature to determine whether the first identity information is authentic.
  • Fig. 20 is a block diagram illustrating another micro processing unit according to an exemplary embodiment of the present disclosure. As shown in Fig. 20, the micro processing unit further includes:
  • a generating module 1903 configured to generate a public key and a private key of the first item under a drive of a labeling device before digitally signing target information by using a private key of the first item stored in the micro processing unit;
  • the storage module 1904 is configured to store the private key of the first item and the first identity information of the first item locally in the micro processing unit.
  • micro processing unit further includes:
  • a setting module 1905 is configured to set a private key of the first item stored locally in the micro processing unit to prohibit external devices from reading and writing.
  • Fig. 21 is a block diagram of a labeling device according to an exemplary embodiment of the present disclosure. As shown in Fig. 21, the labeling device 2100 may include:
  • a generating module 2101 configured to drive a micro processing unit in the first item to generate a public key and a private key of the first item;
  • the uploading module 2102 is configured to upload the public key of the first item to the blockchain.
  • the public key of the item is stored in the blockchain by the tagging device, the item and its corresponding public key have an untamperable binding relationship, and the private key of the item is set in the microprocessing unit in the item, which is difficult when the item is complete
  • the micro processing unit is easy to obtain, so the problem of identity forgery or application can be avoided, and when verifying, only the terminal and the item of the blockchain can be accessed, and no additional knowledge or additional equipment is required. Therefore, the learning cost of the object audience in anti-counterfeit identification will not be increased.
  • the verification method based on the blockchain is used, it is possible to avoid errors caused by the centralized authentication method.
  • Fig. 22 is a structural diagram illustrating an article management system according to an exemplary embodiment of the present disclosure.
  • the system includes: a terminal 001, a micro processing unit 0021 located in the article 002, and an identification device 003.
  • the terminal 001 is configured to implement the steps of the method shown in any one of FIG. 2 to FIG. 8;
  • the micro processing unit 0021 is used for the steps of the method shown in any one of FIG. 9 to FIG. 12;
  • the identification device 003 is used for the steps of the method shown in FIG. 1.
  • the above system may also be used for the identification of IoT devices.
  • the first item may be an IoT device containing the above microprocessing unit 002, and the identification device 003 may be For the production equipment of the IoT device, the terminal 001 may be an identification device for identifying the IoT device.
  • the production device can activate the micro processing unit in the IoT device, generate a key pair, and upload the public key in the key pair and the identity information of the IoT device to the blockchain.
  • the micro processing unit obtains the private key signature of the IoT device, and when the signature can be successfully verified by the corresponding public key on the blockchain, it can confirm that the identity of the IoT device is valid.
  • the specific method is the same as the method shown in FIG. 1 to FIG. 12 and will not be described again.
  • Fig. 24 is a block diagram of an electronic device 2400 according to an exemplary embodiment.
  • the electronic device 2400 may include a processor 2401 and a memory 2402.
  • the electronic device 2400 may further include one or more of a multimedia component 2403, an input / output (I / O) interface 2404, and a communication component 2405.
  • the electronic device 24 may be the above-mentioned terminal or identification device.
  • the processor 2401 is configured to control the overall operation of the electronic device 2400 so as to complete all or part of the steps in the above-mentioned item identity management method.
  • the memory 2402 is used to store various types of data to support the operation on the electronic device 2400.
  • the data may include, for example, instructions for any application program or method for operating on the electronic device 2400, and application-related data. Examples include contact data, messages sent and received, pictures, audio, video, and more.
  • the memory 2402 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as Static Random Access Memory (SRAM, Random Access Memory, SRAM for short), electrically erasable programmable read-only memory ( Electrically Erasable Programmable Read-Only Memory (referred to as EEPROM), Erasable Programmable Read-Only Memory (referred to as EPROM), Programmable Read-Only Memory (referred to as PROM), read-only Memory (Read-Only Memory, ROM for short), magnetic memory, flash memory, magnetic disk or optical disk.
  • the multimedia component 2403 may include a screen and an audio component.
  • the screen may be, for example, a touch screen, and the audio component is used to output and / or input audio signals.
  • the audio component may include a microphone for receiving external audio signals.
  • the received audio signal may be further stored in the memory 2402 or transmitted through the communication component 2405.
  • the audio component also includes at least one speaker for outputting an audio signal.
  • the I / O interface 2404 provides an interface between the processor 2401 and other interface modules.
  • the other interface modules may be a keyboard, a mouse, a button, and the like. These buttons can be virtual buttons or physical buttons.
  • the communication component 2405 is used for wired or wireless communication between the electronic device 2400 and other devices. Wireless communication, such as Wi-Fi, Bluetooth, Near Field Communication (NFC), 2G, 3G, or 4G, or one or more of them, so the corresponding communication component 2405 may include: Wi-Fi module, Bluetooth module, NFC module.
  • the electronic device 2400 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital signal processors (DSPs), and digital signal processing devices (Digital Signal Processing Device (DSPD), Programmable Logic Device (PLD), Field Programmable Gate Array (FPGA), controller, microcontroller, microprocessor or other electronic components Implementation, for performing the above-mentioned item identity management method.
  • ASICs Application Specific Integrated Circuits
  • DSPs digital signal processors
  • DSPD Digital Signal Processing Device
  • PLD Programmable Logic Device
  • FPGA Field Programmable Gate Array
  • controller microcontroller, microprocessor or other electronic components Implementation, for performing the above-mentioned item identity management method.
  • a computer-readable storage medium including program instructions is provided.
  • the program instructions when executed by a processor, implement the steps of the foregoing item identity management method.
  • the computer-readable storage medium may be the foregoing memory 2402 including program instructions, and the foregoing program instructions may be executed by the processor 2401 of the electronic device 2400 to complete the foregoing item identity management method.
  • micro-processing unit including:
  • the processor is configured to execute the computer program in the memory to implement the steps of the foregoing item identity management method.
  • a computer-readable storage medium is also provided, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the above-mentioned item identity management method.

Abstract

Provided are an item identity management method, a terminal, a micro-processing unit, an identification device and a system. The method comprises: providing a micro-processing chip in an item, driving, by means of an identification device, a micro-processing unit to generate a public key and a private key of the item, and sending, by means of the identification device, the public key of the item to a blockchain and saving same. When a terminal performs identity validity recognition on the item, a micro-processing unit in the item uses a private key, stored in the micro-processing unit, of the item to perform a digital signature on target information and sends same to the terminal, and the terminal verifies a received signature according to a public key, acquired on a blockchain, of the item, and thus, the validity of identity information, recorded in the micro-processing unit, of the item can be determined. The present disclosure can avoid the problem of the identity being forged or indiscriminately used, will not increase the learning cost of item receivers in terms of anti-counterfeiting and recognition, and can avoid the problem of errors caused by centralized true and false adjudication.

