Background technology
Agricultural is the primary industry of relation China national economy and social stability, and means of agricultural production safety is carried for agricultural productionFor the important outlet of guarantee.Agricultural material product circulation control is not sought unity of standard, and the storage, transport and processing to the means of agricultural production cause necessarilyDifficulty, reduce logistics benefit;The especially fake and forged means of agricultural production harmful farming part of cheating the farmers happens occasionally, and endangers, compromises peasantInterests.
Current China's means of agricultural production and its field of circulation are primarily present problems with:First, means of agricultural production quality security problem is severe.ByIt is difficult to differentiate in advance in the means of agricultural production commodity such as chemical fertilizer, seed, agricultural chemicals, the harmful farming part that causes to cheat the farmers remains incessant after repeated prohibition.Traditional improvement mouldFormula social cost is huge so that fake and forged agricultural material product is brought number and lost with 10,000,000,000 yuan of economic society.Second, the means of agricultural production suppliesAnswer logistics intermediate links various, cause means of agricultural production retrospect chain not smooth, it is found that means of agricultural production manufacturer of poor quality shift onto each other with distributor, it is difficultTo clear attribution of liability, retrospect, accountability, recall mechanism and can not slowly fulfill.3rd, agricultural materials market supply and demand Asymmetry informationClaim.Due to lacking the grasp to agricultural materials market information, the asymmetry of agricultural materials market information, rural consumer purchase means of agricultural production business are causedTool bears the character of much blindness and random during product, serious imbalance between supply and demand be present in means of agricultural production supply chain.
《National Program for Medium-to Long-term Scientific and Technological Development (2006-2020)》In clear and definite major fields " agricultural "," transportation ", " information industry and modern service industry " preferential subject content;More ministries and commissions, which repeatedly combine, to print and distribute《The whole nation in 2012The means of agricultural production is cracked down on counterfeit goods and supervision main points》、《The national means of agricultural production in 2012 is cracked down on counterfeit goods specific rectification embodiment》, hold the national means of agricultural productionTo crack down on counterfeit goods specific rectification teleconference etc., it is to build permanent mechanism that the fake and inferior means of agricultural production harmful agricultural bank that cheats the farmers is made and sold in severe strike,Specification agricultural materials market order, the legitimate rights and interests of peasant, powerful guarantee agricultural product quality and safety are safeguarded conscientiously.
In recent years, because RFID technique has significantly compared with other anti-counterfeiting technologies (laser anti-counterfeit, antiforge etc.)Advantage, therefore RFID technique causes extensive concern in the application of anti-counterfeit field.There are many experts and scholars to open both at home and abroadBegin to study and inquire into the problem of RFID technique is applied to anti-counterfeit field, and have been achieved for some breakthroughs.
Juels proposes a kind of model and is used to strengthen EPC label anti-copying performances.Using one 32 in the modelPIN (Personal Identification Number) forms a permanent inoperable label;Juels is proposed in additionOne addressable 32 PIN, smart-tag authentication is completed with reference to the substandard tag commands of Gen2 and mutual authentication protocol.At thisUnder individual scheme, it is assumed that label is trusty with reader.
Kim etc. proposes another model, this model can in mobile RFID environment certified product.The model makesWith digital watermark, its purpose is the Gen2 standard compatibling problems for describing Stake models, and the reading of Juels modelsThe problem of device level of trust.This phone is embedded into RFID device by they by digital camera cell phone.One useFamily scanning EPC products capture the watermarking images in product simultaneously, and image then is sent into certification by GSM or cdma networkCenter is authenticated, and finally returns to the authentication result of a digital signature.
Staake etc. thinks that Duc scheme preserves the digital RFID label tags of EPC with plaintext version and is easy to be cloned, thereforeProduct can not possibly be identified well.Assuming that the central database that can not upgrade in time, fake product may still have one it is endlessWhole but plausible history.Therefore they suggest by increasing an EPC product certification server, to allow in databaseSafety product certification is carried out in reader tag environments.One ciphering unit is embedded into RFID reader, therefore in readerNew demand is not reintroduced on device.But support that the RFID label tag of this encryption is more expensive than common label and suchSecurity function and EPC Gen2 standards are not completely compatible.
The advantage of the above method is can effectively to prevent from denying attacking, because all activities and supply chain cooperation of productThe action of partner is all tracked by central server.One client can refuse to buy one without the product of reliable sources or oneFalse product.This method is dependent on ONS (Object Name System) renewal pedigree informations.But because they are in functionOn similitude, the usual weakness of internet has been transferred directly to ONS.As one high exposure service, ONS easily becomes refusalThe main target of the attack meanses such as service.
