CN103092953A - Method for continuously transmitting authorization code with traceable source information - Google Patents

Method for continuously transmitting authorization code with traceable source information Download PDF

Info

Publication number
CN103092953A
CN103092953A CN2013100160078A CN201310016007A CN103092953A CN 103092953 A CN103092953 A CN 103092953A CN 2013100160078 A CN2013100160078 A CN 2013100160078A CN 201310016007 A CN201310016007 A CN 201310016007A CN 103092953 A CN103092953 A CN 103092953A
Authority
CN
China
Prior art keywords
code
information
source information
user
intermediate links
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100160078A
Other languages
Chinese (zh)
Inventor
徐涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2013100160078A priority Critical patent/CN103092953A/en
Publication of CN103092953A publication Critical patent/CN103092953A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention n discloses a method for a continuously transmitting authorization code with traceable source information. The method includes a data system which can be used for various users. The method includes a method for initial code to point to the source information, a method for querying and verifying a code, and a method for code continuous transmission and authorization. Through the continuous transmission and authorization of the code of the data system, the code held by a data system user can at least accurately point to the source information and uniquely points to the information of a code intermediate link, the system user can query and check the authenticity and legitimacy of the code, obtains the information which is pointed by the code, and obtains the legal right to use the information. At the same time, the data system user can obtain information of a specific intermediate link according to the functional requirement of the data system. The continuous transmission of authorization code can be used for tracing the intermediate link up to the source information. The user obtains the information which is pointed by the code, and the information is used for the check and record of real transactional information.