Description

物品身份管理方法、终端、微处理单元、标识设备和系统Article identity management method, terminal, micro processing unit, identification device and system 技术领域Technical field
本公开涉及物品管理技术领域,具体地,涉及一种物品身份管理方法、终端、微处理单元、标识设备和系统。The present disclosure relates to the technical field of article management, and in particular, to an article identity management method, terminal, micro-processing unit, identification device, and system.
背景技术Background technique
在生产生活中,难免会需要验证某些商品/物品的真实性。现有的常规防伪手段不外乎提升伪造的难度及成本,而这些手段都可以随时间推移及科技进步逐渐失效的。并且每当一种新的产品以及对应的身份确认办法出现时,其推广是需要时间与经济成本的,同时相关受众需要重新学习如何识别物品的身份,进而会消耗大量的社会资源,缺乏一种长期的一劳永逸的办法。In production life, it is inevitable to verify the authenticity of certain goods / items. Existing conventional anti-counterfeiting methods are nothing more than increasing the difficulty and cost of counterfeiting, and these methods can gradually fail over time and scientific and technological progress. And every time a new product and corresponding identity confirmation method appear, its promotion takes time and economic cost, and the relevant audience needs to relearn how to identify the identity of the item, which will consume a lot of social resources, lacking a kind of Long-term once and for all approach.
另外,由于目前物品的身份识别以及防伪手段一般以物品或商品的发布管理方来最终裁决其真实性,由于其采用中心化的裁决方式,因此没有有效办法杜绝管理方可能出现的人为或非人为错误。此外即使提高防伪手段使得难易伪造,也无法避免身份套用的问题,例如赝品使用正品的包装。In addition, because the current item identification and anti-counterfeiting methods generally use the release management of the article or commodity to ultimately determine its authenticity, and because it uses a centralized determination method, there is no effective way to eliminate man-made or non-man-made things that may occur to the management error. In addition, even if the improvement of anti-counterfeiting methods makes it difficult to counterfeit, the problem of identity application cannot be avoided, such as the use of genuine packaging for fakes.
因此,如何在不提高物品或商品受众学习成本的情况下,提供一种能够无法伪造或套用身份,以及能够避免在管理过程中出错物品身份管理机制,是目前亟需解决的为题。Therefore, how to provide an identity management mechanism that can not forge or apply identities and avoid mistakes in the management process without increasing the learning cost of the audience of items or goods is an urgent problem to be solved.
发明内容Summary of the Invention
本公开为了克服上述问题,提供一种物品身份管理方法、终端、微处理单元、标识设备和系统。In order to overcome the above problems, the present disclosure provides an article identity management method, terminal, micro-processing unit, identification device, and system.
为了实现上述目的,本公开的第一方面,提供一种物品身份管理方法,应用于终端,所述方法包括:To achieve the above object, a first aspect of the present disclosure provides a method for managing an article identity, which is applied to a terminal, and the method includes:
接收第一物品中的微处理单元发送的目标信息的第一签名,所述第一签名是所述微处理单元利用存储在所述微处理单元的所述第一物品的私钥对所述目标信息进行数字签名后得到的;Receiving a first signature of target information sent by a micro-processing unit in a first item, the first signature is the micro-processing unit using the private key of the first item stored in the micro-processing unit to pair the target The information is obtained after digitally signing the information;
从区块链上获取的所述第一物品的公钥;The public key of the first item obtained from the blockchain;
通过利用所述第一物品的公钥对所述第一签名进行验证来确定所述微处理单元中记录的所述第一物品的第一身份信息的有效性。The validity of the first identity information of the first item recorded in the micro-processing unit is determined by verifying the first signature by using the public key of the first item.
可选地,所述接收第一物品中的微处理单元发送的目标信息的第一签名,所述第一签名是所述微处理单元利用存储在所述微处理单元的所述第一物品的私钥对所述目标信息进行数字签名后得到的,包括:Optionally, the receiving the first signature of the target information sent by the micro-processing unit in the first item, the first signature is the micro-processing unit using the first item stored in the micro-processing unit. The private key obtained after digitally signing the target information includes:
生成所述目标信息,所述目标信息包括随机数;Generating the target information, where the target information includes a random number;
向所述微处理单元发送所述目标信息;Sending the target information to the micro processing unit;
在所述微处理单元利用所述第一物品的私钥对所述目标信息进行数字签名后,接收所述微处理单元发送的所述第一签名。After the micro processing unit digitally signs the target information by using the private key of the first item, the micro processing unit receives the first signature sent by the micro processing unit.
可选地,所述接收第一物品中的微处理单元发送的目标信息的第一签名,所述第一签名是所述微处理单元利用存储在所述微处理单元的所述第一物品的私钥对所述目标信息进行数字签名后得到的,包括:Optionally, the receiving the first signature of the target information sent by the micro-processing unit in the first item, the first signature is the micro-processing unit using the first item stored in the micro-processing unit. The private key obtained after digitally signing the target information includes:
在所述微处理单元生成所述目标信息,并利用所述第一物品的私钥对所述目标信息进行数字签名后,接收所述微处理单元发送的所述第一签名和所述目标信息;其中,所述目标信息包括随机数或所述第一物品的身份信息。After the micro processing unit generates the target information and digitally signs the target information by using the private key of the first item, receiving the first signature and the target information sent by the micro processing unit ; Wherein the target information includes a random number or identity information of the first item.
可选地,所述方法还包括:Optionally, the method further includes:
从所述微处理单元获取所述第一物品的所述第一身份信息;Acquiring the first identity information of the first item from the micro processing unit;
根据所述第一身份信息在所述区块链中进行查询,以从所述区块链中获取所述第一物品的第二身份信息;Querying in the blockchain according to the first identity information to obtain the second identity information of the first item from the blockchain;
接收所述微处理单元发送的所述第一身份信息的第二签名,所述第二签名是所述微处理单元利用所述第一物品的私钥对所述第一身份信息进行数字签名后得到的;Receiving the second signature of the first identity information sent by the microprocessing unit, where the second signature is after the microprocessing unit digitally signs the first identity information by using the private key of the first item owned;
通过利用所述第一物品的公钥和所述第二身份信息对所述第二签名进行验证,来确定所述第一身份信息是否真实;Determining whether the first identity information is authentic by verifying the second signature by using the public key of the first item and the second identity information;
当确定第一身份信息为真实时,向所述区块链发送数据更新信息,所述数据更新信息用于所述区块链将所述第一物品的身份使用状态更新为已使用状态。When it is determined that the first identity information is true, data update information is sent to the blockchain, and the data update information is used by the blockchain to update an identity use state of the first item to a used state.
可选地,所述方法还包括:再次根据所述第一身份信息在所述区块链中进行查询,以从所述区块链中获取所述第一物品的身份使用状态;Optionally, the method further comprises: performing a query in the blockchain again according to the first identity information to obtain the identity usage status of the first item from the blockchain;
当从所述区块链中获取所述第一物品的身份使用状态为已使用状态时,将所述第一物品标识为物品身份已使用。When the identity use status of the first item obtained from the blockchain is used status, the first item is identified as the item identity used.
可选地,当所述终端位于所述第一物品流通环节上的首个节点时,所述目标信息为所述第一物品的标识信息,所述第一签名是所述微处理单元利用所述第一物品的私钥对所述标识信息进行数字签名后得到的,所述方法还包括:Optionally, when the terminal is located at the first node on the circulation of the first article, the target information is identification information of the first article, and the first signature is used by the microprocessing unit. Said method is obtained by digitally signing said identification information by said private key of said first item, said method further comprising:
通过利用所述终端的私钥对所述第一签名进行数字签名,得到第二签名;Digitally signing the first signature by using the private key of the terminal to obtain a second signature;
将所述第一签名和所述第二签名发送至所述区块链,以便在所述区块链中存储所述第一签名和所述第二签名。Sending the first signature and the second signature to the blockchain to store the first signature and the second signature in the blockchain.
可选地,当所述终端为所述第一物品流通环节上的中间节点的终端时,所述方法还包括:Optionally, when the terminal is a terminal of an intermediate node on the first article circulation link, the method further includes:
接收所述第一物品流通环节中的上一节点设备发送的第三签名;Receiving a third signature sent by a previous node device in the first article circulation link;
通过利用所述终端的私钥对所述第三签名进行数字签名,得到第四签名;Obtaining a fourth signature by digitally signing the third signature by using the private key of the terminal;
将所述第三签名和所述第四签名发送至所述区块链,以便在所述区块链中存储所述第三签名和所述第四签名。Sending the third signature and the fourth signature to the blockchain so that the third signature and the fourth signature are stored in the blockchain.
可选地,所述方法还包括:生成针对所述第一物品的信息更新请求,所述信息更新请求用于更新存储于所述区块链上的所述第一物品的信息,所述第一物品的信息包括所述第一身份信息和/或属性信息;Optionally, the method further includes: generating an information update request for the first item, where the information update request is used to update the information of the first item stored on the blockchain, and the first The information of an item includes the first identity information and / or attribute information;
通过利用所述终端的私钥对所述信息更新请求进行数字签名,得到第五签名;Obtaining a fifth signature by digitally signing the information update request by using the private key of the terminal;
向所述区块链发送所述信息更新请求以及所述第五签名,用于所述区块链上的智能合约通过所述终端的公钥对所述第五签名进行验证,并在通过验证后根据所述信息更新请求对所述区块链上的所述第一物品的信息进行更新操作,所述更新操作包括以下至少一者:信息添加、信息删除、信息修改和/或信息废止。Sending the information update request and the fifth signature to the blockchain for smart contracts on the blockchain to verify the fifth signature through the public key of the terminal, and pass the verification Then, the information of the first item on the blockchain is updated according to the information update request, and the update operation includes at least one of the following: information addition, information deletion, information modification, and / or information abolition.
第二方面,提供一种物品身份管理方法,应用于微处理单元,所述方法包括:In a second aspect, an article identity management method is provided, which is applied to a micro-processing unit, the method includes:
通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名,得到所述目标信息的第一签名,所述第一物品为所述微处理单元所在的物品;Digitally signing target information by using a private key of a first item stored in the micro processing unit to obtain a first signature of the target information, where the first item is an item in which the micro processing unit is located;
向终端发送所述第一签名,用于所述终端通过利用从区块链上获取的所述第一物品的公钥,对所述第一签名进行验证来确定所述微处理单元中记录的所述第一物品的第一身份信息的有效性。Sending the first signature to a terminal for the terminal to determine the recorded in the micro-processing unit by using the public key of the first item obtained from the blockchain to verify the first signature Validity of the first identity information of the first item.
可选地,所述通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名,得到所述目标信息的第一签名,包括:Optionally, obtaining the first signature of the target information by digitally signing the target information by using the private key of the first item stored in the micro processing unit includes:
接收所述终端发送的由所述终端生成的所述目标信息,所述目标信息包括随机数;Receiving the target information generated by the terminal and sent by the terminal, where the target information includes a random number;
通过利用所述第一物品的私钥对所述目标信息进行数字签名,得到所述第一签名。The first signature is obtained by digitally signing the target information by using the private key of the first item.
可选地,所述通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名,得到所述目标信息的第一签名,包括:Optionally, obtaining the first signature of the target information by digitally signing the target information by using the private key of the first item stored in the micro processing unit includes:
生成所述目标信息,所述目标信息包括随机数或所述第一物品的身份信息;Generating the target information, where the target information includes a random number or identity information of the first item;
通过利用所述第一物品的私钥对所述目标信息进行数字签名,得到所述第一签名。The first signature is obtained by digitally signing the target information by using the private key of the first item.
可选地,所述方法还包括:Optionally, the method further includes:
向所述终端发送所述第一物品的所述第一身份信息,用于所述终端根据 所述第一身份信息在所述区块链中查询;Sending the first identity information of the first item to the terminal for the terminal to query in the blockchain according to the first identity information;
利用所述第一物品的私钥对所述第一身份信息进行数字签名,得到所述第一身份信息的第二签名;Digitally sign the first identity information by using the private key of the first item to obtain a second signature of the first identity information;
向所述终端发送所述第二签名,用于所述终端在从所述区块链中获取所述第一物品的第二身份信息后,通过利用所述第一物品的公钥和所述第二身份信息对所述第二签名进行验证,来确定所述第一身份信息是否真实。Sending the second signature to the terminal, for the terminal to obtain the second identity information of the first item from the blockchain by using the public key of the first item and the The second identity information verifies the second signature to determine whether the first identity information is authentic.
可选地,在所述通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名之前,所述方法还包括:Optionally, before the digitally signing the target information by using the private key of the first item stored in the micro processing unit, the method further includes:
在标注设备的驱动下生成所述第一物品的公钥和私钥;Generating the public key and the private key of the first item under the driving of the labeling device;
将所述第一物品的私钥,以及所述第一物品的所述第一身份信息存储在所述微处理单元本地。The private key of the first item and the first identity information of the first item are stored locally in the micro processing unit.
可选地,所述方法还包括:将存储在所述微处理单元本地的所述第一物品的私钥设置为禁止外部设备读写。Optionally, the method further includes: setting a private key of the first item stored locally in the micro processing unit to prohibit external devices from reading and writing.
第三方面,提供一种物品身份管理方法,应用于标注设备,所述方法包括:驱动第一物品中的微处理单元生成所述第一物品的公钥和私钥;According to a third aspect, an article identity management method is provided, which is applied to a tagging device, the method comprising: driving a micro processing unit in a first article to generate a public key and a private key of the first article;
将所述第一物品的公钥上传至区块链。Upload the public key of the first item to the blockchain.
第四方面,提供一种终端,包括:In a fourth aspect, a terminal is provided, including:
第一接收模块,用于接收第一物品中的微处理单元发送的目标信息的第一签名,所述第一签名是所述微处理单元利用存储在所述微处理单元的所述第一物品的私钥对所述目标信息进行数字签名后得到的;A first receiving module, configured to receive a first signature of target information sent by a micro-processing unit in a first item, where the first signature is the micro-processing unit using the first item stored in the micro-processing unit Obtained by digitally signing the target information with a private key of
第一获取模块,用于从区块链上获取的所述第一物品的公钥;A first obtaining module, configured to obtain a public key of the first item from a blockchain;
第一验证模块,用于通过利用所述第一物品的公钥对所述第一签名进行验证来确定所述微处理单元中记录的所述第一物品的第一身份信息的有效性。A first verification module is configured to determine the validity of the first identity information of the first item recorded in the micro-processing unit by verifying the first signature by using the public key of the first item.
可选地,所述接收模块,用于:Optionally, the receiving module is configured to:
生成所述目标信息,所述目标信息包括随机数;Generating the target information, where the target information includes a random number;
向所述微处理单元发送所述目标信息;Sending the target information to the micro processing unit;
在所述微处理单元利用所述第一物品的私钥对所述目标信息进行数字签名后,接收所述微处理单元发送的所述第一签名。After the micro processing unit digitally signs the target information by using the private key of the first item, the micro processing unit receives the first signature sent by the micro processing unit.
可选地,所述接收模块,用于:Optionally, the receiving module is configured to:
在所述微处理单元生成所述目标信息,并利用所述第一物品的私钥对所述目标信息进行数字签名后,接收所述微处理单元发送的所述第一签名和所述目标信息;其中,所述目标信息包括随机数或所述第一物品的身份信息。After the micro processing unit generates the target information and digitally signs the target information by using the private key of the first item, receiving the first signature and the target information sent by the micro processing unit ; Wherein the target information includes a random number or identity information of the first item.
可选地,所述终端还包括:Optionally, the terminal further includes:
第二获取模块,用于从所述微处理单元获取所述第一物品的所述第一身份信息;A second acquisition module, configured to acquire the first identity information of the first item from the micro processing unit;
查询模块,用于根据所述第一身份信息在所述区块链中进行查询,以从所述区块链中获取所述第一物品的第二身份信息;A query module, configured to perform a query in the blockchain according to the first identity information to obtain second identity information of the first item from the blockchain;
所述第一接收模块,还用于接收所述微处理单元发送的所述第一身份信息的第二签名,所述第二签名是所述微处理单元利用所述第一物品的私钥对所述第一身份信息进行数字签名后得到的;The first receiving module is further configured to receive a second signature of the first identity information sent by the microprocessing unit, where the second signature is a private key pair used by the microprocessing unit to use the first item Obtained by digitally signing the first identity information;
第二验证模块,用于通过利用所述第一物品的公钥和所述第二身份信息对所述第二签名进行验证,来确定所述第一身份信息是否真实;A second verification module, configured to determine whether the first identity information is authentic by verifying the second signature by using the public key of the first item and the second identity information;
第一更新模块,用于当确定第一身份信息为真实时,向所述区块链发送数据更新信息,所述数据更新信息用于所述区块链将所述第一物品的身份使用状态更新为已使用状态。A first update module, configured to: when it is determined that the first identity information is true, send data update information to the blockchain, the data update information being used by the blockchain to use the identity status of the first item Updated to Used.
可选地,所述终端还包括:Optionally, the terminal further includes:
所述查询模块,还用于再次根据所述第一身份信息在所述区块链中进行查询,以从所述区块链中获取所述第一物品的身份使用状态;The query module is further configured to query the blockchain again according to the first identity information to obtain the identity usage status of the first item from the blockchain;
标识模块,用于当从所述区块链中获取所述第一物品的身份使用状态为已使用状态时,将所述第一物品标识为物品身份已使用。An identification module, configured to identify the first item as the used item identity when the status of the use of the identity of the first item obtained from the blockchain is used.
可选地,所述终端为位于所述第一物品流通环节上的首个节点,所述目标信息为所述第一物品的标识信息,所述第一签名是所述微处理单元利用所述第一物品的私钥对所述标识信息进行数字签名后得到的,所述终端还包括:Optionally, the terminal is a first node located on the first item circulation link, the target information is identification information of the first item, and the first signature is the micro processing unit using the It is obtained by digitally signing the identification information with the private key of the first item, and the terminal further includes:
签名模块,用于通过利用所述终端的私钥对所述第一签名进行数字签名,得到第二签名;A signature module, configured to digitally sign the first signature by using the private key of the terminal to obtain a second signature;
