CN109034851B - Commodity anti-counterfeiting tracing method and device based on block chain and block chain link points - Google Patents
Commodity anti-counterfeiting tracing method and device based on block chain and block chain link points Download PDFInfo
- Publication number
- CN109034851B CN109034851B CN201811032827.5A CN201811032827A CN109034851B CN 109034851 B CN109034851 B CN 109034851B CN 201811032827 A CN201811032827 A CN 201811032827A CN 109034851 B CN109034851 B CN 109034851B
- Authority
- CN
- China
- Prior art keywords
- commodity
- link
- information
- block chain
- hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 238000012795 verification Methods 0.000 claims abstract description 28
- 230000015654 memory Effects 0.000 claims description 16
- 238000004422 calculation algorithm Methods 0.000 claims description 12
- 238000004364 calculation method Methods 0.000 claims description 8
- 238000012544 monitoring process Methods 0.000 claims 2
- 239000003795 chemical substances by application Substances 0.000 description 29
- 238000003860 storage Methods 0.000 description 13
- 238000004590 computer program Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 238000004519 manufacturing process Methods 0.000 description 5
- 239000002994 raw material Substances 0.000 description 5
- 238000013475 authorization Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000009826 distribution Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000001815 facial effect Effects 0.000 description 2
- 238000004806 packaging method and process Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 238000013502 data validation Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005562 fading Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000013515 script Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Development Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- General Engineering & Computer Science (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the technical field of commodity anti-counterfeiting traceability, in particular to a commodity anti-counterfeiting traceability method and device based on a block chain and a block chain node. The method comprises the following steps: receiving two-dimension code information of the commodity sent by a client, wherein the two-dimension code information is used for indicating to jump to an anti-counterfeiting tracing page, and the anti-counterfeiting tracing page records information of each link of the commodity; calculating a hash value to be verified according to information of each link of the anti-counterfeiting tracing page, wherein a hash list recording real hash values of each commodity is stored in each block link point, and the hash list is verified by block link consensus; traversing the hash list to determine whether a real hash value corresponding to the hash value to be verified exists; if yes, commodity verification success information is returned to the client; if not, commodity authentication failure information is returned to the client. The block chain has the characteristics of being not falsifiable, decentralized and highly transparent, so that reliable anti-counterfeiting traceability information can be provided.
Description
Technical Field
The invention relates to the technical field of commodity anti-counterfeiting traceability, in particular to a commodity anti-counterfeiting traceability method and device based on a block chain and a block chain node.
Background
The method has the advantages that the method can thoroughly eradicate counterfeits and fadings, the market demand can not be met by simply verifying the information of product manufacturers, the raw material, production, storage and logistics information of the product can be monitored while the product is anti-fake, and the main trend of anti-fake development in recent years is formed.
In the process of implementing the invention, the inventor finds that the traditional technology has at least the following problems: the anti-counterfeiting tracing information of the commodity is easy to forge or tamper, and the phenomenon is unfair to the user.
Disclosure of Invention
An object of an embodiment of the present invention is to provide a commodity anti-counterfeiting tracing method based on a block chain, an apparatus thereof, and a block chain node, which can provide reliable anti-counterfeiting tracing information.
In order to solve the above technical problems, embodiments of the present invention provide the following technical solutions:
in a first aspect, an embodiment of the present invention provides a commodity anti-counterfeiting tracing method based on a blockchain, where the method includes:
receiving two-dimension code information of a commodity sent by a client, wherein the two-dimension code information is used for indicating to jump to an anti-counterfeiting tracing page, and the anti-counterfeiting tracing page records information of each link of the commodity;
calculating a hash value to be verified according to information of each link of the anti-counterfeiting tracing page, wherein a hash list recording a real hash value of each commodity is stored in each block link point, and the hash list is verified by the block chain consensus;
traversing the hash list to determine whether a real hash value corresponding to the hash value to be verified exists;
if yes, commodity verification success information is returned to the client;
if not, commodity authentication failure information is returned to the client.
Optionally, the hash list has been verified by the blockchain consensus, including:
acquiring link information uploaded by a supplier corresponding to each link in each commodity;
performing Hash operation on all link information of each commodity, calculating the real Hash value of each commodity, and clustering the real Hash value corresponding to each commodity to form a Hash list;
and identifying and verifying the hash list.
Optionally, the obtaining link information uploaded by a provider corresponding to each link in each commodity includes:
receiving an information request sent by a client of a provider, wherein the information request carries a first certificate and link information, and a second certificate is stored in a block chain node;
judging whether the second certificate unlocks the first certificate or not according to the information request;
if yes, receiving the link information;
and if not, not receiving the link information.
Optionally, the performing hash operation on all link information of each commodity to calculate a true hash value of the commodity includes:
counting the uploading times of each commodity link;
when the counted link uploading times of each commodity are detected to be equal to a preset link time threshold, performing Hash operation on all link information of each commodity, and calculating a real Hash value of the commodity;
and when the statistical link uploading times of each commodity are not detected to be smaller than a preset link uploading time threshold, continuing to monitor and count the link uploading times of each commodity.
Optionally, the consensus algorithm of the consensus verification adopts a share authorization certification algorithm.
In a second aspect, an embodiment of the present invention provides a commodity anti-counterfeiting tracing device based on a blockchain, where the device includes:
the system comprises a receiving module, a display module and a display module, wherein the receiving module is used for receiving two-dimension code information of a commodity sent by a client, the two-dimension code information is used for indicating to jump to an anti-counterfeiting tracing page, and the anti-counterfeiting tracing page records information of each link of the commodity;
the calculation module is used for calculating a hash value to be verified according to information of each link of the anti-counterfeiting traceability page, a hash list recording a real hash value of each commodity is stored in each block link point, and the hash list is verified by the block chain;
the traversal module is used for traversing the hash list to determine whether a real hash value corresponding to the hash value to be verified exists;
the first returning module is used for returning successful commodity verification information to the client if the commodity verification information is successful;
and the second returning module is used for returning commodity authentication failure information to the client if the client does not answer the request.
Optionally, the calculation module is specifically configured to:
acquiring link information uploaded by a supplier corresponding to each link in each commodity;
performing Hash operation on all link information of each commodity, calculating the real Hash value of each commodity, and clustering the real Hash value corresponding to each commodity to form a Hash list;
and identifying and verifying the hash list.
