Specific embodiment
Technical solution of the present invention is further described in detail with reference to the accompanying drawings and specific embodiments of the specification.
As shown in Figure 1, the present embodiment provides a kind of information processing methods of block chain, comprising:
Step S110: the predetermined information on the physical support that product carries is obtained;
Step S120: access request is broadcasted to block chain network;
Step S130: it receives and contract information corresponding with the contract address is returned to based on the access request.
The information processing method of block chain provided in this embodiment can be used for the various electronic equipments for being equipped with clientIn, the electronic equipment can be include: electronic equipment that mobile phone, tablet computer, wearable device or user are held.
The electronic equipment can read and carry predetermined information on the physical support of product carrying, which can be withDirectly it is contract address, is also possible to identify the address mark of contract address.
The product can be various articles, for example, the various products that can be circulated on the market, wine, cigarette, cosmetics, mainframeThe various valuables such as tool equipment.The physical support for carrying the contract address is provided in these equipment.The physics carriesBody can be the communication device with communication function, the communication device can include: near-field communication (Near CommunicationField, NFC), in this way, the electronic equipments such as mobile phone can read out the product stored in the NFC by the communication with NFCThe information such as contract address or address mark.
Contract address herein is used to indicate storage location of the contract information in block chain, for example, the conjunction of instruction productThe information of block about in block chain corresponding to information.
In some embodiments, the physical support, which may also include that, is pasted on the product or is etched in the productionProduct surface carries the label or etching text and/or pattern etc. of the contract address.
For example, the contract address is converted into surface or the etching that two dimensional code or bar code etc. are pasted onto the productOn the surface of the product, in this way, the client installed in mobile phone (is applied (Application, APP), Software Development Tools(Software Development Kit, SDK) or plug-in unit), it can identify that the addresses such as the two dimensional code or bar code identify.
In some embodiments, client can directly decode the Contract IDs such as two dimensional code or bar code and obtain the conjunctionAbout address.
In further embodiments, the addresses such as two dimensional code or bar code mark can be the map information of contract address, instituteStating client can be obtained identifying with addresses such as the two dimensional code or bar codes and be reflected by the information exchange with reservations databaseThe contract address penetrated.
In further embodiments, client is read or the modes such as scanning obtain the address mark;Based on the addressIt identifies client itself and does not obtain contract address further.
Client can send the access request using broadcast mode in the step s 120, which can carryState the predetermined informations such as contract address or address mark.In this way, the block chain node of block chain network receives the access requestLater, the contract address of client offer or the mapping relations according to address mark and contract address can be directly provided,Obtain the contract address.In this way, block chain network is known that the contract that active client needs to read is believed according to contract addressCease storage location in block chain, can find block chain correspondence block extract client needed for contract information.
In this way, client can receive contract information corresponding with the contract address in step s 130.
In the present embodiment, the contract information can be the description information of the various description product different aspect attributes.The description information can be convenient the information that user further appreciates that the product.
For example, the description information can include: the product information of the product.The product information can include: the productionProduction raw material, the source area of the product, the shelf-life of the product, the date of manufacture of the product, production line of product etc. are eachThe direct description information that kind product is directly linked.
In another example the description information may also include that the intermediate description information of the producer or supplier that describe the product.For example, the properties of product that different manufacturing factories produces are that have bigger difference.In some embodiments, manufacturing factoryThe information of itself producer may be recorded in contract information.For example, this describes the intermediate description information of producer can include: producerThe recommended information of production strength, the establishment of producer, producers' historical event information, the size values of producer such as development etc..
Optionally, the contract information may also include that circulation information, which indicates the product from producingTo coming into the market and the information for holding the process of circulation in user hand of most Zhongdao client.For example, the circulation information can be rememberedThe information that product enters eventually into the dealer passed through before terminal consumption market is recorded.If record has stream communication in contract informationBreath, facilitates user to judge whether product has a possibility that counterfeit fraud according to the circulation information.In short, the circulation information canInformation is changed hands from a side to another party to have recorded the right of attribution of product.
In short, the contract information can include: various description informations directly related with product or indirect correlation, specificallyClassification, includes at least: describing the product information of product and describes one or more of the circulation information of products in circulation process.
