CN105469132A - Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method - Google Patents

Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method Download PDF

Info

Publication number
CN105469132A
CN105469132A CN201610020358.XA CN201610020358A CN105469132A CN 105469132 A CN105469132 A CN 105469132A CN 201610020358 A CN201610020358 A CN 201610020358A CN 105469132 A CN105469132 A CN 105469132A
Authority
CN
China
Prior art keywords
code
quick response
response code
product
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610020358.XA
Other languages
Chinese (zh)
Inventor
尤霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI ZHONGSHUO INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI ZHONGSHUO INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI ZHONGSHUO INFORMATION TECHNOLOGY Co Ltd filed Critical SHANGHAI ZHONGSHUO INFORMATION TECHNOLOGY Co Ltd
Priority to CN201610020358.XA priority Critical patent/CN105469132A/en
Publication of CN105469132A publication Critical patent/CN105469132A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a duplicate coding internet of things traceability security label, comprising a 2-dimensional bar code, an upper layer label and a lower layer label. The 2-dimensional bar code comprises a 2-dimensional bar code external code and a 2-dimensional bar code internal code, wherein the 2-dimensional bar code external code is arranged on the upper layer label and used for goods traceablility querying; the 2-dimensional bar code internal code is arranged on the lower layer label and used for security verification; the upper layer label and the lower layer label only have edges jointed, and the upper layer label is provided with a tearing port; the 2-dimensional bar code internal code is used for a consumer to perform network security verification through handset scanning, the security verification being performed only once. After security verification, the security function of the 2-dimensional bar code internal code is immediately disabled, and scanning the 2-dimensional bar code internal code is equal to scanning a torn 2-dimensional bar code external code. The invention also discloses a 2-dimensional bar code security traceability method which is hard to copy and has high security.

Description

The Internet of Things of bigeminy coding is traced to the source antifalsification label and two-dimension code anti-counterfeit source tracing method
Technical field
The Internet of Things that the present invention relates to a kind of bigeminy coding is traced to the source antifalsification label and two-dimension code anti-counterfeit source tracing method.
Background technology
Two-dimensional bar code/Quick Response Code (2-dimensionalbarcode) is the chequered with black and white graphic recording data symbol information distributed in plane (on two-dimensional directional) according to certain rules with certain specific geometric figure; Coding utilizes the concept of " 0 ", " 1 " bit stream forming computer-internal logical foundations dexterously, the geometrical body using several corresponding with scale-of-two, to represent word numerical information, is processed to realize information by image input device or photoelectric scanning device automatically identifying and reading: it has some general character of barcode technology automatically: often kind of code system has its specific character set; Each character occupies certain width; There is certain verifying function etc.Also there is the information automatic identification function to different rows and processing graphics rotation change point simultaneously.Current false proof tracing technology scheme and defect: digital two dimensional code directly stamps a string security code on Quick Response Code, after consumer scans enters the Antiforge inquiry page, directly this string security code of input just can true-false inquiring.The shortcoming of this anti-counterfeiting technology is easily replicated, because there is this technology in current most of anti-sham campany, this is disclosed anti-counterfeiting technology.Just because of be disclosed technology, thus at present digital two dimensional code commercially use also more extensive.
Summary of the invention
The object of the invention is for above-mentioned the deficiencies in the prior art, provide one not transreplication, the Internet of Things of the bigeminy coding that security is good is traced to the source antifalsification label and two-dimension code anti-counterfeit source tracing method.
For realizing above-mentioned technical purpose, the technical scheme that the present invention takes is: the Internet of Things of bigeminy coding is traced to the source antifalsification label, it is characterized in that: comprise Quick Response Code, upper label and lower floor's label; Quick Response Code comprises Quick Response Code outer code and Quick Response Code ISN; Quick Response Code outer code is arranged on upper label, to trace to the source inquiry for commodity; Quick Response Code ISN is arranged on lower floor's label, for fake certification; Between upper label and lower floor's label only edge laminating and upper label is provided with tearing port.
Further, Quick Response Code outer code and Quick Response Code ISN are by URL, version number, commodity ID, service packet, carrier type and manufacturer's self-defining data composition, and Quick Response Code outer code coding and Quick Response Code ISN coding are one-type-two-part, i.e. bigeminy coding; The carrier type of Quick Response Code outer code adopts W to represent outer code; The carrier type of Quick Response Code ISN adopts N to represent ISN.
Further, Quick Response Code outer code is positioned at labels outer surface full position, carries out network to trace to the source inquiry for consumer by mobile phone barcode scanning to the place of production of commodity and the production process of circulation.
Further, Quick Response Code ISN is namely seen after tearing Quick Response Code outer code; Quick Response Code ISN is used for consumer and carries out network anti-counterfeit checking by mobile phone barcode scanning, and fake certification can only carry out once; After fake certification completes, the antiforge function of Quick Response Code ISN lost efficacy immediately, again scanned Quick Response Code ISN and was equivalent to scan the Quick Response Code outer code of having torn to pieces.
Further, Quick Response Code outer code and Quick Response Code ISN are ciphering two-dimension code; Described ciphering two-dimension code is made up of jointly product identification information and two-dimensional bar code anti-counterfeiting information; Product identification information comprises product factory title, product global identity uid, the name of an article, net content, brand, model, type, principal ingredient, date of manufacture, production batch, operator and production line; Product global identity uid, according to commodity code rule encoding, has global uniqueness, is used for identifying every part commodity, is printed on product external packaging with plain; Two-dimensional bar code anti-counterfeiting information adopts double layer encryption mechanism, and Quick Response Code outer code adopts product type level double secret key product identification information to be encrypted, and Quick Response Code ISN adopts numerical ciphers lock technology itself to be encrypted two-dimensional bar code anti-counterfeiting information.
Further, described product type level key is secondary key, derives various product type level key by root key; Described root key is manufacturer's level key, and manufacturer's level key leads each input password on the scene simultaneously by multidigit level of factory, is formed through algorithm combination; Go out each product type level key by the key derivation of product type level, described product type level key is end key.
Further, anti-fake two-dimension code adopts nanometer wet sensitive Quick Response Code.
This realizes above-mentioned technical purpose, and the another kind of technical scheme that the present invention takes is: two-dimension code anti-counterfeit source tracing method, it is characterized in that comprising the following steps:
The Internet of Things making bigeminy coding is traced to the source antifalsification label: Quick Response Code comprises Quick Response Code outer code and Quick Response Code ISN; Quick Response Code outer code is arranged on upper label, traces to the source inquiry for commodity; Quick Response Code ISN is arranged on lower floor's label, for fake certification; Between upper label and lower floor's label only edge laminating and upper label is provided with tearing port; Quick Response Code outer code and Quick Response Code ISN are by URL, version number, commodity ID, service packet, carrier type and manufacturer's self-defining data composition, and Quick Response Code outer code coding and Quick Response Code ISN coding are one-type-two-part, i.e. bigeminy coding; The carrier type of Quick Response Code outer code adopts W to represent outer code; The carrier type of Quick Response Code ISN adopts N to represent ISN; Quick Response Code outer code is arranged at labels outer surface full position, by mobile phone barcode scanning, network is carried out to the place of production of commodity and the production process of circulation for consumer and to trace to the source inquiry; Namely Quick Response Code ISN is seen after tearing Quick Response Code outer code; Quick Response Code ISN is used for consumer and carries out network anti-counterfeit checking by mobile phone barcode scanning, and fake certification can only carry out once; After fake certification completes, the antiforge function of Quick Response Code ISN lost efficacy immediately, again scanned Quick Response Code ISN and was equivalent to scan the Quick Response Code outer code of having torn to pieces; Quick Response Code outer code and Quick Response Code ISN are ciphering two-dimension code; Described ciphering two-dimension code is made up of jointly product identification information and two-dimensional bar code anti-counterfeiting information; Product identification information comprises product factory title, product global identity uid, the name of an article, net content, brand, model, type, principal ingredient, date of manufacture, production batch, operator and production line; Product global identity uid, according to commodity code rule encoding, has global uniqueness, is used for identifying every part commodity, is printed on product external packaging with plain; Two-dimensional bar code anti-counterfeiting information adopts double layer encryption mechanism, and the outer product type level double secret key product identification information that adopts is encrypted, and internal layer adopts numerical ciphers lock technology itself to be encrypted two-dimensional bar code anti-counterfeiting information;
Product is traced to the source: traced to the source by product indicia information realization product;
Authenticity of products is verified: by verifying two-dimensional bar code anti-counterfeiting information, differentiates the true and false of product.
Further, described employing numerical ciphers lock technology comprises the following steps two-dimensional bar code anti-counterfeiting information encryption method: arrange a key list file at false proof database, key list fileinfo comprises sequence number, encryption key and decruption key, a corresponding group encryption keys of sequence number and decruption key; The i-th group key Ki in Stochastic choice key list generates anti-forge cipher C1 to T1 encryption; Jth group key Kj in Stochastic choice key list generates verification password C2 to T2 encryption; Adopt product type level key K p to product false proof integrated information superencipher, product false proof integrated information comprises anti-forge cipher C1, UID and product identification information; Then utilize two-dimensional bar code coding algorithm generating two-dimension bar-code picture, be made into antifalsification label; Again C2 Key Sequence Number (i, j) and UID are delivered in false proof database and preserve, be convenient to verify in the future; T=T1rT2; T1 is used for generating anti-forge cipher C1; T2 is used for producing verification password C2; Only have T1 and T2 to combine and just can open the hiding information T of coded lock release.Both solved the anti-pseudo problem of security code itself by numerical ciphers lock technology, solve again the problem of divulging a secret of database.
Further, authenticity of products checking comprises the following steps:
The Internet of Things gathering bigeminy coding is traced to the source the Quick Response Code coded message of antifalsification label; Utilize product type level decryption key Pk to be decrypted coded message, obtain product global identity UID, anti-forge cipher C1 and product identification information;
In false proof database, Key Sequence Number i, Key Sequence Number j and verification password C2 is found by product global identity UID;
Utilize decruption key Ki to be decrypted anti-forge cipher C1 and obtain T1;
Utilize decruption key Kj to be decrypted C2 to obtain and T2;
Judge whether T1 and T2 can meet the relation of digital cipher lock T; If T1 and T2 can meet the relation of digital cipher lock T, then product is genuine piece, if T1 and T2 can not meet the relation of digital cipher lock T, then product is adulterant.
For the defect of anti-fake two-dimension code in the market, the present invention solves following technical matters:
(1) transreplication
Namely the inquiry of authenticity of products can be carried out after the false proof scanning input of tracing to the source of conventional two-dimensional code completes, the two-dimension code anti-counterfeit of this programme Quick Response Code of tracing to the source is double-deck Quick Response Code, outer Quick Response Code is the inquiry of information of tracing to the source, and opens outer Quick Response Code and can see internal layer Quick Response Code, and internal layer Quick Response Code is used for false proof.It is invalid that outer Quick Response Code is torn to pieces.So just effectively stop the risk that anti-fake two-dimension code is copied freely.
(2) security
Open skin user to trace to the source Quick Response Code, during the Quick Response Code inquiry of scanning internal layer anti-fake certificate, need inquiring and authenticating code below input internal layer Quick Response Code, after inquiring and authenticating code is correct, just can sees that the anti-counterfeiting information of product and product are traced to the source information.
(3) encryption
Native system encryption is divided into the encryption of two levels, and first level is the encryption of Quick Response Code rank, and this access code of password of the corresponding access of each Quick Response Code is inquiring and authenticating code, could access the content of this Quick Response Code after this password is correct.Mutual two levels are the encryption of two-dimension code anti-counterfeit content-level, this cryptographic algorithm exclusive algorithm that to be our company write through the research in anti-forge cipher field for many years and exploration.
(4) relevance
Quick Response Code be within outer bilayer Quick Response Code as interdependence, when internal layer Quick Response Code is queried scan outer Quick Response Code time can inform user's anti-fake two-dimension code when, where be queried authenticated.Outer Quick Response Code can be do not opened user and product false proof information can be known.Also stopping lawless person cheats consumer simultaneously.
Digital cipher lock: digital cipher lock technical design thought utilizes coding to produce device to produce the digit strings meeting certain mathematical relation for a pair.T=T1rT2; T1 is used for generating anti-forge cipher C1 (being equivalent to key of unblanking), and T2 is used for producing verification password C2 (being equivalent to lock), only has T1 and T2 combination just can open coded lock and releases the information T hidden.Both solved the anti-pseudo problem of security code itself by numerical ciphers lock technology, solve again the problem of divulging a secret of database.A key list file (sequence number, encryption key, decruption key) is set at false proof database, a corresponding group key of sequence number.Two-dimensional bar code encrypting step is as follows: to encrypt T1 with the i-th group key Ki in Stochastic choice key list and generate anti-forge cipher C1; Jth group key Kj in Stochastic choice key list generates verification password C2 to T2 encryption; >=adopt product type level key (secondary key)) Kp is to after product false proof integrated information (anti-forge cipher C1, UID and product identification information) superencipher, utilize two-dimensional bar code coding algorithm generating two-dimension bar-code picture, be made into antifalsification label.C2 Key Sequence Number (i, j) and UID are delivered in false proof database and preserve, be convenient to verify in the future.
Anti-fake two-dimension code false proof process: anti-fake two-dimension code adopts nanometer wet sensitive Quick Response Code: stamp pattern in 2 D code on nanometer wet sensitive antifalsification label, consumer is directly coated with water at label surface when telling truth from falsehood, if water display color pattern met by label, just illustrate it is genuine, if do not had, it is exactly the Quick Response Code that false consumer takes on mobile telephone scanning label after confirming genuine piece, directly have data to show, information is by businessman's setting themselves, the essential information of product can be shown, also can directly be linked to company official website.Current this technology maturation, but because the exclusive property of technology, not disclosed technology, so the businessman comparing the utilization of digital two dimensional code is fewer.This wet sensitive Quick Response Code advantage is exactly not reproducible, easily distinguishes.
The present invention in conjunction with current process planar bar code technology and anti-forge cipher, Software Engineering, communication engineering, the two-dimension code anti-counterfeit of the labeling that multidisciplinary of combining such as production technology is comprehensive with trace to the source platform.The production management combined with manufacturer production line, stock control, tag control etc., platform monitoring and warning, falsifying report and inspection.The analyses of the large data such as false proof statistics and Area distribution etc. and integration, prize drawing waits the return activity etc. of feedback terminal client.Define the complete scheme of a closed loop.In a word, the present invention is transreplication not, and security is good.
Accompanying drawing explanation
Fig. 1 be bigeminy coding Internet of Things trace to the source antifalsification label tear after structural representation.
Fig. 2 be bigeminy coding Internet of Things trace to the source antifalsification label tear before structural representation.
Fig. 3 is the structural representation of anti-fake traceability system.
Embodiment
Embodiment 1
See Fig. 1 and Fig. 2, the Internet of Things of this bigeminy coding is traced to the source antifalsification label, comprises Quick Response Code, upper label 1 and lower floor's label 2; Quick Response Code comprises Quick Response Code outer code 3 and Quick Response Code ISN 4; Quick Response Code outer code 3 is arranged on upper label 1, to trace to the source inquiry for commodity; Quick Response Code ISN 4 is arranged on lower floor's label 2, for fake certification; Between upper label 1 and lower floor's label 2 only edge laminating and upper label 2 is provided with tearing port.Quick Response Code outer code 3 and Quick Response Code ISN 4 are by URL, version number, commodity ID, service packet, carrier type and manufacturer's self-defining data composition, and Quick Response Code outer code coding 3 and Quick Response Code ISN coding 4 are one-type-two-part, i.e. bigeminy coding; The carrier type of Quick Response Code outer code 3 adopts W to represent outer code; The carrier type of Quick Response Code ISN 4 adopts N to represent ISN.Quick Response Code outer code 3 is positioned at labels outer surface full position, carries out network to trace to the source inquiry for consumer by mobile phone barcode scanning to the place of production of commodity and the production process of circulation.Namely Quick Response Code ISN 4 is seen after tearing Quick Response Code outer code 3; Quick Response Code ISN 3 carries out network anti-counterfeit checking for consumer by mobile phone barcode scanning, and fake certification can only carry out once; After fake certification completes, the antiforge function of Quick Response Code ISN 4 lost efficacy immediately, again scanned Quick Response Code ISN 4 and was equivalent to scan the Quick Response Code outer code 3 of having torn to pieces.Quick Response Code outer code 3 and Quick Response Code ISN 4 are ciphering two-dimension code; Described ciphering two-dimension code is made up of jointly product identification information and two-dimensional bar code anti-counterfeiting information; Product identification information comprises product factory title, product global identity uid, the name of an article, net content, brand, model, type, principal ingredient, date of manufacture, production batch, operator and production line; Product global identity uid, according to commodity code rule encoding, has global uniqueness, is used for identifying every part commodity, is printed on product external packaging with plain; Quick Response Code outer code 3 adopts product type level double secret key product identification information to be encrypted, and Quick Response Code ISN 4 adopts numerical ciphers lock technology itself to be encrypted two-dimensional bar code anti-counterfeiting information.Described product type level key is secondary key, derives various product type level key by root key; Described root key is manufacturer's level key, and manufacturer's level key leads each input password on the scene simultaneously by multidigit level of factory, is formed through algorithm combination; Go out each product type level key by the key derivation of product type level, described product type level key is end key.Quick Response Code adopts nanometer wet sensitive Quick Response Code.
Further, see Fig. 2, anti-fake traceability system, comprises product registration subsystem, products in circulation subsystem, consumer query subsystem, information management subsystem and background server; Product registration subsystem has been used for product initial information acquisition tasks; The task that products in circulation subsystem carries out product inquiry for bearing commission merchant and retailer, checks, reviews, adds up.Consumer query subsystem carries out the task of product inquiry, examination for bearing consumer.Information management subsystem is used for being responsible for manufacturer, the information management of commission merchant and retailer and maintenance task, and regularly generate the information report of the inquiry of product, personation, sales region, logistics and falsifying, regularly carry out data mining and analysis according to the inquiry times of same product, enquiry number, IP address, for departments to crack down on fake goods of producer and the government's product supervision department that cracks down on counterfeit goods provides information of cracking down on counterfeit goods; Described background server comprises key server, key server, security code generation server, fake certification server, application server, database server and remote back-up server; Can by Server Consolidation light for load in associated server when actual disposition, reduce server deployment cost, server capability is described below.Key server for generation of, registration, distribution, nullify and destroy key; Security code generation server is used for regularly generating unique internal layer key sequence and outer key sequence for each product; Fake certification server is asked for receiving false proof tracing to the source and ejects Password Input frame, and described Password Input frame is for inputting anti-forge cipher; Described anti-forge cipher is arranged on the below of the anti-fake two-dimension code of the second layer and passes through to cover across the coating opened; As anti-forge cipher is correct, the false proof information of tracing to the source of product can be inquired;
Fake certification process flow is as follows: obtain two-dimensional bar code coding information; Utilize product type level decryption key Pk. to be decrypted coded message, obtain product global identity UID, anti-forge cipher C1, product identification information, in false proof database, find Key Sequence Number i by UID, j and verification password C2; Utilize decruption key Ki. to be decrypted C1 and obtain T1; Utilize decruption key Kj to be decrypted C2 to obtain and T2; Judge whether T1 and T2 can meet the relation of digital cipher lock T, if can set up, then prove that product is genuine piece, if untenable, then prove that product is adulterant.
Application server, for accepting the inquiry request of WEB server, is decrypted packet and analyzes, and proposes inquiry request and return Query Result to fake certification server; Database server is used for providing database service, the demand storing with satisfying magnanimity data and easily expand; Be made up of company-information table, commission merchant's information table, Retailer information table, product information table, product record sheet, subscriber's meter, key list etc.By improving database travelling speed at database store process technology, load-balancing technique, shorten the time of user's wait-for-response, improve system processing power.Local backup server judges according to the situation of heart beat detection, carries out switching and adapter service immediately when judging that a station server breaks down, and to avoid long service disruption, ensures system service reliably and with long-term.White wine Antiforge system requires high availability, the work of system 24*7 free of discontinuities must be ensured, adopt two-node cluster hot backup scheme, remote back-up server, by selecting rational strange land Data Replication Technology in Mobile, makes long-range business datum center realize synchronous with local business datum; When local system fault, long-range disaster recovery center can intactly be taken over rapidly; Run into can not resist disaster, infrastructure damage, misoperation disaster time etc.
The management of product: manage product, comprises the details editor of product, the information such as batch management.Wherein: product administration module comprises with lower module: product administration module: this module major function is responsible for the maintenance of information of product, belong to the basic data of this system, the data of acquisition have: name of product, product coding, production mechanism, the place of production, grade, false proof hot line, whether be applicable to long-term preservation, to guarantee the quality duration, product picture, product introduction.Etc. information.Subsequent calls module: product sharing module, batch administration module.Product description administration module.Product sharing information administration module: this module major function: be the true and false information during product information two-dimension code anti-counterfeit certification of responsible maintenance management product when sharing in micro-letter.The data obtained: need the product shared in system, title when sharing, content when sharing, picture when sharing, source address when sharing.Authenticity of products information.Subsequent calls module: member management module, batch administration module; This module major function: to batch administering and maintaining of product, each product has oneself corresponding batch information, the convenient management to product and two-dimension code anti-counterfeit and can precisely arrive when tracing to the source each batch with each product.The data obtained: batch number, the product in system, date of manufacture, product quantity, pack mode, solid size pattern, cover pattern.Subsequent calls module: security code Mass production module, dealer and batch administration module
Product description administration module: this module major function: the instructions managing each product, when user's inquiry true or false of products, can inquire about the operation instruction of product simultaneously.Check product operation instruction whenever and wherever possible.Obtain data: the product existed in system, instructions title, the content (image mixed character typeset mode) of instructions.Subsequent calls module: front end Content Management; Security code manages: wherein, and security code management comprises following module: security code Mass production module: this module major function: the anti-fake two-dimension code generating batch according to product batches, can download, the operations such as printing to the Quick Response Code generated.Obtain data: the product batches existed in system, pack mode, key group, manufacturer information, date of manufacture, production quantity.Subsequent calls module: print management; Anti-fake two-dimension code administration module: this module major function: lost efficacy to anti-fake two-dimension code, replacement of dispatching from the factory, anti-fake two-dimension code is inquired about, the functions such as derivation.Cover code Package Management module: this module major function: corresponding binding relationship between management cover code, and the labeling situation of each cover code at present when producing and service condition.Solid size Package Management: this module major function: manage single product security code, and single product anti-fake two-dimension code labeling and service condition.
Anti-channel conflict manages: wherein, and anti-channel conflict management comprises following module: operator's administration module: this module major function: manage dealer, can add dealer, deletes, editor dealer, dealer's history purchase record.Obtain data: dealer name, dealer encodes, territory, dealer's ship-to, postcode, better address, name, fixed line, mobile phone, email, remark information.Subsequent calls module: operator and batch administration module; Dealer and batch administration module: this module major function: for dealer distributes batch, and logistics express delivery information trace and management.Obtain data: the distributor information existed in system, the batch information existed in system.Logistics information.Legitimate sales area information.Subsequent calls module: falsifying record; Inspector's administration module; This module major function: bookkeeping is carried out to inspector.Obtain data: account, password, confirm password, Real Name, inspection area, mobile phone, email, QQ, account status.Subsequent calls module: inspection module.Falsifying logging modle; This module major function: management falsifying record, and warning function.Obtain data: dealer name, dealer numbers, batch, legitimate sales region, falsifying sales region, inspector, submission time.Subsequent calls module: falsifying is added up.
Inspection module: this module major function: inspector carries out inspection operation.Obtain data: dealer name, dealer numbers, batch, legitimate sales region, falsifying sales region, inspector, submission time.Subsequent calls module: inspection statistics.
Statistical management: wherein, statistical management comprises with lower module: Quick Response Code generates statistics; Wherein, Quick Response Code generates statistics and comprises with lower module: product accounting: this module major function: according to product accounting Quick Response Code generation pie chart, curve map, histogram.Anti-fake two-dimension code mode statistical; This module major function: generate pie chart, curve map, histogram according to Quick Response Code cover pattern statistics Quick Response Code.
Two-dimension code anti-counterfeit is added up: wherein, and two-dimension code anti-counterfeit statistics comprises with lower module: the date is added up; According to the request for information of date statistics security code and the ratio of wherein first inquiry and secondary inquiry.With curve map, histogram, the form of pie chart represents.
Regional Distribution: according to the request for information of city distribution statistics security code and the ratio of wherein first inquiry and secondary inquiry.With curve map, histogram, the form of pie chart represents.
Network line: according to network line as 3G, wifi, waits network line to add up the request for information of security code and the ratio of wherein first inquiry and secondary inquiry.With curve map, histogram, the form of pie chart represents.
System environments: according to system environments as IOS, Android, waits the ratio of the request for information of statistics security code and wherein first inquiry and secondary inquiry.With curve map, histogram, the form of pie chart represents.
Loyalty is added up: buy answering of product according to client and purchase rate statistical conditions.With curve map, histogram, the form of pie chart represents.
Anti-channel conflict statistical module: wherein, anti-channel conflict statistics comprises with lower module: the date is added up: according to inspection submission date statistics anti-channel conflict situation and with curve map, histogram, the form of pie chart represents.
Regional Distribution
According to inspection city distribution statistics anti-channel conflict situation and with curve map, histogram, the form of pie chart represents.
Inspector
Anti-channel conflict situation is added up and with curve map, histogram, the form of pie chart represents according to inspector.
Key management
Wherein, key management comprises with lower module:
Key management:
This module major function: generate key, key is registered, key distribution, private key log-off, cipher key destruction.
Obtain data:
Subsequent calls module: anti-fake two-dimension code Mass production module.
Fake certification
This module major function: checking anti-fake two-dimension code enciphered message, fake certification record, abnormal checking of reporting to the police, geographic position, IP address is followed the tracks of.
Obtain data: security code authentication information, geographic position, IP address.
Subsequent calls module: two-dimension code anti-counterfeit is added up.
Print management
Wherein, print management comprises with lower module:
Printing handling of goods and materials
This module major function: printing material is managed.
Obtain data: the information of printing material.
Subsequent calls module: printing module.
Printed data manages
This module major function: manage printed data, false proofly traces to the source two yards, the false proof Quick Response Code of tracing to the source printed as to be printed.Print pass.
Obtain data:
Subsequent calls module: printing module.
Be printed as product management
This module major function: the finished product printed is managed, can according to printing batch, date of printing is inquired about, and according to.
Obtain data:
Subsequent calls module: printing module.
Member management
Wherein, member management comprises with lower module:
Member management module:
This module major function: manage member, resets membership password, locks an account, report the loss account, recovers account.
Obtain data: member account, member names, sex, grade, integration, state.
Subsequent calls module: member's grade arranges module, Integral Rule module.
Member's grade arranges module:
This module major function: manage member's grade, newly-increased member's grade, editor's grade, deletes grade.
Obtain data: grade name, required integration, exchange proportion, discount ratio.
Subsequent calls module: member management module, Integral Rule module.
Integral Rule module
This module major function: manage the rule that integration produces, as logged in generation integration, sharing and producing integration etc.
Obtain data: denomination of dive, reward the cycle, reward number of times, award method, obtain integration number.
Subsequent calls module: member management module, member's grade arranges module.
Gift manages
Wherein, gift management comprises following module:
Gift administration module:
This module major function: gift is managed, gift stock, integration needed for gift.
Obtain data: gift information, gift inventory information, integration information needed for gift.
Subsequent calls module: member management module, record of conversion module.
Record of conversion module:
This module major function: detailed record is exchanged to gift, and statistical management.
Obtain data: gift information, gift inventory information, integration information needed for gift, redemption information.
Subsequent calls module: member management module.
Prize manages
Wherein, prize management comprises following module:
Prize administration module
This module major function: prize is managed, winnings information and corresponding prize tier.
Obtain data: winnings information, prize tier information.
Subsequent calls module: prize drawing administration module.
Prize drawing administration module
This module major function: detailed record is carried out to prize drawing, and statistical management.
Obtain data: membership information, prize inventory information, winnings information, prize information.
Subsequent calls module: member management module.
User and role
System user administration module
This module major function: manage system user, creates system user, and forbidding is nullified, editor, resets password.
Obtain data: system user accounts information.
Subsequent calls module: system login module, authority management module.
System actor administration module
This module major function: the role in system is managed.
Obtain data: system user information, Role Information.
Subsequent calls module: system login module, purview certification administration module, system user administration module.
Front end Content Management
This module major function: front end page is managed.
Obtain data: page info.
Subsequent calls module: whole system.
Embodiment 2
See Fig. 1, Fig. 2 and Fig. 3, this two-dimension code anti-counterfeit source tracing method, comprises the following steps:
The Internet of Things making bigeminy coding is traced to the source antifalsification label: Quick Response Code comprises Quick Response Code outer code 3 and Quick Response Code ISN 4; Quick Response Code outer code 3 is arranged on upper label 1, traces to the source inquiry for commodity; Quick Response Code ISN 4 is arranged on lower floor's label 2, for fake certification; Between upper label 1 and lower floor's label 2 only edge laminating and upper label 1 is provided with tearing port; Quick Response Code outer code 3 and Quick Response Code ISN 4 are by URL, version number, commodity ID, service packet, carrier type and manufacturer's self-defining data composition, and Quick Response Code outer code coding 3 and Quick Response Code ISN coding 4 are one-type-two-part, i.e. bigeminy coding; The carrier type of Quick Response Code outer code 3 adopts W to represent outer code; The carrier type of Quick Response Code ISN 4 adopts N to represent ISN; Quick Response Code outer code 3 is arranged at labels outer surface full position, by mobile phone barcode scanning, network is carried out to the place of production of commodity and the production process of circulation for consumer and to trace to the source inquiry; Namely Quick Response Code ISN 4 is seen after tearing Quick Response Code outer code 3; Quick Response Code ISN 4 carries out network anti-counterfeit checking for consumer by mobile phone barcode scanning, and fake certification can only carry out once; After fake certification completes, the antiforge function of Quick Response Code ISN 4 lost efficacy immediately, again scanned Quick Response Code ISN 4 and was equivalent to scan the Quick Response Code outer code 3 of having torn to pieces; Quick Response Code outer code 3 and Quick Response Code ISN 4 are ciphering two-dimension code; Described ciphering two-dimension code is made up of jointly product identification information and two-dimensional bar code anti-counterfeiting information; Product identification information comprises product factory title, product global identity uid, the name of an article, net content, brand, model, type, principal ingredient, date of manufacture, production batch, operator and production line; Product global identity uid, according to commodity code rule encoding, has global uniqueness, is used for identifying every part commodity, is printed on product external packaging with plain; Two-dimensional bar code anti-counterfeiting information adopts double layer encryption mechanism, and the outer product type level double secret key product identification information that adopts is encrypted, and internal layer adopts numerical ciphers lock technology itself to be encrypted two-dimensional bar code anti-counterfeiting information;
Product is traced to the source: traced to the source by product indicia information realization product;
Authenticity of products is verified: by verifying two-dimensional bar code anti-counterfeiting information, differentiates the true and false of product.
Described employing numerical ciphers lock technology comprises the following steps two-dimensional bar code anti-counterfeiting information encryption method: arrange a key list file at false proof database, key list fileinfo comprises sequence number, encryption key and decruption key, a corresponding group encryption keys of sequence number and decruption key; The i-th group key Ki in Stochastic choice key list generates anti-forge cipher C1 to T1 encryption; Jth group key Kj in Stochastic choice key list generates verification password C2 to T2 encryption; Adopt product type level key K p to product false proof integrated information superencipher, product false proof integrated information comprises anti-forge cipher C1, UID and product identification information; Then utilize two-dimensional bar code coding algorithm generating two-dimension bar-code picture, be made into antifalsification label; Again C2 Key Sequence Number (i, j) and UID are delivered in false proof database and preserve, be convenient to verify in the future.
Authenticity of products checking comprises the following steps:
The Internet of Things gathering bigeminy coding is traced to the source the Quick Response Code coded message of antifalsification label; Utilize product type level decryption key Pk to be decrypted coded message, obtain product global identity UID, anti-forge cipher C1 and product identification information;
In false proof database, Key Sequence Number i, Key Sequence Number j and verification password C2 is found by product global identity UID;
Utilize decruption key Ki to be decrypted anti-forge cipher C1 and obtain T1;
Utilize decruption key Kj to be decrypted C2 to obtain and T2;
Judge whether T1 and T2 can meet the relation of digital cipher lock T; If T1 and T2 can meet the relation of digital cipher lock T, then product is genuine piece, if T1 and T2 can not meet the relation of digital cipher lock T, then product is adulterant.

Claims (10)

1. the Internet of Things of bigeminy coding is traced to the source an antifalsification label, it is characterized in that: comprise Quick Response Code, upper label and lower floor's label; Quick Response Code comprises Quick Response Code outer code and Quick Response Code ISN; Quick Response Code outer code is arranged on upper label, to trace to the source inquiry for commodity; Quick Response Code ISN is arranged on lower floor's label, for fake certification; Between upper label and lower floor's label only edge laminating and upper label is provided with tearing port.
2. the Internet of Things of bigeminy according to claim 1 coding is traced to the source antifalsification label, it is characterized in that:
Quick Response Code outer code and Quick Response Code ISN are by URL, version number, commodity ID, service packet, carrier type and manufacturer's self-defining data composition, and Quick Response Code outer code coding and Quick Response Code ISN coding are one-type-two-part, i.e. bigeminy coding; The carrier type of Quick Response Code outer code adopts W to represent outer code; The carrier type of Quick Response Code ISN adopts N to represent ISN.
3. the Internet of Things of bigeminy according to claim 1 coding is traced to the source antifalsification label, it is characterized in that: Quick Response Code outer code is positioned at labels outer surface full position, by mobile phone barcode scanning, network is carried out to the place of production of commodity and the production process of circulation for consumer and to trace to the source inquiry.
4. the Internet of Things of bigeminy according to claim 1 coding is traced to the source antifalsification label, it is characterized in that:
Namely Quick Response Code ISN is seen after tearing Quick Response Code outer code; Quick Response Code ISN is used for consumer and carries out network anti-counterfeit checking by mobile phone barcode scanning, and fake certification can only carry out once; After fake certification completes, the antiforge function of Quick Response Code ISN lost efficacy immediately, again scanned Quick Response Code ISN and was equivalent to scan the Quick Response Code outer code of having torn to pieces.
5. the Internet of Things of bigeminy according to claim 1 coding is traced to the source antifalsification label, it is characterized in that: Quick Response Code outer code and Quick Response Code ISN are ciphering two-dimension code; Described ciphering two-dimension code is made up of jointly product identification information and two-dimensional bar code anti-counterfeiting information; Product identification information comprises product factory title, product global identity uid, the name of an article, net content, brand, model, type, principal ingredient, date of manufacture, production batch, operator and production line; Product global identity uid, according to commodity code rule encoding, has global uniqueness, is used for identifying every part commodity, is printed on product external packaging with plain; Quick Response Code outer code adopts product type level double secret key product identification information to be encrypted, and Quick Response Code ISN adopts numerical ciphers lock technology itself to be encrypted two-dimensional bar code anti-counterfeiting information.
6. the Internet of Things of bigeminy according to claim 5 coding is traced to the source antifalsification label, it is characterized in that: described product type level key is secondary key, derives various product type level key by root key; Described root key is manufacturer's level key, and manufacturer's level key leads each input password on the scene simultaneously by multidigit level of factory, is formed through algorithm combination; Go out each product type level key by the key derivation of product type level, described product type level key is end key.
7. the Internet of Things of bigeminy according to claim 5 coding is traced to the source antifalsification label, it is characterized in that: anti-fake two-dimension code adopts nanometer wet sensitive Quick Response Code.
8. a two-dimension code anti-counterfeit source tracing method, is characterized in that comprising the following steps:
The Internet of Things making bigeminy coding is traced to the source antifalsification label: Quick Response Code comprises Quick Response Code outer code and Quick Response Code ISN; Quick Response Code outer code is arranged on upper label, traces to the source inquiry for commodity; Quick Response Code ISN is arranged on lower floor's label, for fake certification; Between upper label and lower floor's label only edge laminating and upper label is provided with tearing port; Quick Response Code outer code and Quick Response Code ISN are by URL, version number, commodity ID, service packet, carrier type and manufacturer's self-defining data composition, and Quick Response Code outer code coding and Quick Response Code ISN coding are one-type-two-part, i.e. bigeminy coding; The carrier type of Quick Response Code outer code adopts W to represent outer code; The carrier type of Quick Response Code ISN adopts N to represent ISN; Quick Response Code outer code is arranged at labels outer surface full position, by mobile phone barcode scanning, network is carried out to the place of production of commodity and the production process of circulation for consumer and to trace to the source inquiry; Namely Quick Response Code ISN is seen after tearing Quick Response Code outer code; Quick Response Code ISN is used for consumer and carries out network anti-counterfeit checking by mobile phone barcode scanning, and fake certification can only carry out once; After fake certification completes, the antiforge function of Quick Response Code ISN lost efficacy immediately, again scanned Quick Response Code ISN and was equivalent to scan the Quick Response Code outer code of having torn to pieces; Quick Response Code outer code and Quick Response Code ISN are ciphering two-dimension code; Described ciphering two-dimension code is made up of jointly product identification information and two-dimensional bar code anti-counterfeiting information; Product identification information comprises product factory title, product global identity uid, the name of an article, net content, brand, model, type, principal ingredient, date of manufacture, production batch, operator and production line; Product global identity uid, according to commodity code rule encoding, has global uniqueness, is used for identifying every part commodity, is printed on product external packaging with plain; Two-dimensional bar code anti-counterfeiting information adopts double layer encryption mechanism, and the outer product type level double secret key product identification information that adopts is encrypted, and internal layer adopts numerical ciphers lock technology itself to be encrypted two-dimensional bar code anti-counterfeiting information;
Product is traced to the source: traced to the source by product indicia information realization product;
Authenticity of products is verified: by verifying two-dimensional bar code anti-counterfeiting information, differentiates the true and false of product.
9. two-dimension code anti-counterfeit source tracing method according to claim 8, it is characterized in that described employing numerical ciphers lock technology comprises the following steps two-dimensional bar code anti-counterfeiting information encryption method: a key list file is set at false proof database, key list fileinfo comprises sequence number, encryption key and decruption key, a corresponding group encryption keys of sequence number and decruption key; The i-th group key Ki in Stochastic choice key list generates anti-forge cipher C1 to T1 encryption; Jth group key Kj in Stochastic choice key list generates verification password C2 to T2 encryption; Adopt product type level key K p to product false proof integrated information superencipher, product false proof integrated information comprises anti-forge cipher C1, UID and product identification information; Then utilize two-dimensional bar code coding algorithm generating two-dimension bar-code picture, be made into antifalsification label; Again C2 Key Sequence Number (i, j) and UID are delivered in false proof database and preserve, be convenient to verify in the future.
10. two-dimension code anti-counterfeit source tracing method according to claim 8, is characterized in that authenticity of products checking comprises the following steps:
The Internet of Things gathering bigeminy coding is traced to the source the Quick Response Code coded message of antifalsification label; Utilize product type level decryption key Pk to be decrypted coded message, obtain product global identity UID, anti-forge cipher C1 and product identification information;
In false proof database, Key Sequence Number i, Key Sequence Number j and verification password C2 is found by product global identity UID;
Utilize decruption key Ki to be decrypted anti-forge cipher C1 and obtain T1;
Utilize decruption key Kj to be decrypted C2 to obtain and T2;
Judge whether T1 and T2 can meet the relation of digital cipher lock T; If T1 and T2 can meet the relation of digital cipher lock T, then product is genuine piece, if T1 and T2 can not meet the relation of digital cipher lock T, then product is adulterant.
CN201610020358.XA 2016-01-13 2016-01-13 Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method Pending CN105469132A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610020358.XA CN105469132A (en) 2016-01-13 2016-01-13 Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610020358.XA CN105469132A (en) 2016-01-13 2016-01-13 Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method

Publications (1)

Publication Number Publication Date
CN105469132A true CN105469132A (en) 2016-04-06

Family

ID=55606802

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610020358.XA Pending CN105469132A (en) 2016-01-13 2016-01-13 Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method

Country Status (1)

Country Link
CN (1) CN105469132A (en)

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022805A (en) * 2016-05-25 2016-10-12 华中科技大学 Anti-fake traceablility system and method based on label reading
CN106203563A (en) * 2016-06-23 2016-12-07 重庆炬野科技发展有限公司 The raw code method and system of Quick Response Code
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN106997539A (en) * 2017-03-15 2017-08-01 上海众人网络安全技术有限公司 Dual code anti-faking method, server and dual code anti-faking system
CN107038594A (en) * 2017-04-12 2017-08-11 广州品聚网络科技股份有限公司 A kind of commodity counterfeit prevention traceability system based on two-dimensional bar code
CN107316072A (en) * 2017-07-12 2017-11-03 贵州信安创科技有限公司 Dimension code anti-counterfeit method, anti-counterfeit authentication method and the false proof device of offline synchronization
CN107316073A (en) * 2017-07-18 2017-11-03 安徽安普信息技术有限公司 A kind of application process of variable two-dimension code in anti-drug counterfeiting is traced to the source
CN107609622A (en) * 2017-08-28 2018-01-19 深圳市金天速科技有限公司 Encryption method and system based on multi-code unification
CN107657457A (en) * 2016-08-10 2018-02-02 沈洪德 The method, apparatus and system of multi-level two-dimension code anti-counterfeit based on internet
CN107705134A (en) * 2017-10-11 2018-02-16 重庆印链科技有限公司 Anti-fake network system based on block chain
CN108053294A (en) * 2017-12-30 2018-05-18 淄博赢信达知识产权咨询服务有限公司 The method that net purchase commercial product identification uniqueness is proved by order contents
CN108055135A (en) * 2017-12-13 2018-05-18 杭州全视软件有限公司 A kind of method of intelligent terminal authentication management
CN109272334A (en) * 2018-09-17 2019-01-25 苏州创时和兴信息科技有限公司 A kind of product digital watermark anti-fake anti-channel conflict information and its application method
CN109657766A (en) * 2018-12-12 2019-04-19 姚作流 A kind of antifalsification label and its anti-counterfeiting system
CN110046917A (en) * 2019-04-22 2019-07-23 江苏万佳科技开发股份有限公司 A kind of product false proof traceability system and anti-fake source tracing method
CN110084523A (en) * 2019-05-01 2019-08-02 智锐达仪器科技南通有限公司 A kind of detection of agricultural products method for allocating tasks and platform
CN110162514A (en) * 2019-04-03 2019-08-23 成都知度酒业有限公司 Anti-counterfeiting authentication method inside and outside commodity packaging
CN110348855A (en) * 2019-03-18 2019-10-18 王政铭 A kind of code group anti-counterfeiting technology that any plain code private mark group is constituted
CN110648146A (en) * 2019-08-16 2020-01-03 广东省广袤科技有限公司 Double two-dimensional code verification website system for locking commodity origin place
CN110889479A (en) * 2019-11-20 2020-03-17 中国物品编码中心 Commodity anti-counterfeiting method based on six-code integration
CN110889712A (en) * 2019-12-06 2020-03-17 郑力维 Two-dimensional or graphic three-dimensional coding and NFC tracing anti-counterfeiting method and system for block chain
CN111598578A (en) * 2019-02-01 2020-08-28 北京兆信信息技术股份有限公司 Method for verifying authenticity of mass deliveries through weight transfer
CN111951028A (en) * 2020-08-18 2020-11-17 薛卯良 Product tracing and product anti-counterfeiting method
CN112036203A (en) * 2020-09-01 2020-12-04 前海新美思科技(深圳)有限公司 Information tracking method of protected two-dimensional code
CN112396145A (en) * 2019-08-12 2021-02-23 甘肃德弘生物科技有限公司 Two-dimensional code structure under Internet of things framework, manufacturing method and interaction system
CN112465093A (en) * 2020-11-02 2021-03-09 湖南遥昇通信技术有限公司 Double-layer two-dimensional code anti-counterfeiting generation method and verification method
CN113033746A (en) * 2021-03-30 2021-06-25 广东愉升节能环保设备有限公司 Filter element anti-counterfeiting method, filter element anti-counterfeiting equipment and filter element anti-counterfeiting system
CN114140133A (en) * 2021-11-24 2022-03-04 芯电智联(北京)科技有限公司 Method for processing tracing data
CN114987065A (en) * 2022-05-23 2022-09-02 江苏华工激光科技有限公司 Marking device and anti-counterfeiting marking method

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022805A (en) * 2016-05-25 2016-10-12 华中科技大学 Anti-fake traceablility system and method based on label reading
CN106022805B (en) * 2016-05-25 2019-09-24 华中科技大学 A kind of anti-fake traceability system and method based on tag readable degree
CN106203563A (en) * 2016-06-23 2016-12-07 重庆炬野科技发展有限公司 The raw code method and system of Quick Response Code
CN107657457B (en) * 2016-08-10 2018-11-23 沈洪德 The method, apparatus and system of multi-level two-dimension code anti-counterfeit Internet-based
CN107657457A (en) * 2016-08-10 2018-02-02 沈洪德 The method, apparatus and system of multi-level two-dimension code anti-counterfeit based on internet
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN106997539A (en) * 2017-03-15 2017-08-01 上海众人网络安全技术有限公司 Dual code anti-faking method, server and dual code anti-faking system
CN107038594A (en) * 2017-04-12 2017-08-11 广州品聚网络科技股份有限公司 A kind of commodity counterfeit prevention traceability system based on two-dimensional bar code
CN107316072A (en) * 2017-07-12 2017-11-03 贵州信安创科技有限公司 Dimension code anti-counterfeit method, anti-counterfeit authentication method and the false proof device of offline synchronization
CN107316072B (en) * 2017-07-12 2020-11-06 彭戴予晗 Offline synchronous two-dimensional code anti-counterfeiting method, anti-counterfeiting verification method and anti-counterfeiting device
CN107316073A (en) * 2017-07-18 2017-11-03 安徽安普信息技术有限公司 A kind of application process of variable two-dimension code in anti-drug counterfeiting is traced to the source
CN107609622A (en) * 2017-08-28 2018-01-19 深圳市金天速科技有限公司 Encryption method and system based on multi-code unification
CN107705134A (en) * 2017-10-11 2018-02-16 重庆印链科技有限公司 Anti-fake network system based on block chain
CN108055135B (en) * 2017-12-13 2021-03-23 杭州全视软件有限公司 Intelligent terminal authentication management method
CN108055135A (en) * 2017-12-13 2018-05-18 杭州全视软件有限公司 A kind of method of intelligent terminal authentication management
CN108053294A (en) * 2017-12-30 2018-05-18 淄博赢信达知识产权咨询服务有限公司 The method that net purchase commercial product identification uniqueness is proved by order contents
CN109272334A (en) * 2018-09-17 2019-01-25 苏州创时和兴信息科技有限公司 A kind of product digital watermark anti-fake anti-channel conflict information and its application method
CN109657766A (en) * 2018-12-12 2019-04-19 姚作流 A kind of antifalsification label and its anti-counterfeiting system
CN109657766B (en) * 2018-12-12 2022-02-01 姚作流 Anti-counterfeit label and anti-counterfeit system thereof
CN111598578A (en) * 2019-02-01 2020-08-28 北京兆信信息技术股份有限公司 Method for verifying authenticity of mass deliveries through weight transfer
CN110348855A (en) * 2019-03-18 2019-10-18 王政铭 A kind of code group anti-counterfeiting technology that any plain code private mark group is constituted
CN110162514A (en) * 2019-04-03 2019-08-23 成都知度酒业有限公司 Anti-counterfeiting authentication method inside and outside commodity packaging
CN110046917A (en) * 2019-04-22 2019-07-23 江苏万佳科技开发股份有限公司 A kind of product false proof traceability system and anti-fake source tracing method
CN110084523A (en) * 2019-05-01 2019-08-02 智锐达仪器科技南通有限公司 A kind of detection of agricultural products method for allocating tasks and platform
CN110084523B (en) * 2019-05-01 2024-01-19 智锐达仪器科技南通有限公司 Agricultural product detection task allocation method and platform
CN112396145B (en) * 2019-08-12 2022-08-16 河西学院 Two-dimensional code structure under Internet of things framework, manufacturing method and interaction system
CN112396145A (en) * 2019-08-12 2021-02-23 甘肃德弘生物科技有限公司 Two-dimensional code structure under Internet of things framework, manufacturing method and interaction system
CN110648146B (en) * 2019-08-16 2023-04-18 广东省广袤科技有限公司 Double two-dimensional code verification website system for locking commodity origin place
CN110648146A (en) * 2019-08-16 2020-01-03 广东省广袤科技有限公司 Double two-dimensional code verification website system for locking commodity origin place
CN110889479A (en) * 2019-11-20 2020-03-17 中国物品编码中心 Commodity anti-counterfeiting method based on six-code integration
CN110889479B (en) * 2019-11-20 2023-08-29 中国物品编码中心 Commodity anti-counterfeiting method based on six-code combination
CN110889712A (en) * 2019-12-06 2020-03-17 郑力维 Two-dimensional or graphic three-dimensional coding and NFC tracing anti-counterfeiting method and system for block chain
CN111951028A (en) * 2020-08-18 2020-11-17 薛卯良 Product tracing and product anti-counterfeiting method
CN112036203A (en) * 2020-09-01 2020-12-04 前海新美思科技(深圳)有限公司 Information tracking method of protected two-dimensional code
CN112465093A (en) * 2020-11-02 2021-03-09 湖南遥昇通信技术有限公司 Double-layer two-dimensional code anti-counterfeiting generation method and verification method
CN113033746A (en) * 2021-03-30 2021-06-25 广东愉升节能环保设备有限公司 Filter element anti-counterfeiting method, filter element anti-counterfeiting equipment and filter element anti-counterfeiting system
CN114140133A (en) * 2021-11-24 2022-03-04 芯电智联(北京)科技有限公司 Method for processing tracing data
CN114987065A (en) * 2022-05-23 2022-09-02 江苏华工激光科技有限公司 Marking device and anti-counterfeiting marking method
CN114987065B (en) * 2022-05-23 2023-10-24 江苏华工激光科技有限公司 Marking device and anti-counterfeiting marking method

Similar Documents

Publication Publication Date Title
CN105469132A (en) Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method
CN110062940B (en) PUF-based composite security markings for protection against counterfeiting
CN110073430B (en) PUF-based composite security mark for anti-counterfeiting
CN201716765U (en) Wine counterfeiting tracing system based on two-dimensional bar codes
CN108985790A (en) Method for anti-counterfeit, system, computer equipment and storage medium based on block chain
JP5319621B2 (en) Method and system for preventing counterfeiting, diversion and piracy of products
CN109598540B (en) Advertisement accurate pushing method and advertisement accurate pushing system
CN112042153A (en) Composite security marking and method and device for providing and reading a composite security marking
CN107341676A (en) False proof mark and the method for tracing to the source
US20070215685A1 (en) System and Method of Product Identification Using a URL
US20050234823A1 (en) Systems and methods to prevent products from counterfeiting and surplus production also of tracking their way of distribution.
CN107431622A (en) The blocking tracking in supply chain occurs
US20080011841A1 (en) System and Method of Detecting Product Code Duplication and Product Diversion
CN104854642A (en) Method and apparatus for marking manufactured items using physical characteristic
US20130262330A1 (en) Managing objects in a supply chain using a secure identifier
CN104252677A (en) Two-dimension code anti-counterfeiting technology and two-dimension code anti-counterfeiting system-based platform system
CN104574122A (en) Two-dimensional code anti-counterfeit and random product packaging goods-fleeing preventing method
CN101520865A (en) Anti-drug counterfeiting method using radio frequency electronic tag and public key infrastructure
CN108681904A (en) A kind of fake certification implementation method of bottled formula commodity
RU2216776C2 (en) Method and system for identifying and accounting marked objects
CN101587663A (en) Strip encrypting fake-proof
CN102622624B (en) A kind of commodity counterfeit prevention identification system and method
CN106971311A (en) A kind of false proof traceability system of logistics Means of Agricultural Production and method
Wei Blockchain-based data traceability platform architecture for supply chain management
EA035937B1 (en) Secure item identification based on physical label properties

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160406