Product source tracing scheme based on PKI (Public Key Infrastructure) and two-dimensional codes

A technology of two-dimensional codes and two-dimensional code information, which is applied in the field of product traceability solutions based on PKI and two-dimensional codes, and can solve problems such as the impossibility of determining input values

Inactive Publication Date: 2012-11-28
袁开国
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This conversion is a compressed mapping, that is, the space of the hash value is usually much smaller than the space of the inpu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Product source tracing scheme based on PKI (Public Key Infrastructure) and two-dimensional codes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Through the technical solution of the invention, users can easily confirm whether the product they purchased is produced by the manufacturer marked on the package. The scheme is implemented by taking the mobile phone as the carrying platform of the two-dimensional code verification module as an example. The specific implementation scheme is as follows:

[0019] (1) The manufacturer's CA system applies, and the CA system provides the private key and the corresponding digital certificate. The private key is stored in the USB KEY physical device and provided to the manufacturer.

[0020] (2) The manufacturer inputs the plaintext of the manufacturer and its product information (referred to as product information) to the two-dimensional code generation module, and the generation module will generate the following two sets of data: the ciphertext of the product information encrypted by the private key and the HASH value of the product information, or Product information plain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a product source tracing scheme based on PKI (Public Key Infrastructure) and two-dimensional codes. The credible two-dimensional codes can be printed at the outer side of a package of each layer of a product by a manufacturer. In each product circulation loop, a product can be verified through the two-dimensional codes. Data of all the circulation loops can be sent to a product source tracing center. The manufacturer, a dealer and a user only need to scan the two-dimensional codes on the product to see a tree state diagram of the product in the entire circulation process. The product source tracing scheme can be used for providing a simple and rapid management manner for product source tracing. Shown by a picture, the scheme at least consists of a product source tracing center module, a CA (Certificate Authority) module, a two-dimensional code generation module and a two-dimensional code verification module.

Description

technical field [0001] The present invention relates to the fields of cryptography, product anti-counterfeiting and food and drug safety. Specifically, the present invention provides a product traceability scheme based on PKI (Public Key Infrastructure: public key infrastructure) and two-dimensional code. Background technique [0002] PKI is a new security technology, which is composed of public key cryptography, digital certificate (Certificate), CA (Certificate Authority: Certificate Authority) and public key security policies. PKI public key infrastructure is a system or platform that provides public key encryption and digital signature services for the purpose of managing keys and certificates. An organization can establish a secure network environment by adopting the PKI framework to manage keys and certificates. PKI mainly includes four parts: certificate in X.509 format and certificate revocation list CRL; CA operation agreement; CA management agreement; CA policy fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q30/00H04L9/32G06K19/06
Inventor 袁开国袁静国刘强
Owner 袁开国
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products