Optionally, the step S110 can include: the communication tags of marching into the arena carried from the product are with reading the contractLocation.
Further, as shown in Fig. 2, the method also includes:
Step S140: the first prompt that the block chain network returns is received.
Step S150: output first prompt.
First prompt may be to return when meeting preset condition.For example, the access information of the contract informationIt is returned when meeting the first preset condition;And/or the contract information flag information meet the second preset condition when return's.
First prompt can be that the prompt product is the prompt of counterfeit low-quality goods, in this way, can achieve timely announcementKnow that the product that user currently buys or receives is counterfeit and shoddy goods.
In some embodiments, the method also includes:
The contract information is exported, so user is facilitated to read, to facilitate user according to contract information to the productWhether be counterfeit low-quality goods judgement.
First prompt can also be voice output, in short, user can obtain after the first prompt of client outputThe first prompt is obtained, so that it is determined that whether the product currently taken is counterfeit and shoddy goods, to realize the verifying to product.
In further embodiments, the method also includes:
Scan the record information that the product surface is recorded;
Match the contract information and the record information;
According to matched as a result, exporting the anti-fake result of the product.
In some cases, the surface of the product is also accompanied with record information, which is equally and product phaseThe product information of pass.In this way, user can obtain record information by the modes such as camera scanning, scanning, then match from areaThe received contract information of block chain network and record information may produce if contract information and record information are unsatisfactory for matching conditionProduct are counterfeit products, and such client can export corresponding prompt according to matched result.For example, originally should with someIt originates from for overseas famous-brand clock, is identified in the place of production in its promising overseas somewhere of dial plate behind seal cutting, but from contract informationRecord is that the table originates from some domestic province, in this way, there have been contract informations and the record conflicting phenomenon of information, then thisWhen be believed that contract information and record information are unsatisfactory for matching condition, the second prompt of output can are as follows: prompt product is that personation producesThe prompt of product.
The contract information and the record unmatched situation of information may include at least one of:
Contract information and record information indicate the record conflict of the same attribute of the product;
Contract information and record information indicate that the record of the product different attribute shows: contract information and record information are hiddenAt least one attribute of the product containing instruction can conflict.
If the contract information and record information matches, the second prompt can are as follows: indicates legal legal prompt;
If contract information and record information mismatch, the second prompt can are as follows: indicates illegal illegal prompt.It is described illegalPrompting for instruction product can be illegal product, and illegal product usually may be exactly counterfeit and shoddy goods.
In some embodiments, the method also includes:
Receive the modification prompt that the block chain network is sent;
It is modified and is responded to the block chain network based on modification prompt, wherein the modification response is used to indicate instituteState block chain node modifies the first flag information of the contract information and/or the block record where the contract information theTwo flag informations.
For example, consumer utilizes the electricity such as the mobile phone of oneself after some commodity are once being bought by consumer and being removed packagingSub- equipment is verified, at this point, block chain node can be recorded by block in block code execution, to the clientSend modification prompt.Modification prompt is for prompting the user whether the effective field of modification block record or contract information.ExampleSuch as, user thinks that I has had purchased the product and have used the product, in order to avoid subsequent someone utilizes the bottle of the productOr packaging is faked, and after receiving modification prompt, indicates the effective word that block chain node records contract information or blockSection is modified, so that the field contents of the first flag information or the second flag information are effectively revised as in vain from record.If notMethod user usurps the bottle of the product or when outer packing is faked, since legitimate user has been led to before abandoning the outer packingIt crosses modification response instruction contract information or block record is invalid, in this way, block chain node receives the visit of the contract address againWhen asking request, the first prompt can be sent to corresponding client, in this way, be equivalent to its current purchase of highspeed user is that personation is pseudo-Bad product.
Optionally, the method also includes:
Receive the prompt for the access failure that the block chain network is sent, wherein the prompt of the access failure are as follows: describedBlock chain network is based on the contract address and does not inquire corresponding contract information, alternatively, inquiring invalid contract informationWhen send.
