Nothing Special   »   [go: up one dir, main page]

CN104091230A - Product tracking method - Google Patents

Product tracking method Download PDF

Info

Publication number
CN104091230A
CN104091230A CN201410280861.XA CN201410280861A CN104091230A CN 104091230 A CN104091230 A CN 104091230A CN 201410280861 A CN201410280861 A CN 201410280861A CN 104091230 A CN104091230 A CN 104091230A
Authority
CN
China
Prior art keywords
shield
enterprise
root
false proof
product
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410280861.XA
Other languages
Chinese (zh)
Inventor
陈波
沈宁
罗鸣
赵彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Yun Dun Information Technology Co Ltd
Original Assignee
Anhui Yun Dun Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Yun Dun Information Technology Co Ltd filed Critical Anhui Yun Dun Information Technology Co Ltd
Priority to CN201410280861.XA priority Critical patent/CN104091230A/en
Publication of CN104091230A publication Critical patent/CN104091230A/en
Pending legal-status Critical Current

Links

Landscapes

  • General Factory Administration (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a product tracking method. The product tracking method specifically comprises the following step that standard cloud shields are set and four data which can not be modified are stored in each standard cloud shield when the standard cloud shield leave a factory, wherein the four data include A a root public key PKr, B an initial key pair SK0/PK0, C a cloud shield ID and D an initial public key SKr(PK0), the initial key pair of each standard cloud shield is generated at random, the IDs of the standard cloud shields are different from one another, and the initial public keys SKr(PK0) are signed by the root public keys PKr. The product tracking method has the advantages that right control is conducted according to the symmetric encryption algorithm (including but not limited to SM2 and RAS), data counterfeiting is prevented, information in all steps is collected into a data tracking database. The product tracking method is suitable for tracking of articles of luxury and valuable merchandise in the aspects of production, the circulation channel and the POS terminal.

