CN104091230A - Product tracking method - Google Patents
Product tracking method Download PDFInfo
- Publication number
- CN104091230A CN104091230A CN201410280861.XA CN201410280861A CN104091230A CN 104091230 A CN104091230 A CN 104091230A CN 201410280861 A CN201410280861 A CN 201410280861A CN 104091230 A CN104091230 A CN 104091230A
- Authority
- CN
- China
- Prior art keywords
- shield
- enterprise
- root
- false proof
- product
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- General Factory Administration (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to a product tracking method. The product tracking method specifically comprises the following step that standard cloud shields are set and four data which can not be modified are stored in each standard cloud shield when the standard cloud shield leave a factory, wherein the four data include A a root public key PKr, B an initial key pair SK0/PK0, C a cloud shield ID and D an initial public key SKr(PK0), the initial key pair of each standard cloud shield is generated at random, the IDs of the standard cloud shields are different from one another, and the initial public keys SKr(PK0) are signed by the root public keys PKr. The product tracking method has the advantages that right control is conducted according to the symmetric encryption algorithm (including but not limited to SM2 and RAS), data counterfeiting is prevented, information in all steps is collected into a data tracking database. The product tracking method is suitable for tracking of articles of luxury and valuable merchandise in the aspects of production, the circulation channel and the POS terminal.
Description
Technical field
The present invention relates to tracking of products and review field, is mainly a kind of tracking of products method.
Background technology
Chinese Patent Application No.: 201410076757.9, application is artificial: Hangzhou Science and Technology Ltd. of Sunyard discloses a kind of follow-up of product quality and retroactive method based on RFID, comprise: A, in each stage of product life cycle, by rfid interrogator, by the product information in each stage, the form with coding is written in the RFID electronic tag being fixed on product, and product information is passed to database server with EPCIS event in form; When B, product break down, by rfid interrogator, scan the coding that RFID electronic tag obtains each stage, and be sent to electronic tag centre management machine, electronic tag centre management machine is according to product information corresponding to each stage in the Query Database server of encoding step by step, and contrast with the product information in standard database, analyze the stage going wrong.The present invention, by the quality information in rfid interrogator record product each stage of life cycle, when product breaks down, reviews failsafe link step by step, realizes the information management in each stage of product and reviews.Its deficiency is: the transmission of information is all disclosed, also there is no the control of authority, and data are easily forged.
Summary of the invention
The object of the invention is to overcome the deficiency that prior art exists, and a kind of tracking of products method is provided.
The object of the invention is to complete by following technical solution.This tracking of products method, the method concrete steps are as follows:
(1), established standards cloud shield, make each standard cloud shield when dispatching from the factory standard cloud shield inner preserve four neither can Update Table, A, root public key PKr: root public key PKr and root private key SKr only have a pair of forever; B, initial key are to SK0/PK0: the initial key of each standard cloud shield is to being random generation, and wherein SK0 is initial private key, and PK0 is initial PKI; C, cloud shield ID: the ID of each standard cloud shield is different; D, the initial PKI SKr (PK0) being signed by root private key SKr;
(2), adopt standard Yun Dun manufacturing enterprise root shield: A, first verify whether enterprise's root shield is legal cloud shield; B, verify legal Hou enterprise root shield the inside stochastic production Yi Ge enterprise key pair: PK enterprise/SK enterprise, this enterprise's key is to being kept at enterprise's root shield the inside, and private key SK looks forward to deriving; Enterprise's key is passed through to producing enterprise's root certificate in C, enterprise's root shield the inside;
(3), adopt enterprise's root shield to produce a series of business shields, be used for offering production workshop, distributor's terminal sale business use, wherein business shield comprises production shield, channel shield or sells shield, its inner related credentials of preserving by enterprise's root certificate issuance, and this business shield mandate number of times;
(4), adopt enterprise's root shield to produce the false proof shield a of product, give false proof shield a signature, and writing information: A, first verify whether enterprise's root shield and false proof shield a to be produced are legal cloud shield; B, in false proof shield a the false proof key pair of stochastic production: SKa/PKa, then with enterprise's root shield, the PKI of false proof shield a is signed: SK looks forward to (PKa); C, enterprise's root certificate, SK enterprise (PKa) is all written to false proof shield a the inside;
(5), after the related credentials checking of enterprise's root certificate issuance is legal, by business shield, on the false proof shield a of this product, add relevant information, after each writing information, business shield internal authorization number of times will subtract 1, when authorizing number of times to be 0, this business shield cancels.
