Commodity anti-counterfeiting traceability method based on block chain technology

A blockchain and commodity technology, applied in the field of commodity anti-counterfeiting and traceability based on blockchain technology, can solve problems such as unfavorable use, inability to prevent data tampering, counterfeiting, and reduced security, so as to avoid data leakage and protect commercial privacy The effect of data protection and guarantee of authority

Inactive Publication Date: 2021-01-05
雲禾(浙江)科技集团有限公司
0 Cites 6 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0009] However, this method adopts a centralized structure, so that all data is stored on the safe platform, resulting in the inability to effectively protect some commercially confidential data of commodity manufacturers and distribution companies, and related companies cannot effectively cooperate; and the centralized method is very eas...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

In summary, the present invention innovatively completes the anti-counterfeiting traceability of commodities through block chain technology, so that the user using this method can save the content of the data in situ, and the hash value corresponding to the data one by one and The user's identity information and the basic attribute data of the target file data are associated and stored in the trusted blockchain, so that while avoiding data leakage, it can also prove the ori...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The invention discloses a commodity anti-counterfeiting traceability method based on a block chain technology. The method at least comprises the following steps of information acquisition, informationmarking, authentication ID generation, data storage, access instruction receiving and access frequency comparison. According to the method, commodity anti-counterfeiting traceability is innovativelycompleted through a block chain technology, so that a user using the method can store the content of data in situ, and hash values in one-to-one correspondence with the data, identity identification information of the user and basic attribute data of target file data are associated and stored in a trusted block chain; therefore, the original creation and attribution of the data can be proved whilethe data leakage is avoided, and meanwhile, the corresponding certificate storage certificate is generated, and therefore a way for proving and verifying the certificate is provided for other people.More importantly, decentralization is realized by using a block chain technology, so that the data is real, credible and tamper-resistant, the commercial privacy data protection is protected, and theauthority and credibility of the platform and the enterprise participation enthusiasm are guaranteed.

Application Domain

Technology Topic

BlockchainAccess frequency +7

Image

  • Commodity anti-counterfeiting traceability method based on block chain technology
  • Commodity anti-counterfeiting traceability method based on block chain technology
  • Commodity anti-counterfeiting traceability method based on block chain technology

Examples

  • Experimental program(1)