External RFID anti-counterfeiting technologies research has caused the concern of domestic expert and scholar, and the Department of Science and Technology, national development changeThe establishment of ministries and commissions of leather committee etc. 15《Chinese radio frequency identification (RFID) technical policy white paper》Formal issue.White paper is encouragedRFID is first developed in the application field such as logistics, traffic administration, false proof.The RFID industries of China have started normalized development roadRoad.
Application of the RFID technique in false proof is booming at home.863 Program advanced manufacturing technology field is greatProject " radio frequency identification (RFID) technology and application " Project items are formally announced.Wherein a total of 19 RFID Task applications, pointNot by being undertaken from national 33 universities and colleges, R&D institution and enterprise.Maotai limited company in the problem《RFIDTechnology is in the false proof application of Maotai》With Yibin WuLiangye Group Co., Ltd《RF ID technologies five-Grain Liquor wine it is false proof shouldWith》And《Food safety traceability system research and development and example based on RFID technique》It is RFID technique answering in Antiforge systemWith.Some universities have begun to actively input to integrated complex of scientific research institution and wherein deploy related research, and achieve notFew achievement.
The second generation identity card in China embeds RFID chip, and the chip is adopted international standards the Type B of ISO 14443 marksStandard, using special encrypting module verify false proof, therefore China second-generation identity card is that RFID technique is applied to false proof system by ChinaOne typical case of system.But the research of the domestic false proof aspect of logistics Means of Agricultural Production is relatively fewer.
Therefore being needed badly among prior art wants a kind of new technical scheme to solve this problem.
Embodiment
As illustrated, a kind of false proof traceability system of logistics Means of Agricultural Production includes antifalsification label 1, false proof reading machine 2, the and of server 3Supplier's card 4, the antifalsification label 1 is fixedly mounted on the sealing part of means of agricultural production packaging bag;The false proof reading machine 2 and server 3Connected by network data transmission, false proof reading machine 2 distinguishes antifalsification label 1 and supplier's card 4;Supplier's card 4 is portableFormula release;
Pseudorandom number generator is provided with the antifalsification label 1;
The false proof reading machine 2 includes CPU I, card reader arrangement, data entry unit, d GPS locating module, false proof managementDevice, display screen and TD-LTE mobile communication modules;The CPU I respectively with card reader arrangement, data entry unit, GPS location mouldBlock, false proof manager, display screen and the connection of TD-LTE mobile communications module;
The false proof reading machine 2 can be led to antifalsification label 1, have the function of authentication, read legitimate tagInterior anti-counterfeiting information.
The false proof reading machine 2 shows the information of correlation, includes the producing and selling relevant information and anti-fake certificate of productInformation etc..
The false proof reading machine 2 can be registered by network, the false proof data of product be downloaded, to regularly update dataAnd maintenance management.
False proof reading machine 2 is before use, need to be authenticated, its identifying procedure is as follows:
The sale of false proof reading machine 2 in false proof traceability system is managed by product producer, and same dealer managementCombine with false proof reading machine Hash identification code management.False proof reading machine 2 itself can be authorized, can be certified.
The mandate of false proof reading machine 2:False proof reading machine 2 is produced by false proof reading machine manufacturer.The false proof knowledge just producedReading machine 2 does not have fake certification function, only one " bare machine ".Anti-fake certificate center is by itself and Hash identification codes and dealerBinding, and registered by dealer, become " legal false proof reading machine ".This process is referred to as that " false proof reading machine is awardedPower ".
The detailed process of mandate is as follows:
(a) anti-fake certificate center be false proof reading machine 2 Generate Certificate, in the form of Hash identification codes with false proof reading machine 2Binding is got up, while generates 2000 Hash authentication values, and with the private key of oneself, adding for oneself is saved in using Hash AESsClose memory block.
(b) after false proof reading machine 2 is sold to dealer by product producer, false proof reading machine 2 and dealer are bound.
(c) dealer before first using false proof reading machine 2, it is necessary to which false proof reading machine 2 is connected by TD-LTE networksConnect server 3 to be registered, it is therefore an objective to confirm the identity of false proof reading machine 2.After registration, false proof reading machine 2 is just authorized to, intoFor " legal false proof reading machine ".