In some cases, if product is counterfeit and shoddy goods, contract address or address mark that client is readIt may equally be the contract address forged or address mark.In this way, the contract address carried in access request or address labelKnowledge is personation, in this way, contract information can not be accessed after block chain node receives the access request, at this point, areaBlock chain node may backward reference failure prompt, inform that user's current production is that counterfeit and shoddy goods mentioning to reachShow.In other implementations, the contract record where the contract information requested access to is designated as nothing by the second flag informationEffect, although block chain node is potentially based on the execution of block code, equally to visitor at this point, successful access is to contract informationThe prompt of family end backward reference failure informs that user's current production may be the outer packing for having used qualified products to reachLow-quality goods.
In some embodiments, the circulation information can include:
The nodal information for two circulation nodes that product passes through each time.For example, product is changed hands from seller A to buyer B;StreamCan record in communication breath has the information of seller A and the information of buyer B, in this way, will form the circulation chain of products in circulation;If circulationOccur in chain: n-th transaction are as follows: from the information and buyer B of seller A;And (n+1)th transaction is from seller C to buyer D;ThenThere is the discontinuous problem of circulation node in circulation chain, at this time it is believed that current production is because of the endless of its circulation informationEntirely, the problem of being counterfeit and shoddy goods is had.Therefore in some embodiments, the method also includes: clients to parse the streamCommunication breath, if the problem of circulation node is discontinuous etc. to meet third preset condition occurs in the circulation information, client is exportable4th prompt, the 4th prompt can promote the product may non-counterfeit and shoddy goods.4th prompt can be instruction circulationWhich prompt specifically there is in information, for example, prompt circulation node is discontinuous.
In some embodiments, the circulation information may also include that product exchange hour and/or transaction in the circulation processThe information such as place, to facilitate user to obtain entire circulation information.
As shown in figure 3, the present embodiment provides a kind of information processing methods of block chain, comprising:
Step S210: the access request that client is sent is received, wherein the access request carries the conjunction of access productAbout the address of the contract address of information or the contract address identifies;
Step S220: according to the contract address, the contract information that block chain reads out the product is accessed;
Step S230: the contract information is transferred to the client.
The information processing method of block chain provided in this embodiment can be applied to any block chain of various block chain networksIn node.
In the present embodiment, the step S210 can include: block chain node receives the access request that client is sent, shouldAccess request can carry the address mark of contract address or contract address, and the information that access request carries herein is aforementioned implementationPredetermined information in example.
In this way, block chain node is determined currently to need which of which block chain and the block chain based on predetermined informationThe requested contract information of reading client on one block.
Therefore in the present embodiment, block chain directly can be accessed according to contract address, can also first identified the addressContract address is converted to, the contract address access block chain after being then based on conversion, to obtain the contract information.
Contract information herein can include: the description information of the various description products.
For example, in some embodiments, the contract information can include: the product information and/or stream communication of the productBreath.
It after the contract information returns to client, is exported for client, for example, client can show output instituteContract information is stated, user is facilitated to carry out the fake certification of product based on the contract information for returning to display.
In further embodiments, the client may not export contract information, but client is from the table of productFace by scan or Image Acquisition in a manner of obtain record information, by contract information and record information matching, export it is correspondingSecond prompt, the fake certification of product is realized by client automatically.
Optionally, the method also includes:
The contract code in the block chain is read according to the contract address;
The contract code is executed, the access information of the contract information is modified.
The contract information is stored in contract block in the present embodiment, in addition to the conjunction in the contract blockAbout other than information, it is also possible to be stored with contract code and access information.The access information can be accessed for the contract informationAccess times and/or the information such as visitation frequency.In further embodiments, the access information may also include that access end is (rightShould be in aforementioned client) mark, access time information etc..
In some embodiments, the contract code can are as follows: the various instructions that block chain node can be identified and be executed.InstituteThe related service logic of processing of contract information can be limited by stating contract code.For example, contract can be set in the contract codeThe attribute of different data in block, for example, the attribute of the contract information and contract code may be configured as it is read-only;The accessThe attribute of information may be configured as readable writeable.