Optionally, the computing module is further specifically configured to:
receiving an information request sent by the client, wherein the information request carries a first certificate and link information, and a second certificate is stored in the block chain node;
judging whether the second certificate unlocks the first certificate or not according to the information request;
if yes, receiving the link information;
and if not, not receiving the link information.
Optionally, the computing module is further specifically configured to:
counting the uploading times of each commodity link;
when the counted link uploading times of each commodity are detected to be equal to a preset link time threshold, performing Hash operation on all link information of each commodity, and calculating a real Hash value of the commodity;
and when the statistical link uploading times of each commodity are not detected to be smaller than a preset link uploading time threshold, continuing to monitor and count the link uploading times of each commodity.
In a third aspect, embodiments of the present invention provide a block link point, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, the instructions being executable by the at least one processor to enable the at least one processor to perform the blockchain-based merchandise anti-counterfeiting traceability method according to any one of claims 1 to 5.
In a fourth aspect, embodiments of the present invention provide a non-transitory computer-readable storage medium storing computer-executable instructions for causing block chain link points to perform the block chain-based merchandise anti-counterfeiting tracing method as described in any one of the above.
In a fifth aspect, an embodiment of the present invention provides a computer program product, where the computer program product includes a computer program stored on a non-volatile computer-readable storage medium, and the computer program includes program instructions, when the program instructions are executed by an electronic device, cause the block chain link points to perform any one of the block chain based commodity anti-counterfeiting tracing methods.
In the commodity anti-counterfeiting tracing method based on the block chain and the device and the block chain node thereof provided by the embodiments of the invention, firstly, two-dimension code information of a commodity sent by a client is received, the two-dimension code information is used for indicating to jump to an anti-counterfeiting tracing page, and the anti-counterfeiting tracing page records information of each link of the commodity; secondly, calculating a hash value to be verified according to information of each link of the anti-counterfeiting tracing page, wherein a hash list recording real hash values of each commodity is stored in each block link point, and the hash list is verified by the block chain consensus; finally, traversing the hash list to determine whether a real hash value corresponding to the hash value to be verified exists, if so, returning commodity verification success information to the client; if not, commodity authentication failure information is returned to the client. The block chain has the characteristics of being not falsifiable, decentralized and highly transparent, so that reliable anti-counterfeiting traceability information can be provided.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
FIG. 1 is a block chain network architecture model according to an embodiment of the present invention;
FIG. 2 is a block chain system according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of an unmanned store according to an embodiment of the present invention;
FIG. 3a is a schematic circuit diagram of an unmanned store according to an embodiment of the present invention;
fig. 4 is a schematic flow chart of a commodity anti-counterfeiting tracing method based on a block chain according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a commodity anti-counterfeiting tracing device based on a block chain according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a block link point according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The block chain technique is also called a distributed book technique, and is a distributed internet database technique. A network constructed based on the blockchain technology may be referred to as a blockchain network, where the blockchain network includes a plurality of blockchain nodes, each node corresponds to at least one blockchain, and each blockchain includes at least one block. The block chain technology has the characteristics of decentralization, openness and transparency, no tampering, trustiness and the like, so that the block chain technology is more and more widely applied.
Referring to fig. 1, fig. 1 is a block chain network architecture model according to an embodiment of the present invention. As shown in fig. 1, the blockchain network 100 includes a data layer 11, a network layer 12, a consensus layer 13, and an intelligent contract layer 14.
The data layer 11 encapsulates the underlying data blocks and associated basic data and basic algorithms such as data encryption and time stamping. The network layer 12 includes a distributed networking mechanism, a data propagation mechanism, a data validation mechanism, and the like. The consensus layer 13 encapsulates various kinds of consensus algorithms for the network nodes. Intelligent contract layer 14 encapsulates various types of scripts, algorithms, and intelligent contracts.
The commodity anti-counterfeiting tracing method based on the blockchain can be executed in any suitable type of blockchain nodes with calculation capability, such as servers, desktop computers, smart phones, tablet computers and other electronic products. The server may be a physical server or a logical server formed by virtualizing a plurality of physical servers. The server may also be a server cluster formed by a plurality of servers capable of communicating with each other, and each functional module may be respectively distributed on each server in the server cluster.
The commodity anti-counterfeiting tracing device based on the block chain can be used as a software system and independently arranged in the block chain node, and also can be used as one of the functional modules integrated in the processor to execute the commodity anti-counterfeiting tracing method based on the block chain.
The Block chain provided by the embodiment of the invention comprises a Public Block chain (Public Block Chains), a joint Block chain (Consortium Block Chains) and a Private Block chain (Private Block Chains).
Referring to fig. 2, fig. 2 is a schematic structural diagram of a block chain system according to an embodiment of the present invention. As shown in fig. 2, the blockchain system 200 includes a client 20, a normal node 21, a proxy node 22, and a consensus node 23.
The client 20 is connected with the common node 21 in a communication way, the common node 21 is connected with the agent node 22 in a communication way, and the agent node 22 is also connected with the consensus node 23 in a communication way. The communication between each blockchain node supports a Point-to-Point communication (P2P).
The client 20 is used for collecting information of the client, and the client 20 comprises a consumption terminal or a supplier terminal. The clients 20 are each configured with various types of electrical components, such as a controller, a camera component, an audio component, and so forth. When the client 20 is used as a consumption terminal such as a mobile phone, a smart watch, or the like, a user may scan the anti-counterfeiting tracing two-dimensional code attached to a commodity using the client 20, adjust the anti-counterfeiting tracing two-dimensional code to a content server corresponding to a website, and pull an anti-counterfeiting tracing page from the server. In some embodiments, when the client 20 obtains the anti-fake tracing website for accessing the content server, it may send the anti-fake tracing website to the common node 21, so that the common node 21 accesses the content server according to the anti-fake tracing website and pulls an anti-fake tracing page from the content server, where the anti-fake tracing page records information of each link of the commodity.
When the client 20 is used as a provider terminal, each provider can upload the anti-counterfeiting traceability link information to the common node 21 through the client 20. The ordinary node 21 packages the anti-counterfeiting traceability link information uploaded by each supplier into original block data, and sends the original block data to the agent node 22.
