CN102622691A - Method for realizing goods stepwise anti-counterfeiting and network identity authentication - Google Patents

Method for realizing goods stepwise anti-counterfeiting and network identity authentication Download PDF

Info

Publication number
CN102622691A
CN102622691A CN2012100196198A CN201210019619A CN102622691A CN 102622691 A CN102622691 A CN 102622691A CN 2012100196198 A CN2012100196198 A CN 2012100196198A CN 201210019619 A CN201210019619 A CN 201210019619A CN 102622691 A CN102622691 A CN 102622691A
Authority
CN
China
Prior art keywords
false proof
commodity
authentication
client
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012100196198A
Other languages
Chinese (zh)
Other versions
CN102622691B (en
Inventor
任明和
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang 1one Technology Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201210019619.8A priority Critical patent/CN102622691B/en
Publication of CN102622691A publication Critical patent/CN102622691A/en
Application granted granted Critical
Publication of CN102622691B publication Critical patent/CN102622691B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A method for realizing goods stepwise anti-counterfeiting and network identity authentication resolves the long-standing difficult problem that anti-counterfeiting security of enterprises is affected, and consumers cannot know real identity of goods and equipment in advance when purchasing the goods and the equipment by the aid of novel goods anti-counterfeiting authentication technology. By means of an open stepwise anti-counterfeiting authentication checking design, merchants and enterprises can optionally select and combine anti-counterfeiting technologies, schemes, production time intervals of products and batches of the products conveniently, the anti-counterfeiting technologies and the schemes can be adjusted and set dynamically at any time, and accordingly counterfeiters do not have any chances to counterfeit; an 'anti-counterfeiting' technical system is built, the anti-counterfeiting purpose is achieved, and furthermore, the merchants, the enterprises and the products thereof are advertised, displayed and popularized; and clear consumption of 'knowing the identity of goods in advance' instead of 'knowing the identity of the goods after accepting the goods' is realized, and extensive integration of identity authentication business is realized for anti-counterfeiting business. Accordingly, participation degree of the merchants and users is quite high, and the technology can be assuredly marketed and applied.