In some embodiments, the constraint condition of the contract information used can be limited by the contract code.It is provided with corresponding function in the contract code, which can be used for modifying the access information and/or quickly jumpTo the access of the contract information in contract block.In this way, block chain node can be according to the actual access situation of the contract informationThe access information is modified, in this way, can send to subsequent access client for anti-fake the according to the access informationOne prompt.
In some embodiments, the method also includes:
When determining that the access information meets preset condition by executing the contract code, institute is sent to the clientState the first prompt.
Front will record the access situation of the contract information, to form the access information.
For example, the data structure that each contract in contract block records can include:
Contract field, for recording contract information;
Field is accessed, record access information is used for;
Code field, for recording contract code.
Different field in the data structure of contract record has different field attributes, for example, contract fieldAttribute is read-only;The attribute of the access field can be readable writeable;The attribute of the code field can also be attribute.
In further embodiments, the data structure of the contract record may also include that
First attribute field can be used for recording the first flag information for indicating the validity of the contract information;
And/or;
Second attribute field can serve to indicate that the second flag information of the validity of the contract record.
If first attribute field indicates that the contract information is invalid, but active client requests access to the contractInformation, then at this time it is believed that meeting one kind of second preset condition, then the possible client can not receive invalidContract information, but first prompt can be received.
In the case where there is some cases, the attribute field all contract records are invalid, then it represents that the contract information is no longer valid, thenIt can be indicated by the content of the first attribute field.The instruction of the field contents default record of first attribute field is effectively believedBreath value, it is subsequent to be modified in the case where meeting condition;For example, the instruction of the owner based on consumer or product is modifiedFor invalid value.The second marking-up section can serve to indicate that the invalid of entire contract record, in this way, block chain node receives visitWhen asking request, it is found that it is invalid entire contract record is all indicated by the second flag information, directly can send access to client and loseIt is losing to play anti-fake effect as a result, being equivalent to.
For example, the circulation number of a product may be limited, alternatively, the outer packing of a product is read out after being removedThe number of accessed contract information is also limited after contract address.If a contract information is ceaselessly accessed, it is equivalent toThe contract address of possible product is stolen applied on illegal product, then what user took at this time may be illegal product, thereforeBlock chain node can be by executing the contract code, the access of the contract information of discovery current request access in the present embodimentNumber,
Optionally, described when meeting preset condition, to the client send it is described first prompt, including it is following at leastOne of:
If the access information of the contract information meets the first preset condition, first prompt is sent;
If the first flag information meets the second preset condition, first prompt is sent, wherein first flag informationFor the effective marker field of the contract information.
If the access information of contract information meets the first preset condition, first prompt is sent.Specifically such as, institute is determinedThe access times for stating access information instruction reach access times threshold value, it is believed that the access information meets the described first default itemPart.For example, some contract address entrained by multiple counterfeit and shoddy goods, may so cause corresponding to the contract addressContract record it is continuous accessed, visitation frequency is excessively high, or receives at the same time multiple from different clientsAccess request, in this way, access informations, the determination such as access number that can be received according to visitation frequency and at the same time areNo to meet first preset condition, visitation frequency is higher than frequency threshold value, if section is (for example, in 1 minute or 5 points at the same timeIn clock) receive the access request from multiple and different clients, then it is believed that the access information to meet described first defaultCondition, to send first prompt.
In other implementations, it is provided in the first field in the contract record, in this way, can permit holding for productPerson modifies the first flag information recorded in corresponding first attribute field, can if the first flag information is modified in vainOther clients access again will be sent first prompt.
When modifying first attribute field, the client-side information or use for modifying first attribute field also will recordFamily information etc. modifies authentication information;In this way, if user thinks again to set the contract information to effectively, to need to know described repairChange the client of authentication information, the first flag information is revised as indicating effective information by request;Otherwise the first mark letterBreath is Yi Dan modified, if client does not submit modification authentication information, block chain network can refuse so that first markInformation recovering arrives original state.The modification of first attribute field is equally applicable to instruction block record whether effective theThe modification of two flag informations.
Optionally, the method also includes: to the client send modification request;The client is received based on describedThe modification response that modification request returns;It is responded according to the modification, modifies first flag information or the second flag information.
It is worth noting that: the modification logic of first flag information and second flag information can be by the conjunctionAbout code is presented.