The normal node 21 holds the circulated electronic money and has the right to vote in the blockchain system. The common node 21 can perform related transaction operations, but has no block packaging accounting right, and can only synchronously record block data from the related node with the packaging accounting right.
In some embodiments, the common node 21 may also perform verification for anti-counterfeit tracing.
The agent node 22 is written with an intelligent contract code, and the normal node 21 sends the original data of the block to the agent node 22, and triggers the intelligent contract of the agent node 22, so that the intelligent contract of the agent node executes the original block data. Wherein the ordinary node 21 maintains an intelligent contract list that records a list of the respective agent nodes that 1 is capable of executing an intelligent contract. Each time the ordinary node 21 receives the original data of the block, the ordinary node 21 calls up the intelligent contract list, finds out the address of each proxy node from the intelligent contract list, and sends the original block data to each proxy node.
In this embodiment, the agent node 22 may pre-store multiple types of intelligent contracts, and may parse the execution type of the intelligent contract according to the trigger request sent by the common node 21. The agent node 22 executes the corresponding intelligent contract according to the execution type of the analyzed intelligent contract.
When a certain proxy node goes into fault, the other proxy nodes broadcast the address of the certain proxy node to the whole network, the common node 21 monitors the broadcast information and updates the intelligent contract list, and when the original data of the block is sent subsequently, the common node 21 does not send the data to the certain proxy node 22, so that the working efficiency is improved.
The code of the intelligent contract is written according to business scene logic, for example, in an unmanned store, the intelligent contract can be used for verifying anti-counterfeiting traceability information.
After executing the original block data according to the intelligent contract, the agent node 22 outputs the block data to be verified. Then, the proxy node 22 also signs the block data to be verified, and packages and sends the signed block data to the consensus node 23. The consensus node 23 verifies the signed block data using the public key of the proxy node 22, and if the verification is successful, the signed block data is considered to be sent by the valid proxy node 22, and then performs consensus processing on the block data. If the verification is not successful, the signed block data is considered to be sent by the illegal proxy node 22. For example, the proxy node 22 uses its private key to perform a signature operation on the hash content of the current block, and obtains the signature.
The consensus node 23 is used for consensus of the block data uploaded by the authentication proxy node 22. The consensus node 23 may support any one of the following consensus algorithms: proof of Work (PoW), Proof of rights of interest (POS), Proof of equity authorization (Delegate Proof of stamp, DPoS), Practical Byzantine Fault Tolerance (PBFT), authorized Byzantine Fault Tolerance (DBFT), and so forth.
Each of the consensus nodes 23 needs to register with the agent node 22, and after successful registration, the consensus node is a valid consensus node. The registration process is as follows:
1. the consensus node 23 submits the registration information to the proxy node 22.
Wherein the registration information includes one or more of the following: the device serial number SN, the user information and the miner wallet address of the consensus node 23.
2. The proxy node 22 checks the registration information.
The checking process comprises the following steps: it is checked whether the SN numbering format is correct, whether the SN is present in a database, whether the SN has been bound to other users, etc.
3. The proxy node 22 records the registration information.
4. The proxy node 22 returns the registration result to the consensus node 23.
5. The proxy node 22 broadcasts the new registration data to the blockchain system 200.
In the block chain system 200, the blocks are carriers for storing transaction summary information, each block includes a block header and a block body, and the information recorded in the block header is used to identify the block itself, the information summary of the previous block, and the position of the block in the whole account. The block body is used for storing the transaction summary information and verifying the transaction information and keeping the transaction from being tampered.
The block chain is formed by connecting each block one by one according to the sequence of the generation time. In the whole block chain, the first block is called a created block, the block height of the created block is 0, the block height of each subsequent block is sequentially added with 1, and the hash value of the previous block header is written in the block header. And all blocks on the block chain are linked by the last block head hash value on each block.
Therefore, the block chains have non-tamper-proof properties. Based on the above, the embodiment of the invention provides a commodity anti-counterfeiting tracing method based on a block chain, which is applied to an unmanned store.
Referring to fig. 3, fig. 3 is a schematic structural diagram of an unmanned shop according to an embodiment of the present invention. As shown in fig. 3, the unmanned shop 300 is provided with a checkout area 30 and a commodity area, the commodity area is used for placing commodities, the checkout area 30 is used for settling accounts for the commodities, the checkout area 30 is provided with a first outlet 31 and a second outlet 32, when the first outlet 31 is opened, the checkout area 30 is communicated with the commodity area, a user can enter the checkout area 30 from the commodity area, and when the second outlet 32 is opened, the user can walk from the checkout area 30 to the external environment of the unmanned shop 300 and leave the unmanned shop.
Optionally, the checkout area 30 is "Z" shaped, and the first and second outlets 31, 32 are each disposed in the "Z" shaped checkout area.
The unmanned shop 300 is also provided with an entrance for the user to enter the unmanned shop 300, and the entrance allows only the user to enter.
Referring to fig. 3 and 3a, the unmanned shop 300 further includes a sensor 33, a camera 34, a radio frequency read-write device 35, and a processor 36.
The sensor 33, the camera 34 and the rf read-write device 35 are respectively connected to the processor 36.
The sensor 33 is specifically configured to detect whether a sensing signal of a user exists in a preset area of the first outlet 31, and when a user exists in the preset area, the sensing signal is triggered to be generated. The predetermined area is specifically the area within the product area proximate the first outlet 31 through which a user may only enter the checkout area 30. Thus, when the presence of the user's sensing signal is detected within the predetermined area, this is an indication that the user wants to leave the unmanned store, and the current status is to enter the checkout area 30.
The camera 34 includes a plurality and is provided in the unmanned store 300, which is specifically provided in the checkout area 30, at the first exit 31, at the second exit 32, at the entrance of the unmanned store 300, and in the goods area, and the like. The camera 34 is used to capture user images and send the captured user images to the processor 36.
