CN110084622A - A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving - Google Patents

A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving Download PDF

Info

Publication number
CN110084622A
CN110084622A CN201910313998.3A CN201910313998A CN110084622A CN 110084622 A CN110084622 A CN 110084622A CN 201910313998 A CN201910313998 A CN 201910313998A CN 110084622 A CN110084622 A CN 110084622A
Authority
CN
China
Prior art keywords
code key
workshop
sub
commodity
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910313998.3A
Other languages
Chinese (zh)
Inventor
郑东
何嘉宇
郭瑞
张应辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Posts and Telecommunications
Original Assignee
Xian University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Posts and Telecommunications filed Critical Xian University of Posts and Telecommunications
Priority to CN201910313998.3A priority Critical patent/CN110084622A/en
Publication of CN110084622A publication Critical patent/CN110084622A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • Bioethics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to trace to the source block catenary system and code keys of commodity tracing technology field more particularly to a kind of commodity to save and method for retrieving.Commodity of the invention are traced to the source block catenary system, including enterprise side unit, monitoring party unit, the sub- workshop unit of manufacturer, supervision prescription workshop unit, several sub- plant personnel units, it will be in supervision department's addition system, realize the whole information supervision of the entire production process of commodity, so that the information of publication is more authoritative, counterfeit and shoddy goods is then effectively prevented and have occurred in the market.Code key of the invention saves and method for retrieving, and watermark uses the adding method of frequency domain blind watermatking, keeps the invisible of watermark, attack tolerant stronger;Furthermore, by the way of digital watermarking, image grayscale etc. will not influence the extraction of key information in relation to distortion situation, thus code key preservation of the invention combines image thresholding secret division technology with digital watermark technology with method for retrieving, so that the preservation of code key is safer, it is more reliable to extract.