Further, when production, by producing shield, on the false proof shield a of this product, add production information; Product when distribution channel by channel shield to adding channel information on the false proof shield a of product; Product adds marketing information by selling shield on to the false proof shield a of product when selling; Product is bought when customization user and by selling shield, is added blessing or the remark information of access customer on to the false proof shield a of product.
Beneficial effect of the present invention is: this tracking of products method, by asymmetrical encryption algorithm (including but not limited to SM2, RAS), carry out control of authority, and prevent data forgery, links information is aggregated into data tracking database.Be applicable to luxury goods and articles of price from the tracking of production, Flow channel and point-of-sale terminal.
Accompanying drawing explanation
Fig. 1 is frame structure schematic diagram of the present invention;
Embodiment
Below in conjunction with drawings and Examples, the present invention is done to detailed introduction:
As shown in Figure 1, this tracking of products method, the method concrete steps are as follows:
(1), established standards cloud shield, make each standard cloud shield when dispatching from the factory standard cloud shield inner preserve four neither can Update Table, A, root public key PKr: root public key PKr and root private key SKr only have a pair of forever; B, initial key are to SK0/PK0: the initial key of each standard cloud shield is to being random generation, and wherein SK0 is initial private key, and PK0 is initial PKI; C, cloud shield ID: the ID of each standard cloud shield is different; D, the initial PKI SKr (PK0) being signed by root private key SKr; In cloud shield, there is field: SKr (PK0), guarantee cloud shield legitimacy and cannot be forged.
(2), adopt standard Yun Dun manufacturing enterprise root shield: A, first verify whether enterprise's root shield is legal cloud shield; B, verify legal Hou enterprise root shield the inside stochastic production Yi Ge enterprise key pair: PK enterprise/SK enterprise, this enterprise's key is to being kept at enterprise's root shield the inside, and private key SK looks forward to deriving; Enterprise's key is passed through to producing enterprise's root certificate in C, enterprise's root shield the inside;
(3), adopt enterprise's root shield to produce a series of business shields, be used for offering production workshop, distributor's terminal sale business use, wherein business shield comprises production shield, channel shield or sells shield, its inner related credentials of preserving by enterprise's root certificate issuance, and this business shield mandate number of times;
(4), adopt enterprise's root shield to produce the false proof shield of product, give false proof shield a signature, and writing information: A, first verify whether enterprise's root shield and false proof shield a to be produced are legal cloud shield; B, in false proof shield a the false proof key pair of stochastic production: SKa/PKa, then with enterprise's root shield, the PKI of false proof shield a is signed: SK looks forward to (PKa); C, enterprise's root certificate, SK enterprise (PKa) is all written to false proof shield a the inside, guarantees thus the PKa of false proof shield a, cannot be forged.
(5), after the related credentials checking of enterprise's root certificate issuance is legal, by business shield, on the false proof shield a of this product, add relevant information, after each writing information, business shield internal authorization number of times will subtract 1, when authorizing number of times to be 0, this business shield cancels.
Operation flow: add production information by producing shield on the false proof shield a of this product when production; Product when distribution channel by channel shield to adding channel information on the false proof shield a of product; Product adds marketing information by selling shield on to the false proof shield a of product when selling; Product is bought when customization user and by selling shield, is added blessing or the remark information of access customer on to the false proof shield a of product.Above entry information link is all at data tracking server record, and after each writing information, business shield internal authorization number of times will subtract 1, and when authorizing number of times to be 0, this business shield cancels.
The principle of business shield and false proof shield: because of producing shield, channel shield, selling the shield certificate that company's root certificate issuance is contained in shield inside, before false proof shield writing information, false proof shield will check the legitimacy of the other side's shield certificate.After only having the shield certification authentication of enterprise's root certificate authority legal, false proof shield is just accepted the information writing, otherwise refusal is write.Thereby effectively guarantee that product is from producing until products customers hand, all processes all can be followed the trail of and be verified, and cannot forge.Concerning consumer, can guarantee to buy genuine piece.Concerning enterprise, can carry out data analysis, secondary marketing etc.
Enterprise's root shield, business shield, false proof shield internal data, all private key informations all cannot derive outside shield.Once after other information write, all cannot revise and delete.The mandate number of times of business shield inside, cannot change by external interface, can only reduce by logic in business shield shield.
Special instruction: above-mentioned cloud shield refers to the U shield that contains cryptographic algorithm.
The present invention is not limited to above-mentioned embodiment, no matter do any variation in its shape or material formation, every employing structural design provided by the present invention, is all a kind of distortion of the present invention, all should think within protection domain of the present invention.
Claims (2)
1. a tracking of products method, is characterized in that: the method concrete steps are as follows:
(1), established standards cloud shield, make each standard cloud shield when dispatching from the factory standard cloud shield inner preserve four neither can Update Table, A, root public key PKr: root public key PKr and root private key SKr only have a pair of forever; B, initial key are to SK0/PK0: the initial key of each standard cloud shield is to being random generation, and wherein SK0 is initial private key, and PK0 is initial PKI; C, cloud shield ID: the ID of each standard cloud shield is different; D, the initial PKI SKr (PK0) being signed by root private key SKr;
(2), adopt standard Yun Dun manufacturing enterprise root shield: A, first verify whether enterprise's root shield is legal cloud shield; B, verify legal Hou enterprise root shield the inside stochastic production Yi Ge enterprise key pair: PK enterprise/SK enterprise, this enterprise's key is to being kept at enterprise's root shield the inside, and private key SK looks forward to deriving; Enterprise's key is passed through to producing enterprise's root certificate in C, enterprise's root shield the inside;
(3), adopt enterprise's root shield to produce a series of business shields, be used for offering production workshop, distributor's terminal sale business use, wherein business shield comprises production shield, channel shield or sells shield, its inner related credentials of preserving by enterprise's root certificate issuance, and this business shield mandate number of times;
(4), adopt enterprise's root shield to produce the false proof shield a of product, give false proof shield a signature, and writing information: A, first verify whether enterprise's root shield and false proof shield a to be produced are legal cloud shield; B, in false proof shield a the false proof key pair of stochastic production: SKa/PKa, then with enterprise's root shield, the PKI of false proof shield a is signed: SK looks forward to (PKa); C, enterprise's root certificate, SK enterprise (PKa) is all written to false proof shield a the inside;
(5), after the related credentials checking of enterprise's root certificate issuance is legal, by business shield, on the false proof shield a of this product, add relevant information, after each writing information, business shield internal authorization number of times will subtract 1, when authorizing number of times to be 0, this business shield cancels.
2. tracking of products method according to claim 1, is characterized in that: when production, by producing shield, on the false proof shield a of this product, add production information; Product when distribution channel by channel shield to adding channel information on the false proof shield a of product; Product adds marketing information by selling shield on to the false proof shield a of product when selling; Product is bought when customization user and by selling shield, is added blessing or the remark information of access customer on to the false proof shield a of product.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410280861.XA CN104091230A (en) | 2014-06-20 | 2014-06-20 | Product tracking method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410280861.XA CN104091230A (en) | 2014-06-20 | 2014-06-20 | Product tracking method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104091230A true CN104091230A (en) | 2014-10-08 |
Family
ID=51638945
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410280861.XA Pending CN104091230A (en) | 2014-06-20 | 2014-06-20 | Product tracking method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104091230A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113676330A (en) * | 2021-08-10 | 2021-11-19 | 上海瓶钵信息科技有限公司 | Digital certificate application system and method based on secondary key |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008252956A (en) * | 2001-02-21 | 2008-10-16 | Rpk New Zealand Ltd | Encrypted media key management |
CN103136645A (en) * | 2011-11-29 | 2013-06-05 | 深圳市太和物联信息技术有限公司 | Method for achieving information interaction with only information carrier in product full life cycle |
CN103559434A (en) * | 2013-09-22 | 2014-02-05 | 四川大学 | Generation method for electronic attached sheets in circulation domain |
-
2014
- 2014-06-20 CN CN201410280861.XA patent/CN104091230A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008252956A (en) * | 2001-02-21 | 2008-10-16 | Rpk New Zealand Ltd | Encrypted media key management |
CN103136645A (en) * | 2011-11-29 | 2013-06-05 | 深圳市太和物联信息技术有限公司 | Method for achieving information interaction with only information carrier in product full life cycle |
CN103559434A (en) * | 2013-09-22 | 2014-02-05 | 四川大学 | Generation method for electronic attached sheets in circulation domain |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113676330A (en) * | 2021-08-10 | 2021-11-19 | 上海瓶钵信息科技有限公司 | Digital certificate application system and method based on secondary key |
CN113676330B (en) * | 2021-08-10 | 2023-08-01 | 上海瓶钵信息科技有限公司 | Digital certificate application system and method based on secondary secret key |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shahid et al. | Blockchain-based agri-food supply chain: A complete solution | |
CN106600405B (en) | Block chain-based data rights and interests protection method | |
CN110175855A (en) | A kind of two-dimension code anti-counterfeit based on block chain is traced to the source implementation method | |
CN104217241A (en) | Electronic anti-fake label and realizing method | |
CN108876399A (en) | A kind of finite field block catenary system with closed loop Verification System | |
CN104574092A (en) | Commodity anti-counterfeiting system based on invoice and commodity stocks accounting and anti-counterfeiting method | |
CN102184506A (en) | Digital anti-counterfeiting method based on chaos password encryption | |
CN109886706A (en) | A kind of dendrobium candidum traceability system based on block chain | |
CN110335055B (en) | Service data tracing method and device based on cloud platform | |
CN103473668A (en) | Commodity whole closed-loop traceability system based on e-commerce and implement method thereof | |
CN105373933A (en) | Food circulation traceability method based on electronic inspection report | |
CN105184590A (en) | Laser on-line efficient etching and product anti-fake traceability system applied to steels | |
CN102063633A (en) | Anti-counterfeiting method based on radio frequency identification technology | |
CN107679981A (en) | Lending method based on block chain data verification service | |
CN109146528A (en) | Antiforge method for commodities and system based on block chain | |
CN104794626A (en) | Anti-counterfeiting method and anti-counterfeiting device based on hardware information | |
CN111222175A (en) | Multi-source data block chain tamper-proof financing credit guarantee method and system | |
CN107274239A (en) | Realize the method that commission is assessed and secure and trusted is merchandised in second-hand article trading website | |
Li et al. | An exploratory study on the design and management model of traditional Chinese medicine quality safety traceability system based on blockchain technology | |
Bhatnagar et al. | Product traceability using blockchain | |
Madhwal | Implementation of Tokenised Supply Chain Using Blockchain Technology | |
CN103235995A (en) | Electronic anti-counterfeiting and logistics management system based on NFC (near field communication) mobile phone | |
CN104636931A (en) | Two-dimensional code production method for tobacco industry | |
CN106339888A (en) | RFID wine product all-round anti-fake monitoring method | |
CN106504007A (en) | A kind of commodity counterfeit prevention management system based on NFC electronic tags |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20141008 |
|
RJ01 | Rejection of invention patent application after publication |