In some embodiments, camera 34 may track the motion trajectory of the same user. For example, after the user a enters the unmanned store and is photographed at the entrance of the unmanned store 300, the image of the user a is photographed by the camera 34 corresponding to the area according to the activity area of the user a in the unmanned store 300, the image acquisition of the user a is not finished until the user a leaves the unmanned store 300, and after all the images of the user a in the activity in the unmanned store are acquired, the motion trajectory of the user a can be analyzed according to the sequence of the image acquisition, so that the user a can be accurately identified according to the motion trajectory, and the category of the goods purchased by the user a can be analyzed.
The rf read-write device 35 is used to identify whether a good is present in the checkout area and also to read information of the good purchased by the user, including the price of the good, the name of the good, the category of the good, etc. The rf read/write device 35 sends the read commodity information to the processor 36. The radio frequency read-write device 35 may specifically be an RFID reader-writer.
The processor 36 is used for receiving the related information sent by the sensor 33, the camera 34 and the rf read-write device 35 and processing the related information. The processor 36 in this embodiment is specifically configured to handle automated checkout issues.
Specifically, when the sensor 33 detects that a sensing signal of the user exists in the preset area of the first outlet 31, the sensing signal is sent to the processor 36, at this time, the processor 36 controls the camera 34 to capture a first area image in the checkout area 30, and the camera 34 sends the captured first area image to the processor 36. The processor 36 is configured to determine whether a person is present in the checkout area 30 based on the first area image; if no person is present, controlling the door of the first outlet 31 to open, and controlling the camera 34 to acquire a second area image of the checkout area 30, and acquiring the second area image, thereby judging whether only one user is in the checkout area 30 according to the second area image; if only one user exists in the checkout area 30 and the radio frequency read-write equipment 35 detects that goods exist in the checkout area 30, controlling the door of the first outlet 31 to be closed, acquiring the facial features of the user, acquiring the account number of the user according to the facial features, and acquiring the information of the goods bought by the user and the price corresponding to the information through the radio frequency read-write equipment 35; deduct the corresponding amount from the user's account according to the price, and control the door of the second outlet 32 to open. Here, only when there is only one user and there is a commodity in the checkout area 30, the corresponding checkout operation is performed, and the current user is identified through face recognition at the time of checkout, so that the user can be accurately identified to ensure more accurate checkout.
Referring to fig. 4, the block chain-based commodity anti-counterfeiting tracing method S400 includes:
s41, receiving two-dimension code information of the commodity sent by the client, wherein the two-dimension code information is used for indicating to jump to an anti-counterfeiting tracing page, and the anti-counterfeiting tracing page records information of each link of the commodity;
and the user opens and logs in the shopping application program of the client, starts the camera of the client to scan the two-dimensional code information pasted on the commodity by using the shopping application program, and then the display screen of the client jumps to the anti-counterfeiting tracing information page corresponding to the anti-counterfeiting tracing website. Meanwhile, the client side also sends the two-dimension code information to the common node, the common node accesses the content server according to the anti-counterfeiting traceability website pointed by the two-dimension code information, and pulls the anti-counterfeiting traceability page from the content server, wherein the anti-counterfeiting traceability page records information of each link of the commodity. The anti-counterfeiting traceability information page comprises commodity traceability information of a plurality of links of purchasing commodities, such as the commodity traceability information of the links of raw material, production, storage, logistics information and the like.
S42, calculating hash values to be verified according to information of each link of the anti-counterfeiting tracing page, wherein each block link point stores a hash list recording real hash values of each commodity, and the hash list is verified by block chain consensus;
for example: in the anti-counterfeiting traceability page, link information of a raw material link A is X1, link information of a production link B is X2, link information of a storage link C is X3, and link information of a logistics link is X4, so that an ordinary node combines X1+ X2+ X3+ X4 to form combined information according to a preset sequence, a hash value of the combined information is calculated, and the calculated hash value is used as a hash value to be verified.
As previously described, the hash list is pre-constructed and verified with consensus. When the hash list is verified, the following processes are included:
first, the common node obtains link information uploaded by a provider corresponding to each link in each commodity, for example, the provider uploads the link information using a provider terminal, and the provider terminal sends the link information to the common node.
In some embodiments, in the process of acquiring link information uploaded by a provider corresponding to each link in each commodity, the common node receives an information request sent by a client of the provider, the information request carries a first certificate and link information, and the block link point stores a second certificate. Secondly, the common node judges whether the second certificate unlocks the first certificate or not according to the information request; if yes, receiving link information; if not, link information is not received.
In this way, it can be ensured that the link information uploaded by the receiving provider is legal.
Secondly, the common node sends each link information uploaded by each supplier to the agent node, the agent node performs hash operation on all link information of each commodity to calculate the real hash value of the commodity, and the real hash values corresponding to each commodity are clustered to form a hash list.
In the process that the agent node performs hash operation on all link information of each commodity and calculates the real hash value of the commodity, firstly, the agent node counts the link uploading times of each commodity, for example, an anti-counterfeiting traceability page of the commodity A comprises 5 links, a supplier is required to upload link information of 5 different links, and when the supplier uploads the link information of one link, the agent node accumulates the link uploading times of the commodity. Secondly, when detecting that the counted link uploading times of each commodity are equal to the preset link time threshold, the agent node performs hash operation on all link information of each commodity to calculate the real hash value of the commodity, for example, as mentioned above, when the link uploading times of the commodity are equal to 5, the agent node performs hash operation on all link information of each commodity to calculate the real hash value of the commodity. And thirdly, when the agent node does not detect that the counted link uploading times of each commodity are smaller than the preset link uploading times threshold value, continuing to monitor and count the link uploading times of each commodity.
For example, for commodity K: the link information of the raw material link is Y1, the link information of the production link is Y2, the link information of the storage link is Y3, and the link information of the logistics link is Y4, so that the common node combines Y1+ Y2+ Y3+ Y4 together according to a preset sequence to form combined information, the hash value of the combined information is calculated, and the calculated hash value is used as the true hash value H1 of the commodity K.
For the commodity L: the link information of the raw material link is Z1, the link information of the production link is Z2, the link information of the storage link is Z3, and the link information of the logistics link is Z4, so that the common node combines Z1+ Z2+ Z3+ Z4 to form combined information according to a preset sequence, calculates the hash value of the combined information, and uses the calculated hash value as the true hash value H2 of the commodity L.
Then, the agent node clusters the true hash value H1 of commodity K with the true hash value H2 of commodity L to form a hash list.