Description

A kind of tracking of products method
Technical field
The present invention relates to tracking of products and review field, is mainly a kind of tracking of products method.
Background technology
Chinese Patent Application No.: 201410076757.9, application is artificial: Hangzhou Science and Technology Ltd. of Sunyard discloses a kind of follow-up of product quality and retroactive method based on RFID, comprise: A, in each stage of product life cycle, by rfid interrogator, by the product information in each stage, the form with coding is written in the RFID electronic tag being fixed on product, and product information is passed to database server with EPCIS event in form; When B, product break down, by rfid interrogator, scan the coding that RFID electronic tag obtains each stage, and be sent to electronic tag centre management machine, electronic tag centre management machine is according to product information corresponding to each stage in the Query Database server of encoding step by step, and contrast with the product information in standard database, analyze the stage going wrong.The present invention, by the quality information in rfid interrogator record product each stage of life cycle, when product breaks down, reviews failsafe link step by step, realizes the information management in each stage of product and reviews.Its deficiency is: the transmission of information is all disclosed, also there is no the control of authority, and data are easily forged.
Summary of the invention
The object of the invention is to overcome the deficiency that prior art exists, and a kind of tracking of products method is provided.
The object of the invention is to complete by following technical solution.This tracking of products method, the method concrete steps are as follows:
(1), established standards cloud shield, make each standard cloud shield when dispatching from the factory standard cloud shield inner preserve four neither can Update Table, A, root public key PKr: root public key PKr and root private key SKr only have a pair of forever; B, initial key are to SK0/PK0: the initial key of each standard cloud shield is to being random generation, and wherein SK0 is initial private key, and PK0 is initial PKI; C, cloud shield ID: the ID of each standard cloud shield is different; D, the initial PKI SKr (PK0) being signed by root private key SKr;
(2), adopt standard Yun Dun manufacturing enterprise root shield: A, first verify whether enterprise's root shield is legal cloud shield; B, verify legal Hou enterprise root shield the inside stochastic production Yi Ge enterprise key pair: PK enterprise/SK enterprise, this enterprise's key is to being kept at enterprise's root shield the inside, and private key SK looks forward to deriving; Enterprise's key is passed through to producing enterprise's root certificate in C, enterprise's root shield the inside;
(3), adopt enterprise's root shield to produce a series of business shields, be used for offering production workshop, distributor's terminal sale business use, wherein business shield comprises production shield, channel shield or sells shield, its inner related credentials of preserving by enterprise's root certificate issuance, and this business shield mandate number of times;
(4), adopt enterprise's root shield to produce the false proof shield a of product, give false proof shield a signature, and writing information: A, first verify whether enterprise's root shield and false proof shield a to be produced are legal cloud shield; B, in false proof shield a the false proof key pair of stochastic production: SKa/PKa, then with enterprise's root shield, the PKI of false proof shield a is signed: SK looks forward to (PKa); C, enterprise's root certificate, SK enterprise (PKa) is all written to false proof shield a the inside;
(5), after the related credentials checking of enterprise's root certificate issuance is legal, by business shield, on the false proof shield a of this product, add relevant information, after each writing information, business shield internal authorization number of times will subtract 1, when authorizing number of times to be 0, this business shield cancels.
Further, when production, by producing shield, on the false proof shield a of this product, add production information; Product when distribution channel by channel shield to adding channel information on the false proof shield a of product; Product adds marketing information by selling shield on to the false proof shield a of product when selling; Product is bought when customization user and by selling shield, is added blessing or the remark information of access customer on to the false proof shield a of product.
Beneficial effect of the present invention is: this tracking of products method, by asymmetrical encryption algorithm (including but not limited to SM2, RAS), carry out control of authority, and prevent data forgery, links information is aggregated into data tracking database.Be applicable to luxury goods and articles of price from the tracking of production, Flow channel and point-of-sale terminal.
Accompanying drawing explanation
Fig. 1 is frame structure schematic diagram of the present invention;
Embodiment
Below in conjunction with drawings and Examples, the present invention is done to detailed introduction:
As shown in Figure 1, this tracking of products method, the method concrete steps are as follows:
(1), established standards cloud shield, make each standard cloud shield when dispatching from the factory standard cloud shield inner preserve four neither can Update Table, A, root public key PKr: root public key PKr and root private key SKr only have a pair of forever; B, initial key are to SK0/PK0: the initial key of each standard cloud shield is to being random generation, and wherein SK0 is initial private key, and PK0 is initial PKI; C, cloud shield ID: the ID of each standard cloud shield is different; D, the initial PKI SKr (PK0) being signed by root private key SKr; In cloud shield, there is field: SKr (PK0), guarantee cloud shield legitimacy and cannot be forged.
(2), adopt standard Yun Dun manufacturing enterprise root shield: A, first verify whether enterprise's root shield is legal cloud shield; B, verify legal Hou enterprise root shield the inside stochastic production Yi Ge enterprise key pair: PK enterprise/SK enterprise, this enterprise's key is to being kept at enterprise's root shield the inside, and private key SK looks forward to deriving; Enterprise's key is passed through to producing enterprise's root certificate in C, enterprise's root shield the inside;
(3), adopt enterprise's root shield to produce a series of business shields, be used for offering production workshop, distributor's terminal sale business use, wherein business shield comprises production shield, channel shield or sells shield, its inner related credentials of preserving by enterprise's root certificate issuance, and this business shield mandate number of times;
(4), adopt enterprise's root shield to produce the false proof shield of product, give false proof shield a signature, and writing information: A, first verify whether enterprise's root shield and false proof shield a to be produced are legal cloud shield; B, in false proof shield a the false proof key pair of stochastic production: SKa/PKa, then with enterprise's root shield, the PKI of false proof shield a is signed: SK looks forward to (PKa); C, enterprise's root certificate, SK enterprise (PKa) is all written to false proof shield a the inside, guarantees thus the PKa of false proof shield a, cannot be forged.
(5), after the related credentials checking of enterprise's root certificate issuance is legal, by business shield, on the false proof shield a of this product, add relevant information, after each writing information, business shield internal authorization number of times will subtract 1, when authorizing number of times to be 0, this business shield cancels.
Operation flow: add production information by producing shield on the false proof shield a of this product when production; Product when distribution channel by channel shield to adding channel information on the false proof shield a of product; Product adds marketing information by selling shield on to the false proof shield a of product when selling; Product is bought when customization user and by selling shield, is added blessing or the remark information of access customer on to the false proof shield a of product.Above entry information link is all at data tracking server record, and after each writing information, business shield internal authorization number of times will subtract 1, and when authorizing number of times to be 0, this business shield cancels.
The principle of business shield and false proof shield: because of producing shield, channel shield, selling the shield certificate that company's root certificate issuance is contained in shield inside, before false proof shield writing information, false proof shield will check the legitimacy of the other side's shield certificate.After only having the shield certification authentication of enterprise's root certificate authority legal, false proof shield is just accepted the information writing, otherwise refusal is write.Thereby effectively guarantee that product is from producing until products customers hand, all processes all can be followed the trail of and be verified, and cannot forge.Concerning consumer, can guarantee to buy genuine piece.Concerning enterprise, can carry out data analysis, secondary marketing etc.
Enterprise's root shield, business shield, false proof shield internal data, all private key informations all cannot derive outside shield.Once after other information write, all cannot revise and delete.The mandate number of times of business shield inside, cannot change by external interface, can only reduce by logic in business shield shield.
Special instruction: above-mentioned cloud shield refers to the U shield that contains cryptographic algorithm.
The present invention is not limited to above-mentioned embodiment, no matter do any variation in its shape or material formation, every employing structural design provided by the present invention, is all a kind of distortion of the present invention, all should think within protection domain of the present invention.