In some embodiments, the method also includes:
According to the contract address, described in the second flag information instruction of the contract record where the contract information being accessedContract record is invalid, and the prompt of access failure is sent to the client.
If the second flag information instruction of entire contract record is invalid, the block chain node is sent out to the clientThe prompt for sending access to fail.
Certainly, in further embodiments, if the block chain node does not inquire contract information, similarly to describedClient sends the prompt of the access failure.
There are also in embodiment, the block chain node can verify the contract address or address and identify whether effectively,For example, the length check identified by contract address or address, finds what the contract address being currently received or address identifiedLength is not preset length, it is clear that the contract address or address mark may be one forgery address, directly to corresponding visitorFamily end sends the prompt of the access failure, may be counterfeit and shoddy goods to prompt current production.
Optionally, the method also includes:
Receive the first record request of the product;
Based on the first record request, increase the contract record for including at least product information in block chain.
The first record request herein, is equivalent to the request for creating the contract record of the product.For example, product is enteringBefore market circulation, the producer of product utilizes the product information of the block chained record product, for example, product number, title, factoryThe information such as quotient, date of manufacture.
Further, the method also includes:
Receive the second record request that the product generates in the circulation process;
According to the second record request, increase the circulation information of the product in contract record.
Product can generate corresponding circulation record in circulation, can utilize the stream communication in contract record in the present embodimentBreath is to be recorded.
For another example record has product information and circulation information in the contract information, for example, the circulation information is recordableIt should be continuous between the circulation node that product circulates every time, if discontinuously there may be fake and forged problems.
Circulation information herein can include: one in the information such as nodal information, exchange hour, loco of the node that circulatesIt is a or multiple.In some embodiments, the circulation information can include at least the information of circulation node.
It is worth noting that, the modification of the access information and/or the flag information in embodiments of the present invention, is allIt is needed since the equipment such as client are all the corresponding requests of broadcast when modifying these information based on the modification of block chain technologyOther verifying nodes are verified, and/or, modified block record needs to be broadcasted and then verified by verifying node,So, it is ensured that the correctness of legitimacy and the block record of modification.
As shown in figure 4, the present embodiment provides a kind of information processing units of block chain, comprising:
Module 110 is obtained, the predetermined information on physical support for obtaining product carrying, wherein the predetermined informationFor the address of contract address or contract address mark;
Broadcast module 120, for broadcasting access request to block chain network;
Receiving module 130 returns to contract information corresponding with the contract address based on the access request for receiving.
The information processing unit of block chain herein can be applied to client.The acquisition module 110, broadcast module 120And receiving module 130 can be program module, after which is executed by processor, may be implemented predetermined information acquisition,The broadcast of access request and the reception of contract information, in this way, facilitating user, contract information identifies product based on the received,Determine whether its current product held is qualified products, and not counterfeit and shoddy goods.
The contract information includes at least one of: the product information of the product;The circulation information of the product.
Further, described device further include:
Receiving module 130, the first prompt returned for receiving the block chain network;
Output module, for exporting the first prompt.
Output module herein can be voice output module, image output module, can be used for exporting the first prompt, convenientUser prompts determine whether product is qualified products according to first.
In some embodiments, described device further include:
Scan module, the record information recorded for scanning the product surface;
Matching module, for matching the contract information and the record information;
Output module, for being prompted according to matched as a result, exporting second.
In further embodiments, described device further include:
Receiving module 130, the modification prompt sent for receiving the block chain network;
Respond module is responded, wherein the modification is rung for being modified based on modification prompt to the block chain networkIt answers, is used to indicate the first flag information and/or contract information place that the block chain node modifies the contract informationBlock record the second flag information.
In further embodiments, described device further include:
Receiving module 130, for receiving the prompt for the access failure that the block chain network is sent, wherein the accessThe prompt of failure are as follows: the block chain network is based on the contract address and does not inquire corresponding contract information, alternatively, inquiryIt is sent when to invalid contract information.
As shown in figure 5, the present embodiment provides a kind of information processing units of block chain, comprising:
Receiving module 210, for receiving the access request of client transmission, wherein the access request carries accessThe address of the contract address of the contract information of product or contract address mark;
Access modules 220, for accessing the contract information that block chain reads out the product according to the contract address;
Transmission module 230, for the contract information to be transferred to the client.
The information processing unit of block chain herein can be for applied to the information processing unit in block chain node.
The receiving module 210, access modules 220 and transmission module 230 can be program module, be executed by processorAfterwards, the acquisition of the predetermined information, the reading of contract information and the transmission of contract information be can be realized.
In some embodiments, described device further include:
Read module, for reading the contract code in the block chain according to the contract address;
Execution module modifies the access information of the contract information for executing the contract code.
In further embodiments, described device further include:
Cue module is also used to when meeting preset condition, sends the first prompt to the client.
Further, the cue module may include at least one of:
First prompt unit sends described the if the access information for the contract information meets the first preset conditionOne prompt;
Second prompt unit sends first prompt if meeting the second preset condition for the first flag information,In, first flag information is the effective marker field of the contract information.
In some embodiments, first prompt unit, specifically for the access time of the determination access information instructionNumber reaches access times threshold value.
Optionally, described device further include:
Request module, for sending modification request to the client;
Receiving module 210, the modification response returned for receiving the client based on the modification request;
Modified module modifies the first flag information or the second flag information, wherein institute for responding according to the modificationWhether stating the first flag information, to be used to indicate the contract information effective;Second flag information is used to indicate the contract letterWhether the contract record where breath is effective.
In some embodiments, described device further include:
Second cue module, for according to the contract address, the of contract record where the contract information being accessedTwo flag informations indicate that the contract record is invalid, and the prompt of access failure is sent to the client.
In some embodiments, the receiving module 210 is also used to receive the first record request of the product;It is describedDevice further include:
First logging modle, for increasing in block chain and including at least product information based on the first record requestContract record.
In further embodiments, the receiving module 210, generated in the circulation process for receiving the productTwo record requests;Described device further include: the second logging modle is remembered for being requested according to second record in the contractIncrease the circulation information of the product in record.
Several specific examples are provided below in conjunction with above-mentioned any embodiment:
Example 1:
This example provides a kind of information processing method of block chain, is applied in block chain network.It is wrapped in the block chainInclude the block chain node of multiple distributed settings.The type of block chain node has been divided into account book node, supervisory node, Kuang GongjiePoint.
Manufacturer is that the type product generates one using asymmetric encryption (Asymmetric Encryption, RSA) algorithmTo key, private key is that product encryption uses, and public key is supplied to mechanism of outside organization etc. and does decryption use.The external agency Ke BaoInclude block chain network.
Link is registered in product, manufacturer is that product generates a unique intelligent contract, the intelligence in block chain before dispatching from the factoryContract information can be stored in contract.The contract information can include: product number, title, manufacturer, date of manufacture, term of validityEtc. product information.
The block address (contract Address) of intelligent contract is used as product unique identification in block chain, passes throughAfter private key encryption, it is stored on the physical supports such as two dimensional code, the anti-counterfeiting chip of product.
Before products in circulation, manufacturer creates a new affairs in block chain to execute the contract of product information, thingBusiness source side is the block account address of manufacturer, target side is down-stream enterprise's block account address, and affairs execute in contractThe circulation information of downstream node is written.And so on each link enterprise except write-in current link circulate information (time, placeDeng) outside, next link company information is also written, until product inflow terminal consumption market.Circulation information herein corresponds toCirculation information above-mentioned.
Block data is stored with the structure of Merkel (Merkle) binary tree, can be to production by upward recursive searchProduct circulation is completely recalled.
The intelligent contract of product in publication by service logic, define it is only readable to product information in intermediate links,It is only newly-increased to circulation information to modify, prevent data to be tampered, while block chain supervisory node is to the affiliated area of nonproductive quotientBlock node carries out permission control.
Product authenticity verifying, it may include:
After consumer takes product, using the client software for the block anti-counterfeiting technology installed in the equipment such as mobile phone, from anti-The ciphertext of contract address is obtained on fake information physical support;
Client sends checking request to block chain service, and server-side decrypts ciphertext by the public key of such product, atThe contract address of the part product will be obtained after function.