And thirdly, the agent node sends the hash list to the consensus node, so that the consensus node can be used for consensus verification of the hash list.
In some embodiments, when the agent node sends the hash list to the consensus node, the agent node performs a signature operation on the hash list by using its own private key to obtain a block signature, wherein a public key corresponding to the private key is broadcasted to the blockchain system. And secondly, the agent node packages the block signature and the hash list and sends new block data to the common identification node, when the common identification node verifies the new block data, the common identification node verifies the block signature by using a legal public key of the agent node, and if the block signature is legal, the agent node considers that the new block data is sent by the legal agent node. If the block signature is illegal, the new block data is considered to be sent by the illegal proxy node, so that the safety of the block chain data can be improved by adopting the mode.
When the consensus nodes verify that the new block data is sent by the legal agent node, the consensus nodes verify the new block data by adopting a Proof of equity (POS) algorithm or a Delegated Proof of equity (DPOS) algorithm. And after the new block data is verified, the common identification node completes other block information, wherein the other block information comprises a block signature, a time stamp and the like, packs the new block data and broadcasts the whole network.
In some embodiments, the commodity anti-counterfeiting tracing method based on the block chain is applied to a alliance chain, and when a stock authorization certification algorithm is adopted as a consensus mechanism, the stock proportion of the stock authorization certification algorithm is distributed according to the scale of unmanned stores of various operators. For example, each blockchain node of the federation chain is a server erected by each operator of an unmanned store, the size of the unmanned store including the total area of the unmanned store or the number of registered users, and the like. The unmanned stores of the operator A are the largest in scale, the percentage is 10%, the operator B is 6%, and the operator C is 3%. The.
Some common identification nodes are in failure or wrongness (do not sign and verify new blockchain data), and in order to ensure that the blockchain system can normally go out of blocks, other common identification nodes can do view updating to stop the common identification right of the failure or wrongness common identification nodes. Therefore, in some embodiments, in the process of consensus verification of new blockchain data by consensus nodes, when it is detected that the number of times of consensus verification failures is greater than a preset threshold, a consensus server group formed by the consensus nodes determines a malicious consensus node, where the malicious consensus node is a node that does not sign and verify the new blockchain data and causes the maximum number of times of consensus verification failures. The consensus server group consisting of the consensus nodes prohibits the malicious consensus nodes from participating in consensus verification, shares are redistributed to the rest consensus nodes, and new block chain data are subjected to consensus verification, for example, the consensus node A with the percentage of 10% is bad, so that the consensus server group stops the voting right of the consensus node A firstly, and then distributes the percentage of 10% of the consensus node A to the rest consensus nodes according to a preset rule, for example, the consensus nodes are distributed to the rest consensus nodes uniformly, or the consensus nodes are distributed to the rest nodes according to the working ages of the consensus nodes, and the distribution percentage is lower as the working ages are longer and the distribution percentage is higher and the working ages are shorter.
And thirdly, when the number of times of the failure of the consensus verification is detected to be less than the preset threshold value, the consensus server group continues to perform the consensus verification on the new block chain data.
In this way, it is ensured that the block chain system can smoothly go out of blocks.
S43, traversing the hash list to see whether a real hash value corresponding to the hash value to be verified exists;
s44, if yes, returning commodity verification success information to the client;
and S45, if not, returning commodity authentication failure information to the client.
In conclusion, the blockchain has the characteristics of non-falsification, decentralization and high transparence, so that reliable anti-counterfeiting traceability information can be provided.
It should be noted that, in the foregoing embodiments, a certain order does not necessarily exist between the foregoing steps, and it can be understood by those skilled in the art from the description of the embodiments of the present invention that, in different embodiments, the foregoing steps may have different execution orders, that is, may be executed in parallel, may also be executed in an exchange manner, and the like.
As another aspect of the embodiments of the present invention, an embodiment of the present invention provides a commodity anti-counterfeiting tracing device based on a block chain. The commodity anti-counterfeiting tracing device based on the block chain can be used as one of the software functional units, and comprises a plurality of instructions which are stored in the memory, wherein the processor can access the memory and call the instructions to execute so as to complete the commodity anti-counterfeiting tracing method based on the block chain.
Referring to fig. 5, the block chain-based product anti-counterfeiting tracing apparatus 500 includes: a receiving module 51, a calculating module 52, a traversing module 53, a first returning module 54 and a second returning module 55.
The receiving module 51 is configured to receive two-dimensional code information of a commodity sent by a client, where the two-dimensional code information is used to instruct to jump to an anti-counterfeiting traceability page, and the anti-counterfeiting traceability page records information of each link of the commodity;
the calculation module 52 is configured to calculate a hash value to be verified according to information of each link of the anti-fake traceability page, where each block link point stores a hash list recording a real hash value of each commodity, and the hash list is verified by the block chain;
the traversal module 53 is configured to traverse the hash list to determine whether a real hash value corresponding to the hash value to be verified exists;
the first returning module 54 is configured to, if yes, return a commodity verification success message to the client;
the second returning module 55 is configured to, if not, return the commodity authentication failure information to the client.
In conclusion, the blockchain has the characteristics of non-falsification, decentralization and high transparence, so that reliable anti-counterfeiting traceability information can be provided.
In some embodiments, the calculation module 52 is specifically configured to: acquiring link information uploaded by a supplier corresponding to each link in each commodity; performing Hash operation on all link information of each commodity, calculating the real Hash value of each commodity, and clustering the real Hash value corresponding to each commodity to form a Hash list; and identifying and verifying the hash list.
In some embodiments, the calculation module 52 is further specifically configured to: receiving an information request sent by the client, wherein the information request carries a first certificate and link information, and a second certificate is stored in the block chain node; judging whether the second certificate unlocks the first certificate or not according to the information request; if yes, receiving the link information; and if not, not receiving the link information.
In some embodiments, the calculation module 52 is further specifically configured to: counting the uploading times of each commodity link; when the counted link uploading times of each commodity are detected to be equal to a preset link time threshold, performing Hash operation on all link information of each commodity, and calculating a real Hash value of the commodity; and when the statistical link uploading times of each commodity are not detected to be smaller than a preset link uploading time threshold, continuing to monitor and count the link uploading times of each commodity.
