CN101807285A - Method for interactive dynamic forgery prevention and verification - Google Patents

Method for interactive dynamic forgery prevention and verification Download PDF

Info

Publication number
CN101807285A
CN101807285A CN201010146667A CN201010146667A CN101807285A CN 101807285 A CN101807285 A CN 101807285A CN 201010146667 A CN201010146667 A CN 201010146667A CN 201010146667 A CN201010146667 A CN 201010146667A CN 101807285 A CN101807285 A CN 101807285A
Authority
CN
China
Prior art keywords
coding
information
article
code
authenticating party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201010146667A
Other languages
Chinese (zh)
Inventor
周锡卫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201010146667A priority Critical patent/CN101807285A/en
Publication of CN101807285A publication Critical patent/CN101807285A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a method for interactive dynamic forgery prevention and verification, which realizes the dynamic forgery prevention and verification with the effects of low cost, easy implementation, forgery prevention and cross-territory selling prevention. The method comprises a manufacturing party, a management party, a consuming party, a certification party and an administration party, and is characterized in that the manufacturing party which produces and processes anti-counterfeit articles, the management party which carries out transactions and provides service based on the anti-counterfeit articles, the consuming party which ultimately holds and uses the articles, the certification party which is responsible for verifying whether the articles are true or false, and the administration party which stores and processes the circulation information of the anti-counterfeit articles carry out the interaction and inquiry and verification processing on the anti-counterfeit information of the articles based on the computer technology, communication equipment and the information network. By using the method, all the parties can realize the information interaction and the dynamic data update, thereby achieving the purposes of cross-territory selling prevention and forgery prevention.

Description

The method of a kind of interactive dynamic forgery prevention and checking
Technical field
The invention discloses the method for a kind of interactive dynamic forgery prevention and checking, relate to the false proof and verification technique field of Computerized Information Processing Tech, communication and network technology, digital encoding and decoding technique and computer digital.
Background technology
Continuous lifting along with market economy, no matter marketing is from kind, still all like never before obtain stimulating and development from circulation, the article of people's life are very abundant, people constantly enjoy life fine in, also continuous for the commodity of visible fake and forged commodity are worried constantly on the market, even also to pay huge cost.Fake wine, false smoke, false commodity, problem food, electrical equipment of poor quality or the like, startling.
Risk is little because the not enough and careless omission in the sudden huge profits of false making and false proof the cracking down on counterfeit goods is made a profit easily the fake producer, under the temptation of sudden huge profits, make its very and the National People's Congress of the manufacturing and marketing the fake of taking a risk have its.The false proof each side that caused of article payes attention at present, and various false proof methods and technology constantly occur, and still, have many defectives, have influenced actual popularization and use.Below present anti-counterfeiting technology characteristics are concluded from three aspects.
1, traditional anti-counterfeiting technology
Mainly be the singularity of utilizing material, the complicacy of manufacture craft, increase the difficulty of false making, as utilize the special material of fluorescence or magnetic ink to carry out false proof, as seen list of references 1 (denomination of invention: forgery-preventing textured emblem, Granted publication day: on October 23rd, 2002, Granted publication number: CN1093301C); And laser hologram, specialty printing, easily ruin packing etc., document 2 (denomination of invention: polyethylene membrane laser holography false proof method sees reference, Granted publication day: on March 30th, 2009, Granted publication CN100544966C), these methods have certain effect for false proof, but also have some distinct disadvantage; List of references 3 (denomination of invention: a kind of anti-forge cigarette, Granted publication day: on February 27th, 2008, Granted publication number: method CN100371227C) is to utilize printed patterns and position to carry out false proof method, certain effect is arranged, but only on the false making difficulty, improve, and, how many toxin of stamp-pad ink can be disadvantageous to health, to this, if the fake producer can find the fraud thing with respective identification pattern, believe the fake producer can overcome this difficulty and with keeping the fraud.See another problem thus, the dealer is the real way to get better off of fake producer, and the disclosed technical method of foregoing invention can not be implemented effective supervision to the dealer.
For traditional anti-counterfeiting technology, list of references 4 is estimated (denomination of invention: based on the anti-counterfeiting technology of dynamic password like this, the applying date: on November 26th, 2004, Granted publication day: on May 27th, 2009, Granted publication number: CN100492968C) instructions the 16th~22 row is described: "
---the anti-counterfeiting mark and the feature of same series products are identical, and the fake producer only need obtain a genuine piece sample, just can duplicate on a large scale after grasping this technology or equipment;
---counterfeit for the fake producer is difficult for, sign is made generally all more complicated, perhaps needs continuous conversion to upgrade, and cost is than higher;
---on-the-spot identification is difficulty relatively, need know many special knowledges when identification, and shortage standard foundation, and the fake producer can mix the genuine with the fictitious by the false anti-counterfeiting mark of distribution, is that the consumer has no way of judging;
---fake producer's thing that can be recycled and packaged is faked, and easily ruins manner of packing cost height, can not look into afterwards earlier and buy; "
2, electronic digital anti-counterfeiting technology
The false proof code communication inquiry anti-counterfeiting technology that is also referred to as of electronic digital, as list of references 5 (denomination of invention: antifake method for products, Granted publication day: on February 29th, 2004, Granted publication number: CN1182498C), its instructions homepage the 10th~15 row is described, and " principal feature of this method is to be provided with one group of password after encapsulation process in the external packing of product or product; the sealing device is one deck diaphragm seal; the strip off gently of available finger; indicate the telephone number of unique this Cipher mechanism of concrete management in the whole nation in the front of password; the only corresponding one group of password of each product; this password has record in the cryptographic libraries of management organization, after buying certain product, people scrape password off, and put through the phone of management organization, the authenticity of this password of request inquiry, there is management organization's feedback information to point out the authenticity of its password, i.e. the true and false of provable this product.”
For this type of electronic digital anti-counterfeiting technology and method, list of references 4 has also been pointed out its defective, promptly~the 2 page of the 6th row of list of references 4 instructionss homepage the 33rd row described " it also has significant disadvantages, as:
---password is fixed, and figure case is many, and management expectancy makes things convenient for by phone, network or mobile phone, message search inadequately than higher in making, storing process;
---inquiry is once promptly cancelled, and identifies hiddenly, is difficult to look into afterwards earlier buy;
---the inquiry rate is very low, thereby has a large amount of effective old sign indicating numbers may be recovered fraud.If the fake producer prints one yard more, even print some numbers carelessly, the possibility of being discovered and seized is also very little;
---outward appearance is not distinct, and technology is fairly simple, is forged easily, and the fake producer can be printed on from establishing network and telephone service center from random coded and inquire address, a complete set of personation;
---random coded is a kind of number series that can not be defined, and can not load the more products characteristic information, can not provide support to Inner Logistics Management.
Existing certain methods with digital false-proof technology and traditional anti-counterfeiting technology simple knot altogether, the simple and reliable characteristics of traditional false proof increase fraud difficulty and digital code anti-false identification can to a certain degree brought into play, but do not solve the problem that they exist, and practical operation is more complicated, cost is higher.”
List of references 6 (denomination of invention: a kind of method for anti-counterfeit for another example, Granted publication day: on October 25th, 2006, Granted publication number: CN1282139C) in that " the disposable anti-false password is generally in product or the showy place of its packing; as lottery ticket; code number occurs once scraping; and false proof confidential paper is by ensconcing ND place in product or its packing; after consumer's payment; can scrape anti-forge cipher off described in instructions homepage the 22nd row, filling in anti-counterfeit commodities then on request buys single, buy and singly comprise: buyer's name, the address, phone, buy the commodity name, the address, phone, the anti-fake product model, the date of production, factory number, anti-forge cipher, (that is to say: product type, the date of production, factory number, anti-forge cipher, false proof confidential paper all is that anti-fake product is indispensable), after completing list, consumer and shop staff carry out Antiforge inquiry by manufacturer's designated telephone number together, as Help by Phone stock, ... " as seen complicated operating process, be difficult to carry out, particularly if big must being difficult to of workload resist when asking the third party to authenticate, and if the common manufacturing and marketing the fake in illegal producer and shop, that does not just have vacation and can look into.The manufacturing and marketing the fake situation that exemplifies as list of references 3.
3, dynamic changing code antifake technology
Be that the highest, the effect of scientific and technological content also is best in the present anti-counterfeiting technology, its know-why combines based on anti-counterfeiting mark and anti-forge cipher, anti-counterfeiting mark is generally plain code, can be string number or character code, also can be the sign of traditional approach, for the anti-counterfeiting mark that adopts coding form, not only reducing cost to possess the key element of management meaning, from changing antifalse effect in essence, this is not because its false proof know-why key is by dynamic password for these.As list of references 7 (denomination of invention: a kind of anti-counterfeit anti-changing terminal device and method, Granted publication day: on August 13rd, 2008, Granted publication number: CN100410958C, the applying date: on Dec 4th, 2003) Instructions Page 3 the 22nd row described " use a kind of communication tool that dynamic password is sent to described server; described server judge this dynamic password whether with its database in advance the described dynamic password of storage conform to; if conform to; then regenerate and the dynamic password of storage update; freeze former dynamic password, the dynamic password of described renewal is sent back described communication tool together with described descriptive labelling information; If do not conform to, described server then transmits " dynamic password is made mistakes " information to described communication tool; Whenever described server is received dynamic password and is always judged that whether it conform to up-to-date dynamic password, if conform to then freeze former dynamic password, generation, store and return the dynamic password that described communication tool upgrades; Otherwise return " dynamic password is made mistakes " information to described communication tool." the described dynamic sign indicating number of list of references 4 and for example; " after Verification System receives the personal sign and dynamic password thereof of the needs identification that application system transfers, to in database, search out the corresponding individual information of prior storage according to personal sign, calculate an authentication password according to these information with same algorithm, key and the synchrodata of smart card then, by checking the matching of this authentication password and the dynamic password that is identified, determine the identity of object and whether obtain the service that application system provides.Each authentication success, Verification System will be adjusted automatically synchrodata and upgrade according to this authentication password.”
Adopt dynamically that sign indicating number can improve anti-counterfeit capability greatly, increase the fraud difficulty, false proof item circulation management and product back-tracing and dealer management are played a positive role.
Though list of references 4 is schemes that effect relatively has characteristics in the present anti-counterfeiting technology method, but significant disadvantages is arranged also: at first be that cost is too high, by its method, in Production and Packaging, join products in circulation links such as goods transmission, finish smart card and (contain SIM card, IC-card etc.) and the generation of the identification code of individual character and and product one by one the correspondence, if on existing modernized streamline, implement, to carry out many changes to existing production line, in addition, it is excessive that one of each product delivery can generate the smart card cost of dynamic sign indicating number, and each product joins one and can generate the dynamically smart card of sign indicating number, wastes big too.About smart card, list of references 4 describes like this that " in client (121), dealer (109,111) and product (108) have personalized smart card (110) by system disposition, and each dealer or the consumer who is ready are equipped with card reader (112).If allot SIM card with product, then the consumer can be with carry-on mobile phone as card reader.When needs authorized dealers identity or authenticity of products, just the smart card (110) of this dealer or product can be inserted card reader (112), produce dynamic password (114), deliver to system end (120) by communication network (107) and authenticate and handle." in fact; allot SIM card with product; and the carry-on mobile phone of available consumer is unpractical as card reader; because card reader " is stayed and is had cryptographic algorithm, key, individual information, synchrodata and handling procedure by describing in the claim 6 of list of references 4 ... "; these are that general mobile phone and messaging device are not available; on the other hand if product is allotted SIM card, and use special-purpose card reader, the secret effect of then general SIM card is undesirable really.Its two great shortcoming is that this just gives and reclaims a whole set of second hand packing owing to can unrestrictedly repeatedly use the smart card of identification code and product allocation, as long as the card of identification code and product allocation, giving fakes provides great chance.If; one bottle of wine of 500 yuan of unit prices; someone goes out 100 yuan of cards that reclaim second hand packing (as long as identification code) and allot, but and true-false inquiring also during recovery, run into this situation situation again how about? how does businessman design collection and normal activity of reclaiming smart card again?
It is not good to produce above-mentioned antifalse effect, and the defective basic reason of its anti-counterfeiting technology method is exactly the defectiveness of method for anti-counterfeit own.The first, go the big again difficulty again of false proof manufacture difficulty also can clone with static method; The second, factors such as the one-way of method for anti-counterfeit, disposable, complicacy and use cost cause uses inconvenience, and utilization rate is low, it is multiplexing etc. to be easy to; The 3rd, existing dynamic anti-fake method is dynamically accurate mostly, is exactly only to play static state or accurate dynamic effect as above-mentioned list of references 4 its dynamic sign indicating number in process of exchange, or the like.This can not show a candle to expection with regard to the effect that present anti-counterfeiting technology and method are realized.For this reason, the present invention is brought into play the dynamic anti-fake advantage by interactive mode, improves anti-counterfeit capability simultaneously reducing cost.
Summary of the invention
Purpose of the present invention is exactly for addressing the above problem, the method of a kind of interactive dynamic forgery prevention and checking is provided, realize low cost by the side of manufacturing, operation side, consumption side and authenticating party and manager, the method for easily enforcement, the simultaneously effective dynamic anti-fake of false proof and anti-falsifying and checking.Its objective is and be achieved through the following technical solutions.
The method of a kind of interactive dynamic forgery prevention and checking, this method is made up of manufacturing side, operation side, consumption side, authenticating party, manager's five parts, it is characterized in that by to implementing the manufacturing side that article anti-counterfeit carries out production and processing, the operation side that false proof article are concluded the business and served, the consumption side that article are finally held and used, and the authenticating party of responsible article genuine-fake checking and the manager that false proof item circulation information is stored and handled, the information interaction and the inquiring and authenticating that utilize computer technology and communication facilities and information network to carry out article anti-counterfeit are handled.By method provided by the invention, realize the renewal of information interaction and Data Dynamic by each side, reach the purpose of anti-falsifying, false proof anti-vacation.To further instruction of the present invention, what relate in the said method wants prime implicant sequence number, key element item title, constituent encoder information element table specific as follows for convenient:
Want prime implicant sequence number key element item title constituent encoder
1 name of an article coding is made a report on by each side's stipulated form
2 produce coding makes a report on by actual state
3 manufacturing sides coding is made a report on by each side's stipulated form
4 dates of manufacture made a report on by actual state
5 production batch are made a report on by actual state
6 packager codes are made a report on by each side's stipulated form
7 goods categories are made a report on by each side's stipulated form
8 article specifications are made a report on by each side's stipulated form
9 quality grades are made a report on by each side's stipulated form
The 10 article terms of validity are made a report on by actual state
11 market guiding prices are made a report on by actual state
The clear and definite functional requirement and the implementation method of each side in the method disclosed by the invention, that is:
1, manufacturing side, be in the legal manufacturing side of authenticating party registration and obtain production terminal system with unique ID code identification, utilize production terminal or system according to the information element data of the information element table (referring to above-mentioned information element table) of false proof article and coding and decoding number of regulation and the algorithm sequence number that produces with random fashion, call the rule and the algorithm of corresponding sequence number in the coding and decoding rule base that presets and the algorithms library, and the information element data are carried out encoding process by corresponding agreement, generate security code and mark and pack in false proof article or its, all obtain a unduplicated security code with each article of quadrat method, simultaneously, production terminal or system also generate the extend information of security code and send to authenticating party and manager is stored in the database standby when false proof article warehouse-in;
