WO2020056597A1 - 物品身份管理方法、终端、微处理单元、标识设备和*** - Google Patents

物品身份管理方法、终端、微处理单元、标识设备和*** Download PDF

Info

Publication number
WO2020056597A1
WO2020056597A1 PCT/CN2018/106287 CN2018106287W WO2020056597A1 WO 2020056597 A1 WO2020056597 A1 WO 2020056597A1 CN 2018106287 W CN2018106287 W CN 2018106287W WO 2020056597 A1 WO2020056597 A1 WO 2020056597A1
Authority
WO
WIPO (PCT)
Prior art keywords
item
signature
information
processing unit
terminal
Prior art date
Application number
PCT/CN2018/106287
Other languages
English (en)
French (fr)
Inventor
王健
谢辉
Original Assignee
王健
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 王健 filed Critical 王健
Priority to PCT/CN2018/106287 priority Critical patent/WO2020056597A1/zh
Priority to CN201880097523.9A priority patent/CN112689979B/zh
Publication of WO2020056597A1 publication Critical patent/WO2020056597A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present disclosure relates to the technical field of article management, and in particular, to an article identity management method, terminal, micro-processing unit, identification device, and system.
  • the present disclosure provides an article identity management method, terminal, micro-processing unit, identification device, and system.
  • a first aspect of the present disclosure provides a method for managing an article identity, which is applied to a terminal, and the method includes:
  • the first signature is the micro-processing unit using the private key of the first item stored in the micro-processing unit to pair the target
  • the information is obtained after digitally signing the information
  • the validity of the first identity information of the first item recorded in the micro-processing unit is determined by verifying the first signature by using the public key of the first item.
  • the receiving the first signature of the target information sent by the micro-processing unit in the first item, the first signature is the micro-processing unit using the first item stored in the micro-processing unit.
  • the private key obtained after digitally signing the target information includes:
  • the micro processing unit After the micro processing unit digitally signs the target information by using the private key of the first item, the micro processing unit receives the first signature sent by the micro processing unit.
  • the receiving the first signature of the target information sent by the micro-processing unit in the first item, the first signature is the micro-processing unit using the first item stored in the micro-processing unit.
  • the private key obtained after digitally signing the target information includes:
  • the micro processing unit After the micro processing unit generates the target information and digitally signs the target information by using the private key of the first item, receiving the first signature and the target information sent by the micro processing unit ; Wherein the target information includes a random number or identity information of the first item.
  • the method further includes:
  • Determining whether the first identity information is authentic by verifying the second signature by using the public key of the first item and the second identity information;
  • data update information is sent to the blockchain, and the data update information is used by the blockchain to update an identity use state of the first item to a used state.
  • the method further comprises: performing a query in the blockchain again according to the first identity information to obtain the identity usage status of the first item from the blockchain;
  • the first item is identified as the item identity used.
  • the target information is identification information of the first article
  • the first signature is used by the microprocessing unit. Said method is obtained by digitally signing said identification information by said private key of said first item, said method further comprising:
  • the method further includes:
  • the method further includes: generating an information update request for the first item, where the information update request is used to update the information of the first item stored on the blockchain, and the first The information of an item includes the first identity information and / or attribute information;
  • the information of the first item on the blockchain is updated according to the information update request, and the update operation includes at least one of the following: information addition, information deletion, information modification, and / or information abolition.
  • an article identity management method which is applied to a micro-processing unit, the method includes:
  • Digitally signing target information by using a private key of a first item stored in the micro processing unit to obtain a first signature of the target information, where the first item is an item in which the micro processing unit is located;
  • obtaining the first signature of the target information by digitally signing the target information by using the private key of the first item stored in the micro processing unit includes:
  • the first signature is obtained by digitally signing the target information by using the private key of the first item.
  • obtaining the first signature of the target information by digitally signing the target information by using the private key of the first item stored in the micro processing unit includes:
  • the target information includes a random number or identity information of the first item
  • the first signature is obtained by digitally signing the target information by using the private key of the first item.
  • the method further includes:
  • the method before the digitally signing the target information by using the private key of the first item stored in the micro processing unit, the method further includes:
  • the private key of the first item and the first identity information of the first item are stored locally in the micro processing unit.
  • the method further includes: setting a private key of the first item stored locally in the micro processing unit to prohibit external devices from reading and writing.
  • an article identity management method is provided, which is applied to a tagging device, the method comprising: driving a micro processing unit in a first article to generate a public key and a private key of the first article;
  • a terminal including:
  • a first receiving module configured to receive a first signature of target information sent by a micro-processing unit in a first item, where the first signature is the micro-processing unit using the first item stored in the micro-processing unit Obtained by digitally signing the target information with a private key of
  • a first obtaining module configured to obtain a public key of the first item from a blockchain
  • a first verification module is configured to determine the validity of the first identity information of the first item recorded in the micro-processing unit by verifying the first signature by using the public key of the first item.
  • the receiving module is configured to:
  • the micro processing unit After the micro processing unit digitally signs the target information by using the private key of the first item, the micro processing unit receives the first signature sent by the micro processing unit.
  • the receiving module is configured to:
  • the micro processing unit After the micro processing unit generates the target information and digitally signs the target information by using the private key of the first item, receiving the first signature and the target information sent by the micro processing unit ; Wherein the target information includes a random number or identity information of the first item.
  • the terminal further includes:
  • a second acquisition module configured to acquire the first identity information of the first item from the micro processing unit
  • a query module configured to perform a query in the blockchain according to the first identity information to obtain second identity information of the first item from the blockchain;
  • the first receiving module is further configured to receive a second signature of the first identity information sent by the microprocessing unit, where the second signature is a private key pair used by the microprocessing unit to use the first item Obtained by digitally signing the first identity information;
  • a second verification module configured to determine whether the first identity information is authentic by verifying the second signature by using the public key of the first item and the second identity information
  • a first update module configured to: when it is determined that the first identity information is true, send data update information to the blockchain, the data update information being used by the blockchain to use the identity status of the first item Updated to Used.
  • the terminal further includes:
  • the query module is further configured to query the blockchain again according to the first identity information to obtain the identity usage status of the first item from the blockchain;
  • An identification module configured to identify the first item as the used item identity when the status of the use of the identity of the first item obtained from the blockchain is used.
  • the terminal is a first node located on the first item circulation link
  • the target information is identification information of the first item
  • the first signature is the micro processing unit using the It is obtained by digitally signing the identification information with the private key of the first item
  • the terminal further includes:
  • a signature module configured to digitally sign the first signature by using the private key of the terminal to obtain a second signature
  • a sending module is configured to send the first signature and the second signature to the blockchain, so that the first signature and the second signature are stored in the blockchain.
  • the terminal is a terminal of an intermediate node in the first article circulation link, and the terminal further includes:
  • a second receiving module configured to receive a third signature sent by a previous node device in the first article circulation link
  • a signature module configured to digitally sign the third signature by using the private key of the terminal to obtain a fourth signature
  • a sending module configured to send the third signature and the fourth signature to the blockchain, so that the third signature and the fourth signature are stored in the blockchain.
  • the apparatus further includes:
  • a second update module configured to generate an information update request for the first item, where the information update request is used to update the information of the first item stored on the blockchain,
  • the information includes the first identity information and / or attribute information;
  • a signature module configured to digitally sign the information update request by using the private key of the terminal to obtain a fifth signature
  • a sending module configured to send the information update request and the fifth signature to the blockchain, and be used by a smart contract on the blockchain to verify the fifth signature through the public key of the terminal And, after passing the verification, perform an update operation on the information of the first item on the blockchain according to the information update request, the update operation includes at least one of the following: information addition, information deletion, information modification, and / Or the information is discontinued.
  • a microprocessing unit including:
  • a signature module configured to digitally sign target information by using a private key of a first item stored in the micro processing unit to obtain a first signature of the target information, where the first item is where the micro processing unit is located Items
  • a sending module configured to send the first signature to a terminal, for the terminal to determine the micro signature by verifying the first signature by using a public key of the first item obtained from a blockchain Validity of the first identity information of the first item recorded in the processing unit.
  • the signature module is configured to:
  • the first signature is obtained by digitally signing the target information by using the private key of the first item.
  • the signature module is configured to generate the target information, where the target information includes a random number or identity information of the first item;
  • the first signature is obtained by digitally signing the target information by using the private key of the first item.
  • a sending module configured to send the first identity information of the first item to the terminal for the terminal to query in the blockchain according to the first identity information ;
  • the signature module is further configured to digitally sign the first identity information by using the private key of the first item to obtain a second signature of the first identity information;
  • the sending module is further configured to send the second signature to the terminal for the terminal to obtain the second identity information of the first item from the blockchain by using the first signature A public key of an item and the second identity information verify the second signature to determine whether the first identity information is authentic.
  • a generating module configured to generate the first information under the drive of a labeling device before digitally signing the target information by using the private key of the first item stored in the micro processing unit.
  • the public and private keys of the item are configured to generate the first information under the drive of a labeling device before digitally signing the target information by using the private key of the first item stored in the micro processing unit.
  • the storage module is configured to store a private key of the first item and the first identity information of the first item locally in the micro processing unit.
  • it further includes a setting module, configured to set a private key of the first item stored locally in the micro processing unit to prohibit external devices from reading and writing.
  • a setting module configured to set a private key of the first item stored locally in the micro processing unit to prohibit external devices from reading and writing.
  • a marking device including:
  • An uploading module is used to upload the public key of the first item to the blockchain.
  • a computer-readable storage medium on which a computer program is stored, characterized in that when the computer program is executed by a processor, the steps of the method according to the first aspect are implemented.
  • An eighth aspect provides a terminal, including:
  • a processor configured to execute the computer program in the memory to implement the steps of the method according to the first aspect.
  • a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, implements the steps of the method in the second aspect.
  • a microprocessing unit including:
  • a processor configured to execute the computer program in the memory to implement the steps of the method according to the second aspect.
  • a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the steps of the method according to the third aspect are implemented.
  • a microprocessing unit including:
  • a processor configured to execute the computer program in the memory to implement the steps of the method according to the third aspect.
  • an article management system including: a terminal, a micro-processing unit located in the article, and an identification device;
  • the terminal is configured to implement the steps of the method according to the first aspect
  • the micro processing unit is configured to implement the steps of the method according to the second aspect
  • the identification device is configured to implement the steps of the method according to the third aspect.
  • the micro-processing unit can be driven by the tagging device to generate the public and private keys of the article, and the public key of the article is sent to the blockchain for storage via the tagging device.
  • the micro-processing unit in the item can use the private key of the item stored in the micro-processing unit to digitally sign the target information and send it to the terminal, so that the terminal according to the blockchain
  • the public key of the item obtained on the Internet is used to verify the received signature, so that the validity of the identity information of the item recorded in the micro processing unit can be determined.
  • the public key of the item is stored in the blockchain by the tagging device, the item and its corresponding public key have an untamperable binding relationship, and the private key of the item is set in the microprocessing unit in the item, which is difficult when the item is complete
  • the micro processing unit is easy to obtain, so the problem of identity forgery or application can be avoided, and when verifying, only the terminal and the item of the blockchain can be accessed, and no additional knowledge or additional equipment is required. Therefore, the learning cost of the object audience in anti-counterfeit identification will not be increased.
  • the verification method based on the blockchain is used, it is possible to avoid errors caused by the centralized authentication method.
  • Fig. 1 is a schematic flowchart of an article identity management method according to an exemplary embodiment of the present disclosure.
  • Fig. 2 is a schematic flowchart of an article identity management method according to an exemplary embodiment of the present disclosure.
  • FIG. 3 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 1.
  • FIG. 4 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 2.
  • Fig. 5 is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure.
  • Fig. 6a is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure.
  • Fig. 6b is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure.
  • Fig. 7 is a schematic diagram of a commodity circulation link according to an exemplary embodiment of the present disclosure.
  • Fig. 8 is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure.
  • Fig. 9 is a schematic flowchart of an article identity management method according to an exemplary embodiment of the present disclosure.
  • FIG. 10 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 9.
  • FIG. 11 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 9.
  • Fig. 12 is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure.
  • Fig. 13 is a block diagram showing a terminal according to an exemplary embodiment of the present disclosure.
  • Fig. 14 is a block diagram showing another terminal according to an exemplary embodiment of the present disclosure.
  • Fig. 15 is a block diagram showing still another terminal according to an exemplary embodiment of the present disclosure.
  • Fig. 16 is a block diagram showing still another terminal according to an exemplary embodiment of the present disclosure.
  • Fig. 17 is a block diagram showing still another terminal according to an exemplary embodiment of the present disclosure.
  • Fig. 18 is a block diagram showing still another terminal according to an exemplary embodiment of the present disclosure.
  • Fig. 19 is a block diagram showing a micro processing unit according to an exemplary embodiment of the present disclosure.
  • Fig. 20 is a block diagram showing another micro processing unit according to an exemplary embodiment of the present disclosure.
  • Fig. 21 is a block diagram showing a labeling device according to an exemplary embodiment of the present disclosure.
  • Fig. 22 is a structural diagram of an article management system according to an exemplary embodiment of the present disclosure.
  • Fig. 23 is a structural diagram of another article management system according to an exemplary embodiment of the present disclosure.
  • Fig. 24 is a structural diagram of an electronic device according to an exemplary embodiment of the present disclosure.
  • Fig. 1 is a schematic flowchart of an article identity management method according to an exemplary embodiment of the present disclosure. The method is applied to a labeling device. As shown in Fig. 1, the method includes the following steps:
  • step 101 the micro processing unit in the first article is driven to generate a public key and a private key of the first article.
  • the first item may be any item or commodity, and the micro processing unit is disposed inside the first item.
  • the micro processing unit may be installed in the first item in the following manner: After the first item is formed, the An installation method in which the first article can be physically removed before being removed.
  • the micro processing unit may be a micro processing chip, which may include a microprocessor and an antenna / contact.
  • an applet for implementing the method may be installed inside the microprocessor, the applet may be used to generate a public-private key pair of the first item, or the function of the applet may also be implemented by hardware.
  • a hardware module for generating a public-private key pair of the first item is provided inside the microprocessor.
  • the communication method between the micro processing unit and the terminal may adopt NFC (Near Field Communication).
  • NFC Near Field Communication
  • the tagging device can initiate a tagging (or registration) process, and the micro processing unit can be driven to generate the first A key pair for an item, including the public and private keys of the first item.
  • Step 102 After obtaining the public key of the first item from the micro processing unit, upload the public key of the first item to the blockchain.
  • the marking device uploads the public key of the first item from the micro processing unit to the blockchain for storage, and the private key of the first item It is stored locally in the micro processing unit, and the private key of the first item stored in the micro processing unit may be set to prohibit external devices from reading and writing, and the micro processing unit may read the private key of the first item, The private key of the first item cannot be written.
  • the identity information and attribute information of the first item may also be uploaded to the blockchain for storage.
  • the micro-processing unit may also store the identity information and attribute information of the first item, and optionally, the identity information and attribute information of the first item may also be stored. Instead of uploading to the blockchain, it is only stored in the micro-processing unit of the first item.
  • the subsequent terminal for identifying the item verifies that the identity information of the first item is valid, the item can be obtained from the micro-processing unit Identity information, attribute information.
  • the identification information and attribute information of the first item stored in the micro-processing unit may be sent to the micro-processing unit by the tagging device, or the micro-processing unit may be assembled for the first item by other devices. Write to the chip.
  • Fig. 2 is a schematic flowchart of an article identity management method according to an exemplary embodiment of the present disclosure. The method is applied to a terminal. As shown in Fig. 2, the method includes the following steps:
  • Step 201 Receive a first signature of target information sent by a micro-processing unit in a first item, where the first signature is the micro-processing unit using the private key of the first item stored in the micro-processing unit to perform the target information on the target information. Obtained after digital signature.
  • Step 202 Obtain the public key of the first item from the blockchain.
  • Step 203 Determine the validity of the first identity information of the first item recorded in the micro-processing unit by verifying the first signature by using the public key of the first item.
  • the first signature can be verified by the terminal through the original text of the target information and the public key of the first item obtained from the blockchain during verification.
  • the micro processing unit can be confirmed.
  • the first identity information of the first item recorded in the valid is valid, but the first signature fails to be verified, it is confirmed that the first identity information is invalid.
  • the public key of the item is stored in the blockchain by the tagging device, the item and its corresponding public key have an untamperable binding relationship, and the private key of the item is set in the microprocessing unit in the item, which is difficult when the item is complete
  • the micro processing unit is easy to obtain, so the problem of identity forgery or application can be avoided, and when verifying, only the terminal and the item of the blockchain can be accessed, and no additional knowledge or additional equipment is required. Therefore, the learning cost of the object audience in anti-counterfeit identification will not be increased.
  • the verification method based on the blockchain is used, it is possible to avoid errors caused by the centralized authentication method.
  • the target information may be generated by the terminal and sent to the micro processing unit in the first item, or may be generated by the micro processing unit, or the information stored in the micro processing unit may be used as the target information.
  • An example can be shown in Figures 3 and 4.
  • FIG. 3 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 1. The method is applied to a terminal. As shown in FIG. 3, as described in step 201: receiving a micro-processing unit in a first article The step of sending the first signature of the target information may include:
  • step 2011 the target information is generated, and the target information includes a random number.
  • Step 2012 Send the target information to the micro processing unit.
  • Step 2013 After the micro processing unit digitally signs the target information by using the private key of the first item, receive the first signature sent by the micro processing unit.
  • the terminal randomly generates a random number, and then sends the random number to the micro processing unit in the first item.
  • the micro processing unit uses the private key pair of the first item stored in the micro processing unit.
  • the random number can be digitally signed to obtain the first signature, and then the micro processing unit returns the first signature to the terminal for the terminal to verify the first signature.
  • FIG. 4 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 2. The method is applied to a terminal.
  • step 201 receiving a micro-processing unit in a first article
  • the step of sending the first signature of the target information may include:
  • step 2014 after the micro processing unit generates the target information and digitally signs the target information by using the private key of the first item, the micro processing unit receives the first signature and the target information sent by the micro processing unit.
  • the target information includes a random number or identity information of the first item.
  • the micro-processing unit may generate a random number under the drive of the terminal, and use the stored in the micro-processing unit.
  • the first signature is obtained by digitally signing the random number of the first item's private key, and then the microprocessing unit returns the first signature and the random number to the terminal for the terminal to verify the first signature.
  • the micro processing unit may use existing information stored in the micro processing unit, such as the first identity information of the first item, and the micro processing unit may obtain the first identity information by digitally signing the first identity information using the first item ’s private key. The first signature, and then the micro processing unit returns the first signature to the terminal together with the random number.
  • FIG. 5 is a schematic flowchart of another method for managing an item's identity according to an exemplary embodiment of the present disclosure.
  • the method is applied to a terminal.
  • the method provides a method for checking the authenticity of an item's identity, as shown in FIG. 5.
  • the method also includes the following steps:
  • Step 204 Obtain the first identity information of the first item from the micro processing unit.
  • Step 205 Query in the blockchain according to the first identity information to obtain the second identity information of the first item from the blockchain.
  • the first identity information stored in the micro-processing unit of the first item is first obtained, and the first identity information is used as a query basis to find the first item stored in the blockchain in the blockchain.
  • the second identity information which is stored in the blockchain by the identification device by the method shown in step 102, is the real identity information of the first item, so it can be used to verify the micro The authenticity of the first identity information in the processing unit.
  • Step 206 Receive a second signature of the first identity information sent by the microprocessing unit, where the second signature is obtained after the microprocessing unit digitally signs the first identity information by using the private key of the first item.
  • Step 207 Determine whether the first identity information is authentic by verifying the second signature by using the public key of the first item and the second identity information.
  • the micro processing unit may first confirm whether the terminal is an authorized terminal.
  • an authentication method for confirming whether the terminal is an authorized terminal may be implemented by, for example, a password, a secret key, or the like.
  • Step 208 When it is determined that the first identity information is true, send data update information to the blockchain, and the data update information is used by the blockchain to update the identity use status of the first item to a used status.
  • step 208 may be performed, that is, the first item After the identity information is true or false, data update information needs to be sent to the blockchain in order to update the identity usage status of the first item to the used status in the blockchain.
  • the first item is an electronic product, such as a mobile phone.
  • the terminal obtains the second signature of the first identity information of the mobile phone from the micro-processing unit in the mobile phone that is used to execute the above method, it retrieves the block from the block. Query the second identity information of the mobile phone on the chain and verify the second signature. When the verification is passed, it is confirmed that the first identity information is true, and the mobile phone is updated to be activated on the blockchain.
  • the first identity information of the mobile phone may be information such as IMEI (International Mobile Equipment Identity), SN (Serial Number, serial number), and the like.
  • the item may be a non-electronic product, such as a bottle of wine
  • the first identity information may be an identification code of the bottle of wine (the identification code is unique).
  • Traditional identification codes are mostly password-coated cards (commonly known as Attached to the product in the form of a scratch card), or placed inside the product packaging in the form of a two-dimensional code or a laser code.
  • the identification code can be stored in a micro-processing unit inside the bottle of wine.
  • the verification method is the same as the above-mentioned mobile phone, and will not be described again.
  • it may further include the following steps:
  • Step 209 Query the blockchain again according to the first identity information to obtain the identity usage status of the first item from the blockchain.
  • Step 210 When the status of using the identity of the first item obtained from the blockchain is used, the first item is identified as being used for the identity of the item.
  • the identity usage status of the first item is updated to the used status on the blockchain
  • a query is again performed in the blockchain based on the first identity information in order to confirm the identity of the first item in the blockchain. Whether the identity usage status was successfully updated to the used status.
  • the first item may be identified as the item identity used, for example, the first item is displayed as the item identity used on the identification page of the terminal.
  • FIG. 6a is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure.
  • the method is applied to a terminal.
  • the target information is identification information of the first item
  • the first signature is obtained after the microprocessing unit digitally signs the identification information by using the private key of the first item.
  • the method further includes The following steps:
  • Step 211 Digitally sign the first signature by using the private key of the terminal to obtain a second signature.
  • Step 212 Send the first signature and the second signature to the blockchain, so that the first signature and the second signature are stored in the blockchain.
  • the first signature and the second signature can be obtained from the end of the blockchain, and the second signature is verified by using the public key of the terminal.
  • the verification it can be confirmed that the first item and the first item circulation link have indeed passed the node where the terminal is located, that is, the first node.
  • the verification fails, it can be confirmed that the first item does not pass the first node.
  • Fig. 6b is a schematic flowchart of another article identity management method according to an exemplary embodiment of the present disclosure. The method is applied to a terminal.
  • the terminal is a terminal of an intermediate node on the first article circulation link, such as As shown in FIG. 6b, the method further includes the following steps:
  • Step 213 Receive a third signature sent by a previous node device in the first article circulation link.
  • Step 214 Digitally sign the third signature by using the private key of the terminal to obtain a fourth signature.
  • Step 215 Send the third signature and the fourth signature to the blockchain, so that the third signature and the fourth signature are stored in the blockchain.
  • steps 211-215 described above describe that each time a first item passes through a node in its circulation link, it must sign the signature sent by the previous node and synchronize it to the blockchain to ensure that the first item can be detected. The node that an item actually passes through.
  • each node in the circulation of the first item can be regarded as a dealer (equipment).
  • Nodes include Dealer A, Dealer B, and Dealer C.
  • the product's private key can be used to identify the product itself when it leaves the factory Digitally sign, the identification information can be the public key of the product, or other identifications, such as barcode number, product name, etc.
  • Dealer A After the goods pass through Dealer A, if it reaches Dealer B, Dealer A will send signature T2 to Dealer B.
  • T2 performs verification.
  • the dealer C After the goods pass through the dealer B, if the goods reach the dealer C, the dealer C can get the signature T3 from the dealer B by the same way.
  • Fig. 8 is a schematic flow chart showing still another method for managing the identity of an article according to an exemplary embodiment of the present disclosure. The method is applied to a terminal. When the terminal is a terminal of an intermediate node on the first article circulation link, as shown in Fig. As shown in FIG. 8, the method further includes the following steps:
  • Step 216 Generate an information update request for the first item, where the information update request is used to update the information of the first item stored on the blockchain, and the information of the first item includes the first identity information and / Or attribute information.
  • Step 217 Digitally sign the information update request by using the private key of the terminal to obtain a fifth signature.
  • Step 218 Send the information update request and the fifth signature to the blockchain, and the smart contract on the blockchain uses the public key of the terminal to verify the fifth signature, and after passing the verification, the fifth signature is verified according to the
  • the information update request updates the information of the first item on the blockchain.
  • the update operation includes at least one of the following: information addition, information deletion, information modification, and / or information revocation.
  • the terminal can generate the information update request to digitally sign it, and then send the obtained signature to the blockchain.
  • the smart contract on the blockchain passes The public key of the terminal verifies the signature, and after passing the verification, the information of the first item can be updated according to the requirements of the information update request.
  • the identity information of the first article may be suspended or abolished, or the attribute information of the first article may be updated, such as correction of error information, supplementation of incomplete information, or deletion of certain attribute information.
  • Fig. 9 is a schematic flowchart of an article identity management method according to an exemplary embodiment of the present disclosure. The method is applied to a microprocessing unit. As shown in Fig. 9, the method includes the following steps:
  • a first signature of the target information is obtained by digitally signing the target information by using a private key of the first item stored in the microprocessing unit, and the first item is an item in which the microprocessing unit is located.
  • micro-processing unit is disposed inside the first article, and its installation manner may be the same as that described in step 101, and details are not described again.
  • Step 902 Send the first signature to the terminal for the terminal to verify the first signature by using the public key of the first item obtained from the blockchain to determine the first signature recorded in the microprocessing unit. The validity of the first identity of an item.
  • FIG. 10 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 9. The method is applied to a micro processing unit. As shown in FIG. 10 and described in step 901: receiving micro The first signature of the target information sent by the processing unit may include:
  • Step 9011 Receive the target information generated by the terminal and sent by the terminal, where the target information includes a random number.
  • Step 9012 Digitally sign the target information by using the private key of the first item to obtain the first signature.
  • the terminal randomly generates a random number, and then sends the random number to the micro processing unit in the first item.
  • the micro processing unit uses the private key pair of the first item stored in the micro processing unit.
  • the random number can be digitally signed to obtain the first signature, and then the micro processing unit returns the first signature to the terminal for the terminal to verify the first signature.
  • FIG. 11 is a schematic flowchart of another article identity management method according to the embodiment shown in FIG. 9. The method is applied to a micro processing unit. As shown in FIG. 11, step 901: receiving micro The first signature of the target information sent by the processing unit may include:
  • Step 9013 Generate the target information, where the target information includes a random number or identity information of the first item.
  • Step 9014 Digitally sign the target information by using the private key of the first item to obtain the first signature.
  • the micro-processing unit may generate a random number under the driving of the terminal, and use the The first signature is obtained by digitally signing the random number of the first item's private key, and then the microprocessing unit returns the first signature and the random number to the terminal for the terminal to verify the first signature.
  • the micro processing unit may use existing information stored in the micro processing unit, such as the first identity information of the first item, and the micro processing unit may obtain the first identity information by digitally signing the first identity information using the first item ’s private key. The first signature, and then the micro processing unit returns the first signature to the terminal together with the random number.
  • FIG. 12 is a schematic flowchart of another item identity management method according to an exemplary embodiment of the present disclosure.
  • the method is applied to a microprocessing unit.
  • the method provides a method for checking the authenticity of an item identity, such as As shown in Figure 12, the method further includes the following steps:
  • Step 903 Send the first identity information of the first item to the terminal for the terminal to query in the blockchain according to the first identity information.
  • Step 904 Use the private key of the first item to digitally sign the first identity information to obtain a second signature of the first identity information.
  • Step 905 Send the second signature to the terminal for the terminal to use the public key of the first item and the second identity information after obtaining the second identity information of the first item from the blockchain.
  • the second signature is verified to determine whether the first identity information is authentic.
  • the first identity information needs to be consistent with the second identity information, and then the second signature of the first identity information can pass verification. Therefore, if the second signature is verified using the public key of the first item, if the second signature can pass the verification, the first identity information can be determined to be authentic; otherwise, if the verification fails, the The first identity information is not real.
  • the terminal When it is determined that the first identity information is true, the terminal also needs to update the identity use status of the first item to the used status in the blockchain. Specifically, steps 208 to 210 may be referred to, and details are not described herein again.
  • the method may further include:
  • a public key and a private key of the first item are generated under the driving of the labeling device. Reference may be made to step 101, and details are not described again.
  • the private key of the first item and the first identity information of the first item are stored locally in the micro processing unit.
  • the private key of the first item stored locally in the micro processing unit may be set to prohibit external devices from reading and writing, the micro processing unit may read the private key of the first item, and may not The private key is written.
  • the public key of the first item is uploaded to the blockchain by the identification device, and reference may be made to step 102, which will not be described again.
  • Fig. 13 is a block diagram of a terminal according to an exemplary embodiment of the present disclosure.
  • the terminal 1300 may include:
  • the first receiving module 1301 is configured to receive a first signature of the target information sent by the micro processing unit in the first item, where the first signature is a private key of the first item stored by the micro processing unit by the micro processing unit. Obtained after digitally signing the target information;
  • a first verification module 1303 is configured to determine the validity of the first identity information of the first item recorded in the micro processing unit by verifying the first signature by using the public key of the first item.
  • the receiving module 1301 is configured to:
  • the target information including a random number
  • the micro processing unit After the micro processing unit digitally signs the target information using the private key of the first item, the micro processing unit receives the first signature sent by the micro processing unit.
  • the receiving module 1301 is configured to:
  • micro-processing unit After the micro-processing unit generates the target information and digitally signs the target information by using the private key of the first item, receiving the first signature and the target information sent by the micro-processing unit;
  • the target information includes a random number or identity information of the first item.
  • FIG. 14 is a block diagram of another terminal according to an exemplary embodiment of the present disclosure. As shown in FIG. 14, the terminal 1300 further includes:
  • a query module 1305, configured to perform a query in the blockchain according to the first identity information to obtain the second identity information of the first item from the blockchain;
  • the first receiving module 1301 is further configured to receive a second signature of the first identity information sent by the micro-processing unit, where the second signature is the first identity information of the micro-processing unit using the private key of the first item. Obtained after digital signature;
  • a second verification module 1306, configured to determine whether the first identity information is authentic by verifying the second signature by using the public key of the first item and the second identity information;
  • a first update module 1307 is configured to send data update information to the blockchain when it is determined that the first identity information is true, and the data update information is used by the blockchain to update the identity use status of the first item to already status of use.
  • FIG. 15 is a block diagram of another terminal according to an exemplary embodiment of the present disclosure. As shown in FIG. 15, the terminal further includes:
  • the query module 1305 is further configured to query the blockchain again according to the first identity information to obtain the identity usage status of the first item from the blockchain;
  • the identification module 1306 is configured to identify the first item as the used item identity when the identity use status of the first item obtained from the blockchain is used.
  • the terminal is the first node located on the circulation of the first article
  • the target information is identification information of the first article
  • the first signature is a private key pair used by the microprocessing unit to use the first article
  • the identification information is obtained after being digitally signed.
  • FIG. 16 is a block diagram of another terminal according to an exemplary embodiment of the present disclosure. As shown in FIG. 16, the terminal further includes:
  • a signature module 1307 configured to digitally sign the first signature by using the private key of the terminal to obtain a second signature
  • a sending module 1308 is configured to send the first signature and the second signature to the blockchain, so that the first signature and the second signature are stored in the blockchain.
  • the terminal is a terminal of an intermediate node in the first article circulation link.
  • FIG. 17 is a block diagram of another terminal according to an exemplary embodiment of the present disclosure. As shown in FIG. 17, the terminal further includes :
  • a second receiving module 1309 configured to receive a third signature sent by a previous node device in the first article circulation link
  • a signature module 1307 configured to digitally sign the third signature by using the private key of the terminal to obtain a fourth signature
  • a sending module 1308 is configured to send the third signature and the fourth signature to the blockchain, so that the third signature and the fourth signature are stored in the blockchain.
  • FIG. 18 is a block diagram of another terminal according to an exemplary embodiment of the present disclosure. As shown in FIG. 18, the terminal further includes:
  • a second update module 1310 is configured to generate an information update request for the first item, where the information update request is used to update the information of the first item stored on the blockchain, and the information of the first item includes the first item -Identity information and / or attribute information;
  • a signature module 1307 configured to digitally sign the information update request by using the private key of the terminal to obtain a fifth signature
  • a sending module 1308 is configured to send the information update request and the fifth signature to the blockchain, and the smart contract on the blockchain uses the public key of the terminal to verify the fifth signature and passes the verification. Then, the information of the first item on the blockchain is updated according to the information update request, and the update operation includes at least one of the following: information addition, information deletion, information modification, and / or information abolition.
  • Fig. 19 is a block diagram of a micro processing unit according to an exemplary embodiment of the present disclosure. As shown in Fig. 19, the micro processing unit 1900 includes:
  • a signature module 1901 configured to digitally sign target information by using a private key of a first item stored in the micro processing unit to obtain a first signature of the target information, where the first item is an item in which the micro processing unit is located;
  • a sending module 1902 is configured to send the first signature to a terminal, which is used by the terminal to determine the record in the micro processing unit by using the public key of the first item obtained from the blockchain to verify the first signature. The validity of the first identity information of the first item.
  • the signature module 1901 is used to:
  • the first signature is obtained by digitally signing the target information by using the private key of the first item.
  • the signature module 1901 is used to:
  • the target information including a random number or identity information of the first item
  • the first signature is obtained by digitally signing the target information by using the private key of the first item.
  • the sending module 1902 is configured to send the first identity information of the first item to the terminal for the terminal to query in the blockchain according to the first identity information;
  • the signature module 1901 is further configured to digitally sign the first identity information by using the private key of the first item to obtain a second signature of the first identity information;
  • the sending module 1902 is further configured to send the second signature to the terminal, which is used by the terminal to obtain the second identity information of the first item from the blockchain by using the public key of the first item and The second identity information verifies the second signature to determine whether the first identity information is authentic.
  • Fig. 20 is a block diagram illustrating another micro processing unit according to an exemplary embodiment of the present disclosure. As shown in Fig. 20, the micro processing unit further includes:
  • a generating module 1903 configured to generate a public key and a private key of the first item under a drive of a labeling device before digitally signing target information by using a private key of the first item stored in the micro processing unit;
  • the storage module 1904 is configured to store the private key of the first item and the first identity information of the first item locally in the micro processing unit.
  • micro processing unit further includes:
  • a setting module 1905 is configured to set a private key of the first item stored locally in the micro processing unit to prohibit external devices from reading and writing.
  • Fig. 21 is a block diagram of a labeling device according to an exemplary embodiment of the present disclosure. As shown in Fig. 21, the labeling device 2100 may include:
  • a generating module 2101 configured to drive a micro processing unit in the first item to generate a public key and a private key of the first item;
  • the uploading module 2102 is configured to upload the public key of the first item to the blockchain.
  • the public key of the item is stored in the blockchain by the tagging device, the item and its corresponding public key have an untamperable binding relationship, and the private key of the item is set in the microprocessing unit in the item, which is difficult when the item is complete
  • the micro processing unit is easy to obtain, so the problem of identity forgery or application can be avoided, and when verifying, only the terminal and the item of the blockchain can be accessed, and no additional knowledge or additional equipment is required. Therefore, the learning cost of the object audience in anti-counterfeit identification will not be increased.
  • the verification method based on the blockchain is used, it is possible to avoid errors caused by the centralized authentication method.
  • Fig. 22 is a structural diagram illustrating an article management system according to an exemplary embodiment of the present disclosure.
  • the system includes: a terminal 001, a micro processing unit 0021 located in the article 002, and an identification device 003.
  • the terminal 001 is configured to implement the steps of the method shown in any one of FIG. 2 to FIG. 8;
  • the micro processing unit 0021 is used for the steps of the method shown in any one of FIG. 9 to FIG. 12;
  • the identification device 003 is used for the steps of the method shown in FIG. 1.
  • the above system may also be used for the identification of IoT devices.
  • the first item may be an IoT device containing the above microprocessing unit 002, and the identification device 003 may be For the production equipment of the IoT device, the terminal 001 may be an identification device for identifying the IoT device.
  • the production device can activate the micro processing unit in the IoT device, generate a key pair, and upload the public key in the key pair and the identity information of the IoT device to the blockchain.
  • the micro processing unit obtains the private key signature of the IoT device, and when the signature can be successfully verified by the corresponding public key on the blockchain, it can confirm that the identity of the IoT device is valid.
  • the specific method is the same as the method shown in FIG. 1 to FIG. 12 and will not be described again.
  • Fig. 24 is a block diagram of an electronic device 2400 according to an exemplary embodiment.
  • the electronic device 2400 may include a processor 2401 and a memory 2402.
  • the electronic device 2400 may further include one or more of a multimedia component 2403, an input / output (I / O) interface 2404, and a communication component 2405.
  • the electronic device 24 may be the above-mentioned terminal or identification device.
  • the processor 2401 is configured to control the overall operation of the electronic device 2400 so as to complete all or part of the steps in the above-mentioned item identity management method.
  • the memory 2402 is used to store various types of data to support the operation on the electronic device 2400.
  • the data may include, for example, instructions for any application program or method for operating on the electronic device 2400, and application-related data. Examples include contact data, messages sent and received, pictures, audio, video, and more.
  • the memory 2402 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as Static Random Access Memory (SRAM, Random Access Memory, SRAM for short), electrically erasable programmable read-only memory ( Electrically Erasable Programmable Read-Only Memory (referred to as EEPROM), Erasable Programmable Read-Only Memory (referred to as EPROM), Programmable Read-Only Memory (referred to as PROM), read-only Memory (Read-Only Memory, ROM for short), magnetic memory, flash memory, magnetic disk or optical disk.
  • the multimedia component 2403 may include a screen and an audio component.
  • the screen may be, for example, a touch screen, and the audio component is used to output and / or input audio signals.
  • the audio component may include a microphone for receiving external audio signals.
  • the received audio signal may be further stored in the memory 2402 or transmitted through the communication component 2405.
  • the audio component also includes at least one speaker for outputting an audio signal.
  • the I / O interface 2404 provides an interface between the processor 2401 and other interface modules.
  • the other interface modules may be a keyboard, a mouse, a button, and the like. These buttons can be virtual buttons or physical buttons.
  • the communication component 2405 is used for wired or wireless communication between the electronic device 2400 and other devices. Wireless communication, such as Wi-Fi, Bluetooth, Near Field Communication (NFC), 2G, 3G, or 4G, or one or more of them, so the corresponding communication component 2405 may include: Wi-Fi module, Bluetooth module, NFC module.
  • the electronic device 2400 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital signal processors (DSPs), and digital signal processing devices (Digital Signal Processing Device (DSPD), Programmable Logic Device (PLD), Field Programmable Gate Array (FPGA), controller, microcontroller, microprocessor or other electronic components Implementation, for performing the above-mentioned item identity management method.
  • ASICs Application Specific Integrated Circuits
  • DSPs digital signal processors
  • DSPD Digital Signal Processing Device
  • PLD Programmable Logic Device
  • FPGA Field Programmable Gate Array
  • controller microcontroller, microprocessor or other electronic components Implementation, for performing the above-mentioned item identity management method.
  • a computer-readable storage medium including program instructions is provided.
  • the program instructions when executed by a processor, implement the steps of the foregoing item identity management method.
  • the computer-readable storage medium may be the foregoing memory 2402 including program instructions, and the foregoing program instructions may be executed by the processor 2401 of the electronic device 2400 to complete the foregoing item identity management method.
  • micro-processing unit including:
  • the processor is configured to execute the computer program in the memory to implement the steps of the foregoing item identity management method.
  • a computer-readable storage medium is also provided, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the above-mentioned item identity management method.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

本公开提供一种物品身份管理方法、终端、微处理单元、标识设备和***,该方法包括:在物品中设置微处理芯片,通过标注设备驱动微处理单元生成物品的公钥和私钥,并且通过标注设备将物品的公钥发送至区块链进行保存。终端在进行物品的身份有效性识别时,物品中的微处理单元利用存储在该微处理单元的物品的私钥对目标信息进行数字签名并将其发送至该终端,终端根据区块链上获取的该物品的公钥,对接收到的签名进行验证,从而能够确定该微处理单元中记录的物品的身份信息的有效性。能够避免身份被伪造或套用的问题,不会提高物品受众在防伪识别方面的学习成本,并能够避免由于中心化的真伪裁决方式导致的出错问题。

Description

物品身份管理方法、终端、微处理单元、标识设备和*** 技术领域
本公开涉及物品管理技术领域,具体地,涉及一种物品身份管理方法、终端、微处理单元、标识设备和***。
背景技术
在生产生活中,难免会需要验证某些商品/物品的真实性。现有的常规防伪手段不外乎提升伪造的难度及成本,而这些手段都可以随时间推移及科技进步逐渐失效的。并且每当一种新的产品以及对应的身份确认办法出现时,其推广是需要时间与经济成本的,同时相关受众需要重新学习如何识别物品的身份,进而会消耗大量的社会资源,缺乏一种长期的一劳永逸的办法。
另外,由于目前物品的身份识别以及防伪手段一般以物品或商品的发布管理方来最终裁决其真实性,由于其采用中心化的裁决方式,因此没有有效办法杜绝管理方可能出现的人为或非人为错误。此外即使提高防伪手段使得难易伪造,也无法避免身份套用的问题,例如赝品使用正品的包装。
因此,如何在不提高物品或商品受众学习成本的情况下,提供一种能够无法伪造或套用身份,以及能够避免在管理过程中出错物品身份管理机制,是目前亟需解决的为题。
发明内容
本公开为了克服上述问题,提供一种物品身份管理方法、终端、微处理单元、标识设备和***。
为了实现上述目的,本公开的第一方面,提供一种物品身份管理方法,应用于终端,所述方法包括:
接收第一物品中的微处理单元发送的目标信息的第一签名,所述第一签名是所述微处理单元利用存储在所述微处理单元的所述第一物品的私钥对所述目标信息进行数字签名后得到的;
从区块链上获取的所述第一物品的公钥;
通过利用所述第一物品的公钥对所述第一签名进行验证来确定所述微处理单元中记录的所述第一物品的第一身份信息的有效性。
可选地,所述接收第一物品中的微处理单元发送的目标信息的第一签名,所述第一签名是所述微处理单元利用存储在所述微处理单元的所述第一物品的私钥对所述目标信息进行数字签名后得到的,包括:
生成所述目标信息,所述目标信息包括随机数;
向所述微处理单元发送所述目标信息;
在所述微处理单元利用所述第一物品的私钥对所述目标信息进行数字签名后,接收所述微处理单元发送的所述第一签名。
可选地,所述接收第一物品中的微处理单元发送的目标信息的第一签名,所述第一签名是所述微处理单元利用存储在所述微处理单元的所述第一物品的私钥对所述目标信息进行数字签名后得到的,包括:
在所述微处理单元生成所述目标信息,并利用所述第一物品的私钥对所述目标信息进行数字签名后,接收所述微处理单元发送的所述第一签名和所述目标信息;其中,所述目标信息包括随机数或所述第一物品的身份信息。
可选地,所述方法还包括:
从所述微处理单元获取所述第一物品的所述第一身份信息;
根据所述第一身份信息在所述区块链中进行查询,以从所述区块链中获取所述第一物品的第二身份信息;
接收所述微处理单元发送的所述第一身份信息的第二签名,所述第二签名是所述微处理单元利用所述第一物品的私钥对所述第一身份信息进行数字签名后得到的;
通过利用所述第一物品的公钥和所述第二身份信息对所述第二签名进行验证,来确定所述第一身份信息是否真实;
当确定第一身份信息为真实时,向所述区块链发送数据更新信息,所述数据更新信息用于所述区块链将所述第一物品的身份使用状态更新为已使用状态。
可选地,所述方法还包括:再次根据所述第一身份信息在所述区块链中进行查询,以从所述区块链中获取所述第一物品的身份使用状态;
当从所述区块链中获取所述第一物品的身份使用状态为已使用状态时,将所述第一物品标识为物品身份已使用。
可选地,当所述终端位于所述第一物品流通环节上的首个节点时,所述目标信息为所述第一物品的标识信息,所述第一签名是所述微处理单元利用所述第一物品的私钥对所述标识信息进行数字签名后得到的,所述方法还包括:
通过利用所述终端的私钥对所述第一签名进行数字签名,得到第二签名;
将所述第一签名和所述第二签名发送至所述区块链,以便在所述区块链中存储所述第一签名和所述第二签名。
可选地,当所述终端为所述第一物品流通环节上的中间节点的终端时,所述方法还包括:
接收所述第一物品流通环节中的上一节点设备发送的第三签名;
通过利用所述终端的私钥对所述第三签名进行数字签名,得到第四签名;
将所述第三签名和所述第四签名发送至所述区块链,以便在所述区块链中存储所述第三签名和所述第四签名。
可选地,所述方法还包括:生成针对所述第一物品的信息更新请求,所述信息更新请求用于更新存储于所述区块链上的所述第一物品的信息,所述第一物品的信息包括所述第一身份信息和/或属性信息;
通过利用所述终端的私钥对所述信息更新请求进行数字签名,得到第五签名;
向所述区块链发送所述信息更新请求以及所述第五签名,用于所述区块链上的智能合约通过所述终端的公钥对所述第五签名进行验证,并在通过验证后根据所述信息更新请求对所述区块链上的所述第一物品的信息进行更新操作,所述更新操作包括以下至少一者:信息添加、信息删除、信息修改和/或信息废止。
第二方面,提供一种物品身份管理方法,应用于微处理单元,所述方法包括:
通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名,得到所述目标信息的第一签名,所述第一物品为所述微处理单元所在的物品;
向终端发送所述第一签名,用于所述终端通过利用从区块链上获取的所述第一物品的公钥,对所述第一签名进行验证来确定所述微处理单元中记录的所述第一物品的第一身份信息的有效性。
可选地,所述通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名,得到所述目标信息的第一签名,包括:
接收所述终端发送的由所述终端生成的所述目标信息,所述目标信息包括随机数;
通过利用所述第一物品的私钥对所述目标信息进行数字签名,得到所述第一签名。
可选地,所述通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名,得到所述目标信息的第一签名,包括:
生成所述目标信息,所述目标信息包括随机数或所述第一物品的身份信息;
通过利用所述第一物品的私钥对所述目标信息进行数字签名,得到所述第一签名。
可选地,所述方法还包括:
向所述终端发送所述第一物品的所述第一身份信息,用于所述终端根据 所述第一身份信息在所述区块链中查询;
利用所述第一物品的私钥对所述第一身份信息进行数字签名,得到所述第一身份信息的第二签名;
向所述终端发送所述第二签名,用于所述终端在从所述区块链中获取所述第一物品的第二身份信息后,通过利用所述第一物品的公钥和所述第二身份信息对所述第二签名进行验证,来确定所述第一身份信息是否真实。
可选地,在所述通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名之前,所述方法还包括:
在标注设备的驱动下生成所述第一物品的公钥和私钥;
将所述第一物品的私钥,以及所述第一物品的所述第一身份信息存储在所述微处理单元本地。
可选地,所述方法还包括:将存储在所述微处理单元本地的所述第一物品的私钥设置为禁止外部设备读写。
第三方面,提供一种物品身份管理方法,应用于标注设备,所述方法包括:驱动第一物品中的微处理单元生成所述第一物品的公钥和私钥;
将所述第一物品的公钥上传至区块链。
第四方面,提供一种终端,包括:
第一接收模块,用于接收第一物品中的微处理单元发送的目标信息的第一签名,所述第一签名是所述微处理单元利用存储在所述微处理单元的所述第一物品的私钥对所述目标信息进行数字签名后得到的;
第一获取模块,用于从区块链上获取的所述第一物品的公钥;
第一验证模块,用于通过利用所述第一物品的公钥对所述第一签名进行验证来确定所述微处理单元中记录的所述第一物品的第一身份信息的有效性。
可选地,所述接收模块,用于:
生成所述目标信息,所述目标信息包括随机数;
向所述微处理单元发送所述目标信息;
在所述微处理单元利用所述第一物品的私钥对所述目标信息进行数字签名后,接收所述微处理单元发送的所述第一签名。
可选地,所述接收模块,用于:
在所述微处理单元生成所述目标信息,并利用所述第一物品的私钥对所述目标信息进行数字签名后,接收所述微处理单元发送的所述第一签名和所述目标信息;其中,所述目标信息包括随机数或所述第一物品的身份信息。
可选地,所述终端还包括:
第二获取模块,用于从所述微处理单元获取所述第一物品的所述第一身份信息;
查询模块,用于根据所述第一身份信息在所述区块链中进行查询,以从所述区块链中获取所述第一物品的第二身份信息;
所述第一接收模块,还用于接收所述微处理单元发送的所述第一身份信息的第二签名,所述第二签名是所述微处理单元利用所述第一物品的私钥对所述第一身份信息进行数字签名后得到的;
第二验证模块,用于通过利用所述第一物品的公钥和所述第二身份信息对所述第二签名进行验证,来确定所述第一身份信息是否真实;
第一更新模块,用于当确定第一身份信息为真实时,向所述区块链发送数据更新信息,所述数据更新信息用于所述区块链将所述第一物品的身份使用状态更新为已使用状态。
可选地,所述终端还包括:
所述查询模块,还用于再次根据所述第一身份信息在所述区块链中进行查询,以从所述区块链中获取所述第一物品的身份使用状态;
标识模块,用于当从所述区块链中获取所述第一物品的身份使用状态为已使用状态时,将所述第一物品标识为物品身份已使用。
可选地,所述终端为位于所述第一物品流通环节上的首个节点,所述目标信息为所述第一物品的标识信息,所述第一签名是所述微处理单元利用所述第一物品的私钥对所述标识信息进行数字签名后得到的,所述终端还包括:
签名模块,用于通过利用所述终端的私钥对所述第一签名进行数字签名,得到第二签名;
发送模块,用于将所述第一签名和所述第二签名发送至所述区块链,以便在所述区块链中存储所述第一签名和所述第二签名。
可选地,所述终端为所述第一物品流通环节上的中间节点的终端,所述终端还包括:
第二接收模块,用于接收所述第一物品流通环节中的上一节点设备发送的第三签名;
签名模块,用于通过利用所述终端的私钥对所述第三签名进行数字签名,得到第四签名;
发送模块,用于将所述第三签名和所述第四签名发送至所述区块链,以便在所述区块链中存储所述第三签名和所述第四签名。
可选地,所述装置还包括:
第二更新模块,用于生成针对所述第一物品的信息更新请求,所述信息更新请求用于更新存储于所述区块链上的所述第一物品的信息,所述第一物品的信息包括所述第一身份信息和/或属性信息;
签名模块,用于通过利用所述终端的私钥对所述信息更新请求进行数字 签名,得到第五签名;
发送模块,用于向所述区块链发送所述信息更新请求以及所述第五签名,用于所述区块链上的智能合约通过所述终端的公钥对所述第五签名进行验证,并在通过验证后根据所述信息更新请求对所述区块链上的所述第一物品的信息进行更新操作,所述更新操作包括以下至少一者:信息添加、信息删除、信息修改和/或信息废止。
第五方面,提供一种微处理单元,包括:
签名模块,用于通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名,得到所述目标信息的第一签名,所述第一物品为所述微处理单元所在的物品;
发送模块,用于向终端发送所述第一签名,用于所述终端通过利用从区块链上获取的所述第一物品的公钥,对所述第一签名进行验证来确定所述微处理单元中记录的所述第一物品的第一身份信息的有效性。
可选地,所述签名模块,用于:
接收所述终端发送的由所述终端生成的所述目标信息,所述目标信息包括随机数;
通过利用所述第一物品的私钥对所述目标信息进行数字签名,得到所述第一签名。
可选地,所述签名模块,用于:生成所述目标信息,所述目标信息包括随机数或所述第一物品的身份信息;
通过利用所述第一物品的私钥对所述目标信息进行数字签名,得到所述第一签名。
可选地,还包括:发送模块,用于向所述终端发送所述第一物品的所述第一身份信息,用于所述终端根据所述第一身份信息在所述区块链中查询;
所述签名模块,还用于利用所述第一物品的私钥对所述第一身份信息进行数字签名,得到所述第一身份信息的第二签名;
所述发送模块,还用于向所述终端发送所述第二签名,用于所述终端在从所述区块链中获取所述第一物品的第二身份信息后,通过利用所述第一物品的公钥和所述第二身份信息对所述第二签名进行验证,来确定所述第一身份信息是否真实。
可选地,还包括:生成模块,用于在所述通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名之前,在标注设备的驱动下生成所述第一物品的公钥和私钥;
存储模块,用于将所述第一物品的私钥,以及所述第一物品的所述第一身份信息存储在所述微处理单元本地。
可选地,还包括:设置模块,用于将存储在所述微处理单元本地的所述 第一物品的私钥设置为禁止外部设备读写。
第六方面,提供一种标注设备,包括:
生成模块,用于驱动第一物品中的微处理单元生成所述第一物品的公钥和私钥;
上传模块,用于将所述第一物品的公钥上传至区块链。
第七方面,提供一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现第一方面所述方法的步骤。
第八方面,提供一种终端,包括:
存储器,其上存储有计算机程序;
处理器,用于执行所述存储器中的所述计算机程序,以实现第一方面所述方法的步骤。
第九方面,提供一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现第二方面所述方法的步骤。
第十方面,提供一种微处理单元,包括:
存储器,其上存储有计算机程序;
处理器,用于执行所述存储器中的所述计算机程序,以实现第二方面所述方法的步骤。
第十一方面,提供一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现第三方面所述方法的步骤。
第十二方面,提供一种微处理单元,包括:
存储器,其上存储有计算机程序;
处理器,用于执行所述存储器中的所述计算机程序,以实现第三方面所述方法的步骤。
第十三方面,提供一种物品管理***,包括:终端、位于物品中的微处理单元以及标识设备;
所述终端用于实现第一方面所述方法的步骤;
所述微处理单元用于实现第二方面所述方法的步骤;
所述标识设备用于实现第三方面所述方法的步骤。
在上述技术方案,通过在物品中设置微处理单元,能够通过标注设备驱动微处理单元生成物品的公钥和私钥,并且通过标注设备将物品的公钥发送至区块链进行保存。终端在进行物品的身份有效性识别时,物品中的微处理单元能够利用存储在该微处理单元的物品的私钥对目标信息进行数字签名并将其发送至该终端,从而终端根据区块链上获取的该物品的公钥,对接收到的签名进行验证,从而能够确定该微处理单元中记录的物品的身份信息的有效性。由于物品的公钥由标注设备存储在区块链中,因此物品与其对应的公钥具备不可篡改的绑定关系,而物品的私钥设置在物品中微处理单元,在 物品完整的情况下难易获取该微处理单元,因此能够避免身份被伪造或套用的问题,并且在进行验证时,只需要能够访问该区块链的终端和该物品即可,无需掌握额外的知识或额外的设备,因此不会提高物品受众在防伪识别方面的学习成本。另外,由于采用了基于区块链的验证方式,因此能够避免由于中心化的真伪裁决方式导致的出错问题。
本公开的其他特征和优点将在随后的具体实施方式部分予以详细说明。
附图说明
图1是根据本公开一示例性实施例示出的一种物品身份管理方法的流程示意图。
图2是根据本公开一示例性实施例示出的一种物品身份管理方法的流程示意图。
图3是根据图1所示实施例示出的另一种物品身份管理方法的流程示意图。
图4是根据图2所示实施例示出的另一种物品身份管理方法的流程示意图。
图5是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图。
图6a是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图。
图6b是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图。
图7是根据本公开一示例性实施例示出的一种商品流通环节示意图。
图8是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图。
图9是根据本公开一示例性实施例示出的一种物品身份管理方法的流程示意图。
图10是根据图9所示实施例示出的另一种物品身份管理方法的流程示意图。
图11是根据图9所示实施例示出的另一种物品身份管理方法的流程示意图。
图12是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图。
图13是根据本公开一示例性实施例示出的一种终端的框图。
图14是根据本公开一示例性实施例示出的另一种终端的框图。
图15是根据本公开一示例性实施例示出的又一种终端的框图。
图16是根据本公开一示例性实施例示出的又一种终端的框图。
图17是根据本公开一示例性实施例示出的又一种终端的框图。
图18是根据本公开一示例性实施例示出的又一种终端的框图。
图19是根据本公开一示例性实施例示出的一种微处理单元的框图。
图20是根据本公开一示例性实施例示出的另一种微处理单元的框图。
图21是根据本公开一示例性实施例示出的一种标注设备的框图。
图22是根据本公开一示例性实施例示出的一种物品管理***的结构图。
图23是根据本公开一示例性实施例示出的另一种物品管理***的结构图。
图24是根据本公开一示例性实施例示出的一种电子设备的结构图。
具体实施方式
以下结合附图对本公开的具体实施方式进行详细说明。应当理解的是,此处所描述的具体实施方式仅用于说明和解释本公开,并不用于限制本公开。
图1是根据本公开一示例性实施例示出的一种物品身份管理方法的流程示意图,该方法应用于标注设备,如图1所示,该方法包括以下步骤:
步骤101,驱动第一物品中的微处理单元生成该第一物品的公钥和私钥。
其中,第一物品可以是任意物品或商品,微处理单元设置在该第一物品的内部,该微处理单元在该第一物品中的安装方式可以为:在该第一物品成形后,需要对该第一物品进行物理上的破坏才可取出的安装方式。该微处理单元可以为微处理芯片,其上可以包含微处理器及天线/触点。示例的,该微处理器内部可以安装用于实现该方法的小应用程式(applet),该applet可以用于生成该第一物品的公私钥对,或者也可以通过硬件的方式实现该applet的功能,例如在微处理器内部设置用于生成该第一物品的公私钥对的硬件模块。该微处理单元与终端通信的方式可以采用NFC(Near Field Communication,近场通信)等方式。以NFC为例,当标注设备与第一物品中的微处理单元的距离达到NFC的通信距离时,该标注设备可以发起标注(或者说注册)过程,可以通过NFC驱动该微处理单元生成该第一物品的密钥对,包括该第一物品的公钥和私钥。
步骤102,在从该微处理单元获取该第一物品的公钥后,将该第一物品的公钥上传至区块链。
其中,在微处理单元生成该第一物品的公钥和私钥后,该标注设备将从微处理单元获取该第一物品的公钥上传至区块链进行存储,该第一物品的私钥则保存在该微处理单元本地,并且,存储在该微处理单元的该第一物品的私钥可以被设置为禁止外部设备读写,该微处理单元可以读取该第一物品的 私钥,不可对该第一物品的私钥进行写操作。
可选的,在将该第一物品的公钥上传至区块链时,也可以将该第一物品的身份信息、属性信息共同上传至区块链进行存储。在该微处理单元上除了存储该第一物品的私钥外,还可以存储该第一物品的身份信息,以及属性信息,并且可选的,该第一物品的身份信息,以及属性信息也可以不上传至区块链,而只存储在第一物品的微处理单元中,当后续用于识别物品的终端验证了该第一物品的身份信息是有效的时,可以从微处理单元中获取物品的身份信息、属性信息。其中,该微处理单元中存储的该第一物品的身份信息,以及属性信息可以由该标注设备发送给该微处理单元,或者也可以是在为该第一物品装配该微处理单元由其他设备写入芯片的。
图2是根据本公开一示例性实施例示出的一种物品身份管理方法的流程示意图,该方法应用于终端,如图2所示,该方法包括以下步骤:
步骤201,接收第一物品中的微处理单元发送的目标信息的第一签名,该第一签名是该微处理单元利用存储在该微处理单元的该第一物品的私钥对该目标信息进行数字签名后得到的。
步骤202,从区块链上获取的第一物品的公钥。
步骤203,通过利用该第一物品的公钥对该第一签名进行验证来确定该微处理单元中记录的该第一物品的第一身份信息的有效性。
其中,在验证时该终端通过该目标信息的原文、从区块链上获取的第一物品的公钥即可验证该第一签名,当该第一签名通过验证时,可以确认该微处理单元中记录的该第一物品的第一身份信息有效,但该第一签名未能通过验证时,确认该第一身份信息无效。
由于物品的公钥由标注设备存储在区块链中,因此物品与其对应的公钥具备不可篡改的绑定关系,而物品的私钥设置在物品中微处理单元,在物品完整的情况下难易获取该微处理单元,因此能够避免身份被伪造或套用的问题,并且在进行验证时,只需要能够访问该区块链的终端和该物品即可,无需掌握额外的知识或额外的设备,因此不会提高物品受众在防伪识别方面的学习成本。另外,由于采用了基于区块链的验证方式,因此能够避免由于中心化的真伪裁决方式导致的出错问题。
另外,该目标信息可以由该终端生成并发送给第一物品中的微处理单元,也可以由该微处理单元生成,或者也可以利用微处理单元中已存储的信息作为该目标信息。示例的,可以如图3和图4所示。
图3是根据图1所示实施例示出的另一种物品身份管理方法的流程示意图,该方法应用于终端,如图3所示,步骤201所述的:接收第一物品中的微处理单元发送的目标信息的第一签名的步骤可以包括:
步骤2011,生成该目标信息,该目标信息包括随机数。
步骤2012,向该微处理单元发送该目标信息。
步骤2013,在所述微处理单元利用该第一物品的私钥对该目标信息进行数字签名后,接收该微处理单元发送的第一签名。
即由终端随机生成一个随机数,然后将该随机数发送给第一物品中的微处理单元,微处理单元在得到该随机数后,利用微处理单元中存储的该第一物品的私钥对该随机数进行数字签名即可得到该第一签名,然后该微处理单元将该第一签名返回给终端,以供终端对该第一签名进行验证。
图4是根据图2所示实施例示出的另一种物品身份管理方法的流程示意图,该方法应用于终端,如图4所示,步骤201所述的:接收第一物品中的微处理单元发送的目标信息的第一签名的步骤可以包括:
步骤2014,在该微处理单元生成该目标信息,并利用该第一物品的私钥对该目标信息进行数字签名后,接收该微处理单元发送的该第一签名和该目标信息。其中,该目标信息包括随机数或该第一物品的身份信息。
示例的,当终端和该第一物品的微处理单元距离达到通信距离,并触发验证后,可以在终端的驱动下,由该微处理单元生成一个随机数,并利用微处理单元中存储的该第一物品的私钥对该随机数进行数字签名即可得到该第一签名,然后该微处理单元将该第一签名以及该随机数一起返回给终端,以供终端对该第一签名进行验证。
或者,微处理单元可以利用微处理单元中存储的现有信息,例如该第一物品的该第一身份信息,微处理单元利用该第一物品的私钥对该第一身份信息进行数字签名得到该第一签名,然后该微处理单元将该第一签名以及该随机数一起返回给终端。
进一步的,图5是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图,该方法应用于终端,该方法提供了一种查验物品身份真实性的方法,如图5所示,该方法还包括以下步骤:
步骤204,从该微处理单元获取该第一物品的该第一身份信息。
步骤205,根据该第一身份信息在该区块链中进行查询,以从该区块链中获取该第一物品的第二身份信息。
即先从第一物品的微处理单元中获取其存储的第一身份信息,并以该第一身份信息作为查询依据,在该区块链中查找该存储在区块链中的该第一物品的第二身份信息,该第二身份信息是通过步骤102中所示的方法,由标识设备存储在区块链中的,是该第一物品的真实的身份信息,因此可以用于验证该微处理单元中的第一身份信息的真实性。
步骤206,接收该微处理单元发送的该第一身份信息的第二签名,该第二签名是该微处理单元利用该第一物品的私钥对该第一身份信息进行数字签名后得到的。
步骤207,通过利用该第一物品的公钥和该第二身份信息对该第二签名进行验证,来确定该第一身份信息是否真实。
示例的,由于在验证某一信息的签名时,需要该信息的原文,以及签名时的私钥对应的公钥。因此,基于该原理,在获取了该第二身份信息后,需要该第一身份信息与该第二身份信息一致,那么该第一身份信息的该第二签名才可以通过验证。因此,如果利用该第一物品的公钥对该第二签名进行验证时,该第二签名如果能够通过验证时,可以确定第一身份信息为真实的;否则,如果未通过验证,则说明该第一身份信息不是真实的。另外,在微处理单元发送第二签名前,可以首先确认该终端是否是授权终端。示例的,确认该终端是否是授权终端的鉴权方法例如,可以通过密码、秘钥等方式实现。
步骤208,当确定第一身份信息为真实时,向该区块链发送数据更新信息,该数据更新信息用于该区块链将该第一物品的身份使用状态更新为已使用状态。
示例的,为了保证提供给用户的物品是新的,对于每个物品在首次执行步骤204至207所示的物品查询验真的方法后,可以执行步骤208,即在查询该第一物品的第一身份信息的真伪后,需要向区块链中发送数据更新信息,以便在区块链中将第一物品的身份使用状态更新为已使用状态。
例如,该第一物品为一电子产品,比如手机,当该终端从该手机中的用于执行上述方法的微处理单元中获取到该手机的第一身份信息的第二签名后,从区块链上查询该手机的第二身份信息,并对该第二签名进行验证,当通过验证时,确认该第一身份信息真实,并在区块链上将该手机更新为已激活。其中该手机的第一身份信息例如可以是IMEI(International Mobile Equipment Identity,国际移动设备识别码),SN(Serial Number,序列号)等信息。或者,该物品可以是非电子设备的商品,例如一瓶酒,该第一身份信息可以是这瓶酒的识别码(该识别码具有唯一性),传统的识别码多以密码覆膜卡(俗称刮刮卡)的形式贴附在商品上,或者以二维码或者镭射码的形式设置在商品包装的内部,本实施例中该识别码可以存储在这瓶酒的内的微处理单元中,其验证方法与上述手机相同,不再赘述。
可选的,还可以进一步包括以下步骤:
步骤209,再次根据该第一身份信息在该区块链中进行查询,以从该区块链中获取该第一物品的身份使用状态。
步骤210,当从该区块链中获取该第一物品的身份使用状态为已使用状态时,将该第一物品标识为物品身份已使用。
即在该区块链上将该第一物品的身份使用状态更新为已使用状态后,再次根据该第一身份信息在该区块链中进行查询,以便确认区块链中该第一物品的身份使用状态是否成功更新为已使用状态。在确定该第一物品的身份使 用状态成功更新为已使用状态后,可以将该第一物品标识为物品身份已使用,例如在终端的识别页面上将该第一物品显示为物品身份已使用。
进一步的,图6a是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图,该方法应用于终端,当该终端位于该第一物品流通环节上的首个节点时,该目标信息为该第一物品的标识信息,该第一签名是该微处理单元利用该第一物品的私钥对该标识信息进行数字签名后得到的,如图6a所示,该方法还包括以下步骤:
步骤211,通过利用该终端的私钥对该第一签名进行数字签名,得到第二签名。
步骤212,将该第一签名和该第二签名发送至该区块链,以便在该区块链中存储该第一签名和该第二签名。
后续如果要验证该第一物品是否经过了该首个节点时,可以从区块链最后中获取该第一签名和该第二签名,并利用该终端的公钥对该第二签名进行验证,当通过验证时,可以确认该第一物品该第一物品流通环节中确实经过了该终端所在的节点,即该首个节点。当未通过验证时,可以确认第一物品没有通过该首个节点。
图6b是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图,该方法应用于终端,当所述终端为该第一物品流通环节上的中间节点的终端时,如图6b所示,该方法还包括以下步骤:
步骤213,接收该第一物品流通环节中的上一节点设备发送的第三签名。
步骤214,通过利用该终端的私钥对该第三签名进行数字签名,得到第四签名。
步骤215,将该第三签名和该第四签名发送至该区块链,以便在该区块链中存储该第三签名和该第四签名。
即上述的步骤211-215描述了第一物品在其流通环节上每经过一个节点,都要对上一个节点发来的签名进行签名,并同步至区块链中,从而能够保证能够检测该第一物品实际经过的节点。
下面进行举例说明,假设该第一物品为一商品,则该第一物品流通环节上的每个节点可以看作是一个经销商(的设备),如图7所示,商品的流通环节上的节点包括经销商A、经销商B和经销商C,为了有效控制并检测该商品是否经过了某个经销商,则该商品在出厂时,可以利用该商品的私钥对该商品自身的标识信息进行数字签名,该标识信息可以是该商品的公钥,或者是其他标识,比如条码编号、商品名称等等,假设对该商品自身的标识信息(记为T0)进行数字签名后得到的是签名T1=sign(T0),则该商品在进过首个经销商A时,该经销商A首先可以根据从区块链获取的该商品的公钥对该签名T1进行验证,在通过验证后,经销商A通过自己的私钥对该签 名T1进行数字签名得到T2=sign(T1),然后将签名T2和签名T1上传至区块链。从而,在检测商品是否经过了经销商A时,监管设备可以从区块链获取到该签名T2和签名T1,并通过经销商A的公钥对签名T2进行验证,在通过验证时,可以确认商品经过了经销商A。否则,确认商品没有经过经销商A。
商品经过经销商A后,如果到达经销商B,则经销商A会将签名T2发给经销商B,经销商B该首先可以根据从区块链获取的该经销商A的公钥对该签名T2进行验证,在通过验证后,经销商B通过自己的私钥对该签名T2进行数字签名得到签名T3=sign(T2),然后将签名T3和签名T2上传至区块链。商品经过经销商B后,如果到达经销商C,则同理,经销商C可以得到经销商B发来的签名T3。
通过上述方法,无需在物品和流通环节中的节点、节点和节点之间建立过多的关联关系,只需要区块链上存储的签名以及前一节点提供的签名即可确定物品是否经过了当前节点,实现简单,成本低。
图8是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图,该方法应用于终端,当该终端为该第一物品流通环节上的中间节点的终端时,如图8所示,该方法还包括以下步骤:
步骤216,生成针对该第一物品的信息更新请求,该信息更新请求用于更新存储于该区块链上的该第一物品的信息,该第一物品的信息包括该第一身份信息和/或属性信息。
步骤217,通过利用该终端的私钥对该信息更新请求进行数字签名,得到第五签名。
步骤218,向该区块链发送该信息更新请求以及该第五签名,用于该区块链上的智能合约通过该终端的公钥对该第五签名进行验证,并在通过验证后根据该信息更新请求对该区块链上的该第一物品的信息进行更新操作。该更新操作包括以下至少一者:信息添加、信息删除、信息修改和/或信息废止。
即当需要对存储于区块链上的物品的信息进行更新时,终端可以生成该信息更新请求对其进行数字签名,然后将得到的签名发送至区块链,区块链上的智能合约通过该终端的公钥对该签名进行验证,在通过验证后即可按照信息更新请求的要求更新该第一物品的信息。例如,可以暂停或废除该第一物品的身份信息,也可以更新该第一物品的属性信息,例如错误信息更正,或者对不完整的信息进行补充,或者删除某一属性信息等等。
图9是根据本公开一示例性实施例示出的一种物品身份管理方法的流程示意图,该方法应用于微处理单元,如图9所示,该方法包括以下步骤:
步骤901,通过利用存储在该微处理单元的第一物品的私钥对目标信息进行数字签名,得到该目标信息的第一签名,该第一物品为该微处理单元所 在的物品。
其中,微处理单元设置在该第一物品的内部,其安装方式可以如步骤101所述的方式,不再赘述。
步骤902,向终端发送该第一签名,用于该终端通过利用从区块链上获取的该第一物品的公钥,对该第一签名进行验证来确定该微处理单元中记录的该第一物品的第一身份信息的有效性。
图10是根据图9所示实施例示出的另一种物品身份管理方法的流程示意图,该方法应用于微处理单元,如图10所示,步骤901所述的:接收第一物品中的微处理单元发送的目标信息的第一签名的步骤可以包括:
步骤9011,接收该终端发送的由该终端生成的该目标信息,该目标信息包括随机数。
步骤9012,通过利用该第一物品的私钥对该目标信息进行数字签名,得到该第一签名。
即由终端随机生成一个随机数,然后将该随机数发送给第一物品中的微处理单元,微处理单元在得到该随机数后,利用微处理单元中存储的该第一物品的私钥对该随机数进行数字签名即可得到该第一签名,然后该微处理单元将该第一签名返回给终端,以供终端对该第一签名进行验证。
图11是根据图9所示实施例示出的另一种物品身份管理方法的流程示意图,该方法应用于微处理单元,如图11所示,步骤901所述的:接收第一物品中的微处理单元发送的目标信息的第一签名的步骤可以包括:
步骤9013,生成该目标信息,该目标信息包括随机数或该第一物品的身份信息。
步骤9014,通过利用该第一物品的私钥对该目标信息进行数字签名,得到该第一签名。
示例的,当终端和该第一物品的微处理单元距离达到通信距离,并触发验证后,可以在终端的驱动下,由该微处理单元生成一个随机数,并利用微处理单元中存储的该第一物品的私钥对该随机数进行数字签名即可得到该第一签名,然后该微处理单元将该第一签名以及该随机数一起返回给终端,以供终端对该第一签名进行验证。
或者,微处理单元可以利用微处理单元中存储的现有信息,例如该第一物品的该第一身份信息,微处理单元利用该第一物品的私钥对该第一身份信息进行数字签名得到该第一签名,然后该微处理单元将该第一签名以及该随机数一起返回给终端。
进一步的,图12是根据本公开一示例性实施例示出的又一种物品身份管理方法的流程示意图,该方法应用于微处理单元,该方法提供了一种查验物品身份真实性的方法,如图12所示,该方法还包括以下步骤:
步骤903,向该终端发送该第一物品的该第一身份信息,用于该终端根据该第一身份信息在该区块链中查询。
步骤904,利用该第一物品的私钥对该第一身份信息进行数字签名,得到该第一身份信息的第二签名。
步骤905,向该终端发送该第二签名,用于该终端在从该区块链中获取该第一物品的第二身份信息后,通过利用该第一物品的公钥和该第二身份信息对该第二签名进行验证,来确定该第一身份信息是否真实。
示例的,由于在验证某一信息的签名时,需要该信息的原文,以及签名时的私钥对应的公钥。因此,基于该原理,在获取了该第二身份信息后,需要该第一身份信息与该第二身份信息一致,那么该第一身份信息的该第二签名才可以通过验证。因此,如果利用该第一物品的公钥对该第二签名进行验证时,该第二签名如果能够通过验证时,可以确定第一身份信息为真实的;否则,如果未通过验证,则说明该第一身份信息不是真实的。
当确定第一身份信息为真实时,终端还需要在区块链中更新该第一物品的身份使用状态为已使用状态。具体的,可以参照步骤208至210,不再赘述。
另外,在步骤901所述的通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名之前,该方法还可以包括:
首先,在标注设备的驱动下生成该第一物品的公钥和私钥。可以参照步骤101,不再赘述。
其次,将该第一物品的私钥,以及该第一物品的该第一身份信息存储在该微处理单元本地。其中,可以将存储在所述微处理单元本地的该第一物品的私钥设置为禁止外部设备读写,该微处理单元可以读取该第一物品的私钥,不可对该第一物品的私钥进行写操作。该第一物品的公钥则由标识设备上传至区块链,可参照步骤102,不再赘述。
图13是根据本公开一示例性实施例示出的一种终端的框图,该终端1300可以包括:
第一接收模块1301,用于接收第一物品中的微处理单元发送的目标信息的第一签名,该第一签名是该微处理单元利用存储在该微处理单元的该第一物品的私钥对该目标信息进行数字签名后得到的;
第一获取模块1302,用于从区块链上获取的该第一物品的公钥;
第一验证模块1303,用于通过利用该第一物品的公钥对该第一签名进行验证来确定该微处理单元中记录的该第一物品的第一身份信息的有效性。
可选的,该接收模块1301,用于:
生成该目标信息,该目标信息包括随机数;
向该微处理单元发送该目标信息;
在该微处理单元利用该第一物品的私钥对该目标信息进行数字签名后,接收该微处理单元发送的该第一签名。
或者,在另一种实现方式中,该接收模块1301,用于:
在该微处理单元生成该目标信息,并利用该第一物品的私钥对该目标信息进行数字签名后,接收该微处理单元发送的该第一签名和该目标信息;
其中,该目标信息包括随机数或该第一物品的身份信息。
可选的,图14是根据本公开一示例性实施例示出的另一种终端的框图,如图14所示,该终端1300还包括:
第二获取模块1304,用于从该微处理单元获取该第一物品的该第一身份信息;
查询模块1305,用于根据该第一身份信息在该区块链中进行查询,以从该区块链中获取该第一物品的第二身份信息;
该第一接收模块1301,还用于接收该微处理单元发送的该第一身份信息的第二签名,该第二签名是该微处理单元利用该第一物品的私钥对该第一身份信息进行数字签名后得到的;
第二验证模块1306,用于通过利用该第一物品的公钥和该第二身份信息对该第二签名进行验证,来确定该第一身份信息是否真实;
第一更新模块1307,用于当确定第一身份信息为真实时,向该区块链发送数据更新信息,该数据更新信息用于该区块链将该第一物品的身份使用状态更新为已使用状态。
可选的,图15是根据本公开一示例性实施例示出的又一种终端的框图,如图15所示,该终端还包括:
该查询模块1305,还用于再次根据该第一身份信息在该区块链中进行查询,以从该区块链中获取该第一物品的身份使用状态;
标识模块1306,用于当从该区块链中获取该第一物品的身份使用状态为已使用状态时,将该第一物品标识为物品身份已使用。
可选的,该终端为位于该第一物品流通环节上的首个节点,该目标信息为该第一物品的标识信息,该第一签名是该微处理单元利用该第一物品的私钥对该标识信息进行数字签名后得到的,图16是根据本公开一示例性实施例示出的又一种终端的框图,如图16所示,该终端还包括:
签名模块1307,用于通过利用该终端的私钥对该第一签名进行数字签名,得到第二签名;
发送模块1308,用于将该第一签名和该第二签名发送至该区块链,以便在该区块链中存储该第一签名和该第二签名。
可选的,该终端为该第一物品流通环节上的中间节点的终端,图17是根据本公开一示例性实施例示出的又一种终端的框图,如图17所示,该终 端还包括:
第二接收模块1309,用于接收该第一物品流通环节中的上一节点设备发送的第三签名;
签名模块1307,用于通过利用该终端的私钥对该第三签名进行数字签名,得到第四签名;
发送模块1308,用于将该第三签名和该第四签名发送至该区块链,以便在该区块链中存储该第三签名和该第四签名。
可选的,图18是根据本公开一示例性实施例示出的又一种终端的框图,如图18所示,该终端还包括:
第二更新模块1310,用于生成针对该第一物品的信息更新请求,该信息更新请求用于更新存储于该区块链上的该第一物品的信息,该第一物品的信息包括该第一身份信息和/或属性信息;
签名模块1307,用于通过利用该终端的私钥对该信息更新请求进行数字签名,得到第五签名;
发送模块1308,用于向该区块链发送该信息更新请求以及该第五签名,用于该区块链上的智能合约通过该终端的公钥对该第五签名进行验证,并在通过验证后根据该信息更新请求对该区块链上的该第一物品的信息进行更新操作,该更新操作包括以下至少一者:信息添加、信息删除、信息修改和/或信息废止。
图19是根据本公开一示例性实施例示出的一种微处理单元的框图,如图19所示,该微处理单元1900包括:
签名模块1901,用于通过利用存储在该微处理单元的第一物品的私钥对目标信息进行数字签名,得到该目标信息的第一签名,该第一物品为该微处理单元所在的物品;
发送模块1902,用于向终端发送该第一签名,用于该终端通过利用从区块链上获取的该第一物品的公钥,对该第一签名进行验证来确定该微处理单元中记录的该第一物品的第一身份信息的有效性。
可选的,该签名模块1901,用于:
接收该终端发送的由该终端生成的该目标信息,该目标信息包括随机数;
通过利用该第一物品的私钥对该目标信息进行数字签名,得到该第一签名。
可选的,该签名模块1901,用于:
生成该目标信息,该目标信息包括随机数或该第一物品的身份信息;
通过利用该第一物品的私钥对该目标信息进行数字签名,得到该第一签名。
或者,在另一种实现方式中,
该发送模块1902,用于向该终端发送该第一物品的该第一身份信息,用于该终端根据该第一身份信息在该区块链中查询;
该签名模块1901,还用于利用该第一物品的私钥对该第一身份信息进行数字签名,得到该第一身份信息的第二签名;
该发送模块1902,还用于向该终端发送该第二签名,用于该终端在从该区块链中获取该第一物品的第二身份信息后,通过利用该第一物品的公钥和该第二身份信息对该第二签名进行验证,来确定该第一身份信息是否真实。
图20是根据本公开一示例性实施例示出的又一种微处理单元的框图,如图20所示,该微处理单元还包括:
生成模块1903,用于在该通过利用存储在该微处理单元的第一物品的私钥对目标信息进行数字签名之前,在标注设备的驱动下生成该第一物品的公钥和私钥;
存储模块1904,用于将该第一物品的私钥,以及该第一物品的该第一身份信息存储在该微处理单元本地。
可选的,该微处理单元还包括:
设置模块1905,用于将存储在该微处理单元本地的该第一物品的私钥设置为禁止外部设备读写。
图21是根据本公开一示例性实施例示出的一种标注设备的框图,如图21所示,该标注设备2100,可以包括:
生成模块2101,用于驱动第一物品中的微处理单元生成该第一物品的公钥和私钥;
上传模块2102,用于将该第一物品的公钥上传至区块链。
由于物品的公钥由标注设备存储在区块链中,因此物品与其对应的公钥具备不可篡改的绑定关系,而物品的私钥设置在物品中微处理单元,在物品完整的情况下难易获取该微处理单元,因此能够避免身份被伪造或套用的问题,并且在进行验证时,只需要能够访问该区块链的终端和该物品即可,无需掌握额外的知识或额外的设备,因此不会提高物品受众在防伪识别方面的学习成本。另外,由于采用了基于区块链的验证方式,因此能够避免由于中心化的真伪裁决方式导致的出错问题。
图22是根据本公开一示例性实施例示出的一种物品管理***的结构图,该***包括:终端001、位于物品002中的微处理单元0021以及标识设备003;
终端001用于实现权利图2至图8任一所示方法的步骤;
微处理单元0021用于图9至图12任一所示的任一项所示方法的步骤;
标识设备003用于图1所示方法的步骤。
可选的,上述***还可以用于物联网设备身份标识,在此场景下,如图23所示,该第一物品可以为含有上述微处理单元002的物联网设备,该标识设备003可以为该物联网设备的生产设备,上述终端001可以为用于识别该物联网设备识别设备。
生产设备能够激活物联网设备内的微处理单元,生成密钥对,并将密钥对中的公钥以及该物联网设备的身份信息上传至区块链,该识别设备在进行识别时,从该微处理单元获取物联网设备私钥签名,当该签名能够通过区块链上对应公钥验签成功时,即可确认该物联网设备的身份有效。其具体方法与图1至图12所示的方法相同,不再赘述。
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
图24是根据一示例性实施例示出的一种电子设备2400的框图。如图24所示,该电子设备2400可以包括:处理器2401,存储器2402。该电子设备2400还可以包括多媒体组件2403,输入/输出(I/O)接口2404,以及通信组件2405中的一者或多者。该电子设备24可以为上述的终端或标识设备。
其中,处理器2401用于控制该电子设备2400的整体操作,以完成上述的物品身份管理方法中的全部或部分步骤。存储器2402用于存储各种类型的数据以支持在该电子设备2400的操作,这些数据例如可以包括用于在该电子设备2400上操作的任何应用程序或方法的指令,以及应用程序相关的数据,例如联系人数据、收发的消息、图片、音频、视频等等。该存储器2402可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,例如静态随机存取存储器(Static Random Access Memory,简称SRAM),电可擦除可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,简称EEPROM),可擦除可编程只读存储器(Erasable Programmable Read-Only Memory,简称EPROM),可编程只读存储器(Programmable Read-Only Memory,简称PROM),只读存储器(Read-Only Memory,简称ROM),磁存储器,快闪存储器,磁盘或光盘。多媒体组件2403可以包括屏幕和音频组件。其中屏幕例如可以是触摸屏,音频组件用于输出和/或输入音频信号。例如,音频组件可以包括一个麦克风,麦克风用于接收外部音频信号。所接收的音频信号可以被进一步存储在存储器2402或通过通信组件2405发送。音频组件还包括至少一个扬声器,用于输出音频信号。I/O接口2404为处理器2401和其他接口模块之间提供接口,上述其他接口模块可以是键盘,鼠标,按钮等。这些按钮可以是虚拟按钮或者实体按钮。通信组件2405用于该电子设备2400与其他设备之间进行有线或无线通信。无线通信,例如Wi-Fi,蓝牙,近场通信(Near Field Communication,简称NFC),2G、3G或4G,或它们中的一种或几种的组合,因此相应的该通信组件2405可 以包括:Wi-Fi模块,蓝牙模块,NFC模块。
在一示例性实施例中,电子设备2400可以被一个或多个应用专用集成电路(Application Specific Integrated Circuit,简称ASIC)、数字信号处理器(Digital Signal Processor,简称DSP)、数字信号处理设备(Digital Signal Processing Device,简称DSPD)、可编程逻辑器件(Programmable Logic Device,简称PLD)、现场可编程门阵列(Field Programmable Gate Array,简称FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述的物品身份管理方法。
在另一示例性实施例中,还提供了一种包括程序指令的计算机可读存储介质,该程序指令被处理器执行时实现上述的物品身份管理方法的步骤。例如,该计算机可读存储介质可以为上述包括程序指令的存储器2402,上述程序指令可由电子设备2400的处理器2401执行以完成上述的物品身份管理方法。
此外,还提供一种微处理单元,包括:
存储器,其上存储有计算机程序;
处理器,用于执行该存储器中的该计算机程序,以实现上述的物品身份管理方法的步骤。
还提供一种计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现上述的物品身份管理方法的步骤。
以上结合附图详细描述了本公开的优选实施方式,但是,本公开并不限于上述实施方式中的具体细节,在本公开的技术构思范围内,可以对本公开的技术方案进行多种简单变型,这些简单变型均属于本公开的保护范围。
另外需要说明的是,在上述具体实施方式中所描述的各个具体技术特征,在不矛盾的情况下,可以通过任何合适的方式进行组合,为了避免不必要的重复,本公开对各种可能的组合方式不再另行说明。
此外,本公开的各种不同的实施方式之间也可以进行任意组合,只要其不违背本公开的思想,其同样应当视为本公开所公开的内容。

Claims (37)

  1. 一种物品身份管理方法,其特征在于,应用于终端,所述方法包括:
    接收第一物品中的微处理单元发送的目标信息的第一签名,所述第一签名是所述微处理单元利用存储在所述微处理单元的所述第一物品的私钥对所述目标信息进行数字签名后得到的;
    从区块链上获取的所述第一物品的公钥;
    通过利用所述第一物品的公钥对所述第一签名进行验证来确定所述微处理单元中记录的所述第一物品的第一身份信息的有效性。
  2. 根据权利要求1所述的方法,其特征在于,所述接收第一物品中的微处理单元发送的目标信息的第一签名,所述第一签名是所述微处理单元利用存储在所述微处理单元的所述第一物品的私钥对所述目标信息进行数字签名后得到的,包括:
    生成所述目标信息,所述目标信息包括随机数;
    向所述微处理单元发送所述目标信息;
    在所述微处理单元利用所述第一物品的私钥对所述目标信息进行数字签名后,接收所述微处理单元发送的所述第一签名。
  3. 根据权利要求1所述的方法,其特征在于,所述接收第一物品中的微处理单元发送的目标信息的第一签名,所述第一签名是所述微处理单元利用存储在所述微处理单元的所述第一物品的私钥对所述目标信息进行数字签名后得到的,包括:
    在所述微处理单元生成所述目标信息,并利用所述第一物品的私钥对所述目标信息进行数字签名后,接收所述微处理单元发送的所述第一签名和所述目标信息;
    其中,所述目标信息包括随机数或所述第一物品的身份信息。
  4. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    从所述微处理单元获取所述第一物品的所述第一身份信息;
    根据所述第一身份信息在所述区块链中进行查询,以从所述区块链中获取所述第一物品的第二身份信息;
    接收所述微处理单元发送的所述第一身份信息的第二签名,所述第二签名是所述微处理单元利用所述第一物品的私钥对所述第一身份信息进行数字签名后得到的;
    通过利用所述第一物品的公钥和所述第二身份信息对所述第二签名进 行验证,来确定所述第一身份信息是否真实;
    当确定第一身份信息为真实时,向所述区块链发送数据更新信息,所述数据更新信息用于所述区块链将所述第一物品的身份使用状态更新为已使用状态。
  5. 根据权利要求4所述的方法,其特征在于,所述方法还包括:
    再次根据所述第一身份信息在所述区块链中进行查询,以从所述区块链中获取所述第一物品的身份使用状态;
    当从所述区块链中获取所述第一物品的身份使用状态为已使用状态时,将所述第一物品标识为物品身份已使用。
  6. 根据权利要求1所述的方法,其特征在于,当所述终端位于所述第一物品流通环节上的首个节点时,所述目标信息为所述第一物品的标识信息,所述第一签名是所述微处理单元利用所述第一物品的私钥对所述标识信息进行数字签名后得到的,所述方法还包括:
    通过利用所述终端的私钥对所述第一签名进行数字签名,得到第二签名;
    将所述第一签名和所述第二签名发送至所述区块链,以便在所述区块链中存储所述第一签名和所述第二签名。
  7. 根据权利要求1所述的方法,其特征在于,当所述终端为所述第一物品流通环节上的中间节点的终端时,所述方法还包括:
    接收所述第一物品流通环节中的上一节点设备发送的第三签名;
    通过利用所述终端的私钥对所述第三签名进行数字签名,得到第四签名;
    将所述第三签名和所述第四签名发送至所述区块链,以便在所述区块链中存储所述第三签名和所述第四签名。
  8. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    生成针对所述第一物品的信息更新请求,所述信息更新请求用于更新存储于所述区块链上的所述第一物品的信息,所述第一物品的信息包括所述第一身份信息和/或属性信息;
    通过利用所述终端的私钥对所述信息更新请求进行数字签名,得到第五签名;
    向所述区块链发送所述信息更新请求以及所述第五签名,用于所述区块链上的智能合约通过所述终端的公钥对所述第五签名进行验证,并在通过验 证后根据所述信息更新请求对所述区块链上的所述第一物品的信息进行更新操作,所述更新操作包括以下至少一者:信息添加、信息删除、信息修改和/或信息废止。
  9. 一种物品身份管理方法,其特征在于,应用于微处理单元,所述方法包括:
    通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名,得到所述目标信息的第一签名,所述第一物品为所述微处理单元所在的物品;
    向终端发送所述第一签名,用于所述终端通过利用从区块链上获取的所述第一物品的公钥,对所述第一签名进行验证来确定所述微处理单元中记录的所述第一物品的第一身份信息的有效性。
  10. 根据权利要求9所述的方法,其特征在于,所述通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名,得到所述目标信息的第一签名,包括:
    接收所述终端发送的由所述终端生成的所述目标信息,所述目标信息包括随机数;
    通过利用所述第一物品的私钥对所述目标信息进行数字签名,得到所述第一签名。
  11. 根据权利要求9所述的方法,其特征在于,所述通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名,得到所述目标信息的第一签名,包括:
    生成所述目标信息,所述目标信息包括随机数或所述第一物品的身份信息;
    通过利用所述第一物品的私钥对所述目标信息进行数字签名,得到所述第一签名。
  12. 根据权利要求9所述的方法,其特征在于,所述方法还包括:
    向所述终端发送所述第一物品的所述第一身份信息,用于所述终端根据所述第一身份信息在所述区块链中查询;
    利用所述第一物品的私钥对所述第一身份信息进行数字签名,得到所述第一身份信息的第二签名;
    向所述终端发送所述第二签名,用于所述终端在从所述区块链中获取所述第一物品的第二身份信息后,通过利用所述第一物品的公钥和所述第二身 份信息对所述第二签名进行验证,来确定所述第一身份信息是否真实。
  13. 根据权利要求9所述的方法,其特征在于,在所述通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名之前,所述方法还包括:
    在标注设备的驱动下生成所述第一物品的公钥和私钥;
    将所述第一物品的私钥,以及所述第一物品的所述第一身份信息存储在所述微处理单元本地。
  14. 根据权利要求13所述的方法,其特征在于,所述方法还包括:
    将存储在所述微处理单元本地的所述第一物品的私钥设置为禁止外部设备读写。
  15. 一种物品身份管理方法,其特征在于,应用于标注设备,所述方法包括:
    驱动第一物品中的微处理单元生成所述第一物品的公钥和私钥;
    将所述第一物品的公钥上传至区块链。
  16. 一种终端,其特征在于,应用于终端,包括:
    第一接收模块,用于接收第一物品中的微处理单元发送的目标信息的第一签名,所述第一签名是所述微处理单元利用存储在所述微处理单元的所述第一物品的私钥对所述目标信息进行数字签名后得到的;
    第一获取模块,用于从区块链上获取的所述第一物品的公钥;
    第一验证模块,用于通过利用所述第一物品的公钥对所述第一签名进行验证来确定所述微处理单元中记录的所述第一物品的第一身份信息的有效性。
  17. 根据权利要求16所述的终端,其特征在于,所述接收模块,用于:
    生成所述目标信息,所述目标信息包括随机数;
    向所述微处理单元发送所述目标信息;
    在所述微处理单元利用所述第一物品的私钥对所述目标信息进行数字签名后,接收所述微处理单元发送的所述第一签名。
  18. 根据权利要求16所述的终端,其特征在于,所述接收模块,用于:
    在所述微处理单元生成所述目标信息,并利用所述第一物品的私钥对所述目标信息进行数字签名后,接收所述微处理单元发送的所述第一签名和所 述目标信息;
    其中,所述目标信息包括随机数或所述第一物品的身份信息。
  19. 根据权利要求16所述的终端,其特征在于,所述终端还包括:
    第二获取模块,用于从所述微处理单元获取所述第一物品的所述第一身份信息;
    查询模块,用于根据所述第一身份信息在所述区块链中进行查询,以从所述区块链中获取所述第一物品的第二身份信息;
    所述第一接收模块,还用于接收所述微处理单元发送的所述第一身份信息的第二签名,所述第二签名是所述微处理单元利用所述第一物品的私钥对所述第一身份信息进行数字签名后得到的;
    第二验证模块,用于通过利用所述第一物品的公钥和所述第二身份信息对所述第二签名进行验证,来确定所述第一身份信息是否真实;
    第一更新模块,用于当确定第一身份信息为真实时,向所述区块链发送数据更新信息,所述数据更新信息用于所述区块链将所述第一物品的身份使用状态更新为已使用状态。
  20. 根据权利要求19所述的终端,其特征在于,所述终端还包括:
    所述查询模块,还用于再次根据所述第一身份信息在所述区块链中进行查询,以从所述区块链中获取所述第一物品的身份使用状态;
    标识模块,用于当从所述区块链中获取所述第一物品的身份使用状态为已使用状态时,将所述第一物品标识为物品身份已使用。
  21. 根据权利要求16所述的终端,其特征在于,所述终端为位于所述第一物品流通环节上的首个节点,所述目标信息为所述第一物品的标识信息,所述第一签名是所述微处理单元利用所述第一物品的私钥对所述标识信息进行数字签名后得到的,所述终端还包括:
    签名模块,用于通过利用所述终端的私钥对所述第一签名进行数字签名,得到第二签名;
    发送模块,用于将所述第一签名和所述第二签名发送至所述区块链,以便在所述区块链中存储所述第一签名和所述第二签名。
  22. 根据权利要求16所述的装置,其特征在于,所述终端为所述第一物品流通环节上的中间节点的终端,所述终端还包括:
    第二接收模块,用于接收所述第一物品流通环节中的上一节点设备发送的第三签名;
    签名模块,用于通过利用所述终端的私钥对所述第三签名进行数字签名,得到第四签名;
    发送模块,用于将所述第三签名和所述第四签名发送至所述区块链,以便在所述区块链中存储所述第三签名和所述第四签名。
  23. 根据权利要求16所述的装置,其特征在于,所述装置还包括:
    第二更新模块,用于生成针对所述第一物品的信息更新请求,所述信息更新请求用于更新存储于所述区块链上的所述第一物品的信息,所述第一物品的信息包括所述第一身份信息和/或属性信息;
    签名模块,用于通过利用所述终端的私钥对所述信息更新请求进行数字签名,得到第五签名;
    发送模块,用于向所述区块链发送所述信息更新请求以及所述第五签名,用于所述区块链上的智能合约通过所述终端的公钥对所述第五签名进行验证,并在通过验证后根据所述信息更新请求对所述区块链上的所述第一物品的信息进行更新操作,所述更新操作包括以下至少一者:信息添加、信息删除、信息修改和/或信息废止。
  24. 一种微处理单元,其特征在于,包括:
    签名模块,用于通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名,得到所述目标信息的第一签名,所述第一物品为所述微处理单元所在的物品;
    发送模块,用于向终端发送所述第一签名,用于所述终端通过利用从区块链上获取的所述第一物品的公钥,对所述第一签名进行验证来确定所述微处理单元中记录的所述第一物品的第一身份信息的有效性。
  25. 根据权利要求24所述的微处理单元,其特征在于,所述签名模块,用于:
    接收所述终端发送的由所述终端生成的所述目标信息,所述目标信息包括随机数;
    通过利用所述第一物品的私钥对所述目标信息进行数字签名,得到所述第一签名。
  26. 根据权利要求24所述的微处理单元,其特征在于,所述签名模块,用于:
    生成所述目标信息,所述目标信息包括随机数或所述第一物品的身份信息;
    通过利用所述第一物品的私钥对所述目标信息进行数字签名,得到所述第一签名。
  27. 根据权利要求24所述的微处理单元,其特征在于,还包括:
    发送模块,用于向所述终端发送所述第一物品的所述第一身份信息,用于所述终端根据所述第一身份信息在所述区块链中查询;
    所述签名模块,还用于利用所述第一物品的私钥对所述第一身份信息进行数字签名,得到所述第一身份信息的第二签名;
    所述发送模块,还用于向所述终端发送所述第二签名,用于所述终端在从所述区块链中获取所述第一物品的第二身份信息后,通过利用所述第一物品的公钥和所述第二身份信息对所述第二签名进行验证,来确定所述第一身份信息是否真实。
  28. 根据权利要求24所述的微处理单元,其特征在于,还包括:
    生成模块,用于在所述通过利用存储在所述微处理单元的第一物品的私钥对目标信息进行数字签名之前,在标注设备的驱动下生成所述第一物品的公钥和私钥;
    存储模块,用于将所述第一物品的私钥,以及所述第一物品的所述第一身份信息存储在所述微处理单元本地。
  29. 根据权利要求28所述的微处理单元,其特征在于,还包括:
    设置模块,用于将存储在所述微处理单元本地的所述第一物品的私钥设置为禁止外部设备读写。
  30. 一种标注设备,其特征在于,包括:
    生成模块,用于驱动第一物品中的微处理单元生成所述第一物品的公钥和私钥;
    上传模块,用于将所述第一物品的公钥上传至区块链。
  31. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现权利要求1-8中任一项所述方法的步骤。
  32. 一种终端,其特征在于,包括:
    存储器,其上存储有计算机程序;
    处理器,用于执行所述存储器中的所述计算机程序,以实现权利要求1-8 中任一项所述方法的步骤。
  33. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现权利要求9-14中任一项所述方法的步骤。
  34. 一种微处理单元,其特征在于,包括:
    存储器,其上存储有计算机程序;
    处理器,用于执行所述存储器中的所述计算机程序,以实现权利要求9-14中任一项所述方法的步骤。
  35. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现权利要求15所述方法的步骤。
  36. 一种微处理单元,其特征在于,包括:
    存储器,其上存储有计算机程序;
    处理器,用于执行所述存储器中的所述计算机程序,以实现权利要求15所述方法的步骤。
  37. 一种物品管理***,其特征在于,包括:终端、位于物品中的微处理单元以及标识设备;
    所述终端用于实现权利要求1-8中任一项所述方法的步骤;
    所述微处理单元用于实现权利要求9-14中任一项所述方法的步骤;
    所述标识设备用于实现权利要求15所述方法的步骤。
PCT/CN2018/106287 2018-09-18 2018-09-18 物品身份管理方法、终端、微处理单元、标识设备和*** WO2020056597A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2018/106287 WO2020056597A1 (zh) 2018-09-18 2018-09-18 物品身份管理方法、终端、微处理单元、标识设备和***
CN201880097523.9A CN112689979B (zh) 2018-09-18 2018-09-18 物品身份管理方法、终端、微处理单元、标识设备和***

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/106287 WO2020056597A1 (zh) 2018-09-18 2018-09-18 物品身份管理方法、终端、微处理单元、标识设备和***

Publications (1)

Publication Number Publication Date
WO2020056597A1 true WO2020056597A1 (zh) 2020-03-26

Family

ID=69888089

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/106287 WO2020056597A1 (zh) 2018-09-18 2018-09-18 物品身份管理方法、终端、微处理单元、标识设备和***

Country Status (2)

Country Link
CN (1) CN112689979B (zh)
WO (1) WO2020056597A1 (zh)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200250174A1 (en) * 2019-01-31 2020-08-06 Salesforce.Com, Inc. Systems, methods, and apparatuses for implementing efficient storage and validation of data and metadata within a blockchain using distributed ledger technology (dlt)
CN112153151A (zh) * 2020-09-28 2020-12-29 刘华 一种基于区块链的智能制造车间安全管理方法及***
CN112765588A (zh) * 2021-01-21 2021-05-07 网易宝有限公司 一种身份识别方法、装置、电子设备及存储介质
CN114006740A (zh) * 2021-10-26 2022-02-01 杭州产链数字科技有限公司 一种基于区块链的物联网设备数字身份的管理方法及应用
CN114157447A (zh) * 2021-10-22 2022-03-08 北京航空航天大学 基于区块链技术的无人设备安全通信方法
CN114943546A (zh) * 2022-05-25 2022-08-26 南京数睿数据科技有限公司 物品防伪检测方法、装置、电子设备和计算机可读介质
US11880349B2 (en) 2019-04-30 2024-01-23 Salesforce, Inc. System or method to query or search a metadata driven distributed ledger or blockchain
US11899817B2 (en) 2019-01-31 2024-02-13 Salesforce, Inc. Systems, methods, and apparatuses for storing PII information via a metadata driven blockchain using distributed and decentralized storage for sensitive user information

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160098730A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and Method for Block-Chain Verification of Goods
US20160217532A1 (en) * 2015-01-23 2016-07-28 Sure, Inc. Securing Claim Data via Block-Chains for a Peer to Peer Platform
CN106209877A (zh) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 一种以区块链后台为认证核心的防伪认证***
CN107169776A (zh) * 2017-05-10 2017-09-15 无锡井通网络科技有限公司 基于区块链技术的产品认证防伪方法
CN108460605A (zh) * 2018-02-09 2018-08-28 深圳市优权天成科技有限公司 一种基于区块链的纸质艺术品的溯源防伪方法及***

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101452539A (zh) * 2008-12-12 2009-06-10 龙冬阳 一种基于nfc的移动识别方法
CN103413227B (zh) * 2013-08-02 2016-12-28 四川航天***工程研究所 产品防伪追溯***及其防伪追溯查验的实现方法
CN106529969B (zh) * 2016-10-08 2020-11-13 惠州Tcl移动通信有限公司 一种利用nfc查伪溯源的方法及***
CN106570710A (zh) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 一种商品防伪方法及装置
CN111724150B (zh) * 2017-03-28 2023-11-24 创新先进技术有限公司 一种业务请求的处理方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160098730A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and Method for Block-Chain Verification of Goods
US20160217532A1 (en) * 2015-01-23 2016-07-28 Sure, Inc. Securing Claim Data via Block-Chains for a Peer to Peer Platform
CN106209877A (zh) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 一种以区块链后台为认证核心的防伪认证***
CN107169776A (zh) * 2017-05-10 2017-09-15 无锡井通网络科技有限公司 基于区块链技术的产品认证防伪方法
CN108460605A (zh) * 2018-02-09 2018-08-28 深圳市优权天成科技有限公司 一种基于区块链的纸质艺术品的溯源防伪方法及***

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11899817B2 (en) 2019-01-31 2024-02-13 Salesforce, Inc. Systems, methods, and apparatuses for storing PII information via a metadata driven blockchain using distributed and decentralized storage for sensitive user information
US20200250174A1 (en) * 2019-01-31 2020-08-06 Salesforce.Com, Inc. Systems, methods, and apparatuses for implementing efficient storage and validation of data and metadata within a blockchain using distributed ledger technology (dlt)
US11971874B2 (en) * 2019-01-31 2024-04-30 Salesforce, Inc. Systems, methods, and apparatuses for implementing efficient storage and validation of data and metadata within a blockchain using distributed ledger technology (DLT)
US11880349B2 (en) 2019-04-30 2024-01-23 Salesforce, Inc. System or method to query or search a metadata driven distributed ledger or blockchain
CN112153151A (zh) * 2020-09-28 2020-12-29 刘华 一种基于区块链的智能制造车间安全管理方法及***
CN112153151B (zh) * 2020-09-28 2024-02-02 山西万佳印业有限公司 一种基于区块链的智能制造车间安全管理方法及***
CN112765588A (zh) * 2021-01-21 2021-05-07 网易宝有限公司 一种身份识别方法、装置、电子设备及存储介质
CN112765588B (zh) * 2021-01-21 2024-05-10 网易宝有限公司 一种身份识别方法、装置、电子设备及存储介质
CN114157447A (zh) * 2021-10-22 2022-03-08 北京航空航天大学 基于区块链技术的无人设备安全通信方法
CN114157447B (zh) * 2021-10-22 2023-03-14 北京航空航天大学 基于区块链技术的无人设备安全通信方法
CN114006740A (zh) * 2021-10-26 2022-02-01 杭州产链数字科技有限公司 一种基于区块链的物联网设备数字身份的管理方法及应用
CN114006740B (zh) * 2021-10-26 2024-02-09 杭州产链数字科技有限公司 一种基于区块链的物联网设备数字身份的管理方法及应用
CN114943546B (zh) * 2022-05-25 2024-04-09 南京数睿数据科技有限公司 物品防伪检测方法、装置、电子设备和计算机可读介质
CN114943546A (zh) * 2022-05-25 2022-08-26 南京数睿数据科技有限公司 物品防伪检测方法、装置、电子设备和计算机可读介质

Also Published As

Publication number Publication date
CN112689979B (zh) 2023-11-24
CN112689979A (zh) 2021-04-20

Similar Documents

Publication Publication Date Title
WO2020056597A1 (zh) 物品身份管理方法、终端、微处理单元、标识设备和***
US11113699B2 (en) Open registry for identity of things
CN110336797B (zh) 基于区块链的企业认证、认证追溯方法、装置及设备
US20170345019A1 (en) Open registry for internet of things
US10602202B1 (en) System and techniques for digital data lineage verification
CN111492634A (zh) 使用零知识协议的安全并且机密的保管交易***、方法和设备
US20180108024A1 (en) Open registry for provenance and tracking of goods in the supply chain
US9681302B2 (en) Method, apparatus, and system for providing and using a trusted tag
US20160358187A1 (en) Open registry for identity of things including social record feature
US20180019872A1 (en) Open registry for internet of things including sealed materials
JP2020512714A (ja) デジタル証明書管理方法、装置、およびシステム
US20180032759A1 (en) Open registry for human identification
US20160358158A1 (en) Open registry for identity of things including item location feature
JP6498123B2 (ja) サプライ・チェーン製品用のデジタル的に保護された電子タイトル
CN111314172B (zh) 基于区块链的数据处理方法、装置、设备及存储介质
CN103593773A (zh) 一种产品防伪方法、***及客户端
CN104680389A (zh) 一种基于时间加密的nfc手机终端防伪***及方法
WO2016019456A1 (en) Id tag authentication system and method
WO2018067974A1 (en) Open registry for human identification
CN102647423A (zh) 一种数字签章及印鉴的鉴别方法及***
CN110598433A (zh) 基于区块链的防伪信息处理方法、装置
EP4011031B1 (en) Secure identity card using unclonable functions
US11968526B2 (en) Identity management on a mobile device
WO2018064329A1 (en) Open registry for internet of things including sealed materials
CN112529641A (zh) 基于区块链的开票方法、装置、设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18934345

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18934345

Country of ref document: EP

Kind code of ref document: A1