It should be noted that the block chain-based commodity anti-counterfeiting tracing device can execute the block chain-based commodity anti-counterfeiting tracing method provided by the embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method. Technical details which are not described in detail in the embodiment of the block chain-based commodity anti-counterfeiting traceability device can be referred to the block chain-based commodity anti-counterfeiting traceability method provided by the embodiment of the invention.
As another aspect of the embodiments of the present invention, the embodiments of the present invention provide a block link point. Referring to fig. 6, the block link point 600 includes: one or more processors 61 and memory 62. In fig. 6, one processor 61 is taken as an example.
The processor 61 and the memory 62 may be connected by a bus or other means, such as the bus connection in fig. 6.
The memory 62 is used as a non-volatile computer-readable storage medium, and can be used to store a non-volatile software program, a non-volatile computer-executable program, and modules, such as program instructions/modules corresponding to the block chain-based merchandise anti-counterfeiting tracing method in the embodiment of the present invention. The processor 61 executes the above commodity anti-counterfeiting tracing method based on the blockchain according to each embodiment, or various functional applications and data processing of the commodity anti-counterfeiting tracing apparatus based on the blockchain according to each embodiment by running the nonvolatile software program, the instructions and the modules stored in the memory 62.
The memory 62 may include high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, the memory 62 may optionally include memory located remotely from the processor 61, and these remote memories may be connected to the processor 61 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The program instructions/modules are stored in the memory 62, and when executed by the one or more processors 61, the method for tracing anti-counterfeiting of goods based on blockchain in any of the above-mentioned embodiments of the method is executed, for example, so as to execute the method for tracing anti-counterfeiting of goods based on blockchain in each of the above-mentioned embodiments, or various functional applications and data processing of the device for tracing anti-counterfeiting of goods based on blockchain in each of the above-mentioned embodiments.
The embodiment of the invention also provides a non-transitory computer-readable storage medium, which stores computer-executable instructions for causing block chain link points to execute the commodity anti-counterfeiting tracing method based on the block chain as described in any one of the above.
The embodiment of the invention provides a computer program product, which comprises a computer program stored on a nonvolatile computer readable storage medium, wherein the computer program comprises program instructions, and when the program instructions are executed by block chain nodes, the block chain nodes are enabled to execute any one of the commodity anti-counterfeiting tracing methods based on the block chain.
The above-described embodiments of the apparatus or device are merely illustrative, wherein the unit modules described as separate parts may or may not be physically separate, and the parts displayed as module units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network module units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a general hardware platform, and certainly can also be implemented by hardware. Based on such understanding, the above technical solutions substantially or contributing to the related art may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; within the idea of the invention, also technical features in the above embodiments or in different embodiments may be combined, steps may be implemented in any order, and there are many other variations of the different aspects of the invention as described above, which are not provided in detail for the sake of brevity; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.
Claims (9)
1. A commodity anti-counterfeiting tracing method based on a block chain is characterized by comprising the following steps:
receiving two-dimension code information of a commodity sent by a client, wherein the two-dimension code information is used for indicating to jump to an anti-counterfeiting tracing page, and the anti-counterfeiting tracing page records information of each link of the commodity;
calculating a hash value to be verified after combination according to the information of each link of the anti-counterfeiting tracing page, wherein a hash list recording the real hash value of each commodity is stored in each block chain link point, and the hash list is verified by the block chain consensus;
traversing the hash list to determine whether a real hash value corresponding to the hash value to be verified exists;
if yes, commodity verification success information is returned to the client;
if not, returning commodity verification failure information to the client;
acquiring link information uploaded by a supplier corresponding to each link in each commodity to a corresponding block chain common node;
calculating according to the link information to obtain original block data and uploading the original block data to each agent node of the block chain;
calculating according to the original block data combination uploaded in each link to obtain block data to be verified;
and calculating the real hash values of the commodities according to the information of the block to be verified, clustering the real hash values corresponding to each commodity to form a hash list, and sending the hash list to a consensus node for consensus verification.
2. The method according to claim 1, wherein the obtaining of the link information uploaded by the supplier corresponding to each link in each commodity comprises:
receiving an information request sent by a client of a provider, wherein the information request carries a first certificate and link information, and a second certificate is stored in a block chain node;
judging whether the second certificate unlocks the first certificate or not according to the information request;
if yes, receiving the link information;
and if not, not receiving the link information.
3. The method as claimed in claim 1, wherein calculating the true hash value of the commodity according to the information of the block to be verified comprises:
counting the uploading times of each commodity link;
when the counted link uploading times of each commodity are detected to be equal to a preset link time threshold, performing Hash operation on all link information of each commodity, and calculating a real Hash value of the commodity;
and when the counted link uploading times of each commodity are detected to be smaller than a preset link uploading time threshold, continuing monitoring and counting the link uploading times of each commodity.
4. The method according to any one of claims 1 to 3, wherein the consensus algorithm for consensus verification employs a share proof of authority algorithm.
5. The utility model provides a commodity anti-fake device of tracing to source based on blockchain which characterized in that, the device includes:
the system comprises a receiving module, a display module and a display module, wherein the receiving module is used for receiving two-dimension code information of a commodity sent by a client, the two-dimension code information is used for indicating to jump to an anti-counterfeiting tracing page, and the anti-counterfeiting tracing page records information of each link of the commodity;
the calculation module is used for calculating a hash value to be verified according to information of each link of the anti-counterfeiting traceability page, a hash list recording a real hash value of each commodity is stored in each block link point, and the hash list is verified by the block chain;
the traversal module is used for traversing the hash list to determine whether a real hash value corresponding to the hash value to be verified exists;
the first returning module is used for returning successful commodity verification information to the client if the commodity verification information is successful;
the second returning module is used for returning commodity verification failure information to the client if the client does not receive the commodity verification failure information;
the block chain node module is used for acquiring link information uploaded by a supplier corresponding to each link in each commodity to a corresponding block chain common node, calculating original block data according to the link information, uploading the original block data to each proxy node of the block chain, calculating block data to be verified according to the original block data uploaded by each link in a combined mode, calculating real hash values of the commodities according to the block information to be verified, clustering the real hash values corresponding to each commodity to form a hash list, and sending the hash list to a common identification node for common identification verification.