Description

A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving
Technical field
The present invention relates to commodity tracing technology field more particularly to a kind of commodity trace to the source block catenary system and code key save with Method for retrieving.
Background technique
As people increase commercial quality requirement, more and more enterprises, investment institution enter commodity and trace to the source this A field, block chain technology are also applied in this area.But since the anonymity of block chain technology makes in reality The problems such as can not giving for change after losing in there are the supervision of information, private key in some problems, such as block chain, these problems are tight The application of block chain technology in practice is constrained again.In addition, in terms of commodity counterfeit prevention identification, although there is many solutions, But still counterfeit and shoddy goods cannot be prevented completely and occurred in the market.Therefore, it is necessary to trace to the source block to existing goods Catenary system improves, to meet actual needs.
Summary of the invention
It traces to the source block catenary system it is an object of the present invention to provide a kind of commodity, by supervision department's addition system, Realize that the whole information supervision of the entire production process of commodity then effectively prevents so that the information of publication is more authoritative Counterfeit and shoddy goods in the market occur;It traces to the source block chain it is another object of the present invention to provide a kind of above-mentioned commodity Code key in system saves and method for retrieving, by the way that watermark is made in key information and by encrypted watermark and frequency domain image co-registration, To realize that code key is taken care of in employee's hand by image segmentation, then can be achieved to give for change after code key loss.
To achieve the goals above, it traces to the source block catenary system the present invention provides a kind of commodity, which is characterized in that including enterprise Industry Fang Danyuan, monitoring party unit, the sub- workshop unit of manufacturer, supervision prescription workshop unit, several sub- plant personnel units, In: enterprise side unit issues enterprise side account and enterprise side code key, enterprise side account by the MSP in block catenary system Regulatory Organization It is managed and is saved by enterprise side business manager with enterprise side code key;Monitoring party unit is by block catenary system Regulatory Organization MSP issues monitoring party account and monitoring party code key, monitoring party account and monitoring party code key by monitoring party supervision responsible person management and It saves;Sub- workshop tissue issues the sub- workshop account of manufacturer to the sub- workshop unit of manufacturer where it and the sub- workshop of manufacturer is secret Key, the sub- workshop account of manufacturer and the sub- workshop code key of manufacturer are managed and are saved by sub- workshop workshop responsible person;Supervise prescription vehicle Between unit supervision prescription workshop account and supervision prescription workshop code key issued by workshop tissue where it, supervise prescription workshop account Number and supervision prescription workshop code key by sub- workshop supervision responsible person management and save;Sub- plant personnel unit workshop where it Tissue is distributed sub- plant personnel account and is voluntarily taken care of by sub- plant personnel, and corresponding sub- plant personnel code key is set by staff itself It is fixed;It is main that enterprise side code key and monitoring party code key pass through the first code key exchange agreement is generated for entering system supervisory tissue first Code key, enterprise side unit and monitoring party unit pass through the first main code key respectively and enter system supervisory tissue to manufacturer sub- workshop list The information that member reports is audited;The sub- workshop code key of manufacturer and supervision prescription workshop code key are raw by the second code key exchange agreement At the second main code key for entering sub- workshop tissue, the sub- workshop unit of manufacturer and supervision prescription workshop unit pass through the respectively Two main code keys enter sub- workshop tissue and the information that sub- plant personnel reports are audited and reported;Sub- plant personnel unit passes through Sub- plant personnel account and sub- plant personnel code key report merchandise news into block chain.
Further, commodity block catenary system of tracing to the source further includes dealer's unit, in which: dealer's unit is by block linkwork System Regulatory Organization issues dealer's account and dealer's code key, and is responsible for keeping by dealer;Dealer's unit passes through dealer Account and dealer's code key typing merchandise sales information into block catenary system, and by enterprise side unit and/or monitoring party unit Audit.
Further, commodity block catenary system of tracing to the source further includes client, in which: commodity are printed on quotient when workshop is packed Product identification number, the corresponding unlocking cipher of commodity sign number are logged where into commodity in tissue block catenary system;Client For inputting commodity sign number and from returning to unlocking cipher corresponding to the commodity sign number from the background, also, when client returns After unlocking cipher, block catenary system is automatically deleted the commodity sign number, after client inputs commodity sign again, returns from the background Make the return trip empty or consumption information.
Further, the sub- workshop unit of manufacturer, supervision prescription workshop unit and several common group of sub- plant personnel units It is organized at sub- workshop, commodity block catenary system of tracing to the source includes one or more sub- workshops tissue.
Further, the first code key exchange agreement needs to supervise responsible person both sides in enterprise side business manager and monitoring party It can come into force after typing fingerprint;And/or second code key exchange agreement need it is negative in sub- workshop workshop responsible person and the supervision of sub- workshop It can come into force after duty people both sides' typing fingerprint.