Description

The method that also can review the authorization code of source information of transmitting continuously
Technical field:
Content of the present invention is the mode with a kind of continuous transmission authorization code, transmits source information, and can review the transmittance process link, until source information.
Technical background:
The majority of reviewing that is applied at present source information is the false proof of reviewing of product quality and product, generally all take to arrange the modes such as unique sequence number or code on product, check this sequence number or code by inquiry mode, determine the authenticity of product, this method code can only point to source information, can not review the circulation process of product.
Summary of the invention:
The objective of the invention is in order to solve above-mentioned existing methodical deficiency, provide a kind of and can either accurately trace back to source information, can review as required again the overall process of source information circulation or the method for part process, be used for reviewing acquired information and actual transaction recording of information and checking.This invention is pursued source information and is reviewed effective, convenient, effect cheaply.
To achieve these goals, the designed continuous transmission of the present invention also can be reviewed the authorization code method of source information, and comprising can be for various users' data system; Initial code is pointed to the method for source information, the enquiry and verification method of code, the method that the code continuity is transmitted and authorized.
Can be for various users' data system, this data system comprises source information, user profile, code information (rule and the information that comprise code establishing, transmission, mandate) at least.Various users become the legal user of this data system by registration, authentication supervisor, enjoy different rights of using.
Initial code is pointed to the method for source information, comprises two processes, and the one, the input of source information, two are this source information establishment initial code.There is the user of authority that the source information that needs transmission to trace back to can be set, and can create code for this source information, one Codabar code represents a source information and passes to the targeted customer to only have the importer of source information, just can initial code be set for source information.
The enquiry and verification method of code, the winner of code can pass through input code, and authenticity and the legitimacy of this code are inquired about and checked in the retrieve data system, obtains simultaneously the information that code points to.Only having by code of the present invention and transmit continuously and the method for authorizing obtains code, be only the winner of code, is the holder of this code.This data system can be as required, and allowing can inquiring and authenticating by other channels acquisition codes person, but do not think the holder of this code.
The method that the code continuity is transmitted and authorized.The initial code A that the importer user 1 of source information will point to this source information passes to the user 2 of first intermediate links, after the user 2 of first intermediate links obtains this initial code A, can this initial code of inquiring and authenticating A, this initial code A is also that source information importer user 1 is to the user's 2 of first intermediate links a mandate simultaneously, after inquiring and authenticating initial code A authenticity and legitimacy, authorize the user 2 of first intermediate links to create again a code B for source information.The user 2 of first intermediate links can pass to this code B the user 3 of second intermediate links, after the user 3 of second intermediate links obtains this code B, can this code of inquiring and authenticating B, this code B is also user 3 the mandate of 2 pairs of second intermediate links of user of first intermediate links simultaneously, after inquiring and authenticating code B authenticity and legitimacy, authorize the user 3 of second intermediate links to create again a code C for source information.With the method, authorization code transmits continuously, inquires about and check, create, transmit, reaches the function that code transmits and authorizes continuously.Simultaneously, a user if in his next intermediate links, a plurality of users are arranged, after the code of obtaining the authorization, can and should create for each user in next intermediate links an independent code to source information.User 1 can create initial code D and pass to user 4, and user 2 can create code E and pass to user 5.During code establishing, should comprise the information of transmitting target, above-mentioned code continuity transmit and the process of authorizing in, initial code A comprises user 2 information, user 2 is holders of initial code A, and code B comprises user 3 information, and user 3 is holders of code B.
In this data system, code can be numeral, letter, symbol, word, figure, perhaps their combination.
In this data system, each code is unique in this data system, and this uniqueness refers to intermediate links of a source information, needs a code.This is unique guarantees to realize by the data technique mode.
In this data system, the authenticity of code and legitimacy refer to that this code is present in this data system, namely are considered as this code and have authenticity and legitimacy.Authenticity and the legitimacy of code are achieved by database technology.
In this data system, the code directional information comprises source information and intermediate links information (founder of code is to the information of transmitting the target transmittance process), each code points to source information, at least point to simultaneously the information of the intermediate links of this code, code flow swivel link information comprises the founder of code and the information of transmission target at least.Code also can according to the needs of data system, arrange the information of other intermediate links of pointing to this source information.
In this data system, the mandate of code, the holder who comprises at least this code can create fresh code and the authority of transmitting and the legal right to use of using this code directional information again to this code source information pointed.Also the mandate of other affairs can be set according to the needs of system.
In this data system, continuity transmission by above authorization code, the code that the data system user passes through to hold, at least can accurately point to the information of source information and this code flow swivel link of unique sensing, system user can be inquired about authenticity and the legitimacy of checking code, obtains the information that code points to, and obtains the legal right to use of this information, simultaneously also can according to the functional requirement of data system, allow the data system user obtain the information of specific intermediate links.This continuity transmission that contains the code of mandate is to review intermediate links, until source information.
This data system also can be realized on the internet by the database technology support.Database technology refers to Access, Oracle, DB2, SQL Server, MySQL and other relevant databases.
The user obtains the information that code points to, and is used for checking and record of actual transaction information.
Description of drawings
Accompanying drawing is the illustrating of method of the transmission of code continuity and mandate.
In accompanying drawing, arrow represents transmission and the mandate of a code in intermediate links.
Embodiment:
The below is described in detail embodiments of the invention, makes feature of the present invention and purposes be convenient to understand.
Embodiment 1
Product transmits product quality information in the process of circulation, and will review checking and record of products in circulation link information and actual transaction information.
1, in this embodiment, described source information is the quality information of product, the quality information of homemade goods comprise name of product, the producer, date of manufacture, batch, operative norm, bar code, product export survey report, product form survey report etc.The quality information of imported product is generally the immigration proof, proves as inspection and quarantining for import/export proof or customs tariff law.
2, user's identity information is the part of source information.
3, only have the producer of product and the importer just can input source information and create initial code.
4, in this embodiment, the code flow swivel link is representing the negotiation link of product.
5, in this embodiment, it is that a product management person is after buying a collection of product and obtaining supplier's authorization code that continuity is transmitted authorization code, when selling this batch product, for oneself client creates and transmit authorization code, code of a transaction creation.Transmit with this.
6, by the designed code sensing source information of the present invention, the method that inquiry is checked, continuity is transmitted authorization code, the holder of code can obtain the code directional information, and the acquisition of this information is to obtain by legal means.
7, in this embodiment, the user obtains code information pointed, and quality information and the Transaction Information that can check product carry out record.
8, this embodiment can implement by the internet, realizes the present invention's utilization in the present embodiment by data technique and Internet technology, the production operator realizes reviewing product quality information and Transaction Information, and this is carried out information system management.
Embodiment 2
Apply to endorse the electronic management of the negotiation of right, for example electronization of banker's bill circulation.According to " People's Republic of China's negotiable instrument law " regulation, transfer the possession of right of negotiable instrument, need endorse and pay bill.
1, in this embodiment, source information is right of negotiable instrument.
2, in this embodiment, only have the user who in accordance with the law has the right to draw a bill right of negotiable instrument just can be set and create initial code.
3, in this embodiment, user profile must guarantee true legal effective.
4, in this embodiment, the code flow swivel link is representing endorsement and the payment of bill.
5, in this embodiment, it is the lawful owner of right of negotiable instrument that continuity is transmitted authorization code, after obtaining corresponding authorization code, can create authorization code again and pass to the surrenderee of right of negotiable instrument.Create voucher code and transmission, be considered as endorsement and pay bill.
6, by the designed code sensing source information of the present invention, the method that inquiry is checked, continuity is transmitted authorization code, the winner of last code enjoys right of negotiable instrument, and the acquisition of this right of negotiable instrument obtains by uninterrupted series of endorsement.
7, this embodiment can implement by the internet, realizes the present invention's utilization in the present embodiment by data technique and Internet technology.
8, under the prerequisite that state's laws approval electronic data mode is endorsed, the legal effect of the visual acquisition negotiability of the present embodiment right of negotiable instrument can be set up negotiation system of e-bank.
The above is the better enforcement example of the present invention, is not limited to the present invention, all any modifications of making within the spirit and principles in the present invention, is equal to and replaces and improvement etc., within all should being included in protection scope of the present invention.