6. The apparatus of claim 5, wherein the computing module is specifically configured to:
acquiring link information uploaded by a supplier corresponding to each link in each commodity;
performing Hash operation on all link information of each commodity, calculating the real Hash value of each commodity, and clustering the real Hash value corresponding to each commodity to form a Hash list;
and identifying and verifying the hash list.
7. The apparatus of claim 6, wherein the computing module is further specifically configured to:
receiving an information request sent by a client of a provider, wherein the information request carries a first certificate and link information, and a second certificate is stored in a block chain node;
judging whether the second certificate unlocks the first certificate or not according to the information request;
if yes, receiving the link information;
and if not, not receiving the link information.
8. The apparatus of claim 6, wherein the computing module is further specifically configured to:
counting the uploading times of each commodity link;
when the counted link uploading times of each commodity are detected to be equal to a preset link time threshold, performing Hash operation on all link information of each commodity, and calculating a real Hash value of the commodity;
and when the counted link uploading times of each commodity are detected to be smaller than a preset link uploading time threshold, continuing monitoring and counting the link uploading times of each commodity.
9. A block link point, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, the instructions being executable by the at least one processor to enable the at least one processor to perform the blockchain-based merchandise anti-counterfeiting traceability method according to any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811032827.5A CN109034851B (en) | 2018-09-05 | 2018-09-05 | Commodity anti-counterfeiting tracing method and device based on block chain and block chain link points |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811032827.5A CN109034851B (en) | 2018-09-05 | 2018-09-05 | Commodity anti-counterfeiting tracing method and device based on block chain and block chain link points |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109034851A CN109034851A (en) | 2018-12-18 |
CN109034851B true CN109034851B (en) | 2022-03-08 |
Family
ID=64623622
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811032827.5A Active CN109034851B (en) | 2018-09-05 | 2018-09-05 | Commodity anti-counterfeiting tracing method and device based on block chain and block chain link points |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109034851B (en) |
Families Citing this family (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110009369A (en) * | 2018-12-20 | 2019-07-12 | 阿里巴巴集团控股有限公司 | Vessel examination method and device, electronic equipment |
CN111369261A (en) * | 2018-12-24 | 2020-07-03 | 阿里巴巴集团控股有限公司 | Product tracing method and system and product tracing information processing method |
CN109903455B (en) * | 2019-01-09 | 2021-04-13 | 盈奇科技(深圳)有限公司 | Two-dimensional code anti-damage device for vending machine |
CN109871930B (en) * | 2019-02-22 | 2022-05-06 | 山东浪潮质量链科技有限公司 | Method and device for issuing quality codes and verifying quality codes by block chain |
JP6783495B1 (en) * | 2019-02-25 | 2020-11-11 | 株式会社イシダ | Inspection device, inspection result management system, inspection result storage method and inspection result management method |
CN109918874B (en) * | 2019-03-14 | 2022-09-02 | 度小满科技(北京)有限公司 | Physical information storage method and device and physical information searching method and device |
CN110046914A (en) * | 2019-03-14 | 2019-07-23 | 海南鑫镁科技有限公司 | A kind of block chain retroactive method towards food and drug safety supervision |
CN110084480A (en) * | 2019-03-29 | 2019-08-02 | 南京星链高科技发展有限公司 | A kind of agricultural product source tracing method based on block chain |
CN109978571B (en) * | 2019-04-01 | 2024-01-19 | 众安信息技术服务有限公司 | Block chain-based tracing method and tracing device |
CN109977635B (en) * | 2019-04-03 | 2024-02-27 | 上海中商网络股份有限公司 | Method, device, equipment and medium for processing traceable data based on block chain |
CN110175855A (en) * | 2019-05-06 | 2019-08-27 | 江苏链路区块链技术有限公司 | A kind of two-dimension code anti-counterfeit based on block chain is traced to the source implementation method |
US10944549B2 (en) | 2019-06-20 | 2021-03-09 | Advanced New Technologies Co., Ltd. | Blockchain-type data storage |
CN110347679B (en) * | 2019-06-20 | 2020-08-04 | 阿里巴巴集团控股有限公司 | Data storage method, device and equipment based on receipt |
CN112182831B (en) * | 2019-08-16 | 2021-08-17 | 北京天德科技有限公司 | Intelligent casting and looking industry test and evaluation sandbox |
CN110543787A (en) * | 2019-09-05 | 2019-12-06 | 佛山市顺德区平行互联网信息科技有限公司 | Storage and acquisition method, storage system and acquisition device for commodity traceability data |
CN111080311B (en) * | 2019-10-24 | 2024-04-26 | 广州运通链达金服科技有限公司 | Commodity tracing method and device based on blockchain |
CN110826087B (en) * | 2019-11-01 | 2023-07-25 | 腾讯科技(深圳)有限公司 | Decoration material management method, device, terminal and medium based on block chain |
CN111182488B (en) * | 2019-12-05 | 2022-09-16 | 诺得物流股份有限公司 | Traceability data energy-saving transmission method based on time channel |
CN111163064B (en) * | 2019-12-13 | 2022-05-27 | 厦门市美亚柏科信息股份有限公司 | Block chain-based internet information tracing method and computer-readable storage medium |
CN111160931A (en) * | 2019-12-31 | 2020-05-15 | 深圳四方精创资讯股份有限公司 | Wine information tracing method, device, equipment and storage medium based on block chain |
CN111368953A (en) * | 2020-03-10 | 2020-07-03 | 大仝智能科技有限公司 | Product anti-counterfeiting traceability system and method |
CN111464537A (en) * | 2020-03-31 | 2020-07-28 | 湖南工程学院 | Commodity tracing method based on block chain, commodity tracing system and storage medium |
CN111160997A (en) * | 2020-04-02 | 2020-05-15 | 支付宝(杭州)信息技术有限公司 | Advertisement supervision method and device based on block chain and advertisement delivery system |
CN111553450B (en) * | 2020-04-27 | 2023-04-18 | 中国银行股份有限公司 | Two-dimensional code generation and verification method and device |
CN111343208B (en) * | 2020-05-21 | 2020-08-14 | 腾讯科技(深圳)有限公司 | Block chain-based data detection method and device and computer-readable storage medium |