Further, it is provided with Internet of Things electronic intelligent lock on commodity, passes through the unlocking two dimension on client scan commodity Code unlocks or inputs the unlocking cipher returned after commodity sign number by client and unlocks manually.
A kind of commodity of the invention are traced to the source block catenary system, are had the advantages that
1, commodity of the invention are traced to the source block catenary system, include monitoring party unit, supervision prescription workshop unit, i.e., will prison In pipe portion door addition system, the whole information supervision of the entire production process of commodity is realized, so that the information of publication is more weighed Prestige has then effectively prevented counterfeit and shoddy goods and has occurred in the market.
2, commodity of the invention are traced to the source block catenary system, further include having dealer's unit, so as to understand commodity in real time Condition of sales, system availability are stronger.
3, commodity of the invention are traced to the source block catenary system, further include having client, are used to input commodity mark when commodity consumption Knowledge number simultaneously returns to unlocking cipher, in addition, sky or consumption information are returned as, to prevent the two of commodity after commodity consumption It is secondary sale or counterfeit goods be mixed into market, that is, ensure to come into the market in certified products be all derived from manufacturer.
4, commodity of the invention are traced to the source block catenary system, and the first code key exchange agreement and/or the second code key exchange agreement need It can come into force after fingerprint authentication, to further enhance security of system.
5, commodity of the invention are traced to the source block catenary system, and Internet of Things electronic intelligent lock is provided on commodity, and there are two types of having Unlocking mode ensure that Internet of Things electronic intelligent lock still can open consumption by unlocking manually in the case where depleted of energy This commodity ensure that the smooth consumption of commodity.
The present invention also provides a kind of above-mentioned commodity code keys in block catenary system of tracing to the source to save and method for retrieving, feature It is, enterprise side code key, and/or monitoring party code key, and/or the sub- workshop code key of manufacturer, and/or supervision prescription workshop code key are logical Image secret division is crossed to be saved, specifically includes the following steps:
(a1) a secondary watermark is made in key information by corresponding code key preserver, and carries out coding encrypting to watermark;
(a2) sub-picture is selected, and Fourier transformation is carried out to image, obtains the frequency domain of image;
(a3) watermark after coding encrypting that step (a1) obtains is merged with the frequency domain image that step (a2) obtains Afterwards, it carries out inverse Fourier transform and obtains watermarking images so that the watermark after coding encrypting is hidden in frequency domain image;
(a4) watermarking images that step (a3) obtains are encrypted with resume image, obtain encrypted watermark figure Picture;
(a5) the encrypted watermark image that step (a4) obtains is divided into N section shadow with Secret Image partitioning algorithm, and The thresholding M that can restore image is set;
(a6) the N section shadow that step (a5) obtains is distributed to the N position employee keeping randomly selected, and in N section shadow Typing is implied in son corresponds to employee information.
Further, the code key method for retrieving saved by image secret division, specifically includes the following steps:
(b1) order is recalled to the shadow sending of employee's keeping under code key preserver line;
(b2) M effective shadows are randomly selected in the N number of shadow recalled;
(b3) image reconstruction algorithm is utilized, encrypted watermark image is reconstructed;
(b4) using the encrypted watermark image reconstructed in image decryption algorithm decryption step (b3), watermarking images are obtained, And obtained watermarking images are subjected to Fourier transformation;
(b5) image that code key preserver selects step (a2) carries out Fourier transformation;
(b6) watermarking images that step (b4) is fourier transformed Fourier transformation is carried out with step (b5) to obtain Image merged to obtain the watermark after coding encrypting;
(b7) watermark after the coding encrypting that decoding step (b6) obtains, recovers watermark;
(b8) key information is read according to the watermark that step (b7) obtains.
Further, watermark is code key plaintext.
Further, the image of step (a2) selection can disclose.
A kind of code key of the invention saves and method for retrieving, has the advantages that
Code key of the invention saves and method for retrieving, and code key is incorporated in image in the form of watermark, and watermark uses frequency domain The adding method of blind watermatking keeps the invisible of watermark, attack tolerant stronger;In addition, the image after traditional images secret division is again It can make image that a degree of distortion occur when secondary reconstruct, thus the case where in the presence of key information can not be extracted, and it is of the invention Code key saves and method for retrieving, and by the way of digital watermarking, the related distortion situation such as image grayscale will not influence key information Extraction, thus code key of the invention preservation mutually ties image thresholding secret division technology with digital watermark technology with method for retrieving It closes, so that the preservation of code key is safer, it is more reliable to extract.
Detailed description of the invention
Illustrate the embodiment of the present invention or technical solution in the prior art in order to clearer, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it is clear that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is that commodity of the invention are traced to the source the first main code key product process figure of block catenary system;
Fig. 2 is that commodity of the invention are traced to the source the second main code key product process figure of block catenary system;
Fig. 3 is code key store method flow chart of the invention;
Fig. 4 is code key method for retrieving flow chart of the invention;
Fig. 5 is that commodity of the invention are traced to the source the overall structure figure of block catenary system;
Specific embodiment
Below in conjunction with the attached drawing in the present invention, technical solution in the embodiment of the present invention carry out it is clear, completely retouch It states, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on the present invention In embodiment, those skilled in the art's all other reality obtained without making creative work Example is applied, protection scope of the present invention is belonged to.
As shown in Figure 1, Figure 2, Figure 5, a kind of commodity of the embodiment of the present invention are traced to the source block catenary system, including enterprise side list Member, monitoring party unit, the sub- workshop unit of manufacturer, supervision prescription workshop unit, several sub- plant personnel units, in which: enterprise Fang Danyuan issues enterprise side account and enterprise side code key, enterprise side account and enterprise by the MSP in block catenary system Regulatory Organization Square code key is managed and is saved by enterprise side business manager;Monitoring party unit is issued by the MSP in block catenary system Regulatory Organization Monitoring party account and monitoring party code key, monitoring party account and monitoring party code key are by monitoring party supervision responsible person management and save;It is raw The sub- workshop unit of business men workshop tissue where it issues the sub- workshop account of manufacturer and the sub- workshop code key of manufacturer, manufacturer Sub- workshop account and the sub- workshop code key of manufacturer by sub- workshop workshop responsible person (or being sub- workshop responsible person) management and save; Supervision prescription workshop unit workshop tissue where it issues supervision prescription workshop account and supervision prescription workshop code key, supervision Prescription workshop account and supervision prescription workshop code key as sub- workshop supervision responsible person (i.e. supervisor shown in Fig. 5) management and It saves;Sub- plant personnel unit workshop tissue where it is distributed sub- plant personnel account and is voluntarily protected by sub- plant personnel Pipe, corresponding sub- plant personnel code key are set by staff itself;Enterprise side code key is exchanged with monitoring party code key by the first code key Agreement is generated for the first main code key into system supervisory tissue, and enterprise side unit and monitoring party unit pass through the first master respectively Code key enters the information that system supervisory tissue reports the sub- workshop unit of manufacturer and audits;The sub- workshop code key of manufacturer and prison Pipe prescription workshop code key generates the second main code key for entering sub- workshop tissue, manufacturer's by the second code key exchange agreement Workshop unit and supervision prescription workshop unit pass through the second main code key respectively and enter what sub- workshop tissue reported sub- plant personnel Information is audited and is reported;Sub- plant personnel unit is by sub- plant personnel account and sub- plant personnel code key into block chain Report merchandise news.
Specifically, enterprise side unit cannot be by monitoring party code key by enterprise side code key or monitoring party unit Enter system supervisory tissue, enterprise side unit and monitoring party unit can only enter system supervisory tissue to production by the first main code key The uplink communications of the sub- workshop unit of quotient carry out verifying signature (information reported to the sub- workshop unit of manufacturer is audited) simultaneously It externally gives out information, allows the audit of enterprise side unit and the common participation information of monitoring party unit, enhance system release information Reliability, authority.Likewise, the sub- workshop unit of manufacturer is by the sub- workshop code key of manufacturer or supervision prescription workshop unit It equally cannot enter sub- workshop by supervision prescription workshop code key to organize, the sub- workshop unit of manufacturer and supervision prescription workshop Unit can only be entered sub- workshop tissue by the second main code key and the information that sub- plant personnel reports is audited and reported.
Commodity of the invention are traced to the source block catenary system, include monitoring party unit, supervision prescription workshop unit, i.e., will supervision In department's addition system, the whole information supervision of the entire production process of commodity is realized, so that the information of publication is more authoritative Property, then effectively prevent counterfeit and shoddy goods and has occurred in the market.
Further, as shown in figure 5, commodity are traced to the source, block catenary system further includes dealer's unit, in which: dealer's unit Dealer's account and dealer's code key are issued by block catenary system Regulatory Organization, and keeping is responsible for by dealer;Dealer's unit By dealer's account and dealer's code key typing merchandise sales information into block catenary system, and by enterprise side unit and/or The audit of monitoring party unit.
Specifically, dealer's unit by after enterprise side unit and/or monitoring party unit authorization by Regulatory Organization issue through Sell quotient's account and dealer's code key, dealer's unit passes through the flowing information of this dealer's account typing commodity, such as into shipment amount, The information such as product sales volume and sales orientation.Dealer's account or dealer's code key then need dealer's unit to prison Yi Dan lost Tubing issues request, and Regulatory Organization is verified distributes dealer's account and dealer's code key for dealer after its identity again, and Delete the dealer's code key and dealer's account lost.Commodity of the invention are traced to the source block catenary system, and dealer's unit is passed through It participates in, so as to understand commodity sales state in real time, holds market trends, system availability is stronger.