Description

Realize the false proof method with the network identity authentication of commodity substep
Technical field
The present invention relates to the application of an Internet technology and Internet of Things and digit recognition technological incorporation; It is to utilize existing state-of-the-art technology; Solving long-term puzzlement enterprise cracks down on counterfeit goods false proof; When consumer's network is bought commodity and equipment, understand the difficult problem that its true identity situation is usually swindled in advance because of having no way of.Because the false proof authentication verification design of its open substep; Any selection and the combination of enterprise of businessman anti-counterfeiting technology, scheme have been made things convenient for; And the production period and batch; Dynamically adjustment setting at any time to anti-counterfeiting technology, scheme does not so just stay any time of playing tricks and space to the fake producer; Setting up the technical system of " knowing very false proof ", not only reached false proof purpose, is to enterprise of businessman and products thereof more, has carried out the promotional popularization, has done organic the combination to anti-counterfeiting technology service and network electronic commerce; Realize that " goods is to knowing " is the transparent consumption of " known in advance ", carry out the professional extension of identification authentication to false proof business and integrate.Like this, businessman and user's participation is just very high, thereby the marketing that has guaranteed this technological invention is used.
Background technology
The anti-counterfeiting technology kind is a lot, mainly contains antiforge technology, chemical material anti-counterfeiting technology, physics anti-counterfeiting technology, digital information false proof technology, structure and package anti-counterfeiting technology, human body and biological characteristic anti-counterfeiting technology etc.
The computer network anti-counterfeiting technology is that comprehensive utilization computer networking technology, the communication technology, data encoding technique and printing marking technology are carried out false proof a kind of new and high technology.Its developing direction and emphasis are: constantly new technology is melted in the anti-fake network system, should develops simultaneously and be applicable to false proof special technology, strengthen the security performance of anti-fake network on this basis, guarantee the reliability of total system.
Existing computer network anti-counterfeiting technology, and patent of invention and application for a patent for invention have proposed some anti-counterfeiting technology thinking and methods for using thems; Part has solved some anti-pseudo problems; But also much in practical application, the obstacle that can't overcome mainly shows the following aspects in existence:
Whether 1, single anti-fake code mark mode is meant an anti-fake mark coding only is set, and is existed by this anti-fake mark coding of database lookup, judges the method for anti-counterfeit of authenticity of products.Such drawback is, even be judged to be very, but can not stop for being worth very big commodity or equipment, and illegal producer or dealer take to steal the beams and change the pillars, and stay shell from the bottom of one's heart, and replacement critical component etc. is faked the behavior of rehearsing; If the checking passage does not have popularity, perhaps anti-counterfeiting technology does not have exclusivity, and the person of faking just can use same technical approach, and the misleading user goes to verify that to its checking passage the person of playing tricks copies same technology, finally does to such an extent that the user is hard to tell whether it is true or false; Because single anti-fake mark can't provide the user more genuine piece information, the person of faking is counterfeit to play tricks easily, and user's discriminating of yet having no way of comparing does not reach real false proof purpose.
2, verifying the false proof mode that once lost efficacy, promptly is exactly the mode that adopts note sign indicating number or voice directory enquiry, and whether the decision verification sign indicating number was used by checking, and whether the user is false method for anti-counterfeit thereby remind.Such drawback is, if the user not after checking, just must buy these commodity or equipment, producer and businessman certainly will will be commodity or the equipment of having verified so, change identifying code, cause very big trouble, moreover, sometimes can't change again; If because of producing, the breakage that causes input code or identifying code is transported and stored to packing; Blur, can't verify the true and false of these commodity or equipment, handle even businessman gives a discount; The user also can suspect, but the item property of these commodity or equipment and use attribute still partly or entirely exist.
3, the false proof mode of proprietary technology promptly is exactly to adopt a kind of single proprietary anti-counterfeiting technology or method, realizes the false proof processing to commodity or equipment.Such drawback is, can't cover the false proof demand of all products, if make the large tracts of land Application in Anti-counterfeiting, builds up integrated form anti-counterfeiting technology service platform, cultivates certain use habit and the platform credit worthiness of user, and this can't accomplish; For this anti-counterfeiting technology, if inadequate communication, the general user is not cognitive in addition, can't understand that it is true and false, the leak space is provided for counterfeit false making; Simultaneously, supply the mode of anti-counterfeiting mark outward, also have great administrative vulnerability and security risk.
4, the false proof mode of light and shade code combination is the private mark that will verify, and sign perhaps need be by the checking coding of special instrument ability identification at the place that generally can not arbitrarily read of product.Such drawback is; Checking needs to destroy the commodity globality (not using globality but do not influence) of commodity or equipment, if the user finally because of other reasons, abandons buying these commodity or equipment; And user's behavior is not illegal; This will inevitably cause trouble and conflict, thereby suppresses user's desire to purchase, influences the sale of these commodity or equipment; If could the identification checking encode by special instrument, this also makes troubles to the user and inconvenience, can suppress user's desire to purchase equally, influences the sale of these commodity or equipment.
The existence of the problems referred to above for using brand-new anti-counterfeiting technology theory, is integrated state-of-the-art technology, and the Development of New Generation anti-counterfeiting technology is used and product, and wide space is provided.
Summary of the invention
The present invention relates to the fusion application of an Internet technology and Internet of Things and digit recognition technology, it is to utilize state-of-the-art technology, solves long-term puzzlement enterprise and cracks down on counterfeit goods false proof and consumer when buying commodity and equipment, the difficult problem of the product real conditions of having no way of understanding in advance.Technical application characteristics of the present invention mainly show the following aspects:
1, sets up the brand-new anti-counterfeiting technology system of " knowing very false proof ".Changing traditional " testing very false proof " is " knowing very false proof " pattern, the production technology of the title of enterprise of businessman, brand, trade mark and product, materials used, external appearance characteristic, the production time etc., can as the parameter of authenticity of products checking and according to one of.Like this, unique way that the fake producer will successfully fake has only and selects material and the technology the same with genuine piece, causes fraud profitless, has not also just had necessity of fraud naturally.This has not only reached false proof purpose of cracking down on counterfeit goods, and simultaneously also to enterprise of businessman and products thereof, has carried out extensive promotional and has promoted, and lets the user fully understand, and grasps genuine piece, certified products, and the quality that certified products should have ensures characteristic.Businessman and user's participation is very high; The marketing that has guaranteed this technological invention is used; Particularly the E-business service of anti-counterfeiting technology service with the internet organically combined; The operational space of having expanded operation platform greatly is worth with profit, also is that its new technology from now on merges, and resources reserve has been carried out in the new business extension.
2, the design of open multidimensional anti-counterfeiting characteristic and anti-fake mark; Made things convenient for enterprise of businessman, based on the product of oneself, the actual conditions of equipment and technology need; To suitable feasible multiple anti-counterfeiting technology, scheme; Select arbitrarily and make up, and produce periods and different production batch, carry out the adjustment at any time of anti-counterfeiting technology, scheme to product is different.So just strengthened fake producer's fraud difficulty greatly, can not stay any chance to the fake producer.
3, substep is verified false proof design, and the user can be according to the needs of self understanding these commodity or equipment, and the possibility of buying these commodity or equipment; Progressively realize the checking of these commodity or equipment is judged, particularly be directed against the method for anti-counterfeit of private mark mark, under situation about can not assert this private mark anti-fake mark; Also can be by other anti-fake mark that can assert or identity characteristic; Judge the basic true and false of these commodity or equipment,, continue to accomplish next step fake certification for whether buying; The final realization bought, and reference is provided.Be unlikely to have destroyed the item property of commodity or equipment, cause dispute and trouble because of reading private mark.
4, the authentication functions that networks general digital product; Be incorporated into networked identification authentication identification to all commodity or equipment; Greatly enriched the anti-fake mark information of system acquisition and the usable range of characteristic fake certification descriptor, this also is the thorough revolution to all fake and forged behaviors.Particularly at internet electronic business today, in the fake traffic epoch in vogue, " identify " for all online merchants and commodity on the net, setting up brand-new " goods is to knowing " is the consumption guarantee of " known in advance ", and huge meaning is arranged.
The ecommerce third party means of payment have been assured the safety of fund and payment.But the true and false and quality grade for commodity guarantee, go back third party's authentication means of neither one authority, provide the quality guarantee of commodity to support; And, let the third party go to identify the whether qualified of all products, be impossible realize, even legal quality inspection mechanism of country does not accomplish yet.Yet the commercial predicament that such fake products spreads unchecked must change and standard; Sincerity is known genuine commercial rule, must set up.
The invention provides a kind of producer of letting, the legal person carries on a shoulder pole product " identification authentication " solution of duty.It lets buys consumption earlier from educating cognitive beginning, and it lets all true and false all exposures in the sun, and it lets all producers, all will accept all evaluation of user and supervise.So just from the source, a kind of solution the most completely is provided.In other words, the present invention has set up a kind of third party's authentication business from another angle, provides the commodity quality supervision to ensure and the authentication service.
The present invention relates to the fusion application of an Internet technology and Internet of Things recognition technology, the false proof method with the network identity authentication of affiliated realization commodity substep, form by following technical essential step:
Realizing the false proof method with the network identity authentication of commodity substep, is that manufacturer's product own coding will be set, the false proof authentication signature of establishment marked product; With product false proof authentication signature Message Entry System database; The false proof authentication codeword value of system matches and mark, the system client at configuration Intelligent Recognition terminal, and on system client; The recognition mode functional module of the different recognition technologies of integrated support; Intelligent movable identification terminal client makes up the visit analytic relationship to system database through network, comprises the steps:
The first, at product external packaging; Inner packing; The parts of product itself and product are one or more mark a little on, according to the fake certification or the identification authentication class requirement of this product needed, false proof authentication signature of unique or a plurality of code and the false proof authentication signature of characteristic are set.
The false proof authentication signature of code is meant at product external packaging inner packing; Product itself and a certain parts of product are one or more mark a little on; Write numeral or alphanumeric codes by certain rule, and the code that these are identical or different, carry out mark by false proof class requirement.By the not same sex that certain rule is write numeral or alphanumeric codes, also show can allocate voluntarily each single product of same batch different, irregular random code.Through the packing of scrambler, on the production line, print marking, mark and system synchronization typing automatically at product.So just guaranteed the security of anti-fake code, do not stayed any possibility of playing tricks to the fake producer.
The false proof authentication signature of characteristic; Be meant at product external packaging; Inner packing, the parts of product itself and product are a plurality of mark a little on, the characteristic anti-fake mark such as realizations such as antiforge technology, chemical material anti-counterfeiting technology, physics anti-counterfeiting technology, laser digital information anti-fake technology of mark.
The second, the product own coding is set, according to the product own coding, system arranges to set up certain service charging fees policy by both sides.
The product own coding is set; Be meant and accomplish all anti-counterfeiting characteristic data and to gather and edit earlier by manufacturer, set up this product or equipment or this batch products; The underlined false proof authentication information of code or the data system of the false proof authentication information of feature description, again with this data system import system.Between production line and system, owing to need not set up teleinstruction, reduced technical difficulty and equipment scale input like this, use in the production place that is fit to all big small-scales and technical conditions.If by the sync mark that professional equipment and telemanagement realize, editor, typing etc., the input of producer is more, and automaticity requires high, and only suitable large-scale pipeline operation does not have the popularity promotional value.
Set up certain service charge charging regulation, the system of being meant provides false proof authentication service, collects certain service fee to accepting service side.In general, this service fee mainly or is all paid by manufacturer's (or manufacturers' agent).To the charge of manufacturer, multiple design alternative is arranged, after both sides consult, realize from developing corresponding charge accounting module by system.
System also can set up function and service income shared service pattern with other network platform or application terminals that is fit to, and mainly is to make things convenient for the user, improves the coverage rate of this service application, cultivates user's use habit.And the mode of sharing through business income, for the network platform or application terminal bringing income to be divided into.
Three, according to the product own coding, configuration editor producer and products thereof promotion message files such as related text, picture or video, and input system database.
To production technology, materials used, the external appearance characteristic of title, brand, trade mark and the product of enterprise of businessman, the production time, literal and data description are carried out in marketing channel terminal etc.And,, set up popularization system with this again to producer's commodity both as anti-counterfeiting characteristic and identification authentication foundation these literal and data description, and realize promotional to producer's product, let the consumer understand merchandise news more.System is according to these businessman's enterprises registration information, and all right unique legal person's number of the account of matching system is convenient to enterprise of businessman is carried out unified management and extension service, and the service of chargeing is particularly more valuable to the network electronic commerce business.
Four, to this product or this batch products; The false proof authentication signature information of the code of all settings, perhaps the false proof authentication signature information of characteristic is pressed the general enforceable fake certification order to these commodity; Or, carry out system database editor typing to the network identity authentication requirement of these commodity.
General enforceable fake certification order is meant and is not destroying under the item property prerequisite of commodity or equipment, first outward appearance, back inner packing, commodity equipment grade itself is provided with the anti-fake mark point again, can be progressively to the fake certification of commodity or equipment can enforcement in proper order.Buy commodity the consumer like this, not because of will implement the fake certification to commodity the time, certain some attribute that causes commodity destroy and cause consuming dispute.
Five, setting the product own coding is false proof authentication codeword value, or the false proof authentication codeword value of corresponding product own coding is mated in addition in system.This can be according to the actual state of manufacturer, and system's flexible configuration data acquisition scheme satisfies code data editor's under the different situations needs.
Six, adapt to different intelligent identification terminal or different digital recognition technology, this false proof authentication codeword value is carried out single or combined distinguishing mark configuration.
Satisfy the different hardware configurations of different mobile intelligent terminals; The different digital recognition technology of using; Comprise laser scanner technique, bluetooth recognition technology, RFID REID, NFC recognition technology, two-dimension code recognition technology, camera recognition technology and following other new recognition technology expansions, the identification of false proof authentication codeword value is read.With same false proof authentication codeword value, by different recognition technology requirement commonly used, carry out the different techniques design, carry out composite marking then.And design like this, satisfying progress because of anti-counterfeiting technology and recognition technology, system also supports the slitless connection of new technology is incorporated, and need not system is carried out much transformations.
The false proof authentication codeword value sign that seven, will dispose; Be marked at the user and the most directly read, one or more places of exterior of commodity are perhaps with the false proof authentication codeword value of the digit chip sign that disposes; Satisfy digit chip identification reading requirement, be configured in one or more places of commodity.The false proof authentication codeword value that digit chip is made generally need not be marked at outer package, and it is huge to be fit to value, the class I goods that false proof class requirement is high.
Eight, initiate the substep fake certification of commodity as the user, or when carrying out the network identity authentication of commodity, the mobile intelligent terminal client is differentiated recognition mode automatically, instruction mobile intelligent terminal identification end reads the false proof authentication codeword value of these commodity.
Nine, mobile intelligent terminal false proof authentication codeword value that identification is read is submitted the mobile intelligent terminal system client to, submits to system server through the internet again, initiates substep fake certification or network identity authentication request.
Or at mobile intelligent terminal; Open WEB (WAP) the search function module of system configuration client, the user directly imports the false proof authentication codeword value of these commodity, system configuration client; Submit to system server through the internet again, initiate fake certification request or network identity authentication request.
Ten, system server obtains request, and server is initiated false proof authentication verification request to Direction Center.
The 11, Direction Center is searched and this false proof authentication codeword value through system database, all corresponding false proof authentication signature information.
The 12, will find this false proof authentication codeword value, all corresponding false proof authentication signature information are returned the mobile intelligent terminal client, or with promotion messages such as producer and products thereof more heterogeneous pass literal, picture or videos, are returned the mobile intelligent terminal client.
The 13, the user reads all false proof authentication signature information of returning; Contrast each unique point; And the actual conditions of these commodity of final purchase whether, confirm not destroy the substep fake certification of item property, or do not destroy the substep fake certification of use attribute; Or the step by step fake certification right, or carry out the network identity authentication to all false proof some perfect kernels.
Here be noted that system will return prompting and information warning if system does not find corresponding underlined false proof authentication information of institute or the false proof authentication information of feature description, its prompting and information warning comprise:
1, whether false proof authentication code is wrong, please give and checking.
2, inform that commodity have been crossed and guarantee the quality operating period and each day it's overdue that system has regained this false proof authentication code.
3, please give the relief of carrying out after the failure of fake certification and identification authentication, and inform rescue skills.
4, errorless like the input of false proof authentication code, and after relief looks into, do not have these commodity or equipment associated production manufacturer information record, then point out these commodity or equipment that puppet is arranged, careful purchase.
2, realize the method for the false proof and network identity authentication of commodity substep, comprise the steps:
The first, configuration is fit to the different businessmans subscription client of different network terminals, and businessman's subscription client at the terminal is set up businessman's login account ADMINISTRATION SUBSYSTEM; Configuration is fit to different consumer's subscription clients of different network terminals, at consumer's subscription client, sets up consumer user's login account ADMINISTRATION SUBSYSTEM.
The different network terminals client is meant existingly based on the mobile network terminal, and the terminal based on PC is also arranged, and the different clients version that needs of following network interactive television terminal; The client of different user terminals is meant the different manufacturers based on portable terminal, and the client release based on the different hardware configurations compatibility needs makes things convenient for user's correspondence to download and install.
Set up user of businessman and consumer user's login account ADMINISTRATION SUBSYSTEM; The first is carried out account management to the user for ease, and main is between businessman and consumer, utilizes the end-to-end mutual transmission module of information of login account exploitation; Mutual information transmission conveniently is provided and exchanges; Guarantee carrying out in order of e-commerce initiative, also let system, laid in user base further for businessman and consumer provide the extension service of more enriching.
The second, the data-interface of configuration-system and e-commerce platform; Terminal businessman is through businessman's login account ADMINISTRATION SUBSYSTEM; Application manufacturer is to the selling license authorization code of terminal businessman, and at the platform commodity displaying page, the selling license authorization code sign of mark terminal businessman links.
The selling license authorization code of terminal businessman is meant any same commodity, and the end-retailer man of One's name is legion generally all can be arranged; Perhaps, how to guarantee to control fake and forged businessman and assume another's name to sell, how to retrain the seller sales behavior of oneself is responsible for directly to consumer's One's name is legion network seller; Be necessary to help exploitation one cover; Producer makes things convenient for the consumer with the simplest mode to the authentication management system of terminal businessman, realizes the identity understanding to this businessman or commodity.
This system finally can also occur as the cloud computing system of producer's sales management.About the business data security and the confidentiality architecture design of this cloud computing system, in this patent content, do not explain.
Three, when consumer user on e-commerce platform; When a certain commodity or a certain service are had purchase intention; Click the link of selling license authorization code sign; Checking businessman sells these commodity or the mandate qualification of this service is provided, or points out the recommended information of this producer and the more heterogeneous pass of this product literal, picture or video.
Four, confirm the selling license mandate of terminal businessman, or after further having understood producer and products thereof introduction, the consumer is online to place an order, send to buy and confirm, or the consumer is through having third party's network payment instrument defrayment of guarantee function.The defrayment here is based on general ecommerce orthodox practice, if after the native system successful implementation; Should be behind the false proof authentication codeword value that obtains getting ready the goods; The capable again defrayment of user, this has just had a requirement that businessman must get ready the goods in advance, stops to deceive the generation of money swindle.
Five, the system client of terminal businessman obtains consumer user's sequence information, gets all the commodity ready by consumer's requirement, and through mobile intelligent terminal businessman client, the false proof authentication codeword value of these commodity is read in identification.
Six, businessman's mobile intelligent terminal client, the false proof authentication codeword value through system reads identification is submitted in consumer user's the client terminals account.
Utilize the online management system that places an order of consumer of businessman of system, click singular link under the corresponding consumer, reply the information of having got ready the goods, and transfer the false proof authentication codeword value that identification is read, be submitted in consumer user's the client terminals account.
Seven, consumer user obtains commodity counterfeit prevention authentication codeword value; Submit to system server through the internet; Implement commodity substep fake certification; Or further commodity network identification authentication, after consumer user confirms the true and false or identity, or through having third party's network payment instrument defrayment of guarantee function.
Eight, after the consumer receives commodity; Check the false proof authentication codeword value that businessman provides,, implement anti-fake certificate and identification authentication authentication once more commodity through the system client of mobile intelligent terminal; Confirm that errorless back signature receives, confirm perhaps to return goods in wrong back to reject.
3, realize the method for the false proof and network identity authentication of commodity substep; Be to satisfy the different hardware configurations of different mobile intelligent terminals; The different digital recognition technology of using; Comprise laser scanner technique, bluetooth recognition technology, RFID REID, NFC recognition technology, two-dimension code recognition technology, camera recognition technology and following other new recognition technology expansions, the identification of false proof authentication codeword value is read.
4, realize the method for the false proof and network identity authentication of commodity substep, be to set up the mobile intelligent terminal client, the function command driving relationship of camera; When initiating identification and read false proof authentication codeword value mark request, the camera of client instruction identification end is taken pictures to the false proof authentication codeword value mark of commodity; Again photo is submitted to the picture modular converter and resolved functional module; Obtain false proof authentication codeword value, the false proof authentication codeword value that the mobile intelligent terminal client will obtain is through mobile network's submission system database; Carry out commodity substep fake certification, or carry out the commodity network identification authentication.Current at mobile intelligent terminal, implement security code identification, the technology of reality is exactly through the extensive camera of configuration of mobile intelligent terminal.
5, realize the method for the false proof and network identity authentication of commodity substep, be to set up the mobile intelligent terminal client, the function command driving relationship of NFC chip; When initiating identification and read false proof authentication codeword value mark request, the NFC chip of client instruction identification end starts the identification read functions; To the false proof authentication codeword value NFC chip that on commodity, disposes, the false proof authentication codeword value of these commodity is read in identification, and submits to the mobile intelligent terminal client; The false proof authentication codeword value that the mobile intelligent terminal client will obtain; Through network submission system database, carry out commodity substep fake certification, or carry out the commodity network identification authentication.The following NFC technology that can estimate widespread use; Utilization NFC technology is carried out security code identification; Can become the application standard configuration of individual mobile intelligent terminal, particularly read technology, can form a function sharing identification end based on the integration identification of NFC technology; So, be necessary to do an early stage technical plan here.
Legend 1 is the principle module map that the present invention realizes the false proof method with the network identity authentication of commodity substeps.
Legend 2 is that the present invention realizes that the network identity authentication of the false proof method with the network identity authentication of commodity substeps partly implements module map.
Shown in legend, the operation flow process through specific embodiment further specifies below, and the present invention realizes the false proof method implementing procedure with the network identity authentication of commodity substeps.
1, selects suitable anti-counterfeiting technology and scheme; Or the anti-counterfeiting technology of system matches and scheme; Install special anti-counterfeiting marking arrangement 110 and 111 additional at product line 109 ends; Install anti-fake mark additional and read editing equipment 108, and set up anti-fake mark and read editing equipment 108 and be connected, set up the anti-fake mark work flow with system data typing end 107.Need not specialized equipment, also can be designed to artificial false proof work flow.
2, at the parts of product, or product itself, or the product inner packing, or on the product external packaging, designing one or more gauge points, use characteristic marker 110 carries out the anti-counterfeiting characteristic mark, uses coded markings device 111 to carry out the anti-fake code mark.
3, data read editing machine 108 and read through marker, or directly read label information at gauge point, and edit reading information; Simultaneously; To the enterprise of businessman that does not also have Standard Edition maybe need revise; Production technology, materials used, the external appearance characteristic of relevant title, brand, trade mark and product; Information such as production time marketing channel terminal are registered editor or are revised, and build false proof authentication information of mark or the false proof authentication information normal data of feature description that should product, and the manufacturer is mated corresponding unique product own coding.
4, through data typing end 107, will gather, the normal data behind the edit-modify and manufacturer's product own coding, input system server 104 is stored in the system database 106.
5, system server 104, to the corresponding false proof authentication codeword value of product own coding configuration, through code configuration end 112, return to code signing end 113 to the false proof authentication codeword value of configuration, and in product or external packing, or mark is carried out in production line prompting position.
6,, accomplish by false proof authentication codeword value the charge accounting setting of quantity configuration or product number statistics automatically according to system's accounting module design and both sides' services pay protocol requirement.
Above-mentioned flow process has been accomplished the setting in the false proof authentication of production end.The flow process of back is at user side, explains and how to realize false proof authentication, may further comprise the steps:
7, work as consumers shopping, when initiating to the fake certification of these commodity or identification authentication request, operation mobile intelligent terminal client 102; Client 102 instruction identification end 101 reads or decodes and read this false proof authentication codeword value, and the identification end is submitted false proof authentication codeword value to; Give mobile intelligent terminal client 102, mobile intelligent terminal client 102 is through mobile base station 103; Get into mobile radio communication; Submit to this access verification request to system server 104, system server 104 is initiated false proof authentication verification request to Direction Center 105.
Perhaps the user is through mobile intelligent terminal client 102; Import this false proof authentication codeword value, get into mobile Internet through mobile base station 103, false proof authentication request; Be submitted to system server 104, system server 104 is initiated false proof authentication verification request to Direction Center 105.
8, Direction Center 105 is searched the false proof authentication result information corresponding with this false proof authentication codeword value, and with the object information that finds, is returned to mobile intelligent terminal client 102 through system database 106.If system does not find corresponding object information, will return prompting and information warning.
9, the user reads the false proof authentication result information of returning, and instructs flow process according to it, and product is carried out substep fake certification or identification authentication.
Through the enforcement of above-mentioned technology, realized the purpose based on terminal recognition technology realization product false proof authentication of the present invention, it is false proof to help enterprise of producer to crack down on counterfeit goods, and solution the most completely is provided, and in the image propaganda to enterprise, on the product promotion; The business of implementation platform operator increases income, and service function is extended, and new functions expanding has been developed another brand-new approach.

Claims (5)

1. realize the false proof method with the network identity authentication of commodity substep, it is characterized in that being provided with manufacturer's product own coding, the false proof authentication signature of establishment marked product; With product false proof authentication signature Message Entry System database; The false proof authentication codeword value of system matches and mark, the system client at configuration Intelligent Recognition terminal, and on system client; The recognition mode functional module of the different recognition technologies of integrated support; Intelligent movable identification terminal client makes up the visit analytic relationship to system database through network, comprises the steps:
The first, at product external packaging; Inner packing; The parts of product itself and product are one or more mark a little on, according to the fake certification or the identification authentication class requirement of this product needed, false proof authentication signature of unique or a plurality of code and the false proof authentication signature of characteristic are set;
The second, the product own coding is set, according to the product own coding, system arranges to set up certain service charging fees policy by both sides;
Three, according to the product own coding, configuration editor producer and products thereof promotion message files such as related text, picture or video, and input system database;
Four, to this product or this batch products; The false proof authentication signature information of the code of all settings, perhaps the false proof authentication signature information of characteristic is pressed the general enforceable fake certification order to these commodity; Or, carry out system database editor typing to the network identity authentication requirement of these commodity;
Five, setting the product own coding is false proof authentication codeword value, or the false proof authentication codeword value of corresponding product own coding is mated in addition in system;
Six, adapt to different intelligent identification terminal or different digital recognition technology, this false proof authentication codeword value is carried out single or combined distinguishing mark configuration;
The false proof authentication codeword value sign that seven, will dispose; Be marked at the user and the most directly read, one or more places of exterior of commodity are perhaps with the false proof authentication codeword value of the digit chip sign that disposes; Satisfy digit chip identification reading requirement, be configured in one or more places of commodity;
Eight, initiate the substep fake certification of commodity as the user, or when carrying out the network identity authentication of commodity, the mobile intelligent terminal client is differentiated recognition mode automatically, instruction mobile intelligent terminal identification end reads the false proof authentication codeword value of these commodity;
Nine, mobile intelligent terminal false proof authentication codeword value that identification is read is submitted the mobile intelligent terminal system client to, submits to system server through the internet again, initiates substep fake certification or network identity authentication request;
Or at mobile intelligent terminal; Open WEB (WAP) the search function module of system configuration client, the user directly imports the false proof authentication codeword value of these commodity, system configuration client; Submit to system server through the internet again, initiate fake certification request or network identity authentication request;
Ten, system server obtains request, and server is initiated false proof authentication verification request to Direction Center;
The 11, Direction Center is searched and this false proof authentication codeword value through system database, all corresponding false proof authentication signature information;
The 12, will find this false proof authentication codeword value, all corresponding false proof authentication signature information are returned the mobile intelligent terminal client, or with promotion messages such as producer and products thereof more heterogeneous pass literal, picture or videos, are returned the mobile intelligent terminal client;
The 13, the user reads all false proof authentication signature information of returning; Contrast each unique point; And the actual conditions of these commodity of final purchase whether, confirm not destroy the substep fake certification of item property, or do not destroy the substep fake certification of use attribute; Or the step by step fake certification right, or carry out the network identity authentication to all false proof some perfect kernels.
2. realize the false proof method with the network identity authentication of commodity substep, the described commodity network identification authentication that carries out of claim 1 is characterised in that to comprise the steps:
The first, configuration is fit to the different businessmans subscription client of different network terminals, and businessman's subscription client at the terminal is set up businessman's login account ADMINISTRATION SUBSYSTEM; Configuration is fit to different consumer's subscription clients of different network terminals, at consumer's subscription client, sets up consumer user's login account ADMINISTRATION SUBSYSTEM;
The second, the data-interface of configuration-system and e-commerce platform; Terminal businessman is through businessman's login account ADMINISTRATION SUBSYSTEM; Application manufacturer is to the selling license authorization code of terminal businessman, and at the platform commodity displaying page, the selling license authorization code sign of mark terminal businessman links;
Three, when consumer user on e-commerce platform; When a certain commodity or a certain service are had purchase intention; Click the link of selling license authorization code sign; Checking businessman sells these commodity or the mandate qualification of this service is provided, or points out the recommended information of this producer and the more heterogeneous pass of this product literal, picture or video;
Four, confirm the selling license mandate of terminal businessman, or after further having understood producer and products thereof introduction, the consumer is online to place an order, send to buy and confirm; Or the consumer is through having third party's network payment instrument defrayment of guarantee function;
Five, the system client of terminal businessman obtains consumer user's sequence information, gets all the commodity ready by consumer's requirement, and through mobile intelligent terminal businessman client, the false proof authentication codeword value of these commodity is read in identification;
Six, businessman's mobile intelligent terminal client through the false proof authentication codeword value that system reads identification, is submitted in consumer user's the client terminals account;
Seven, consumer user obtains false proof authentication codeword value; Submit to system server through the internet; Implement commodity substep fake certification; Or implement the commodity network identification authentication, after consumer user confirms commodity true and false or identity, or through having third party's network payment instrument defrayment of guarantee function;
Eight, after the consumer receives commodity; Check the false proof authentication codeword value that businessman provides,, implement anti-fake certificate and identification authentication authentication once more commodity through the system client of mobile intelligent terminal; Confirm that errorless back signature receives, confirm perhaps to return goods in wrong back to reject.
3. realize the false proof method with the network identity authentication of commodity substep; The recognition mode functional module of the different recognition technologies of integrated support on the described system client of claim 1; Be characterised in that the different hardware configurations that satisfies different mobile intelligent terminals; The different digital recognition technology of using; Comprise laser scanner technique, bluetooth recognition technology, RFID REID, NFC recognition technology, two-dimension code recognition technology, camera recognition technology and following other new recognition technology expansions, the identification of false proof authentication codeword value is read.
4. realize the false proof method with the network identity authentication of commodity substep, the described camera recognition technology of claim 3 is characterised in that and sets up the mobile intelligent terminal client; Function command driving relationship to camera; When initiating identification and read false proof authentication codeword value mark request, the camera of client instruction identification end is taken pictures to the false proof authentication codeword value mark of commodity; Again photo is submitted to the picture modular converter and resolved functional module; Obtain false proof authentication codeword value, the false proof authentication codeword value that the mobile intelligent terminal client will obtain is through mobile network's submission system database; Carry out commodity or equipment substep fake certification, or carry out commodity or device network identification authentication.
5. realize the false proof method with the network identity authentication of commodity substep, the described NFC of claim 3 near field recognition technology is characterised in that and sets up the mobile intelligent terminal client; To the function command driving relationship of NFC chip, when initiating identification and read false proof authentication codeword value mark request, the NFC chip of client instruction identification end; Start the identification read functions; To the false proof authentication codeword value digital technology chip that on commodity, disposes, the false proof authentication codeword value of these commodity is read in identification, and submits to the mobile intelligent terminal client; The false proof authentication codeword value that the mobile intelligent terminal client will obtain; Through network submission system database, carry out commodity substep fake certification, or carry out the commodity network identification authentication.
CN201210019619.8A 2012-01-25 2012-01-25 Realize the method for the false proof and network identity authentication of commodity substep Active CN102622691B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210019619.8A CN102622691B (en) 2012-01-25 2012-01-25 Realize the method for the false proof and network identity authentication of commodity substep

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210019619.8A CN102622691B (en) 2012-01-25 2012-01-25 Realize the method for the false proof and network identity authentication of commodity substep

Publications (2)

Publication Number Publication Date
CN102622691A true CN102622691A (en) 2012-08-01
CN102622691B CN102622691B (en) 2015-11-18

Family

ID=46562596

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210019619.8A Active CN102622691B (en) 2012-01-25 2012-01-25 Realize the method for the false proof and network identity authentication of commodity substep

Country Status (1)

Country Link
CN (1) CN102622691B (en)

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102824321A (en) * 2012-09-15 2012-12-19 海南亚元防伪技术研究所 Anti-counterfeiting tablets
CN103902948A (en) * 2012-12-26 2014-07-02 北大方正集团有限公司 Anti-counterfeiting information verification method and device
CN104182885A (en) * 2014-08-26 2014-12-03 黑龙江大学 Clothes intelligent ordering, showing and selling management system and method based on NFC
CN104504571A (en) * 2014-12-16 2015-04-08 新余兴邦信息产业有限公司 Method and device for online commodity anti-counterfeiting authentication
CN104993930A (en) * 2015-05-19 2015-10-21 吴晗 Digital voucher generation method and system, and digital voucher verifying method and system
CN105049429A (en) * 2015-06-30 2015-11-11 百度在线网络技术(北京)有限公司 Authentication method and system based on third-party certification authority
CN105205694A (en) * 2015-08-28 2015-12-30 国网山东胶州市供电公司 Intelligent marketing system base on various network technologies
CN105373934A (en) * 2015-11-25 2016-03-02 四川诚品电子商务有限公司 Simulated mall type online trading platform
CN105373950A (en) * 2015-11-25 2016-03-02 四川诚品电子商务有限公司 Online trading platform based on cloud security
CN105469267A (en) * 2015-11-25 2016-04-06 四川诚品电子商务有限公司 Visual online trading platform
CN105488706A (en) * 2015-11-25 2016-04-13 四川诚品电子商务有限公司 Online trading platform
CN105488719A (en) * 2015-11-25 2016-04-13 四川诚品电子商务有限公司 Video online auction platform based on cloud security
CN105488707A (en) * 2015-11-25 2016-04-13 四川诚品电子商务有限公司 Intellectual property online trading platform
CN105488717A (en) * 2015-11-25 2016-04-13 四川诚品电子商务有限公司 Real-time video on-line auction platform
CN105488718A (en) * 2015-11-25 2016-04-13 四川诚品电子商务有限公司 Video online auction platform
CN105512923A (en) * 2015-11-25 2016-04-20 四川诚品电子商务有限公司 On-line transaction platform of online game
CN106339881A (en) * 2016-08-24 2017-01-18 莫小成 Commodity information anti-counterfeiting method, commodity information anti-counterfeiting device and terminal
CN106447345A (en) * 2016-08-26 2017-02-22 武汉众睿科技发展股份有限公司 Traceability system of commodity traceability equipment
CN106952098A (en) * 2017-01-19 2017-07-14 深圳市卡尔智能科技有限公司 A kind of filter element of water purifier recognition methods
CN107045687A (en) * 2017-03-24 2017-08-15 李建魁 A kind of internet security for commodity counterfeit prevention is locked
CN107220839A (en) * 2017-06-26 2017-09-29 南京熊猫电子股份有限公司 The implementation method that a kind of intelligent television authentication based on internet is put on record with information
CN107341899A (en) * 2017-07-11 2017-11-10 广州市银科电子有限公司 A kind of planning type is customizable illegally to determine bill anti-counterfeit discriminating expert system
CN108022154A (en) * 2017-12-07 2018-05-11 钱伟民 The method of user's value chain management after a kind of transaction and transaction
CN108074106A (en) * 2016-11-17 2018-05-25 深圳童萌汇网络技术有限公司 Method for anti-counterfeit and system
CN108595974A (en) * 2018-05-07 2018-09-28 襄阳市尚贤信息科技有限公司 A kind of fast verification system of electronic product code
CN109615400A (en) * 2018-12-10 2019-04-12 盐城华科智造数据科技有限公司 The specificity detection method of heterogeneous attached product
CN110675210A (en) * 2019-08-16 2020-01-10 广东省广袤科技有限公司 Commodity transaction payment website system
CN111091394A (en) * 2019-01-27 2020-05-01 海南亚元防伪技术研究所(普通合伙) Product anti-fake safety packing method
CN111401987A (en) * 2020-02-19 2020-07-10 北京三快在线科技有限公司 Catering merchant information management and display method, system, server and storage medium
CN111401588A (en) * 2020-02-28 2020-07-10 北京三快在线科技有限公司 Scenic spot merchant information management and display method and system, and storage medium
CN111899039A (en) * 2020-08-15 2020-11-06 李志彬 Method for anti-counterfeiting through commodity self characteristic data
TWI754489B (en) * 2020-12-14 2022-02-01 中華電信股份有限公司 Shopping service system and voice control shopping method
WO2022077135A1 (en) * 2020-10-15 2022-04-21 江苏图码信息科技有限公司 Anti-counterfeiting tracing system and application component for associated customized graphic code

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1952971A (en) * 2006-09-22 2007-04-25 莫宁 Information issue method and system based on product identification ID
WO2007098660A1 (en) * 2006-03-02 2007-09-07 Huawei Technologies Co., Ltd. An authentication method and system between network entities in ip multimedia subsystem
CN201449627U (en) * 2009-06-26 2010-05-05 广州宽度信息技术有限公司 Two-dimension code anti-counterfeit identification system of mobile phone
CN102082815A (en) * 2010-09-08 2011-06-01 任明和 Terminal-based stepwise anti-counterfeiting verification and identity authentication system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007098660A1 (en) * 2006-03-02 2007-09-07 Huawei Technologies Co., Ltd. An authentication method and system between network entities in ip multimedia subsystem
CN1952971A (en) * 2006-09-22 2007-04-25 莫宁 Information issue method and system based on product identification ID
CN201449627U (en) * 2009-06-26 2010-05-05 广州宽度信息技术有限公司 Two-dimension code anti-counterfeit identification system of mobile phone
CN102082815A (en) * 2010-09-08 2011-06-01 任明和 Terminal-based stepwise anti-counterfeiting verification and identity authentication system and method

