CN110084622A - A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving - Google Patents
A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving Download PDFInfo
- Publication number
- CN110084622A CN110084622A CN201910313998.3A CN201910313998A CN110084622A CN 110084622 A CN110084622 A CN 110084622A CN 201910313998 A CN201910313998 A CN 201910313998A CN 110084622 A CN110084622 A CN 110084622A
- Authority
- CN
- China
- Prior art keywords
- code key
- workshop
- sub
- commodity
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Economics (AREA)
- Bioethics (AREA)
- Entrepreneurship & Innovation (AREA)
- Finance (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Accounting & Taxation (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to trace to the source block catenary system and code keys of commodity tracing technology field more particularly to a kind of commodity to save and method for retrieving.Commodity of the invention are traced to the source block catenary system, including enterprise side unit, monitoring party unit, the sub- workshop unit of manufacturer, supervision prescription workshop unit, several sub- plant personnel units, it will be in supervision department's addition system, realize the whole information supervision of the entire production process of commodity, so that the information of publication is more authoritative, counterfeit and shoddy goods is then effectively prevented and have occurred in the market.Code key of the invention saves and method for retrieving, and watermark uses the adding method of frequency domain blind watermatking, keeps the invisible of watermark, attack tolerant stronger;Furthermore, by the way of digital watermarking, image grayscale etc. will not influence the extraction of key information in relation to distortion situation, thus code key preservation of the invention combines image thresholding secret division technology with digital watermark technology with method for retrieving, so that the preservation of code key is safer, it is more reliable to extract.
Description
Technical field
The present invention relates to commodity tracing technology field more particularly to a kind of commodity trace to the source block catenary system and code key save with
Method for retrieving.
Background technique
As people increase commercial quality requirement, more and more enterprises, investment institution enter commodity and trace to the source this
A field, block chain technology are also applied in this area.But since the anonymity of block chain technology makes in reality
The problems such as can not giving for change after losing in there are the supervision of information, private key in some problems, such as block chain, these problems are tight
The application of block chain technology in practice is constrained again.In addition, in terms of commodity counterfeit prevention identification, although there is many solutions,
But still counterfeit and shoddy goods cannot be prevented completely and occurred in the market.Therefore, it is necessary to trace to the source block to existing goods
Catenary system improves, to meet actual needs.
Summary of the invention
It traces to the source block catenary system it is an object of the present invention to provide a kind of commodity, by supervision department's addition system,
Realize that the whole information supervision of the entire production process of commodity then effectively prevents so that the information of publication is more authoritative
Counterfeit and shoddy goods in the market occur;It traces to the source block chain it is another object of the present invention to provide a kind of above-mentioned commodity
Code key in system saves and method for retrieving, by the way that watermark is made in key information and by encrypted watermark and frequency domain image co-registration,
To realize that code key is taken care of in employee's hand by image segmentation, then can be achieved to give for change after code key loss.
To achieve the goals above, it traces to the source block catenary system the present invention provides a kind of commodity, which is characterized in that including enterprise
Industry Fang Danyuan, monitoring party unit, the sub- workshop unit of manufacturer, supervision prescription workshop unit, several sub- plant personnel units,
In: enterprise side unit issues enterprise side account and enterprise side code key, enterprise side account by the MSP in block catenary system Regulatory Organization
It is managed and is saved by enterprise side business manager with enterprise side code key;Monitoring party unit is by block catenary system Regulatory Organization
MSP issues monitoring party account and monitoring party code key, monitoring party account and monitoring party code key by monitoring party supervision responsible person management and
It saves;Sub- workshop tissue issues the sub- workshop account of manufacturer to the sub- workshop unit of manufacturer where it and the sub- workshop of manufacturer is secret
Key, the sub- workshop account of manufacturer and the sub- workshop code key of manufacturer are managed and are saved by sub- workshop workshop responsible person;Supervise prescription vehicle
Between unit supervision prescription workshop account and supervision prescription workshop code key issued by workshop tissue where it, supervise prescription workshop account
Number and supervision prescription workshop code key by sub- workshop supervision responsible person management and save;Sub- plant personnel unit workshop where it
Tissue is distributed sub- plant personnel account and is voluntarily taken care of by sub- plant personnel, and corresponding sub- plant personnel code key is set by staff itself
It is fixed;It is main that enterprise side code key and monitoring party code key pass through the first code key exchange agreement is generated for entering system supervisory tissue first
Code key, enterprise side unit and monitoring party unit pass through the first main code key respectively and enter system supervisory tissue to manufacturer sub- workshop list
The information that member reports is audited;The sub- workshop code key of manufacturer and supervision prescription workshop code key are raw by the second code key exchange agreement
At the second main code key for entering sub- workshop tissue, the sub- workshop unit of manufacturer and supervision prescription workshop unit pass through the respectively
Two main code keys enter sub- workshop tissue and the information that sub- plant personnel reports are audited and reported;Sub- plant personnel unit passes through
Sub- plant personnel account and sub- plant personnel code key report merchandise news into block chain.