Example Embodiment

[0030]The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.
[0031]Seefigure 1 , In the embodiment of the present invention,
[0032]A method for anti-counterfeiting and traceability of commodities based on blockchain technology is characterized in that it includes at least the following steps:
[0033]1) Information acquisition: Obtain the target file data input by the user through the information acquisition terminal, and generate a hash value corresponding to the target file data through a hash algorithm, the target file data at least including the written product information and product circulation information.
[0034]It should be noted that the commodity information includes at least the commodity name, production company, production company contact information, production batch number and serial number. The commodity circulation information is sent to the server in real time by using the Internet of Things to directly connect to the business data, and the commodity circulation information includes logistics information, temperature information, humidity information, dealer information, and sales status information.
[0035]2) Information mark: Used to package the user's identity information, the basic attribute data and hash value of the target file data to generate a certificate data package, and add a digital signature to the certificate data package to generate the corresponding data ID to the certificate The packet is marked.
[0036]It should be noted that the identity information in the information mark in step 2 includes a registration number, a digital certificate, and an IP address.
[0037]The basic attribute data includes at least the last modification time, file title, file size and file format.
[0038]3) Generate authentication ID: After confirming the storage certificate data package, save the data ID and corresponding storage data package, and generate a storage certificate containing block information and authentication information, associate the storage certificate with the traceability code, and send To the blockchain network; wherein, the sending method of the blockchain network is to use handheld devices and sensors to collect and report business data in real time through technologies such as the Internet of Things, big data, blockchain, and supervisory codes, and use big data technology Ensure that massive data can receive and process data effectively in real time, and finally store the data in the regional chain network.
[0039]It should be noted that the traceability code is based on the GS1 system, and the traceability code includes at least a two-dimensional code, a barcode, and an RFID tag.
[0040]4) Data storage: The blockchain network stores the certificate data containing the certificate of deposit.
[0041]5) Receiving an access instruction: used to receive an access instruction issued by an access terminal, the access instruction includes an identification traceability code, and according to the access instruction, obtain the certificate of deposit of the corresponding commodity on the regional chain, and push the certificate of deposit to the visit Terminal, and count the identification times of the same traceability code.
[0042]6) Comparison of the number of visits: The number of identifications of the same traceability code is compared with the preset threshold, and the feedback information is confirmed according to the comparison result.
[0043]It should be noted that if the number of identification times of the same traceability code is higher than the preset threshold, the feedback information is the number of times the code has been identified and the warning information to beware of counterfeiting; if the number of identification times of the same traceability code is less than the preset threshold, The feedback information is the number of times this code has been identified. For example, if the number of times of identification of the traceability code is 0, the feedback information shows that the number of times the code has been identified is 0.
[0044]On the basis of the above structure, the information acquisition terminal and the access terminal both include a computer and a mobile intelligent terminal.
[0045]This embodiment also includes a commodity anti-counterfeiting traceability system based on blockchain technology, such asfigure 2 As shown, the system includes at least the following modules:
[0046]Information acquisition module: used to acquire the target file data input by the user, and generate a hash value corresponding to the target file data through a hash algorithm.
[0047]Preferably, the target file data includes at least product information and product circulation information, and the product information includes at least a product name, a manufacturer, a contact information of the manufacturer, a production batch number, and a serial number. The commodity circulation information is sent to the server in real time by using the Internet of Things to directly connect to the business data, and the commodity circulation information includes logistics information, temperature information, humidity information, dealer information, and sales status information.
[0048]Information marking module: used to package the user's identity information, the basic attribute data and hash value of the target file data to generate a certificate data package, and add a digital signature to the certificate data package to generate the corresponding data ID to the certificate data The package is marked.
[0049]Preferably, the identification information in the information marking module includes a registration number, a digital certificate, and an IP address; the basic attribute data includes at least the last modification time, file title, file size, and file format.
[0050]ID authentication module: Generate a storage certificate containing block information and authentication information by generating a data ID and corresponding storage data package, associate the storage certificate with the traceability code, and send it to the blockchain network.
[0051]Preferably, it should be noted that the traceability code is based on the GS1 system, and the traceability code includes at least a two-dimensional code, a barcode, and an RFID tag.
[0052]Data storage module: used to store the attestation data including the attestation certificate in the blockchain network.
[0053]Access instruction receiving module: used to receive the access instruction issued by the access terminal, and push the deposit certificate of the commodity corresponding to the access instruction to the access terminal, wherein the access instruction is a traceability code, and the module also includes statistical identity Number of identifications of the traceability code.
[0054]Access times comparison module: used to compare the identification times of the same traceability code with the preset threshold, and confirm the feedback information according to the comparison result. It should be noted that if the identification times of the same traceability code are higher than the preset threshold, the The feedback information is the number of times this code has been identified and the warning information to beware of counterfeiting; if the number of identification times of the same traceability code is less than the preset threshold, the feedback information is the number of times this code has been identified. For example, if the number of times of identification of the traceability code is 0, the feedback information shows that the number of times the code has been identified is 0.
[0055]Seeimage 3, This embodiment also provides a product anti-counterfeiting traceability device based on blockchain technology, the device at least includes:
[0056]One or more processors;
[0057]The memory is configured to store one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors are caused to execute the method described in any one of the preceding items.
[0058]This embodiment also provides a computer-readable storage medium storing a computer program, which, when executed by a processor, implements the method described in any of the above items.
[0059]In summary, the present invention innovatively completes the anti-counterfeiting traceability of commodities through blockchain technology, so that users who use this method can save the content of the data in situ, and the hash value corresponding to the data is one-to-one with the user's identity. The identification information and the basic attribute data of the target file data are associated and stored in a trusted blockchain, so that while avoiding data leakage, it can also prove the originality and attribution of the data, and at the same time generate corresponding deposit certificates for others Provide a way to prove and verify certificates. More importantly, the present invention uses blockchain technology to achieve decentralization, makes the data true and credible and cannot be tampered with, and protects commercial privacy data protection, ensuring the authority and credibility of the platform and the enthusiasm of enterprises to participate.
[0060]For those skilled in the art, it is obvious that the present invention is not limited to the details of the foregoing exemplary embodiments, and the present invention can be implemented in other specific forms without departing from the spirit or basic characteristics of the present invention. Therefore, from any point of view, the embodiments should be regarded as exemplary and non-limiting. The scope of the present invention is defined by the appended claims rather than the foregoing description, and therefore it is intended to fall within the claims. All changes within the meaning and scope of the equivalent elements of are included in the present invention. Any reference signs in the claims should not be regarded as limiting the claims involved.
[0061]In addition, it should be understood that although this specification is described in accordance with the embodiments, not every embodiment only includes an independent technical solution. This narration in the specification is only for clarity, and those skilled in the art should consider the specification as a whole The technical solutions in the embodiments can also be appropriately combined to form other implementations that can be understood by those skilled in the art.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

UEFI (Unified Extensible Firmware Interface)-based backup and one-key startup item guiding method

PendingCN114168207APrevent Data LeakageEasy to operateBootstrappingProgram loading/initiatingKey recoveryUnified Extensible Firmware Interface
Owner:成都傲梅科技有限公司

Classification and recommendation of technical efficacy words

  • Prevent Data Leakage

Method and apparatus for dynamically regulating visual angle of screen

ActiveCN101488326APrevent Data LeakageImprove convenienceCathode-ray tube indicatorsInstrumental componentsVisual rangeScreen viewing
Owner:HTC CORP

Secure storage device

ActiveCN104239820AAchieve securityPrevent Data LeakageInternal/peripheral component protectionLocal machineComputer hardware
Owner:POTEVIO INFORMATION TECH

Protection method and device for executable programs

ActiveCN103488919APrevent memory dumpsPrevent Data LeakageProgram/content distribution protectionData informationExecutable
Owner:BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products