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102824321A (en) * 2012-09-15 2012-12-19 海南亚元防伪技术研究所 Anti-counterfeiting tablets
CN103902948A (en) * 2012-12-26 2014-07-02 北大方正集团有限公司 Anti-counterfeiting information verification method and device
CN104182885A (en) * 2014-08-26 2014-12-03 黑龙江大学 Clothes intelligent ordering, showing and selling management system and method based on NFC
CN104504571A (en) * 2014-12-16 2015-04-08 新余兴邦信息产业有限公司 Method and device for online commodity anti-counterfeiting authentication
CN104993930A (en) * 2015-05-19 2015-10-21 吴晗 Digital voucher generation method and system, and digital voucher verifying method and system
CN105049429B (en) * 2015-06-30 2018-05-18 百度在线网络技术(北京)有限公司 A kind of authentication method and system based on Third Party Authentication mechanism
CN105049429A (en) * 2015-06-30 2015-11-11 百度在线网络技术(北京)有限公司 Authentication method and system based on third-party certification authority
CN105205694A (en) * 2015-08-28 2015-12-30 国网山东胶州市供电公司 Intelligent marketing system base on various network technologies
CN105488706A (en) * 2015-11-25 2016-04-13 四川诚品电子商务有限公司 Online trading platform
CN105469267A (en) * 2015-11-25 2016-04-06 四川诚品电子商务有限公司 Visual online trading platform
CN105373950A (en) * 2015-11-25 2016-03-02 四川诚品电子商务有限公司 Online trading platform based on cloud security
CN105488719A (en) * 2015-11-25 2016-04-13 四川诚品电子商务有限公司 Video online auction platform based on cloud security
CN105488707A (en) * 2015-11-25 2016-04-13 四川诚品电子商务有限公司 Intellectual property online trading platform
CN105488717A (en) * 2015-11-25 2016-04-13 四川诚品电子商务有限公司 Real-time video on-line auction platform
CN105488718A (en) * 2015-11-25 2016-04-13 四川诚品电子商务有限公司 Video online auction platform
CN105512923A (en) * 2015-11-25 2016-04-20 四川诚品电子商务有限公司 On-line transaction platform of online game
CN105373934A (en) * 2015-11-25 2016-03-02 四川诚品电子商务有限公司 Simulated mall type online trading platform
CN106339881A (en) * 2016-08-24 2017-01-18 莫小成 Commodity information anti-counterfeiting method, commodity information anti-counterfeiting device and terminal
CN106447345A (en) * 2016-08-26 2017-02-22 武汉众睿科技发展股份有限公司 Traceability system of commodity traceability equipment
CN108074106A (en) * 2016-11-17 2018-05-25 深圳童萌汇网络技术有限公司 Method for anti-counterfeit and system
CN106952098A (en) * 2017-01-19 2017-07-14 深圳市卡尔智能科技有限公司 A kind of filter element of water purifier recognition methods
CN107045687A (en) * 2017-03-24 2017-08-15 李建魁 A kind of internet security for commodity counterfeit prevention is locked
CN107220839B (en) * 2017-06-26 2020-11-27 南京熊猫电子股份有限公司 Internet-based smart television authentication and information preparation implementation method
CN107220839A (en) * 2017-06-26 2017-09-29 南京熊猫电子股份有限公司 The implementation method that a kind of intelligent television authentication based on internet is put on record with information
CN107341899A (en) * 2017-07-11 2017-11-10 广州市银科电子有限公司 A kind of planning type is customizable illegally to determine bill anti-counterfeit discriminating expert system
CN108022154A (en) * 2017-12-07 2018-05-11 钱伟民 The method of user's value chain management after a kind of transaction and transaction
CN108595974B (en) * 2018-05-07 2021-04-20 襄阳市尚贤信息科技有限公司 Quick verification system for electronic product code
CN108595974A (en) * 2018-05-07 2018-09-28 襄阳市尚贤信息科技有限公司 A kind of fast verification system of electronic product code
CN109615400A (en) * 2018-12-10 2019-04-12 盐城华科智造数据科技有限公司 The specificity detection method of heterogeneous attached product
CN111091394A (en) * 2019-01-27 2020-05-01 海南亚元防伪技术研究所(普通合伙) Product anti-fake safety packing method
CN110675210A (en) * 2019-08-16 2020-01-10 广东省广袤科技有限公司 Commodity transaction payment website system
CN110675210B (en) * 2019-08-16 2022-04-05 广东省广袤科技有限公司 Commodity transaction payment website system
CN111401987A (en) * 2020-02-19 2020-07-10 北京三快在线科技有限公司 Catering merchant information management and display method, system, server and storage medium
CN111401588A (en) * 2020-02-28 2020-07-10 北京三快在线科技有限公司 Scenic spot merchant information management and display method and system, and storage medium
CN111899039A (en) * 2020-08-15 2020-11-06 李志彬 Method for anti-counterfeiting through commodity self characteristic data
WO2022077135A1 (en) * 2020-10-15 2022-04-21 江苏图码信息科技有限公司 Anti-counterfeiting tracing system and application component for associated customized graphic code
TWI754489B (en) * 2020-12-14 2022-02-01 中華電信股份有限公司 Shopping service system and voice control shopping method

Also Published As

Publication number Publication date
CN102622691B (en) 2015-11-18

Similar Documents

Publication Publication Date Title
CN102622691B (en) Realize the method for the false proof and network identity authentication of commodity substep
US20220050983A1 (en) Systems and methods for Physical Control Verification and Authentication Event Scan Logging
Chen Strategic management of e-business
JP2021502654A (en) Codechain models, devices, methods and uses
US20160098723A1 (en) System and method for block-chain verification of goods
US20110125613A1 (en) Secure universal transaction system
CN106412041A (en) System for connecting mobile terminal with service providing equipment and service providing method
CN105190659A (en) Methods and arrangements for smartphone payments and transactions
CN107481059A (en) Information processing method and system
KR102269812B1 (en) System for providing blockchain based drawing transaction service
CN110648225A (en) Method for applying digital code chain
CN107657445A (en) A kind of on-line payment method and on-line payment system
CN112669165A (en) Unified access method applying digital personal code chain
US20130117124A1 (en) System for Creating an Advertisement Strategy
CN106326362A (en) Information processing method based on two-dimensional codes, terminal device and server
CN102082815B (en) Terminal-based stepwise anti-counterfeiting verification and identity authentication system and method
EP1352311A1 (en) Method for accessing a secured system
Leung et al. Analysis of mobile commerce market in Hong Kong
CN108985431A (en) A kind of method of antifalsification label and its commodity genuine piece of Testing and appraisal registered trademark
US20220207122A1 (en) System and method for management of digital media content
US20190172093A1 (en) Creating an Advertisement Strategy
CN112950368A (en) Sports service platform based on block chain
Kamaleshwaran et al. Digital Certification–Certification Credential as Non Fungible Token (NFT)
Sharma E-commerce and E-business
KR102280438B1 (en) System for transacting digital contents and method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
CB03 Change of inventor or designer information

Inventor after: Lv Yangbo

Inventor before: Ren Minghe

COR Change of bibliographic data
TA01 Transfer of patent application right

Effective date of registration: 20151021

Address after: Xihu District Hangzhou City, Zhejiang province 310000 Wensan Road No. 630, room 218

Applicant after: Hangzhou Yi Wang new science and technology Co., Ltd

Address before: 400803 Chongqing City Nantong District Wansheng town 801 Village No. 635 with No.

Applicant before: Ren Minghe

C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP01 Change in the name or title of a patent holder

Address after: Xihu District Hangzhou City, Zhejiang province 310000 Wensan Road No. 630, room 218

Patentee after: Zhejiang 1one Technology Co., Ltd.

Address before: Xihu District Hangzhou City, Zhejiang province 310000 Wensan Road No. 630, room 218

Patentee before: Hangzhou Yi Wang new science and technology Co., Ltd