Further, commodity block catenary system of tracing to the source further includes dealer's unit, in which: dealer's unit is by block linkwork
System Regulatory Organization issues dealer's account and dealer's code key, and is responsible for keeping by dealer;Dealer's unit passes through dealer
Account and dealer's code key typing merchandise sales information into block catenary system, and by enterprise side unit and/or monitoring party unit
Audit.
Further, commodity block catenary system of tracing to the source further includes client, in which: commodity are printed on quotient when workshop is packed
Product identification number, the corresponding unlocking cipher of commodity sign number are logged where into commodity in tissue block catenary system;Client
For inputting commodity sign number and from returning to unlocking cipher corresponding to the commodity sign number from the background, also, when client returns
After unlocking cipher, block catenary system is automatically deleted the commodity sign number, after client inputs commodity sign again, returns from the background
Make the return trip empty or consumption information.
Further, the sub- workshop unit of manufacturer, supervision prescription workshop unit and several common group of sub- plant personnel units
It is organized at sub- workshop, commodity block catenary system of tracing to the source includes one or more sub- workshops tissue.
Further, the first code key exchange agreement needs to supervise responsible person both sides in enterprise side business manager and monitoring party
It can come into force after typing fingerprint;And/or second code key exchange agreement need it is negative in sub- workshop workshop responsible person and the supervision of sub- workshop
It can come into force after duty people both sides' typing fingerprint.
Further, it is provided with Internet of Things electronic intelligent lock on commodity, passes through the unlocking two dimension on client scan commodity
Code unlocks or inputs the unlocking cipher returned after commodity sign number by client and unlocks manually.
A kind of commodity of the invention are traced to the source block catenary system, are had the advantages that
1, commodity of the invention are traced to the source block catenary system, include monitoring party unit, supervision prescription workshop unit, i.e., will prison
In pipe portion door addition system, the whole information supervision of the entire production process of commodity is realized, so that the information of publication is more weighed
Prestige has then effectively prevented counterfeit and shoddy goods and has occurred in the market.
2, commodity of the invention are traced to the source block catenary system, further include having dealer's unit, so as to understand commodity in real time
Condition of sales, system availability are stronger.
3, commodity of the invention are traced to the source block catenary system, further include having client, are used to input commodity mark when commodity consumption
Knowledge number simultaneously returns to unlocking cipher, in addition, sky or consumption information are returned as, to prevent the two of commodity after commodity consumption
It is secondary sale or counterfeit goods be mixed into market, that is, ensure to come into the market in certified products be all derived from manufacturer.
4, commodity of the invention are traced to the source block catenary system, and the first code key exchange agreement and/or the second code key exchange agreement need
It can come into force after fingerprint authentication, to further enhance security of system.
5, commodity of the invention are traced to the source block catenary system, and Internet of Things electronic intelligent lock is provided on commodity, and there are two types of having
Unlocking mode ensure that Internet of Things electronic intelligent lock still can open consumption by unlocking manually in the case where depleted of energy
This commodity ensure that the smooth consumption of commodity.
The present invention also provides a kind of above-mentioned commodity code keys in block catenary system of tracing to the source to save and method for retrieving, feature
It is, enterprise side code key, and/or monitoring party code key, and/or the sub- workshop code key of manufacturer, and/or supervision prescription workshop code key are logical
Image secret division is crossed to be saved, specifically includes the following steps:
(a1) a secondary watermark is made in key information by corresponding code key preserver, and carries out coding encrypting to watermark;
(a2) sub-picture is selected, and Fourier transformation is carried out to image, obtains the frequency domain of image;
(a3) watermark after coding encrypting that step (a1) obtains is merged with the frequency domain image that step (a2) obtains
Afterwards, it carries out inverse Fourier transform and obtains watermarking images so that the watermark after coding encrypting is hidden in frequency domain image;
(a4) watermarking images that step (a3) obtains are encrypted with resume image, obtain encrypted watermark figure
Picture;
(a5) the encrypted watermark image that step (a4) obtains is divided into N section shadow with Secret Image partitioning algorithm, and
The thresholding M that can restore image is set;
(a6) the N section shadow that step (a5) obtains is distributed to the N position employee keeping randomly selected, and in N section shadow
Typing is implied in son corresponds to employee information.
Further, the code key method for retrieving saved by image secret division, specifically includes the following steps:
(b1) order is recalled to the shadow sending of employee's keeping under code key preserver line;
(b2) M effective shadows are randomly selected in the N number of shadow recalled;
(b3) image reconstruction algorithm is utilized, encrypted watermark image is reconstructed;
(b4) using the encrypted watermark image reconstructed in image decryption algorithm decryption step (b3), watermarking images are obtained,
And obtained watermarking images are subjected to Fourier transformation;
(b5) image that code key preserver selects step (a2) carries out Fourier transformation;
(b6) watermarking images that step (b4) is fourier transformed Fourier transformation is carried out with step (b5) to obtain
Image merged to obtain the watermark after coding encrypting;
(b7) watermark after the coding encrypting that decoding step (b6) obtains, recovers watermark;
(b8) key information is read according to the watermark that step (b7) obtains.