Block chain network obtains the product information and circulation information of product using the contract address lookup, and returns to terminalIt shows.
In this way, the product that the user for holding the terminals such as mobile phone can will print or be pasted on the product information of return and commodityInformation is compared, compare it is whether consistent, thus judge whether the product whether certified products, to realize anti-fake purpose.For example,The circulation information for extracting the product verifies the circulation information information self-contained with product, realizes fake certification.
Example 2:
On the basis of example 1, in order to further anti-fake, for example, (being provided with for famous brand of wine in bottle or packaging for readingTake the anti-fake physical support of the contract address), bottle or packaging may be recycled by illegal businessman, this in order to reduceFake and forged commodity, in order to prevent anti-fake physical support itself to be replicated or illegally use on fake products.
Record product is wanted to be verified number within a block, every verifying is primary to be incremented by 1, and consumer can view the product quiltVerify number.The number that is verified herein can correspond to access times above-mentioned.
It the use of block chain anti-counterfeiting technology is all under normal circumstances the product with high value, such product generally has outerPackaging is verified after could only removing packaging in the case where purchase.So a product is verified number in this caseExcessively, block information can generate warning to consumer, what the anti-fake physical support of this product may be replicated or be reusedRisk.
Threshold values can be arranged to verifying number in the supervisory node of block chain, to reaching the product of threshold values to manufacturer or dealerWarning (corresponding to first prompt) is sent, while identifying this product to have forgery risk, prompt terminal consumer.
Using this exemplary block chain digital anti-counterfeiting technology, make product from production until in consumer's hand, product information andAll circulation informations can not be distorted, genuine and believable, trust of the enhancing consumer to product.
The method that this example provides has cost of implementation cheap, and the block data mutual trust between enterprise and enterprise is shared without highExpensive information system and hardware device, between the system of different enterprises without to data trust and compatibling problem it is worried.
For this example precisely in order to solving all the problems above, a kind of of proposition realizes that digitlization is anti-fake using block chain technologySolution.Construction cost is low, implements from client to server-side technology simple, safe and reliable.It is magnanimity in Internet eraProducts Digital is anti-fake to provide feasible technical solution.
Example 3:
Firstly, the block record of creation product, one or a plurality of block record storage are in a block.
The block record of the creation product can include:
1) intelligent contract is created;Product information is defined in contract information, such as: title-xxx wine, the place of origin-xxx,Date of manufacture -2018/05/30 etc..Circulation information is defined in contract information, for example, down-stream enterprise's information aggregate is defined, with oneThe mode of a single-track link table storing data in order.
2) contract address encryption;
It is generated with reference to RSA key and encryption and decryption is to contract address encryption, and encrypted address is carried to the object of productIt manages on carrier.
Secondly, product circulates;The product circulation can include: product enters consumption market.The product flows through in journeyContract information update can include:
1) event is monitored, it may include:
The block node of down-stream enterprise listens to new circulation event (by target block account address filtering Fei Ben enterpriseMessage), start the circulation information of current link to be written in contract block data, such as place, entry time, superintendent etc..
2) continue to circulate, it may include:
Enterprise is regular according to the circulation of oneself, next link company information is added to chain list end, and in block chainA new affairs are created, destination address inserts down-stream enterprise's block account address, after submitting affairs, to next link enterprise zoneBlock node listens to this event and is handled.
Finally, the demand of Product Validation can be generated in products in circulation to consumer's hand, it may include:
The client of block chain anti-counterfeiting technology is the concept of a light wallet of block chain, only includes server-side rpc interface tuneWith with digital sign test encryption function, do not include block chain book keeping operation and operation function.
After reading the product contract encryption address in anti-fake physical support, using passing through client after product public key decryptionsThe key (AES symmetric cryptography) arranged between server is digitally signed, and then server-side is submitted to verify product information.
If do not inquired in product information or block, product information is different from material object, may determine that authenticity of products;Or consumer has found product because verifying number reaches the threshold values of manufacturer's setting, and gives a warning message, can also be used asJudge true and false foundation;Meanwhile consumer can also be by products in circulation information as certain judgment basis, progress is anti-fake to be sentencedIt is fixed.Such as: local have a general agent, and last circulation information is from far other provinces and towns, then this product just has vacationThe risk risked.