The server 3 includes CPU II, production information processor, key management unit, storage transportation management device, sales letterCease processor, checking information processor and retrospect device;The CPU II respectively with production information processor, key management unit, storageTransportation management device, sales information processor, checking information processor and retrospect device connection.
The important informations such as user key, product data are stored in server 3, and can be communicated at any time with external equipment, it is internalRealize Hash AESs.
The antifalsification label 1 is RFID radio frequency identification antifalsification labels, and antifalsification label 1 is empty using frequency 13.56MHz, storageBetween 4K CPU card.
The antifalsification label 1 is encapsulated using soft label 4mm*50mm*2mm bar type waterproofs anti-corrosion, and the back of antifalsification label 1 is attachedThere are not dry double faced adhesive tape and protection paraffin paper.In order to reduce cost, waterproof label can reclaim, and by final sales, business takes antifalsification label1, in the information of false proof 2 times reading antifalsification labels 1 of reading machine, operation label recovery key, the label information is wireless by TD-LTENetwork delivery is to server 3.Antifalsification label 1 sends higher level supplier back to until producer.
A kind of false proof retroactive method of logistics Means of Agricultural Production between false proof reading machine 2 and supplier's card 4 first by distinguishing, using groupProtocol authentication and strong protecting track privacy agreement carry out anti-fake certificate, by TD-LTE networks batch number, false proof reading machineThe information transmissions such as numbering, read operation, reading machine position, recognition time pass through space-time data chain to server 3, server 3In noise analytic approach further determine that the authenticity of products, and the true and false information the product and the kind of product, model, productionThe information such as producer, date of manufacture, false proof read operation time, place give the false proof reading machine 2 by TD-LTE network deliveries, preventPseudo- reading machine 2 shows the information such as the true and false of the product, production information, query time place to user.
A kind of false proof retroactive method of logistics Means of Agricultural Production is comprised the following steps that, and following steps are sequentially carried out,
Step 1: production link enters the initial work of row label
1., production information typing
Manufacturer staff operates the production information processor of server 3, and the life of the product is preserved by LANThe production informations such as producer, kind, batch, production quantity, each packaging quantity, date of manufacture, production site are produced to server 3On;
2., antifalsification label 1 initializes
The staff of manufacturer operates false proof reading machine 2, selects the data entry unit of false proof reading machine 2, false proofSecurity code generation request signal is sent to server 3 by reading machine 2 by TD-LTE wireless networks, and server 3 is from databaseProduction information is extracted, while server 3 is that antifalsification label 1 generates the random logical ID value of 256, one group of certification HASHKey-value pair and the public key of one 256, using SM2 AESs, server key and random number to 256 random logicsID values and HASH key-value pairs are encrypted, and form unique ID values after encryption and one group of HASH key-value pair after encryption, pass throughTD-LTE wireless networks are sent to false proof reading machine 2;
False proof reading machine 2 initializes to antifalsification label 1, by false proof reading machine 2 unique ID values after encryptionFirst area of antifalsification label 1 is stored in, public key is stored in second area of antifalsification label 1, one group of HASH key assignments after encryptionThe 3rd area to being stored in antifalsification label 1, the production information of product is stored in the 4th area of antifalsification label 1;
After initialization, after false proof reading machine 2 is by encryption of the TD-LTE wireless networks the antifalsification label 1 of this productUnique ID values send server 3 to, and server 3 is unique ID values after encryption, logical ID value, one group of certification HASH key assignmentsPair and public key be saved in the database of the product batch;
3., manufacturer the antifalsification label 1 after initialization is pasted the sealing part of means of agricultural production packaging label, each packaging is viscousPaste an antifalsification label 1;
Step 2: trace data accumulation and the bulk article sampling anti-fake certificate work of chain in transit link
1., transit information typing:
Staff is manually entered time of receiving, quantity of receiving and the consignee's information of product to the storage of server 3Transportation management device;
2., staff operate false proof reading machine 2, read the antifalsification label 1 of any three products in a collection of product, obtainThe production information of this batch of product, and geographical location information and positioning time letter are distinguished by the d GPS locating module of false proof reading machine 2Breath, obtain three antifalsification labels logical ID value, encryption after production unique ID value and public key, row label is entered using group protocolCertification,
Certification is by distinguishing the production information of this batch of product, false proof reading machine 2 by TD-LTE mobile communications moduleGeographical location information and location time information are saved in server 3, and show " certified products " on false proof reading machine 2;