Claims (2)

1. a tracking of products method, is characterized in that: the method concrete steps are as follows:
(1), established standards cloud shield, make each standard cloud shield when dispatching from the factory standard cloud shield inner preserve four neither can Update Table, A, root public key PKr: root public key PKr and root private key SKr only have a pair of forever; B, initial key are to SK0/PK0: the initial key of each standard cloud shield is to being random generation, and wherein SK0 is initial private key, and PK0 is initial PKI; C, cloud shield ID: the ID of each standard cloud shield is different; D, the initial PKI SKr (PK0) being signed by root private key SKr;
(2), adopt standard Yun Dun manufacturing enterprise root shield: A, first verify whether enterprise's root shield is legal cloud shield; B, verify legal Hou enterprise root shield the inside stochastic production Yi Ge enterprise key pair: PK enterprise/SK enterprise, this enterprise's key is to being kept at enterprise's root shield the inside, and private key SK looks forward to deriving; Enterprise's key is passed through to producing enterprise's root certificate in C, enterprise's root shield the inside;
(3), adopt enterprise's root shield to produce a series of business shields, be used for offering production workshop, distributor's terminal sale business use, wherein business shield comprises production shield, channel shield or sells shield, its inner related credentials of preserving by enterprise's root certificate issuance, and this business shield mandate number of times;
(4), adopt enterprise's root shield to produce the false proof shield a of product, give false proof shield a signature, and writing information: A, first verify whether enterprise's root shield and false proof shield a to be produced are legal cloud shield; B, in false proof shield a the false proof key pair of stochastic production: SKa/PKa, then with enterprise's root shield, the PKI of false proof shield a is signed: SK looks forward to (PKa); C, enterprise's root certificate, SK enterprise (PKa) is all written to false proof shield a the inside;
(5), after the related credentials checking of enterprise's root certificate issuance is legal, by business shield, on the false proof shield a of this product, add relevant information, after each writing information, business shield internal authorization number of times will subtract 1, when authorizing number of times to be 0, this business shield cancels.
2. tracking of products method according to claim 1, is characterized in that: when production, by producing shield, on the false proof shield a of this product, add production information; Product when distribution channel by channel shield to adding channel information on the false proof shield a of product; Product adds marketing information by selling shield on to the false proof shield a of product when selling; Product is bought when customization user and by selling shield, is added blessing or the remark information of access customer on to the false proof shield a of product.
CN201410280861.XA 2014-06-20 2014-06-20 Product tracking method Pending CN104091230A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410280861.XA CN104091230A (en) 2014-06-20 2014-06-20 Product tracking method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410280861.XA CN104091230A (en) 2014-06-20 2014-06-20 Product tracking method