2, operation side, be lawful operation side that registers with authenticating party in manufacturing side and the point-of-sale terminal system that obtains unique ID code identification, the false proof article anti-counterfeit sign indicating number that utilizes point-of-sale terminal to stock up, login and send to authenticating party one by one, authenticating party with transaction coding on the trading card of stocking up receive and pass through through audit after will corresponding false proof article the security code activation; Have again, point-of-sale terminal possesses the numerical coding that will key in by specified coding decoding number of regulation and algorithm sequence number, call the rule and the algorithm of corresponding sequence number in the coding and decoding rule base that presets and the algorithms library, and by corresponding agreement the numerical coding of keying in is carried out encoding process and generate security code, or the security code of keying in is decrypted by corresponding agreement goes back original encoding; When finishing each transaction, generate trading card automatically and print and send to authenticating party.
3, consumption side, directly the security code of the false proof article of input and the ID code identification of point-of-sale terminal are decoded to utilize validator that self existing authenticated side authorizes, operation side is input to the security code of corresponding false proof article and decodes in the point-of-sale terminal simultaneously, at this moment, it should be the same that point-of-sale terminal and validator reduce the restoring code that output shows, and distinguishes the true from the false with this;
When if consumer self does not have validator, 1) utilizes communication facilities and authenticating party inquiries such as phone or computer, its querying method is some bit digital or certain the some position of security code or the ID coding of whole and point-of-sale terminal etc. that send the decision of consumption side, simultaneously, also will encode equally and be input to the point-of-sale terminal of operation side, one or more groups number through the decoding recovery of authenticating party passback is received by consumption side, be used for and one or more groups number that restores through decoding of the point-of-sale terminal of the side of operation output compares, contrast conforms to for very.2) utilize point-of-sale terminal to carry out independent preliminary verification, preceding some positions of input security code add the ID coding of on-site postcode or point-of-sale terminal or the feature coding of other agreement, and the legitimate sales terminal should be able to correctly demonstrate the not importation of security code and the investigated information of other agreement;
4, authenticating party, utilize computer system and associated databases, according to the information of receiving, call the rule and the algorithm of corresponding sequence number in the coding and decoding rule base that presets and the algorithms library, by corresponding agreement information data is carried out decoding processing, and by inquiry, transaction, change and corresponding information classification the side's of operation identity, article trading state, coding correctness, algorithm and rule, other necessary information are verified, change by verifying conclusion that recorded information sends manager simultaneously to and inquiry terminal and equipment answer information are given in passback.
5, manager, the information of utilizing each side to send is added up, analysis and data preparation, and forms false proof item circulation information bank, for manufacturing side or the use of other side of licensing.
The present invention is made as two parts with checking in the security code of described manufacturing side and operation side, a part also is a plain code through the individual information identification code that carries out coding encrypting by agreement promptly for static security code, be labeled on false proof article or its packing, or on the plain code basis, increase a corresponding bar code or other machine readable code; Mutual yard of forming by implicit dynamic mode of plain code or the multidate information that can import arbitrarily for dynamic sign indicating number of another part, be used to verify the true and false, mutual sign indicating number carries out one or many in an authenticity verification process, each change is decided in its sole discretion by the end user for different mutual sign indicating numbers.The security code of described manufacturing side and operation side constitutes one of the data that must report and submit manufacturing side (referring to above-mentioned information element table) that is based on when authenticating party is registered, it is the coding of the following information element among the information element table: manufacturer's coding, the name of an article or goods categories coding, article production coding, packager code, the production batch numbering, the article date of manufacture, the article term of validity, number of regulation, the algorithm sequence number, and the coding of other and article relevant information key element, select all or part of but must comprise number of regulation and the algorithm sequence number, through being undertaken forming security code behind the scrambled by the rule of agreement and algorithm and mode, wherein number of regulation and algorithm sequence number are not participated in the scrambled process of agreement usually, or participate in the scrambled process of agreement under the mode of agreement;
Wherein:
1) manufacturer coding is in the legal manufacturing side of authenticating party registration and obtain the manufacturer's coding with unique ID;
2) name of an article or goods categories coding is that Item Title, model, rank etc. are encoded one to one by the species a kind of and false proof article of the side of manufacturinging formulation, according to industry or international numbering or define its coding voluntarily;
3) article production coding, of being that each false proof article obtains when producing numbers one to one with false proof article or production sequence number and be unique in each production batch;
4) packager code is to a kind of coding of definition such as manner of packing, specification, material, quantity and assembly unit and suit;
5) article production batch numbering is that article are being produced the production batch numbering on the same day;
6) the article date of manufacture is article on the date of producing the same day, and the date increases Hour Minute Second etc. as required;
7) the article term of validity, for several months year or unit At All Other Times;
8) number of regulation is a numbering of each rule relative position in sequence in the coding and decoding sequence of rules;
9) the algorithm sequence number is a numbering of each algorithm relative position in sequence in the sequence of algorithms.
Code And Decode is that the regular and algorithm of by appointment coding and decoding is finished in the security code of described manufacturing side and the side of operationing, the rule of its agreement be with manufacturing side in the information element definition list that registration the time will be reported and submitted information element coding putting in order or and the putting in order together of algorithm sequence number item, rearrange, obtain a plurality of arrangement modes, each arrangement mode is as a rule; Or with the order of the algorithm invokes in the sequence of algorithms as rule; Or the relative first address of sequence of algorithms ordering defined as regular as dynamic first location; But algorithm is a plurality of integer arithmetics and with the algorithm that computing is reduced, and lines up an orderly sequence of algorithms, and this sequence definition is the ring-like chain of dynamic first location, or specifies sortord by rule.
The key that security code method for designing of the present invention is different from art methods is to utilize the rule and the algorithm of corresponding sequence number in the sequence of the coding and decoding rule base preset and algorithms library, and by corresponding agreement information data is carried out Code And Decode and handle, and the sequence number of rule and algorithm is the dynamic random generation, in coding, be provided with the number of regulation of making an appointment and the coding site of algorithm sequence number, particularly the coding of the coding of regular position and algorithm position does not usually all participate in the process that rule and algorithm by agreement carry out scrambled, only participates in the process that rule and algorithm by agreement carry out scrambled under the mode of special agreement.So just realize that there are initiative and independence in each side when information interaction effectively, keep consistency, also make simultaneously and test yard device and can verify and utilize the inventive method to realize other false proof false proof article, therefore, make and test a yard utensil versatility is widely arranged, accomplish a tractor serves several purposes and constantly upgrading.Assist by the terminal that utilize to adopt difference manufacturing side that the inventive method realizes and the side of operationing and to discern the false from the genuine, better stop the clone and the fraud of a whole set of false proof system.
Implementation procedure of the inventive method and method are to declare registration by consolidation form and content request to authenticating party by manufacturing side, its way is: manufacturing side should be in advance in the authenticating party registration, obtain manufacturer's coding that authenticating party authorizes and obtain production terminal or system with unique ID code identification with unique ID; When registration, need report and submit the information element definition list, and:
1) registration the time should provide legal and valid production and operation license, legal person, address, contact method, and name of product, quantitative range, packaged form etc.
2) production terminal presses treaty rule and algorithm generates the output security code, and each is produced sign indicating number expansion stateful transaction, and Price Range and other information send related systems such as authenticating party and management system to after forming the formatted data file.
Manufacturing side should register and report and submit information element definition list (referring to above-mentioned information element table) at authenticating party, operation side should register at authenticating party after the sale authorization that obtains the side of manufacturing or the higher level side of operation, and the authorized party has finished to authorize at authenticating party and has put on record, after authenticated side's audit is passed through, be manufacturing side or operations side registration, appraise and decide manufacturer's coding or appraise and decide that the operator with unique ID encodes and be its assembly and authorize production terminal or the system that has unique ID code identification accordingly or point-of-sale terminal with unique ID code identification with unique ID by audit.
Manufacturing side has anti-fake encrpted coding and forms security code and finish that false proof article are manufactured and when packing the back warehouse-in, promptly transmit corresponding security code and extended code information by the agreement form finishing.When being different from art methods crucial, the signal that sends authenticating party to has also increased the function of automatic generation extended code except anti-counterfeit number, wherein comprised the setting of stateful transaction, effective like this generation that prevents old sign indicating number multiplex technique defective.No matter be that manufacturing side or operation side are before selling shipment, utilize the function of extended code to veritify the true and false of seller qualification and article by authenticating party, when selling shipment, generate the trading card of this transaction, its method is: the production terminal of described manufacturing side or the point-of-sale terminal of operation side generate trading card when finishing each transaction, and the e-file of trading card is real-time transmitted to authenticating party, receive again to show after authenticating party is confirmed and printing respective transaction list, inquire about after sale, check and approve for consumption side or operation side; Its trading card should be included as at least: trading card numbering, both parties' terminal number, consumer's endless should provide clear and definite personalized identification coding, the intensive good security code of encrypting by agreement part or all, unit price, exchange hour, transaction ground postcode and other necessary information; Authenticating party utilizes computer system and associated databases, according to the information of receiving, call the rule and the algorithm of corresponding sequence number in the coding and decoding rule base that presets and the algorithms library, by corresponding agreement information data is carried out decoding processing, and by inquiry, transaction, change and corresponding information classification the side's of operation identity, article trading state, coding correctness, algorithm and rule, other necessary information are verified, change by verifying conclusion that recorded information sends manager simultaneously to and inquiry terminal and equipment answer information are given in passback.
Authenticating party is after the checking trading card is errorless, generating transmission trading card numbering and confirmation, change the stateful transaction and the relevant information of extended code information simultaneously, its stateful transaction information is: the stateful transaction information that generates in process of exchange, be that the false proof product of record are in process of exchange: in the storehouse, on sale, sell, scurry and sell, transfer and sell, move back and sell, change the coding of selling, reaching other state unusually, represented transaction article certain stateful transaction at that time; Wherein except that the storehouse state is only inquired about for manufacturing side, authenticating party and other authorized party, other state is when security code becomes state of activation, inquire about by authenticating party for each side, stateful transaction information is in authenticating party and extended code information data file that manager stored;
Because adopting the false proof article that the side of operationing managed must be by the false proof article of point-of-sale terminal activation, so not only better stops the falsifying phenomenon, and key also dwindled query context greatly, reduced query time, saved operating cost.
The present invention's another characteristics in implementation procedure and method are, no matter which kind of marketing system operation side is, which kind of sell with mode no matter be, sellers must be by the aptitude checking of manufacturing side and authenticating party, and registration and authorize special-purpose point-of-sale terminal, this terminal is to verify by authenticating party, or utilizes other terminal to verify its true and false, particularly utilizes its true and false of validator validates of consumption side oneself.Be characterized in: validator input security code, and the restoring code behind automatic decoding demonstration and the output decoder is used for comparing with the result of point-of-sale terminal output; Simultaneously, import other coding, and encode or decode, so that consumption side is used to check the true and false of operation side and authenticating party by consumption side's prescribed coding decoding number of regulation and algorithm sequence number; Consumption terminal also have Generalized Communication Interface or wireless communication interface (as USB standard or rs-232 standard etc.), directly and production terminal or point-of-sale terminal carry out information interaction, encode or decoding and truth identification, perhaps finish data upgrading and renewal work automatically.
The method of a kind of interactive dynamic forgery prevention disclosed by the invention and checking, make production terminal and the point-of-sale terminal can both off-line working in the most of the time, the point-of-sale terminal that it is characterized in that the production terminal of described manufacturing side or operation side off line at ordinary times works alone, ability is online or carry out information interaction by other meanss of communication such as phones when sending inquiry and Transaction Information, authenticating party upgrading and when upgrading data message can be notified the holder terminal operation of networking; The validator of consumption side is networked voluntarily or is finished upgrading renewal work by connecting machine with production terminal or point-of-sale terminal.Like this, fall the operation cost of false proof system greatly, particularly significantly reduced the expense of call duration time and expense.
Beneficial effect
1, the inventive method is to have utilized the mode of the such functional expression scrambled of dynamic rule and algorithm, only need sign string number or character on false proof article, and cooperate interactive inquiry to verify, having reached the security code sign that also makes when improving anti-counterfeiting performance on the false proof article becomes very simple, is easy to production and processing, technical solution of the present invention compared to existing technology, reduce cost greatly, be convenient to promote the use of.
2, make up false proof system with the inventive method, the system that produces and sells information management with employing computing machine commonly used in the existing society is similar, be convenient to upgrading and become the application system that is suitable for the inventive method, not only reduce investment but also be easy to realization, particularly on use-pattern, merge easily with existing system.
3, technical solution of the present invention adopts the information interaction mode to form dynamic coding and decoding truly, and use each side really to realize independent operating, particularly consumption side initiatively and leading real and fake discrimination mode and participate in the process of coding and decoding, become " performing artist of magic " and no longer only be an onlooker, this not only increases the confidence to false proof system, but also provides stage and safety assurance for the third party participates in discerning.
4, technical solution of the present invention adopts unique security code Activiation method, has improved efficient, has reduced cost, has better prevented falsifying and has helped reviewing and circulation control of article.
Because manage all the false proof article that enough to sell, its security code is the security code that terminal activated of this operation side oneself, and be state on sale, just in own storehouse, a genuine piece with a pseudo-product replacement oneself all is unworthy genuine piece in any case that can sell, and be easy to after the sell-fake-products be traced back on the own head, bear corresponding illegal responsibility, cause very big risk for like this operation side, effectively hit the illegal retailer of manufacturing and marketing the fake.
5, the inventive method adopts the stateful transaction checking method of unique Interactive Dynamic, and combine with the security code Activiation method, can make security code when repeatedly inquiring about, also effectively stop to utilize the new sign indicating number of second hand packing (old sign indicating number) or new packing to duplicate the imitation behavior of security code, thereby effectively prevented growing of fake products.
Description of drawings
Fig. 1 is a schematic flow sheet of the present invention.
Fig. 2 is a detailed process synoptic diagram of the present invention.
Embodiment
As an example of the present invention, reflect embodiment of the present invention and implement link and main points, realize the principal advantages and the effect of false proof and verification method of the present invention.But the invention is not restricted to condition given in the example and specific practice.The professional and technical personnel at method scope inner conversion rule of the present invention, algorithm and other assembling form, realizes different application systems in conjunction with the condition and the environment of concrete practice, and this also is self-explantory, therefore describes in detail no longer one by one.
The specific embodiment of the present invention is described with following example.
The method according to this invention, pre-establish and provide manufacturing side's log-on message call format by authenticating party, or by pre-establishing operation side's log-on message call format respectively with manufacturing side, and by with shared a kind of operation side, manufacturing side log-on message call format, this example adopts a kind of mode of common use to obtain the information element table, obtains table 3 with reference to figure 2.Authenticating party or pre-established rule base G (as table 1) and algorithms library S (as table 2) with other side.For exemplary purposes, this example selected rule storehouse G has 3 rules, and algorithms library S has 5 kinds of algorithms, when enforcement is of the present invention in other practice, and available more rule and algorithm, its antifalse effect is better.
Table 1: rule base G
The number of regulation rule
1 G1: the information element list item is sorted successively for forward in proper order, and algorithm item row is second from the bottom, and regularization term is not for
2 G2: in proper order for swinging to successively ordering, row is second from the bottom for the algorithm item with the information element list item, and regularization term is not for
3 G3: the information element list item is arranged successively for first forward odd numbers in proper order, and the forward even numbers is arranged successively again,
(design is more, more complicated according to demand)
Table 2: algorithms library S (She Ji algorithm is more according to demand, and is more complicated)
Algorithm sequence number algorithm
1 S1: each information element item coding+11, algorithm item and regularization term do not participate in computing
2 S2: each information element item odd numbers item+11, even numbers item+22;
3 S3: each information element item forward successively+11,22,33,
4 S4: each information element item swings to successively+and 11,22,33,
5 S5: each information element item forward successively+9,8,7,6,5 ...,
Table 3: information element table Y
Want prime implicant sequence number key element item title constituent encoder
1 name of an article coding 066
2 produce coding 75432
3 manufacturing sides coding 033
4 dates of manufacture 100218
5 production batch 08
6 packager codes 03
7 algorithm sequence numbers 04
8 number of regulations 02
Annotate: (during 25 codings, change design as required, increase and decrease are wanted prime implicant and the figure place of encoding) wherein algorithm sequence number and number of regulation generates at random.
Information element is the Back ground Information that generates the individual character security code, and other log-on message be for examine qualification and review the logistics incident according to information, decide according to the actual requirements, be not described in detail in this.
Authenticating party will be appraised and decided the manufacturer coding with unique ID or appraise and decide operator's coding with unique ID and for its assembly and authorize production terminal or the system that has unique ID code identification accordingly or the point-of-sale terminal with unique ID code identification; Or basic necessary functions such as coding and decoding function are made the validator that consumption side uses.
After manufacturing side obtains the production terminal with unique ID coding, can be that each false proof article generates security code of preparation in manufacturing process, the element information coded number word string of a product in this example be:
066 75432 033 100218 08 03 04 02
The scrambled process that generates security code according to a preconcerted arrangement is as follows:
According to about graded of elder generation's rule back algorithm,
Because of number of regulation is 02, then obtain:
03 08 100218 033 75432 066 04 02
Because of the algorithm sequence number is 04, then obtain:
69 63 100,262 066 75,454 077 04 02 (these 25 figure places be encoded to article anti-counterfeit sign indicating number)
When manufacturing side sells operation side with these false proof article, and the e-file of trading card is real-time transmitted to authenticating party, receives that again authenticating party confirms that the back shows and to print respective transaction single, obtained authenticating party and confirmed as very this moment, concludes the business for the first time and finish.Sending the anti-counterfeit number of supplier's trading card numbering and article to authenticating party by its point-of-sale terminal after stocking up in operation side verifies and logins, receive the information and checking of operation side's login at authenticating party after, the security code of these false proof article is activated, authenticating party is preserved trading card and the stateful transaction of this false proof article extended code information is changed into state on sale by the warehouse-in state, sends trading card and extended code information to manager simultaneously.
Consumption side is when buying, use validator, the checking true and false, promptly import anti-counterfeit number, 6,963 100,262 066 75,454 077 0402, the inverse process that validator is decoded and promptly encoded, by the engagement arithmetic sequence number is 04, after the inverse operation decoding be: 03 08 100,218,033 75,432 066 04 02, be 02 to carry out obtaining 066 75,432 033 10,021,808 03 04 02 after the reverse recovery by the treaty rule sequence number, obtain the original encoding of security code.Manage simultaneously and also should solve correct original encoding after square cotter is sold terminal input anti-counterfeit number, the then false proof article of both sides' unanimity are true; If the no validator in consumption side sends to the authenticating party inquiry with security code, compare and to distinguish the true from the false with authenticating party original encoding that returns and the original encoding that operation side restores.
In addition, when transaction was finished, the trading card numbering according to print operation side sent to authenticating party, directly obtains the trading card out of Memory that authenticating party is beamed back, and distinguishes the true from the false for the comparison of consumption side.
If think that above-mentioned example security code is long, the length of adjusting security code by the key element item title or the constituent encoder of adjustment information key element table, above-mentioned example adjustment information key element table Y obtained table 4 after, then the length of security code is adjusted, that is:
Table 4: information element table Y2
Want prime implicant sequence number key element item title constituent encoder
1 name of an article coding 06
2 produce coding 543
3 manufacturing sides coding 03
4 dates of manufacture 0218
5 production batch
6 packager codes 03
7 algorithm sequence numbers 4
8 number of regulations 2
Encode according to the relevant agreement of above-mentioned example and to obtain:
06?543?03?0218?03?4?2
Because of number of regulation is 02, then obtain:
03?0218?03?543?06?4?2
Because of the algorithm sequence number is 04, then obtain:
58 0,262 36 565 17 42 (these 15 figure places be encoded to article anti-counterfeit sign indicating number)
The present invention is under offline condition, utilize two different terminals or validator to authenticate mutually, promptly on a station terminal A, import the mutual sign indicating number 345673 of several bit digital arbitrarily, if position, treaty rule end is the algorithm sequence number, that is: position, 345673 end 3 is algorithm sequence numbers, dynamically sign indicating number has implied dynamic mode by position, plain code 345673 end 3, suppose sequence number be 3 algorithm be+33, press key letter, export the test patterns of the mutual sign indicating number in group encryption coding back, then obtain test patterns 346003, with test patterns 346003 another terminal B that will verify of input,, export one group of numerical coding 345673 of restoring by the decoding key, compare with several bit digital 345673 of on a station terminal A, importing at first, declare its true and false.
More than just for a given simple examples of its embodiment of method that a kind of interactive dynamic forgery prevention of the present invention and checking are described, the professional and technical personnel carries out different assembly according to different application demands with condition, obtain application system more targetedly, as long as technician's complete understanding method of the present invention, with reference to but be not limited to the mode of this example, flexible Application makes up different Application in Anti-counterfeiting systems.

Claims (9)

1. the method for interactive dynamic forgery prevention and checking, this method is made up of manufacturing side, operation side, consumption side, authenticating party, manager's five parts, it is characterized in that by to implementing the manufacturing side that article anti-counterfeit carries out production and processing, the operation side that false proof article are concluded the business and served, the consumption side that article are finally held and used, and the authenticating party of responsible article genuine-fake checking and the manager that false proof item circulation information is stored and handled, the information interaction and the inquiring and authenticating that utilize computer technology and communication facilities and information network to carry out article anti-counterfeit are handled;
A) manufacturing side, be in the legal manufacturing side of authenticating party registration and obtain production terminal system with unique ID code identification, utilize production terminal or system according to the information element data of the information element table of false proof article and coding and decoding number of regulation and the algorithm sequence number that produces with random fashion, call the rule and the algorithm of corresponding sequence number in the coding and decoding rule base that presets and the algorithms library, and the information element data are carried out encoding process by corresponding agreement, generate security code and mark and pack in false proof article or its, all obtain a unduplicated security code with each article of quadrat method, simultaneously, production terminal or system also generate the extend information of security code and send to authenticating party and manager is stored in the database standby when false proof article warehouse-in;
B) operation side, be in the lawful operation side of manufacturing side and authenticating party registration and obtain point-of-sale terminal system with unique ID code identification, the false proof article anti-counterfeit sign indicating number that utilizes point-of-sale terminal to stock up, login and the transaction on the trading card of stocking up coding send to authenticating party one by one, authenticating party receive and pass through through audit after will corresponding false proof article the security code activation; Have again, point-of-sale terminal possesses the numerical coding that will key in by specified coding decoding number of regulation and algorithm sequence number, call the rule and the algorithm of corresponding sequence number in the coding and decoding rule base that presets and the algorithms library, and by corresponding agreement the numerical coding of keying in is carried out encoding process and generate security code, or the security code of keying in is decrypted by corresponding agreement goes back original encoding; When finishing each transaction, generate trading card automatically and send authenticating party to and print and give the counterpart;
C) consumption side, directly the security code of the false proof article of input and the ID code identification of point-of-sale terminal are decoded to utilize validator that self existing authenticated side authorizes, operation side is input to the security code of corresponding false proof article and decodes in the point-of-sale terminal simultaneously, at this moment, it should be the same that point-of-sale terminal and validator reduce the restoring code that output shows, and distinguishes the true from the false with this;
When if consumer self does not have validator, 1) utilizes communication facilities and authenticating party inquiries such as phone or computer, its querying method is some bit digital or certain the some position of security code or the ID coding of whole and point-of-sale terminal that sends the decision of consumption side, simultaneously, also will encode equally and be input to the point-of-sale terminal of operation side, one or more groups number through the decoding recovery of authenticating party passback is received by consumption side, be used for and one or more groups number that restores through decoding of the point-of-sale terminal of the side of operation output compares, contrast conforms to for very; 2) utilize point-of-sale terminal to carry out independent preliminary verification, preceding some positions of input security code add the ID coding of on-site postcode or point-of-sale terminal or the feature coding of other agreement, and the legitimate sales terminal should be able to correctly demonstrate the not importation of security code and the investigated information of other agreement;
D) authenticating party, utilize computer system and associated databases, according to the information of receiving, call the rule and the algorithm of corresponding sequence number in the coding and decoding rule base that presets and the algorithms library, by corresponding agreement information data is carried out decoding processing, and by inquiry, transaction, change and corresponding information classification the side's of operation identity, article trading state, coding correctness, algorithm and rule, other necessary information are verified, change by verifying conclusion that recorded information sends manager simultaneously to and inquiry terminal and equipment answer information are given in passback;
E) manager, the information of utilizing each side to send is added up, analysis and data preparation, and forms false proof item circulation information bank, for manufacturing side or the use of other side of licensing.
2. according to the method for described interactive dynamic forgery prevention of claim 1 and checking, it is characterized in that checking in the security code of described manufacturing side and operation side is made as two parts, a part is labeled on false proof article or its packing for static security code also is a plain code through the individual information identification code that carries out coding encrypting by agreement promptly; Another part is dynamic mutual yard of being formed by the multidate information of implicit dynamic mode of plain code or input arbitrarily of sign indicating number, be used to verify the true and false, mutual sign indicating number carries out one or many in an authenticity verification process, each change is decided in its sole discretion by the end user for different mutual sign indicating numbers.
3. according to the method for described interactive dynamic forgery prevention of claim 1 and checking, the security code formation that it is characterized in that described manufacturing side and operation side comprises: manufacturer's coding, the name of an article or goods categories coding, article production coding, packager code, the production batch numbering, the article date of manufacture, the article term of validity, the coding and decoding number of regulation, the algorithm sequence number, and the coding of other and article relevant information key element, select all or part of but must comprise complete coding and decoding number of regulation and algorithm sequence number, through being undertaken forming security code behind the scrambled by the coding and decoding rule of agreement and algorithm and mode, wherein coding and decoding number of regulation and algorithm sequence number are not participated in the scrambled process of agreement, or participate in the scrambled process of agreement under the mode of agreement.
4. according to the method for described interactive dynamic forgery prevention of claim 1 and checking, it is characterized in that Code And Decode in the security code of described manufacturing side and the side of operationing is that the regular and algorithm of by appointment coding and decoding is finished, the rule of its agreement be with manufacturing side in the information element definition list that registration the time will be reported and submitted information element coding putting in order or and the putting in order together of algorithm sequence number item, rearrange, obtain a plurality of arrangement modes, each arrangement mode is as a rule; Or with the order of the algorithm invokes in the sequence of algorithms as rule; Or the relative first address of sequence of algorithms ordering defined as regular as dynamic first location; But algorithm is a plurality of integer arithmetics and with the algorithm that computing is reduced, and lines up an orderly sequence of algorithms, and this sequence definition is the ring-like chain of dynamic first location, or specifies sortord by rule.
5. according to the method for described interactive dynamic forgery prevention of claim 1 and checking, it is characterized in that described manufacturing side should register and report and submit the information element definition list at authenticating party, operation side should register at authenticating party after the sale authorization that obtains the side of manufacturing or the higher level side of operation, and the authorized party has finished to authorize at authenticating party and has put on record, after authenticated side's audit is passed through, be manufacturing side or operations side registration, appraise and decide manufacturer's coding or appraise and decide that the operator with unique ID encodes and be its assembly and authorize production terminal or the system that has unique ID code identification accordingly or point-of-sale terminal with unique ID code identification with unique ID by audit.
6. according to the method for described interactive dynamic forgery prevention of claim 1 and checking, it is characterized in that the production terminal of described manufacturing side or the point-of-sale terminal of operation side generate trading card when finishing each transaction, and the e-file of trading card is real-time transmitted to authenticating party, receive again to show after authenticating party is confirmed and printing respective transaction list, inquire about after sale, check and approve for consumption side or operation side; Its trading card should be included as at least: trading card numbering, both parties' terminal number, consumer's endless should provide clear and definite personalized identification coding, the intensive good security code of encrypting by agreement part or all, unit price, exchange hour, transaction ground postcode and other necessary information.
7. according to the method for described interactive dynamic forgery prevention of claim 1 and checking, it is characterized in that the stateful transaction information that in described process of exchange, generates, be that the false proof product of record are in process of exchange: in the storehouse, on sale, sell, scurry and sell, transfer and sell, move back and sell, change the coding of selling, reaching other state unusually, represented transaction article certain stateful transaction at that time; Wherein except that the storehouse state is only inquired about for manufacturing side, authenticating party and other authorized party, other state is when security code becomes state of activation, inquire about by authenticating party for each side, stateful transaction information is in authenticating party and extended code information data file that manager stored.
8. according to the method for described interactive dynamic forgery prevention of claim 1 and checking, it is characterized in that the validator input security code of described consumption side, and the restoring code behind automatic decoding demonstration and the output decoder is used for comparing with the result of point-of-sale terminal output; Simultaneously, import other coding, and encode or decode, so that consumption side is used to check the true and false of operation side and authenticating party by consumption side's prescribed coding decoding number of regulation and algorithm sequence number; Consumption terminal also has Generalized Communication Interface or wireless communication interface, directly carries out information interaction with production terminal or point-of-sale terminal, encodes or decoding and truth identification, perhaps finishes data automatically and upgrades and renewal work.
9. according to the method for described interactive dynamic forgery prevention of claim 1 and checking, the point-of-sale terminal that it is characterized in that the production terminal of described manufacturing side or operation side off line at ordinary times works alone, ability is online or carry out information interaction by other meanss of communication such as phones when sending inquiry and Transaction Information, authenticating party upgrading and when upgrading data message can be notified the holder terminal operation of networking; The validator of consumption side is networked voluntarily or is finished upgrading renewal work by connecting machine with production terminal or point-of-sale terminal.
CN201010146667A 2010-04-09 2010-04-09 Method for interactive dynamic forgery prevention and verification Pending CN101807285A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010146667A CN101807285A (en) 2010-04-09 2010-04-09 Method for interactive dynamic forgery prevention and verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010146667A CN101807285A (en) 2010-04-09 2010-04-09 Method for interactive dynamic forgery prevention and verification

Publications (1)

Publication Number Publication Date
CN101807285A true CN101807285A (en) 2010-08-18

Family

ID=42609067

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010146667A Pending CN101807285A (en) 2010-04-09 2010-04-09 Method for interactive dynamic forgery prevention and verification

Country Status (1)

Country Link
CN (1) CN101807285A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102999771A (en) * 2011-09-19 2013-03-27 周锡卫 Commodity anti-counterfeiting code construction and verification method
CN103064848A (en) * 2011-10-20 2013-04-24 智比特信息技术(镇江)有限公司 Anti-counterfeit method
CN103489121A (en) * 2013-09-10 2014-01-01 济南山河环境科技有限公司 Anti-counterfeiting off-site commodity transaction method and system
TWI496095B (en) * 2013-09-18 2015-08-11 Chia Ming Kang Anti-counterfeit verification system
CN104924784A (en) * 2014-03-17 2015-09-23 诚研科技股份有限公司 Consumable management method and equipment thereof
CN105321076A (en) * 2014-06-03 2016-02-10 江南大学 Variable and long-term anti-counterfeiting marking method and system for circulation commodities
CN105405019A (en) * 2015-10-30 2016-03-16 曹博 Machine original goods certified goods verification method
CN105678360A (en) * 2015-02-11 2016-06-15 黄世纬 Product anti-counterfeiting method used for returned product renewing
CN105894303A (en) * 2015-02-11 2016-08-24 黄世纬 Product anti-counterfeiting method, product anti-counterfeit examination method and anti-counterfeit package
CN105894302A (en) * 2015-02-11 2016-08-24 黄世纬 Product anti-counterfeiting method
CN108335104A (en) * 2017-01-17 2018-07-27 行动先驱公司 Method and apparatus for secure identifier management
CN108510016A (en) * 2017-02-24 2018-09-07 上海梅山钢铁股份有限公司 A kind of system and method with dynamic anti-fake function
CN109615400A (en) * 2018-12-10 2019-04-12 盐城华科智造数据科技有限公司 The specificity detection method of heterogeneous attached product
CN109978574A (en) * 2019-04-04 2019-07-05 广州市宝绅科技应用有限公司 A kind of anti-counterfeiting system and method for anti-counterfeit
CN110009803A (en) * 2017-12-26 2019-07-12 广州因文际会品牌策划有限公司 A kind of computer spare parts and accessories selling system Internet-based
CN110493267A (en) * 2019-09-20 2019-11-22 美茵滋成都品牌管理有限公司 A kind of anti-counterfeiting system and its method for anti-counterfeit of state encryption variable code
CN110781789A (en) * 2019-10-18 2020-02-11 云南程秀科技有限公司 Method for identifying, verifying and anti-counterfeiting by establishing article characteristic image associated identification code

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102999771A (en) * 2011-09-19 2013-03-27 周锡卫 Commodity anti-counterfeiting code construction and verification method
CN102999771B (en) * 2011-09-19 2015-07-01 周锡卫 Commodity anti-counterfeiting code construction and verification method
CN103064848A (en) * 2011-10-20 2013-04-24 智比特信息技术(镇江)有限公司 Anti-counterfeit method
CN103489121A (en) * 2013-09-10 2014-01-01 济南山河环境科技有限公司 Anti-counterfeiting off-site commodity transaction method and system
TWI496095B (en) * 2013-09-18 2015-08-11 Chia Ming Kang Anti-counterfeit verification system
CN104924784A (en) * 2014-03-17 2015-09-23 诚研科技股份有限公司 Consumable management method and equipment thereof
CN104924784B (en) * 2014-03-17 2017-07-04 诚研科技股份有限公司 Consumable management method and equipment thereof
CN105321076A (en) * 2014-06-03 2016-02-10 江南大学 Variable and long-term anti-counterfeiting marking method and system for circulation commodities
CN105894302A (en) * 2015-02-11 2016-08-24 黄世纬 Product anti-counterfeiting method
CN105894303A (en) * 2015-02-11 2016-08-24 黄世纬 Product anti-counterfeiting method, product anti-counterfeit examination method and anti-counterfeit package
CN105678360A (en) * 2015-02-11 2016-06-15 黄世纬 Product anti-counterfeiting method used for returned product renewing
CN105405019A (en) * 2015-10-30 2016-03-16 曹博 Machine original goods certified goods verification method
CN105405019B (en) * 2015-10-30 2019-09-20 曹博 A kind of original-pack commodity certified products verification method of machine
CN108335104A (en) * 2017-01-17 2018-07-27 行动先驱公司 Method and apparatus for secure identifier management
CN108510016A (en) * 2017-02-24 2018-09-07 上海梅山钢铁股份有限公司 A kind of system and method with dynamic anti-fake function
CN110009803A (en) * 2017-12-26 2019-07-12 广州因文际会品牌策划有限公司 A kind of computer spare parts and accessories selling system Internet-based
CN109615400A (en) * 2018-12-10 2019-04-12 盐城华科智造数据科技有限公司 The specificity detection method of heterogeneous attached product
CN109978574A (en) * 2019-04-04 2019-07-05 广州市宝绅科技应用有限公司 A kind of anti-counterfeiting system and method for anti-counterfeit
CN110493267A (en) * 2019-09-20 2019-11-22 美茵滋成都品牌管理有限公司 A kind of anti-counterfeiting system and its method for anti-counterfeit of state encryption variable code
CN110493267B (en) * 2019-09-20 2021-12-24 成都建为精电科技有限责任公司 Anti-counterfeiting system and anti-counterfeiting method for state encryption variable codes
CN110781789A (en) * 2019-10-18 2020-02-11 云南程秀科技有限公司 Method for identifying, verifying and anti-counterfeiting by establishing article characteristic image associated identification code

Similar Documents

Publication Publication Date Title
CN101807285A (en) Method for interactive dynamic forgery prevention and verification
CN109345264B (en) Wine product traceability anti-counterfeiting system and method based on block chain
US9818109B2 (en) User generated autonomous digital token system
CN102663592B (en) Article identity dicode identification method based on Quick Response Code
CN100576942C (en) A kind of mobile antifogery method and system thereof based on mobile phone
CN106570710A (en) Commodity anti-counterfeiting method and device
CN101236677B (en) False proof and false proof tax control integrated system for commodity product
CN102004965B (en) Double ant-counterfeiting method and system of product
US20050234823A1 (en) Systems and methods to prevent products from counterfeiting and surplus production also of tracking their way of distribution.
US20180240129A1 (en) Method and a system of electronic verification of reliability of goods introduced to the trade turnover and of transmission of data concerning the origin of goods
CN101847225B (en) A kind of method based on CN39 code managing commodity circulation
CN105469132A (en) Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method
CN103797475A (en) Anti-counterfeiting marking with asymmetrical concealment
WO2008086715A1 (en) Sanhe code for identifying merchandises
CN104574092A (en) Commodity anti-counterfeiting system based on invoice and commodity stocks accounting and anti-counterfeiting method
CN109658274A (en) Genuine piece insures method for anti-counterfeit and system
CN102722824A (en) Method for distinguishing authenticity of goods by using bar codes
CN104182866A (en) Product or object anti-counterfeiting system and method suitable for situations, such as switch transaction and the like
CN1947113B (en) Pedigree code
CN101441735A (en) Electric delivery bill and generating and verifying method thereof
CN102708391A (en) Anti-counterfeiting label on basis of fractal image and anti-counterfeiting verification method
RU2216776C2 (en) Method and system for identifying and accounting marked objects
CN115330408A (en) Anti-counterfeiting tracing method and system for gypsum board product
US20180285863A1 (en) User generated autonomous digital token system
CN108985431B (en) Anti-counterfeit label and method for detecting and identifying genuine goods of registered trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100818