Further, watermark is code key plaintext.
Further, the image of step (a2) selection can disclose.
A kind of code key of the invention saves and method for retrieving, has the advantages that
Code key of the invention saves and method for retrieving, and code key is incorporated in image in the form of watermark, and watermark uses frequency domain
The adding method of blind watermatking keeps the invisible of watermark, attack tolerant stronger;In addition, the image after traditional images secret division is again
It can make image that a degree of distortion occur when secondary reconstruct, thus the case where in the presence of key information can not be extracted, and it is of the invention
Code key saves and method for retrieving, and by the way of digital watermarking, the related distortion situation such as image grayscale will not influence key information
Extraction, thus code key of the invention preservation mutually ties image thresholding secret division technology with digital watermark technology with method for retrieving
It closes, so that the preservation of code key is safer, it is more reliable to extract.
Detailed description of the invention
Illustrate the embodiment of the present invention or technical solution in the prior art in order to clearer, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it is clear that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is that commodity of the invention are traced to the source the first main code key product process figure of block catenary system;
Fig. 2 is that commodity of the invention are traced to the source the second main code key product process figure of block catenary system;
Fig. 3 is code key store method flow chart of the invention;
Fig. 4 is code key method for retrieving flow chart of the invention;
Fig. 5 is that commodity of the invention are traced to the source the overall structure figure of block catenary system;
Specific embodiment
Below in conjunction with the attached drawing in the present invention, technical solution in the embodiment of the present invention carry out it is clear, completely retouch
It states, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on the present invention
In embodiment, those skilled in the art's all other reality obtained without making creative work
Example is applied, protection scope of the present invention is belonged to.
As shown in Figure 1, Figure 2, Figure 5, a kind of commodity of the embodiment of the present invention are traced to the source block catenary system, including enterprise side list
Member, monitoring party unit, the sub- workshop unit of manufacturer, supervision prescription workshop unit, several sub- plant personnel units, in which: enterprise
Fang Danyuan issues enterprise side account and enterprise side code key, enterprise side account and enterprise by the MSP in block catenary system Regulatory Organization
Square code key is managed and is saved by enterprise side business manager;Monitoring party unit is issued by the MSP in block catenary system Regulatory Organization
Monitoring party account and monitoring party code key, monitoring party account and monitoring party code key are by monitoring party supervision responsible person management and save;It is raw
The sub- workshop unit of business men workshop tissue where it issues the sub- workshop account of manufacturer and the sub- workshop code key of manufacturer, manufacturer
Sub- workshop account and the sub- workshop code key of manufacturer by sub- workshop workshop responsible person (or being sub- workshop responsible person) management and save;
Supervision prescription workshop unit workshop tissue where it issues supervision prescription workshop account and supervision prescription workshop code key, supervision
Prescription workshop account and supervision prescription workshop code key as sub- workshop supervision responsible person (i.e. supervisor shown in Fig. 5) management and
It saves;Sub- plant personnel unit workshop tissue where it is distributed sub- plant personnel account and is voluntarily protected by sub- plant personnel
Pipe, corresponding sub- plant personnel code key are set by staff itself;Enterprise side code key is exchanged with monitoring party code key by the first code key
Agreement is generated for the first main code key into system supervisory tissue, and enterprise side unit and monitoring party unit pass through the first master respectively
Code key enters the information that system supervisory tissue reports the sub- workshop unit of manufacturer and audits;The sub- workshop code key of manufacturer and prison
Pipe prescription workshop code key generates the second main code key for entering sub- workshop tissue, manufacturer's by the second code key exchange agreement
Workshop unit and supervision prescription workshop unit pass through the second main code key respectively and enter what sub- workshop tissue reported sub- plant personnel
Information is audited and is reported;Sub- plant personnel unit is by sub- plant personnel account and sub- plant personnel code key into block chain
Report merchandise news.
Specifically, enterprise side unit cannot be by monitoring party code key by enterprise side code key or monitoring party unit
Enter system supervisory tissue, enterprise side unit and monitoring party unit can only enter system supervisory tissue to production by the first main code key
The uplink communications of the sub- workshop unit of quotient carry out verifying signature (information reported to the sub- workshop unit of manufacturer is audited) simultaneously
It externally gives out information, allows the audit of enterprise side unit and the common participation information of monitoring party unit, enhance system release information
Reliability, authority.Likewise, the sub- workshop unit of manufacturer is by the sub- workshop code key of manufacturer or supervision prescription workshop unit
It equally cannot enter sub- workshop by supervision prescription workshop code key to organize, the sub- workshop unit of manufacturer and supervision prescription workshop
Unit can only be entered sub- workshop tissue by the second main code key and the information that sub- plant personnel reports is audited and reported.
Commodity of the invention are traced to the source block catenary system, include monitoring party unit, supervision prescription workshop unit, i.e., will supervision
In department's addition system, the whole information supervision of the entire production process of commodity is realized, so that the information of publication is more authoritative
Property, then effectively prevent counterfeit and shoddy goods and has occurred in the market.