Example 4:
As shown in fig. 7, this example provides and a kind of carries out anti-fake method using block chain multi-product, comprising:
Production;
Generate the key of product;
Create the contract information of product;
The identity of the founder of verifying creation contract information;
The authentication of founder passes through, and down-stream enterprise's information is written;
Contract information packing is stored in block chain;
The contract address that contract information stores is encrypted using private key, is carried on the physical support of product;
Downstream intermediate links update circulation information;
Verify the identity of the writer of circulation information;
Writer's authentication passes through, and circulation information is written successfully;
Customer requests verify product;
Contract information is read based on contract address in public key decryptions contract address.
The authentication of founder or writer do not pass through, then terminate the write-in process of visioning procedure or circulation information.
As shown in fig. 6, the information processing node can be client or area the present embodiment provides a kind of information processing nodeOne or more nodes (for example, monitoring node in alliance's block chain) in block chain network, the node can include:
Transceiver,
Memory,
Processor is connect with the transceiver and memory respectively, for being stored on the memory by executingComputer-executable code, controls the information storage of the information transmit-receive and the memory of the transceiver, and realizes aforementioned answerFor one or more of client or block chain nodal method, for example, executing one in method shown in Fig. 1 to Fig. 3 and Fig. 7It is a or multiple.
The memory can be various types of memories, can be random access memory, read-only memory, flash memory etc..It is described to depositReservoir can be used for information storage, for example, storage computer executable instructions etc..The computer executable instructions can be various journeysSequence instruction, for example, objective program instruction and/or source program instruction etc..
The processor can be various types of processors, for example, central processing unit, microprocessor, Digital Signal ProcessingDevice, programmable array, digital signal processor, specific integrated circuit or image processor etc..The processor can be by totalLine is connect with the memory.The bus can be IC bus etc..
In some embodiments, the transceiver can include: communication interface, the communication interface can include: network interface, exampleSuch as, lan interfaces, dual-mode antenna etc..The communication interface is equally connected to the processor, and can be used in information transmit-receive.
In some embodiments, the information processing node further includes man-machine interactive interface, for example, the human-computer interaction connectsMouth may include various input-output equipment, for example, keyboard, touch screen etc..
Information processing node provided in this embodiment can be client above-mentioned or block chain node.
The present embodiment provides a kind of computer storage medium, the computer storage medium, which is stored with computer, can be performed generationCode;After the computer-executable code is performed, it can be realized aforementioned applications in client or block chain nodal methodOne or more, for example, executing one or more of method shown in Fig. 1 to Fig. 3 and Fig. 7.
The computer storage media include: movable storage device, read-only memory (ROM, Read-Only Memory), withMachine accesses various Jie that can store program code such as memory (RAM, Random Access Memory), magnetic or diskMatter.Optionally, the computer storage medium can be non-moment storage medium.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through itIts mode is realized.Apparatus embodiments described above are merely indicative, for example, the division of the unit, onlyA kind of logical function partition, there may be another division manner in actual implementation, such as: multiple units or components can combine, orIt is desirably integrated into another system, or some features can be ignored or not executed.In addition, shown or discussed each composition portionMutual coupling or direct-coupling or communication connection is divided to can be through some interfaces, the INDIRECT COUPLING of equipment or unitOr communication connection, it can be electrical, mechanical or other forms.
Above-mentioned unit as illustrated by the separation member, which can be or may not be, to be physically separated, aobvious as unitThe component shown can be or may not be physical unit, it can and it is in one place, it may be distributed over multiple network listsIn member;Some or all of units can be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
In addition, each functional unit in various embodiments of the present invention can be fully integrated into a processing module, it can alsoTo be each unit individually as a unit, can also be integrated in one unit with two or more units;It is above-mentionedIntegrated unit both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above method embodiment can pass throughThe relevant hardware of program instruction is completed, and program above-mentioned can be stored in a computer readable storage medium, the programWhen being executed, step including the steps of the foregoing method embodiments is executed.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, anyThose familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all containLid is within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.