发送模块,用于将所述第一签名和所述第二签名发送至所述区块链,以便在所述区块链中存储所述第一签名和所述第二签名。A sending module is configured to send the first signature and the second signature to the blockchain, so that the first signature and the second signature are stored in the blockchain.
可选地,所述终端为所述第一物品流通环节上的中间节点的终端,所述终端还包括:Optionally, the terminal is a terminal of an intermediate node in the first article circulation link, and the terminal further includes:
第二接收模块,用于接收所述第一物品流通环节中的上一节点设备发送的第三签名;A second receiving module, configured to receive a third signature sent by a previous node device in the first article circulation link;
签名模块,用于通过利用所述终端的私钥对所述第三签名进行数字签名,得到第四签名;A signature module, configured to digitally sign the third signature by using the private key of the terminal to obtain a fourth signature;
发送模块,用于将所述第三签名和所述第四签名发送至所述区块链,以便在所述区块链中存储所述第三签名和所述第四签名。A sending module, configured to send the third signature and the fourth signature to the blockchain, so that the third signature and the fourth signature are stored in the blockchain.
可选地,所述装置还包括:Optionally, the apparatus further includes:
第二更新模块,用于生成针对所述第一物品的信息更新请求,所述信息更新请求用于更新存储于所述区块链上的所述第一物品的信息,所述第一物品的信息包括所述第一身份信息和/或属性信息;A second update module, configured to generate an information update request for the first item, where the information update request is used to update the information of the first item stored on the blockchain, The information includes the first identity information and / or attribute information;
签名模块,用于通过利用所述终端的私钥对所述信息更新请求进行数字 签名,得到第五签名;A signature module, configured to digitally sign the information update request by using the private key of the terminal to obtain a fifth signature;
发送模块,用于向所述区块链发送所述信息更新请求以及所述第五签名,用于所述区块链上的智能合约通过所述终端的公钥对所述第五签名进行验证,并在通过验证后根据所述信息更新请求对所述区块链上的所述第一物品的信息进行更新操作,所述更新操作包括以下至少一者:信息添加、信息删除、信息修改和/或信息废止。A sending module, configured to send the information update request and the fifth signature to the blockchain, and be used by a smart contract on the blockchain to verify the fifth signature through the public key of the terminal And, after passing the verification, perform an update operation on the information of the first item on the blockchain according to the information update request, the update operation includes at least one of the following: information addition, information deletion, information modification, and / Or the information is discontinued.
第五方面,提供一种微处理单元,包括:In a fifth aspect, a microprocessing unit is provided, including:
签名模块,用于通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名,得到所述目标信息的第一签名,所述第一物品为所述微处理单元所在的物品;A signature module, configured to digitally sign target information by using a private key of a first item stored in the micro processing unit to obtain a first signature of the target information, where the first item is where the micro processing unit is located Items
发送模块,用于向终端发送所述第一签名,用于所述终端通过利用从区块链上获取的所述第一物品的公钥,对所述第一签名进行验证来确定所述微处理单元中记录的所述第一物品的第一身份信息的有效性。A sending module, configured to send the first signature to a terminal, for the terminal to determine the micro signature by verifying the first signature by using a public key of the first item obtained from a blockchain Validity of the first identity information of the first item recorded in the processing unit.
可选地,所述签名模块,用于:Optionally, the signature module is configured to:
接收所述终端发送的由所述终端生成的所述目标信息,所述目标信息包括随机数;Receiving the target information generated by the terminal and sent by the terminal, where the target information includes a random number;
通过利用所述第一物品的私钥对所述目标信息进行数字签名,得到所述第一签名。The first signature is obtained by digitally signing the target information by using the private key of the first item.
可选地,所述签名模块,用于:生成所述目标信息,所述目标信息包括随机数或所述第一物品的身份信息;Optionally, the signature module is configured to generate the target information, where the target information includes a random number or identity information of the first item;
通过利用所述第一物品的私钥对所述目标信息进行数字签名,得到所述第一签名。The first signature is obtained by digitally signing the target information by using the private key of the first item.
可选地,还包括:发送模块,用于向所述终端发送所述第一物品的所述第一身份信息,用于所述终端根据所述第一身份信息在所述区块链中查询;Optionally, it further comprises: a sending module, configured to send the first identity information of the first item to the terminal for the terminal to query in the blockchain according to the first identity information ;
所述签名模块,还用于利用所述第一物品的私钥对所述第一身份信息进行数字签名,得到所述第一身份信息的第二签名;The signature module is further configured to digitally sign the first identity information by using the private key of the first item to obtain a second signature of the first identity information;
所述发送模块,还用于向所述终端发送所述第二签名,用于所述终端在从所述区块链中获取所述第一物品的第二身份信息后,通过利用所述第一物品的公钥和所述第二身份信息对所述第二签名进行验证,来确定所述第一身份信息是否真实。The sending module is further configured to send the second signature to the terminal for the terminal to obtain the second identity information of the first item from the blockchain by using the first signature A public key of an item and the second identity information verify the second signature to determine whether the first identity information is authentic.
可选地,还包括:生成模块,用于在所述通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名之前,在标注设备的驱动下生成所述第一物品的公钥和私钥;Optionally, it further comprises: a generating module, configured to generate the first information under the drive of a labeling device before digitally signing the target information by using the private key of the first item stored in the micro processing unit. The public and private keys of the item;
存储模块,用于将所述第一物品的私钥,以及所述第一物品的所述第一身份信息存储在所述微处理单元本地。The storage module is configured to store a private key of the first item and the first identity information of the first item locally in the micro processing unit.
可选地,还包括:设置模块,用于将存储在所述微处理单元本地的所述 第一物品的私钥设置为禁止外部设备读写。Optionally, it further includes a setting module, configured to set a private key of the first item stored locally in the micro processing unit to prohibit external devices from reading and writing.
第六方面,提供一种标注设备,包括:According to a sixth aspect, a marking device is provided, including:
生成模块,用于驱动第一物品中的微处理单元生成所述第一物品的公钥和私钥;A generating module for driving a micro-processing unit in the first item to generate a public key and a private key of the first item;
上传模块,用于将所述第一物品的公钥上传至区块链。An uploading module is used to upload the public key of the first item to the blockchain.
第七方面,提供一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现第一方面所述方法的步骤。According to a seventh aspect, a computer-readable storage medium is provided, on which a computer program is stored, characterized in that when the computer program is executed by a processor, the steps of the method according to the first aspect are implemented.
第八方面,提供一种终端,包括:An eighth aspect provides a terminal, including:
存储器,其上存储有计算机程序;A memory on which a computer program is stored;
处理器,用于执行所述存储器中的所述计算机程序,以实现第一方面所述方法的步骤。A processor, configured to execute the computer program in the memory to implement the steps of the method according to the first aspect.
第九方面,提供一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现第二方面所述方法的步骤。In a ninth aspect, a computer-readable storage medium is provided, on which a computer program is stored, and when the computer program is executed by a processor, implements the steps of the method in the second aspect.
第十方面,提供一种微处理单元,包括:In a tenth aspect, a microprocessing unit is provided, including:
存储器,其上存储有计算机程序;A memory on which a computer program is stored;
处理器,用于执行所述存储器中的所述计算机程序,以实现第二方面所述方法的步骤。A processor, configured to execute the computer program in the memory to implement the steps of the method according to the second aspect.
第十一方面,提供一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现第三方面所述方法的步骤。According to an eleventh aspect, a computer-readable storage medium is provided, on which a computer program is stored, and when the computer program is executed by a processor, the steps of the method according to the third aspect are implemented.
第十二方面,提供一种微处理单元,包括:In a twelfth aspect, a microprocessing unit is provided, including:
存储器,其上存储有计算机程序;A memory on which a computer program is stored;
处理器,用于执行所述存储器中的所述计算机程序,以实现第三方面所述方法的步骤。A processor, configured to execute the computer program in the memory to implement the steps of the method according to the third aspect.
第十三方面,提供一种物品管理系统,包括:终端、位于物品中的微处理单元以及标识设备;According to a thirteenth aspect, an article management system is provided, including: a terminal, a micro-processing unit located in the article, and an identification device;
所述终端用于实现第一方面所述方法的步骤;The terminal is configured to implement the steps of the method according to the first aspect;
所述微处理单元用于实现第二方面所述方法的步骤;The micro processing unit is configured to implement the steps of the method according to the second aspect;
所述标识设备用于实现第三方面所述方法的步骤。The identification device is configured to implement the steps of the method according to the third aspect.
在上述技术方案,通过在物品中设置微处理单元,能够通过标注设备驱动微处理单元生成物品的公钥和私钥,并且通过标注设备将物品的公钥发送至区块链进行保存。终端在进行物品的身份有效性识别时,物品中的微处理单元能够利用存储在该微处理单元的物品的私钥对目标信息进行数字签名并将其发送至该终端,从而终端根据区块链上获取的该物品的公钥,对接收到的签名进行验证,从而能够确定该微处理单元中记录的物品的身份信息的有效性。由于物品的公钥由标注设备存储在区块链中,因此物品与其对应的公钥具备不可篡改的绑定关系,而物品的私钥设置在物品中微处理单元,在 物品完整的情况下难易获取该微处理单元,因此能够避免身份被伪造或套用的问题,并且在进行验证时,只需要能够访问该区块链的终端和该物品即可,无需掌握额外的知识或额外的设备,因此不会提高物品受众在防伪识别方面的学习成本。另外,由于采用了基于区块链的验证方式,因此能够避免由于中心化的真伪裁决方式导致的出错问题。In the above technical solution, by providing a micro-processing unit in the article, the micro-processing unit can be driven by the tagging device to generate the public and private keys of the article, and the public key of the article is sent to the blockchain for storage via the tagging device. When the terminal performs identification of the item's identity, the micro-processing unit in the item can use the private key of the item stored in the micro-processing unit to digitally sign the target information and send it to the terminal, so that the terminal according to the blockchain The public key of the item obtained on the Internet is used to verify the received signature, so that the validity of the identity information of the item recorded in the micro processing unit can be determined. Because the public key of the item is stored in the blockchain by the tagging device, the item and its corresponding public key have an untamperable binding relationship, and the private key of the item is set in the microprocessing unit in the item, which is difficult when the item is complete The micro processing unit is easy to obtain, so the problem of identity forgery or application can be avoided, and when verifying, only the terminal and the item of the blockchain can be accessed, and no additional knowledge or additional equipment is required. Therefore, the learning cost of the object audience in anti-counterfeit identification will not be increased. In addition, because the verification method based on the blockchain is used, it is possible to avoid errors caused by the centralized authentication method.
本公开的其他特征和优点将在随后的具体实施方式部分予以详细说明。Other features and advantages of the present disclosure will be described in detail in the detailed description section that follows.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1是根据本公开一示例性实施例示出的一种物品身份管理方法的流程示意图。Fig. 1 is a schematic flowchart of an article identity management method according to an exemplary embodiment of the present disclosure.
图2是根据本公开一示例性实施例示出的一种物品身份管理方法的流程示意图。Fig. 2 is a schematic flowchart of an article identity management method according to an exemplary embodiment of the present disclosure.
图3是根据图1所示实施例示出的另一种物品身份管理方法的流程示意图。FIG. 3 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 1.
图4是根据图2所示实施例示出的另一种物品身份管理方法的流程示意图。FIG. 4 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 2.
图5是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图。Fig. 5 is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure.
图6a是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图。Fig. 6a is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure.
图6b是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图。Fig. 6b is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure.
图7是根据本公开一示例性实施例示出的一种商品流通环节示意图。Fig. 7 is a schematic diagram of a commodity circulation link according to an exemplary embodiment of the present disclosure.
图8是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图。Fig. 8 is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure.
图9是根据本公开一示例性实施例示出的一种物品身份管理方法的流程示意图。Fig. 9 is a schematic flowchart of an article identity management method according to an exemplary embodiment of the present disclosure.
图10是根据图9所示实施例示出的另一种物品身份管理方法的流程示意图。FIG. 10 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 9.
图11是根据图9所示实施例示出的另一种物品身份管理方法的流程示意图。FIG. 11 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 9.
图12是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图。Fig. 12 is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure.
图13是根据本公开一示例性实施例示出的一种终端的框图。Fig. 13 is a block diagram showing a terminal according to an exemplary embodiment of the present disclosure.
图14是根据本公开一示例性实施例示出的另一种终端的框图。Fig. 14 is a block diagram showing another terminal according to an exemplary embodiment of the present disclosure.
图15是根据本公开一示例性实施例示出的又一种终端的框图。Fig. 15 is a block diagram showing still another terminal according to an exemplary embodiment of the present disclosure.
图16是根据本公开一示例性实施例示出的又一种终端的框图。Fig. 16 is a block diagram showing still another terminal according to an exemplary embodiment of the present disclosure.
图17是根据本公开一示例性实施例示出的又一种终端的框图。Fig. 17 is a block diagram showing still another terminal according to an exemplary embodiment of the present disclosure.
图18是根据本公开一示例性实施例示出的又一种终端的框图。Fig. 18 is a block diagram showing still another terminal according to an exemplary embodiment of the present disclosure.
图19是根据本公开一示例性实施例示出的一种微处理单元的框图。Fig. 19 is a block diagram showing a micro processing unit according to an exemplary embodiment of the present disclosure.
图20是根据本公开一示例性实施例示出的另一种微处理单元的框图。Fig. 20 is a block diagram showing another micro processing unit according to an exemplary embodiment of the present disclosure.
图21是根据本公开一示例性实施例示出的一种标注设备的框图。Fig. 21 is a block diagram showing a labeling device according to an exemplary embodiment of the present disclosure.
图22是根据本公开一示例性实施例示出的一种物品管理系统的结构图。Fig. 22 is a structural diagram of an article management system according to an exemplary embodiment of the present disclosure.
图23是根据本公开一示例性实施例示出的另一种物品管理系统的结构图。Fig. 23 is a structural diagram of another article management system according to an exemplary embodiment of the present disclosure.
图24是根据本公开一示例性实施例示出的一种电子设备的结构图。Fig. 24 is a structural diagram of an electronic device according to an exemplary embodiment of the present disclosure.
具体实施方式detailed description
以下结合附图对本公开的具体实施方式进行详细说明。应当理解的是,此处所描述的具体实施方式仅用于说明和解释本公开,并不用于限制本公开。Hereinafter, specific embodiments of the present disclosure will be described in detail with reference to the drawings. It should be understood that the specific embodiments described herein are only used to illustrate and explain the disclosure, and are not intended to limit the disclosure.
图1是根据本公开一示例性实施例示出的一种物品身份管理方法的流程示意图,该方法应用于标注设备,如图1所示,该方法包括以下步骤:Fig. 1 is a schematic flowchart of an article identity management method according to an exemplary embodiment of the present disclosure. The method is applied to a labeling device. As shown in Fig. 1, the method includes the following steps:
步骤101,驱动第一物品中的微处理单元生成该第一物品的公钥和私钥。In step 101, the micro processing unit in the first article is driven to generate a public key and a private key of the first article.
其中,第一物品可以是任意物品或商品,微处理单元设置在该第一物品的内部,该微处理单元在该第一物品中的安装方式可以为:在该第一物品成形后,需要对该第一物品进行物理上的破坏才可取出的安装方式。该微处理单元可以为微处理芯片,其上可以包含微处理器及天线/触点。示例的,该微处理器内部可以安装用于实现该方法的小应用程式(applet),该applet可以用于生成该第一物品的公私钥对,或者也可以通过硬件的方式实现该applet的功能,例如在微处理器内部设置用于生成该第一物品的公私钥对的硬件模块。该微处理单元与终端通信的方式可以采用NFC(Near Field Communication,近场通信)等方式。以NFC为例,当标注设备与第一物品中的微处理单元的距离达到NFC的通信距离时,该标注设备可以发起标注(或者说注册)过程,可以通过NFC驱动该微处理单元生成该第一物品的密钥对,包括该第一物品的公钥和私钥。The first item may be any item or commodity, and the micro processing unit is disposed inside the first item. The micro processing unit may be installed in the first item in the following manner: After the first item is formed, the An installation method in which the first article can be physically removed before being removed. The micro processing unit may be a micro processing chip, which may include a microprocessor and an antenna / contact. For example, an applet for implementing the method may be installed inside the microprocessor, the applet may be used to generate a public-private key pair of the first item, or the function of the applet may also be implemented by hardware. For example, a hardware module for generating a public-private key pair of the first item is provided inside the microprocessor. The communication method between the micro processing unit and the terminal may adopt NFC (Near Field Communication). Taking NFC as an example, when the distance between the tagging device and the micro processing unit in the first item reaches the NFC communication distance, the tagging device can initiate a tagging (or registration) process, and the micro processing unit can be driven to generate the first A key pair for an item, including the public and private keys of the first item.
步骤102,在从该微处理单元获取该第一物品的公钥后,将该第一物品的公钥上传至区块链。Step 102: After obtaining the public key of the first item from the micro processing unit, upload the public key of the first item to the blockchain.
其中,在微处理单元生成该第一物品的公钥和私钥后,该标注设备将从微处理单元获取该第一物品的公钥上传至区块链进行存储,该第一物品的私钥则保存在该微处理单元本地,并且,存储在该微处理单元的该第一物品的私钥可以被设置为禁止外部设备读写,该微处理单元可以读取该第一物品的 私钥,不可对该第一物品的私钥进行写操作。Wherein, after the micro processing unit generates the public key and the private key of the first item, the marking device uploads the public key of the first item from the micro processing unit to the blockchain for storage, and the private key of the first item It is stored locally in the micro processing unit, and the private key of the first item stored in the micro processing unit may be set to prohibit external devices from reading and writing, and the micro processing unit may read the private key of the first item, The private key of the first item cannot be written.
可选的,在将该第一物品的公钥上传至区块链时,也可以将该第一物品的身份信息、属性信息共同上传至区块链进行存储。在该微处理单元上除了存储该第一物品的私钥外,还可以存储该第一物品的身份信息,以及属性信息,并且可选的,该第一物品的身份信息,以及属性信息也可以不上传至区块链,而只存储在第一物品的微处理单元中,当后续用于识别物品的终端验证了该第一物品的身份信息是有效的时,可以从微处理单元中获取物品的身份信息、属性信息。其中,该微处理单元中存储的该第一物品的身份信息,以及属性信息可以由该标注设备发送给该微处理单元,或者也可以是在为该第一物品装配该微处理单元由其他设备写入芯片的。Optionally, when the public key of the first item is uploaded to the blockchain, the identity information and attribute information of the first item may also be uploaded to the blockchain for storage. In addition to storing the private key of the first item, the micro-processing unit may also store the identity information and attribute information of the first item, and optionally, the identity information and attribute information of the first item may also be stored. Instead of uploading to the blockchain, it is only stored in the micro-processing unit of the first item. When the subsequent terminal for identifying the item verifies that the identity information of the first item is valid, the item can be obtained from the micro-processing unit Identity information, attribute information. The identification information and attribute information of the first item stored in the micro-processing unit may be sent to the micro-processing unit by the tagging device, or the micro-processing unit may be assembled for the first item by other devices. Write to the chip.
图2是根据本公开一示例性实施例示出的一种物品身份管理方法的流程示意图,该方法应用于终端,如图2所示,该方法包括以下步骤:Fig. 2 is a schematic flowchart of an article identity management method according to an exemplary embodiment of the present disclosure. The method is applied to a terminal. As shown in Fig. 2, the method includes the following steps:
步骤201,接收第一物品中的微处理单元发送的目标信息的第一签名,该第一签名是该微处理单元利用存储在该微处理单元的该第一物品的私钥对该目标信息进行数字签名后得到的。Step 201: Receive a first signature of target information sent by a micro-processing unit in a first item, where the first signature is the micro-processing unit using the private key of the first item stored in the micro-processing unit to perform the target information on the target information. Obtained after digital signature.
步骤202,从区块链上获取的第一物品的公钥。Step 202: Obtain the public key of the first item from the blockchain.
步骤203,通过利用该第一物品的公钥对该第一签名进行验证来确定该微处理单元中记录的该第一物品的第一身份信息的有效性。Step 203: Determine the validity of the first identity information of the first item recorded in the micro-processing unit by verifying the first signature by using the public key of the first item.
其中,在验证时该终端通过该目标信息的原文、从区块链上获取的第一物品的公钥即可验证该第一签名,当该第一签名通过验证时,可以确认该微处理单元中记录的该第一物品的第一身份信息有效,但该第一签名未能通过验证时,确认该第一身份信息无效。The first signature can be verified by the terminal through the original text of the target information and the public key of the first item obtained from the blockchain during verification. When the first signature passes the verification, the micro processing unit can be confirmed. When the first identity information of the first item recorded in the valid is valid, but the first signature fails to be verified, it is confirmed that the first identity information is invalid.
由于物品的公钥由标注设备存储在区块链中,因此物品与其对应的公钥具备不可篡改的绑定关系,而物品的私钥设置在物品中微处理单元,在物品完整的情况下难易获取该微处理单元,因此能够避免身份被伪造或套用的问题,并且在进行验证时,只需要能够访问该区块链的终端和该物品即可,无需掌握额外的知识或额外的设备,因此不会提高物品受众在防伪识别方面的学习成本。另外,由于采用了基于区块链的验证方式,因此能够避免由于中心化的真伪裁决方式导致的出错问题。Because the public key of the item is stored in the blockchain by the tagging device, the item and its corresponding public key have an untamperable binding relationship, and the private key of the item is set in the microprocessing unit in the item, which is difficult when the item is complete The micro processing unit is easy to obtain, so the problem of identity forgery or application can be avoided, and when verifying, only the terminal and the item of the blockchain can be accessed, and no additional knowledge or additional equipment is required. Therefore, the learning cost of the object audience in anti-counterfeit identification will not be increased. In addition, because the verification method based on the blockchain is used, it is possible to avoid errors caused by the centralized authentication method.
另外,该目标信息可以由该终端生成并发送给第一物品中的微处理单元,也可以由该微处理单元生成,或者也可以利用微处理单元中已存储的信息作为该目标信息。示例的,可以如图3和图4所示。In addition, the target information may be generated by the terminal and sent to the micro processing unit in the first item, or may be generated by the micro processing unit, or the information stored in the micro processing unit may be used as the target information. An example can be shown in Figures 3 and 4.
图3是根据图1所示实施例示出的另一种物品身份管理方法的流程示意图,该方法应用于终端,如图3所示,步骤201所述的:接收第一物品中的微处理单元发送的目标信息的第一签名的步骤可以包括:FIG. 3 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 1. The method is applied to a terminal. As shown in FIG. 3, as described in step 201: receiving a micro-processing unit in a first article The step of sending the first signature of the target information may include:
步骤2011,生成该目标信息,该目标信息包括随机数。In step 2011, the target information is generated, and the target information includes a random number.
步骤2012,向该微处理单元发送该目标信息。Step 2012: Send the target information to the micro processing unit.
步骤2013,在所述微处理单元利用该第一物品的私钥对该目标信息进行数字签名后,接收该微处理单元发送的第一签名。Step 2013: After the micro processing unit digitally signs the target information by using the private key of the first item, receive the first signature sent by the micro processing unit.
即由终端随机生成一个随机数,然后将该随机数发送给第一物品中的微处理单元,微处理单元在得到该随机数后,利用微处理单元中存储的该第一物品的私钥对该随机数进行数字签名即可得到该第一签名,然后该微处理单元将该第一签名返回给终端,以供终端对该第一签名进行验证。That is, the terminal randomly generates a random number, and then sends the random number to the micro processing unit in the first item. After the micro processing unit obtains the random number, it uses the private key pair of the first item stored in the micro processing unit. The random number can be digitally signed to obtain the first signature, and then the micro processing unit returns the first signature to the terminal for the terminal to verify the first signature.
图4是根据图2所示实施例示出的另一种物品身份管理方法的流程示意图,该方法应用于终端,如图4所示,步骤201所述的:接收第一物品中的微处理单元发送的目标信息的第一签名的步骤可以包括:FIG. 4 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 2. The method is applied to a terminal. As shown in FIG. 4, step 201: receiving a micro-processing unit in a first article The step of sending the first signature of the target information may include:
步骤2014,在该微处理单元生成该目标信息,并利用该第一物品的私钥对该目标信息进行数字签名后,接收该微处理单元发送的该第一签名和该目标信息。其中,该目标信息包括随机数或该第一物品的身份信息。In step 2014, after the micro processing unit generates the target information and digitally signs the target information by using the private key of the first item, the micro processing unit receives the first signature and the target information sent by the micro processing unit. The target information includes a random number or identity information of the first item.
示例的,当终端和该第一物品的微处理单元距离达到通信距离,并触发验证后,可以在终端的驱动下,由该微处理单元生成一个随机数,并利用微处理单元中存储的该第一物品的私钥对该随机数进行数字签名即可得到该第一签名,然后该微处理单元将该第一签名以及该随机数一起返回给终端,以供终端对该第一签名进行验证。For example, when the distance between the terminal and the micro-processing unit of the first item reaches the communication distance, and the verification is triggered, the micro-processing unit may generate a random number under the drive of the terminal, and use the stored in the micro-processing unit. The first signature is obtained by digitally signing the random number of the first item's private key, and then the microprocessing unit returns the first signature and the random number to the terminal for the terminal to verify the first signature. .
或者,微处理单元可以利用微处理单元中存储的现有信息,例如该第一物品的该第一身份信息,微处理单元利用该第一物品的私钥对该第一身份信息进行数字签名得到该第一签名,然后该微处理单元将该第一签名以及该随机数一起返回给终端。Alternatively, the micro processing unit may use existing information stored in the micro processing unit, such as the first identity information of the first item, and the micro processing unit may obtain the first identity information by digitally signing the first identity information using the first item ’s private key. The first signature, and then the micro processing unit returns the first signature to the terminal together with the random number.
进一步的,图5是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图,该方法应用于终端,该方法提供了一种查验物品身份真实性的方法,如图5所示,该方法还包括以下步骤:Further, FIG. 5 is a schematic flowchart of another method for managing an item's identity according to an exemplary embodiment of the present disclosure. The method is applied to a terminal. The method provides a method for checking the authenticity of an item's identity, as shown in FIG. 5. As shown, the method also includes the following steps:
步骤204,从该微处理单元获取该第一物品的该第一身份信息。Step 204: Obtain the first identity information of the first item from the micro processing unit.
步骤205,根据该第一身份信息在该区块链中进行查询,以从该区块链中获取该第一物品的第二身份信息。Step 205: Query in the blockchain according to the first identity information to obtain the second identity information of the first item from the blockchain.
即先从第一物品的微处理单元中获取其存储的第一身份信息,并以该第一身份信息作为查询依据,在该区块链中查找该存储在区块链中的该第一物品的第二身份信息,该第二身份信息是通过步骤102中所示的方法,由标识设备存储在区块链中的,是该第一物品的真实的身份信息,因此可以用于验证该微处理单元中的第一身份信息的真实性。That is, the first identity information stored in the micro-processing unit of the first item is first obtained, and the first identity information is used as a query basis to find the first item stored in the blockchain in the blockchain. The second identity information, which is stored in the blockchain by the identification device by the method shown in step 102, is the real identity information of the first item, so it can be used to verify the micro The authenticity of the first identity information in the processing unit.
步骤206,接收该微处理单元发送的该第一身份信息的第二签名,该第二签名是该微处理单元利用该第一物品的私钥对该第一身份信息进行数字签名后得到的。Step 206: Receive a second signature of the first identity information sent by the microprocessing unit, where the second signature is obtained after the microprocessing unit digitally signs the first identity information by using the private key of the first item.
步骤207,通过利用该第一物品的公钥和该第二身份信息对该第二签名进行验证,来确定该第一身份信息是否真实。Step 207: Determine whether the first identity information is authentic by verifying the second signature by using the public key of the first item and the second identity information.
示例的,由于在验证某一信息的签名时,需要该信息的原文,以及签名时的私钥对应的公钥。因此,基于该原理,在获取了该第二身份信息后,需要该第一身份信息与该第二身份信息一致,那么该第一身份信息的该第二签名才可以通过验证。因此,如果利用该第一物品的公钥对该第二签名进行验证时,该第二签名如果能够通过验证时,可以确定第一身份信息为真实的;否则,如果未通过验证,则说明该第一身份信息不是真实的。另外,在微处理单元发送第二签名前,可以首先确认该终端是否是授权终端。示例的,确认该终端是否是授权终端的鉴权方法例如,可以通过密码、秘钥等方式实现。For example, when verifying the signature of a certain message, the original text of the message and the public key corresponding to the private key when signing are needed. Therefore, based on this principle, after the second identity information is acquired, the first identity information needs to be consistent with the second identity information, and then the second signature of the first identity information can pass verification. Therefore, if the second signature is verified using the public key of the first item, if the second signature can pass the verification, the first identity information can be determined to be authentic; otherwise, if the verification fails, the The first identity information is not real. In addition, before the micro processing unit sends the second signature, it may first confirm whether the terminal is an authorized terminal. By way of example, an authentication method for confirming whether the terminal is an authorized terminal may be implemented by, for example, a password, a secret key, or the like.
步骤208,当确定第一身份信息为真实时,向该区块链发送数据更新信息,该数据更新信息用于该区块链将该第一物品的身份使用状态更新为已使用状态。Step 208: When it is determined that the first identity information is true, send data update information to the blockchain, and the data update information is used by the blockchain to update the identity use status of the first item to a used status.
示例的,为了保证提供给用户的物品是新的,对于每个物品在首次执行步骤204至207所示的物品查询验真的方法后,可以执行步骤208,即在查询该第一物品的第一身份信息的真伪后,需要向区块链中发送数据更新信息,以便在区块链中将第一物品的身份使用状态更新为已使用状态。For example, in order to ensure that the items provided to the user are new, after performing the item query verification method shown in steps 204 to 207 for each item for the first time, step 208 may be performed, that is, the first item After the identity information is true or false, data update information needs to be sent to the blockchain in order to update the identity usage status of the first item to the used status in the blockchain.
例如,该第一物品为一电子产品,比如手机,当该终端从该手机中的用于执行上述方法的微处理单元中获取到该手机的第一身份信息的第二签名后,从区块链上查询该手机的第二身份信息,并对该第二签名进行验证,当通过验证时,确认该第一身份信息真实,并在区块链上将该手机更新为已激活。其中该手机的第一身份信息例如可以是IMEI(International Mobile Equipment Identity,国际移动设备识别码),SN(Serial Number,序列号)等信息。或者,该物品可以是非电子设备的商品,例如一瓶酒,该第一身份信息可以是这瓶酒的识别码(该识别码具有唯一性),传统的识别码多以密码覆膜卡(俗称刮刮卡)的形式贴附在商品上,或者以二维码或者镭射码的形式设置在商品包装的内部,本实施例中该识别码可以存储在这瓶酒的内的微处理单元中,其验证方法与上述手机相同,不再赘述。For example, the first item is an electronic product, such as a mobile phone. When the terminal obtains the second signature of the first identity information of the mobile phone from the micro-processing unit in the mobile phone that is used to execute the above method, it retrieves the block from the block. Query the second identity information of the mobile phone on the chain and verify the second signature. When the verification is passed, it is confirmed that the first identity information is true, and the mobile phone is updated to be activated on the blockchain. The first identity information of the mobile phone may be information such as IMEI (International Mobile Equipment Identity), SN (Serial Number, serial number), and the like. Alternatively, the item may be a non-electronic product, such as a bottle of wine, and the first identity information may be an identification code of the bottle of wine (the identification code is unique). Traditional identification codes are mostly password-coated cards (commonly known as Attached to the product in the form of a scratch card), or placed inside the product packaging in the form of a two-dimensional code or a laser code. In this embodiment, the identification code can be stored in a micro-processing unit inside the bottle of wine. The verification method is the same as the above-mentioned mobile phone, and will not be described again.
可选的,还可以进一步包括以下步骤:Optionally, it may further include the following steps:
步骤209,再次根据该第一身份信息在该区块链中进行查询,以从该区块链中获取该第一物品的身份使用状态。Step 209: Query the blockchain again according to the first identity information to obtain the identity usage status of the first item from the blockchain.
步骤210,当从该区块链中获取该第一物品的身份使用状态为已使用状态时,将该第一物品标识为物品身份已使用。Step 210: When the status of using the identity of the first item obtained from the blockchain is used, the first item is identified as being used for the identity of the item.
即在该区块链上将该第一物品的身份使用状态更新为已使用状态后,再次根据该第一身份信息在该区块链中进行查询,以便确认区块链中该第一物品的身份使用状态是否成功更新为已使用状态。在确定该第一物品的身份使 用状态成功更新为已使用状态后,可以将该第一物品标识为物品身份已使用,例如在终端的识别页面上将该第一物品显示为物品身份已使用。That is, after the identity usage status of the first item is updated to the used status on the blockchain, a query is again performed in the blockchain based on the first identity information in order to confirm the identity of the first item in the blockchain. Whether the identity usage status was successfully updated to the used status. After it is determined that the identity usage status of the first item is successfully updated to the used status, the first item may be identified as the item identity used, for example, the first item is displayed as the item identity used on the identification page of the terminal.
进一步的,图6a是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图,该方法应用于终端,当该终端位于该第一物品流通环节上的首个节点时,该目标信息为该第一物品的标识信息,该第一签名是该微处理单元利用该第一物品的私钥对该标识信息进行数字签名后得到的,如图6a所示,该方法还包括以下步骤:Further, FIG. 6a is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure. The method is applied to a terminal. When the terminal is located at the first node of the first article circulation link, The target information is identification information of the first item, and the first signature is obtained after the microprocessing unit digitally signs the identification information by using the private key of the first item. As shown in FIG. 6a, the method further includes The following steps:
步骤211,通过利用该终端的私钥对该第一签名进行数字签名,得到第二签名。Step 211: Digitally sign the first signature by using the private key of the terminal to obtain a second signature.
步骤212,将该第一签名和该第二签名发送至该区块链,以便在该区块链中存储该第一签名和该第二签名。Step 212: Send the first signature and the second signature to the blockchain, so that the first signature and the second signature are stored in the blockchain.
后续如果要验证该第一物品是否经过了该首个节点时,可以从区块链最后中获取该第一签名和该第二签名,并利用该终端的公钥对该第二签名进行验证,当通过验证时,可以确认该第一物品该第一物品流通环节中确实经过了该终端所在的节点,即该首个节点。当未通过验证时,可以确认第一物品没有通过该首个节点。In the future, if it is to verify whether the first item has passed the first node, the first signature and the second signature can be obtained from the end of the blockchain, and the second signature is verified by using the public key of the terminal. When the verification is passed, it can be confirmed that the first item and the first item circulation link have indeed passed the node where the terminal is located, that is, the first node. When the verification fails, it can be confirmed that the first item does not pass the first node.
图6b是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图,该方法应用于终端,当所述终端为该第一物品流通环节上的中间节点的终端时,如图6b所示,该方法还包括以下步骤:Fig. 6b is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure. The method is applied to a terminal. When the terminal is a terminal of an intermediate node on the first article circulation link, such as As shown in FIG. 6b, the method further includes the following steps:
步骤213,接收该第一物品流通环节中的上一节点设备发送的第三签名。Step 213: Receive a third signature sent by a previous node device in the first article circulation link.
步骤214,通过利用该终端的私钥对该第三签名进行数字签名,得到第四签名。Step 214: Digitally sign the third signature by using the private key of the terminal to obtain a fourth signature.
步骤215,将该第三签名和该第四签名发送至该区块链,以便在该区块链中存储该第三签名和该第四签名。Step 215: Send the third signature and the fourth signature to the blockchain, so that the third signature and the fourth signature are stored in the blockchain.
即上述的步骤211-215描述了第一物品在其流通环节上每经过一个节点,都要对上一个节点发来的签名进行签名,并同步至区块链中,从而能够保证能够检测该第一物品实际经过的节点。That is, steps 211-215 described above describe that each time a first item passes through a node in its circulation link, it must sign the signature sent by the previous node and synchronize it to the blockchain to ensure that the first item can be detected. The node that an item actually passes through.
下面进行举例说明,假设该第一物品为一商品,则该第一物品流通环节上的每个节点可以看作是一个经销商(的设备),如图7所示,商品的流通环节上的节点包括经销商A、经销商B和经销商C,为了有效控制并检测该商品是否经过了某个经销商,则该商品在出厂时,可以利用该商品的私钥对该商品自身的标识信息进行数字签名,该标识信息可以是该商品的公钥,或者是其他标识,比如条码编号、商品名称等等,假设对该商品自身的标识信息(记为T0)进行数字签名后得到的是签名T1=sign(T0),则该商品在进过首个经销商A时,该经销商A首先可以根据从区块链获取的该商品的公钥对该签名T1进行验证,在通过验证后,经销商A通过自己的私钥对该签 名T1进行数字签名得到T2=sign(T1),然后将签名T2和签名T1上传至区块链。从而,在检测商品是否经过了经销商A时,监管设备可以从区块链获取到该签名T2和签名T1,并通过经销商A的公钥对签名T2进行验证,在通过验证时,可以确认商品经过了经销商A。否则,确认商品没有经过经销商A。The following is an example. Assuming that the first item is a product, each node in the circulation of the first item can be regarded as a dealer (equipment). As shown in FIG. 7, Nodes include Dealer A, Dealer B, and Dealer C. In order to effectively control and detect whether the product has passed through a dealer, the product's private key can be used to identify the product itself when it leaves the factory Digitally sign, the identification information can be the public key of the product, or other identifications, such as barcode number, product name, etc. Assuming that the digital identification of the product's own identification information (recorded as T0) is a signature T1 = sign (T0), when the product enters the first dealer A, the dealer A can first verify the signature T1 according to the public key of the product obtained from the blockchain. After passing the verification, Dealer A digitally signs the signature T1 with his own private key to obtain T2 = sign (T1), and then uploads the signature T2 and signature T1 to the blockchain. Therefore, when detecting whether the product has passed through the dealer A, the supervisory device can obtain the signature T2 and the signature T1 from the blockchain, and verify the signature T2 through the public key of the dealer A. When the verification is passed, it can confirm that The product passed through Dealer A. Otherwise, confirm that the product has not passed through Distributor A.
商品经过经销商A后,如果到达经销商B,则经销商A会将签名T2发给经销商B,经销商B该首先可以根据从区块链获取的该经销商A的公钥对该签名T2进行验证,在通过验证后,经销商B通过自己的私钥对该签名T2进行数字签名得到签名T3=sign(T2),然后将签名T3和签名T2上传至区块链。商品经过经销商B后,如果到达经销商C,则同理,经销商C可以得到经销商B发来的签名T3。After the goods pass through Dealer A, if it reaches Dealer B, Dealer A will send signature T2 to Dealer B. Dealer B should first sign the signature based on the public key of Dealer A obtained from the blockchain. T2 performs verification. After passing the verification, the dealer B digitally signs the signature T2 with his own private key to obtain a signature T3 = sign (T2), and then uploads the signature T3 and the signature T2 to the blockchain. After the goods pass through the dealer B, if the goods reach the dealer C, the dealer C can get the signature T3 from the dealer B by the same way.
通过上述方法,无需在物品和流通环节中的节点、节点和节点之间建立过多的关联关系,只需要区块链上存储的签名以及前一节点提供的签名即可确定物品是否经过了当前节点,实现简单,成本低。With the above method, there is no need to establish too many associations between the items and the nodes in the circulation link, and only the signature stored on the blockchain and the signature provided by the previous node can be used to determine whether the item has passed the current Node, easy to implement and low cost.
图8是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图,该方法应用于终端,当该终端为该第一物品流通环节上的中间节点的终端时,如图8所示,该方法还包括以下步骤:Fig. 8 is a schematic flow chart showing still another method for managing the identity of an article according to an exemplary embodiment of the present disclosure. The method is applied to a terminal. When the terminal is a terminal of an intermediate node on the first article circulation link, as shown in Fig. As shown in FIG. 8, the method further includes the following steps:
步骤216,生成针对该第一物品的信息更新请求,该信息更新请求用于更新存储于该区块链上的该第一物品的信息,该第一物品的信息包括该第一身份信息和/或属性信息。Step 216: Generate an information update request for the first item, where the information update request is used to update the information of the first item stored on the blockchain, and the information of the first item includes the first identity information and / Or attribute information.
步骤217,通过利用该终端的私钥对该信息更新请求进行数字签名,得到第五签名。Step 217: Digitally sign the information update request by using the private key of the terminal to obtain a fifth signature.
步骤218,向该区块链发送该信息更新请求以及该第五签名,用于该区块链上的智能合约通过该终端的公钥对该第五签名进行验证,并在通过验证后根据该信息更新请求对该区块链上的该第一物品的信息进行更新操作。该更新操作包括以下至少一者:信息添加、信息删除、信息修改和/或信息废止。Step 218: Send the information update request and the fifth signature to the blockchain, and the smart contract on the blockchain uses the public key of the terminal to verify the fifth signature, and after passing the verification, the fifth signature is verified according to the The information update request updates the information of the first item on the blockchain. The update operation includes at least one of the following: information addition, information deletion, information modification, and / or information revocation.
即当需要对存储于区块链上的物品的信息进行更新时,终端可以生成该信息更新请求对其进行数字签名,然后将得到的签名发送至区块链,区块链上的智能合约通过该终端的公钥对该签名进行验证,在通过验证后即可按照信息更新请求的要求更新该第一物品的信息。例如,可以暂停或废除该第一物品的身份信息,也可以更新该第一物品的属性信息,例如错误信息更正,或者对不完整的信息进行补充,或者删除某一属性信息等等。That is, when the information of the item stored on the blockchain needs to be updated, the terminal can generate the information update request to digitally sign it, and then send the obtained signature to the blockchain. The smart contract on the blockchain passes The public key of the terminal verifies the signature, and after passing the verification, the information of the first item can be updated according to the requirements of the information update request. For example, the identity information of the first article may be suspended or abolished, or the attribute information of the first article may be updated, such as correction of error information, supplementation of incomplete information, or deletion of certain attribute information.
图9是根据本公开一示例性实施例示出的一种物品身份管理方法的流程示意图,该方法应用于微处理单元,如图9所示,该方法包括以下步骤:Fig. 9 is a schematic flowchart of an article identity management method according to an exemplary embodiment of the present disclosure. The method is applied to a microprocessing unit. As shown in Fig. 9, the method includes the following steps:
步骤901,通过利用存储在该微处理单元的第一物品的私钥对目标信息进行数字签名,得到该目标信息的第一签名,该第一物品为该微处理单元所 在的物品。In step 901, a first signature of the target information is obtained by digitally signing the target information by using a private key of the first item stored in the microprocessing unit, and the first item is an item in which the microprocessing unit is located.
其中,微处理单元设置在该第一物品的内部,其安装方式可以如步骤101所述的方式,不再赘述。Wherein, the micro-processing unit is disposed inside the first article, and its installation manner may be the same as that described in step 101, and details are not described again.
步骤902,向终端发送该第一签名,用于该终端通过利用从区块链上获取的该第一物品的公钥,对该第一签名进行验证来确定该微处理单元中记录的该第一物品的第一身份信息的有效性。Step 902: Send the first signature to the terminal for the terminal to verify the first signature by using the public key of the first item obtained from the blockchain to determine the first signature recorded in the microprocessing unit. The validity of the first identity of an item.
图10是根据图9所示实施例示出的另一种物品身份管理方法的流程示意图,该方法应用于微处理单元,如图10所示,步骤901所述的:接收第一物品中的微处理单元发送的目标信息的第一签名的步骤可以包括:FIG. 10 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 9. The method is applied to a micro processing unit. As shown in FIG. 10 and described in step 901: receiving micro The first signature of the target information sent by the processing unit may include:
步骤9011,接收该终端发送的由该终端生成的该目标信息,该目标信息包括随机数。Step 9011: Receive the target information generated by the terminal and sent by the terminal, where the target information includes a random number.
步骤9012,通过利用该第一物品的私钥对该目标信息进行数字签名,得到该第一签名。Step 9012: Digitally sign the target information by using the private key of the first item to obtain the first signature.
即由终端随机生成一个随机数,然后将该随机数发送给第一物品中的微处理单元,微处理单元在得到该随机数后,利用微处理单元中存储的该第一物品的私钥对该随机数进行数字签名即可得到该第一签名,然后该微处理单元将该第一签名返回给终端,以供终端对该第一签名进行验证。That is, the terminal randomly generates a random number, and then sends the random number to the micro processing unit in the first item. After the micro processing unit obtains the random number, it uses the private key pair of the first item stored in the micro processing unit. The random number can be digitally signed to obtain the first signature, and then the micro processing unit returns the first signature to the terminal for the terminal to verify the first signature.
图11是根据图9所示实施例示出的另一种物品身份管理方法的流程示意图,该方法应用于微处理单元,如图11所示,步骤901所述的:接收第一物品中的微处理单元发送的目标信息的第一签名的步骤可以包括:FIG. 11 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 9. The method is applied to a micro processing unit. As shown in FIG. 11, step 901: receiving micro The first signature of the target information sent by the processing unit may include:
步骤9013,生成该目标信息,该目标信息包括随机数或该第一物品的身份信息。Step 9013: Generate the target information, where the target information includes a random number or identity information of the first item.
步骤9014,通过利用该第一物品的私钥对该目标信息进行数字签名,得到该第一签名。Step 9014: Digitally sign the target information by using the private key of the first item to obtain the first signature.
示例的,当终端和该第一物品的微处理单元距离达到通信距离,并触发验证后,可以在终端的驱动下,由该微处理单元生成一个随机数,并利用微处理单元中存储的该第一物品的私钥对该随机数进行数字签名即可得到该第一签名,然后该微处理单元将该第一签名以及该随机数一起返回给终端,以供终端对该第一签名进行验证。For example, when the distance between the terminal and the micro-processing unit of the first item reaches the communication distance, and the verification is triggered, the micro-processing unit may generate a random number under the driving of the terminal, and use the The first signature is obtained by digitally signing the random number of the first item's private key, and then the microprocessing unit returns the first signature and the random number to the terminal for the terminal to verify the first signature. .
或者,微处理单元可以利用微处理单元中存储的现有信息,例如该第一物品的该第一身份信息,微处理单元利用该第一物品的私钥对该第一身份信息进行数字签名得到该第一签名,然后该微处理单元将该第一签名以及该随机数一起返回给终端。Alternatively, the micro processing unit may use existing information stored in the micro processing unit, such as the first identity information of the first item, and the micro processing unit may obtain the first identity information by digitally signing the first identity information using the first item ’s private key. The first signature, and then the micro processing unit returns the first signature to the terminal together with the random number.
进一步的,图12是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图,该方法应用于微处理单元,该方法提供了一种查验物品身份真实性的方法,如图12所示,该方法还包括以下步骤:Further, FIG. 12 is a schematic flowchart of another item identity management method according to an exemplary embodiment of the present disclosure. The method is applied to a microprocessing unit. The method provides a method for checking the authenticity of an item identity, such as As shown in Figure 12, the method further includes the following steps:
步骤903,向该终端发送该第一物品的该第一身份信息,用于该终端根据该第一身份信息在该区块链中查询。Step 903: Send the first identity information of the first item to the terminal for the terminal to query in the blockchain according to the first identity information.
步骤904,利用该第一物品的私钥对该第一身份信息进行数字签名,得到该第一身份信息的第二签名。Step 904: Use the private key of the first item to digitally sign the first identity information to obtain a second signature of the first identity information.
步骤905,向该终端发送该第二签名,用于该终端在从该区块链中获取该第一物品的第二身份信息后,通过利用该第一物品的公钥和该第二身份信息对该第二签名进行验证,来确定该第一身份信息是否真实。Step 905: Send the second signature to the terminal for the terminal to use the public key of the first item and the second identity information after obtaining the second identity information of the first item from the blockchain. The second signature is verified to determine whether the first identity information is authentic.
示例的,由于在验证某一信息的签名时,需要该信息的原文,以及签名时的私钥对应的公钥。因此,基于该原理,在获取了该第二身份信息后,需要该第一身份信息与该第二身份信息一致,那么该第一身份信息的该第二签名才可以通过验证。因此,如果利用该第一物品的公钥对该第二签名进行验证时,该第二签名如果能够通过验证时,可以确定第一身份信息为真实的;否则,如果未通过验证,则说明该第一身份信息不是真实的。For example, when verifying the signature of a certain message, the original text of the message and the public key corresponding to the private key when signing are needed. Therefore, based on this principle, after the second identity information is acquired, the first identity information needs to be consistent with the second identity information, and then the second signature of the first identity information can pass verification. Therefore, if the second signature is verified using the public key of the first item, if the second signature can pass the verification, the first identity information can be determined to be authentic; otherwise, if the verification fails, the The first identity information is not real.
当确定第一身份信息为真实时,终端还需要在区块链中更新该第一物品的身份使用状态为已使用状态。具体的,可以参照步骤208至210,不再赘述。When it is determined that the first identity information is true, the terminal also needs to update the identity use status of the first item to the used status in the blockchain. Specifically, steps 208 to 210 may be referred to, and details are not described herein again.
另外,在步骤901所述的通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名之前,该方法还可以包括:In addition, before the target information is digitally signed by using the private key of the first item stored in the micro processing unit in step 901, the method may further include:
首先,在标注设备的驱动下生成该第一物品的公钥和私钥。可以参照步骤101,不再赘述。First, a public key and a private key of the first item are generated under the driving of the labeling device. Reference may be made to step 101, and details are not described again.
其次,将该第一物品的私钥,以及该第一物品的该第一身份信息存储在该微处理单元本地。其中,可以将存储在所述微处理单元本地的该第一物品的私钥设置为禁止外部设备读写,该微处理单元可以读取该第一物品的私钥,不可对该第一物品的私钥进行写操作。该第一物品的公钥则由标识设备上传至区块链,可参照步骤102,不再赘述。Secondly, the private key of the first item and the first identity information of the first item are stored locally in the micro processing unit. The private key of the first item stored locally in the micro processing unit may be set to prohibit external devices from reading and writing, the micro processing unit may read the private key of the first item, and may not The private key is written. The public key of the first item is uploaded to the blockchain by the identification device, and reference may be made to step 102, which will not be described again.
图13是根据本公开一示例性实施例示出的一种终端的框图,该终端1300可以包括:Fig. 13 is a block diagram of a terminal according to an exemplary embodiment of the present disclosure. The terminal 1300 may include:
第一接收模块1301,用于接收第一物品中的微处理单元发送的目标信息的第一签名,该第一签名是该微处理单元利用存储在该微处理单元的该第一物品的私钥对该目标信息进行数字签名后得到的;The first receiving module 1301 is configured to receive a first signature of the target information sent by the micro processing unit in the first item, where the first signature is a private key of the first item stored by the micro processing unit by the micro processing unit. Obtained after digitally signing the target information;
第一获取模块1302,用于从区块链上获取的该第一物品的公钥;A first obtaining module 1302, configured to obtain the public key of the first item from the blockchain;
第一验证模块1303,用于通过利用该第一物品的公钥对该第一签名进行验证来确定该微处理单元中记录的该第一物品的第一身份信息的有效性。A first verification module 1303 is configured to determine the validity of the first identity information of the first item recorded in the micro processing unit by verifying the first signature by using the public key of the first item.
可选的,该接收模块1301,用于:Optionally, the receiving module 1301 is configured to:
生成该目标信息,该目标信息包括随机数;Generating the target information, the target information including a random number;
向该微处理单元发送该目标信息;Sending the target information to the micro processing unit;
在该微处理单元利用该第一物品的私钥对该目标信息进行数字签名后,接收该微处理单元发送的该第一签名。After the micro processing unit digitally signs the target information using the private key of the first item, the micro processing unit receives the first signature sent by the micro processing unit.
或者,在另一种实现方式中,该接收模块1301,用于:Or, in another implementation manner, the receiving module 1301 is configured to:
在该微处理单元生成该目标信息,并利用该第一物品的私钥对该目标信息进行数字签名后,接收该微处理单元发送的该第一签名和该目标信息;After the micro-processing unit generates the target information and digitally signs the target information by using the private key of the first item, receiving the first signature and the target information sent by the micro-processing unit;
其中,该目标信息包括随机数或该第一物品的身份信息。The target information includes a random number or identity information of the first item.
可选的,图14是根据本公开一示例性实施例示出的另一种终端的框图,如图14所示,该终端1300还包括:Optionally, FIG. 14 is a block diagram of another terminal according to an exemplary embodiment of the present disclosure. As shown in FIG. 14, the terminal 1300 further includes:
第二获取模块1304,用于从该微处理单元获取该第一物品的该第一身份信息;A second obtaining module 1304, configured to obtain the first identity information of the first item from the micro processing unit;
查询模块1305,用于根据该第一身份信息在该区块链中进行查询,以从该区块链中获取该第一物品的第二身份信息;A query module 1305, configured to perform a query in the blockchain according to the first identity information to obtain the second identity information of the first item from the blockchain;
该第一接收模块1301,还用于接收该微处理单元发送的该第一身份信息的第二签名,该第二签名是该微处理单元利用该第一物品的私钥对该第一身份信息进行数字签名后得到的;The first receiving module 1301 is further configured to receive a second signature of the first identity information sent by the micro-processing unit, where the second signature is the first identity information of the micro-processing unit using the private key of the first item. Obtained after digital signature;
第二验证模块1306,用于通过利用该第一物品的公钥和该第二身份信息对该第二签名进行验证,来确定该第一身份信息是否真实;A second verification module 1306, configured to determine whether the first identity information is authentic by verifying the second signature by using the public key of the first item and the second identity information;
第一更新模块1307,用于当确定第一身份信息为真实时,向该区块链发送数据更新信息,该数据更新信息用于该区块链将该第一物品的身份使用状态更新为已使用状态。A first update module 1307 is configured to send data update information to the blockchain when it is determined that the first identity information is true, and the data update information is used by the blockchain to update the identity use status of the first item to already status of use.
可选的,图15是根据本公开一示例性实施例示出的又一种终端的框图,如图15所示,该终端还包括:Optionally, FIG. 15 is a block diagram of another terminal according to an exemplary embodiment of the present disclosure. As shown in FIG. 15, the terminal further includes:
该查询模块1305,还用于再次根据该第一身份信息在该区块链中进行查询,以从该区块链中获取该第一物品的身份使用状态;The query module 1305 is further configured to query the blockchain again according to the first identity information to obtain the identity usage status of the first item from the blockchain;