It more specifically, include Leader node and Peer node in Regulatory Organization, Leader node is born by enterprise side enterprise Duty people and monitoring party supervision responsible person take on jointly, for auditing the information that each sub- workshop Leader is uploaded in tissue, and to losing The account for having lost dealer's unit sending of code key reaffirms that request gives a response, and Regulatory Organization Peer node is by each sub- workshop Leader node serves as, and the information for being responsible for uploading dealer's node is audited.Only common Peer in dealer's tissue Node is served as by dealer, is responsible for the flowing water information of typing commodity;The information that node in dealer's tissue uploads is directly by supervising Each sub- workshop Leader node audit in tubing, dealer's node is after losing code key directly into Regulatory Organization Leader node initiates request, and the Leader node in Regulatory Organization receives request and distributes after verifying the identity of dealer for it New account and code key, and delete the dealer's node for losing code key.Comprising Leader node and commonly in sub- workshop tissue Peer node, Leader node are taken on jointly by sub- workshop workshop responsible person and sub- workshop supervision responsible person, and responsible audit comes from The commodity uplink communications of employee's typing in the sub- workshop, and be responsible for reaffirming account request to what the employee's node for losing code key issued It gives a response;Employee's node in the tissue serves as the effect of common Peer node, is responsible for the typing corresponding letter of workshop commodity Breath, if issuing request to the sub- workshop tissue Leader node in place after employee's node loss code key, Leader node audits its body Distribute new account and code key for it after part.
Further, as shown in figure 5, commodity are traced to the source, block catenary system further includes client, in which: commodity are packed in workshop When, it is printed on commodity sign number, the corresponding unlocking cipher of the commodity sign number, which is logged where into commodity, organizes block chain In system;Client for inputting commodity sign number and from returning to unlocking cipher corresponding to the commodity sign number from the background, also, After client returns to unlocking cipher, block catenary system is automatically deleted the commodity sign number, when client inputs commodity mark again After knowledge number, backstage returns to sky or consumption information.
Specifically, client is the interface of the inquiring information of goods provided in commodity packaging, consumer passes through It scans the two-dimensional code and enters client;In order to improve search efficiency, by client and responsible typing commodity sign number and unlock close The sub- workshop tissue of code is directly connected to;Commodity sign number is to stamp respectively when commodity packaging workshop is packed for each commodity Commodity sign number, and will where commodity sign number and corresponding unlocking cipher typing into commodity in tissue block catenary system, from And facilitate consumer query commodity true and false.In addition, each commodity have Unique Product identification number and corresponding unlocking cipher, and every Criticizing commodity sign number amount has accurate recording, it is ensured that the certified products in coming into the market all is derived from manufacturer (i.e. enterprise side).Visitor Family end is to scan the two-dimensional code after consumer takes commodity into client, and input the corresponding commodity mark of commodity in client Knowledge number, client return to the corresponding unlocking cipher of consumer's goods identification number from backstage, can after consumer entering unlocking cipher Commodity are opened, the right to use is obtained;Client can be cell phone.In addition, once to return to the commodity sign number corresponding for system After unlocking cipher, block catenary system is automatically deleted the commodity sign number and corresponding unlocking cipher, when again in client input After this commodity sign number, system returns to sky, then shows that the corresponding commodity of this commodity sign number are consumed or this commodity is vacation, So as to avoid the true generation for packing false product problem.Every a batch commodity sign number and corresponding unlocking cipher, which have, to be put on record, really It protects the commodity that can be found from client that come into the market and all comes from the manufacturer/enterprise side, avoid fake and forged commodity to a certain extent Flowing of the commodity in market.
Commodity of the invention are traced to the source block catenary system, and input commodity sign number and returning is opened when client is used for commodity consumption Lock cipher, in addition, sky or consumption information are returned as, to prevent two time selling or the vacation of commodity after commodity consumption Emit commodity and be mixed into market, that is, ensure to come into the market in certified products be all derived from manufacturer.
Further, it is provided with Internet of Things electronic intelligent lock on commodity, passes through the unlocking two dimension on client scan commodity Code unlocks or inputs the unlocking cipher returned after commodity sign number by client and unlocks manually, and there are two types of unlocking sides for tool Formula ensure that Internet of Things electronic intelligent lock still can consume this quotient by unlocking to open manually in the case where depleted of energy Product ensure that the smooth consumption of commodity.
Further, as shown in figure 5, the sub- workshop unit of manufacturer, supervision prescription workshop unit and several sub- plant personnels Unit collectively constitutes sub- workshop tissue, and commodity block catenary system of tracing to the source includes one or more sub- workshops tissues.
In above-described embodiment that commodity of the invention trace to the source block catenary system, the first code key exchange agreement is needed in enterprise It can come into force after square business manager and monitoring party supervision responsible person both sides' typing fingerprint;And/or the second code key exchange association View needs to come into force after sub- workshop workshop responsible person and sub- workshop supervision responsible person both sides' typing fingerprint;And pass through first The first main code key that code key exchange agreement generates is all made of once with the second main code key generated by the second code key exchange agreement One close mode, so that the first main code key generated every time is different, the main code key of second generated every time is also different, i.e., every time Main code key can all change because of time difference, and the main code key generated every time is different.
Specifically, fingerprint authentication, which is added, increases security of system, multiple fingerprint authentications, example can be used according to actual needs If enterprise side business manager provides two finger prints, monitoring party supervision responsible person provides two finger prints, thus safety Property is higher.In addition, fingerprint authentication process of the invention only has chance three times, and agreement verification information is regularly updated, that is, needed double Side re-types different fingerprints as the condition for opening code key exchange agreement.
Code key as shown in figure 3, a kind of commodity of above-described embodiment of the invention are traced to the source in block catenary system is saved and is looked for Back method, the enterprise side code key, and/or monitoring party code key, and/or the sub- workshop code key of manufacturer, and/or supervision prescription workshop Code key is saved by image secret division, specifically includes the following steps:
(a1) a secondary watermark is made in key information by corresponding code key preserver, and carries out coding encrypting to watermark;
(a2) sub-picture is selected, and Fourier transformation is carried out to described image, obtains the frequency domain of image;
(a3) watermark after coding encrypting that step (a1) obtains is merged with the frequency domain image that step (a2) obtains Afterwards, it carries out inverse Fourier transform and obtains watermarking images so that the watermark after coding encrypting is hidden in frequency domain image;
(a4) watermarking images that step (a3) obtains are encrypted with resume image, obtain encrypted watermark figure Picture;
(a5) the encrypted watermark image that step (a4) obtains is divided into N section shadow with Secret Image partitioning algorithm, and The thresholding M that can restore image is set;
(a6) the N section shadow that step (a5) obtains is stored under encrypted U disk middle line and is distributed to the position the N employee randomly selected Keeping, and imply typing in the N section shadow and correspond to employee information;It include N-M useless shadows in N section shadow, Before Restore Secret image, employee does not know whether the shadow oneself possessed is effective.
Further, it is all implied with watermark identifier number in every part shadow, corresponds to the work number information of employee, once this shadow Leakage, can trace back to employee, so having certain binding character to employee itself.Every employee for taking shadow is responsible for Shadow is kept, is provided when code key holder needs for it.
Further, as shown in figure 4, the code key method for retrieving saved by image secret division, specifically include with Lower step:
(b1) order is recalled to the shadow sending of employee's keeping under code key preserver line;
(b2) M effective shadows are randomly selected in the N number of shadow recalled;
(b3) image reconstruction algorithm is utilized, encrypted watermark image is reconstructed;
(b4) using the encrypted watermark image reconstructed in image decryption algorithm decryption step (b3), watermarking images are obtained, And obtained watermarking images are subjected to Fourier transformation;
(b5) image that code key preserver selects step (a2) carries out Fourier transformation;
(b6) watermarking images that step (b4) is fourier transformed Fourier transformation is carried out with step (b5) to obtain Image merged to obtain the watermark after coding encrypting;
(b7) watermark after the coding encrypting that decoding step (b6) obtains, recovers watermark;
(b8) key information is read according to the watermark that step (b7) obtains.
Further, watermark is code key plaintext, and the watermark that step (b7) recovers is code key plaintext;Certain this field skill Art personnel also can choose watermark is two dimensional code, bar code etc., by scanning the two-dimensional code or bar code reads key information, but It is, if setting two dimensional code for watermark, then there may be because being distorted to read scanner can not for the watermark recovered The case where information on two dimensional code, cannot get watermark, it is preferred, therefore, that watermark using code key in plain text.
Further, the image of step (a2) selection can disclose, so as to avoid the loss of image.
Further, after sub- plant personnel account or sub- plant personnel password loss, it need to apply for again account to tissue.
Code key of the invention saves and method for retrieving, and watermark uses the adding method of frequency domain blind watermatking, makes the concealment of watermark Property, attack tolerant are stronger;In addition, the image after traditional images secret division can make image generation a degree of when reconstructing again Distortion, thus the case where in the presence of key information can not be extracted, and code key of the invention saves and method for retrieving, using digital watermarking Mode, image grayscale etc. will not influence the extraction of key information in relation to distortion situation, thus code key of the invention is saved and looked for Back method combines image thresholding secret division technology with digital watermark technology, so that the preservation of code key is safer, extracts more Reliably.
The present invention is further described by specific embodiment above, it should be understood that, here specifically Description, should not be construed as the restriction for the essence of the present invention with range, and one of ordinary skilled in the art is reading this explanation The various modifications made after book to above-described embodiment belong to the range that the present invention is protected.