Authentication error, " your product is probably fake product, please find out source " is shown on false proof reading machine 2, and led toCross geographical location information and the positioning that TD-LTE mobile communications module distinguishes the production information of this batch of product, false proof reading machine 2Temporal information passes to server 3, and server 3 is handled the form of this information alarm by the checking information of server 3Device is shown to the producer;
3., the geographical location information that the production information of typing is passed through with the false proof certification of reading machine 2 of server 3 and during positioningBetween information be stored together, formed Product transport Data-Link;
Step 3: in sales section trace the data accumulation of chain
1., sales department staff select the product information read functions key of false proof reading machine 2;
2., sales department staff operate the anti-counterfeiting label that false proof reading machine 2 reads any three products in a collection of productLabel 1, read the production information of the product, and the GPS of itself determines by false proof reading machine from the fourth data area of antifalsification label 1Position module recognition geographical location information and location time information, obtain the pin after the logical ID values of these three antifalsification labels 1, encryptionUnique ID value and public key are sold, smart-tag authentication is carried out using group protocol,
Certification by, by TD-LTE mobile communications module the production information of product, geographical location information and positioning whenBetween information be saved in server 3, and show " certified products " on false proof reading machine 2;
Authentication error, " your product is probably fake product, please find out source " is shown on false proof reading machine 2, and led toCross TD-LTE mobile communications module and the production information of product, geographical location information and location time information passed to server 3,These information are shown to the producer by server 3 with the form of alarm by the checking information processor of server 3;
3., sales department staff select the user profile read functions key of false proof reading machine 2;
4., sales department staff operate supplier's card 4 that false proof reading machine 2 reads marketing unit, get supplyVendor name, sales region range information and the producer's identification information of business, and these are believed by TD-LTE mobile communication modulesBreath is saved in server 3;
5., sales department staff this sales volume information of data entry unit typing for passing through false proof reading machine 2And it is server 3 by the transmission of TD-LTE mobile communication modules with the sales region information of producer;
Step 4: anti-counterfeiting information two-way authentication of the anti-counterfeit recognition link by false proof reading machine 2 and antifalsification label 1, it is determined thatAuthenticity of products
1., the CPU I of false proof reading machine 2 reads the public key and Hash authentication codes of false proof reading machine 2 itself, and generates oneRandom code, by the false proof public key of itself of reading machine 2, the Hash authentication codes and random code of false proof reading machine 2 are added using HashCalculating is encrypted in close algorithm, obtains the recognition request data after 256 bit encryptions, by card reader arrangement using 13.56Mhz withoutLine communication modes are sent to the antifalsification label 1 of RFID radio frequency identifications by 256 data are obtained;
2., the antifalsification labels 1 of RFID radio frequency identifications by built-in CPU I pseudorandom number generator produce one it is randomNumber, using hash algorithm, with the private key of the antifalsification labels 1 of RFID radio frequency identifications to 1. middle recognition request data is carried out in step 4Decryption, obtain the hash value random code and public key of false proof reading machine 2;
3., public key, Hash of the antifalsification label 1 of RFID radio frequency identifications by the CPU I built in oneself to false proof reading machine 2Authentication code, RFID radio frequency identifications the area of antifalsification label 1 the 4th producer numbering and product batches number calculated, after being encryptedCompany-information data, the hash value of the encryption memory block of the company-information data after encryption and antifalsification label 1 itself is carried outMatching,
Matching is correct, the return value that false proof reading machine 2 is verified is set to " SUC01 ", and simultaneously recognition result and false proof knowledgeThe return value that reading machine 2 is verified passes to false proof reading machine 2;
Matching error, the return value that false proof reading machine 2 is verified are set to " ERR01 ", and simultaneously recognition result and false proof knowledgeThe return value that reading machine 2 is verified passes to false proof reading machine 2;
The antifalsification label 1 of RFID radio frequency identifications is the numbering storage area data of itself, company-information area data and certificationResult be encrypted using the private key of antifalsification label 1 of RFID radio frequency identifications, the company-information data after being encrypted, transmissionTo false proof reading machine 2, company-information data and the hash value progress of the encryption memory block of antifalsification label 1 itself after encryptionMatch somebody with somebody,
Matching is correct, and the return value that antifalsification label 1 is verified is set to " SUC01 ", and recognition result is returned with what is verified simultaneouslyReturn value and pass to false proof reading machine 2;
