Unlock instant, AI-driven research and patent intelligence for your innovation.

A kind of goods transaction method, device, equipment and storage medium based on electronic contract

A technology of electronic contracts and transaction methods, applied in the field of data security, can solve the problems that it is difficult to strictly correspond to the receipt of goods and electronic contracts, and RFID cannot realize offline anti-counterfeiting, etc.

Active Publication Date: 2022-07-22
TIANGU INFORMATION SCI TECH HANGZHOU
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The electronic contract-based goods transaction method provided by this application aims to solve the problems in the prior art that it is difficult to strictly correspond to the actual receipt of goods and the electronic contract and RFID cannot realize offline anti-counterfeiting

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of goods transaction method, device, equipment and storage medium based on electronic contract
  • A kind of goods transaction method, device, equipment and storage medium based on electronic contract
  • A kind of goods transaction method, device, equipment and storage medium based on electronic contract

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] like figure 1 As shown in the figure, a method of goods transaction based on an electronic contract includes the following steps:

[0059] S110. Sign an electronic contract with the consignee containing the encrypted random numbers of both parties;

[0060] S120. After verifying that the goods are genuine through an electronic label embedded in the goods for verifying the authenticity of the goods, send application delivery information including the original random numbers of both parties to the transaction to the manufacturer of the goods;

[0061] S130, receiving the delivery information including the encrypted response value of both parties of the transaction sent by the goods manufacturer, digitally signing the delivery information and writing it into the electronic label;

[0062] S140. After the delivery is completed, receive the result of the two-way identity authentication sent by the consignee and the goods according to the information in the electronic label,...

Embodiment 2

[0068] like figure 2 As shown, an electronic contract-based goods transaction method includes:

[0069] S210. Exchange respective digital certificates with the consignee to obtain the public key of the counterparty, where the public key of the counterparty is the public key of the deliverer or the public key of the recipient;

[0070] S220, encrypting its own original random number with the public key of the counterparty to obtain the encrypted random number of the deliverer and the encrypted random number of the recipient respectively;

[0071] S230. Sign an electronic contract with the consignee including the encrypted random number of the deliverer and the encrypted random number of the consignee;

[0072] S240. After verifying that the goods are genuine through an electronic label embedded in the goods for verifying the authenticity of the goods, send application delivery information including the original random numbers of both parties to the transaction to the manufact...

Embodiment 3

[0077] like image 3 As shown, an electronic contract-based goods transaction method includes:

[0078] S310. Sign an electronic contract with the consignee containing the encrypted random numbers of both parties;

[0079] S320, using a reader to read the electronic label information embedded in the goods for verifying the authenticity of the goods, and compare it with the goods information stored by the manufacturer of the goods, and if they are consistent, the goods are true;

[0080] S330, extracting the consignee encrypted random number in the electronic contract, and decrypting the consignee encrypted random number using the consignee public key to obtain the consignee's original random number;

[0081] S340. Send the original random number of the deliverer, the original random number of the consignee and the goods identifier to the goods manufacturer, and the goods identifier is sealed in the electronic label;

[0082] S350, receiving the delivery information including...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses an electronic contract-based cargo transaction method, which relates to the technical field of data security, and includes the following steps: after the deliverer signs an electronic contract with the recipient, the deliverer verifies the authenticity of the goods with electronic labels, if If it is true, send application delivery information to the goods manufacturer, sign it after receiving the delivery information returned by the goods manufacturer and write it in the electronic label, and then send the goods to the consignee, and the consignee reads the electronic label. information and carry out two-way authentication with the goods, the authentication is passed, and the transaction is completed. In this method, an electronic contract containing key information is first signed, and during the transaction process of goods with embedded electronic tags, the content of the electronic contract and electronic tag information are used for identity authentication, which realizes the combination of electronic contracts and RFID anti-counterfeiting systems, and simultaneously receives When the consignor uses RFID for anti-counterfeiting verification, it does not need to have networking capabilities, nor does it need to connect to the manufacturer's anti-counterfeiting verification server, which meets the needs of offline transactions.

Description

technical field [0001] The present application relates to the technical field of data security, and in particular, to a method, device, device and storage medium for goods transaction based on an electronic contract. Background technique [0002] For manufacturing enterprises, their success or failure often depends on the competition in the supply chain. The strong operation and management capabilities of the supply chain are the indispensable core competitiveness and strategic advantages of such enterprises; starting from supporting parts, enterprises are faced with Huge contract processing workload and the risk of shoddy parts; on the other hand, such enterprises also face a major pain point in the sales process, that is, after signing sales contracts with consumers or downstream manufacturers, the consignee receives fake goods This has greatly affected the reputation and sales of the company. [0003] At the same time, due to the inconvenient management, low efficiency, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06K17/00G06Q30/00G06Q50/04G06Q50/18
CPCY02P90/30
Inventor 钟一民陈传义郭峰金宏洲程亮
Owner TIANGU INFORMATION SCI TECH HANGZHOU