Further, as shown in figure 5, commodity are traced to the source, block catenary system further includes dealer's unit, in which: dealer's unit
Dealer's account and dealer's code key are issued by block catenary system Regulatory Organization, and keeping is responsible for by dealer;Dealer's unit
By dealer's account and dealer's code key typing merchandise sales information into block catenary system, and by enterprise side unit and/or
The audit of monitoring party unit.
Specifically, dealer's unit by after enterprise side unit and/or monitoring party unit authorization by Regulatory Organization issue through
Sell quotient's account and dealer's code key, dealer's unit passes through the flowing information of this dealer's account typing commodity, such as into shipment amount,
The information such as product sales volume and sales orientation.Dealer's account or dealer's code key then need dealer's unit to prison Yi Dan lost
Tubing issues request, and Regulatory Organization is verified distributes dealer's account and dealer's code key for dealer after its identity again, and
Delete the dealer's code key and dealer's account lost.Commodity of the invention are traced to the source block catenary system, and dealer's unit is passed through
It participates in, so as to understand commodity sales state in real time, holds market trends, system availability is stronger.
It more specifically, include Leader node and Peer node in Regulatory Organization, Leader node is born by enterprise side enterprise
Duty people and monitoring party supervision responsible person take on jointly, for auditing the information that each sub- workshop Leader is uploaded in tissue, and to losing
The account for having lost dealer's unit sending of code key reaffirms that request gives a response, and Regulatory Organization Peer node is by each sub- workshop
Leader node serves as, and the information for being responsible for uploading dealer's node is audited.Only common Peer in dealer's tissue
Node is served as by dealer, is responsible for the flowing water information of typing commodity;The information that node in dealer's tissue uploads is directly by supervising
Each sub- workshop Leader node audit in tubing, dealer's node is after losing code key directly into Regulatory Organization
Leader node initiates request, and the Leader node in Regulatory Organization receives request and distributes after verifying the identity of dealer for it
New account and code key, and delete the dealer's node for losing code key.Comprising Leader node and commonly in sub- workshop tissue
Peer node, Leader node are taken on jointly by sub- workshop workshop responsible person and sub- workshop supervision responsible person, and responsible audit comes from
The commodity uplink communications of employee's typing in the sub- workshop, and be responsible for reaffirming account request to what the employee's node for losing code key issued
It gives a response;Employee's node in the tissue serves as the effect of common Peer node, is responsible for the typing corresponding letter of workshop commodity
Breath, if issuing request to the sub- workshop tissue Leader node in place after employee's node loss code key, Leader node audits its body
Distribute new account and code key for it after part.
Further, as shown in figure 5, commodity are traced to the source, block catenary system further includes client, in which: commodity are packed in workshop
When, it is printed on commodity sign number, the corresponding unlocking cipher of the commodity sign number, which is logged where into commodity, organizes block chain
In system;Client for inputting commodity sign number and from returning to unlocking cipher corresponding to the commodity sign number from the background, also,
After client returns to unlocking cipher, block catenary system is automatically deleted the commodity sign number, when client inputs commodity mark again
After knowledge number, backstage returns to sky or consumption information.
Specifically, client is the interface of the inquiring information of goods provided in commodity packaging, consumer passes through
It scans the two-dimensional code and enters client;In order to improve search efficiency, by client and responsible typing commodity sign number and unlock close
The sub- workshop tissue of code is directly connected to;Commodity sign number is to stamp respectively when commodity packaging workshop is packed for each commodity
Commodity sign number, and will where commodity sign number and corresponding unlocking cipher typing into commodity in tissue block catenary system, from
And facilitate consumer query commodity true and false.In addition, each commodity have Unique Product identification number and corresponding unlocking cipher, and every
Criticizing commodity sign number amount has accurate recording, it is ensured that the certified products in coming into the market all is derived from manufacturer (i.e. enterprise side).Visitor
Family end is to scan the two-dimensional code after consumer takes commodity into client, and input the corresponding commodity mark of commodity in client
Knowledge number, client return to the corresponding unlocking cipher of consumer's goods identification number from backstage, can after consumer entering unlocking cipher
Commodity are opened, the right to use is obtained;Client can be cell phone.In addition, once to return to the commodity sign number corresponding for system
After unlocking cipher, block catenary system is automatically deleted the commodity sign number and corresponding unlocking cipher, when again in client input
After this commodity sign number, system returns to sky, then shows that the corresponding commodity of this commodity sign number are consumed or this commodity is vacation,
So as to avoid the true generation for packing false product problem.Every a batch commodity sign number and corresponding unlocking cipher, which have, to be put on record, really
It protects the commodity that can be found from client that come into the market and all comes from the manufacturer/enterprise side, avoid fake and forged commodity to a certain extent
Flowing of the commodity in market.
Commodity of the invention are traced to the source block catenary system, and input commodity sign number and returning is opened when client is used for commodity consumption
Lock cipher, in addition, sky or consumption information are returned as, to prevent two time selling or the vacation of commodity after commodity consumption
Emit commodity and be mixed into market, that is, ensure to come into the market in certified products be all derived from manufacturer.
Further, it is provided with Internet of Things electronic intelligent lock on commodity, passes through the unlocking two dimension on client scan commodity
Code unlocks or inputs the unlocking cipher returned after commodity sign number by client and unlocks manually, and there are two types of unlocking sides for tool
Formula ensure that Internet of Things electronic intelligent lock still can consume this quotient by unlocking to open manually in the case where depleted of energy
Product ensure that the smooth consumption of commodity.
Further, as shown in figure 5, the sub- workshop unit of manufacturer, supervision prescription workshop unit and several sub- plant personnels
Unit collectively constitutes sub- workshop tissue, and commodity block catenary system of tracing to the source includes one or more sub- workshops tissues.
In above-described embodiment that commodity of the invention trace to the source block catenary system, the first code key exchange agreement is needed in enterprise
It can come into force after square business manager and monitoring party supervision responsible person both sides' typing fingerprint;And/or the second code key exchange association
View needs to come into force after sub- workshop workshop responsible person and sub- workshop supervision responsible person both sides' typing fingerprint;And pass through first
The first main code key that code key exchange agreement generates is all made of once with the second main code key generated by the second code key exchange agreement
One close mode, so that the first main code key generated every time is different, the main code key of second generated every time is also different, i.e., every time
Main code key can all change because of time difference, and the main code key generated every time is different.
Specifically, fingerprint authentication, which is added, increases security of system, multiple fingerprint authentications, example can be used according to actual needs
If enterprise side business manager provides two finger prints, monitoring party supervision responsible person provides two finger prints, thus safety
Property is higher.In addition, fingerprint authentication process of the invention only has chance three times, and agreement verification information is regularly updated, that is, needed double
Side re-types different fingerprints as the condition for opening code key exchange agreement.
Code key as shown in figure 3, a kind of commodity of above-described embodiment of the invention are traced to the source in block catenary system is saved and is looked for
Back method, the enterprise side code key, and/or monitoring party code key, and/or the sub- workshop code key of manufacturer, and/or supervision prescription workshop
Code key is saved by image secret division, specifically includes the following steps:
(a1) a secondary watermark is made in key information by corresponding code key preserver, and carries out coding encrypting to watermark;
(a2) sub-picture is selected, and Fourier transformation is carried out to described image, obtains the frequency domain of image;
(a3) watermark after coding encrypting that step (a1) obtains is merged with the frequency domain image that step (a2) obtains
Afterwards, it carries out inverse Fourier transform and obtains watermarking images so that the watermark after coding encrypting is hidden in frequency domain image;
(a4) watermarking images that step (a3) obtains are encrypted with resume image, obtain encrypted watermark figure
Picture;
(a5) the encrypted watermark image that step (a4) obtains is divided into N section shadow with Secret Image partitioning algorithm, and
The thresholding M that can restore image is set;
(a6) the N section shadow that step (a5) obtains is stored under encrypted U disk middle line and is distributed to the position the N employee randomly selected
Keeping, and imply typing in the N section shadow and correspond to employee information;It include N-M useless shadows in N section shadow,
Before Restore Secret image, employee does not know whether the shadow oneself possessed is effective.
Further, it is all implied with watermark identifier number in every part shadow, corresponds to the work number information of employee, once this shadow
Leakage, can trace back to employee, so having certain binding character to employee itself.Every employee for taking shadow is responsible for
Shadow is kept, is provided when code key holder needs for it.
Further, as shown in figure 4, the code key method for retrieving saved by image secret division, specifically include with
Lower step:
(b1) order is recalled to the shadow sending of employee's keeping under code key preserver line;
(b2) M effective shadows are randomly selected in the N number of shadow recalled;
(b3) image reconstruction algorithm is utilized, encrypted watermark image is reconstructed;
(b4) using the encrypted watermark image reconstructed in image decryption algorithm decryption step (b3), watermarking images are obtained,
And obtained watermarking images are subjected to Fourier transformation;
(b5) image that code key preserver selects step (a2) carries out Fourier transformation;
(b6) watermarking images that step (b4) is fourier transformed Fourier transformation is carried out with step (b5) to obtain
Image merged to obtain the watermark after coding encrypting;
(b7) watermark after the coding encrypting that decoding step (b6) obtains, recovers watermark;
(b8) key information is read according to the watermark that step (b7) obtains.
Further, watermark is code key plaintext, and the watermark that step (b7) recovers is code key plaintext;Certain this field skill
Art personnel also can choose watermark is two dimensional code, bar code etc., by scanning the two-dimensional code or bar code reads key information, but
It is, if setting two dimensional code for watermark, then there may be because being distorted to read scanner can not for the watermark recovered
The case where information on two dimensional code, cannot get watermark, it is preferred, therefore, that watermark using code key in plain text.
Further, the image of step (a2) selection can disclose, so as to avoid the loss of image.
Further, after sub- plant personnel account or sub- plant personnel password loss, it need to apply for again account to tissue.
Code key of the invention saves and method for retrieving, and watermark uses the adding method of frequency domain blind watermatking, makes the concealment of watermark
Property, attack tolerant are stronger;In addition, the image after traditional images secret division can make image generation a degree of when reconstructing again
Distortion, thus the case where in the presence of key information can not be extracted, and code key of the invention saves and method for retrieving, using digital watermarking
Mode, image grayscale etc. will not influence the extraction of key information in relation to distortion situation, thus code key of the invention is saved and looked for
Back method combines image thresholding secret division technology with digital watermark technology, so that the preservation of code key is safer, extracts more
Reliably.
The present invention is further described by specific embodiment above, it should be understood that, here specifically
Description, should not be construed as the restriction for the essence of the present invention with range, and one of ordinary skilled in the art is reading this explanation
The various modifications made after book to above-described embodiment belong to the range that the present invention is protected.
Claims (10)
- The block catenary system 1. a kind of commodity are traced to the source, which is characterized in that including enterprise side unit, monitoring party unit, the sub- vehicle of manufacturer Between unit, supervision prescription workshop unit, several sub- plant personnel units, in which:The enterprise side unit issues enterprise side account and enterprise side code key, enterprise by the MSP in block catenary system Regulatory Organization Square account and enterprise side code key are managed and are saved by enterprise side business manager;The monitoring party unit issues monitoring party account and monitoring party code key by the MSP in block catenary system Regulatory Organization, supervision Square account and monitoring party code key by monitoring party supervision responsible person management and save;The sub- workshop unit of manufacturer sub- workshop tissue where it issues the sub- workshop account of manufacturer and the sub- workshop of manufacturer Code key, the sub- workshop account of manufacturer and the sub- workshop code key of manufacturer are managed and are saved by sub- workshop workshop responsible person;The supervision prescription workshop unit workshop tissue where it issues supervision prescription workshop account and supervision prescription workshop Code key, supervision prescription workshop account and supervision prescription workshop code key are by sub- workshop supervision responsible person management and save;The sub- plant personnel unit by workshop tissue where it distribute sub- plant personnel account and by sub- plant personnel voluntarily Keeping, corresponding sub- plant personnel code key are set by staff itself;The enterprise side code key and the monitoring party code key are generated by the first code key exchange agreement for entering system supervisory group The main code key of first knitted, the enterprise side unit and the monitoring party unit enter system prison by the described first main code key respectively The information that tubing reports the sub- workshop unit of manufacturer is audited;The sub- workshop code key of manufacturer and the supervision prescription workshop code key by the generation of the second code key exchange agreement for into Enter the second main code key of sub- workshop tissue, the sub- workshop unit of manufacturer and supervision prescription workshop unit pass through institute respectively It states the second main code key and enters sub- workshop tissue and the information that sub- plant personnel reports is audited and reported;The sub- plant personnel unit reports commodity to believe by sub- plant personnel account and sub- plant personnel code key into block chain Breath.
- The block catenary system 2. commodity according to claim 1 are traced to the source, which is characterized in that the commodity are traced to the source block catenary system It further include dealer's unit, in which:Dealer's unit issues dealer's account and dealer's code key by block catenary system Regulatory Organization, and is born by dealer Duty keeping;Dealer's unit passes through dealer's account and dealer's code key typing merchandise sales information into block catenary system, and by institute State enterprise side unit and/or monitoring party unit audit.
- The block catenary system 3. commodity according to claim 1 are traced to the source, which is characterized in that the commodity are traced to the source block catenary system It further include client, in which:Commodity are printed on commodity sign number when workshop is packed, the corresponding unlocking cipher of the commodity sign number be logged into Where the commodity in tissue block catenary system;Client is worked as inputting commodity sign number and from returning to unlocking cipher corresponding to the commodity sign number from the background After client returns to unlocking cipher, block catenary system is automatically deleted the commodity sign number, when client inputs commodity sign again After number, backstage returns to sky or consumption information.
- The block catenary system 4. commodity according to claim 1 are traced to the source, which is characterized in that the sub- workshop unit of the manufacturer, Supervision prescription workshop unit collectively constitutes sub- workshop with several sub- plant personnel units and organizes, and the commodity are traced to the source block linkwork System includes one or more sub- workshop tissues.
- The block catenary system 5. commodity according to claim 1 are traced to the source, it is characterised in that:The first code key exchange agreement needs to supervise responsible person both sides' typing fingerprint in enterprise side business manager and monitoring party After can come into force;And/or the second code key exchange agreement is needed in sub- workshop workshop responsible person and sub- workshop supervision responsible person both sides' record It can come into force after entering fingerprint.
- The block catenary system 6. commodity according to claim 3 are traced to the source, which is characterized in that Internet of Things electronics is provided on commodity Smart lock is unlocked by the unlocking two dimensional code on client scan commodity or is returned after inputting commodity sign number by client The unlocking cipher returned is unlocked manually.
