CN106570711B - Method and system for authenticity analysis - Google Patents

Method and system for authenticity analysis Download PDF

Info

Publication number
CN106570711B
CN106570711B CN201610977326.9A CN201610977326A CN106570711B CN 106570711 B CN106570711 B CN 106570711B CN 201610977326 A CN201610977326 A CN 201610977326A CN 106570711 B CN106570711 B CN 106570711B
Authority
CN
China
Prior art keywords
authenticity
place
inquiry
user
true
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610977326.9A
Other languages
Chinese (zh)
Other versions
CN106570711A (en
Inventor
陈建功
王丽杰
蔡冠祥
李凡
张正顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Computer Network Information Center Chinese Academy Of Sciences
Original Assignee
Guangzhou Computer Network Information Center Chinese Academy Of Sciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Computer Network Information Center Chinese Academy Of Sciences filed Critical Guangzhou Computer Network Information Center Chinese Academy Of Sciences
Priority to CN201610977326.9A priority Critical patent/CN106570711B/en
Publication of CN106570711A publication Critical patent/CN106570711A/en
Application granted granted Critical
Publication of CN106570711B publication Critical patent/CN106570711B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Landscapes

  • Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a method and a system for true and false analysis, wherein the method comprises the following steps: receiving the authenticity query request information, and determining the article identification code, the authenticity query place and the authenticity query user of the authenticity query according to the authenticity query request information; determining a last authenticity inquiry place of the article identification code, each first historical authenticity inquiry user and each associated person of each first historical authenticity inquiry user according to historical authenticity inquiry record information of the article identification code; when the true or false inquiry user is different from each first historical true or false inquiry user and each related person of each first historical true or false inquiry user, accumulating the number of independent users of the true or false inquiry place; and performing the authenticity analysis of the article to be verified corresponding to the article identification code according to the number of independent users in the authenticity inquiring place. By adopting the scheme of the invention, the accuracy of the authenticity analysis can be improved.