CN112015757B (en) * | 2020-08-07 | 2024-03-22 | 南京数科安金信息技术有限公司 | Crown word number circulation system based on block chain technology |
CN111967609B (en) * | 2020-08-14 | 2021-08-06 | 深圳前海微众银行股份有限公司 | Model parameter verification method, device and readable storage medium |
CN111951031B (en) * | 2020-08-25 | 2023-10-20 | 烟台科思汇标识技术有限公司 | Product code spraying anti-counterfeiting method and system based on code spraying machine |
CN112529499A (en) * | 2020-12-09 | 2021-03-19 | 杭州趣链科技有限公司 | Aviation cargo traceability method and device based on block chain and related equipment |
CN112633813B (en) * | 2020-12-31 | 2023-12-01 | 浙江万里学院 | Precious commodity distribution management method based on blockchain technology |
CN113329015B (en) * | 2021-05-28 | 2022-08-16 | 中邮信息科技(北京)有限公司 | Method, device, medium and electronic equipment for proxy of nodes of block chain |
CN113688423A (en) * | 2021-08-27 | 2021-11-23 | 南华大学 | Data management method, system and equipment of mobile vaccination vehicle |
CN114781850B (en) * | 2022-04-15 | 2022-12-16 | 广西师范大学 | Blockchain-based decentralized safe tourism method, system and storage medium |
CN114723465B (en) * | 2022-06-08 | 2022-09-09 | 深圳市易初推因科技有限公司 | Method, device and storage medium for anti-counterfeiting right confirmation of commodities |
CN115829597B (en) * | 2023-02-21 | 2023-08-08 | 中国标准化研究院 | On-chain method of food traceability information and food traceability system |
CN116071090B (en) * | 2023-03-06 | 2023-07-04 | 安徽深迪科技有限公司 | Product production information traceability system based on block chain |
CN116525077B (en) * | 2023-06-29 | 2023-09-08 | 安翰科技(武汉)股份有限公司 | Processing method and system for artificial intelligent medical instrument test data |
CN117853125B (en) * | 2023-09-06 | 2025-01-10 | 南通汉迪自动化设备有限公司 | Material import and export clearance networking supervisory systems |
CN117254975A (en) * | 2023-11-14 | 2023-12-19 | 深圳市嘉合劲威电子科技有限公司 | Block chain-based data anti-counterfeiting method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7064668B2 (en) * | 2004-10-25 | 2006-06-20 | The Boeing Company | Reducing electromagnetic interference in radio frequency identification applications |
CN107103480A (en) * | 2017-05-18 | 2017-08-29 | 电子科技大学 | Supply chain management method based on block chain with sovereign right |
CN107220836A (en) * | 2017-05-31 | 2017-09-29 | 无锡井通网络科技有限公司 | A kind of block chain logistics based on Quick Response Code is traced to the source tracking method for anti-counterfeit |
CN108256875A (en) * | 2018-04-09 | 2018-07-06 | 王先笨 | A kind of safe traceability system based on product supply chain |
CN108416590A (en) * | 2018-04-08 | 2018-08-17 | 程昔恩 | A kind of block chain technical certification method based on topography |
-
2018
- 2018-09-05 CN CN201811032827.5A patent/CN109034851B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7064668B2 (en) * | 2004-10-25 | 2006-06-20 | The Boeing Company | Reducing electromagnetic interference in radio frequency identification applications |
CN107103480A (en) * | 2017-05-18 | 2017-08-29 | 电子科技大学 | Supply chain management method based on block chain with sovereign right |
CN107220836A (en) * | 2017-05-31 | 2017-09-29 | 无锡井通网络科技有限公司 | A kind of block chain logistics based on Quick Response Code is traced to the source tracking method for anti-counterfeit |
CN108416590A (en) * | 2018-04-08 | 2018-08-17 | 程昔恩 | A kind of block chain technical certification method based on topography |
CN108256875A (en) * | 2018-04-09 | 2018-07-06 | 王先笨 | A kind of safe traceability system based on product supply chain |
Also Published As
Publication number | Publication date |
---|---|
CN109034851A (en) | 2018-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109034851B (en) | Commodity anti-counterfeiting tracing method and device based on block chain and block chain link points | |
CN111476559B (en) | Merchant authentication method and device, computer equipment and storage medium | |
CN109146645A (en) | Method of Commodity Recommendation, block chain node and system based on block chain | |
CN110322327A (en) | A kind of laboratory personnel shopping recommended method and device based on block chain technology | |
CN110889710B (en) | Device information management method, server, and storage medium | |
CN111899016B (en) | Quality data processing method and device based on block chain | |
CN109146573A (en) | Commodity integration method and its device, block chain node based on block chain | |
CN109146499A (en) | User credit method of adjustment and its device, block chain node based on block chain | |
CN104995656A (en) | Unauthorized product detection techniques | |
CN109347789A (en) | The sharing method and medium of server, fraud customer information based on block chain | |
CN112132676B (en) | Method and device for determining contribution degree of joint training target model and terminal equipment | |
CN111429057A (en) | Digital warehouse bill management method and device | |
CN111260399B (en) | Advertisement data processing method and device based on block chain network and electronic equipment | |
CN109272383A (en) | Merchandise news generation method, block chain node and its system based on block chain | |
CN109102358A (en) | A kind of Information Authentication method, server and storage medium | |
CN109767315A (en) | Business reference confirmation method, device, equipment and storage medium based on block chain | |
CN107392614B (en) | Method and device for realizing offline transaction | |
CN111008852A (en) | Artwork anti-counterfeiting identification method, server, terminal and storage medium | |
CN110838067A (en) | Real estate transaction data processing method, device, server and storage medium | |
CN110738783A (en) | System, method, device, equipment and readable storage medium for updating voting data | |
CN111476617B (en) | Data processing method, data processing device, computer equipment and medium | |
CN110147390A (en) | A kind of ballot statistical method, device, storage medium and server | |
CN110941840B (en) | Data processing method, system and terminal | |
CN110598459B (en) | Block chain-based data storage card management method and device | |
CN107633458A (en) | A kind of processing method, storage medium and the server of contract investigation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |