A kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption

文档序号:1772602 发布日期:2019-12-03 浏览:15次 中文

阅读说明:本技术 一种基于加密的防伪溯源数据处理方法、装置、系统及介质 (A kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption ) 是由 杨友永 于 2019-08-21 设计创作,主要内容包括:本发明提供一种基于加密的防伪溯源数据处理方法、装置、系统及介质,所述方法包括:获取NFC标签的标识UID,从服务器获取与所述UID对应的密码;基于所述密码加密原始数据,将加密后的数据写入所述NFC标签,设置验证信息;移动终端读取所述NFC标签的数据信息,访问服务器获得所述UID对应的密码,验证所述移动终端,若验证结果为通过,所述移动终端读取所述NFC标签中的加密数据。根据本发明的方案,将加密数据与NFC标签绑定,保证NFC标签数据存储的安全性;加密数据的读取和展示,不再受限于安卓手机或苹果手机,以及其它智能手机,使得任何支持NFC的手机都可以读取NFC标签数据,并能验证读取到的数据。(The present invention provides a kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption, which comprises the mark UID for obtaining NFC label obtains password corresponding with the UID from server;Based on the password encryption initial data, the NFC label is written into encrypted data, verification information is set;Mobile terminal reads the data information of the NFC label, and access server obtains the corresponding password of the UID, verifies the mobile terminal, if verification result is to pass through, the mobile terminal reads the encryption data in the NFC label.According to the solution of the present invention, encryption data and NFC label are bound, guarantees the safety of NFC label data storage;The reading and displaying of encryption data are no longer limited by Android mobile phone or iPhone and other smart phones, so that any mobile phone for supporting NFC can read NFC label data, and are able to verify that the data read.)

1. a kind of anti-fake data processing method of tracing to the source based on encryption, which is characterized in that the described method includes:

Step S101: obtaining the mark UID of NFC label, obtains password corresponding with the UID from server;

Step S102: being based on the password encryption initial data, and the NFC label, setting verifying is written in encrypted data Information;

Step S103: mobile terminal reads the data information of the NFC label, and it is corresponding close that access server obtains the UID Code, verifies the mobile terminal, if verification result is to pass through, the mobile terminal reads the encryption data in the NFC label.

2. the anti-fake data processing method of tracing to the source based on encryption as described in claim 1, which is characterized in that described based on described The NFC label is written in encrypted data by password encryption initial data, and setting verification information includes:

Step S1021: the Crypted password that the NFC label is arranged is the corresponding password of the UID;

Step S1022: the initial data is encrypted based on the Crypted password;

Step S1023: initializing the NFC label, and encrypted data are written in Xiang Suoshu NFC label;

Step S1024: the data information of the NFC label is set.

3. the anti-fake data processing method of tracing to the source based on encryption as described in claim 1, which is characterized in that described in the verifying Mobile terminal, if verification result is to pass through, the mobile terminal reads the encryption data in the NFC label:

Step S1031: mobile terminal calculates the whole packet check bit checksum, compares the whole packet check bit checksum and institute Whether the whole packet check bit checksum for stating NFC label storage is equal;If comparison result be it is equal, then follow the steps S1032;It is no Then follow the steps S1033;

Step S1032: confirmation mobile terminal is verified for the first time;Mobile terminal sends checking request, institute to the server It states checking request and judges whether the auto-counter count value of the NFC label is greater than the service by the server The auto-counter count value corresponding with the NFC label in the database of device;If the determination result is YES, it thens follow the steps S1034;It is no to then follow the steps S1035;

Step S1033: verifying does not pass through confirmation mobile terminal for the first time, and method terminates;

Step S1034: the auto-counter count value in the database is updated to the verifying by the server asks The auto-counter count value in information is sought, returns to message to mobile terminal, second of the verifying of confirmation mobile terminal is logical It crosses;Enter step S1036;

Step S1035: second of the verifying of confirmation mobile terminal does not pass through, and method terminates;

Step S1036: the mobile terminal decrypts the encryption data of the NFC label using the password, obtains the NFC mark Corresponding initial data is signed, the initial data is read by the mobile terminal.

4. the anti-fake data processing method of tracing to the source based on encryption as described in claim 1, which is characterized in that the NFC label Data information include the UID, auto-counter count value, the encrypted data and whole packet check bit checksum。

5. the anti-fake data processing method of tracing to the source based on encryption as described in claim 1, which is characterized in that the mobile terminal For iPhone.

6. a kind of anti-fake data processing equipment of tracing to the source based on encryption, which is characterized in that described device includes:

It obtains module: for obtaining the mark UID of NFC label, obtaining password corresponding with the UID from server;

Data write. module: for being based on the password encryption initial data, being written the NFC label for encrypted data, Verification information is set;

Data read module: mobile terminal reads the data information of the NFC label, and it is corresponding that access server obtains the UID Password, verify the mobile terminal, if verification result be pass through, the mobile terminal reads the encryption in the NFC label Data.

7. the anti-fake data processing equipment of tracing to the source based on encryption as claimed in claim 6, which is characterized in that the data write-in Module includes:

Submodule is arranged: the Crypted password for the NFC label to be arranged is the corresponding password of the UID;

Encrypt submodule: for encrypting the initial data based on the Crypted password;

Write-in data submodule: for initializing the NFC label, encrypted data are written in Xiang Suoshu NFC label;

Submodule is set: for the data information of the NFC label to be arranged.

8. the anti-fake data processing equipment of tracing to the source based on encryption as claimed in claim 6, which is characterized in that the reading data Module includes:

First verifying submodule: for calculating the whole packet check bit checksum by mobile terminal, compare the whole packet check bit Whether checksum and the whole packet check bit checksum that the NFC label stores are equal;

Second verifying submodule: for confirming that mobile terminal is verified for the first time;Mobile terminal is tested to server transmission Card request, the checking request judge whether the auto-counter count value of the NFC label is greater than by the server The auto-counter count value corresponding with the NFC label in the database of the server;

First prompting submodule: for confirming that verifying does not pass through mobile terminal for the first time;

Data update submodule: for being updated the auto-counter count value in the database by the server For the auto-counter count value in the checking solicited message, message is returned to mobile terminal, confirmation mobile terminal the It is secondary to be verified;

Second prompting submodule: for confirming that second of verifying of mobile terminal does not pass through;

Reading data submodule: it for decrypting the encryption data of the NFC label using the password by the mobile terminal, obtains The corresponding initial data of the NFC label is obtained, the initial data is read by the mobile terminal.

9. the anti-fake data processing equipment of tracing to the source based on encryption as claimed in claim 6, which is characterized in that the NFC label Data information include the UID, auto-counter count value, the encrypted data and whole packet check bit checksum。

10. the anti-fake data processing equipment of tracing to the source based on encryption as claimed in claim 6, which is characterized in that described mobile whole End is iPhone.

11. a kind of anti-fake data processing system of tracing to the source based on encryption characterized by comprising

Processor, for executing a plurality of instruction;

Memory, for storing a plurality of instruction;

Wherein, a plurality of instruction for being stored by the memory, and is loaded by the processor and is executed such as claim Any anti-fake data processing method of tracing to the source based on encryption of 1-5.

12. a kind of computer readable storage medium, which is characterized in that be stored with a plurality of instruction in the storage medium;It is described more Item instruction, for being loaded by processor and being executed the anti-fake data of tracing to the source a method as claimed in any one of claims 1 to 5 based on encryption Reason method.

Technical field

The present invention relates to processing data information field more particularly to it is a kind of be common to all kinds of reading equipment based on encryption Anti-fake data processing method of tracing to the source, device, system and medium, more particularly to support the encryption based on NFC label of iPhone Anti-fake data processing method of tracing to the source, device, system and medium.

Background technique

Currently, anti-fake traceability system has been applied on the various product of multi industries, anti-fake traceability system is believed using label Store commodity information is ceased, the process of producing is refine to each critical control point, consumer is scanned label, can obtain commodity Produce date, the place of origin, merchandise news etc..Have all multimodes and realizes that anti-fake traceability system, such as two-dimension code anti-counterfeit, RFID are prevented It is pseudo-, NFC is anti-fake etc..Wherein, NFC is anti-fake can read NFC label progress fake certification by mobile phone.

The key link of anti-fake traceability system is the data safety in the acquisition and transmission sources data procedures of source data. The existing anti-fake traceability system using NFC label, the source data of transmission is the clear data of unencryption protection mostly, this The anti-fake data of tracing to the source of mode are easily faked;The implementation of encipherment protection is taken the source data of transmission, and is needed anti-fake When tracing to the source, the encryption data stored in NFC label is read using special equipment by user, general mobile terminal cannot be used The encryption data stored in NFC label is read out, iPhone is not supported especially to read the encryption number stored in NFC label According to.The Information Security of the anti-fake traceability system of NFC label cannot be taken into account in the prior art and reads the versatility of equipment.