Description

Method and system for authenticity analysis
Technical Field
The invention relates to the technical field of anti-counterfeiting, in particular to a method and a system for true and false analysis.
Background
At present, in the face of a full-purpose article, when a consumer purchases the article, the brand consciousness is continuously enhanced, the brand becomes a necessary factor considered when the consumer purchases the article, meanwhile, some bad manufacturers or counterfeiters begin to utilize the market influence of famous brand products, counterfeit and shoddy articles are layered endlessly, so that a strange image of no counterfeit and not famous brand appears in the market, regular enterprises need to maintain the brand image of the regular enterprises, and the consumer needs to know the authenticity information of the purchased product or the product to be purchased timely and accurately.
Based on the above considerations and market demands, anti-counterfeiting plays a very important role for enterprises, consumers and society. The existing anti-counterfeiting modes mainly comprise two modes. The first one is anti-counterfeiting of an identification code layer: the method is characterized in that an identification code is attached to an article and covered by a coating, when a consumer wants to check the authenticity, the identification code layer needs to be scraped off, an appointed telephone is dialed, or a special website, an app and the like are logged in to input an anti-counterfeiting code to inquire the authenticity of the article. The disadvantage of this approach is that once the identification algorithm is deciphered, the anti-counterfeiting technology will fail on a large scale; and because of being covered by the coating, the consumer can only inquire the authenticity after purchasing, check the authenticity after the fact, and then return the goods or complain, which brings more inconvenience to the consumer. The other mode is to inquire the times to prevent counterfeiting and attach a two-dimensional code to the article. Before purchasing, the consumer can scan the two-dimensional code and see the number of times the code is scanned. The anti-counterfeiting can only provide a code scanning frequency for consumers, and the consumers cannot judge the authenticity of the goods according to the code scanning frequency.
An improved mode is based on the anti-fake mode of sweeping the sign indicating number of times and inquiry place of article identification code, this kind of mode is convenient for the consumer to inquire article true and false and know true and false information before purchasing article, and can promote anti-fake effect, however, this kind of mode, sweep the sign indicating that guards against falsification will be carried out to the user when the sign indicating number of times of sweeping of same place commodity surpasss preset threshold value, nevertheless if sweep the sign indicating number user and be same user or friend circle user acquainted mutually each other, then accuracy that this kind of judgement can greatly reduced, perhaps when article identification code is inquired in a plurality of places, the user sweeps the sign indicating that guards against falsification can be carried out to the sign indicating number, nevertheless if sweep the sign indicating number twice in succession, sweep the sign indicating number user the same, but the place is different.
Disclosure of Invention
The invention aims to provide a method and a system for true and false analysis, which can improve the accuracy of true and false analysis.
The purpose of the invention is realized by the following technical scheme:
a method of authenticity analysis comprising:
receiving the authenticity query request information, and determining an article identification code, an authenticity query place and an authenticity query user of the authenticity query according to the authenticity query request information;
determining a last authenticity inquiry place of the article identification code, each first historical authenticity inquiry user and each associated person of each first historical authenticity inquiry user according to historical authenticity inquiry record information of the article identification code, wherein the first historical authenticity inquiry user refers to an authenticity inquiry user of the article identification code corresponding to the authenticity inquiry place before the authenticity inquiry;
when the authenticity inquiry user is different from each first historical authenticity inquiry user and each associated person of each first historical authenticity inquiry user, or when the authenticity inquiry place is different from the authenticity inquiry place at the last time, accumulating the number of independent users of the authenticity inquiry place;
and performing the authenticity analysis of the article to be verified corresponding to the article identification code according to the number of the independent users at the authenticity inquiring place.
A authenticity analysis system comprising:
the request processing unit is used for receiving the authenticity query request information and determining the article identification code, the authenticity query place and the authenticity query user of the authenticity query according to the authenticity query request information;
a history record processing unit, configured to determine, according to history authenticity query record information of the article identification code, a last authenticity query place of the article identification code, each first history authenticity query user, and each associated person of each first history authenticity query user, where the first history authenticity query user refers to an authenticity query user of the article identification code that is corresponding to the present authenticity query place and is before the present authenticity query;
a user number counting unit, configured to accumulate the number of independent users of the current authenticity query location when the authenticity query user is different from each of the first historical authenticity query users and each associated person of each of the first historical authenticity query users, or when the authenticity query location is different from the previous authenticity query location;
and the authenticity analysis unit is used for carrying out the authenticity analysis of the to-be-verified object corresponding to the object identification code according to the independent user number of the authenticity inquiry place.
According to the above-mentioned scheme of the present invention, it is characterized in that it receives the authenticity query request information, determines the article identification code of the present authenticity query, the present authenticity query and the present authenticity query user according to the authenticity query request information, determines the last authenticity query place of the article identification code, each first historical authenticity query user and each related person of each first historical authenticity query user according to the historical authenticity query record information of the article identification code, the first historical authenticity query user refers to the authenticity query user before the authenticity query corresponding to the present authenticity query place of the article identification code, when the present authenticity query user is different from each related person of each first historical authenticity query user and each first historical authenticity query user or when the present authenticity query place is different from the last authenticity query place, accumulating the number of the independent users of the authenticity inquiry place, and performing the authenticity analysis on the to-be-verified object corresponding to the object identification code according to the number of the independent users of the authenticity inquiry place; the authenticity analysis of the scheme of the invention is based on the number of independent users, and the number of independent users is accumulated only when the authenticity inquiry places of two continuous times are different, or the authenticity inquiry user is different from each first historical authenticity inquiry user and each associated person of each first historical authenticity inquiry user.
Drawings
Fig. 1 is a schematic flow chart illustrating an implementation of a method for analyzing authenticity according to a first embodiment of the present invention;
FIG. 2 is a schematic diagram of an implementation of an authentication analysis under one scenario;
fig. 3 is a schematic diagram of an implementation flow of the authenticity analysis in another case;