Publications (1)

Publication Number Publication Date
CN104091230A true CN104091230A (en) 2014-10-08

Family

ID=51638945

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410280861.XA Pending CN104091230A (en) 2014-06-20 2014-06-20 Product tracking method

Country Status (1)

Country Link
CN (1) CN104091230A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113676330A (en) * 2021-08-10 2021-11-19 上海瓶钵信息科技有限公司 Digital certificate application system and method based on secondary key

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008252956A (en) * 2001-02-21 2008-10-16 Rpk New Zealand Ltd Encrypted media key management
CN103136645A (en) * 2011-11-29 2013-06-05 深圳市太和物联信息技术有限公司 Method for achieving information interaction with only information carrier in product full life cycle
CN103559434A (en) * 2013-09-22 2014-02-05 四川大学 Generation method for electronic attached sheets in circulation domain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008252956A (en) * 2001-02-21 2008-10-16 Rpk New Zealand Ltd Encrypted media key management
CN103136645A (en) * 2011-11-29 2013-06-05 深圳市太和物联信息技术有限公司 Method for achieving information interaction with only information carrier in product full life cycle
CN103559434A (en) * 2013-09-22 2014-02-05 四川大学 Generation method for electronic attached sheets in circulation domain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113676330A (en) * 2021-08-10 2021-11-19 上海瓶钵信息科技有限公司 Digital certificate application system and method based on secondary key
CN113676330B (en) * 2021-08-10 2023-08-01 上海瓶钵信息科技有限公司 Digital certificate application system and method based on secondary secret key

Similar Documents

Publication Publication Date Title
Shahid et al. Blockchain-based agri-food supply chain: A complete solution
CN106600405B (en) Block chain-based data rights and interests protection method
CN110175855A (en) A kind of two-dimension code anti-counterfeit based on block chain is traced to the source implementation method
CN104217241A (en) Electronic anti-fake label and realizing method
CN108876399A (en) A kind of finite field block catenary system with closed loop Verification System
CN104574092A (en) Commodity anti-counterfeiting system based on invoice and commodity stocks accounting and anti-counterfeiting method
CN102184506A (en) Digital anti-counterfeiting method based on chaos password encryption
CN109886706A (en) A kind of dendrobium candidum traceability system based on block chain
CN110335055B (en) Service data tracing method and device based on cloud platform
CN103473668A (en) Commodity whole closed-loop traceability system based on e-commerce and implement method thereof
CN105373933A (en) Food circulation traceability method based on electronic inspection report
CN105184590A (en) Laser on-line efficient etching and product anti-fake traceability system applied to steels
CN102063633A (en) Anti-counterfeiting method based on radio frequency identification technology
CN107679981A (en) Lending method based on block chain data verification service
CN109146528A (en) Antiforge method for commodities and system based on block chain
CN104794626A (en) Anti-counterfeiting method and anti-counterfeiting device based on hardware information
CN111222175A (en) Multi-source data block chain tamper-proof financing credit guarantee method and system
CN107274239A (en) Realize the method that commission is assessed and secure and trusted is merchandised in second-hand article trading website
Li et al. An exploratory study on the design and management model of traditional Chinese medicine quality safety traceability system based on blockchain technology
Bhatnagar et al. Product traceability using blockchain
Madhwal Implementation of Tokenised Supply Chain Using Blockchain Technology
CN103235995A (en) Electronic anti-counterfeiting and logistics management system based on NFC (near field communication) mobile phone
CN104636931A (en) Two-dimensional code production method for tobacco industry
CN106339888A (en) RFID wine product all-round anti-fake monitoring method
CN106504007A (en) A kind of commodity counterfeit prevention management system based on NFC electronic tags

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20141008

RJ01 Rejection of invention patent application after publication