Claims (9)

1. the method that also can review the authorization code of source information of transmitting continuously is characterized in that: comprising: can be for various users' data system; Initial code is pointed to the method for source information, the enquiry and verification method of code, the method that the code continuity is transmitted and authorized.
2. initial code according to claim 1 is pointed to the method for source information, it is characterized in that: comprise two processes, and the one, the input of source information, two are this source information establishment initial code.There is the user of authority that the source information that needs transmission to review can be set, and can creates code for this source information.The importer who only has source information just can arrange initial code for source information.
3. the enquiry and verification method of code according to claim 1, it is characterized in that: the winner of code can pass through input code, and authenticity and the legitimacy of this code are inquired about and checked in the retrieve data system, obtains simultaneously the information that code points to.
4. the code continuity according to claim 1 method transmitting and authorize.It is characterized in that: the initial code A that the importer user 1 of source information will point to this source information passes to the user 2 of first intermediate links, after the user 2 of first intermediate links obtains this initial code A, can this initial code of inquiring and authenticating A, this initial code A is also that source information importer user 1 is to the user's 2 of first intermediate links a mandate simultaneously, after inquiring and authenticating initial code A authenticity and legitimacy, authorize the user 2 of first intermediate links to create again a code B for source information.The user 2 of first intermediate links can pass to this code B the user 3 of second intermediate links, after the user 3 of second intermediate links obtains this code B, can this code of inquiring and authenticating B, this code B is also user 3 the mandate of 2 pairs of second intermediate links of user of first intermediate links simultaneously, after inquiring and authenticating code B authenticity and legitimacy, authorize the user 3 of second intermediate links to create again a code C for source information.With the method, authorization code transmits continuously, inquires about and check, create, transmit, reaches the function that code transmits and authorizes continuously.Simultaneously, a user if in his next intermediate links, a plurality of users are arranged, after the code of obtaining the authorization, can and should create for each user in next intermediate links an independent code to source information.
5. code according to claim 4, it is characterized in that code can be numeral, letter, symbol, word, figure, perhaps their combination, each code is unique in data system, this uniqueness refers to intermediate links of a source information, needs a code.
6. code according to claim 4, it is characterized in that: in data system, the code directional information comprises source information and intermediate links information (founder of code is to the information of transmitting the target transmittance process), each code points to source information, at least point to simultaneously the information of the intermediate links of this code, code flow swivel link information comprises the founder of code and the information of transmission target at least.Code also can according to the needs of data system, arrange the information of other intermediate links of pointing to this source information.
7. code according to claim 4 is characterized in that: the mandate of code, the holder who comprises at least this code can create fresh code and the authority of transmitting and the legal right to use of using this code directional information again to this code source information pointed.Needs that also can data system according to claim 2 arrange the mandate of other affairs.
Continuous transmission according to claim 1 and the method that can review the authorization code of source information, it is characterized in that the continuity transmission by authorization code, the code that the data system user passes through to hold, at least can accurately point to the information of source information and this code flow swivel link of unique sensing, can inquire about authenticity and the legitimacy of checking code, obtain the information that code points to, and obtain the legal right to use of this information.Simultaneously also can be according to the functional requirement of data system, by the information of the specific intermediate links of code transmission.This continuity transmission that contains the code of mandate is to review intermediate links, until source information.
9. continuous transmission according to claim 1 and method that can review the authorization code of source information, is characterized in that and can and can realize on the internet by the database technology support.
CN2013100160078A 2013-01-15 2013-01-15 Method for continuously transmitting authorization code with traceable source information Pending CN103092953A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100160078A CN103092953A (en) 2013-01-15 2013-01-15 Method for continuously transmitting authorization code with traceable source information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100160078A CN103092953A (en) 2013-01-15 2013-01-15 Method for continuously transmitting authorization code with traceable source information

Publications (1)

Publication Number Publication Date
CN103092953A true CN103092953A (en) 2013-05-08

Family

ID=48205518

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100160078A Pending CN103092953A (en) 2013-01-15 2013-01-15 Method for continuously transmitting authorization code with traceable source information

Country Status (1)

Country Link
CN (1) CN103092953A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105608588A (en) * 2016-01-04 2016-05-25 布比(北京)网络技术有限公司 Tracing record processing method and apparatus

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609814A (en) * 2012-02-09 2012-07-25 盛骏 Meat tracking device and track supervising method
CN102708410A (en) * 2012-03-14 2012-10-03 山东省射频识别应用工程技术研究中心有限公司 Network tracing system and network tracing method for non-staple food industrial chain
CN102800023A (en) * 2012-07-10 2012-11-28 上海创博食品技术发展有限公司 Method for realizing pork traceability
CN102810194A (en) * 2012-07-27 2012-12-05 常会友 Product quality tracing and anti-fake system on basis of obvious codes and secret codes

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609814A (en) * 2012-02-09 2012-07-25 盛骏 Meat tracking device and track supervising method
CN102708410A (en) * 2012-03-14 2012-10-03 山东省射频识别应用工程技术研究中心有限公司 Network tracing system and network tracing method for non-staple food industrial chain
CN102800023A (en) * 2012-07-10 2012-11-28 上海创博食品技术发展有限公司 Method for realizing pork traceability
CN102810194A (en) * 2012-07-27 2012-12-05 常会友 Product quality tracing and anti-fake system on basis of obvious codes and secret codes

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
卢江海: "《基于全球统一标识***的食品供应链可追溯体系研究》", 《标准科学》 *
孔洪亮等: "《全球统一标识***在食品安全跟踪与追溯体系中的应用》", 《食品科学》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105608588A (en) * 2016-01-04 2016-05-25 布比(北京)网络技术有限公司 Tracing record processing method and apparatus

Similar Documents

Publication Publication Date Title
CN105264487B (en) Authentication system and method
KR102568506B1 (en) Cryptocurrency system based on blockchain architecture and physical marking
CN107636662A (en) Web content certification
CN109544331A (en) Supply chain financial application method, apparatus and terminal device based on block chain
CN108140152A (en) Computer implemented tracking mechanism and data management
CN104376252B (en) Content verification method based on digital signature code
DE102016220656A1 (en) Provision and verification of the validity of a virtual document
CN109858852A (en) A kind of warehouse receipt verification method based on block chain and zero-knowledge proof
CN109635221A (en) Paper publishing evaluation sharing method and system based on block chain
US20200098018A1 (en) System, devices, and methods for acquiring and verifying online information
CN108428140B (en) Traceability information display system and traceability information display method
CN103034671A (en) Automatic screening and propelling method and system with high matching degree for managing user and confidential information
WO2018028373A1 (en) Secure payment method for interactively acquiring accepting terminal information and associating payment card information
CN108985431B (en) Anti-counterfeit label and method for detecting and identifying genuine goods of registered trademark
CN106203551B (en) A kind of Electronic Signature processing method of goods and materials contract services document
CN103092953A (en) Method for continuously transmitting authorization code with traceable source information
DE102013212646B4 (en) Electronic transaction procedure and computer system
CN107045684A (en) Identification system and its recognition methods
US20110216143A1 (en) Licensing identification and management system and coding method of anti-counterfeit label thereof
CN114741734B (en) Drug anti-counterfeiting traceability cloud chain data multi-party safe computing method
US20090327701A1 (en) ID Card Encryption
Ablameiko et al. “The Guarantor” A web‐centric system for organization and remote monitoring of election events
CN114282929A (en) Block chain communication certificate-based rice supply chain digital transaction method
CN103903206A (en) Mobile law enforcement patrol system
CN109949022A (en) A kind of Electronic Coding currency

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: 200030 room 31, No. 1608, Yu Dong Road, Shanghai

Applicant after: Xu Tao

Address before: 200030, triumph Road, Shanghai, No. 7, building 2588

Applicant before: Xu Tao

C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130508