fig. 4 is a schematic structural diagram of the authenticity analyzing system according to the second embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the detailed description and specific examples, while indicating the scope of the invention, are intended for purposes of illustration only and are not intended to limit the scope of the invention.
Example one
The embodiment of the invention provides a method for analyzing authenticity. In a specific implementation, the method for analyzing authenticity according to the first embodiment may be applied to a server (referred to as an anti-counterfeit data server in this embodiment), and is preferably applied to a cloud server in consideration of a strong data processing capability of the cloud server. Fig. 1 is a schematic diagram illustrating an implementation flow of the method for analyzing authenticity according to an embodiment of the present invention. As shown in fig. 1, the method for analyzing authenticity of the embodiment includes the following steps:
step S101: receiving the authenticity query request information, and determining an article identification code, an authenticity query place and an authenticity query user of the authenticity query according to the authenticity query request information;
here, the authenticity query request information may include an article identification code of the authenticity query, and may also include query location information and terminal identification information, and the query location information may also be obtained by the anti-counterfeit data server locating a terminal sending the authenticity query request information, and the terminal identification information may also be obtained by the anti-counterfeit data server detecting an identification of the terminal sending the authenticity query request information, that is, the query location information and the terminal identification information may not be bound in the authenticity query request information;
in consideration of the fact that code scanning software is basically installed on a terminal such as a popular smart phone, an article identification code can be stored in a bar code or a two-dimensional code, the bar code or the two-dimensional code is arranged on an anti-counterfeiting label, and the terminal obtains the article identification code by scanning and analyzing the bar code or the two-dimensional code, but not limited to the scanning mode, for example, the article identification code can also be input by a user. In addition, the terminal can position the self theoretic position, the positioned theoretic position information is the query position information of the authenticity query, and the authenticity query place can be determined according to the query position information.
Here, the inquiry position information may be a real-time position of the terminal obtained by a technical method such as a GPS (Global Positioning System), a base station, an IP Address (Internet Protocol Address), and a WIFI (WIreless-Fidelity).
Different terminal identifications can be used for representing different users, so that the authenticity query user can be determined through the terminal identification information in the authenticity query request information, wherein an International Mobile Equipment Identity (IMEI) number can be used as the terminal identification.
In addition, each time the authenticity inquiry request information is received, the related person information of the corresponding authenticity inquiry user is obtained, the related person information is recorded, and the authenticity inquiry request time and each content in the authenticity inquiry request information are recorded.
Here, the associated person may be a contact in a terminal phone address book or an address book of other communication applications (e.g., QQ, WeChat, etc.).
Step S102: determining a last authenticity inquiry place of the article identification code, each first historical authenticity inquiry user and each associated person of each first historical authenticity inquiry user according to historical authenticity inquiry record information of the article identification code, wherein the first historical authenticity inquiry user refers to an authenticity inquiry user of the article identification code corresponding to the authenticity inquiry place before the authenticity inquiry;
here, the history authenticity query log information includes information such as an authenticity query location, an authenticity query user, a related person of the authenticity query user, and an authenticity query time of each authenticity query of the article identification code.
Specifically, the historical authenticity query record information of the article identification code corresponding to the authenticity query place can be firstly queried according to the historical authenticity query record information of the article identification code, and then the authenticity query user and the related person of the article identification code at the authenticity query place before the authenticity query is carried out according to the currently queried historical authenticity query record information;
step S103: when the relevant persons of the true and false inquiry user and the last true and false inquiry user are different, or when the true and false inquiry place is different from the last true and false inquiry place, accumulating the number of independent users of the true and false inquiry place;
specifically, the method includes the steps of comparing a current authenticity query place with a previous authenticity query place, if the current authenticity query place is the same as the previous authenticity query place, then comparing the current authenticity query user with each first historical authenticity query user and each associated person of each first historical authenticity query user, if the current authenticity query user is the same as any one of the first historical authenticity query users or any one of the associated persons of any one of the first historical authenticity query users, not accumulating the number of independent users of the current authenticity query place, and if the first historical authenticity query users and the associated persons of each first historical authenticity query user are different, accumulating the number of independent users of the current authenticity query place;
and if the authenticity inquiry place is different from the previous authenticity inquiry place, directly accumulating the number of the independent users of the authenticity inquiry place. If necessary, the present authentication inquiry user may be compared with each related person of each first historical authentication inquiry user and each first historical authentication inquiry user, and then the present authentication inquiry place may be compared with the last authentication inquiry place.
A counter can be allocated to each true or false inquiry place of the object identification code, and when the number of independent users needing to be accumulated is determined, one is added on the basis of the original count value.
Step S104: and performing the authenticity analysis of the article to be verified corresponding to the article identification code according to the number of the independent users at the authenticity inquiring place.
Specifically, a specific threshold value may be preset, the number of independent users in the current authentication inquiry site is compared with the specific threshold value, and the result of the current authentication analysis is determined according to the comparison result, for example, when the number of independent users in the current authentication inquiry site exceeds the specific threshold value, it is determined that there is an abnormality.
In addition, when some specific conditions are met, the present authenticity analysis of the article to be verified corresponding to the article identification code can be performed according to the number of independent users of the present authenticity query place, and the specific conditions can be set according to actual needs, for example, the total number of independent users of the article identification code exceeds a certain value, or the number of authenticity query places of the article identification code exceeds a certain value, or the authenticity query users of the previous and subsequent times are different, and the like.
Accordingly, according to the scheme of the above embodiment, it is configured to receive the authenticity query request information, determine the article identification code of the present authenticity query, the present authenticity query location and the present authenticity query user according to the authenticity query request information, determine the last authenticity query location of the article identification code, each first historical authenticity query user and each associated person of each first historical authenticity query user according to the historical authenticity query record information of the article identification code, wherein the first historical authenticity query user refers to the authenticity query user of the article identification code before the present authenticity query location, when the authenticity query user is different from each associated person of the first historical authenticity query user and each first historical authenticity query user or when the present authenticity query location is different from the last authenticity query location, accumulating the number of the independent users of the authenticity inquiry place, and performing the authenticity analysis on the to-be-verified object corresponding to the object identification code according to the number of the independent users of the authenticity inquiry place; the authenticity analysis of the scheme of the invention is based on the number of independent users, and the number of independent users is accumulated only when the authenticity inquiry places of two continuous times are different, or the authenticity inquiry user is different from each first historical authenticity inquiry user and each associated person of each first historical authenticity inquiry user.
In one embodiment, the method for analyzing authenticity of the present invention further includes: determining each second historical authenticity inquiry user and each associated person of each second historical authenticity inquiry user according to the historical authenticity inquiry record information of the article identification code, wherein the second historical authenticity inquiry user refers to the authenticity inquiry user of the article identification code corresponding to the article identification code before the authenticity inquiry; determining the total number of independent users of the article identification code according to the authenticity inquiry user, each second historical authenticity inquiry user and each associated person of each second historical authenticity inquiry user; and when the total number of the independent users exceeds a preset first user number threshold value, the step of performing the authenticity analysis on the to-be-verified object corresponding to the object identification code according to the number of the independent users at the authenticity query place is carried out.
Here, the first user number threshold may be set according to actual needs.
Specifically, a counter for recording the total number of independent users may be assigned to the article identification code, after receiving the request information of true and false inquiry, inquiring the historical true and false inquiry record information corresponding to the article identification code according to the article identification code in the request information of true and false inquiry, determining each associated person of each second historical authenticity inquiring user and each second historical authenticity inquiring user according to the historical authenticity inquiring record information, comparing the authenticity inquiring user with each second historical authenticity inquiring user and each associated person of each second historical authenticity inquiring user, if the authenticity inquiring user is different from each second historical authenticity inquiring user and different from each associated person of each second historical authenticity inquiring user, the count value of the counter for recording the total number of independent users is incremented by one, otherwise the count value of the counter remains unchanged. Wherein, the total number of the independent users is less than or equal to the sum of the number of the independent users of each authenticity inquiry place.
By adopting the scheme of the embodiment, the authenticity analysis of the article to be verified corresponding to the article identification code is performed according to the number of the independent users at the authenticity query place only when the total number of the independent users exceeds the preset first user number threshold value, so that the accuracy of the authenticity analysis can be further improved.
Preferably, the authenticity analysis of the article to be verified corresponding to the article identification code can be performed by combining the number of independent users in the authenticity query place and some other information. In one embodiment, the present authenticity analysis of the article to be verified corresponding to the article identification code may be performed by combining the number of independent users, or/and information about whether the present authenticity query location is the same as the last authenticity query location, or/and a time-distance relationship between the present authenticity query location and the last authenticity query location, or/and a location attribution category between the present authenticity query location and the last authenticity query location.
This process is explained in detail below. In the following description, the analysis is performed in two cases. The first case is that the present authenticity query user is the same as the last authenticity query user, or the present authenticity query user is different from the last authenticity query user and is the same as any one of the related persons of the history authenticity query users. The second case is a case where the present authenticity query user is different from the last authenticity query user and each related person of the history authenticity query users.
Fig. 2 shows an interaction flow diagram of the user terminal, the anti-counterfeiting data server and the article manufacturer terminal in the first case. Fig. 3 shows an interaction flow diagram of the user terminal, the anti-counterfeiting data server and the article manufacturer terminal in the second case. The anti-counterfeit analysis process in both cases is explained below with reference to fig. 2 and 3.
As shown in fig. 2, in a first case, that is, when the current authenticity query user is the same as the last authenticity query user, or the current authenticity query user is different from the last authenticity query user and is the same as any related person of the historical authenticity query users, the following steps are performed:
1.1) if the true and false inquiry place is the same as the last true and false inquiry place, determining that the article to be verified or the article identification code is not abnormal;
1.2) if the true and false inquiry place is different from the true and false inquiry place at the last time, acquiring the place attribution types of the true and false inquiry place at the last time and the true and false inquiry place at the last time, and analyzing by combining the attribution types, specifically:
1.2.1) if the place attribution type indicates that the true and false inquiry place and the true and false inquiry place belong to the sales place, determining that the article to be verified or the article identification code is abnormal;
1.2.2) if the place attribution type indicates that the current true and false inquiry place and the last true and false inquiry place do not belong to the sales place, determining that the article to be verified or the article identification code has no abnormity;
1.2.3) if the place attribution type indicates that the true and false inquiry place and the true and false inquiry of the last time are a non-sales place and a sales place respectively, determining that the article to be verified or the article identification code has no abnormity;
1.2.4) if the place attribution type indicates that the true and false inquiry place and the true and false inquiry of the last time are respectively a selling place and a non-selling place, determining that the article to be verified or the article identification code is abnormal.
Specifically, as shown in fig. 2, the anti-counterfeit data server receives an article identification code sent by a user terminal, and further determines a current authenticity query place and a terminal identification, and after determining that the current authenticity query user is the same as the last authenticity query user or that the current authenticity query user is different from the last authenticity query user and is the same as any one of the related persons of the historical authenticity query users, the anti-counterfeit data server compares the current authenticity query place with the last authenticity query place according to the article identification code, the current authenticity query place, the terminal identification information and history information.
If the anti-counterfeiting data server judges that the true and false inquiry place is the same as the true and false inquiry place at the last time, the article to be verified or the article identification code is determined to be not abnormal, article information corresponding to the article identification code and prompt information without abnormality are fed back to the user terminal, wherein the article information in the embodiment comprises one or any combination of more of basic product information or traceability information such as article names, manufacturers, production dates, specifications, cautions and the like.
After the user checks the article information on the user terminal, the user can compare the article information with the corresponding information on the actual article to further verify the authenticity of the article.
If the anti-counterfeiting data server judges that the current authenticity inquiry place is different from the previous authenticity inquiry place, the place type of the current authenticity inquiry place and the place type of the previous authenticity inquiry place need to be acquired. The method comprises the steps of extracting information of each landmark point in advance, classifying each landmark point according to sales significance, dividing each landmark point into a sales place and a non-sales place, taking a place type corresponding to the landmark point with the same position as the true or false inquiry place as a place type of the true or false inquiry place, and taking a place type corresponding to the landmark point with the same position as the true or false inquiry place as a place type of the true or false inquiry place.
After the location type of the true and false inquiry place and the location type of the true and false inquiry place are obtained, if the anti-counterfeiting data server judges that the true and false inquiry place and the true and false inquiry place are the same as the sales place, or if the true/false inquiry place is the selling place and the true/false inquiry place is the non-selling place, determining that the article to be verified or the article identification code is abnormal, returning article information corresponding to the article identification code to the user terminal, and returning prompt information representing that the to-be-verified article or the article identification code is abnormal to the user terminal, and performing abnormal feedback to the article manufacturer terminal, wherein the information performing abnormal feedback to the article manufacturer terminal can include the true and false inquiry place information and the true and false inquiry time information of the article identification code at each time, so that the manufacturer can track the counterfeit condition of the article identification code or the article.
After the place type of the true and false inquiry place and the place type of the true and false inquiry place at the last time are obtained, if the anti-counterfeiting data server judges that the true and false inquiry place and the true and false inquiry place at the last time are both non-sales places or judges that the true and false inquiry place at the last time is a sales place, the article to be verified or the article identification code is determined to be abnormal, and article information corresponding to the article identification code and prompt information for representing that the article to be verified or the article identification code is abnormal are fed back to the user terminal.
As shown in fig. 3, in the second case, when the current authenticity query user is different from the previous authenticity query user and the related persons of the historical authenticity query users, the following steps are performed:
2.1) if the true and false inquiry place is the same as the last true and false inquiry place and is a sales place, comparing the number of independent users of the true and false inquiry place with a preset second user number threshold value to obtain a comparison result; when the comparison result shows that the number of the independent users at the authenticity inquiry place exceeds the second user number threshold value, determining that the article to be verified or the article identification code is abnormal; and when the comparison result shows that the number of the independent users at the authenticity inquiry place does not exceed the second user number threshold value, determining that the article to be verified or the article identification code is not abnormal.
And if the true and false inquiry place is the same as the last true and false inquiry place and is a non-sales place, determining that the article to be verified or the article identification code is not abnormal.
2.2) when the true and false inquiry place is different from the last true and false inquiry place, obtaining the place attribution type of the true and false inquiry place and the last true and false inquiry place, and analyzing by combining the attribution type, specifically:
2.2.1) the true and false inquiry place and the last true and false inquiry place are the same sale place, and the article to be verified or the article identification code is determined to be abnormal;
2.2.2) if the true and false inquiry place and the last true and false inquiry place are both non-sales places or the true and false inquiry place and the last true and false inquiry place are respectively non-sales places and sales places, verifying the time-distance relationship between the true and false inquiry place and the last true and false inquiry place, if the time-distance relationship is normal, determining that the article to be verified or the article identification code is not abnormal, and if the time-distance relationship is abnormal, determining that the article to be verified or the article identification code is abnormal.
The process of verifying the time-distance relationship between the current authenticity query location and the last authenticity query location may include: obtaining a distance value between the current authenticity query place and the last authenticity query place, obtaining a time difference value between the current authenticity query time and the last authenticity query time, obtaining a ratio of the distance value to the time difference value, if the ratio is larger than a preset threshold value, judging that the time-distance relation is abnormal, and if the ratio is not larger than the preset threshold value, judging that the time-distance relation is normal.
Here, the preset threshold value may be selected according to actual needs, and is preferably a speed value that can be reached by the fastest vehicle.
The process of verifying the time-distance relationship between the current authenticity query location and the last authenticity query location may also include: obtaining a distance value between the current authenticity inquiry place and the last authenticity inquiry place, obtaining a first time difference value between the current authenticity inquiry time and the last authenticity inquiry time, dividing the distance value by a preset speed value to obtain a second time difference value, comparing the first time difference value with the second time difference value, if the first time difference value is smaller than the second time difference value, judging that the time-distance relation is abnormal, and if the first time difference value is not smaller than the second time difference value, judging that the time-distance relation is normal. The preset speed value is preferably the speed value that can be reached by the fastest vehicle.
2.2.3) when the true and false inquiry user is different from the last true and false inquiry user and each associated person of each historical true and false inquiry user, if the true and false inquiry place is different from the last true and false inquiry place and is respectively a selling place and a non-selling place, determining that the article to be verified or the article identification code is abnormal.
Specifically, as shown in fig. 3, the anti-counterfeit data server receives an article identification code sent by the user terminal, and further determines the current authenticity query location and the terminal identification, and after determining that the current authenticity query user is different from the last authenticity query user and from the historical authenticity query users according to the article identification code, the current authenticity query location, the terminal identification and the history information, the anti-counterfeit data server compares the current authenticity query location with the last authenticity query location, and obtains location types of the current authenticity query location and the last authenticity query location.
If the anti-counterfeiting data server judges that the true and false inquiry place is the same as the true and false inquiry place at the last time and is the same as the sales place, the anti-counterfeiting data server compares the number of independent users of the true and false inquiry place at the current time with a preset second user number threshold value to obtain a comparison result; when the comparison result shows that the number of the independent users at the authenticity inquiry place exceeds the second user number threshold value, determining that the article to be verified or the article identification code is abnormal, returning article information corresponding to the article identification code and prompt information representing that the article to be verified or the article identification code is abnormal to the user terminal, and feeding back the abnormality to the article manufacturer terminal;
and when the comparison result shows that the number of the independent users at the true and false inquiry place does not exceed the second user number threshold value, determining that the article to be verified or the article identification code is not abnormal, and returning article information corresponding to the article identification code and prompt information representing that the article to be verified or the article identification code is not abnormal to the user terminal.
If the anti-counterfeiting data server judges that the true and false inquiry place is different from the true and false inquiry place of the last time and the true and false inquiry place of the current time and the true and false inquiry place of the last time are the same as the sales place, article information corresponding to the article identification code and prompt information for representing that the article to be verified or the article identification code is abnormal are returned to the user terminal, and abnormal feedback is carried out to the article manufacturer terminal;
if the anti-counterfeiting data server judges that the current authenticity query place is different from the last authenticity query place and the current authenticity query place and the last authenticity query place are the same as a non-sales place or the non-sales place and the sales place respectively, verifying the time-distance relationship between the current authenticity query place and the last authenticity query place, if the time-distance relationship is normal as a verification result, determining that the to-be-verified article or the article identification code is not abnormal, returning article information corresponding to the article identification code and prompt information for representing that the to-be-verified article or the article identification code is not abnormal to the user terminal, if the time-distance relationship is abnormal as a verification result, determining that the to-be-verified article or the article identification code is abnormal, returning article information corresponding to the article identification code and prompt information for representing that the to-be-verified article or the article identification code is abnormal to the user terminal, and performing exception feedback to the article manufacturer terminal.
Example two
According to the authenticity analyzing method in the embodiment, the invention also provides a authenticity analyzing system. Fig. 4 is a schematic structural diagram of the authenticity analyzing system according to the second embodiment of the present invention. Referring to fig. 4, the authenticity analyzing system of the second embodiment includes a request processing unit 201, a history processing unit 202, a user number counting unit 203, and an authenticity analyzing unit 204, wherein:
a request processing unit 201, configured to receive the authenticity query request information, and determine an article identification code of the present authenticity query, an authenticity query location, and an authenticity query user according to the authenticity query request information;
a history processing unit 202, configured to determine, according to history authenticity query record information of the article identification code, a last authenticity query location of the article identification code, each first history authenticity query user, and each associated person of each first history authenticity query user, where the first history authenticity query user refers to an authenticity query user of the article identification code that is corresponding to the present authenticity query location and is before the present authenticity query;
a user number counting unit 203, configured to accumulate the number of independent users of the current authenticity query location when the authenticity query user is different from each of the first historical authenticity query users and each associated person of each of the first historical authenticity query users, or when the authenticity query location is different from the previous authenticity query location;
and the authenticity analysis unit 204 is configured to perform the authenticity analysis on the to-be-verified article corresponding to the article identification code according to the number of independent users at the authenticity query location.
The description of the authenticity analysis system provided by the embodiment of the invention is similar to that of the authenticity analysis method, and has the beneficial effects of the authenticity analysis method, so that the description is not repeated for saving space; therefore, please refer to the above description of the authenticity analysis method for the technical details not disclosed in the authenticity analysis system provided by the embodiment of the invention.
It will be understood by those skilled in the art that all or part of the processes of the methods of the above embodiments may be implemented by a computer program, which is stored in a computer readable storage medium and sold or used as a stand-alone product. The program, when executed, may perform all or a portion of the steps of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
Alternatively, the integrated module of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments. In the several embodiments provided in the present application, it should be understood that the disclosed method and system may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the modules is only one logical functional division, and there may be other division ways in actual implementation, such as: multiple modules or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or modules may be electrical, mechanical or other.
In addition, all functional modules in the embodiments of the present invention may be integrated into one processing module, or each module may be separately used as one module, or two or more modules may be integrated into one module; the integrated module can be realized in a hardware form, and can also be realized in a form of hardware and a software functional module.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for analyzing authenticity is applied to a server and comprises the following steps:
receiving the authenticity query request information, and determining an article identification code, an authenticity query place and an authenticity query user of the authenticity query according to the authenticity query request information;
determining a last authenticity inquiry place of the article identification code, each first historical authenticity inquiry user and each associated person of each first historical authenticity inquiry user according to historical authenticity inquiry record information of the article identification code, wherein the first historical authenticity inquiry user refers to an authenticity inquiry user of the article identification code corresponding to the authenticity inquiry place before the authenticity inquiry;
when the authenticity inquiry user is different from each first historical authenticity inquiry user and each associated person of each first historical authenticity inquiry user, accumulating the number of independent users of the authenticity inquiry place;
and performing the authenticity analysis of the article to be verified corresponding to the article identification code according to a preset specific threshold value and the number of independent users of the authenticity inquiring place.
2. The method of claim 1, further comprising:
determining each second historical authenticity inquiry user and each associated person of each second historical authenticity inquiry user according to the historical authenticity inquiry record information of the article identification code, wherein the second historical authenticity inquiry user refers to the authenticity inquiry user of the article identification code corresponding to the article identification code before the authenticity inquiry;
determining the total number of independent users of the article identification code according to the authenticity inquiry user, each second historical authenticity inquiry user and each associated person of each second historical authenticity inquiry user;
and when the total number of the independent users exceeds a preset first user number threshold value, entering the step of performing the authenticity analysis on the to-be-verified object corresponding to the object identification code according to a preset specific threshold value and the number of the independent users at the authenticity query place.
3. The method according to claim 2, wherein the step of performing the current authenticity analysis on the to-be-verified item corresponding to the item identification code according to a preset specific threshold and the number of independent users at the current authenticity query location includes:
and performing the authenticity analysis of the article to be verified corresponding to the article identification code by combining the number of independent users of the authenticity query place, or/and the information whether the authenticity query place is the same as the last authenticity query place, or/and the time-distance relationship between the authenticity query place and the last authenticity query place, or/and the place attribution category of the authenticity query place and the last authenticity query place.
4. The method according to claim 3, wherein:
if the true and false inquiry place is different from the last true and false inquiry place when the true and false inquiry user is the same as the last true and false inquiry user or the true and false inquiry user is different from the last true and false inquiry user and is the same as any related person of historical true and false inquiry users, acquiring the place attribution types of the true and false inquiry place and the last true and false inquiry place;
if the place attribution type indicates that the current true and false inquiry place and the last true and false inquiry place both belong to a sales place, or if the place attribution type indicates that the current true and false inquiry place and the last true and false inquiry place are respectively a sales place and a non-sales place, determining that the article to be verified or the article identification code is abnormal;
and if the place attribution type indicates that the current true and false inquiry place and the last true and false inquiry place do not belong to the sales place, or if the place attribution type indicates that the current true and false inquiry place and the last true and false inquiry place are respectively a non-sales place and a sales place, determining that the article to be verified or the article identification code is not abnormal.
5. The method according to claim 3, wherein:
and if the true and false inquiry place is the same as the last true and false inquiry place, determining that the article to be verified or the article identification code has no abnormality.
6. The method according to claim 3, wherein:
when the authenticity inquiry user is different from the last authenticity inquiry user and each associated person of each historical authenticity inquiry user, if the authenticity inquiry place is the same as the last authenticity inquiry place and is a sales place, comparing the number of independent users of the authenticity inquiry place with a preset second user number threshold value to obtain a comparison result;
when the comparison result shows that the number of the independent users at the authenticity inquiry place exceeds the second user number threshold value, determining that the article to be verified or the article identification code is abnormal; and when the comparison result shows that the number of the independent users at the authenticity inquiry place does not exceed the second user number threshold value, determining that the article to be verified or the article identification code is not abnormal.
7. The method according to claim 3, wherein:
when the true and false inquiry user and the last true and false inquiry user are different and the related persons of the historical true and false inquiry users are different, if the true and false inquiry place is different from the last true and false inquiry place and is a sale place, determining that the article to be verified or the article identification code is abnormal;
and when the true and false inquiry user and the last true and false inquiry user are different and the associated persons of the historical true and false inquiry users are different, if the true and false inquiry place is different from the last true and false inquiry place and is a selling place and a non-selling place respectively, determining that the article to be verified or the article identification code is abnormal.
8. The method according to claim 3, wherein:
when the true and false inquiry user is different from the last true and false inquiry user and each associated person of each historical true and false inquiry user, if the true and false inquiry place is different from the last true and false inquiry place and is also a non-sales place, or the true and false inquiry place is different from the last true and false inquiry place and is respectively a non-sales place and a sales place, verifying the time-distance relation between the true and false inquiry place and the last true and false inquiry place, if the time-distance relation is normal, determining that the article to be verified or the article identification code is not abnormal, and if the time-distance relation is abnormal, determining that the article to be verified or the article identification code is abnormal.
9. The method according to claim 3, wherein the time-distance relationship between the current authentication inquiry place and the previous authentication inquiry place comprises:
obtaining a distance value between the authenticity inquiry place and the last authenticity inquiry place, and obtaining a time difference value between the authenticity inquiry time and the last authenticity inquiry time;
and determining the ratio of the distance value to the time difference value, if the ratio is greater than a preset threshold value, judging that the time-distance relationship is abnormal, and if the ratio is not greater than the preset threshold value, judging that the time-distance relationship is normal.
10. A authenticity analysis system, comprising:
the request processing unit is used for receiving the authenticity query request information and determining the article identification code, the authenticity query place and the authenticity query user of the authenticity query according to the authenticity query request information;
a history record processing unit, configured to determine, according to history authenticity query record information of the article identification code, a last authenticity query place of the article identification code, each first history authenticity query user, and each associated person of each first history authenticity query user, where the first history authenticity query user refers to an authenticity query user of the article identification code that is corresponding to the present authenticity query place and is before the present authenticity query;
a user number counting unit, configured to accumulate the number of independent users in the authenticity query location when the authenticity query user is different from each of the first historical authenticity query users and each of the associated persons of each of the first historical authenticity query users;
and the authenticity analysis unit is used for performing the authenticity analysis of the to-be-verified article corresponding to the article identification code according to a preset specific threshold value and the number of independent users at the authenticity inquiry place.
CN201610977326.9A 2016-11-07 2016-11-07 Method and system for authenticity analysis Active CN106570711B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610977326.9A CN106570711B (en) 2016-11-07 2016-11-07 Method and system for authenticity analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610977326.9A CN106570711B (en) 2016-11-07 2016-11-07 Method and system for authenticity analysis

Publications (2)

Publication Number Publication Date
CN106570711A CN106570711A (en) 2017-04-19
CN106570711B true CN106570711B (en) 2021-01-12

Family

ID=58539945

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610977326.9A Active CN106570711B (en) 2016-11-07 2016-11-07 Method and system for authenticity analysis

Country Status (1)

Country Link
CN (1) CN106570711B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107292633A (en) * 2017-06-21 2017-10-24 迈迪信息技术有限公司 Article dynamic anti-fake retroactive method and system based on internet platform
WO2020124607A1 (en) * 2018-12-22 2020-06-25 华为技术有限公司 Authenticity querying method and terminal device using same
CN112463817A (en) * 2020-11-24 2021-03-09 深圳市新系区块链技术有限公司 Mask information processing method and related equipment thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1794269A (en) * 2005-08-16 2006-06-28 段志辉 Digital antiforge system for recording retailing time
CN103970912A (en) * 2014-05-28 2014-08-06 林金明 Article information reporting and processing methods, devices and systems
CN105023161A (en) * 2015-04-10 2015-11-04 北京慧眼天下科技有限公司 Product anti-counterfeiting method and corresponding product anti-counterfeiting system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5272445B2 (en) * 2008-02-28 2013-08-28 富士通株式会社 Biometric authentication system, biometric authentication method, and biometric authentication program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1794269A (en) * 2005-08-16 2006-06-28 段志辉 Digital antiforge system for recording retailing time
CN103970912A (en) * 2014-05-28 2014-08-06 林金明 Article information reporting and processing methods, devices and systems
CN105023161A (en) * 2015-04-10 2015-11-04 北京慧眼天下科技有限公司 Product anti-counterfeiting method and corresponding product anti-counterfeiting system

Also Published As

Publication number Publication date
CN106570711A (en) 2017-04-19

Similar Documents

Publication Publication Date Title
CN108364181A (en) Source tracing method and system based on block chain and Internet of Things mark
CN108573384B (en) Product with double identification codes and product tracing anti-counterfeiting verification method and device
AU2014324171A1 (en) System for authenticating items
CN102622692B (en) Product quality tracing system and retroactive method
CN102831528A (en) Commodity anti-counterfeiting method and commodity anti-counterfeiting system
CN106570711B (en) Method and system for authenticity analysis
EP2065849A1 (en) Detection of counterfeited products based on sensor measurements
CN110675171A (en) Anti-counterfeiting tracing method based on block chain
KR101655308B1 (en) System and method for correlating supply chain theft with internet auction activity
CN202306643U (en) Product quality tracing system
CN104361503A (en) Offline commodity sales volume information collecting method based on two-dimensional codes
EP3405900A1 (en) Method of, and system for, preventing unauthorized products from being sold on online sites
CN102622708A (en) Medicine anti-counterfeiting query method and medicine anti-counterfeiting query system
CN111242641A (en) Method, device, equipment and medium for determining channel conflict
CN105260848A (en) Cigarette production management method based on two-dimensional code
US20160117685A1 (en) A counterfeiting control system
CN105260900A (en) Product unique identification anti-counterfeiting method and device
US20140158754A1 (en) Item authenticity
CN113033746B (en) Filter element anti-counterfeiting method, filter element anti-counterfeiting equipment and filter element anti-counterfeiting system
CN103996122A (en) Merchandise anti-counterfeiting system and method
US8348146B1 (en) System and method for determining product authenticity
US20080162167A1 (en) Commodity logistics service system and a counterfeit-impeding method thereof
CN110210939B (en) Information pushing method and device and computer equipment
CN101231728A (en) Commodity logistics service system and false proof method thereof
CN111274307A (en) Product information display method, device and system and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant