CN108520293A - A kind of product false proof source tracing method, device, server and storage medium - Google Patents
A kind of product false proof source tracing method, device, server and storage medium Download PDFInfo
- Publication number
- CN108520293A CN108520293A CN201810288309.3A CN201810288309A CN108520293A CN 108520293 A CN108520293 A CN 108520293A CN 201810288309 A CN201810288309 A CN 201810288309A CN 108520293 A CN108520293 A CN 108520293A
- Authority
- CN
- China
- Prior art keywords
- product
- block
- identification code
- product identification
- source
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Security & Cryptography (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a kind of product false proof source tracing method, device, server and storage mediums, wherein this method includes:The Transaction Information generated by scanning product identification code is obtained, and is recorded at least one first block;After carrying out Hash encryption to the Transaction Information, the encrypted result of the Transaction Information is recorded at least one second block, and at least one first block and at least one second block are linked in the existing block chain of the product identification code;Block chain after foundation link and the product identification code, carry out the inquiry of the true and false of the product and/or information of tracing to the source.The embodiment of the present invention solves the problems, such as fundamentally prevent counterfeit and shoddy goods using bar code is anti-fake, the inquiry that scanning product identification code carries out authenticity of products and/or information of tracing to the source is realized, the accuracy and practicability of authenticity of products and/or inquiry of tracing to the source are improved.
Description
Technical field
The present embodiments relate to field of computer technology more particularly to a kind of product false proof source tracing method, device, services
Device and storage medium.
Background technology
With the improvement of living standards, the personation that demand of the consumer to product is continuously increased, and frequently occurs in the market
Low-quality goods, not only threatens the life security of consumer, while also causing huge loss to regular manufacturer, therefore,
Product false proof, which is traced to the source, is increasingly becoming consumer and manufacturer's focus of attention.
Currently, product in the market usually using bar code as anti-counterfeiting mark, bar code is a string of Arabic numerals, tool
There is certain coding rule.Fig. 1 is the bar code of photovoltaic module product, is one formed according to coding rule as shown in the figure
String number.Each product corresponds to unique bar code number, can be referred to as the mark of product, and product producer passes through bar code number and interior
Portion's management system can inquire the production relevant information of product, to judge the true and false of product.
But for consumers, it is not known that the coding rule of product, therefore bar code is a string of Arabic numbers nothing but
Word, without practical significance;For illegal molecule, once obtain the coding rule of bar code, so that it may with light batch duplicating item
Shape code, the at low cost and manufacturer that fakes can not distinguish, can not fundamentally prevent counterfeit and shoddy goods in the market.
Invention content
A kind of product false proof source tracing method of present invention offer, device, server and storage medium, to solve to utilize bar code
Carry out anti-fake the problem of can not fundamentally preventing counterfeit and shoddy goods, realize scanning product identification code carry out authenticity of products and
The inquiry for information of tracing to the source improves authenticity of products and traces to the source the accuracy and practicability of inquiry.
In a first aspect, an embodiment of the present invention provides a kind of product false proof source tracing method, this method includes:
The Transaction Information generated by scanning product identification code is obtained, and is recorded at least one first block;
After carrying out Hash encryption to the Transaction Information, the encrypted result of the Transaction Information is recorded at least one the
In two blocks, and at least one first block and at least one second block are linked at the product identification code
Have in block chain;
Block chain after foundation link and the product identification code, carry out the true and false of the product and/or information of tracing to the source
Inquiry.
Second aspect, the embodiment of the present invention additionally provide a kind of product false proof and trace to the source device, which includes:
Data obtaining module for obtaining the Transaction Information generated by scanning product identification code, and is recorded at least one
In a first block;
Encrypted link module, after carrying out Hash encryption to the Transaction Information, by the encryption knot of the Transaction Information
Fruit is recorded at least one second block, and at least one first block and at least one second block are linked
In the existing block chain of the product identification code;
The true and false is traced to the source enquiry module, for according to after link block chain and the product identification code, carry out the product
The true and false and/or information of tracing to the source inquiry.
The third aspect, an embodiment of the present invention provides a kind of servers, including:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors so that one or more of processing
Device realizes the product false proof source tracing method as described in any embodiment of the present invention.
Fourth aspect, the embodiment of the present invention additionally provide a kind of computer readable storage medium, are stored thereon with computer
Program realizes the product false proof source tracing method as described in any embodiment of the present invention when the program is executed by processor.
An embodiment of the present invention provides a kind of product false proof source tracing method, device, server and storage medium, acquisitions to pass through
The Transaction Information that product identification code generates is scanned, is recorded at least one first block, and Transaction Information is breathed out
It is recorded at least one second block after uncommon encryption, and at least one first block and at least one second block is linked at
In the existing block chain of product identification code, according to finally formed block chain and product identification code carry out product the true and false and/or
The inquiry for information of tracing to the source.Timely update block chain etc. when using the decentralization of block chain technology, Hash encryption, point-to-point transaction
Feature, it is ensured that data it is true and reliable, can not distort, fake and forged commodity can not fundamentally be prevented using bar code is anti-fake by solving
The problem of product, realizes the inquiry that scanning product identification code carries out authenticity of products and/or information of tracing to the source, improves authenticity of products
And/or the accuracy and practicability for inquiry of tracing to the source.
Description of the drawings
In order to clearly illustrate the technical solution of exemplary embodiment of the present, below to required in description embodiment
The attached drawing to be used does a simple introduction.Obviously, the attached drawing introduced is a part of the embodiment of the invention to be described
Attached drawing, rather than whole attached drawings without creative efforts, may be used also for those of ordinary skill in the art
To obtain other attached drawings according to these attached drawings.
Fig. 1 is photovoltaic module product bar code and coding rule schematic diagram in the prior art;
Fig. 2 is a kind of flow chart for product false proof source tracing method that the embodiment of the present invention one provides;
Fig. 3 be it is provided by Embodiment 2 of the present invention multiple Transaction Information is recorded after formed block chain schematic diagram;
Fig. 4 is a kind of flow chart for product false proof source tracing method that the embodiment of the present invention three provides;
Fig. 5 is the offer of the embodiment of the present invention three to the encryption of critical data progress Hash, record, the signal for forming block chain
Figure;
Fig. 6 is that a kind of product false proof that the embodiment of the present invention four provides is traced to the source the flow chart of querying method;
Fig. 7 A-7D are that the product false proof that the embodiment of the present invention four provides is traced to the source query result schematic diagram;
Fig. 8 is that a kind of product false proof that the embodiment of the present invention five provides is traced to the source the structure diagram of device;
Fig. 9 is a kind of structural schematic diagram for server that the embodiment of the present invention six provides.
Specific implementation mode
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining the present invention rather than limitation of the invention.It also should be noted that in order to just
Only the parts related to the present invention are shown in description, attached drawing rather than entire infrastructure.
Embodiment one
Fig. 2 is a kind of flow chart for product false proof source tracing method that the embodiment of the present invention one provides, and the present embodiment is applicable
In the anti-fake information of tracing to the source to product is inquired the case where, for example, for photovoltaic module product it is anti-fake trace to the source information into
The case where row inquiry.This method can trace to the source device or server to execute by product false proof provided in an embodiment of the present invention, should
Hardware can be used in device and/or the mode of software is realized, specifically comprises the following steps:
S201 obtains the Transaction Information generated by scanning product identification code, and is recorded at least one first block.
Wherein, product identification code be for identification product when used unique identification, for example, it may be product corresponds to
Quick Response Code.Optionally, the identification code of product is corresponding with the block chain of record product relevant information, and block chain can be by multiple areas
Block (block for being used to store information) links, and the relevant information of product is record in each block.As product title,
Material, test data etc..
Transaction Information refers to product information (such as product quantity, product identification code that both parties generate in process of exchange
Deng) and flow to information (such as flow directions of product trading both sides, transaction), the transaction in the present embodiment refers to based on scanning product mark
Know code to be traded.It is traced back by product false proof specifically, the process of exchange of both parties can be transaction initiator (i.e. the seller)
Product identification code on the dedicated client scan product in source initiates this transaction, is carried out successively to all products of this transaction
After product identification code scanning transaction request is sent to transaction acceptance side (i.e. buyer);It traces back again by product false proof transaction acceptance side
After the dedicated client in source receives the transaction request, it is traded confirmation, Transaction Information can be uploaded after confirming successfully.
It can after transaction acceptance side uploads Transaction Information, directly acquire the Transaction Information, and recorded to obtain product trading information
In at least one first block.It optionally,, can be by Transaction Information when recording Transaction Information in order to save memory space
In the database, the mapping relations between Transaction Information and the database storage address for storing the Transaction Information are recorded in for storage
In first block.
It should be noted that the first block is the memory block for store transaction information, handed over being recorded into the first block
When easy information, since the memory space of each block is limited, after a block storage is full, it can continue next
Unrecorded Transaction Information is stored in block.
The encrypted result of Transaction Information is recorded at least one second by S202 after carrying out Hash encryption to Transaction Information
In block, and at least one first block will be recorded and at least one second block has been linked at product identification code
Have in block chain.
Wherein, Hash encryption is a kind of One-way encryption algorithm, and encryption information can be treated by hash algorithm and generates one section
Unique cryptographic Hash of specific length cannot but regain confidential information to be added by this cryptographic Hash.Just because of Hash is encrypted
Algorithm have this irreversibility and uniqueness, to ensure that be-encrypted data authenticity and can not tamper.Has area
Block chain refers to the already present corresponding block chain in the product identification code before this transaction occurs, no matter after the product export
Process of exchange whether occurred, can all exist in product identification code and have block chain.If for example, the product did not carry out friendship
Easily, existing block chain is critical data (such as product bar code number, bill of materials, the certification recorded in the process of producing product
Data) block formed block chain.If the product carried out transaction, it is to record in the process of producing product to have block chain
The block chain that the block of Transaction Information is formed before the block and record of critical data.
After the Transaction Information obtained in S201 is encrypted according to Hash Encryption Algorithm, encrypted result is recorded in
In at least one second block, Transaction Information will be recorded at least one second block and S201 of recording of encrypted result again at this time
At least one first block be linked in the existing block chain of the product identification code.
It should be noted that the second block is memory block for store transaction information encrypted result, to the second block
When middle recording of encrypted result, since the memory space of each block is limited, after a block storage is full, it can continue
Unrecorded encrypted result is stored in next block.
Optionally, the first block and the second block can be same blocks, can also be different block, that is to say, that extremely
Few is that there may be repetition blocks between first block and at least one second block, for example, block is generally divided into area
Build and block main body two parts by Transaction Information or can indicate that the mapping relations of Transaction Information are recorded in the block body of block
In, Transaction Information encrypted result is recorded in the block head of block.
S203 carries out looking into for the true and false of product and/or information of tracing to the source according to the block chain and product identification code after link
It askes.
Wherein, carry out authenticity of products inquiry and/or trace to the source information inquiry when, be based in product identification code and S202
The newest block chain formed after new block has been linked in having block chain.Optionally, it is according to product when the true and false is inquired
At least one second block for recording Transaction Information encrypted result in identification code and block chain is inquired;Trace to the source information inquiry when
It is to be inquired according at least one first block for recording Transaction Information in product identification code and block chain.
A kind of product false proof source tracing method is present embodiments provided, the transaction letter generated by scanning product identification code is obtained
Breath, is recorded at least one first block, and is recorded at least one second after carrying out Hash encryption to Transaction Information
In block, and at least one first block and at least one second block are linked in the existing block chain of product identification code,
The inquiry of the true and false and/or information of tracing to the source of product is carried out according to finally formed block chain and product identification code.Utilize block chain
The decentralization of technology, Hash encryption, point-to-point transaction timely update block chain the features such as, it is ensured that data it is true and reliable, no
It can distort, solve the problems, such as fundamentally prevent counterfeit and shoddy goods using bar code is anti-fake, realize scanning product
Identification code carries out the inquiry of authenticity of products and/or information of tracing to the source, and improves the accuracy and reality of authenticity of products and/or inquiry of tracing to the source
The property used.
Further, initiator's manufacture counterfeit and shoddy goods of merchandising in order to prevent, which scan the initiation transaction of its product identification code, asks
It asks, may be used when obtaining the Transaction Information by scanning product identification code generation:Product identification code is obtained to be authenticated;If
Certification success is then obtained by scanning the product information and flow to information that product identification code generates.
Wherein, all product identification codes scanned when initiating transaction request to transaction initiator are verified, specifically
Verification process can be stored in number when the corresponding all product identification codes of this transaction request and regular manufacturer are produced product
It is compared verification according to the product identification code in library, if the corresponding all product identification codes of transaction request can look in the database
To matching product identification code, then certification success, you can to obtain the Transaction Information of transaction acceptance side's upload.
Further, dealer carries out the imitation of counterfeit and shoddy goods after producer has purchased some products in order to prevent,
It is sold again after genuine products from counterfeit products is mixed.After S201 is obtained by scanning the Transaction Information that product identification code generates, also wrap
It includes:Transaction Information is sent to whole users in network in the form of the whole network is broadcasted.
Wherein, the whole use Transaction Information each time of both parties being all sent in the form of the whole network is broadcasted in network
Family, optionally, user's dedicated client that can be traced to the source by product false proof receive the Transaction Information, specifically, user can be with
It traces to the source in product false proof and the name of product of oneself concern is set in dedicated client, when such product is there are when process of exchange,
Client will obtain the Transaction Information of the whole network broadcast transmission automatically so that all users can recognize the every of concern product
Transaction Information, when oneself is bought it may determine that going out with the presence or absence of counterfeit and shoddy goods.For example, client 1 is wide from the whole network
The Transaction Information for broadcasting middle acquisition client 2 and manufacturer is to have purchased 10 products, and in the transaction request that client 2 initiates to client 1
Including 20 products, client 1, which can determine, at this time wherein there will necessarily be counterfeit and shoddy goods, therefore, can directly refuse this
Secondary transaction request.
Embodiment two
The present embodiment provides a kind of preferred embodiment on the basis of the various embodiments described above, is suitable for occurring repeatedly handing over
When easy process, the case where multiple Transaction Information is recorded at least one block, and forms block chain.
In the present embodiment, it is assumed that have a collection of product, which has N casees, has M product, the transaction of this batch of product in every case
Process is that product has first been sold to dealer A by manufacturer J, and dealer A is changed hands again is sold to dealer B by product, and dealer B finally will
Product has been sold to client C.
As shown in figure 3, the first time transaction of this batch of product is the transaction of manufacturer J and dealer A, specific process of exchange is
Manufacturer J imports product data by scanning the identification code of each product and initiates transaction request, after dealer A confirms transaction i.e. on
Transaction Information is passed, the Transaction Information by this transaction is recorded in the first block 2 at this time, wherein the particular content of record is such as
Shown in sash in Fig. 3 under the first block 2, include the product information of this batch of product:In the case number (CN) 1 of product to N, every case product
The identification code 1 of each product arrives M;And this transaction flow to information:Manufacturer J to dealer A.When the transaction letter in block 2
After the completion of breath record, the first block 2 is linked at behind block 1, wherein block 1 is existing block chain in product identification code
In the last one block.
Dealer A has carried out second with dealer B and has merchandised after having purchased this batch of product, specific process of exchange
It is that dealer A imports product data initiation transaction request by scanning the identification code of each product, after dealer B confirms transaction,
Dealer A and dealer B are ganged up and are faked in order to prevent, can be allowed when dealer A and dealer B carry out this transaction
The seller before this batch of product, i.e. manufacturer J upload Transaction Information again after being reaffirmed, at this time by the transaction of this transaction
Information is recorded in the first block 3, wherein the particular content of record is as shown in the sash under the first block 3 in Fig. 3, this batch
The product information of product in the first block 2 as recorded;And that merchandises flows to information in manufacturer J to the basis of dealer A
On be added to the process of dealer A to dealer B.After the completion of the Transaction Information record in the first block 3, by the first block 3
It is linked at behind the first block 2.
This batch of product has been sold to client C and has carried out third time transaction by last dealer B, and specific process of exchange is to sell
Quotient B imports product data initiation transaction request by scanning the identification code of each product, after dealer C confirms transaction, in order to anti-
Only dealer B and client C are ganged up and are faked, and can allow this batch of product when dealer B and dealer C carry out this transaction
The seller before, i.e. manufacturer J and dealer A upload Transaction Information again after reaffirming, at this time by the friendship of this transaction
Easy information is recorded in the first block 4, wherein the particular content of record as shown in the sash under the first block 4 in Fig. 3, this
The product information of product is criticized as recorded in the first block 3;And the information that flows to merchandised adds on the basis of the first block 3
Add dealer B to the process of client C.After the completion of the Transaction Information record in the first block 4, the first block 4 is linked at
Behind first block 3.
In the present embodiment when multiple process of exchange occurs for same a collection of product, process of exchange needs current both parties and it
After preceding counterparty confirms, multiple Transaction Information is recorded at least one first block, and form block chain, is made
Product point-to-point Transaction Information each time can clearly be inquired by obtaining user, improve authenticity of products and/or inquiry of tracing to the source
Accuracy and practicability.
Embodiment three
Fig. 4 is a kind of flow chart for product false proof source tracing method that the embodiment of the present invention three provides, and Fig. 5 is that the present invention is implemented
What example three provided carries out Hash encryption, record, the schematic diagram for forming block chain to critical data, and the present embodiment is in above-mentioned each implementation
On the basis of example, further schematically illustrate to the product false proof source tracing method progress of Fig. 4 in conjunction with Fig. 5, this method includes:
S401, the critical data of extraction product in process of production.
Wherein, the critical data of product in process of production refers to the recording product information that product generates in process of production
And the related data of performance, such as when product is photovoltaic module, the critical data of the product can be bar code number, bill of materials
(Bill of Material, BOM), certification, the IV test datas test data of electric current and power (voltage), EL test pictures
(photovoltaic products internal flaw monitoring photo), environmental data, the related datas such as product hierarchy.
Optionally, the method for extracting critical data can be the enterprise system (System in enterprises
Applications and Products, SAP) manage system or Enterprise Resources Plan (Enterprise Resource
Planning, ERP) extraction of critical data is carried out in management system.
The encrypted result of critical data is recorded at least one third by S402 after carrying out Hash encryption to critical data
In block, and generate block chain.
Wherein, critical data is encrypted is also to encrypt to generate Merkel tree step by step with Hash Encryption Algorithm
(Merkle Tree) ensure that the authenticity of product data can not distort well due to the encrypted irreversibility of Hash and uniqueness
Property.Specific ciphering process is as shown in Figure 5:First to the critical data EL test pictures of S401 extractions, certification, environmental data, item
Code number, bill of materials, IV test datas, product hierarchy and date of manufacture are arranged by hash algorithm for each critical data
Unique cryptographic Hash (cryptographic Hash 01 in such as Fig. 5 arrives cryptographic Hash 08) of one specific length, then set by Hash Encryption Algorithm pair
The cryptographic Hash two-by-two set carries out Hash encryption, obtains cryptographic Hash 11 and arrives cryptographic Hash 14, then again arrives encrypted cryptographic Hash 11
Cryptographic Hash 14 generates Merkel tree after cryptographic Hash carries out secondary encryption two-by-two, be respectively stored in the Tx_Root of third block 1 with
And in the Tx_Root of third block 2.It should be noted that Tx_Root is to store depositing for encryption key data result in block
Storage area domain.
Further, since the block for being stored with critical data will be linked into block chain, i.e. third block 1 and third block
2 carry out uplink operation, and third block 2 carries out uplink operation to form block chain with third block 3.In order in block chain
The content of middle quick look-up record includes the encryption recorded in previous block in the block chain of generation in the latter block
As a result.
Illustratively, it as shown in figure 5, including not only the memory blocks Tx_Root of storage encrypted result in each block, also wraps
Previous block data memory block (for storing encrypted result in previous block), current block timestamp memory block is included (to be used for
Current block is capped timestamp after being formed to current block) and current block number memory block.
It should be noted that third block is memory block for storing encryption key data result, to third block
When middle recording of encrypted result, since the memory space of each block is limited, after a block storage is full, it can continue under
Unrecorded encrypted result is stored in one block.For example, the memory of a block as shown in Figure 5 only has 2M, it can not be in third
Encryption and the recording process of all critical datas are completed at the same time in block 1, therefore can be by all areas critical data Fen Liangge
Record is encrypted in block (i.e. third block 1 and third block 2).
S403 generates product identification code according to the encrypted result in block chain.
Since product identification code is the unique identification of product for identification, it is possible to pass through the Hash obtained in S402
Encrypted result generates product identification code, irreversible because Hash encrypted result is unique, so the product identification code generated
It is also unique, is not easy to be copied.
Specifically, it can first generate an identification code to generate the process of product identification code, it is arranged one accordingly for it
Location, by the Hash encrypted result of critical data in block chain and the necessary information for generating product identification code (such as scanning identification code
The information that display interface needs afterwards) it is stored in class, after the address of class and the identification code address are associated, the identification code is
It is the identification code of the product.It should be noted that the product identification code generated is changeless, but with product trading
The corresponding block chain of several increase product identification codes is updated constantly.
Optionally, the product identification code of generation can be printed and is affixed on product, convenient for both parties by scanning the product
Identification code completes process of exchange, and user carries out authenticity of products by scanning the product identification code and traces to the source information inquiry.
S404 obtains the Transaction Information generated by scanning product identification code, and is recorded at least one first block.
The encrypted result of Transaction Information is recorded at least one second by S405 after carrying out Hash encryption to Transaction Information
In block, and at least one first block will be recorded and at least one second block has been linked at product identification code
Have in block chain.
Wherein, critical data is encrypted in the encryption of Transaction Information, record, the process for forming block chain and S402,
Record, the process for forming block chain are the same, are repeated no more.
S406 carries out looking into for the true and false of product and/or information of tracing to the source according to the block chain and product identification code after link
It askes.
Optionally, it is to record encryption key data result at least according in product identification code, block chain when the true and false is inquired
One third block and at least one second block for recording Transaction Information encrypted result are inquired;Trace to the source information inquiry when
It is to be inquired according at least one first block for recording Transaction Information in product identification code and block chain.
It should be noted that the first block, the second block and third block can be same blocks, can also be different
Block, that is to say, that being between at least one first block, at least one second block and at least one third block can be with
In the presence of repetition block.For example, after having recorded Transaction Information encrypted result in some block, also larger remaining storage is empty
Between, space waste, can continue the encrypted result for recording critical data in the block residual memory space in order to prevent, this
When, which is both the second block and third block.
Product false proof source tracing method provided in this embodiment is carried out by obtaining the critical data of product in process of production
Hash encryption after being recorded in third block, generates block chain and product identification code;Product trading information and Hash are encrypted again
Transaction Information afterwards is separately recorded in by product identification code in the first block and the second block, and will be recorded in process of exchange
Block, which is linked at product identification code, to be had in block chain, and the true of product is carried out according to finally formed block chain and product identification code
Pseudo- and/or information of tracing to the source inquiry.It encrypts to form Merkel tree, point-to-point friendship using the decentralization of block chain technology, Hash
Easily timely update block chain the features such as, it is ensured that data it is true and reliable, can not distort, solve using bar code is anti-fake can not be from
The problem of fundamentally preventing counterfeit and shoddy goods realizes scanning product identification code and carries out authenticity of products and/or information of tracing to the source
Inquiry, improves the accuracy and practicability of authenticity of products and/or inquiry of tracing to the source.
Example IV
Fig. 6 is that a kind of product false proof that provides of the embodiment of the present invention four is traced to the source the flow chart of querying method, and the present embodiment exists
On the basis of the various embodiments described above, a kind of preferred embodiment that product false proof is traced to the source is provided, with reference to the product of Fig. 7 A-7D
Anti-fake query result schematic diagram of tracing to the source is illustrated the product false proof source tracing method of Fig. 6, and this method includes:
S601, the critical data of extraction product in process of production.
The encrypted result of critical data is recorded at least one third by S602 after carrying out Hash encryption to critical data
In block, and generate block chain.
S603 generates product identification code according to the encrypted result in block chain.
S604 obtains the Transaction Information generated by scanning product identification code, and is recorded at least one first block.
Transaction Information is sent to whole users in network by S605 in the form of the whole network is broadcasted.
The encrypted result of Transaction Information is recorded at least one second by S606 after carrying out Hash encryption to Transaction Information
In block, and at least one first block will be recorded and at least one second block is linked at the existing block chain of product identification code
In.
S607 obtains the corresponding product identification code of true and false inquiry instruction, to product mark in response to authenticity of products inquiry instruction
The block chain data for knowing code carry out Hash verification, to judge the true and false of product;And/or it in response to product traceability inquiry instruction, obtains
The corresponding product identification code of inquiry instruction of tracing to the source is taken, the Transaction Information of record is searched in the block chain of product identification code, with aobvious
Show the information of tracing to the source of product.
Wherein, it is special can be that user is traced to the source by product false proof for authenticity of products inquiry instruction and product traceability inquiry instruction
The instruction that sends out of client.For example, it may be user will be inquired by product false proof dedicated client scan of tracing to the source
Product identification code, click the instruction that the related key of true-false inquiring and/or information of tracing to the source is sent out.
Specifically, when receiving the authenticity of products inquiry instruction that user sends out, the corresponding product of the inquiry instruction is obtained
Identification code (the namely identification code of the product to be inquired of user) finds its corresponding block chain, from this by the identification code
At least one second block and record encryption key data knot of record Transaction Information Hash encrypted result are searched in block chain
At least one third block of fruit, will be in Transaction Information Hash encrypted result therein and encryption key data result and database
The correct Transaction Information Hash encrypted result of the product of storage is made whether consistent comparison with encryption key data result, if
Unanimously, then illustrate that the product is true, if inconsistent, illustrate that the product is false, and show query result.
When receiving the product traceability inquiry instruction that user sends out, the corresponding product identification code of the inquiry instruction is obtained
(the namely identification code of the product to be inquired of user) finds its corresponding block chain, from the block chain by the identification code
Middle at least one first block for searching record Transaction Information, the Transaction Information recorded in block is shown.
Optionally, user can only inquire the true and false information of product, can also only to product trace to the source information into
Row inquiry can also simultaneously inquire the true and false information of product and information of tracing to the source.
Illustratively, as shown in Figure 7 A, user is traced to the source dedicated client scan product by mobile terminal product false proof
After identification code (such as Quick Response Code), the true and false checking information of the product will be shown in the terminal, and Fig. 7 A are shown if false product
The block chain verification result figure on middle the right;The block chain verification result figure that the left side in Fig. 7 A is shown if certified products, wherein containing
Some essential informations of the product, such as bar code number, model, grade, size and the product can also be carried out below the interface
The inquiry of specific data.
Specifically, as shown in Figure 7 B, user clicks the authentication button below the block chain verification interface of certified products, into Fig. 7 B
In authentication interface, user by click the certification attachment specifically to be checked (TUV certifications or UL certifications) may occur in which in Fig. 7 B
Certification credential interface, show the certification certificate to be checked of user.As seen in figure 7 c, user clicks the block chain verification of certified products
BOM buttons below interface show the specific bill of materials of the product into the interfaces BOM in Fig. 7 C.As illustrated in fig. 7d, it uses
The testing button below the block chain verification interface of certified products is clicked at family, and the test interface into Fig. 7 D shows the EL of the product
Test pictures and the corresponding test data of the picture, such as insulation pressure resistance, grade, maximum power (Pmax).User clicks just
Client's button (button for sending out product traceability inquiry instruction) below the block chain verification interface of product enters in Fig. 7 D at this time
Customer interface, show the information for the both parties that the All Activity of the product is related to.
Product false proof source tracing method provided in this embodiment is carried out by obtaining the critical data of product in process of production
Hash encryption after being recorded in third block, generates block chain and product identification code;Product trading information and Hash are encrypted again
Transaction Information afterwards is separately recorded in by product identification code in the first block and the second block, and will be recorded in process of exchange
Block, which is linked at product identification code, to be had in block chain, and the true of product is carried out according to finally formed block chain and product identification code
Pseudo- and/or information of tracing to the source inquiry.It encrypts to form Merkel tree, point-to-point friendship using the decentralization of block chain technology, Hash
Easily timely update block chain the features such as, it is ensured that data it is true and reliable, can not distort, solve using bar code is anti-fake can not be from
The problem of fundamentally preventing counterfeit and shoddy goods realizes scanning product identification code and carries out authenticity of products and/or information of tracing to the source
Inquiry, improves the accuracy and practicability of authenticity of products and/or inquiry of tracing to the source.
Embodiment five
Fig. 8 is that a kind of product false proof that provides of the embodiment of the present invention five is traced to the source the structure diagram of device, and the device is executable
The product false proof source tracing method that any embodiment of the present invention is provided has the corresponding function module of execution method and beneficial to effect
Fruit.As shown in figure 8, the device includes:
Data obtaining module 801 for obtaining the Transaction Information generated by scanning product identification code, and is recorded at least
In one the first block;
Encrypted link module 802 records the encrypted result of Transaction Information after carrying out Hash encryption to Transaction Information
It is linked at product identification code at least one second block, and by least one first block and at least one second block
Have in block chain;
The true and false is traced to the source enquiry module 803, for according to the block chain and product identification code after link, carrying out the true and false of product
And/or the inquiry for information of tracing to the source.
It present embodiments provides a kind of product false proof to trace to the source device, obtains the transaction letter generated by scanning product identification code
Breath, is recorded at least one first block, and is recorded at least one second after carrying out Hash encryption to Transaction Information
In block, and at least one first block and at least one second block are linked in the existing block chain of product identification code,
The inquiry of the true and false and/or information of tracing to the source of product is carried out according to finally formed block chain and product identification code.Utilize block chain
The decentralization of technology, Hash encryption, point-to-point transaction timely update block chain the features such as, it is ensured that data it is true and reliable, no
It can distort, solve the problems, such as fundamentally prevent counterfeit and shoddy goods using bar code is anti-fake, realize scanning product
Identification code carries out the inquiry of authenticity of products and/or information of tracing to the source, and improves the accuracy and reality of authenticity of products and/or inquiry of tracing to the source
The property used.
Further, initiator's manufacture counterfeit and shoddy goods of merchandising in order to prevent, which scan the initiation transaction of its product identification, asks
It asks, above- mentioned information acquisition module 801 includes:
Identification code authentication unit is authenticated for obtaining product identification code;
Information acquisition unit, in the case of successful certification, obtaining the product generated by scanning product identification code
Information and flow to information.
Further, above-mentioned apparatus further includes:
Data extraction module, for extracting the critical data of product in process of production;
Encrypted link module 802 is additionally operable to after carrying out Hash encryption to critical data, the encrypted result of critical data is remembered
Record generates block chain at least one third block;
Identification code generating module, for generating product identification code according to the encrypted result in block chain;
Wherein, in the block chain of generation, the encrypted result recorded in previous block is included in the latter block.
Further, dealer carries out the imitation of counterfeit and shoddy goods after producer has purchased some products in order to prevent,
It is sold again after genuine products from counterfeit products is mixed, above-mentioned apparatus further includes:
Transaction Information sending module, whole use for being sent to Transaction Information in the form of the whole network is broadcasted in network
Family.
Further, above-mentioned true and false enquiry module 803 of tracing to the source includes:
True and false query unit, in response to authenticity of products inquiry instruction, obtaining the corresponding product mark of true and false inquiry instruction
Know code, Hash verification is carried out to the block chain data of product identification code, to judge the true and false of product;And/or
It traces to the source query unit, in response to product traceability inquiry instruction, acquisition is traced to the source the corresponding product mark of inquiry instruction
Know code, the Transaction Information of record is searched in the block chain of product identification code, to show the information of tracing to the source of product.
It is worth noting that, in the embodiment of the anti-fake device of tracing to the source of the said goods, included each unit and module are only
It is divided according to function logic, but is not limited to above-mentioned division, as long as corresponding function can be realized;Example
Such as, which can only include communication module and processing module, and communication module realizes that the acquisition of critical data, Transaction Information obtain
It takes and sends;The correlations such as encryption, record, the link of block and the anti-fake inquiry traced to the source of processing modules implement information and data
Function.In addition, the specific name of each functional unit is also only to facilitate mutually distinguish, the protection being not intended to restrict the invention
Range.
Embodiment six
Fig. 9 is a kind of structural schematic diagram for server that the embodiment of the present invention six provides.Fig. 9 is shown suitable for being used for realizing
The block diagram of the exemplary servers 90 of embodiment of the present invention.The server 90 that Fig. 9 is shown is only an example, should not be to this
The function and use scope of inventive embodiments bring any restrictions.As shown in figure 9, the server 90 is with the shape of universal computing device
Formula shows.The component of the server 90 can include but is not limited to:One or more processor or processing unit 901 are
System memory 902, the bus 903 of connection different system component (including system storage 902 and processing unit 901).
Bus 903 indicates one or more in a few class bus structures, including memory bus or Memory Controller,
Peripheral bus, graphics acceleration port, processor or the local bus using the arbitrary bus structures in a variety of bus structures.It lifts
For example, these architectures include but not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC)
Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Server 90 typically comprises a variety of computer system readable media.These media can any can be serviced
The usable medium that device 90 accesses, including volatile and non-volatile media, moveable and immovable medium.
System storage 902 may include the computer system readable media of form of volatile memory, such as deposit at random
Access to memory (RAM) 904 and/or cache memory 905.Server 90 may further include it is other it is removable/can not
Mobile, volatile/non-volatile computer system storage medium.Only as an example, storage system 906 can be used for reading and writing not
Movably, non-volatile magnetic media (Fig. 9 do not show, commonly referred to as " hard disk drive ").It, can be with although being not shown in Fig. 9
It provides for the disc driver to moving non-volatile magnetic disk (such as " floppy disk ") read-write, and to removable non-volatile
The CD drive of CD (such as CD-ROM, DVD-ROM or other optical mediums) read-write.In these cases, each driving
Device can be connected by one or more data media interfaces with bus 903.System storage 902 may include at least one
There is one group of (for example, at least one) program module, these program modules to be configured to perform this for program product, the program product
Invent the function of each embodiment.
Program/utility 908 with one group of (at least one) program module 907 can be stored in such as system and deposit
In reservoir 902, such program module 907 includes but not limited to operating system, one or more application program, other programs
Module and program data may include the realization of network environment in each or certain combination in these examples.Program mould
Block 907 usually executes function and/or method in embodiment described in the invention.
Server 90 can also be with one or more external equipments 906 (such as keyboard, sensing equipment, display 910 etc.)
Communication, can also be enabled a user to one or more equipment interact with the equipment communicate, and/or with make the server 90
Any equipment (such as network interface card, modem etc.) communication that can be communicated with one or more of the other computing device.This
Kind communication can be carried out by input/output (I/O) interface 911.Also, server 90 can also pass through network adapter 912
With one or more network (such as LAN (LAN), wide area network (WAN) and/or public network, such as internet) communication.
As shown in figure 9, network adapter 912 is communicated by bus 903 with other modules of server 90.Although should be understood that in figure
It is not shown, other hardware and/or software module can be used in conjunction with server 90, including but not limited to:Microcode, device drives
Device, redundant processing unit, external disk drive array, RAID system, tape drive and data backup storage system etc..
Processing unit 901 is stored in program in system storage 902 by operation, to perform various functions using with
And data processing, such as realize the product false proof source tracing method that the embodiment of the present invention is provided.
Embodiment seven
The embodiment of the present invention seven additionally provides a kind of computer readable storage medium, is stored thereon with computer program, should
Program can realize the product false proof source tracing method described in above-described embodiment when being executed by processor.
The arbitrary of one or more computer-readable media may be used in the computer storage media of the embodiment of the present invention
Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable
Storage medium can be for example but not limited to:System, device or the device of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or
The arbitrary above combination of person.The more specific example (non exhaustive list) of computer readable storage medium includes:There are one tools
Or the electrical connections of multiple conducting wires, portable computer diskette, hard disk, random access memory (RAM), read-only memory (ROM),
Erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light
Memory device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer readable storage medium can
With to be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or
Person is in connection.
Computer-readable signal media may include in a base band or as the data-signal that a carrier wave part is propagated,
Wherein carry computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including but unlimited
In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can
Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for
By instruction execution system, device either device use or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including but not limited to:
Wirelessly, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
It can be write with one or more programming languages or combinations thereof for executing the computer that operates of the present invention
Program code, described program design language include object oriented program language, such as Java, Smalltalk, C++, also
Including conventional procedural programming language-such as " C " language or similar programming language.Program code can be complete
It executes, partly executed on the user computer on the user computer entirely, being executed as an independent software package, part
Part executes or executes on a remote computer or server completely on the remote computer on the user computer.It is relating to
And in the situation of remote computer, remote computer can pass through the network of any kind, including LAN (LAN) or wide area network
(WAN), it is connected to subscriber computer, or, it may be connected to outer computer (such as led to using ISP
Cross internet connection).
Above-described embodiment serial number is for illustration only, can not represent the quality of embodiment.
Will be appreciated by those skilled in the art that each module of the above-mentioned embodiment of the present invention or each operation can be used and lead to
Computing device realizes that they can be concentrated on single computing device, or be distributed in multiple computing devices and formed
Network on, optionally, they can be realized with the program code that computer installation can perform, so as to storing them
Be performed by computing device in the storage device, either they are fabricated to each integrated circuit modules or by they
In multiple modules or operation be fabricated to single integrated circuit module to realize.In this way, the present invention is not limited to any specific
The combination of hardware and software.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiment, just to refer each other for the same or analogous part between each embodiment.
The foregoing is merely the preferred embodiment of the present invention, are not intended to restrict the invention, for those skilled in the art
For, the present invention can have various modifications and changes.It is all within spirit and principles of the present invention made by any modification, equivalent
Replace, improve etc., it should all be included in the protection scope of the present invention.
Claims (10)
1. a kind of product false proof source tracing method, which is characterized in that including:
The Transaction Information generated by scanning product identification code is obtained, and is recorded at least one first block;
After carrying out Hash encryption to the Transaction Information, the encrypted result of the Transaction Information is recorded at least one secondth area
In block, and at least one first block and at least one second block are linked at having for the product identification code
In block chain;
Block chain after foundation link and the product identification code, carry out the inquiry of the true and false of the product and/or information of tracing to the source.
2. according to the method described in claim 1, it is characterized in that, obtaining the Transaction Information generated by scanning product identification code
Before, further include:
Extract the critical data of the product in process of production;
After carrying out Hash encryption to the critical data, the encrypted result of the critical data is recorded at least one third area
In block, and generate block chain;
The product identification code is generated according to the encrypted result in the block chain;
Wherein, in the block chain of generation, the encrypted result recorded in previous block is included in the latter block.
3. according to the method described in claim 1, it is characterized in that, obtaining the transaction letter generated by scanning product identification code
Breath, including:
The product identification code is obtained to be authenticated;
If certification success is obtained by scanning the product information and flow to information that product identification code generates.
4. according to the method described in claim 1, it is characterized in that, obtaining the Transaction Information generated by scanning product identification code
Later, further include:
The Transaction Information is sent to whole users in network in the form of the whole network is broadcasted.
5. according to the method described in claim 1, it is characterized in that, according to after link block chain and the product identification code,
The inquiry of the true and false of the product and/or information of tracing to the source is carried out, including:
In response to the authenticity of products inquiry instruction, the corresponding product identification code of the true and false inquiry instruction is obtained, to the production
The block chain data of product identification code carry out Hash verification, to judge the true and false of the product;And/or
In response to the product traceability inquiry instruction, the corresponding product identification code of inquiry instruction of tracing to the source described in acquisition, in the production
The Transaction Information that record is searched in the block chain of product identification code, to show the information of tracing to the source of the product.
The device 6. a kind of product false proof is traced to the source, which is characterized in that including:
Data obtaining module for obtaining the Transaction Information by scanning product identification code generation, and is recorded at least one the
In one block;
Encrypted link module remembers the encrypted result of the Transaction Information after carrying out Hash encryption to the Transaction Information
Record is linked at institute at least one second block, and by least one first block and at least one second block
In the existing block chain for stating product identification code;
The true and false is traced to the source enquiry module, for according to after link block chain and the product identification code, carry out the true of the product
Pseudo- and/or information of tracing to the source inquiry.
7. device according to claim 6, which is characterized in that further include:
Data extraction module, for extracting the critical data of the product in process of production;
The encrypted link module is additionally operable to after carrying out Hash encryption to the critical data, by the encryption of the critical data
As a result it is recorded at least one third block, and generates block chain;
Identification code generating module, for generating the product identification code according to the encrypted result in the block chain;
Wherein, in the block chain of generation, the encrypted result recorded in previous block is included in the latter block.
8. device according to claim 6, which is characterized in that true and false enquiry module of tracing to the source includes:
True and false query unit, in response to the authenticity of products inquiry instruction, obtaining the corresponding production of the true and false inquiry instruction
Product identification code carries out Hash verification, to judge the true and false of the product to the block chain data of the product identification code;And/or
It traces to the source query unit, for the corresponding production of inquiry instruction of in response to the product traceability inquiry instruction, tracing to the source described in acquisition
Product identification code searches the Transaction Information of record in the block chain of the product identification code, to show the letter of tracing to the source of the product
Breath.
9. a kind of server, which is characterized in that including:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors so that one or more of processors are real
The now product false proof source tracing method as described in any in claim 1-5.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor
The product false proof source tracing method as described in any in claim 1-5 is realized when execution.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810288309.3A CN108520293A (en) | 2018-04-03 | 2018-04-03 | A kind of product false proof source tracing method, device, server and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810288309.3A CN108520293A (en) | 2018-04-03 | 2018-04-03 | A kind of product false proof source tracing method, device, server and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108520293A true CN108520293A (en) | 2018-09-11 |
Family
ID=63431815
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810288309.3A Pending CN108520293A (en) | 2018-04-03 | 2018-04-03 | A kind of product false proof source tracing method, device, server and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108520293A (en) |
Cited By (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109088734A (en) * | 2018-09-17 | 2018-12-25 | 杭州推点科技发展有限公司 | A kind of coding method and system |
CN109492880A (en) * | 2018-10-18 | 2019-03-19 | 平安科技(深圳)有限公司 | Roduction track method and terminal device based on block chain technology |
CN109522683A (en) * | 2018-09-26 | 2019-03-26 | 百度在线网络技术(北京)有限公司 | Software source tracing method, system, computer equipment and storage medium |
CN109544189A (en) * | 2018-11-28 | 2019-03-29 | 杭州复杂美科技有限公司 | A kind of method for anti-counterfeit, equipment and storage medium |
CN109785132A (en) * | 2018-12-21 | 2019-05-21 | 众安信息技术服务有限公司 | A kind of anti-fake source tracing method, device and storage medium based on block chain |
CN109784945A (en) * | 2018-12-27 | 2019-05-21 | 广州安食通信息科技有限公司 | Foodstuff traceability method, system and storage medium based on big data and block chain |
CN109949059A (en) * | 2019-03-29 | 2019-06-28 | 烟台市首诺智能装备有限公司 | Case code association anti-fake traceability system, method and computer equipment based on block chain |
CN110097380A (en) * | 2019-04-30 | 2019-08-06 | 上海循康建筑科技有限公司 | Trace to the source information architecture method and system and the source tracing method of household building material product |
CN110163751A (en) * | 2019-04-15 | 2019-08-23 | 广州致链科技有限公司 | Block chain access system and its implementation towards alliance's chain |
CN110471929A (en) * | 2019-07-11 | 2019-11-19 | 深圳市中农网有限公司 | Product information retroactive method, device and computer equipment |
CN110516459A (en) * | 2019-08-29 | 2019-11-29 | 上海梓兆科技发展有限公司 | A kind of product data retroactive method and system based on block chain |
CN110691079A (en) * | 2019-09-25 | 2020-01-14 | 东北大学 | Multi-copy reliability verification method based on block chain encryption |
CN110826087A (en) * | 2019-11-01 | 2020-02-21 | 腾讯科技(深圳)有限公司 | Block chain-based decoration material management method, device, terminal and medium |
IT201800010008A1 (en) * | 2018-11-02 | 2020-05-02 | Francesco Michetti | COMPUTERIZED METHOD AND SYSTEM FOR THE CERTIFICATION OF THE AUTHENTICITY OF GOODS AND SERVICES THROUGH THE BLOCKCHAIN NETWORK |
CN111178477A (en) * | 2019-12-03 | 2020-05-19 | 福建自贸试验区厦门片区益客联信息科技有限公司 | Commodity two-dimensional code generation method |
CN111325293A (en) * | 2018-12-14 | 2020-06-23 | 北京京东尚科信息技术有限公司 | Monitoring method, system, device, equipment and computer readable medium |
CN111325564A (en) * | 2020-03-17 | 2020-06-23 | 河南佼荣网络科技有限公司 | Method and system for tracing supply chain by using block chain |
CN111368953A (en) * | 2020-03-10 | 2020-07-03 | 大仝智能科技有限公司 | Product anti-counterfeiting traceability system and method |
CN111429146A (en) * | 2018-12-24 | 2020-07-17 | 阿里巴巴集团控股有限公司 | Tracing processing method, system, service platform and electronic equipment |
CN111445269A (en) * | 2020-03-30 | 2020-07-24 | 深圳前海量子云码科技有限公司 | Industrial hemp traceability supervision method, system, equipment and storage medium |
CN111476326A (en) * | 2020-04-01 | 2020-07-31 | 深圳前海量子云码科技有限公司 | Method, device, equipment and storage medium for marking anti-counterfeiting mark on automobile toughened glass |
CN111553767A (en) * | 2020-04-29 | 2020-08-18 | 天网互联科技(深圳)有限公司 | Shared house leasing system, method and storage medium based on block chain |
CN111582885A (en) * | 2020-05-06 | 2020-08-25 | 中国计量大学 | Block chain-based vaccine management method and storage medium |
CN111833071A (en) * | 2019-03-26 | 2020-10-27 | 财团法人亚洲大学 | Method for establishing and inquiring production and marketing histories for quality assurance of agricultural products |
CN112070516A (en) * | 2020-09-18 | 2020-12-11 | 北京京东振世信息技术有限公司 | Product tracing method and device and block chain system |
CN112488728A (en) * | 2019-08-22 | 2021-03-12 | 佛山市顺德区美的饮水机制造有限公司 | Anti-counterfeiting identification method and device for consumable and electronic equipment |
CN112800313A (en) * | 2021-01-25 | 2021-05-14 | 吉林省吉科软信息技术有限公司 | Intelligent information tracing system based on cloud platform |
CN112981853A (en) * | 2019-12-13 | 2021-06-18 | 青岛海尔洗衣机有限公司 | Washing control method and device |
CN113095815A (en) * | 2021-04-15 | 2021-07-09 | 北京佰宸讯高新技术有限公司 | Commodity transaction method and system, storage medium and platform |
CN113139202A (en) * | 2020-01-19 | 2021-07-20 | 浙江爱多特大健康科技有限公司 | Information processing method and device, electronic equipment and computer storage medium |
CN113487337A (en) * | 2021-07-13 | 2021-10-08 | 中国联合网络通信集团有限公司 | Product information storage method, tracing method and block chain platform |
CN113570384A (en) * | 2021-07-26 | 2021-10-29 | 大连民族大学 | Agricultural product tracing method and system based on block chain |
CN113938491A (en) * | 2021-09-02 | 2022-01-14 | 中国科学院信息工程研究所 | Instruction data traceable tamper-proof method and system based on block chain technology |
CN114548331A (en) * | 2020-11-18 | 2022-05-27 | 鲍勃斯脱梅克斯股份有限公司 | Method for providing authenticity information |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107220837A (en) * | 2017-05-31 | 2017-09-29 | 北京汇通金财信息科技有限公司 | A kind of destination object source tracing method and device |
CN107316239A (en) * | 2017-07-14 | 2017-11-03 | 众安信息技术服务有限公司 | A kind of authentification of message and source tracing method and system based on block chain |
CN107704493A (en) * | 2017-08-23 | 2018-02-16 | 中链科技有限公司 | It is a kind of to be used to provide the method and system that product is traced to the source |
CN107748994A (en) * | 2017-10-31 | 2018-03-02 | 杭州趣链科技有限公司 | A kind of anti-fake traceability system based on block chain |
-
2018
- 2018-04-03 CN CN201810288309.3A patent/CN108520293A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107220837A (en) * | 2017-05-31 | 2017-09-29 | 北京汇通金财信息科技有限公司 | A kind of destination object source tracing method and device |
CN107316239A (en) * | 2017-07-14 | 2017-11-03 | 众安信息技术服务有限公司 | A kind of authentification of message and source tracing method and system based on block chain |
CN107704493A (en) * | 2017-08-23 | 2018-02-16 | 中链科技有限公司 | It is a kind of to be used to provide the method and system that product is traced to the source |
CN107748994A (en) * | 2017-10-31 | 2018-03-02 | 杭州趣链科技有限公司 | A kind of anti-fake traceability system based on block chain |
Cited By (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109088734A (en) * | 2018-09-17 | 2018-12-25 | 杭州推点科技发展有限公司 | A kind of coding method and system |
CN109088734B (en) * | 2018-09-17 | 2022-04-12 | 广州推点科技发展有限公司 | Coding method and system |
CN109522683A (en) * | 2018-09-26 | 2019-03-26 | 百度在线网络技术(北京)有限公司 | Software source tracing method, system, computer equipment and storage medium |
CN109492880A (en) * | 2018-10-18 | 2019-03-19 | 平安科技(深圳)有限公司 | Roduction track method and terminal device based on block chain technology |
IT201800010008A1 (en) * | 2018-11-02 | 2020-05-02 | Francesco Michetti | COMPUTERIZED METHOD AND SYSTEM FOR THE CERTIFICATION OF THE AUTHENTICITY OF GOODS AND SERVICES THROUGH THE BLOCKCHAIN NETWORK |
CN109544189A (en) * | 2018-11-28 | 2019-03-29 | 杭州复杂美科技有限公司 | A kind of method for anti-counterfeit, equipment and storage medium |
CN111325293A (en) * | 2018-12-14 | 2020-06-23 | 北京京东尚科信息技术有限公司 | Monitoring method, system, device, equipment and computer readable medium |
CN109785132A (en) * | 2018-12-21 | 2019-05-21 | 众安信息技术服务有限公司 | A kind of anti-fake source tracing method, device and storage medium based on block chain |
CN111429146B (en) * | 2018-12-24 | 2023-05-02 | 阿里巴巴集团控股有限公司 | Tracing processing method, tracing processing system, service platform and electronic equipment |
CN111429146A (en) * | 2018-12-24 | 2020-07-17 | 阿里巴巴集团控股有限公司 | Tracing processing method, system, service platform and electronic equipment |
CN109784945A (en) * | 2018-12-27 | 2019-05-21 | 广州安食通信息科技有限公司 | Foodstuff traceability method, system and storage medium based on big data and block chain |
CN111833071A (en) * | 2019-03-26 | 2020-10-27 | 财团法人亚洲大学 | Method for establishing and inquiring production and marketing histories for quality assurance of agricultural products |
CN109949059A (en) * | 2019-03-29 | 2019-06-28 | 烟台市首诺智能装备有限公司 | Case code association anti-fake traceability system, method and computer equipment based on block chain |
CN110163751A (en) * | 2019-04-15 | 2019-08-23 | 广州致链科技有限公司 | Block chain access system and its implementation towards alliance's chain |
CN110097380A (en) * | 2019-04-30 | 2019-08-06 | 上海循康建筑科技有限公司 | Trace to the source information architecture method and system and the source tracing method of household building material product |
CN110471929A (en) * | 2019-07-11 | 2019-11-19 | 深圳市中农网有限公司 | Product information retroactive method, device and computer equipment |
CN112488728A (en) * | 2019-08-22 | 2021-03-12 | 佛山市顺德区美的饮水机制造有限公司 | Anti-counterfeiting identification method and device for consumable and electronic equipment |
CN110516459A (en) * | 2019-08-29 | 2019-11-29 | 上海梓兆科技发展有限公司 | A kind of product data retroactive method and system based on block chain |
CN110691079A (en) * | 2019-09-25 | 2020-01-14 | 东北大学 | Multi-copy reliability verification method based on block chain encryption |
CN110691079B (en) * | 2019-09-25 | 2021-07-13 | 东北大学 | Multi-copy reliability verification method based on block chain encryption |
CN110826087A (en) * | 2019-11-01 | 2020-02-21 | 腾讯科技(深圳)有限公司 | Block chain-based decoration material management method, device, terminal and medium |
CN110826087B (en) * | 2019-11-01 | 2023-07-25 | 腾讯科技(深圳)有限公司 | Decoration material management method, device, terminal and medium based on block chain |
CN111178477A (en) * | 2019-12-03 | 2020-05-19 | 福建自贸试验区厦门片区益客联信息科技有限公司 | Commodity two-dimensional code generation method |
CN112981853B (en) * | 2019-12-13 | 2024-01-16 | 青岛海尔洗衣机有限公司 | Washing control method and device |
CN112981853A (en) * | 2019-12-13 | 2021-06-18 | 青岛海尔洗衣机有限公司 | Washing control method and device |
CN113139202A (en) * | 2020-01-19 | 2021-07-20 | 浙江爱多特大健康科技有限公司 | Information processing method and device, electronic equipment and computer storage medium |
CN111368953A (en) * | 2020-03-10 | 2020-07-03 | 大仝智能科技有限公司 | Product anti-counterfeiting traceability system and method |
CN111325564B (en) * | 2020-03-17 | 2024-02-02 | 河南佼荣网络科技有限公司 | Method and system for realizing supply chain tracing by using block chain |
CN111325564A (en) * | 2020-03-17 | 2020-06-23 | 河南佼荣网络科技有限公司 | Method and system for tracing supply chain by using block chain |
CN111445269A (en) * | 2020-03-30 | 2020-07-24 | 深圳前海量子云码科技有限公司 | Industrial hemp traceability supervision method, system, equipment and storage medium |
CN111476326A (en) * | 2020-04-01 | 2020-07-31 | 深圳前海量子云码科技有限公司 | Method, device, equipment and storage medium for marking anti-counterfeiting mark on automobile toughened glass |
CN111553767B (en) * | 2020-04-29 | 2023-04-18 | 天网互联科技(深圳)有限公司 | Shared house leasing system, method and storage medium based on block chain |
CN111553767A (en) * | 2020-04-29 | 2020-08-18 | 天网互联科技(深圳)有限公司 | Shared house leasing system, method and storage medium based on block chain |
CN111582885A (en) * | 2020-05-06 | 2020-08-25 | 中国计量大学 | Block chain-based vaccine management method and storage medium |
CN112070516A (en) * | 2020-09-18 | 2020-12-11 | 北京京东振世信息技术有限公司 | Product tracing method and device and block chain system |
CN114548331A (en) * | 2020-11-18 | 2022-05-27 | 鲍勃斯脱梅克斯股份有限公司 | Method for providing authenticity information |
CN112800313A (en) * | 2021-01-25 | 2021-05-14 | 吉林省吉科软信息技术有限公司 | Intelligent information tracing system based on cloud platform |
CN113095815A (en) * | 2021-04-15 | 2021-07-09 | 北京佰宸讯高新技术有限公司 | Commodity transaction method and system, storage medium and platform |
CN113487337A (en) * | 2021-07-13 | 2021-10-08 | 中国联合网络通信集团有限公司 | Product information storage method, tracing method and block chain platform |
CN113487337B (en) * | 2021-07-13 | 2024-02-09 | 中国联合网络通信集团有限公司 | Product information storage method, tracing method and blockchain platform |
CN113570384A (en) * | 2021-07-26 | 2021-10-29 | 大连民族大学 | Agricultural product tracing method and system based on block chain |
CN113938491A (en) * | 2021-09-02 | 2022-01-14 | 中国科学院信息工程研究所 | Instruction data traceable tamper-proof method and system based on block chain technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108520293A (en) | A kind of product false proof source tracing method, device, server and storage medium | |
JP6990197B2 (en) | Safe and traceable manufacturing parts | |
WO2021175023A1 (en) | Electronic warehouse receipt source tracing method and apparatus, computer device, and storage medium | |
CN111316279A (en) | Computer-implemented system and method for connecting a blockchain with a digital twin set | |
US20200374131A1 (en) | Method and system for generalized provenance solution for blockchain supply chain applications | |
CN107209787A (en) | Improve the search capability of dedicated encrypted data | |
CN111445272A (en) | Agricultural product traceability information processing system and method based on block chain | |
CN108537314A (en) | Product marketing system and method based on Quick Response Code | |
WO2020182005A1 (en) | Method for information processing in digital asset certificate inheritance transfer, and related device | |
CN104798052B (en) | The matched method and apparatus of consumer | |
CN105096134A (en) | Security scheme for authenticating digital entities and aggregate object origins | |
CN109377363B (en) | Block chain-based Internet of things data transaction architecture and transaction security method thereof | |
WO2019246399A1 (en) | Digital ledger for unique item ids with ownership | |
CN104574122A (en) | Two-dimensional code anti-counterfeit and random product packaging goods-fleeing preventing method | |
WO2011026326A1 (en) | Tracing and recalling system for managing commodity circulation based on internet | |
CN108537047B (en) | Method and device for generating information based on block chain | |
CN103218723B (en) | Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure | |
CN110162722A (en) | Products Show method, server and storage medium based on two dimensional code | |
CN113420049A (en) | Data circulation method and device, electronic equipment and storage medium | |
CN115204873A (en) | Block chain-based open big data transaction matching method and system | |
CN117240605B (en) | Data transaction method, device, equipment and storage medium | |
CN109918451A (en) | Data base management method and system based on block chain | |
CN113129008A (en) | Data processing method and device, computer readable medium and electronic equipment | |
CN110545262A (en) | block chain data transmission platform convenient for region accuracy | |
CN107911220A (en) | A kind of endorsement method, signature apparatus and terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180911 |