Claims (10)

  1. The block catenary system 1. a kind of commodity are traced to the source, which is characterized in that including enterprise side unit, monitoring party unit, the sub- vehicle of manufacturer Between unit, supervision prescription workshop unit, several sub- plant personnel units, in which:
    The enterprise side unit issues enterprise side account and enterprise side code key, enterprise by the MSP in block catenary system Regulatory Organization Square account and enterprise side code key are managed and are saved by enterprise side business manager;
    The monitoring party unit issues monitoring party account and monitoring party code key by the MSP in block catenary system Regulatory Organization, supervision Square account and monitoring party code key by monitoring party supervision responsible person management and save;
    The sub- workshop unit of manufacturer sub- workshop tissue where it issues the sub- workshop account of manufacturer and the sub- workshop of manufacturer Code key, the sub- workshop account of manufacturer and the sub- workshop code key of manufacturer are managed and are saved by sub- workshop workshop responsible person;
    The supervision prescription workshop unit workshop tissue where it issues supervision prescription workshop account and supervision prescription workshop Code key, supervision prescription workshop account and supervision prescription workshop code key are by sub- workshop supervision responsible person management and save;
    The sub- plant personnel unit by workshop tissue where it distribute sub- plant personnel account and by sub- plant personnel voluntarily Keeping, corresponding sub- plant personnel code key are set by staff itself;
    The enterprise side code key and the monitoring party code key are generated by the first code key exchange agreement for entering system supervisory group The main code key of first knitted, the enterprise side unit and the monitoring party unit enter system prison by the described first main code key respectively The information that tubing reports the sub- workshop unit of manufacturer is audited;
    The sub- workshop code key of manufacturer and the supervision prescription workshop code key by the generation of the second code key exchange agreement for into Enter the second main code key of sub- workshop tissue, the sub- workshop unit of manufacturer and supervision prescription workshop unit pass through institute respectively It states the second main code key and enters sub- workshop tissue and the information that sub- plant personnel reports is audited and reported;
    The sub- plant personnel unit reports commodity to believe by sub- plant personnel account and sub- plant personnel code key into block chain Breath.
  2. The block catenary system 2. commodity according to claim 1 are traced to the source, which is characterized in that the commodity are traced to the source block catenary system It further include dealer's unit, in which:
    Dealer's unit issues dealer's account and dealer's code key by block catenary system Regulatory Organization, and is born by dealer Duty keeping;
    Dealer's unit passes through dealer's account and dealer's code key typing merchandise sales information into block catenary system, and by institute State enterprise side unit and/or monitoring party unit audit.
  3. The block catenary system 3. commodity according to claim 1 are traced to the source, which is characterized in that the commodity are traced to the source block catenary system It further include client, in which:
    Commodity are printed on commodity sign number when workshop is packed, the corresponding unlocking cipher of the commodity sign number be logged into Where the commodity in tissue block catenary system;
    Client is worked as inputting commodity sign number and from returning to unlocking cipher corresponding to the commodity sign number from the background After client returns to unlocking cipher, block catenary system is automatically deleted the commodity sign number, when client inputs commodity sign again After number, backstage returns to sky or consumption information.
  4. The block catenary system 4. commodity according to claim 1 are traced to the source, which is characterized in that the sub- workshop unit of the manufacturer, Supervision prescription workshop unit collectively constitutes sub- workshop with several sub- plant personnel units and organizes, and the commodity are traced to the source block linkwork System includes one or more sub- workshop tissues.
  5. The block catenary system 5. commodity according to claim 1 are traced to the source, it is characterised in that:
    The first code key exchange agreement needs to supervise responsible person both sides' typing fingerprint in enterprise side business manager and monitoring party After can come into force;
    And/or the second code key exchange agreement is needed in sub- workshop workshop responsible person and sub- workshop supervision responsible person both sides' record It can come into force after entering fingerprint.
  6. The block catenary system 6. commodity according to claim 3 are traced to the source, which is characterized in that Internet of Things electronics is provided on commodity Smart lock is unlocked by the unlocking two dimensional code on client scan commodity or is returned after inputting commodity sign number by client The unlocking cipher returned is unlocked manually.
  7. A kind of code key 7. commodity described in any one of claims 1-6 are traced to the source in block catenary system saves and method for retrieving, It is characterized in that, the enterprise side code key, and/or monitoring party code key, and/or the sub- workshop code key of manufacturer, and/or supervision prescription vehicle Between code key saved by image secret division, specifically includes the following steps:
    (a1) a secondary watermark is made in key information by corresponding code key preserver, and carries out coding encrypting to the watermark;
    (a2) sub-picture is selected, and Fourier transformation is carried out to described image, obtains the frequency domain of described image;
    (a3) after the watermark after coding encrypting that step (a1) obtains being merged with the frequency domain image that step (a2) obtains, into Row inverse Fourier transform obtains watermarking images so that the watermark after coding encrypting is hidden in frequency domain image;
    (a4) watermarking images that step (a3) obtains are encrypted with resume image, obtain encrypted watermark image;
    (a5) the encrypted watermark image that step (a4) obtains is divided into N section shadow with Secret Image partitioning algorithm, and be arranged It can restore the thresholding M of image;
    (a6) the N section shadow that step (a5) obtains is distributed to the N position employee keeping randomly selected, and in the N section shadow Typing is implied in son corresponds to employee information.
  8. 8. code key according to claim 7 saves and method for retrieving, which is characterized in that protected by image secret division The code key method for retrieving deposited, specifically includes the following steps:
    (b1) order is recalled to the shadow sending of employee's keeping under code key preserver line;
    (b2) M effective shadows are randomly selected in the N number of shadow recalled;
    (b3) image reconstruction algorithm is utilized, encrypted watermark image is reconstructed;
    (b4) using the encrypted watermark image reconstructed in image decryption algorithm decryption step (b3), watermarking images are obtained, and will Obtained watermarking images carry out Fourier transformation;
    (b5) image that code key preserver selects step (a2) carries out Fourier transformation;
    (b6) watermarking images and step (b5) that step (b4) is fourier transformed are subjected to the figure that Fourier transformation obtains As being merged to obtain the watermark after coding encrypting;
    (b7) watermark after the coding encrypting that decoding step (b6) obtains, recovers watermark;
    (b8) key information is read according to the watermark that step (b7) obtains.
  9. 9. code key according to claim 7 saves and method for retrieving, which is characterized in that the watermark is code key plaintext.
  10. 10. code key according to claim 7 saves and method for retrieving, which is characterized in that the image of step (a2) selection can It is open.
CN201910313998.3A 2019-04-18 2019-04-18 A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving Pending CN110084622A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910313998.3A CN110084622A (en) 2019-04-18 2019-04-18 A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910313998.3A CN110084622A (en) 2019-04-18 2019-04-18 A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving

Publications (1)

Publication Number Publication Date
CN110084622A true CN110084622A (en) 2019-08-02

Family

ID=67415514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910313998.3A Pending CN110084622A (en) 2019-04-18 2019-04-18 A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving

Country Status (1)

Country Link
CN (1) CN110084622A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111385102A (en) * 2020-03-20 2020-07-07 浙江传媒学院 Video copyright transaction tracing method based on parent chain
CN114936354A (en) * 2022-05-20 2022-08-23 浙江云程信息科技有限公司 Information processing method and device for engineering supervision

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001054053A1 (en) * 2000-01-24 2001-07-26 Ecole Polytechnique Federale De Lausanne Transform domain allocation for multimedia watermarking
CN104200424A (en) * 2014-08-29 2014-12-10 陕西师范大学 Difference conversion based (K, N) meaningful image sharing and recovering method
CN106845960A (en) * 2017-01-24 2017-06-13 上海亿账通区块链科技有限公司 Method for secure transactions and system based on block chain
CN106934624A (en) * 2017-01-04 2017-07-07 毛德操 The method that the block chain of witness formula fingerprint is used in input front end
CN107038638A (en) * 2017-02-24 2017-08-11 杭州象链网络技术有限公司 A kind of equity registration transaction system construction method based on alliance's chain
EP3242265A1 (en) * 2016-05-02 2017-11-08 Chicago Mercantile Exchange, Inc. Bilateral assertion model and ledger implementation thereof
CN107395349A (en) * 2017-08-16 2017-11-24 深圳国微技术有限公司 A kind of block chain network cryptographic key distribution method based on self-certified public key system
CN107464304A (en) * 2017-07-24 2017-12-12 深圳市中谷联创信息服务有限公司 One kind can the shared packing case system of back-tracing anti-fake and its implementation
CN108320156A (en) * 2018-02-02 2018-07-24 上海二秒科技有限公司 A kind of Private key management system based on block chain technology
CN108764907A (en) * 2018-05-30 2018-11-06 招商银行股份有限公司 Assets method for retrieving, system and computer readable storage medium
CN108805585A (en) * 2018-05-28 2018-11-13 广州中国科学院软件应用技术研究所 Distributed commodity data storage system, circulation and source tracing method based on block chain
CN109003099A (en) * 2018-06-19 2018-12-14 西安邮电大学 Block chain node data processing method, equipment and storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001054053A1 (en) * 2000-01-24 2001-07-26 Ecole Polytechnique Federale De Lausanne Transform domain allocation for multimedia watermarking
CN104200424A (en) * 2014-08-29 2014-12-10 陕西师范大学 Difference conversion based (K, N) meaningful image sharing and recovering method
EP3242265A1 (en) * 2016-05-02 2017-11-08 Chicago Mercantile Exchange, Inc. Bilateral assertion model and ledger implementation thereof
CN106934624A (en) * 2017-01-04 2017-07-07 毛德操 The method that the block chain of witness formula fingerprint is used in input front end
CN106845960A (en) * 2017-01-24 2017-06-13 上海亿账通区块链科技有限公司 Method for secure transactions and system based on block chain
CN107038638A (en) * 2017-02-24 2017-08-11 杭州象链网络技术有限公司 A kind of equity registration transaction system construction method based on alliance's chain
CN107464304A (en) * 2017-07-24 2017-12-12 深圳市中谷联创信息服务有限公司 One kind can the shared packing case system of back-tracing anti-fake and its implementation
CN107395349A (en) * 2017-08-16 2017-11-24 深圳国微技术有限公司 A kind of block chain network cryptographic key distribution method based on self-certified public key system
CN108320156A (en) * 2018-02-02 2018-07-24 上海二秒科技有限公司 A kind of Private key management system based on block chain technology
CN108805585A (en) * 2018-05-28 2018-11-13 广州中国科学院软件应用技术研究所 Distributed commodity data storage system, circulation and source tracing method based on block chain
CN108764907A (en) * 2018-05-30 2018-11-06 招商银行股份有限公司 Assets method for retrieving, system and computer readable storage medium
CN109003099A (en) * 2018-06-19 2018-12-14 西安邮电大学 Block chain node data processing method, equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
吕英华: "信息隐藏相关方法及应用的研究", 《中国博士学位论文全文数据库 信息科技辑》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111385102A (en) * 2020-03-20 2020-07-07 浙江传媒学院 Video copyright transaction tracing method based on parent chain
CN111385102B (en) * 2020-03-20 2021-05-11 浙江传媒学院 Video copyright transaction tracing method based on parent chain
CN114936354A (en) * 2022-05-20 2022-08-23 浙江云程信息科技有限公司 Information processing method and device for engineering supervision
CN114936354B (en) * 2022-05-20 2023-02-17 浙江云程信息科技有限公司 Information processing method and device for engineering supervision

Similar Documents

Publication Publication Date Title
JP3768249B2 (en) For identifying objects and other entities and apparatus for producing identification cards
DE69932512T2 (en) DEVICE AND METHOD FOR ELECTRONIC SHIPPING, STORAGE AND RECOVERY OF AUTHENTICATED DOCUMENTS
CN103679436B (en) A kind of electronic contract security system and method based on biological information identification
JP5139415B2 (en) Article information acquisition method and apparatus
CN101676923B (en) Biometric processing using random projection transforms
PL182163B1 (en) System for and method of verifying a document
AU2012345478B2 (en) A method of generation and transmission of secure tokens based on tokens generated by TRNG and split into shares and the system thereof
US20080310619A1 (en) Process of Encryption and Operational Control of Tagged Data Elements
US7561049B2 (en) Scope reduction of RFID medium
CA2374196A1 (en) Legitimacy protection of electronic document and a printed copy thereof
CN104217241A (en) Electronic anti-fake label and realizing method
CN106934624A (en) The method that the block chain of witness formula fingerprint is used in input front end
CN102622624B (en) A kind of commodity counterfeit prevention identification system and method
CN110889697A (en) Block chain-based railway system and using method thereof
CN110084622A (en) A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving
CN110851530A (en) Block chain based shared economic credible transaction method
CN108629603A (en) A kind of antiforge method for commodities based on Quick Response Code
CN102289869A (en) Credit card antitheft method based on image sharing and system thereof
CN107786546A (en) A kind of red wine anti-fake traceability system based on privately owned chain
US9779256B2 (en) Iamnotanumber© card system: an image-based technique for the creation and deployment of numberless card systems
CN111861500A (en) Traceability anti-counterfeiting system and traceability anti-counterfeiting method
JP7456009B2 (en) Methods for authenticating items
CN108875870A (en) The creation of binary graphics coding, authentication method and system
Najera et al. Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents.
King et al. Applying RFID to secure the pharmaceutical supply chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190802