CN103325042A - Tracing anti-fake market interaction integration system and method - Google Patents
Tracing anti-fake market interaction integration system and method Download PDFInfo
- Publication number
- CN103325042A CN103325042A CN2013101831277A CN201310183127A CN103325042A CN 103325042 A CN103325042 A CN 103325042A CN 2013101831277 A CN2013101831277 A CN 2013101831277A CN 201310183127 A CN201310183127 A CN 201310183127A CN 103325042 A CN103325042 A CN 103325042A
- Authority
- CN
- China
- Prior art keywords
- module
- code
- identification code
- authentication
- result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a tracing anti-fake market interaction integration system and method. The tracing anti-fake market interaction integration system and the tracing anti-fake market interaction integration method break through limitation on the cover degree of an existing tracing anti-fake system, achieve the purpose that one product is provided with one code, and put anti-fake into practice for every consumer. The anti-fake method that one product is provided with one code is adopted in the whole process of product delivery and sale. The method includes the steps of correspondence of identification codes to goods and correspondence of the identification codes to spraying in the process of anti-fake code generation and subsystem generation, then based on identification code scanning and network transmission, the most detailed anti-fake is achieved under the condition of little expenditure, and anti-fake and authentication effort for each product is guaranteed.
Description
Technical field
The invention belongs to the field of anti-counterfeit technology of tracing to the source, relate to the interactive integral system in a kind of market of tracing to the source false proof and method.
Background technology
In the anti-counterfeiting design of current commodity, each brand from outsourcing install to inner packing all drop into great amount of cost carry out false proof, such as high-pressure plastic, high-quality paper etc.It mainly is the false proof of commodity provider, and so-called " false proof " belongs to technical monopoly, is to use exclusive technology to produce or pack, and purpose is to get unique board of brand, avoids colleague and counterfeiter.And from the office that cracks down on counterfeit goods to right-safeguarding office, personnel's configuration, staff training, test pseudo-device research and development and produce to buy and all need significant cost, and during in the face of national market, hit counterfeit brand or malice and palm off market and face great difficulty.But when accomplishing " false proof ", the consumer can only passive receive.
And based on network anti-counterfeiting technology commonly used is code anti-fake in the current merchandise sales, namely utilizes the means of communication such as note, phone, network, carries out security code and differentiates by calling, send note or online input CDkey.On the one hand, can differentiate although hit the consumer, because operation is comparatively loaded down with trivial details, consumer's participation enthusiasm is generally not high.On the other hand, the code anti-fake technology is mainly undertaken false proof by high-tech printing, password and computerized speech, but the electric code antifalse system cost is lower, and technology is too ripe, has been copied in a large number or arranged now " fishing " website, " fishing " SMS platform and counterfeit.
In existing Comodity anti-fake system, can only reach sellers from the producer, its purpose is to prevent that fake products from coming into the market or prevent falsifying, secondary, poor being difficult to of third market Sales Supervisor's dynamics accomplish to trace to the source.Traceability system reaches sellers' one-way from the producer, and one-way limited to the consumer can not supervise the guiding market.Code, RFID, the NFC of normal operation higher cost trace to the source so the producer will realize tracing to the source, and its cost is high and need the configuration professional equipment.
Summary of the invention
The problem that the present invention solves is to provide the interactive integral system in a kind of market of tracing to the source false proof and method, can the producer, false proof the tracing to the source between the sellers, consumer, can be in the situation that do not use specific installation to accomplish two-way tracing to the source completely, allow consumer and producer's seamless link, but also can the meet the needs of the market supervision that realizes product and the collection of information.
The present invention is achieved through the following technical solutions:
The interactive integral system in a kind of market of tracing to the source false proof comprises that security code generates subsystem, client-end subsystem and server end subsystem;
Described security code generates subsystem, comprises anti-pseudo-order generation module, anti-counterfeiting identification code generation module, anti-counterfeiting identification code spray equipment and anti-dummy string sending module; Anti-pseudo-order generation module adopts the pattern of one yard one product, random generation or encryption generate the anti-dummy string corresponding with merchandise news, then will prevent that dummy string is sent to the anti-counterfeiting identification code generation module, will prevent that by anti-dummy string sending module the correspondence relationship information of dummy string and commodity is sent to the server end subsystem; The anti-counterfeiting identification code generation module generates and comprises the network address of appointment and the anti-pseudo-order of anti-dummy string, will prevent that again pseudo-order generates anti-counterfeiting identification code and sends to the anti-counterfeiting identification code spray equipment; The anti-counterfeiting identification code spray equipment is sprayed on anti-counterfeiting identification code on commodity or the commodity adjunct;
Described client-end subsystem comprises operation and display interface module, identification code scan module, identification code Decode engine and based on the data transmit-receive module of wireless network; Under the prompting or guide of operation and display interface module, the identification code scan module scans anti-counterfeiting identification code, by the identification code Decode engine scanning result is understood, obtain the corresponding anti-pseudo-order of identification code, and by sending anti-dummy string based on the data transmit-receive module of wireless network specified network address in the anti-counterfeiting identification code, receive for the server end subsystem and carry out fake certification; When client-end subsystem receives fake certification that the server end subsystem sends as a result behind the authentication code, to its identification and demonstration;
Described server end subsystem comprises servers' data transceiver module, false proof service module, anti-dummy string Decode engine, data backstage authentication module, as a result authentication code generation module, as a result authentication code memory module and Data Source address information acquisition module and data analysis module;
The servers' data transceiver module receives and is sent to the authentication module storage of data backstage with the information that security code generates the subsystem transmission; The servers' data transceiver module receives the information that client-end subsystem sends, and sends to data backstage authentication module by false proof service module; Data backstage authentication module is inquired about in authentication database according to anti-dummy string, and returns the fake certification result of these commodity by false proof service module; The authentication result that false proof service module receives is passed through as a result authentication code of as a result authentication code generation module generation, and then authentication code sends by the servers' data transceiver module as a result;
Data Source address information acquisition module obtains the IP address information that client-end subsystem information sends, and data analysis module extracts the IP address information that obtains, and its affiliated area is analyzed and sorted out;
As a result the authentication code memory module to the merchandise news that authenticates, first authenticated time, authentication number of times and as a result authentication code preserve.
Described identification code is two-dimension code; Corresponding module is false proof two-dimensional code generation module and two-dimension code spray equipment in the described security code generation subsystem;
Described client-end subsystem comprises operation and display interface module, two-dimension code scan module, two-dimension code Decode engine and based on the data transmit-receive module of wireless network;
Described server end subsystem comprises that servers' data transceiver module, false proof service module, encrypted code Decode engine, data backstage authentication module and result authenticate two-dimensional code generation module.
Described client-end subsystem is sent to anti-dummy string corresponding in the anti-counterfeit recognition two-dimension code network address of appointment by scanning anti-counterfeit recognition two-dimension code, and the anti-counterfeit recognition two-dimension code carries out anti-fake certificate at the server end subsystem.
Described client-end subsystem depends on mobile communication equipment or fixed communication apparatus, carry out the scanning of anti-counterfeiting identification code by the identification code scan module, the image that scans is sent to the identification code Decode engine identify, the recognition result of anti-counterfeit recognition two-dimension code utilizes wireless by data transmit-receive module or wireline communication network sends to the servers' data transceiver module.
Described server end subsystem also comprises merchandise news supply module and advertisement generation module, and the merchandise news supply module generates goods providers information, goods providers sign and merchandise news, the advertisement that the advertisement generation module generates; The information that generates and/or advertisement together send to client-end subsystem in company with authentication code as a result.
Described data analysis module is the quantity of genuine piece according to IP address information and commodity authentication, and genuine piece is sold the quantitative analysis data in the formation zone;
Described data analysis module is the quantity of false product according to IP address information and commodity authentication, and false product are sold the quantitative analysis data in the formation zone;
Data analysis module generates genuine piece or false product sale quantitative analysis data in unit interval, the zone also according to authenticated time, IP address information and merchandise news authentication result; When alarm value that false product sales volume surpass to be set, the data analysis module information that gives a warning.
The corresponding merchandise news of described anti-dummy string comprises: the brand of commodity, classification, date of manufacture, batch, the requisite quality situation, sell path, prize-winning information; Merchandise news and corresponding anti-dummy string thereof are sent in the authentication database of data backstage authentication module, and when receiving that client-end subsystem is sent anti-dummy string authentication request, merchandise news is together sent in company with authentication result;
On the identification code on commodity or the adjunct, also be coated with the opaque spacer material layer that easily scrapes off; Also be printed with the commodity distinguishing mark on this spacer material layer.
The interactive integrated recognition methods in a kind of market of tracing to the source false proof comprises following operation:
Generate the subsystem end at security code, anti-pseudo-order generation module adopts the pattern of one yard one product, the random generation or encryption generation anti-dummy string corresponding to merchandise news, then will prevent that dummy string is sent to the anti-counterfeiting identification code generation module, will prevent that by anti-dummy string sending module the correspondence relationship information of dummy string and commodity is sent to the server end subsystem; The anti-counterfeiting identification code generation module generates the anti-pseudo-order of the network address comprise appointment and random generation, will prevent that again dummy string generates anti-counterfeiting identification code and sends to the anti-counterfeiting identification code spray equipment; The anti-counterfeiting identification code spray equipment is sprayed on anti-counterfeiting identification code on commodity or the commodity adjunct;
At the client-end subsystem end, under the prompting or guide of operation and display interface module, the identification code scan module scans anti-counterfeiting identification code, by the identification code Decode engine scanning result is understood, obtain the corresponding anti-pseudo-order of identification code, and by sending anti-dummy string based on the data transmit-receive module of wireless network specified network address in the anti-counterfeiting identification code, receive for the server end subsystem; After client-end subsystem receives fake certification result that the server end subsystem sends and authenticates identification code, to its identification and demonstration;
At server end subsystem end, the servers' data transceiver module receives and is sent to the authentication module storage of data backstage with the information that security code generates the subsystem transmission; The servers' data transceiver module receives the information that client-end subsystem sends, and sends to data backstage authentication module by false proof service module; Data backstage authentication module is inquired about in database according to anti-dummy string, and returns these commodity by the result of fake certification by false proof service module; The authentication result that false proof service module receives generates as a result authentication code by authentication code generation module as a result, then authentication code is as a result sent by the servers' data transceiver module;
Data Source address information acquisition module obtains the IP address information that client-end subsystem information sends, and data analysis module extracts the IP address information that obtains, and its affiliated area is analyzed and sorted out;
The authentication code memory module is preserved the merchandise news that authenticates, first authenticated time, authentication number of times and first order result authentication code as a result.
Described identification code is two-dimension code, security code generates the anti-pseudo-order that subsystem is random according to merchandise news or the encryption generation is unique, anti-pseudo-order is the network address+anti-dummy string of appointment, will prevent that again pseudo-order generates two-dimension code, and two-dimension code is sprayed on commodity or the commodity adjunct;
Client-end subsystem depends on mobile communication equipment or fixed communication apparatus, carry out the scanning of anti-counterfeiting identification code by the identification code scan module, the identification code image that scans is sent to the identification code Decode engine identify, the recognition result of anti-counterfeit recognition two-dimension code utilizes wireless by data transmit-receive module or wireline communication network sends to the servers' data transceiver module;
To the two-dimension code recognition result that receives, the servers' data transceiver module utilizes the decrypted program of server end to be decrypted if it encrypts then, if it is random the generation, then is not decrypted; Then will prevent that dummy string sends to false proof service module;
False proof service module will be prevented dummy string input data backstage authentication module, data backstage authentication module is prevented the inquiry of dummy string in the database that security code generation subsystem is sent, if anti-dummy string is present in the database and not confirmed, then return these commodity by the result of fake certification to false proof service module, and the inquiry times to these commodity adds 1, if being present in the database and, merchandise news is identified, then return the result that these commodity belong to repeated authentication to false proof service module, if merchandise news is not present in the database, then return the result that these commodity are not identified to false proof service module, perhaps be identified as the result of false product;
Then the authentication result of false proof service module sends this two-dimension code by as a result two-dimensional code generation module generation of anti-fake certificate two-dimension code by the servers' data transceiver module, client-end subsystem can directly be collected evidence to the anti-fake certificate process.
Receive as a result local preservation the behind the two-dimension code of anti-fake certificate when client, perhaps the anti-fake certificate result is shared to the network platform and preserve;
The anti-fake certificate that is saved as a result two-dimension code can be transferred and be identified as unique result;
And when anti-counterfeiting identification code was scanned again, the server end subsystem was beamed back anti-fake certificate that authentication code memory module as a result stores as a result two-dimension code, first authenticated time.
Compared with prior art, the present invention has following useful technique effect:
Provided by the inventionly trace to the source the interactive integral system in market and method false proof, break through the coverage restriction of the existing Antiforge system of tracing to the source, accomplish a product one yard, implement to each consumer with false proof.In the whole flow process of dispatching from the factory, selling of commodity, adopt the false proof of a product one yard, corresponding, spraying corresponding that comprises identification code and commodity when security code generates subsystem and generates, then based on the scanning of identification code and the transmission of network, thereby in the situation that cost has not realized the false proof of refinement very much, guaranteed the anti-fake certificate dynamics of every product.
The interactive integral system in market of tracing to the source false proof provided by the invention and method, in the past identification code scanning difficulty, authentication difficulty have easily been solved, the problem that is difficult to collect evidence, adopt identification code (such as two-dimension code) as the carrier of anti-counterfeiting information, and adopt the setting of a product one yard, stopped as much as possible the chaotic defective of identification code authentication, and generation is easy, spraying is convenient, also meets the operation of current streamline; And when selling, the consumer can easily realize the scanning of identification code, and carries out the transmission of identification code and the reception of authentication result by network, both realize consumer's interaction, and allowed again the consumer establish information, obtained definite authentication information, right-safeguarding evidence long preservation is easy to demand; As long as and the server end subsystem can be realized deciphering and the comparison of identification code, also avoided in the past system complex, drop into huge defective; But also can release more information, such as the detailed information of commodity, advertisement etc.
The interactive integral system in market of tracing to the source false proof provided by the invention and method, can accomplish false proofly to be participated in by the consumer, overcome the defective of consumer's passive receive in the existing Antiforge system, can effectively guarantee effective rights and interests of consumer, can make the client merchant product be established the confidence of purchase simultaneously.And all be conducive to consumer's right-safeguarding in false proof middle consumer and the producer's interaction, the preservation of authentication information, and perhaps get rid of the improper demand for the producer, guaranteed the fairness in the right-safeguarding.
The interactive integral system in market of tracing to the source false proof provided by the invention and method, do not rely on that the specific installation brand is high-end to be covered to low-end product completely, do not need Special Training, all can false proofly trace to the source to the consumer from the producer to the supervision department, greatly degree reduces the anti-counterfeiting technology cost of tracing to the source.At utmost simplify procedures, break away from the problem that traditional code is traced to the source false proof difficulty operation, easily copied, easily goes fishing.Really accomplish with informationization trace to the source false proof (RFID technology/NFC technology), consumer and enterprise's seamless link (code is traced to the source false proof), that brand letter power is made (brand promotion/quality guarantee) is integrated.
Further, the interactive integral system in market of tracing to the source false proof provided by the invention and method (can be referred to as the IIMS system), can realize based on athe portable client (such as mobile phone), with the interactive integration product in the brand-new market of the Function Integration Mechanisms such as " product marketization popularization ", " user profile integration ", " Antiforge interactive recognition system ".
At first, the most popular mobile communication terminal of IIMS system utilization, mobile communications network by operator sends anti-counterfeit recognition information, sweeps code by the camera on the media such as client or computer, and the two-dimension code of spray printing in commodity or the commodity packaging is scanned discriminating.The consumer can pass through the easiest means when buying, obtain the most intuitively the false proof relevant information of product, realizes the true and false of commodity is differentiated.
Secondly, the feedback mechanism of IIMS system after the consumer confirms merchandise news, can by the preservation to the commodity counterfeit prevention authentication information, be effectively protected certified products buyer's rights and interests.
During this period, in the time of the authentication true and false, the consumer can also send platform by authentication code and receive corresponding product information, and can further increase the field feedback passage, thereby reach the interaction of user and enterprise's least cost, reach the effect of product, brand promotion and user data investigation when strengthening product safety.
The interactive integral system in market of tracing to the source false proof provided by the invention and method can adopt two-dimension code and mobile phone to realize, two-dimension code is general attractive in appearance, meets existing user's reading habit, adapts to era development; And mobile phone, ipad etc. do not need special introduction to use with all using in the communication facilities of camera, and easy to operate, consumer's compliance is strong; And can intuitively be connected to by mobile network and Internet and to specify network address (such as the official website), easy to use, can authenticate before the consumption, and can accurately receive the information such as product false proof, advertisement.
The interactive integral system in market of tracing to the source false proof provided by the invention and method, the false proof fake products that directly makes of consumer-terminal can not be sold, and fundamentally solves consumers and producers's trouble and worry.Can also follow the tracks of the sale of fake products, after the merchandise news of vacation is scanned, sends, identifies, just can originate to detect according to the address that its information sends by authentication, thereby realize tracing to the source of fake products.Especially can all carry out basis to the merchandise sales in the zone, determine the fake products source from larger scope, carry out the specific aim cleaning, discharge potential safety hazard.
The interactive integral system in market of tracing to the source false proof provided by the invention and method, can also carry out zone location by the address that client-end subsystem is sent information, and in conjunction with first hand commodity data, thereby for company manager provides the product Real-time Monitoring Data, greatly shorten the marketing data feedback time, obtained up-to-date market trends; And the providing of its data analysis, can realize the customized of goods providers, realize market product monitoring, the false proof interactive data Real-time Feedback of consumer etc.Can also control at the product of different model on the market a brand, new product market sale situation is adjusted marketing model immediately; In time adjust the proportioning of self production line, understand consumer taste and then develop new product
In sum, provided by the inventionly tracing to the source the interactive integral system in market and method false proof, is a kind of false proof, popularization, data integrated integration; Adopt interactively, enterprise and consumer's distance further; Market-oriented, carry out false proof, advertisement promotion, data acquisition on the other hand; False proof, business enterprise expand, Data Integration integral system have been saved social resources greatly.
Description of drawings
Fig. 1 is system principle schematic diagram of the present invention.
Fig. 2 is information transmit-receive schematic flow sheet of the present invention.
Fig. 3 is one of the present invention and uses pattern diagram.
Embodiment
The present invention is described in further detail below in conjunction with specific embodiment, and the explanation of the invention is not limited.
Referring to Fig. 1, a kind of Antiforge interactive recognition system based on identification code comprises security code generation system, client and server-side system;
Described security code generates subsystem, comprises anti-pseudo-order generation module, anti-counterfeiting identification code generation module, anti-counterfeiting identification code spray equipment and anti-dummy string sending module; Anti-pseudo-order generation module adopts the pattern of one yard one product, random generation or encryption generate the anti-dummy string corresponding with merchandise news, then will prevent that dummy string is sent to the anti-counterfeiting identification code generation module, will prevent that by anti-dummy string sending module the correspondence relationship information of dummy string and commodity is sent to the server end subsystem; The anti-counterfeiting identification code generation module generates and comprises the network address of appointment and the anti-pseudo-order of anti-dummy string, will prevent that again pseudo-order generates anti-counterfeiting identification code and sends to the anti-counterfeiting identification code spray equipment; The anti-counterfeiting identification code spray equipment is sprayed on anti-counterfeiting identification code on commodity or the commodity adjunct;
Described client-end subsystem comprises operation and display interface module, identification code scan module, identification code Decode engine and based on the data transmit-receive module of wireless network; Under the prompting or guide of operation and display interface module, the identification code scan module scans anti-counterfeiting identification code, by the identification code Decode engine scanning result is understood, obtain the corresponding anti-pseudo-order of identification code, and by sending anti-dummy string based on the data transmit-receive module of wireless network specified network address in the anti-counterfeiting identification code, receive for the server end subsystem and carry out fake certification; When client-end subsystem receives fake certification that the server end subsystem sends as a result behind the authentication code, to its identification and demonstration;
Described server end subsystem comprises servers' data transceiver module, false proof service module, anti-dummy string Decode engine, data backstage authentication module, as a result authentication code generation module, as a result authentication code memory module and Data Source address information acquisition module and data analysis module;
The servers' data transceiver module receives and is sent to the authentication module storage of data backstage with the information that security code generates the subsystem transmission; The servers' data transceiver module receives the information that client-end subsystem sends, and sends to data backstage authentication module by false proof service module; Data backstage authentication module is inquired about in authentication database according to anti-dummy string, and returns the fake certification result of these commodity by false proof service module; The authentication result that false proof service module receives is passed through as a result authentication code of as a result authentication code generation module generation, and then authentication code sends by the servers' data transceiver module as a result;
Data Source address information acquisition module obtains the IP address information that client-end subsystem information sends, and data analysis module extracts the IP address information that obtains, and its affiliated area is analyzed and sorted out;
As a result the authentication code memory module to the merchandise news that authenticates, first authenticated time, authentication number of times and as a result authentication code preserve.
Described identification code can be one dimension code (bar code), perhaps is two-dimension code.Lower mask body describes with two-dimension code.
If described identification code is two-dimension code; Then corresponding module is false proof two-dimensional code generation module and two-dimension code spray equipment in the described security code generation subsystem;
Described client-end subsystem comprises operation and display interface module, two-dimension code scan module, two-dimension code Decode engine and based on the data transmit-receive module of wireless network;
Described server end subsystem comprises that servers' data transceiver module, false proof service module, encrypted code Decode engine, data backstage authentication module and result authenticate two-dimensional code generation module.
Client-end subsystem is sent to anti-dummy string corresponding in the anti-counterfeit recognition two-dimension code network address of appointment by scanning anti-counterfeit recognition two-dimension code, and the anti-counterfeit recognition two-dimension code carries out anti-fake certificate at the server end subsystem.
Described client-end subsystem depends on mobile communication equipment or fixed communication apparatus, carry out the scanning of anti-counterfeiting identification code by the identification code scan module, the image that scans is sent to the identification code Decode engine identify, the recognition result of anti-counterfeit recognition two-dimension code utilizes wireless by data transmit-receive module or wireline communication network sends to the servers' data transceiver module.
Further, described server end subsystem also comprises merchandise news supply module and advertisement generation module, and the merchandise news supply module generates goods providers information, goods providers sign and merchandise news, the advertisement that the advertisement generation module generates; The information that generates and/or advertisement together send to client-end subsystem in company with authentication code as a result.
Described data analysis module is the quantity of genuine piece according to IP address information and commodity authentication, and genuine piece is sold the quantitative analysis data in the formation zone;
Described data analysis module is the quantity of false product according to IP address information and commodity authentication, and false product are sold the quantitative analysis data in the formation zone;
Data analysis module generates genuine piece or false product sale quantitative analysis data in unit interval, the zone also according to authenticated time, IP address information and merchandise news authentication result; When alarm value that false product sales volume surpass to be set, the data analysis module information that gives a warning.
And the anti-corresponding merchandise news of dummy string comprises: the brand of commodity, classification, date of manufacture, batch, the requisite quality situation, sell path, prize-winning information; Merchandise news and corresponding anti-dummy string thereof are sent in the authentication database of data backstage authentication module, and when receiving that client-end subsystem is sent anti-dummy string authentication request, merchandise news is together sent in company with authentication result;
On the identification code on commodity or the adjunct, also be coated with the opaque spacer material layer that easily scrapes off; Also be printed with the commodity distinguishing mark on this spacer material layer.
Referring to Fig. 2, for the merchandise news two-dimension code, client-end subsystem is by using the two-dimension code scan module (such as the camera of mobile phone) on the client that the merchandise news in commodity or the commodity packaging is scanned, the merchandise news image in 2 D code that scans is sent to the two-dimension code Decode engine identify, the recognition result of merchandise news image in 2 D code utilizes cordless communication network to send to the servers' data transceiver module by the mobile terminal data transmit-receive module; The servers' data transceiver module utilizes the decrypted program of server end subsystem to be decrypted (if adopt the random anti-dummy string that generates, then need not decipher) merchandise news two-dimension code recognition result, and sends to false proof service module; Merchandise news input data backstage authentication module after false proof service module will be deciphered, data backstage authentication module inquire about in database by anti-dummy string that (data that generated the subsystem transmission by security code are consisted of, comprise by its merchandise news that generates and corresponding anti-dummy string thereof), if merchandise news is present in the database and not confirmed, then return these commodity by the result of fake certification to false proof service module, and the inquiry times to these commodity adds 1, if being present in the database and, merchandise news is identified, then return the result that these commodity belong to repeated authentication to false proof service module, if merchandise news is not present in the database, then return result's (not belonging to all results of this brand) that these commodity are not identified to false proof service module.The authentication result of false proof service module will by anti-fake certificate as a result two-dimensional code generation module allow the user carry out selectivity with the form of two-dimension code image to preserve, and then the user can directly be collected evidence to the anti-fake certificate process.
Concrete, the radio communication between mobile phone terminal system and the server end can make GSM network, GSM, CDMA, WCDMA, CDMA2000, TD-SCDMA, WIFI, also can be the internet.
Be printed on and be coated with the opaque spacer material layer that easily scrapes off on the merchandise news two-dimension code in commodity or the commodity packaging.Can the printed goods distinguishing mark on the opaque spacer material layer, such as commodity LOGO etc.
Antiforge interactive recognition methods based on the identification code of said system comprises following operation:
Generate the subsystem end at security code, anti-pseudo-order generation module adopts the pattern of one yard one product, the random generation or encryption generation anti-dummy string corresponding to merchandise news, then will prevent that dummy string is sent to the anti-counterfeiting identification code generation module, will prevent that by anti-dummy string sending module the correspondence relationship information of dummy string and commodity is sent to the server end subsystem; The anti-counterfeiting identification code generation module generates the anti-pseudo-order of the network address comprise appointment and random generation, will prevent that again dummy string generates anti-counterfeiting identification code and sends to the anti-counterfeiting identification code spray equipment; The anti-counterfeiting identification code spray equipment is sprayed on anti-counterfeiting identification code on commodity or the commodity adjunct;
At the client-end subsystem end, under the prompting or guide of operation and display interface module, the identification code scan module scans anti-counterfeiting identification code, by the identification code Decode engine scanning result is understood, obtain the corresponding anti-pseudo-order of identification code, and by sending anti-dummy string based on the data transmit-receive module of wireless network specified network address in the anti-counterfeiting identification code, receive for the server end subsystem; After client-end subsystem receives fake certification result that the server end subsystem sends and authenticates identification code, to its identification and demonstration;
At server end subsystem end, the servers' data transceiver module receives and is sent to the authentication module storage of data backstage with the information that security code generates the subsystem transmission; The servers' data transceiver module receives the information that client-end subsystem sends, and sends to data backstage authentication module by false proof service module; Data backstage authentication module is inquired about in database according to anti-dummy string, and returns these commodity by the result of fake certification by false proof service module; The authentication result that false proof service module receives generates as a result authentication code by authentication code generation module as a result, then authentication code is as a result sent by the servers' data transceiver module;
Data Source address information acquisition module obtains the IP address information that client-end subsystem information sends, and data analysis module extracts the IP address information that obtains, and its affiliated area is analyzed and sorted out;
The authentication code memory module is preserved the merchandise news that authenticates, first authenticated time, authentication number of times and first order result authentication code as a result.
Concrete, client-end subsystem depends on mobile communication equipment or fixed communication apparatus, carry out the scanning of anti-counterfeiting identification code by the identification code scan module, the identification code image that scans is sent to the identification code Decode engine identify, the recognition result of anti-counterfeit recognition two-dimension code utilizes wireless by data transmit-receive module or wireline communication network sends to the servers' data transceiver module;
To the two-dimension code recognition result that receives, the servers' data transceiver module utilizes the decrypted program of server end to be decrypted if it encrypts then, if it is random the generation, then is not decrypted; Then will prevent that dummy string sends to false proof service module;
False proof service module will be prevented dummy string input data backstage authentication module, data backstage authentication module is prevented the inquiry of dummy string in the database that security code generation subsystem is sent, if anti-dummy string is present in the database and not confirmed, then return these commodity by the result of fake certification to false proof service module, and the inquiry times to these commodity adds 1, if being present in the database and, merchandise news is identified, then return the result that these commodity belong to repeated authentication to false proof service module, if merchandise news is not present in the database, then return the result that these commodity are not identified to false proof service module, perhaps be identified as the result of false product;
Then the authentication result of false proof service module sends this two-dimension code by as a result two-dimensional code generation module generation of anti-fake certificate two-dimension code by the servers' data transceiver module, client-end subsystem can directly be collected evidence to the anti-fake certificate process.
Receive as a result local preservation the behind the two-dimension code of anti-fake certificate when client, perhaps the anti-fake certificate result is shared to the network platform and preserve;
The anti-fake certificate that is saved as a result two-dimension code can be transferred and be identified as unique result;
And when anti-counterfeiting identification code was scanned again, the server end subsystem was beamed back anti-fake certificate that authentication code memory module as a result stores as a result two-dimension code, first authenticated time.
Referring to Fig. 3, the below provides a concrete use pattern diagram, adopt two-dimension code to make the anti-fake certificate code, security code generates subsystem (also namely among the figure antifalsification label generate and the product information input system) and adopts the pattern of a product one yard to generate antifalsification label, the terminal system (i.e. server among the figure) of simultaneously corresponding relation of antifalsification label and commodity being uploaded onto the server storage is so that scanning certification.
Client-end subsystem (i.e. user's fake certification terminal among the figure), the scanning antifalsification label carries out fake certification, in general be exactly to adopt mobile phone cam scanning, then the wireless network that passes through mobile phone is with authorization information and related data upload server, and server returns authorization information for consumer's identification, preservation.Can either accomplish like this false proof of the formula of tracing to the source (by server according to the authentication of tracing to the source of the pattern of a product one yard), and reached the once interactive of consumer and supplier, server can also provide more information in interactive process, such as the introduction of the detailed information of commodity, new product, the publicity of advertisement and possible propaganda activity; And the consumer can also be shared with more people by all kinds of social platforms (microblogging, little letter etc.), potential consumer group enclosed throw in the soft advertisement publicity, reaches widely supervision and publicity to product.
The opposing party as interaction, if corresponding a series of supervision or control information in the merchandise news corresponding with the anti-fake certificate code, also just be equivalent to commodity and be recorded sale when anti-counterfeiting identification code is scanned, on server, just can carry out gathering of corresponding information so, thereby form marketing data immediate feedback and data and gather the enterprise supervision platform, can in time react for the fake products public sentiment Real Time Monitoring of copying antifalsification label, market cracks down on selling spurious wares; Can also follow the tracks of the sale of fake products, after the merchandise news of vacation is scanned, sends, identifies, just can originate to detect according to the address that its information sends by authentication, thereby realize tracing to the source of fake products; Thereby can also obtain the market first-hand data, pay close attention to the multinomial data such as product flow such as production marketing data, user and carry out instant analysis, in aspect enterprise industrial chain optimal speed such as timely optimizing product lines, this can guide product production thereby make business administration.
More specifically, above-mentioned pattern also has following useful effect:
Claims (10)
1. the interactive integral system in the market of tracing to the source false proof is characterized in that, comprises that security code generates subsystem, client-end subsystem and server end subsystem;
Described security code generates subsystem, comprises anti-pseudo-order generation module, anti-counterfeiting identification code generation module, anti-counterfeiting identification code spray equipment and anti-dummy string sending module; Anti-pseudo-order generation module adopts the pattern of one yard one product, random generation or encryption generate the anti-dummy string corresponding with merchandise news, then will prevent that dummy string is sent to the anti-counterfeiting identification code generation module, will prevent that by anti-dummy string sending module the correspondence relationship information of dummy string and commodity is sent to the server end subsystem; The anti-counterfeiting identification code generation module generates and comprises the network address of appointment and the anti-pseudo-order of anti-dummy string, will prevent that again pseudo-order generates anti-counterfeiting identification code and sends to the anti-counterfeiting identification code spray equipment; The anti-counterfeiting identification code spray equipment is sprayed on anti-counterfeiting identification code on commodity or the commodity adjunct;
Described client-end subsystem comprises operation and display interface module, identification code scan module, identification code Decode engine and based on the data transmit-receive module of wireless network; Under the prompting or guide of operation and display interface module, the identification code scan module scans anti-counterfeiting identification code, by the identification code Decode engine scanning result is understood, obtain the corresponding anti-pseudo-order of identification code, and by sending anti-dummy string based on the data transmit-receive module of wireless network specified network address in the anti-counterfeiting identification code, receive for the server end subsystem and carry out fake certification; When client-end subsystem receives fake certification that the server end subsystem sends as a result behind the authentication code, to its identification and demonstration;
Described server end subsystem comprises servers' data transceiver module, false proof service module, anti-dummy string Decode engine, data backstage authentication module, as a result authentication code generation module, as a result authentication code memory module and Data Source address information acquisition module and data analysis module;
The servers' data transceiver module receives and is sent to the authentication module storage of data backstage with the information that security code generates the subsystem transmission; The servers' data transceiver module receives the information that client-end subsystem sends, and sends to data backstage authentication module by false proof service module; Data backstage authentication module is inquired about in authentication database according to anti-dummy string, and returns the fake certification result of these commodity by false proof service module; The authentication result that false proof service module receives is passed through as a result authentication code of as a result authentication code generation module generation, and then authentication code sends by the servers' data transceiver module as a result;
Data Source address information acquisition module obtains the IP address information that client-end subsystem information sends, and data analysis module extracts the IP address information that obtains, and its affiliated area is analyzed and sorted out;
As a result the authentication code memory module to the merchandise news that authenticates, first authenticated time, authentication number of times and as a result authentication code preserve.
2. the Antiforge interactive recognition system based on identification code as claimed in claim 1 is characterized in that, described identification code is two-dimension code;
Corresponding module is false proof two-dimensional code generation module and two-dimension code spray equipment in the described security code generation subsystem;
Described client-end subsystem comprises operation and display interface module, two-dimension code scan module, two-dimension code Decode engine and based on the data transmit-receive module of wireless network;
Described server end subsystem comprises that servers' data transceiver module, false proof service module, encrypted code Decode engine, data backstage authentication module and result authenticate two-dimensional code generation module.
3. the Antiforge interactive recognition system based on identification code as claimed in claim 2, it is characterized in that, described client-end subsystem is by scanning anti-counterfeit recognition two-dimension code, anti-dummy string corresponding in the anti-counterfeit recognition two-dimension code is sent to the network address of appointment, the anti-counterfeit recognition two-dimension code carries out anti-fake certificate at the server end subsystem.
4. the Antiforge interactive recognition system based on identification code as claimed in claim 1 or 2, it is characterized in that, described client-end subsystem depends on mobile communication equipment or fixed communication apparatus, carry out the scanning of anti-counterfeiting identification code by the identification code scan module, the image that scans is sent to the identification code Decode engine identify, the recognition result of anti-counterfeit recognition two-dimension code utilizes wireless by data transmit-receive module or wireline communication network sends to the servers' data transceiver module.
5. the Antiforge interactive recognition system based on identification code as claimed in claim 1 or 2, it is characterized in that, described server end subsystem also comprises merchandise news supply module and advertisement generation module, the merchandise news supply module generates goods providers information, goods providers sign and merchandise news, the advertisement that the advertisement generation module generates; The information that generates and/or advertisement together send to client-end subsystem in company with authentication code as a result.
6. the Antiforge interactive recognition system based on identification code as claimed in claim 1 or 2 is characterized in that, described data analysis module is the quantity of genuine piece according to IP address information and commodity authentication, and genuine piece is sold the quantitative analysis data in the formation zone;
Described data analysis module is the quantity of false product according to IP address information and commodity authentication, and false product are sold the quantitative analysis data in the formation zone;
Data analysis module generates genuine piece or false product sale quantitative analysis data in unit interval, the zone also according to authenticated time, IP address information and merchandise news authentication result; When alarm value that false product sales volume surpass to be set, the data analysis module information that gives a warning.
7. the Antiforge interactive recognition system based on identification code as claimed in claim 1 or 2, it is characterized in that, the corresponding merchandise news of described anti-dummy string comprises: the brand of commodity, classification, date of manufacture, batch, the requisite quality situation, sell path, prize-winning information; Merchandise news and corresponding anti-dummy string thereof are sent in the authentication database of data backstage authentication module, and when receiving that client-end subsystem is sent anti-dummy string authentication request, merchandise news is together sent in company with authentication result;
On the identification code on commodity or the adjunct, also be coated with the opaque spacer material layer that easily scrapes off; Also be printed with the commodity distinguishing mark on this spacer material layer.
8. the interactive integrated recognition methods in the market of tracing to the source false proof is characterized in that, comprises following operation:
Generate the subsystem end at security code, anti-pseudo-order generation module adopts the pattern of one yard one product, the random generation or encryption generation anti-dummy string corresponding to merchandise news, then will prevent that dummy string is sent to the anti-counterfeiting identification code generation module, will prevent that by anti-dummy string sending module the correspondence relationship information of dummy string and commodity is sent to the server end subsystem; The anti-counterfeiting identification code generation module generates the anti-pseudo-order of the network address comprise appointment and random generation, will prevent that again dummy string generates anti-counterfeiting identification code and sends to the anti-counterfeiting identification code spray equipment; The anti-counterfeiting identification code spray equipment is sprayed on anti-counterfeiting identification code on commodity or the commodity adjunct;
At the client-end subsystem end, under the prompting or guide of operation and display interface module, the identification code scan module scans anti-counterfeiting identification code, by the identification code Decode engine scanning result is understood, obtain the corresponding anti-pseudo-order of identification code, and by sending anti-dummy string based on the data transmit-receive module of wireless network specified network address in the anti-counterfeiting identification code, receive for the server end subsystem; After client-end subsystem receives fake certification result that the server end subsystem sends and authenticates identification code, to its identification and demonstration;
At server end subsystem end, the servers' data transceiver module receives and is sent to the authentication module storage of data backstage with the information that security code generates the subsystem transmission; The servers' data transceiver module receives the information that client-end subsystem sends, and sends to data backstage authentication module by false proof service module; Data backstage authentication module is inquired about in database according to anti-dummy string, and returns these commodity by the result of fake certification by false proof service module; The authentication result that false proof service module receives generates as a result authentication code by authentication code generation module as a result, then authentication code is as a result sent by the servers' data transceiver module;
Data Source address information acquisition module obtains the IP address information that client-end subsystem information sends, and data analysis module extracts the IP address information that obtains, and its affiliated area is analyzed and sorted out;
The authentication code memory module is preserved the merchandise news that authenticates, first authenticated time, authentication number of times and first order result authentication code as a result.
9. the interactive integrated recognition methods in market of tracing to the source false proof as claimed in claim 8, it is characterized in that, described identification code is two-dimension code, security code generates the anti-pseudo-order that subsystem is random according to merchandise news or the encryption generation is unique, anti-pseudo-order is the network address+anti-dummy string of appointment, to prevent that again pseudo-order generates two-dimension code, two-dimension code is sprayed on commodity or the commodity adjunct;
Client-end subsystem depends on mobile communication equipment or fixed communication apparatus, carry out the scanning of anti-counterfeiting identification code by the identification code scan module, the identification code image that scans is sent to the identification code Decode engine identify, the recognition result of anti-counterfeit recognition two-dimension code utilizes wireless by data transmit-receive module or wireline communication network sends to the servers' data transceiver module;
To the two-dimension code recognition result that receives, the servers' data transceiver module utilizes the decrypted program of server end to be decrypted if it encrypts then, if it is random the generation, then is not decrypted; Then will prevent that dummy string sends to false proof service module;
False proof service module will be prevented dummy string input data backstage authentication module, data backstage authentication module is prevented the inquiry of dummy string in the database that security code generation subsystem is sent, if anti-dummy string is present in the database and not confirmed, then return these commodity by the result of fake certification to false proof service module, and the inquiry times to these commodity adds 1, if being present in the database and, merchandise news is identified, then return the result that these commodity belong to repeated authentication to false proof service module, if merchandise news is not present in the database, then return the result that these commodity are not identified to false proof service module, perhaps be identified as the result of false product;
Then the authentication result of false proof service module sends this two-dimension code by as a result two-dimensional code generation module generation of anti-fake certificate two-dimension code by the servers' data transceiver module, client-end subsystem can directly be collected evidence to the anti-fake certificate process.
10. trace to the source as claimed in claim 8 or 9 the interactive integrated recognition methods in market false proof, it is characterized in that, receive as a result local preservation the behind the two-dimension code of anti-fake certificate when client, perhaps the anti-fake certificate result is shared to the network platform and preserve;
The anti-fake certificate that is saved as a result two-dimension code can be transferred and be identified as unique result;
And when anti-counterfeiting identification code was scanned again, the server end subsystem was beamed back anti-fake certificate that authentication code memory module as a result stores as a result two-dimension code, first authenticated time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310183127.7A CN103325042B (en) | 2013-05-17 | 2013-05-17 | A kind of false proof market interaction integration system and method for tracing to the source |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310183127.7A CN103325042B (en) | 2013-05-17 | 2013-05-17 | A kind of false proof market interaction integration system and method for tracing to the source |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103325042A true CN103325042A (en) | 2013-09-25 |
CN103325042B CN103325042B (en) | 2015-08-05 |
Family
ID=49193766
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310183127.7A Active CN103325042B (en) | 2013-05-17 | 2013-05-17 | A kind of false proof market interaction integration system and method for tracing to the source |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103325042B (en) |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103607283A (en) * | 2013-12-04 | 2014-02-26 | 王旭东 | Target authentication method based on mobile device and authentication center |
CN103955839A (en) * | 2014-05-13 | 2014-07-30 | 许发旺 | Anti-fake traceability system, method and platform based on RFID |
CN104050574A (en) * | 2014-06-18 | 2014-09-17 | 广州市婴曼怡贸易有限公司 | Anti-fake method and system |
CN104156862A (en) * | 2014-08-07 | 2014-11-19 | 四川途谷信息技术有限公司 | Wechat-platform-based two-dimensional code anti-fake and anti-channel conflict inquiry system and method |
CN104636931A (en) * | 2015-01-26 | 2015-05-20 | 川渝中烟工业有限责任公司 | Two-dimensional code production method for tobacco industry |
CN104691853A (en) * | 2014-06-24 | 2015-06-10 | 纷美(北京)贸易有限公司 | Product tracking online control system and control method on basis of information borne by food packaging materials |
CN104766124A (en) * | 2014-01-03 | 2015-07-08 | 航天信息股份有限公司 | Method and system for safety tracing of packaged foods |
WO2015101131A1 (en) * | 2013-12-31 | 2015-07-09 | Tencent Technology (Shenzhen) Company Limited | Product anti-counterfeiting method, apparatus and system |
CN104881787A (en) * | 2015-05-13 | 2015-09-02 | 景视佳传媒科技(北京)有限公司 | Method, system and device for two-dimension code authenticity |
CN105427112A (en) * | 2015-11-16 | 2016-03-23 | 内蒙古包钢钢联股份有限公司 | Encryption two-dimension code technology-based label anti-fake system and method thereof |
CN105761091A (en) * | 2016-03-09 | 2016-07-13 | 北京信用达互联网信息技术有限公司 | Red packet code two-stage two-dimensional code security coding method |
CN106204068A (en) * | 2016-07-07 | 2016-12-07 | 蔡晓妹 | The supervision Database Systems that a kind of commercial articles safety is reviewed |
CN106355416A (en) * | 2016-08-24 | 2017-01-25 | 长春大学 | Visual tracking system based on RFID and two-dimensional code technology |
CN106709738A (en) * | 2017-01-24 | 2017-05-24 | 江南大学 | Commodity anti-counterfeiting, tracing and supervising system |
CN107203846A (en) * | 2017-05-24 | 2017-09-26 | 广州中国科学院软件应用技术研究所 | A kind of food safety comprehensive evaluation system based on foodstuff traceability data pool |
CN107239813A (en) * | 2017-07-18 | 2017-10-10 | 北京众有科技有限公司 | The method and device being authenticated to information medium |
CN107944879A (en) * | 2017-10-28 | 2018-04-20 | 汪昌杰 | A kind of method of the symmetrical integrated forgery-preventing packaging of supply-demand information |
CN108334915A (en) * | 2018-01-12 | 2018-07-27 | 熵易科技有限公司 | A kind of anti-fake and encryption method, electronic equipment and storage medium based on Quick Response Code |
CN109472335A (en) * | 2018-09-21 | 2019-03-15 | 杨阳 | A kind of lottery ticket anti-counterfeiting system and method for anti-counterfeit |
CN109978566A (en) * | 2019-02-20 | 2019-07-05 | 广州中科易德科技有限公司 | A kind of end based on generated code is traced to the source information acquisition system and method |
CN111539502A (en) * | 2020-03-25 | 2020-08-14 | 中国平安财产保险股份有限公司 | Anti-counterfeiting two-dimensional code generation method and device, server and storage medium |
CN111639734A (en) * | 2020-05-21 | 2020-09-08 | 北京矩石科技有限公司 | Novel QR code embedded two-dimensional code coding and anti-counterfeiting application method |
CN112488729A (en) * | 2020-11-30 | 2021-03-12 | 上海中商网络股份有限公司 | Data verification method and device, computer equipment and readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101727637A (en) * | 2009-06-26 | 2010-06-09 | 广州宽度信息技术有限公司 | Anti-counterfeit recognition system for mobile phone two-dimensional code |
CN102254278A (en) * | 2011-07-01 | 2011-11-23 | 广州宽度信息技术有限公司 | Shopping quality maintenance system based on two-dimension code |
CN102609803A (en) * | 2011-01-11 | 2012-07-25 | 华南农业大学 | Two-dimension code based low-cost product safety tracking system and method thereof |
CN102831528A (en) * | 2012-08-12 | 2012-12-19 | 上海快捷包装制品有限公司 | Commodity anti-counterfeiting method and commodity anti-counterfeiting system |
-
2013
- 2013-05-17 CN CN201310183127.7A patent/CN103325042B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101727637A (en) * | 2009-06-26 | 2010-06-09 | 广州宽度信息技术有限公司 | Anti-counterfeit recognition system for mobile phone two-dimensional code |
CN102609803A (en) * | 2011-01-11 | 2012-07-25 | 华南农业大学 | Two-dimension code based low-cost product safety tracking system and method thereof |
CN102254278A (en) * | 2011-07-01 | 2011-11-23 | 广州宽度信息技术有限公司 | Shopping quality maintenance system based on two-dimension code |
CN102831528A (en) * | 2012-08-12 | 2012-12-19 | 上海快捷包装制品有限公司 | Commodity anti-counterfeiting method and commodity anti-counterfeiting system |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103607283A (en) * | 2013-12-04 | 2014-02-26 | 王旭东 | Target authentication method based on mobile device and authentication center |
WO2015101131A1 (en) * | 2013-12-31 | 2015-07-09 | Tencent Technology (Shenzhen) Company Limited | Product anti-counterfeiting method, apparatus and system |
CN104766124A (en) * | 2014-01-03 | 2015-07-08 | 航天信息股份有限公司 | Method and system for safety tracing of packaged foods |
CN103955839A (en) * | 2014-05-13 | 2014-07-30 | 许发旺 | Anti-fake traceability system, method and platform based on RFID |
CN104050574A (en) * | 2014-06-18 | 2014-09-17 | 广州市婴曼怡贸易有限公司 | Anti-fake method and system |
CN104050574B (en) * | 2014-06-18 | 2018-04-27 | 广州澳滋亚进出口贸易有限公司 | A kind of method for anti-counterfeit and its anti-counterfeiting system |
CN104691853A (en) * | 2014-06-24 | 2015-06-10 | 纷美(北京)贸易有限公司 | Product tracking online control system and control method on basis of information borne by food packaging materials |
CN104156862A (en) * | 2014-08-07 | 2014-11-19 | 四川途谷信息技术有限公司 | Wechat-platform-based two-dimensional code anti-fake and anti-channel conflict inquiry system and method |
CN104636931A (en) * | 2015-01-26 | 2015-05-20 | 川渝中烟工业有限责任公司 | Two-dimensional code production method for tobacco industry |
CN104881787A (en) * | 2015-05-13 | 2015-09-02 | 景视佳传媒科技(北京)有限公司 | Method, system and device for two-dimension code authenticity |
CN105427112A (en) * | 2015-11-16 | 2016-03-23 | 内蒙古包钢钢联股份有限公司 | Encryption two-dimension code technology-based label anti-fake system and method thereof |
CN105761091A (en) * | 2016-03-09 | 2016-07-13 | 北京信用达互联网信息技术有限公司 | Red packet code two-stage two-dimensional code security coding method |
CN106204068A (en) * | 2016-07-07 | 2016-12-07 | 蔡晓妹 | The supervision Database Systems that a kind of commercial articles safety is reviewed |
CN106355416A (en) * | 2016-08-24 | 2017-01-25 | 长春大学 | Visual tracking system based on RFID and two-dimensional code technology |
CN106709738A (en) * | 2017-01-24 | 2017-05-24 | 江南大学 | Commodity anti-counterfeiting, tracing and supervising system |
CN107203846A (en) * | 2017-05-24 | 2017-09-26 | 广州中国科学院软件应用技术研究所 | A kind of food safety comprehensive evaluation system based on foodstuff traceability data pool |
CN107239813A (en) * | 2017-07-18 | 2017-10-10 | 北京众有科技有限公司 | The method and device being authenticated to information medium |
CN107239813B (en) * | 2017-07-18 | 2020-07-14 | 北京创享合一管理咨询有限公司 | Method and device for authenticating information medium |
CN107944879A (en) * | 2017-10-28 | 2018-04-20 | 汪昌杰 | A kind of method of the symmetrical integrated forgery-preventing packaging of supply-demand information |
CN108334915A (en) * | 2018-01-12 | 2018-07-27 | 熵易科技有限公司 | A kind of anti-fake and encryption method, electronic equipment and storage medium based on Quick Response Code |
CN109472335A (en) * | 2018-09-21 | 2019-03-15 | 杨阳 | A kind of lottery ticket anti-counterfeiting system and method for anti-counterfeit |
CN109978566A (en) * | 2019-02-20 | 2019-07-05 | 广州中科易德科技有限公司 | A kind of end based on generated code is traced to the source information acquisition system and method |
CN111539502A (en) * | 2020-03-25 | 2020-08-14 | 中国平安财产保险股份有限公司 | Anti-counterfeiting two-dimensional code generation method and device, server and storage medium |
CN111639734A (en) * | 2020-05-21 | 2020-09-08 | 北京矩石科技有限公司 | Novel QR code embedded two-dimensional code coding and anti-counterfeiting application method |
CN111639734B (en) * | 2020-05-21 | 2023-05-16 | 北京矩石科技有限公司 | Novel two-dimensional code encoding and anti-counterfeiting application method embedded with QR code |
CN112488729A (en) * | 2020-11-30 | 2021-03-12 | 上海中商网络股份有限公司 | Data verification method and device, computer equipment and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN103325042B (en) | 2015-08-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103325042B (en) | A kind of false proof market interaction integration system and method for tracing to the source | |
CN101727637B (en) | Anti-counterfeit recognition system for mobile phone two-dimensional code | |
CN104495545B (en) | Electronic elevator maintenance supervision and management system and method for elevator maintenance based on dynamic two-dimensional codes | |
CN108009783B (en) | Online commodity ordering and production monitoring management system based on mobile APP | |
CN104834999B (en) | Commodity based on cloud, which are traced to the source and consumed, flows to statistical analysis technique and system | |
CN103246863A (en) | Identifying system and identifying method for interactive anti-counterfeiting based on identifying codes | |
CN106408173A (en) | Quality random inspection execution process supervision system | |
CN109598540A (en) | A kind of advertisement accurately method for pushing and advertisement accurately supplying system | |
CN107451820A (en) | On line, multiple, dynamic anti-fake under line, anti-channel conflict, can traceability system | |
CN105469132A (en) | Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method | |
CN105678369A (en) | Anti-counterfeiting-tag-based anti-counterfeiting method for commodity | |
CA3004488A1 (en) | Information processing network based on uniform code issuance, method therefor, and sensing access device | |
CN106485298A (en) | A kind of equipment routing inspection maintaining method based on Quick Response Code | |
CN106548352A (en) | A kind of commodity counterfeit prevention traceability system and its implementation | |
CN102314662B (en) | Authorized distributor monitoring method based on mobile RFID | |
CN103914779A (en) | Product anti-fake or traceability method and device | |
WO2014154142A1 (en) | System and method for mobile onsite article identification | |
CN103489086A (en) | Authority control system and method of logistics information | |
CN101520865A (en) | Anti-drug counterfeiting method using radio frequency electronic tag and public key infrastructure | |
CN106971311A (en) | A kind of false proof traceability system of logistics Means of Agricultural Production and method | |
CN107423986A (en) | The real-time commodity online trading system in internet | |
CN106327206A (en) | Genuine product certification means and system | |
CN103106562A (en) | Two-dimension code management control method and system | |
CN104574097A (en) | Anti-fake method for wine | |
CN102622624B (en) | A kind of commodity counterfeit prevention identification system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20151110 Address after: 710032 family hospital of The Fourth Military Medical University, 169 West Changle Road, Shaanxi, Xi'an Patentee after: Huang Mei Address before: 710032 family hospital of The Fourth Military Medical University, Shaanxi, Xi'an Patentee before: Bao Han |