标识模块1306,用于当从该区块链中获取该第一物品的身份使用状态为已使用状态时,将该第一物品标识为物品身份已使用。The identification module 1306 is configured to identify the first item as the used item identity when the identity use status of the first item obtained from the blockchain is used.
可选的,该终端为位于该第一物品流通环节上的首个节点,该目标信息为该第一物品的标识信息,该第一签名是该微处理单元利用该第一物品的私钥对该标识信息进行数字签名后得到的,图16是根据本公开一示例性实施例示出的又一种终端的框图,如图16所示,该终端还包括:Optionally, the terminal is the first node located on the circulation of the first article, the target information is identification information of the first article, and the first signature is a private key pair used by the microprocessing unit to use the first article The identification information is obtained after being digitally signed. FIG. 16 is a block diagram of another terminal according to an exemplary embodiment of the present disclosure. As shown in FIG. 16, the terminal further includes:
签名模块1307,用于通过利用该终端的私钥对该第一签名进行数字签名,得到第二签名;A signature module 1307, configured to digitally sign the first signature by using the private key of the terminal to obtain a second signature;
发送模块1308,用于将该第一签名和该第二签名发送至该区块链,以便在该区块链中存储该第一签名和该第二签名。A sending module 1308 is configured to send the first signature and the second signature to the blockchain, so that the first signature and the second signature are stored in the blockchain.
可选的,该终端为该第一物品流通环节上的中间节点的终端,图17是根据本公开一示例性实施例示出的又一种终端的框图,如图17所示,该终 端还包括:Optionally, the terminal is a terminal of an intermediate node in the first article circulation link. FIG. 17 is a block diagram of another terminal according to an exemplary embodiment of the present disclosure. As shown in FIG. 17, the terminal further includes :
第二接收模块1309,用于接收该第一物品流通环节中的上一节点设备发送的第三签名;A second receiving module 1309, configured to receive a third signature sent by a previous node device in the first article circulation link;
签名模块1307,用于通过利用该终端的私钥对该第三签名进行数字签名,得到第四签名;A signature module 1307, configured to digitally sign the third signature by using the private key of the terminal to obtain a fourth signature;
发送模块1308,用于将该第三签名和该第四签名发送至该区块链,以便在该区块链中存储该第三签名和该第四签名。A sending module 1308 is configured to send the third signature and the fourth signature to the blockchain, so that the third signature and the fourth signature are stored in the blockchain.
可选的,图18是根据本公开一示例性实施例示出的又一种终端的框图,如图18所示,该终端还包括:Optionally, FIG. 18 is a block diagram of another terminal according to an exemplary embodiment of the present disclosure. As shown in FIG. 18, the terminal further includes:
第二更新模块1310,用于生成针对该第一物品的信息更新请求,该信息更新请求用于更新存储于该区块链上的该第一物品的信息,该第一物品的信息包括该第一身份信息和/或属性信息;A second update module 1310 is configured to generate an information update request for the first item, where the information update request is used to update the information of the first item stored on the blockchain, and the information of the first item includes the first item -Identity information and / or attribute information;
签名模块1307,用于通过利用该终端的私钥对该信息更新请求进行数字签名,得到第五签名;A signature module 1307, configured to digitally sign the information update request by using the private key of the terminal to obtain a fifth signature;
发送模块1308,用于向该区块链发送该信息更新请求以及该第五签名,用于该区块链上的智能合约通过该终端的公钥对该第五签名进行验证,并在通过验证后根据该信息更新请求对该区块链上的该第一物品的信息进行更新操作,该更新操作包括以下至少一者:信息添加、信息删除、信息修改和/或信息废止。A sending module 1308 is configured to send the information update request and the fifth signature to the blockchain, and the smart contract on the blockchain uses the public key of the terminal to verify the fifth signature and passes the verification. Then, the information of the first item on the blockchain is updated according to the information update request, and the update operation includes at least one of the following: information addition, information deletion, information modification, and / or information abolition.
图19是根据本公开一示例性实施例示出的一种微处理单元的框图,如图19所示,该微处理单元1900包括:Fig. 19 is a block diagram of a micro processing unit according to an exemplary embodiment of the present disclosure. As shown in Fig. 19, the micro processing unit 1900 includes:
签名模块1901,用于通过利用存储在该微处理单元的第一物品的私钥对目标信息进行数字签名,得到该目标信息的第一签名,该第一物品为该微处理单元所在的物品;A signature module 1901, configured to digitally sign target information by using a private key of a first item stored in the micro processing unit to obtain a first signature of the target information, where the first item is an item in which the micro processing unit is located;
发送模块1902,用于向终端发送该第一签名,用于该终端通过利用从区块链上获取的该第一物品的公钥,对该第一签名进行验证来确定该微处理单元中记录的该第一物品的第一身份信息的有效性。A sending module 1902 is configured to send the first signature to a terminal, which is used by the terminal to determine the record in the micro processing unit by using the public key of the first item obtained from the blockchain to verify the first signature. The validity of the first identity information of the first item.
可选的,该签名模块1901,用于:Optionally, the signature module 1901 is used to:
接收该终端发送的由该终端生成的该目标信息,该目标信息包括随机数;Receiving the target information sent by the terminal and generated by the terminal, where the target information includes a random number;
通过利用该第一物品的私钥对该目标信息进行数字签名,得到该第一签名。The first signature is obtained by digitally signing the target information by using the private key of the first item.
可选的,该签名模块1901,用于:Optionally, the signature module 1901 is used to:
生成该目标信息,该目标信息包括随机数或该第一物品的身份信息;Generating the target information, the target information including a random number or identity information of the first item;
通过利用该第一物品的私钥对该目标信息进行数字签名,得到该第一签名。The first signature is obtained by digitally signing the target information by using the private key of the first item.
或者,在另一种实现方式中,Or, in another implementation,
该发送模块1902,用于向该终端发送该第一物品的该第一身份信息,用于该终端根据该第一身份信息在该区块链中查询;The sending module 1902 is configured to send the first identity information of the first item to the terminal for the terminal to query in the blockchain according to the first identity information;
该签名模块1901,还用于利用该第一物品的私钥对该第一身份信息进行数字签名,得到该第一身份信息的第二签名;The signature module 1901 is further configured to digitally sign the first identity information by using the private key of the first item to obtain a second signature of the first identity information;
该发送模块1902,还用于向该终端发送该第二签名,用于该终端在从该区块链中获取该第一物品的第二身份信息后,通过利用该第一物品的公钥和该第二身份信息对该第二签名进行验证,来确定该第一身份信息是否真实。The sending module 1902 is further configured to send the second signature to the terminal, which is used by the terminal to obtain the second identity information of the first item from the blockchain by using the public key of the first item and The second identity information verifies the second signature to determine whether the first identity information is authentic.
图20是根据本公开一示例性实施例示出的又一种微处理单元的框图,如图20所示,该微处理单元还包括:Fig. 20 is a block diagram illustrating another micro processing unit according to an exemplary embodiment of the present disclosure. As shown in Fig. 20, the micro processing unit further includes:
生成模块1903,用于在该通过利用存储在该微处理单元的第一物品的私钥对目标信息进行数字签名之前,在标注设备的驱动下生成该第一物品的公钥和私钥;A generating module 1903, configured to generate a public key and a private key of the first item under a drive of a labeling device before digitally signing target information by using a private key of the first item stored in the micro processing unit;
存储模块1904,用于将该第一物品的私钥,以及该第一物品的该第一身份信息存储在该微处理单元本地。The storage module 1904 is configured to store the private key of the first item and the first identity information of the first item locally in the micro processing unit.
可选的,该微处理单元还包括:Optionally, the micro processing unit further includes:
设置模块1905,用于将存储在该微处理单元本地的该第一物品的私钥设置为禁止外部设备读写。A setting module 1905 is configured to set a private key of the first item stored locally in the micro processing unit to prohibit external devices from reading and writing.
图21是根据本公开一示例性实施例示出的一种标注设备的框图,如图21所示,该标注设备2100,可以包括:Fig. 21 is a block diagram of a labeling device according to an exemplary embodiment of the present disclosure. As shown in Fig. 21, the labeling device 2100 may include:
生成模块2101,用于驱动第一物品中的微处理单元生成该第一物品的公钥和私钥;A generating module 2101, configured to drive a micro processing unit in the first item to generate a public key and a private key of the first item;
上传模块2102,用于将该第一物品的公钥上传至区块链。The uploading module 2102 is configured to upload the public key of the first item to the blockchain.
由于物品的公钥由标注设备存储在区块链中,因此物品与其对应的公钥具备不可篡改的绑定关系,而物品的私钥设置在物品中微处理单元,在物品完整的情况下难易获取该微处理单元,因此能够避免身份被伪造或套用的问题,并且在进行验证时,只需要能够访问该区块链的终端和该物品即可,无需掌握额外的知识或额外的设备,因此不会提高物品受众在防伪识别方面的学习成本。另外,由于采用了基于区块链的验证方式,因此能够避免由于中心化的真伪裁决方式导致的出错问题。Because the public key of the item is stored in the blockchain by the tagging device, the item and its corresponding public key have an untamperable binding relationship, and the private key of the item is set in the microprocessing unit in the item, which is difficult when the item is complete The micro processing unit is easy to obtain, so the problem of identity forgery or application can be avoided, and when verifying, only the terminal and the item of the blockchain can be accessed, and no additional knowledge or additional equipment is required. Therefore, the learning cost of the object audience in anti-counterfeit identification will not be increased. In addition, because the verification method based on the blockchain is used, it is possible to avoid errors caused by the centralized authentication method.
图22是根据本公开一示例性实施例示出的一种物品管理系统的结构图,该系统包括:终端001、位于物品002中的微处理单元0021以及标识设备003;Fig. 22 is a structural diagram illustrating an article management system according to an exemplary embodiment of the present disclosure. The system includes: a terminal 001, a micro processing unit 0021 located in the article 002, and an identification device 003.
终端001用于实现权利图2至图8任一所示方法的步骤;The terminal 001 is configured to implement the steps of the method shown in any one of FIG. 2 to FIG. 8;
微处理单元0021用于图9至图12任一所示的任一项所示方法的步骤;The micro processing unit 0021 is used for the steps of the method shown in any one of FIG. 9 to FIG. 12;
标识设备003用于图1所示方法的步骤。The identification device 003 is used for the steps of the method shown in FIG. 1.
可选的,上述系统还可以用于物联网设备身份标识,在此场景下,如图23所示,该第一物品可以为含有上述微处理单元002的物联网设备,该标识设备003可以为该物联网设备的生产设备,上述终端001可以为用于识别该物联网设备识别设备。Optionally, the above system may also be used for the identification of IoT devices. In this scenario, as shown in FIG. 23, the first item may be an IoT device containing the above microprocessing unit 002, and the identification device 003 may be For the production equipment of the IoT device, the terminal 001 may be an identification device for identifying the IoT device.
生产设备能够激活物联网设备内的微处理单元,生成密钥对,并将密钥对中的公钥以及该物联网设备的身份信息上传至区块链,该识别设备在进行识别时,从该微处理单元获取物联网设备私钥签名,当该签名能够通过区块链上对应公钥验签成功时,即可确认该物联网设备的身份有效。其具体方法与图1至图12所示的方法相同,不再赘述。The production device can activate the micro processing unit in the IoT device, generate a key pair, and upload the public key in the key pair and the identity information of the IoT device to the blockchain. When the identification device performs identification, The micro processing unit obtains the private key signature of the IoT device, and when the signature can be successfully verified by the corresponding public key on the blockchain, it can confirm that the identity of the IoT device is valid. The specific method is the same as the method shown in FIG. 1 to FIG. 12 and will not be described again.
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。Regarding the device in the above embodiment, the specific manner in which each module performs operations has been described in detail in the embodiment of the method, and will not be described in detail here.
图24是根据一示例性实施例示出的一种电子设备2400的框图。如图24所示,该电子设备2400可以包括:处理器2401,存储器2402。该电子设备2400还可以包括多媒体组件2403,输入/输出(I/O)接口2404,以及通信组件2405中的一者或多者。该电子设备24可以为上述的终端或标识设备。Fig. 24 is a block diagram of an electronic device 2400 according to an exemplary embodiment. As shown in FIG. 24, the electronic device 2400 may include a processor 2401 and a memory 2402. The electronic device 2400 may further include one or more of a multimedia component 2403, an input / output (I / O) interface 2404, and a communication component 2405. The electronic device 24 may be the above-mentioned terminal or identification device.
其中,处理器2401用于控制该电子设备2400的整体操作,以完成上述的物品身份管理方法中的全部或部分步骤。存储器2402用于存储各种类型的数据以支持在该电子设备2400的操作,这些数据例如可以包括用于在该电子设备2400上操作的任何应用程序或方法的指令,以及应用程序相关的数据,例如联系人数据、收发的消息、图片、音频、视频等等。该存储器2402可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,例如静态随机存取存储器(Static Random Access Memory,简称SRAM),电可擦除可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,简称EEPROM),可擦除可编程只读存储器(Erasable Programmable Read-Only Memory,简称EPROM),可编程只读存储器(Programmable Read-Only Memory,简称PROM),只读存储器(Read-Only Memory,简称ROM),磁存储器,快闪存储器,磁盘或光盘。多媒体组件2403可以包括屏幕和音频组件。其中屏幕例如可以是触摸屏,音频组件用于输出和/或输入音频信号。例如,音频组件可以包括一个麦克风,麦克风用于接收外部音频信号。所接收的音频信号可以被进一步存储在存储器2402或通过通信组件2405发送。音频组件还包括至少一个扬声器,用于输出音频信号。I/O接口2404为处理器2401和其他接口模块之间提供接口,上述其他接口模块可以是键盘,鼠标,按钮等。这些按钮可以是虚拟按钮或者实体按钮。通信组件2405用于该电子设备2400与其他设备之间进行有线或无线通信。无线通信,例如Wi-Fi,蓝牙,近场通信(Near Field Communication,简称NFC),2G、3G或4G,或它们中的一种或几种的组合,因此相应的该通信组件2405可 以包括:Wi-Fi模块,蓝牙模块,NFC模块。The processor 2401 is configured to control the overall operation of the electronic device 2400 so as to complete all or part of the steps in the above-mentioned item identity management method. The memory 2402 is used to store various types of data to support the operation on the electronic device 2400. The data may include, for example, instructions for any application program or method for operating on the electronic device 2400, and application-related data. Examples include contact data, messages sent and received, pictures, audio, video, and more. The memory 2402 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as Static Random Access Memory (SRAM, Random Access Memory, SRAM for short), electrically erasable programmable read-only memory ( Electrically Erasable Programmable Read-Only Memory (referred to as EEPROM), Erasable Programmable Read-Only Memory (referred to as EPROM), Programmable Read-Only Memory (referred to as PROM), read-only Memory (Read-Only Memory, ROM for short), magnetic memory, flash memory, magnetic disk or optical disk. The multimedia component 2403 may include a screen and an audio component. The screen may be, for example, a touch screen, and the audio component is used to output and / or input audio signals. For example, the audio component may include a microphone for receiving external audio signals. The received audio signal may be further stored in the memory 2402 or transmitted through the communication component 2405. The audio component also includes at least one speaker for outputting an audio signal. The I / O interface 2404 provides an interface between the processor 2401 and other interface modules. The other interface modules may be a keyboard, a mouse, a button, and the like. These buttons can be virtual buttons or physical buttons. The communication component 2405 is used for wired or wireless communication between the electronic device 2400 and other devices. Wireless communication, such as Wi-Fi, Bluetooth, Near Field Communication (NFC), 2G, 3G, or 4G, or one or more of them, so the corresponding communication component 2405 may include: Wi-Fi module, Bluetooth module, NFC module.
在一示例性实施例中,电子设备2400可以被一个或多个应用专用集成电路(Application Specific Integrated Circuit,简称ASIC)、数字信号处理器(Digital Signal Processor,简称DSP)、数字信号处理设备(Digital Signal Processing Device,简称DSPD)、可编程逻辑器件(Programmable Logic Device,简称PLD)、现场可编程门阵列(Field Programmable Gate Array,简称FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述的物品身份管理方法。In an exemplary embodiment, the electronic device 2400 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital signal processors (DSPs), and digital signal processing devices (Digital Signal Processing Device (DSPD), Programmable Logic Device (PLD), Field Programmable Gate Array (FPGA), controller, microcontroller, microprocessor or other electronic components Implementation, for performing the above-mentioned item identity management method.
在另一示例性实施例中,还提供了一种包括程序指令的计算机可读存储介质,该程序指令被处理器执行时实现上述的物品身份管理方法的步骤。例如,该计算机可读存储介质可以为上述包括程序指令的存储器2402,上述程序指令可由电子设备2400的处理器2401执行以完成上述的物品身份管理方法。In another exemplary embodiment, a computer-readable storage medium including program instructions is provided. The program instructions, when executed by a processor, implement the steps of the foregoing item identity management method. For example, the computer-readable storage medium may be the foregoing memory 2402 including program instructions, and the foregoing program instructions may be executed by the processor 2401 of the electronic device 2400 to complete the foregoing item identity management method.
此外,还提供一种微处理单元,包括:In addition, a micro-processing unit is provided, including:
存储器,其上存储有计算机程序;A memory on which a computer program is stored;
处理器,用于执行该存储器中的该计算机程序,以实现上述的物品身份管理方法的步骤。The processor is configured to execute the computer program in the memory to implement the steps of the foregoing item identity management method.
还提供一种计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现上述的物品身份管理方法的步骤。A computer-readable storage medium is also provided, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the above-mentioned item identity management method.
以上结合附图详细描述了本公开的优选实施方式,但是,本公开并不限于上述实施方式中的具体细节,在本公开的技术构思范围内,可以对本公开的技术方案进行多种简单变型,这些简单变型均属于本公开的保护范围。The preferred embodiments of the present disclosure have been described in detail above with reference to the accompanying drawings. However, the present disclosure is not limited to the specific details in the above embodiments. Within the scope of the technical concept of the present disclosure, various simple modifications can be made to the technical solutions of the present disclosure. These simple modifications all belong to the protection scope of the present disclosure.
另外需要说明的是,在上述具体实施方式中所描述的各个具体技术特征,在不矛盾的情况下,可以通过任何合适的方式进行组合,为了避免不必要的重复,本公开对各种可能的组合方式不再另行说明。In addition, it should be noted that the specific technical features described in the above specific embodiments can be combined in any suitable manner without contradiction. In order to avoid unnecessary repetition, the present disclosure provides various possible features. The combination is not explained separately.
此外,本公开的各种不同的实施方式之间也可以进行任意组合,只要其不违背本公开的思想,其同样应当视为本公开所公开的内容。In addition, various embodiments of the present disclosure can also be arbitrarily combined, as long as it does not violate the idea of the present disclosure, it should also be regarded as the content disclosed in the present disclosure.

Claims (37)

  1. 一种物品身份管理方法,其特征在于,应用于终端,所述方法包括:An article identity management method, which is applied to a terminal, and the method includes:
    接收第一物品中的微处理单元发送的目标信息的第一签名,所述第一签名是所述微处理单元利用存储在所述微处理单元的所述第一物品的私钥对所述目标信息进行数字签名后得到的;Receiving a first signature of target information sent by a micro-processing unit in a first item, the first signature is the micro-processing unit using the private key of the first item stored in the micro-processing unit to pair the target The information is obtained after digitally signing the information;
    从区块链上获取的所述第一物品的公钥;The public key of the first item obtained from the blockchain;
    通过利用所述第一物品的公钥对所述第一签名进行验证来确定所述微处理单元中记录的所述第一物品的第一身份信息的有效性。The validity of the first identity information of the first item recorded in the micro-processing unit is determined by verifying the first signature by using the public key of the first item.
  2. 根据权利要求1所述的方法,其特征在于,所述接收第一物品中的微处理单元发送的目标信息的第一签名,所述第一签名是所述微处理单元利用存储在所述微处理单元的所述第一物品的私钥对所述目标信息进行数字签名后得到的,包括:The method according to claim 1, wherein said receiving a first signature of target information sent by a micro-processing unit in a first item, said first signature being said micro-processing unit using A digital signature of the target information by the private key of the first item of the processing unit includes:
    生成所述目标信息,所述目标信息包括随机数;Generating the target information, where the target information includes a random number;
    向所述微处理单元发送所述目标信息;Sending the target information to the micro processing unit;
    在所述微处理单元利用所述第一物品的私钥对所述目标信息进行数字签名后,接收所述微处理单元发送的所述第一签名。After the micro processing unit digitally signs the target information by using the private key of the first item, the micro processing unit receives the first signature sent by the micro processing unit.
  3. 根据权利要求1所述的方法,其特征在于,所述接收第一物品中的微处理单元发送的目标信息的第一签名,所述第一签名是所述微处理单元利用存储在所述微处理单元的所述第一物品的私钥对所述目标信息进行数字签名后得到的,包括:The method according to claim 1, wherein said receiving a first signature of target information sent by a micro-processing unit in a first item, said first signature being said micro-processing unit using A digital signature of the target information by the private key of the first item of the processing unit includes:
    在所述微处理单元生成所述目标信息,并利用所述第一物品的私钥对所述目标信息进行数字签名后,接收所述微处理单元发送的所述第一签名和所述目标信息;After the micro processing unit generates the target information and digitally signs the target information by using the private key of the first item, receiving the first signature and the target information sent by the micro processing unit ;
    其中,所述目标信息包括随机数或所述第一物品的身份信息。The target information includes a random number or identity information of the first item.
  4. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method according to claim 1, further comprising:
    从所述微处理单元获取所述第一物品的所述第一身份信息;Acquiring the first identity information of the first item from the micro processing unit;
    根据所述第一身份信息在所述区块链中进行查询,以从所述区块链中获取所述第一物品的第二身份信息;Querying in the blockchain according to the first identity information to obtain the second identity information of the first item from the blockchain;
    接收所述微处理单元发送的所述第一身份信息的第二签名,所述第二签名是所述微处理单元利用所述第一物品的私钥对所述第一身份信息进行数字签名后得到的;Receiving the second signature of the first identity information sent by the microprocessing unit, where the second signature is after the microprocessing unit digitally signs the first identity information by using the private key of the first item owned;
    通过利用所述第一物品的公钥和所述第二身份信息对所述第二签名进 行验证,来确定所述第一身份信息是否真实;Determining whether the first identity information is authentic by using the public key of the first item and the second identity information to verify the second signature;
    当确定第一身份信息为真实时,向所述区块链发送数据更新信息,所述数据更新信息用于所述区块链将所述第一物品的身份使用状态更新为已使用状态。When it is determined that the first identity information is true, data update information is sent to the blockchain, and the data update information is used by the blockchain to update an identity use state of the first item to a used state.
  5. 根据权利要求4所述的方法,其特征在于,所述方法还包括:The method according to claim 4, further comprising:
    再次根据所述第一身份信息在所述区块链中进行查询,以从所述区块链中获取所述第一物品的身份使用状态;Query again in the blockchain according to the first identity information to obtain the identity usage status of the first item from the blockchain;
    当从所述区块链中获取所述第一物品的身份使用状态为已使用状态时,将所述第一物品标识为物品身份已使用。When the identity use status of the first item obtained from the blockchain is used status, the first item is identified as the item identity used.
  6. 根据权利要求1所述的方法,其特征在于,当所述终端位于所述第一物品流通环节上的首个节点时,所述目标信息为所述第一物品的标识信息,所述第一签名是所述微处理单元利用所述第一物品的私钥对所述标识信息进行数字签名后得到的,所述方法还包括:The method according to claim 1, characterized in that when the terminal is located at a first node on the circulation of the first article, the target information is identification information of the first article, and the first The signature is obtained after the microprocessing unit digitally signs the identification information by using the private key of the first item, and the method further includes:
    通过利用所述终端的私钥对所述第一签名进行数字签名,得到第二签名;Digitally signing the first signature by using the private key of the terminal to obtain a second signature;
    将所述第一签名和所述第二签名发送至所述区块链,以便在所述区块链中存储所述第一签名和所述第二签名。Sending the first signature and the second signature to the blockchain to store the first signature and the second signature in the blockchain.
  7. 根据权利要求1所述的方法,其特征在于,当所述终端为所述第一物品流通环节上的中间节点的终端时,所述方法还包括:The method according to claim 1, wherein when the terminal is a terminal of an intermediate node on the first article circulation link, the method further comprises:
    接收所述第一物品流通环节中的上一节点设备发送的第三签名;Receiving a third signature sent by a previous node device in the first article circulation link;
    通过利用所述终端的私钥对所述第三签名进行数字签名,得到第四签名;Obtaining a fourth signature by digitally signing the third signature by using the private key of the terminal;
    将所述第三签名和所述第四签名发送至所述区块链,以便在所述区块链中存储所述第三签名和所述第四签名。Sending the third signature and the fourth signature to the blockchain so that the third signature and the fourth signature are stored in the blockchain.
  8. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method according to claim 1, further comprising:
    生成针对所述第一物品的信息更新请求,所述信息更新请求用于更新存储于所述区块链上的所述第一物品的信息,所述第一物品的信息包括所述第一身份信息和/或属性信息;Generating an information update request for the first item, where the information update request is used to update the information of the first item stored on the blockchain, and the information of the first item includes the first identity Information and / or attribute information;
    通过利用所述终端的私钥对所述信息更新请求进行数字签名,得到第五签名;Obtaining a fifth signature by digitally signing the information update request by using the private key of the terminal;
    向所述区块链发送所述信息更新请求以及所述第五签名,用于所述区块链上的智能合约通过所述终端的公钥对所述第五签名进行验证,并在通过验 证后根据所述信息更新请求对所述区块链上的所述第一物品的信息进行更新操作,所述更新操作包括以下至少一者:信息添加、信息删除、信息修改和/或信息废止。Sending the information update request and the fifth signature to the blockchain for smart contracts on the blockchain to verify the fifth signature through the public key of the terminal, and pass the verification Then, the information of the first item on the blockchain is updated according to the information update request, and the update operation includes at least one of the following: information addition, information deletion, information modification, and / or information abolition.
  9. 一种物品身份管理方法,其特征在于,应用于微处理单元,所述方法包括:An article identity management method, which is characterized in that it is applied to a micro-processing unit, and the method includes:
    通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名,得到所述目标信息的第一签名,所述第一物品为所述微处理单元所在的物品;Digitally signing target information by using a private key of a first item stored in the micro processing unit to obtain a first signature of the target information, where the first item is an item in which the micro processing unit is located;
    向终端发送所述第一签名,用于所述终端通过利用从区块链上获取的所述第一物品的公钥,对所述第一签名进行验证来确定所述微处理单元中记录的所述第一物品的第一身份信息的有效性。Sending the first signature to a terminal for the terminal to determine the recorded in the micro-processing unit by using the public key of the first item obtained from the blockchain to verify the first signature Validity of the first identity information of the first item.
  10. 根据权利要求9所述的方法,其特征在于,所述通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名,得到所述目标信息的第一签名,包括:The method according to claim 9, wherein the obtaining the first signature of the target information by digitally signing the target information by using the private key of the first item stored in the microprocessing unit, comprises:
    接收所述终端发送的由所述终端生成的所述目标信息,所述目标信息包括随机数;Receiving the target information generated by the terminal and sent by the terminal, where the target information includes a random number;
    通过利用所述第一物品的私钥对所述目标信息进行数字签名,得到所述第一签名。The first signature is obtained by digitally signing the target information by using the private key of the first item.
  11. 根据权利要求9所述的方法,其特征在于,所述通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名,得到所述目标信息的第一签名,包括:The method according to claim 9, wherein the obtaining the first signature of the target information by digitally signing the target information by using the private key of the first item stored in the microprocessing unit, comprises:
    生成所述目标信息,所述目标信息包括随机数或所述第一物品的身份信息;Generating the target information, where the target information includes a random number or identity information of the first item;
    通过利用所述第一物品的私钥对所述目标信息进行数字签名,得到所述第一签名。The first signature is obtained by digitally signing the target information by using the private key of the first item.
  12. 根据权利要求9所述的方法,其特征在于,所述方法还包括:The method according to claim 9, further comprising:
    向所述终端发送所述第一物品的所述第一身份信息,用于所述终端根据所述第一身份信息在所述区块链中查询;Sending the first identity information of the first item to the terminal, for the terminal to query in the blockchain according to the first identity information;
    利用所述第一物品的私钥对所述第一身份信息进行数字签名,得到所述第一身份信息的第二签名;Digitally sign the first identity information by using the private key of the first item to obtain a second signature of the first identity information;
    向所述终端发送所述第二签名,用于所述终端在从所述区块链中获取所述第一物品的第二身份信息后,通过利用所述第一物品的公钥和所述第二身 份信息对所述第二签名进行验证,来确定所述第一身份信息是否真实。Sending the second signature to the terminal, for the terminal to obtain the second identity information of the first item from the blockchain by using the public key of the first item and the The second identity information verifies the second signature to determine whether the first identity information is authentic.
  13. 根据权利要求9所述的方法,其特征在于,在所述通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名之前,所述方法还包括:The method according to claim 9, wherein before the digitally signing the target information by using the private key of the first item stored in the micro processing unit, the method further comprises:
    在标注设备的驱动下生成所述第一物品的公钥和私钥;Generating the public key and the private key of the first item under the driving of the labeling device;
    将所述第一物品的私钥,以及所述第一物品的所述第一身份信息存储在所述微处理单元本地。The private key of the first item and the first identity information of the first item are stored locally in the micro processing unit.
  14. 根据权利要求13所述的方法,其特征在于,所述方法还包括:The method according to claim 13, further comprising:
    将存储在所述微处理单元本地的所述第一物品的私钥设置为禁止外部设备读写。The private key of the first item stored locally in the micro processing unit is set to prohibit external devices from reading and writing.
  15. 一种物品身份管理方法,其特征在于,应用于标注设备,所述方法包括:An article identity management method, which is characterized in that the method is applied to labeling equipment, and the method includes:
    驱动第一物品中的微处理单元生成所述第一物品的公钥和私钥;Driving a micro processing unit in the first item to generate a public key and a private key of the first item;
    将所述第一物品的公钥上传至区块链。Upload the public key of the first item to the blockchain.
  16. 一种终端,其特征在于,应用于终端,包括:A terminal, which is characterized in that it is applied to a terminal and includes:
    第一接收模块,用于接收第一物品中的微处理单元发送的目标信息的第一签名,所述第一签名是所述微处理单元利用存储在所述微处理单元的所述第一物品的私钥对所述目标信息进行数字签名后得到的;A first receiving module, configured to receive a first signature of target information sent by a micro-processing unit in a first item, where the first signature is the micro-processing unit using the first item stored in the micro-processing unit Obtained by digitally signing the target information with a private key of
    第一获取模块,用于从区块链上获取的所述第一物品的公钥;A first obtaining module, configured to obtain a public key of the first item from a blockchain;
    第一验证模块,用于通过利用所述第一物品的公钥对所述第一签名进行验证来确定所述微处理单元中记录的所述第一物品的第一身份信息的有效性。A first verification module is configured to determine the validity of the first identity information of the first item recorded in the micro-processing unit by verifying the first signature by using the public key of the first item.
  17. 根据权利要求16所述的终端,其特征在于,所述接收模块,用于:The terminal according to claim 16, wherein the receiving module is configured to:
    生成所述目标信息,所述目标信息包括随机数;Generating the target information, where the target information includes a random number;
    向所述微处理单元发送所述目标信息;Sending the target information to the micro processing unit;
    在所述微处理单元利用所述第一物品的私钥对所述目标信息进行数字签名后,接收所述微处理单元发送的所述第一签名。After the micro processing unit digitally signs the target information by using the private key of the first item, the micro processing unit receives the first signature sent by the micro processing unit.
  18. 根据权利要求16所述的终端,其特征在于,所述接收模块,用于:The terminal according to claim 16, wherein the receiving module is configured to:
    在所述微处理单元生成所述目标信息,并利用所述第一物品的私钥对所述目标信息进行数字签名后,接收所述微处理单元发送的所述第一签名和所 述目标信息;After the micro processing unit generates the target information and digitally signs the target information by using the private key of the first item, receiving the first signature and the target information sent by the micro processing unit ;
    其中,所述目标信息包括随机数或所述第一物品的身份信息。The target information includes a random number or identity information of the first item.
  19. 根据权利要求16所述的终端,其特征在于,所述终端还包括:The terminal according to claim 16, wherein the terminal further comprises:
    第二获取模块,用于从所述微处理单元获取所述第一物品的所述第一身份信息;A second acquisition module, configured to acquire the first identity information of the first item from the micro processing unit;
    查询模块,用于根据所述第一身份信息在所述区块链中进行查询,以从所述区块链中获取所述第一物品的第二身份信息;A query module, configured to perform a query in the blockchain according to the first identity information to obtain second identity information of the first item from the blockchain;
    所述第一接收模块,还用于接收所述微处理单元发送的所述第一身份信息的第二签名,所述第二签名是所述微处理单元利用所述第一物品的私钥对所述第一身份信息进行数字签名后得到的;The first receiving module is further configured to receive a second signature of the first identity information sent by the microprocessing unit, where the second signature is a private key pair used by the microprocessing unit to use the first item Obtained by digitally signing the first identity information;
    第二验证模块,用于通过利用所述第一物品的公钥和所述第二身份信息对所述第二签名进行验证,来确定所述第一身份信息是否真实;A second verification module, configured to determine whether the first identity information is authentic by verifying the second signature by using the public key of the first item and the second identity information;
    第一更新模块,用于当确定第一身份信息为真实时,向所述区块链发送数据更新信息,所述数据更新信息用于所述区块链将所述第一物品的身份使用状态更新为已使用状态。A first update module, configured to: when it is determined that the first identity information is true, send data update information to the blockchain, the data update information being used by the blockchain to use the identity status of the first item Updated to Used.
  20. 根据权利要求19所述的终端,其特征在于,所述终端还包括:The terminal according to claim 19, wherein the terminal further comprises:
    所述查询模块,还用于再次根据所述第一身份信息在所述区块链中进行查询,以从所述区块链中获取所述第一物品的身份使用状态;The query module is further configured to query the blockchain again according to the first identity information to obtain the identity usage status of the first item from the blockchain;
    标识模块,用于当从所述区块链中获取所述第一物品的身份使用状态为已使用状态时,将所述第一物品标识为物品身份已使用。An identification module, configured to identify the first item as the used item identity when the status of the use of the identity of the first item obtained from the blockchain is used.
  21. 根据权利要求16所述的终端,其特征在于,所述终端为位于所述第一物品流通环节上的首个节点,所述目标信息为所述第一物品的标识信息,所述第一签名是所述微处理单元利用所述第一物品的私钥对所述标识信息进行数字签名后得到的,所述终端还包括:The terminal according to claim 16, wherein the terminal is a first node located on the circulation of the first article, the target information is identification information of the first article, and the first signature It is obtained after the micro processing unit digitally signs the identification information by using the private key of the first item, and the terminal further includes:
    签名模块,用于通过利用所述终端的私钥对所述第一签名进行数字签名,得到第二签名;A signature module, configured to digitally sign the first signature by using the private key of the terminal to obtain a second signature;
    发送模块,用于将所述第一签名和所述第二签名发送至所述区块链,以便在所述区块链中存储所述第一签名和所述第二签名。A sending module is configured to send the first signature and the second signature to the blockchain, so that the first signature and the second signature are stored in the blockchain.
  22. 根据权利要求16所述的装置,其特征在于,所述终端为所述第一物品流通环节上的中间节点的终端,所述终端还包括:The device according to claim 16, wherein the terminal is a terminal of an intermediate node in the first article circulation link, and the terminal further comprises:
    第二接收模块,用于接收所述第一物品流通环节中的上一节点设备发送的第三签名;A second receiving module, configured to receive a third signature sent by a previous node device in the first article circulation link;
    签名模块,用于通过利用所述终端的私钥对所述第三签名进行数字签名,得到第四签名;A signature module, configured to digitally sign the third signature by using the private key of the terminal to obtain a fourth signature;
    发送模块,用于将所述第三签名和所述第四签名发送至所述区块链,以便在所述区块链中存储所述第三签名和所述第四签名。A sending module, configured to send the third signature and the fourth signature to the blockchain, so that the third signature and the fourth signature are stored in the blockchain.
  23. 根据权利要求16所述的装置,其特征在于,所述装置还包括:The device according to claim 16, further comprising:
    第二更新模块,用于生成针对所述第一物品的信息更新请求,所述信息更新请求用于更新存储于所述区块链上的所述第一物品的信息,所述第一物品的信息包括所述第一身份信息和/或属性信息;A second update module, configured to generate an information update request for the first item, where the information update request is used to update the information of the first item stored on the blockchain, The information includes the first identity information and / or attribute information;
    签名模块,用于通过利用所述终端的私钥对所述信息更新请求进行数字签名,得到第五签名;A signature module, configured to digitally sign the information update request by using the private key of the terminal to obtain a fifth signature;
    发送模块,用于向所述区块链发送所述信息更新请求以及所述第五签名,用于所述区块链上的智能合约通过所述终端的公钥对所述第五签名进行验证,并在通过验证后根据所述信息更新请求对所述区块链上的所述第一物品的信息进行更新操作,所述更新操作包括以下至少一者:信息添加、信息删除、信息修改和/或信息废止。A sending module, configured to send the information update request and the fifth signature to the blockchain, and be used by a smart contract on the blockchain to verify the fifth signature through the public key of the terminal And, after passing the verification, perform an update operation on the information of the first item on the blockchain according to the information update request, the update operation includes at least one of the following: information addition, information deletion, information modification, and / Or the information is discontinued.
  24. 一种微处理单元,其特征在于,包括:A micro-processing unit, comprising:
    签名模块,用于通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名,得到所述目标信息的第一签名,所述第一物品为所述微处理单元所在的物品;A signature module, configured to digitally sign target information by using a private key of a first item stored in the micro processing unit to obtain a first signature of the target information, where the first item is where the micro processing unit is located Items
    发送模块,用于向终端发送所述第一签名,用于所述终端通过利用从区块链上获取的所述第一物品的公钥,对所述第一签名进行验证来确定所述微处理单元中记录的所述第一物品的第一身份信息的有效性。A sending module, configured to send the first signature to a terminal, for the terminal to determine the micro signature by verifying the first signature by using a public key of the first item obtained from a blockchain Validity of the first identity information of the first item recorded in the processing unit.
  25. 根据权利要求24所述的微处理单元,其特征在于,所述签名模块,用于:The microprocessing unit according to claim 24, wherein the signature module is configured to:
    接收所述终端发送的由所述终端生成的所述目标信息,所述目标信息包括随机数;Receiving the target information generated by the terminal and sent by the terminal, where the target information includes a random number;
    通过利用所述第一物品的私钥对所述目标信息进行数字签名,得到所述第一签名。The first signature is obtained by digitally signing the target information by using the private key of the first item.
  26. 根据权利要求24所述的微处理单元,其特征在于,所述签名模块,用于:The microprocessing unit according to claim 24, wherein the signature module is configured to:
    生成所述目标信息,所述目标信息包括随机数或所述第一物品的身份信息;Generating the target information, where the target information includes a random number or identity information of the first item;
    通过利用所述第一物品的私钥对所述目标信息进行数字签名,得到所述第一签名。The first signature is obtained by digitally signing the target information by using the private key of the first item.
  27. 根据权利要求24所述的微处理单元,其特征在于,还包括:The microprocessing unit according to claim 24, further comprising:
    发送模块,用于向所述终端发送所述第一物品的所述第一身份信息,用于所述终端根据所述第一身份信息在所述区块链中查询;A sending module, configured to send the first identity information of the first item to the terminal, and be used by the terminal to query the blockchain according to the first identity information;
    所述签名模块,还用于利用所述第一物品的私钥对所述第一身份信息进行数字签名,得到所述第一身份信息的第二签名;The signature module is further configured to digitally sign the first identity information by using the private key of the first item to obtain a second signature of the first identity information;
    所述发送模块,还用于向所述终端发送所述第二签名,用于所述终端在从所述区块链中获取所述第一物品的第二身份信息后,通过利用所述第一物品的公钥和所述第二身份信息对所述第二签名进行验证,来确定所述第一身份信息是否真实。The sending module is further configured to send the second signature to the terminal for the terminal to obtain the second identity information of the first item from the blockchain by using the first signature A public key of an item and the second identity information verify the second signature to determine whether the first identity information is authentic.
  28. 根据权利要求24所述的微处理单元,其特征在于,还包括:The microprocessing unit according to claim 24, further comprising:
    生成模块,用于在所述通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名之前,在标注设备的驱动下生成所述第一物品的公钥和私钥;A generating module, configured to generate a public key and a private key of the first item under a drive of a labeling device before digitally signing target information by using a private key of the first item stored in the micro processing unit ;
    存储模块,用于将所述第一物品的私钥,以及所述第一物品的所述第一身份信息存储在所述微处理单元本地。The storage module is configured to store a private key of the first item and the first identity information of the first item locally in the micro processing unit.
  29. 根据权利要求28所述的微处理单元,其特征在于,还包括:The microprocessing unit according to claim 28, further comprising:
    设置模块,用于将存储在所述微处理单元本地的所述第一物品的私钥设置为禁止外部设备读写。A setting module, configured to set a private key of the first item stored locally in the micro processing unit to prohibit external devices from reading and writing.
  30. 一种标注设备,其特征在于,包括:A labeling device, comprising:
    生成模块,用于驱动第一物品中的微处理单元生成所述第一物品的公钥和私钥;A generating module for driving a micro-processing unit in the first item to generate a public key and a private key of the first item;
    上传模块,用于将所述第一物品的公钥上传至区块链。An uploading module is used to upload the public key of the first item to the blockchain.
  31. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现权利要求1-8中任一项所述方法的步骤。A computer-readable storage medium having stored thereon a computer program, characterized in that when the computer program is executed by a processor, the steps of the method according to any one of claims 1-8 are implemented.
  32. 一种终端,其特征在于,包括:A terminal, comprising:
    存储器,其上存储有计算机程序;A memory on which a computer program is stored;
    处理器,用于执行所述存储器中的所述计算机程序,以实现权利要求1-8 中任一项所述方法的步骤。A processor configured to execute the computer program in the memory to implement the steps of the method according to any one of claims 1-8.
  33. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现权利要求9-14中任一项所述方法的步骤。A computer-readable storage medium having stored thereon a computer program, characterized in that when the computer program is executed by a processor, the steps of the method according to any one of claims 9-14 are implemented.
  34. 一种微处理单元,其特征在于,包括:A micro-processing unit, comprising:
    存储器,其上存储有计算机程序;A memory on which a computer program is stored;
    处理器,用于执行所述存储器中的所述计算机程序,以实现权利要求9-14中任一项所述方法的步骤。A processor, configured to execute the computer program in the memory to implement the steps of the method according to any one of claims 9-14.
  35. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现权利要求15所述方法的步骤。A computer-readable storage medium having stored thereon a computer program, characterized in that when the computer program is executed by a processor, the steps of the method of claim 15 are implemented.
  36. 一种微处理单元,其特征在于,包括:A micro-processing unit, comprising:
    存储器,其上存储有计算机程序;A memory on which a computer program is stored;
    处理器,用于执行所述存储器中的所述计算机程序,以实现权利要求15所述方法的步骤。A processor configured to execute the computer program in the memory to implement the steps of the method of claim 15.
  37. 一种物品管理系统,其特征在于,包括:终端、位于物品中的微处理单元以及标识设备;An article management system, comprising: a terminal, a micro-processing unit located in an article, and an identification device;
    所述终端用于实现权利要求1-8中任一项所述方法的步骤;The terminal is configured to implement the steps of the method according to any one of claims 1-8;
    所述微处理单元用于实现权利要求9-14中任一项所述方法的步骤;The micro processing unit is configured to implement the steps of the method according to any one of claims 9-14;
    所述标识设备用于实现权利要求15所述方法的步骤。The identification device is used to implement the steps of the method of claim 15.
PCT/CN2018/106287 2018-09-18 2018-09-18 Item identity management method, terminal, micro-processing unit, identification device and system WO2020056597A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2018/106287 WO2020056597A1 (en) 2018-09-18 2018-09-18 Item identity management method, terminal, micro-processing unit, identification device and system
CN201880097523.9A CN112689979B (en) 2018-09-18 2018-09-18 Article identity management method, terminal, microprocessor unit, identification device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/106287 WO2020056597A1 (en) 2018-09-18 2018-09-18 Item identity management method, terminal, micro-processing unit, identification device and system

Publications (1)

Publication Number Publication Date
WO2020056597A1 true WO2020056597A1 (en) 2020-03-26

Family

ID=69888089

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/106287 WO2020056597A1 (en) 2018-09-18 2018-09-18 Item identity management method, terminal, micro-processing unit, identification device and system

Country Status (2)

Country Link
CN (1) CN112689979B (en)
WO (1) WO2020056597A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200250174A1 (en) * 2019-01-31 2020-08-06 Salesforce.Com, Inc. Systems, methods, and apparatuses for implementing efficient storage and validation of data and metadata within a blockchain using distributed ledger technology (dlt)
CN112153151A (en) * 2020-09-28 2020-12-29 刘华 Intelligent manufacturing workshop safety management method and system based on block chain
CN112765588A (en) * 2021-01-21 2021-05-07 网易宝有限公司 Identity recognition method and device, electronic equipment and storage medium
CN114006740A (en) * 2021-10-26 2022-02-01 杭州产链数字科技有限公司 Block chain-based Internet of things equipment digital identity management method and application
CN114157447A (en) * 2021-10-22 2022-03-08 北京航空航天大学 Unmanned equipment safety communication method based on block chain technology
CN114943546A (en) * 2022-05-25 2022-08-26 南京数睿数据科技有限公司 Article anti-counterfeiting detection method and device, electronic equipment and computer readable medium
US11880349B2 (en) 2019-04-30 2024-01-23 Salesforce, Inc. System or method to query or search a metadata driven distributed ledger or blockchain
US11899817B2 (en) 2019-01-31 2024-02-13 Salesforce, Inc. Systems, methods, and apparatuses for storing PII information via a metadata driven blockchain using distributed and decentralized storage for sensitive user information
US11971874B2 (en) * 2019-01-31 2024-04-30 Salesforce, Inc. Systems, methods, and apparatuses for implementing efficient storage and validation of data and metadata within a blockchain using distributed ledger technology (DLT)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160098730A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and Method for Block-Chain Verification of Goods
US20160217532A1 (en) * 2015-01-23 2016-07-28 Sure, Inc. Securing Claim Data via Block-Chains for a Peer to Peer Platform
CN106209877A (en) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 A kind of be certification core with block chain backstage false-proof authentication system
CN107169776A (en) * 2017-05-10 2017-09-15 无锡井通网络科技有限公司 Product certification method for anti-counterfeit based on block chain technology
CN108460605A (en) * 2018-02-09 2018-08-28 深圳市优权天成科技有限公司 A kind of trace to the source method for anti-counterfeit and the system of the papery art work based on block chain

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101452539A (en) * 2008-12-12 2009-06-10 龙冬阳 Mobile identification method based on NFC
CN103413227B (en) * 2013-08-02 2016-12-28 四川航天系统工程研究所 Product anti-counterfeiting tracing system and the false proof implementation method reviewing examination thereof
CN106529969B (en) * 2016-10-08 2020-11-13 惠州Tcl移动通信有限公司 Method and system for checking fake source by NFC
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN111724150B (en) * 2017-03-28 2023-11-24 创新先进技术有限公司 Service request processing method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160098730A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and Method for Block-Chain Verification of Goods
US20160217532A1 (en) * 2015-01-23 2016-07-28 Sure, Inc. Securing Claim Data via Block-Chains for a Peer to Peer Platform
CN106209877A (en) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 A kind of be certification core with block chain backstage false-proof authentication system
CN107169776A (en) * 2017-05-10 2017-09-15 无锡井通网络科技有限公司 Product certification method for anti-counterfeit based on block chain technology
CN108460605A (en) * 2018-02-09 2018-08-28 深圳市优权天成科技有限公司 A kind of trace to the source method for anti-counterfeit and the system of the papery art work based on block chain

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11899817B2 (en) 2019-01-31 2024-02-13 Salesforce, Inc. Systems, methods, and apparatuses for storing PII information via a metadata driven blockchain using distributed and decentralized storage for sensitive user information
US20200250174A1 (en) * 2019-01-31 2020-08-06 Salesforce.Com, Inc. Systems, methods, and apparatuses for implementing efficient storage and validation of data and metadata within a blockchain using distributed ledger technology (dlt)
US11971874B2 (en) * 2019-01-31 2024-04-30 Salesforce, Inc. Systems, methods, and apparatuses for implementing efficient storage and validation of data and metadata within a blockchain using distributed ledger technology (DLT)
US11880349B2 (en) 2019-04-30 2024-01-23 Salesforce, Inc. System or method to query or search a metadata driven distributed ledger or blockchain
CN112153151A (en) * 2020-09-28 2020-12-29 刘华 Intelligent manufacturing workshop safety management method and system based on block chain
CN112153151B (en) * 2020-09-28 2024-02-02 山西万佳印业有限公司 Intelligent manufacturing workshop safety management method and system based on blockchain
CN112765588A (en) * 2021-01-21 2021-05-07 网易宝有限公司 Identity recognition method and device, electronic equipment and storage medium
CN114157447A (en) * 2021-10-22 2022-03-08 北京航空航天大学 Unmanned equipment safety communication method based on block chain technology
CN114157447B (en) * 2021-10-22 2023-03-14 北京航空航天大学 Unmanned equipment safety communication method based on block chain technology
CN114006740A (en) * 2021-10-26 2022-02-01 杭州产链数字科技有限公司 Block chain-based Internet of things equipment digital identity management method and application
CN114006740B (en) * 2021-10-26 2024-02-09 杭州产链数字科技有限公司 Management method and application of digital identity of Internet of things equipment based on blockchain
CN114943546B (en) * 2022-05-25 2024-04-09 南京数睿数据科技有限公司 Article anti-counterfeiting detection method, device, electronic equipment and computer readable medium
CN114943546A (en) * 2022-05-25 2022-08-26 南京数睿数据科技有限公司 Article anti-counterfeiting detection method and device, electronic equipment and computer readable medium

Also Published As

Publication number Publication date
CN112689979A (en) 2021-04-20
CN112689979B (en) 2023-11-24

Similar Documents

Publication Publication Date Title
WO2020056597A1 (en) Item identity management method, terminal, micro-processing unit, identification device and system
US11107088B2 (en) Open registry for internet of things
US11113699B2 (en) Open registry for identity of things
CN110336797B (en) Enterprise authentication and authentication tracing method, device and equipment based on block chain
US10210527B2 (en) Open registry for identity of things including social record feature
US11902601B2 (en) System and techniques for digital data lineage verification
CN111492634A (en) Secure and confidential custody transaction systems, methods, and apparatus using zero-knowledge protocols
US20180108024A1 (en) Open registry for provenance and tracking of goods in the supply chain
US20180019872A1 (en) Open registry for internet of things including sealed materials
JP2020512714A (en) Digital certificate management method, device, and system
US20160358158A1 (en) Open registry for identity of things including item location feature
US20180032759A1 (en) Open registry for human identification
JP6498123B2 (en) Digitally protected electronic titles for supply chain products
CN111314172B (en) Block chain-based data processing method, device, equipment and storage medium
CN103593773A (en) Product anti-fake method and system and client terminal
CN107453874B (en) Digital seal and generation method thereof, service request and providing method and electronic equipment
CN110598433B (en) Block chain-based anti-fake information processing method and device
WO2016019456A1 (en) Id tag authentication system and method
WO2015154482A1 (en) One-time certificate anti-counterfeiting tracing system based on mobile terminal and rfid
WO2018067974A1 (en) Open registry for human identification
CN102647423A (en) Identifying method and system of digital signature and seal
US20180205714A1 (en) System and Method for Authenticating Electronic Tags
EP4011031B1 (en) Secure identity card using unclonable functions
US20220109986A1 (en) Identity management on a mobile device
WO2018064329A1 (en) Open registry for internet of things including sealed materials

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18934345

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18934345

Country of ref document: EP

Kind code of ref document: A1