Summary of the invention

In order to solve the above technical problems, the anti-fake data processing method of tracing to the source that the invention proposes a kind of based on encryption, dress It sets, system and medium, the method, device, system and medium cannot take into account the anti-of NFC label to solve in the prior art The Information Security of pseudo- traceability system and the technical issues of read the versatility of equipment.

According to the first aspect of the invention, a kind of anti-fake data processing method of tracing to the source based on encryption is provided, comprising:

Step S101: obtaining the mark UID of NFC label, obtains password corresponding with the UID from server;

Step S102: being based on the password encryption initial data, and the NFC label, setting is written in encrypted data Verification information;

Step S103: mobile terminal reads the data information of the NFC label, and it is corresponding that access server obtains the UID Password, verify the mobile terminal, if verification result be pass through, the mobile terminal reads the encryption in the NFC label Data.

Further, described to be based on the password encryption initial data, the NFC label is written into encrypted data, Verification information, which is arranged, includes:

Step S1021: the Crypted password that the NFC label is arranged is the corresponding password of the UID;

Step S1022: the initial data is encrypted based on the Crypted password;

Step S1023: initializing the NFC label, and encrypted data are written in Xiang Suoshu NFC label;

Step S1024: the data information of the NFC label is set.

Further, the verifying mobile terminal, if verification result is to pass through, described in the mobile terminal reading Encryption data in NFC label:

Step S1031: mobile terminal calculates the whole packet check bit checksum, compares the whole packet check bit checksum It is whether equal with the whole packet check bit checksum of NFC label storage;If comparison result be it is equal, then follow the steps S1032;It is no to then follow the steps S1033;

Step S1032: confirmation mobile terminal is verified for the first time;Mobile terminal sends verifying to the server and asks Ask, the checking request by the server judge the NFC label the auto-counter count value whether be greater than it is described The auto-counter count value corresponding with the NFC label in the database of server;If the determination result is YES, then it executes Step S1034;It is no to then follow the steps S1035;

Step S1033: verifying does not pass through confirmation mobile terminal for the first time, and method terminates;

Step S1034: the auto-counter count value in the database is updated to described test by the server The auto-counter count value in solicited message is demonstrate,proved, returns to message, second of the verifying of confirmation mobile terminal to mobile terminal Pass through;Enter step S1036;

Step S1035: second of the verifying of confirmation mobile terminal does not pass through, and method terminates;

Step S1036: the mobile terminal decrypts the encryption data of the NFC label using the password, described in acquisition The corresponding initial data of NFC label reads the initial data by the mobile terminal.

Further, the data information of the NFC label includes the UID, auto-counter count value, the encryption Data and whole packet check bit checksum afterwards.

Further, the mobile terminal is iPhone.

According to a second aspect of the present invention, a kind of anti-fake data processing equipment of tracing to the source based on encryption is provided, comprising:

It obtains module: for obtaining the mark UID of NFC label, obtaining password corresponding with the UID from server;

Data write. module: for being based on the password encryption initial data, the NFC is written into encrypted data and is marked Verification information is arranged in label;

Data read module: mobile terminal reads the data information of the NFC label, and access server obtains the UID Corresponding password verifies the mobile terminal, if verification result is to pass through, the mobile terminal is read in the NFC label Encryption data.

Further, the Data write. module includes:

Submodule is arranged: the Crypted password for the NFC label to be arranged is the corresponding password of the UID;

Encrypt submodule: for encrypting the initial data based on the Crypted password;

Write-in data submodule: for initializing the NFC label, encrypted data are written in Xiang Suoshu NFC label;

Submodule is set: for the data information of the NFC label to be arranged.

Further, the data read module includes:

First verifying submodule: for calculating the whole packet check bit checksum by mobile terminal, compare the whole packet school Whether test a checksum equal with the whole packet check bit checksum that the NFC label stores;

Second verifying submodule: for confirming that mobile terminal is verified for the first time;Mobile terminal is sent out to the server Send checking request, the checking request by the server judge the NFC label the auto-counter count value whether Greater than the auto-counter count value corresponding with the NFC label in the database of the server;

First prompting submodule: for confirming that verifying does not pass through mobile terminal for the first time;

Data update submodule: for by the server by the auto-counter count value in the database The auto-counter count value being updated in the checking solicited message returns to message to mobile terminal, confirms mobile whole End is verified for the second time;

Second prompting submodule: for confirming that second of verifying of mobile terminal does not pass through;

Reading data submodule: for decrypting the encryption number of the NFC label using the password by the mobile terminal According to obtaining the corresponding initial data of the NFC label, read the initial data by the mobile terminal.

Further, the data information of the NFC label includes the UID, auto-counter count value, the encryption Data and whole packet check bit checksum afterwards.

Further, the mobile terminal is iPhone.

According to a third aspect of the present invention, a kind of anti-fake data processing system of tracing to the source based on encryption is provided, comprising:

Processor, for executing a plurality of instruction;

Memory, for storing a plurality of instruction;

Wherein, a plurality of instruction for being stored by the memory, and is loaded by the processor and is executed such as preceding institute The anti-fake data processing method of tracing to the source for the encryption stated.

According to a fourth aspect of the present invention, a kind of computer readable storage medium is provided, is stored in the storage medium more Item instruction;The a plurality of instruction, for being loaded by processor and being executed the anti-fake data of tracing to the source based on encryption as previously described Reason method.

Above scheme according to the present invention, NFC label can carry out symmetric cryptography school to data symmetric cryptography, to data It tests, encryption data and NFC label is bound, guarantee the safety of NFC label data storage;The reading and displaying of encryption data, It is no longer limited by Android mobile phone or iPhone and other smart phones, so that any mobile phone for supporting NFC can be read NFC label data, and it is able to verify that the data read.

The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And can be implemented in accordance with the contents of the specification, the following is a detailed description of the preferred embodiments of the present invention and the accompanying drawings.

Detailed description of the invention

The attached drawing for constituting a part of the invention is used to provide further understanding of the present invention, and the present invention provides following attached Figure is illustrated.In the accompanying drawings:

Fig. 1 is the anti-fake data processing method flow chart of tracing to the source proposed by the present invention based on encryption;

Fig. 2 is the method flow diagram that encryption data is written to NFC label of one embodiment of the present invention;

Fig. 3 is the method flow diagram of the verifying mobile terminal of one embodiment of the present invention;

Fig. 4 is the anti-fake data processing equipment composition block diagram of tracing to the source proposed by the present invention based on encryption.

Specific embodiment

To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with the specific embodiment of the invention and Technical solution of the present invention is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the present invention one Section Example, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.

It is illustrated with reference to Fig. 1 the anti-fake data processing method of tracing to the source of the invention based on encryption first, Fig. 1 is shown according to this The anti-fake data processing method flow chart of tracing to the source based on encryption of invention.As shown in Figure 1, the described method comprises the following steps:

Step S101: obtaining the mark UID of NFC label, obtains password corresponding with the UID from server;

Include:

End is generated by anti-fake information of tracing to the source, such as producer reads the unique identification UID of NFC label;The NFC label is returned It returns mark UID and generates end to anti-fake information of tracing to the source;It is described it is anti-fake trace to the source information generate end according in the UID query service device with The corresponding password of the UID;The database purchase of server has all data information of the NFC label, the database pair The all data information of the NFC label carries out storage management, according to the items for updating information update, the maintenance NFC label Data information, the server generate end to the anti-fake information of tracing to the source and return to the password.The server can be described Anti-fake information of tracing to the source generates the server at end, is also possible to third-party server;

Step S102: being based on the password encryption initial data, and the NFC label, setting is written in encrypted data Verification information;

Illustrate the method for the invention to NFC label write-in encryption data below in conjunction with Fig. 2.It is described to be added based on the password The NFC label is written in encrypted data by close initial data, and setting verification information includes:

Step S1021: the Crypted password that the NFC label is arranged is the corresponding password of the UID;

Step S1022: the initial data is encrypted based on the Crypted password;

End is generated by the anti-fake information of tracing to the source and generates the initial data for containing anti-fake information of tracing to the source, it is close based on the encryption Code, using Encryption Algorithm, encrypts the initial data.The Encryption Algorithm can be AES-128, can also be using other encryptions Algorithm only does exemplary illustration herein.By the dynamic encryption technology of the NFC label, tying up for NFC label and data is realized It is fixed.The Encryption Algorithm is built in the NFC label;

Step S1023: initializing the NFC label, and encrypted data are written in Xiang Suoshu NFC label;

Step S1024: the data information of the NFC label is set;

The data information of the NFC label include the UID, auto-counter count value, the encrypted data, And whole packet check bit checksum;

The data information of the setting NFC label, comprising:

Auto-counter count value is set;

The UID of the NFC label, auto-counter count value are mapped to the data field of the NFC label, reflected Shooting method are as follows: be directed to the NFC label, mapping position and map information be set, NFC label is by the UID, auto-counter Count value is saved in corresponding memory block.

According to the UID, the auto-counter count value, the encrypted data that the NFC label is written, use Encryption Algorithm calculates whole packet check bit checksum, and the Encryption Algorithm can be AES-128CMAC algorithm, can also use Other Encryption Algorithm, the Encryption Algorithm are built in the NFC label, only do exemplary illustration herein.

The whole packet check bit checksum can carry out the mobile terminal for accessing the NFC label as verification information Verifying.

The server is sent by Encryption Algorithm used in the NFC label, the NFC is saved by the server Encryption Algorithm used in label.

Step S1025: the data information of the NFC label is saved as into NDEF format.

Step S103: mobile terminal reads the data information of the NFC label, and it is corresponding that access server obtains the UID Password, verify the mobile terminal, if verification result be pass through, the mobile terminal reads the encryption in the NFC label Data.

The mobile terminal reads the data information of the NFC label, and it is corresponding close that access server obtains the UID Code, comprising: mobile terminal reads the data information in the NFC label, and the mobile terminal includes Android mobile phone, apple hand Machine and other intelligent terminal.The mobile terminal can access the NFC label by the app that the mobile terminal is installed Data information.The NFC label returns to the data information in the label, including the UID, automatic counting to mobile terminal Device count value, the encrypted data and whole packet check bit checksum.The NFC label updates the institute in data field Auto-counter count value is stated, 1 is added on the basis of original numerical value, the NFC label is according to the NFC label UID, updated auto-counter count value, the encrypted data, using with whole packet school is calculated in step S1024 Test the new whole packet check bit checksum that the identical Encryption Algorithm of a checksum calculates the NFC label, the NFC mark Label update the whole packet check bit checksum in data field.The mobile terminal requests described UID pairs to the server The password answered, the server send the corresponding password of the UID to the mobile terminal.

Illustrate the method for verifying mobile terminal of the invention below in conjunction with Fig. 3.The verifying mobile terminal, if verifying As a result to pass through, the mobile terminal reads the encryption data in the NFC label:

Step S1031: mobile terminal calculates the whole packet check bit checksum, compares the whole packet check bit checksum It is whether equal with the whole packet check bit checksum of NFC label storage;If comparison result be it is equal, then follow the steps S1032;It is no to then follow the steps S1033;

In the present embodiment, what the mobile terminal can access the acquisition NFC label by mobile terminal app includes institute State the data information of UID, auto-counter count value, the encrypted data and whole packet check bit checksum.Institute It states mobile terminal app and the server is accessed according to the UID of the NFC label, find the corresponding NFC label of the UID Attribute information, the attribute information includes the Encryption Algorithm of the NFC label.The mobile terminal is according to the password, base In the Encryption Algorithm of the NFC label got, runs Encryption Algorithm and the whole packet check bit checksum is calculated.

Step S1032: confirmation mobile terminal is verified for the first time;Mobile terminal sends verifying to the server and asks Ask, the checking request by the server judge the NFC label the auto-counter count value whether be greater than it is described The auto-counter count value corresponding with the NFC label in the database of server;If the determination result is YES, then it executes Step S1034;It is no to then follow the steps S1035;

The checking solicited message include stored in the corresponding UID of the NFC label and the NFC label it is described automatic Counter count value, the server search the database according to the UID, obtain server from the database and work as The auto-counter count value of preceding storage;Compare the auto-counter count value that the checking solicited message carries Whether the auto-counter count value corresponding with the UID stored in the database is greater than.

The purpose for verifying the auto-counter count value is to verify whether the NFC label is copied illegally institute State whether NFC label is true.

Step S1033: verifying does not pass through confirmation mobile terminal for the first time, and method terminates;

Step S1034: the auto-counter count value in the database is updated to described test by the server The auto-counter count value in solicited message is demonstrate,proved, returns to message, second of the verifying of confirmation mobile terminal to mobile terminal Pass through;Enter step S1036;

Step S1035: second of the verifying of confirmation mobile terminal does not pass through, and method terminates;

Step S1036: the mobile terminal decrypts the encryption data of the NFC label using the password, described in acquisition The corresponding initial data of NFC label reads the initial data by the mobile terminal.

The operation of mobile terminal execution in the present embodiment can execute identical operation by mobile terminal app.

It is specific below in conjunction with the anti-fake data processing method of tracing to the source illustrated the present invention is based on encryption:

The present embodiment method is applied to manufacturer and produces anti-fake data of tracing to the source, and manufacturer obtains the NFC label from server Password is realized the binding of anti-fake trace to the source data and the NFC label, is arranged simultaneously by the dynamic encryption technology of NFC label Verification information.Mobile terminal user is without using special reading equipment, it is only necessary to read NFC label using mobile terminal and believe Breath, and then verify NFC tag information and obtain original anti-fake data and the chip of tracing to the source by symmetrically decrypting after being verified Information.

Referring to FIG. 4, it is the anti-fake data processing equipment composition block diagram of tracing to the source proposed by the present invention based on encryption.Such as figure Shown, which includes:

It obtains module: for obtaining the mark UID of NFC label, obtaining password corresponding with the UID from server;

Data write. module: for being based on the password encryption initial data, the NFC is written into encrypted data and is marked Verification information is arranged in label;

Data read module: mobile terminal reads the data information of the NFC label, and access server obtains the UID Corresponding password verifies the mobile terminal, if verification result is to pass through, the mobile terminal is read in the NFC label Encryption data.

Further, the Data write. module includes:

Submodule is arranged: the Crypted password for the NFC label to be arranged is the corresponding password of the UID;

Encrypt submodule: for encrypting the initial data based on the Crypted password;

Write-in data submodule: for initializing the NFC label, encrypted data are written in Xiang Suoshu NFC label;

Submodule is set: for the data information of the NFC label to be arranged.

Further, the data read module includes:

First verifying submodule: for calculating the whole packet check bit checksum by mobile terminal, compare the whole packet school Whether test a checksum equal with the whole packet check bit checksum that the NFC label stores;

Second verifying submodule: for confirming that mobile terminal is verified for the first time;Mobile terminal is sent out to the server Send checking request, the checking request by the server judge the NFC label the auto-counter count value whether Greater than the auto-counter count value corresponding with the NFC label in the database of the server;

First prompting submodule: for confirming that verifying does not pass through mobile terminal for the first time;

Data update submodule: for by the server by the auto-counter count value in the database The auto-counter count value being updated in the checking solicited message returns to message to mobile terminal, confirms mobile whole End is verified for the second time;

Second prompting submodule: for confirming that second of verifying of mobile terminal does not pass through;

Reading data submodule: for decrypting the encryption number of the NFC label using the password by the mobile terminal According to obtaining the corresponding initial data of the NFC label, read the initial data by the mobile terminal.

Further, the data information of the NFC label includes the UID, auto-counter count value, the encryption Data and whole packet check bit checksum afterwards.

Further, the mobile terminal is iPhone.

The embodiment of the present invention further provides a kind of anti-fake data processing system of tracing to the source based on encryption, comprising:

Processor, for executing a plurality of instruction;

Memory, for storing a plurality of instruction;

Wherein, a plurality of instruction for being stored by the memory, and is loaded by the processor and executes institute as above The anti-fake data processing method of tracing to the source based on encryption stated.

The embodiment of the present invention further provides a kind of computer readable storage medium, is stored in the storage medium a plurality of Instruction;The a plurality of instruction, for being loaded by processor and being executed the anti-fake data processing of tracing to the source based on encryption as described above Method.

It should be noted that in the absence of conflict, the feature in embodiment and embodiment in the present invention can phase Mutually combination.

In several embodiments provided by the present invention, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or group Part can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown Or the mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, device or unit it is indirect Coupling or communication connection can be electrical property, mechanical or other forms.

The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.

It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.

The above-mentioned integrated unit being realized in the form of SFU software functional unit can store and computer-readable deposit at one In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer Device (can be personal computer, physical machine server perhaps network Cloud Server etc. need to install Windows or Windows Server operating system) execute the part steps of each embodiment the method for the present invention.And storage above-mentioned is situated between Matter includes: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), the various media that can store program code such as magnetic or disk.

The above described is only a preferred embodiment of the present invention, be not intended to limit the present invention in any form, according to According to technical spirit any simple modification, equivalent change and modification to the above embodiments of the invention, this hair is still fallen within In the range of bright technical solution.

13页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:电子图书馆的管理方法、电子设备及计算机存储介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!