- A kind of code key 7. commodity described in any one of claims 1-6 are traced to the source in block catenary system saves and method for retrieving, It is characterized in that, the enterprise side code key, and/or monitoring party code key, and/or the sub- workshop code key of manufacturer, and/or supervision prescription vehicle Between code key saved by image secret division, specifically includes the following steps:(a1) a secondary watermark is made in key information by corresponding code key preserver, and carries out coding encrypting to the watermark;(a2) sub-picture is selected, and Fourier transformation is carried out to described image, obtains the frequency domain of described image;(a3) after the watermark after coding encrypting that step (a1) obtains being merged with the frequency domain image that step (a2) obtains, into Row inverse Fourier transform obtains watermarking images so that the watermark after coding encrypting is hidden in frequency domain image;(a4) watermarking images that step (a3) obtains are encrypted with resume image, obtain encrypted watermark image;(a5) the encrypted watermark image that step (a4) obtains is divided into N section shadow with Secret Image partitioning algorithm, and be arranged It can restore the thresholding M of image;(a6) the N section shadow that step (a5) obtains is distributed to the N position employee keeping randomly selected, and in the N section shadow Typing is implied in son corresponds to employee information.
- 8. code key according to claim 7 saves and method for retrieving, which is characterized in that protected by image secret division The code key method for retrieving deposited, specifically includes the following steps:(b1) order is recalled to the shadow sending of employee's keeping under code key preserver line;(b2) M effective shadows are randomly selected in the N number of shadow recalled;(b3) image reconstruction algorithm is utilized, encrypted watermark image is reconstructed;(b4) using the encrypted watermark image reconstructed in image decryption algorithm decryption step (b3), watermarking images are obtained, and will Obtained watermarking images carry out Fourier transformation;(b5) image that code key preserver selects step (a2) carries out Fourier transformation;(b6) watermarking images and step (b5) that step (b4) is fourier transformed are subjected to the figure that Fourier transformation obtains As being merged to obtain the watermark after coding encrypting;(b7) watermark after the coding encrypting that decoding step (b6) obtains, recovers watermark;(b8) key information is read according to the watermark that step (b7) obtains.
- 9. code key according to claim 7 saves and method for retrieving, which is characterized in that the watermark is code key plaintext.
- 10. code key according to claim 7 saves and method for retrieving, which is characterized in that the image of step (a2) selection can It is open.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910313998.3A CN110084622A (en) | 2019-04-18 | 2019-04-18 | A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910313998.3A CN110084622A (en) | 2019-04-18 | 2019-04-18 | A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110084622A true CN110084622A (en) | 2019-08-02 |
Family
ID=67415514
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910313998.3A Pending CN110084622A (en) | 2019-04-18 | 2019-04-18 | A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110084622A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111385102A (en) * | 2020-03-20 | 2020-07-07 | 浙江传媒学院 | Video copyright transaction tracing method based on parent chain |
CN114936354A (en) * | 2022-05-20 | 2022-08-23 | 浙江云程信息科技有限公司 | Information processing method and device for engineering supervision |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001054053A1 (en) * | 2000-01-24 | 2001-07-26 | Ecole Polytechnique Federale De Lausanne | Transform domain allocation for multimedia watermarking |
CN104200424A (en) * | 2014-08-29 | 2014-12-10 | 陕西师范大学 | Difference conversion based (K, N) meaningful image sharing and recovering method |
CN106845960A (en) * | 2017-01-24 | 2017-06-13 | 上海亿账通区块链科技有限公司 | Method for secure transactions and system based on block chain |
CN106934624A (en) * | 2017-01-04 | 2017-07-07 | 毛德操 | The method that the block chain of witness formula fingerprint is used in input front end |
CN107038638A (en) * | 2017-02-24 | 2017-08-11 | 杭州象链网络技术有限公司 | A kind of equity registration transaction system construction method based on alliance's chain |
EP3242265A1 (en) * | 2016-05-02 | 2017-11-08 | Chicago Mercantile Exchange, Inc. | Bilateral assertion model and ledger implementation thereof |
CN107395349A (en) * | 2017-08-16 | 2017-11-24 | 深圳国微技术有限公司 | A kind of block chain network cryptographic key distribution method based on self-certified public key system |
CN107464304A (en) * | 2017-07-24 | 2017-12-12 | 深圳市中谷联创信息服务有限公司 | One kind can the shared packing case system of back-tracing anti-fake and its implementation |
CN108320156A (en) * | 2018-02-02 | 2018-07-24 | 上海二秒科技有限公司 | A kind of Private key management system based on block chain technology |
CN108764907A (en) * | 2018-05-30 | 2018-11-06 | 招商银行股份有限公司 | Assets method for retrieving, system and computer readable storage medium |
CN108805585A (en) * | 2018-05-28 | 2018-11-13 | 广州中国科学院软件应用技术研究所 | Distributed commodity data storage system, circulation and source tracing method based on block chain |
CN109003099A (en) * | 2018-06-19 | 2018-12-14 | 西安邮电大学 | Block chain node data processing method, equipment and storage medium |
-
2019
- 2019-04-18 CN CN201910313998.3A patent/CN110084622A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001054053A1 (en) * | 2000-01-24 | 2001-07-26 | Ecole Polytechnique Federale De Lausanne | Transform domain allocation for multimedia watermarking |
CN104200424A (en) * | 2014-08-29 | 2014-12-10 | 陕西师范大学 | Difference conversion based (K, N) meaningful image sharing and recovering method |
EP3242265A1 (en) * | 2016-05-02 | 2017-11-08 | Chicago Mercantile Exchange, Inc. | Bilateral assertion model and ledger implementation thereof |
CN106934624A (en) * | 2017-01-04 | 2017-07-07 | 毛德操 | The method that the block chain of witness formula fingerprint is used in input front end |
CN106845960A (en) * | 2017-01-24 | 2017-06-13 | 上海亿账通区块链科技有限公司 | Method for secure transactions and system based on block chain |
CN107038638A (en) * | 2017-02-24 | 2017-08-11 | 杭州象链网络技术有限公司 | A kind of equity registration transaction system construction method based on alliance's chain |
CN107464304A (en) * | 2017-07-24 | 2017-12-12 | 深圳市中谷联创信息服务有限公司 | One kind can the shared packing case system of back-tracing anti-fake and its implementation |
CN107395349A (en) * | 2017-08-16 | 2017-11-24 | 深圳国微技术有限公司 | A kind of block chain network cryptographic key distribution method based on self-certified public key system |
CN108320156A (en) * | 2018-02-02 | 2018-07-24 | 上海二秒科技有限公司 | A kind of Private key management system based on block chain technology |
CN108805585A (en) * | 2018-05-28 | 2018-11-13 | 广州中国科学院软件应用技术研究所 | Distributed commodity data storage system, circulation and source tracing method based on block chain |
CN108764907A (en) * | 2018-05-30 | 2018-11-06 | 招商银行股份有限公司 | Assets method for retrieving, system and computer readable storage medium |
CN109003099A (en) * | 2018-06-19 | 2018-12-14 | 西安邮电大学 | Block chain node data processing method, equipment and storage medium |
Non-Patent Citations (1)
Title |
---|
吕英华: "信息隐藏相关方法及应用的研究", 《中国博士学位论文全文数据库 信息科技辑》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111385102A (en) * | 2020-03-20 | 2020-07-07 | 浙江传媒学院 | Video copyright transaction tracing method based on parent chain |
CN111385102B (en) * | 2020-03-20 | 2021-05-11 | 浙江传媒学院 | Video copyright transaction tracing method based on parent chain |
CN114936354A (en) * | 2022-05-20 | 2022-08-23 | 浙江云程信息科技有限公司 | Information processing method and device for engineering supervision |
CN114936354B (en) * | 2022-05-20 | 2023-02-17 | 浙江云程信息科技有限公司 | Information processing method and device for engineering supervision |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3768249B2 (en) | For identifying objects and other entities and apparatus for producing identification cards | |
DE69932512T2 (en) | DEVICE AND METHOD FOR ELECTRONIC SHIPPING, STORAGE AND RECOVERY OF AUTHENTICATED DOCUMENTS | |
CN103679436B (en) | A kind of electronic contract security system and method based on biological information identification | |
JP5139415B2 (en) | Article information acquisition method and apparatus | |
CN101676923B (en) | Biometric processing using random projection transforms | |
PL182163B1 (en) | System for and method of verifying a document | |
AU2012345478B2 (en) | A method of generation and transmission of secure tokens based on tokens generated by TRNG and split into shares and the system thereof | |
US20080310619A1 (en) | Process of Encryption and Operational Control of Tagged Data Elements | |
US7561049B2 (en) | Scope reduction of RFID medium | |
CA2374196A1 (en) | Legitimacy protection of electronic document and a printed copy thereof | |
CN104217241A (en) | Electronic anti-fake label and realizing method | |
CN106934624A (en) | The method that the block chain of witness formula fingerprint is used in input front end | |
CN102622624B (en) | A kind of commodity counterfeit prevention identification system and method | |
CN110889697A (en) | Block chain-based railway system and using method thereof | |
CN110084622A (en) | A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving | |
CN110851530A (en) | Block chain based shared economic credible transaction method | |
CN108629603A (en) | A kind of antiforge method for commodities based on Quick Response Code | |
CN102289869A (en) | Credit card antitheft method based on image sharing and system thereof | |
CN107786546A (en) | A kind of red wine anti-fake traceability system based on privately owned chain | |
US9779256B2 (en) | Iamnotanumber© card system: an image-based technique for the creation and deployment of numberless card systems | |
CN111861500A (en) | Traceability anti-counterfeiting system and traceability anti-counterfeiting method | |
JP7456009B2 (en) | Methods for authenticating items | |
CN108875870A (en) | The creation of binary graphics coding, authentication method and system | |
Najera et al. | Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents. | |
King et al. | Applying RFID to secure the pharmaceutical supply chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190802 |