Matching error, the return value of antifalsification label 1 of RFID radio frequency identifications are set to " ERR02 ", and simultaneously recognition result andThe return value of checking passes to server 3, and the antifalsification label 1 of RFID radio frequency identifications sends " your certification is illegal certification " certificationData message is on false proof reading machine 2;
4., after false proof reading machine 2 receives the information of antifalsification label 1 of RFID radio frequency identifications, using the public key of false proof reading machine 2Company-information data after encryption are decrypted,
Decryption failure, authentication data information is " your certification is illegal certification ", is shown in the display screen of false proof reading machine 2" your certification is illegal certification ";
Successful decryption, authentication data information are " your certification is legitimate authentication ", are shown in the display screen of false proof reading machine 2" your certification is legitimate authentication ";
Authentication data information is legitimate authentication data message, and the CPU I built in false proof reading machine 2 produces a random number, andThe company-information data after the public key of antifalsification label 1, hash value and encryption are calculated using hash algorithm, the number of acquisitionValue is matched with the hash value of the false proof memory of reading machine 2,
As a result matching, be legitimate authentication, the return value that false proof reading machine 2 is verified is set to " SUC01 ", and simultaneously anti-counterfeiting labelThe return value that the recognition result of label 1 and false proof reading machine 2 are verified passes to server 3;
Matching error, it is illegal certification, the return value that false proof reading machine 2 is verified is set to " ERR01 ", and simultaneously anti-counterfeiting labelThe return value that the recognition result of label 1 and false proof reading machine 2 are verified passes to server 3;
5., false proof reading machine 2 read operation position is determined by GPS sensor (12);
6., false proof reading machine 2 by TD-LTE mobile communications module and network production code member, false proof reading machine number,Recognition result in function key, reading machine position, recognition producer and step 4 that reading machine operates 2. and 3. passes to server3;
7., server 3 by logistics spatio temporal reasoning algorithm carry out logistics Means of Agricultural Production chain fitting, the life of same batch productsProduction, wholesale and retail form the complete circulation traceability chain bar of product by temporal-spatial interpolating method;
8., server 3 by the noise analytic approach in mathematical statistics, by the time of this inquiry, geographical position, inquiryTolerance threshold value pair of the product information data error value that people and inquiry obtain set by with the retrospect chain of the productThan,
Data error value exceeds the 10% of error threshold scope, and server 3 provides " this recognition is probably fake product "Reading information and preserve the reading information to server 3,
Data error value is located in the 10% of error threshold scope, and server 3 provides the recognition letter of " product is certified products "Cease and preserve the reading information to server 3;
9., server 3 the true and false reading information of the product, manufacturer's information data, the false proof read operation time andLocation information gives the false proof reading machine 2 by TD-LTE network deliveries;
10., the display screen of false proof reading machine 2 show the true and false, production information, query time location information of the product, displayScreen shows that the product is fake product and gives the acousto-optic warning of counterfeit warning.
In the step 2 step 2. with step in step 3 2. in group protocol for utilize three antifalsification labels IDValue, certification Hash codes and public key form commodity matrix group, the antifalsification label 1 stored in commodity matrix group and server 3ID values, certification Hash codes and public key are examined, and ID values, certification Hash codes and the public key of three antifalsification labels are in server 3It is at least one in the batch products information of middle storage to examine failure, operate false proof reading machine 2 and show that " your product is probably pseudo-Make product, source please be find out " information warning.
The false proof reading machine 2 is two-way authentication to the authentication method of antifalsification label 1, especially by step 4 1. to 6.Verified.
In the step 4 7. in logistics spatio temporal reasoning algorithm specific practice be by produce the product company-information,Batch packaging location information, production time information, location information, the location time information of multi-batch products recognition combine shapeInto space-time chain, for the link of missing, using the method for spatio temporal reasoning algorithm, data chain fitting is carried out, is inserted by space-timeThe reasonable data that value-based algorithm insertion is drafted, forms agricultural material product circulation chain.
In the step 4 8. in data noise analytic approach be with the complete data chain of the spatio temporal reasoning of same batchOn the basis of line value, calculate and obtain the chain numerical value of the information of inquiry and the standard deviation square value of base line value, standard deviation square value are bigIn 1.5, certified product is fake product;Standard deviation square value is not more than 1.5, and certified product is certified products.
The granting of supplier's card 4 issues whole seller by retailer, and whole seller issues retailer, each whole seller and zeroSell the final at least supplier's card 4 of business.