CN103577996B - Online verification method and system - Google Patents

Online verification method and system Download PDF

Info

Publication number
CN103577996B
CN103577996B CN201210432502.2A CN201210432502A CN103577996B CN 103577996 B CN103577996 B CN 103577996B CN 201210432502 A CN201210432502 A CN 201210432502A CN 103577996 B CN103577996 B CN 103577996B
Authority
CN
China
Prior art keywords
server
sequence number
label
internet
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210432502.2A
Other languages
Chinese (zh)
Other versions
CN103577996A (en
Inventor
傅葛峰
颜圣燊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NANOMATRIX INTERNATIONAL Ltd
Original Assignee
NANOMATRIX INTERNATIONAL Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NANOMATRIX INTERNATIONAL Ltd filed Critical NANOMATRIX INTERNATIONAL Ltd
Priority to CN201210432502.2A priority Critical patent/CN103577996B/en
Publication of CN103577996A publication Critical patent/CN103577996A/en
Application granted granted Critical
Publication of CN103577996B publication Critical patent/CN103577996B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to online verification method and systems, are based especially on the online verification method and system of multiserver architecture.The multiserver architecture includes the interface server for handling user's request, the server for obtaining data read time and geographical location, preferably further includes the server for being specifically used to be stored with the database of unique sequences number.Wherein the unique sequences number are uniquely attributed to the article being verified, hence improve it is security verified and improve verification efficiency and promote to fake products, parallel trade, unauthorized production it is effective determine and positioning.

Description

Online verification method and system
Technical field
Present invention relates generally to online verification method and systems, more particularly to testing based on multiserver architecture Demonstrate,prove the online verification method and system of such as product, packaging, file and other items.
Background technique
There are many technologies to be used for authenticity verification at present.These technologies especially include the anti-counterfeiting characteristic using naked eyes identification Safety label and carry out online query by manually entering sequence number.But these prior arts are lacked there are following It falls into:
Firstly, ordinary consumer is very inconvenient using these technologies progress authenticity verification, this is because:
It 1. these technologies are excessively abstruse for ordinary consumer, distinguish it can not between actual products and fake products Difference;
2. the verifying equipment that these technologies need height to customize;
3. it is irksome for manually entering sequence number when carrying out online verification.
Secondly, these technologies can not provide tracking report below:
1. the sale locations of fake products;
2. time and the position of parallel trading.
The cost of third, these technologies is high, this is because:
1. ordinary consumer is typically reluctant to be actively engaged in verifying activity;
2. needing a large amount of professional inspector to guarantee the tight security of product supply chain;
3. the verifying equipment of custom-made can generate the expense of great number.
4th, due to focusing on various security level tasks, so that the infrastructure security of these technologies is poor.
Summary of the invention
This invention address that providing a kind of online verification method and system to overcome the drawbacks described above of the prior art.
It is related to a kind of method for online verification article according to the first aspect of the invention, this method includes following step It is rapid:
A) movement or non-mobile device read machine readable data that can be surfed the Internet, the machine-readable data quilt are utilized Setting is on the article;
B) user's checking request is sent to first server, user's checking request includes the machine-readable data, with Afterwards by the user's checking request be transmitted to second server, responded in first server the user's checking request come generate for The customization content of family viewing and/interaction, and the customization content sent back into the movement or non-mobile device immediately and The forwarding of above-mentioned user's request will not be interfered;
C) relevant information and short sequence number are retrieved from user's checking request on second server;
D) the true of the article is verified by searching original sequence number in the database for being set to second server Property, which corresponds to the short sequence number that is retrieved, wherein the original sequence number be uniquely assigned to it is described Article;
E) in the case where the short sequence number for finding with being retrieved corresponding original sequence number, the original sequence is searched Information belonging to row number;
F) survey report is generated on second server, which includes the relevant information and/or authenticity knot Fruit;
G) login of response management person and/or brand owners and from the second server to the administrator and/or Brand owners send the survey report.
It is related to a kind of method for online verification article according to the second aspect of the invention, this method includes following step It is rapid:
A) movement or non-mobile device read machine readable data that can be surfed the Internet, the machine-readable data quilt are utilized Setting is on the article;
B) user's checking request is sent to first server, user's checking request includes the machine-readable data, with Afterwards by the user's checking request be transmitted to second server, responded in first server the user's checking request come generate for The customization content of family viewing and/interaction, and the customization content sent back into the movement or non-mobile device immediately and The forwarding of above-mentioned user's request will not be interfered;
C) relevant information and short sequence number are retrieved from user's checking request on second server;
D) passing through the third server that virtual private cloud mechanism (VPC set-up) is isolated with the second server On, the authenticity of the article is verified by searching original sequence number in the database for being set to the third server, it should Original sequence number corresponds to the short sequence number being retrieved, wherein the original sequence number is uniquely assigned to the article;
E) on third server in the short sequence number that finds be retrieved corresponding original sequence number the case where Under, search information belonging to the original sequence number;
F) survey report is generated on second server, which includes the relevant information and/or authenticity knot Fruit;
G) login of response management person and/or brand owners and from the second server to the administrator and/or Brand owners send the survey report.
It is related to a kind of system for online verification article according to the third aspect of the invention we, which includes:
The movement that can be surfed the Internet or non-mobile device;
First server;
Second server;
Wherein
The movement that can be surfed the Internet or non-mobile device include:
It is used for the device of read machine readable data, which to be set on the article;
For user's checking request to be sent to the device of first server, user's checking request includes the machine can Read data;
First server includes:
For user's checking request to be transmitted to the device of second server,
Device, the device are used to respond user's checking request to generate in the customization of user's viewing and/interaction Hold, and the customization content is sent back into the movement or non-mobile device without interfering turning for above-mentioned user's request immediately Hair;
Second server includes:
For retrieving the device of relevant information and short sequence number from user's checking request;
For verifying the article by searching original sequence number in the database for being set to second server The device of authenticity, the original sequence number correspond to the short sequence number that is retrieved, wherein the original sequence number uniquely by Distribute to the article;
For it is original to search this in the case where the short sequence number for finding with being retrieved corresponding original sequence number The device of information belonging to sequence number;
For generating the device of survey report, which includes the relevant information and/or authenticity result;
It is used for the login of response management person and/or brand owners and is sent out to the administrator and/or brand owners Send the device of survey report.
It is related to a kind of system for online verification article according to the fourth aspect of the invention, which includes:
The movement that can be surfed the Internet or non-mobile device;
First server;
Second server;
Pass through the third server that virtual private cloud mechanism (VPC set-up) is isolated with the second server;
Wherein
The movement that can be surfed the Internet or non-mobile device include:
It is used for the device of read machine readable data, which to be set on the article;
For user's checking request to be sent to the device of first server, user's checking request includes the machine can Read data;
First server includes:
For user's checking request to be transmitted to the device of second server,
Device, the device are used to respond user's checking request to generate in the customization of user's viewing and/interaction Hold, and the customization content is sent back into the movement or non-mobile device without interfering turning for above-mentioned user's request immediately Hair;
Second server includes:
For retrieving the device of relevant information and short sequence number from user's checking request;
For generating the device of survey report, which includes the relevant information and/or authenticity result;
It is used for the login of response management person and/or brand owners and is sent out to the administrator and/or brand owners Send the device of survey report;
Third server includes:
For verifying the article by searching original sequence number in the database for being set to the third server Authenticity device, which corresponds to the short sequence number that is retrieved, wherein the original sequence number is uniquely It is assigned to the article;
For it is original to search this in the case where the short sequence number for finding with being retrieved corresponding original sequence number The device of information belonging to sequence number.
In a preferred embodiment of the invention, the first server includes multiple child servers, this little clothes Business device is respectively configured to be requested to provide a user or do not provide a user feedback information according to the user's checking.
In a preferred embodiment of the invention, the machine-readable data includes one-dimensional bar code and/or two dimension The short sequence number of bar code and/or RFID label tag form, the short sequence number by using Encryption Algorithm (such as: according to data Encryption standard that is: the Encryption Algorithm of DES either according to Advanced Encryption Standard that is: the Encryption Algorithm of AES) will be described original Serial number encryption become encryption sequence number, then by using shorten algorithm (such as run length coding that is: RLE, Kolmogorov compression, Lempel-Ziv-Welch lossless data compression algorithms) or application bijective function and should The sequence number of encryption is compressed to obtain, and the relevant information is in relation to the movement that can be surfed the Internet or non-mobile device The information of data read time and geographical location, according to whether having found the original series for corresponding to the short sequence number being retrieved Number, the authenticity result shows whether the article being verified is personation, and if it find that the original sequence number is in Except specified region, then the authenticity result shows that there are parallel tradings.Bijective function is that one kind can provide Each set element of the function of the set element perfect match of two set, one of set accurately collects with another The set element pairing closed, and each element of this another set accurately with one in above-mentioned first set (further content may refer to for element pairinghttp://en.wikipedia.org/wiki/Bijection).
In a preferred embodiment of the invention, the one-dimensional bar code and/or two-dimensional bar can be by images Acquiring unit (all scanners in this way or digital camera) is read, and the RFID label tag can be by preferably operating on high frequency (HF) it or works in the RFID reader of hyperfrequency (UHF) and reads, wherein described image acquiring unit and/or RFID reader It is arranged at the movement that can be surfed the Internet or non-mobile device.
In a preferred embodiment of the invention, the short sequence number can be decompressed and then be decrypted into use Come the original sequence number verified.
In a preferred embodiment of the invention, the article is: such as: clothes, consumer electronics product, electricity The product of pond, mobile phone, wallet, knapsack, wrist-watch, drug, sunglasses, footwear, tobacco etc.;By paper, carton (carton), modeling It is packed made of material, blister package (blisterpack), glass, metal, wood materials etc.;Such as: certificate, window paste (window Sticker), visa patch (visa sticker), identity card, token (voucher), safety label (security tag), Operation instruction label (hangtag), RFID label tag, textile label for clothing (woven label), general printed label (generic Printed label), the file of stamp (tax stamp) etc..
In a preferred embodiment of the invention, the movement that can be surfed the Internet or non-mobile device be can benefit Such as with the following equipment of telecommunication technology (such as 3G telecommunication technology, 4G telecommunication technology) access internet: smart phone, above-knee Type computer, palmtop computer, laptop, desktop computer.
In a preferred embodiment of the invention, it can use following technology to determine the movement that can be surfed the Internet Or the geographical location of non-mobile device: IP address is determined by the multilateration (Mutilateration) of base station, the whole world Position system (GPS).
In a preferred embodiment of the invention, the first server, second server, third server be respectively Be respectively by such as MD5 Message-Digest algorithm, secure hash algorithm (SHA:Secure Hash Algorithm), The Cloud Server of the safe encryption method protection of perfect privacy (PGP:Pretty Good Privacy) etc. is (such as Rackspace Cloud Server, GeGrid Cloud Server, Amazon Cloud Server).
In a preferred embodiment of the invention, on the article, especially in the peace for being attached to the article The machine-readable data and at least three kinds of security features are provided on full label.At least three kinds of security features are such as: Safety turns round rope decorative pattern (security guilloche), wechat (microletter), microfilm of characters (nanotext), watermark (water mark), hologram (hologram), fiber (fiber), watermark (planchette), ink (ink) etc. are shown Property security feature;Such as: hologram, fiber, watermark, ink, ultraviolet marking, infrared markers, the miniature label of safety The recessive security feature of (security taggant) etc.;Such as: there is the optics of evidence obtaining feature (forensic feature) The miniature label of active ceramic (optical active ceramic taggant), biochemical miniature label (bio-chemical Taggant) the evidence obtaining security feature of (these miniature labels respond single composition or double composition verification methods) etc.;It is all Such as: the tamper-evident feature (tamper evident feature) in the label substrate of breach or frangible substrate.
Detailed description of the invention
Fig. 1 shows illustrative safety label according to the present invention.
Fig. 2 a shows the exemplary safety label with dominant character according to the present invention.
Fig. 2 b shows the exemplary safety label with recessive character according to the present invention.
Fig. 3 is the block diagram for representing user terminal and two server architecture according to the present invention.
Fig. 4 is the block diagram for representing user terminal and three server architecture according to the present invention.
Fig. 5 is the flow chart for the online verification method implemented in two server architecture according to the present invention.
Fig. 6 is the flow chart for the online verification method implemented in three server architecture according to the present invention.
Specific embodiment
In order to be expressly understood and easily and effectively implement the present invention, below in reference to attached drawing exemplarily to of the invention Preferred embodiment is illustrated.It adopts in all the appended drawings and identical component is designated by like reference numerals.
Fig. 1 shows illustrative safety label according to the present invention.The safety label is preferably provided or attached It is added on the article for needing to carry out anti-fake protection.These articles may, for example, be: clothes, consumer electronics product, battery, movement The product of phone, wallet, knapsack, wrist-watch, drug, sunglasses, footwear, tobacco etc.;By paper, carton, plastics, blister package, glass It is packed made of glass, metal, wood materials etc.;Such as: certificate, visa patch, identity card, token, safety label, makes window patch With the file of care label, RFID label tag, textile label for clothing, general printed label, stamp etc..
Schematically illustrate in Fig. 1: hologram item 11, embossment with dominant character and stealth characteristics are schemed safely Shape 12, miniature stealth characteristics 13, safety torsion rope decorative pattern figure 14, two-dimensional bar 15, evidence obtaining security feature 16, stealth are ultraviolet glimmering Optical coating (Covert UV-florescent paint) 17, web page address 18, short sequence number 19, each angle breach 100().Its Middle short sequence number 19 is to print the short sequence number of digital form, and two-dimensional bar 15(is such as: QR-code, PDF 417, Aztec code, Data MatriX, SPARQCODE, Semacode, High Capacity Color Barcode, or Any other kind of suitable two-dimensional bars of person) in contain the information of the short sequence number.The short sequence number can be by One unique original sequence number export.The heart has been uniquely attributed to be criticized the unique original sequence number in the verification Product, packaging, file of hair etc. are so as to judge that the product, packaging, file are true or palm off or have exceeded Exclusive region.Preferably, this original sequence number by using Encryption Algorithm (such as: according to DES Cipher encryption calculate Method is either according to the Encryption Algorithm of Advanced Encryption Standard AES) original sequence number encryption is become to the sequence number of encryption, with Prevent personator from replicating.Then by using shorten algorithm (such as run length coding that is: RLE, Kolmogorov compression, Lempel-Ziv-Welch lossless data compression algorithms) or apply bijective function and compress the sequence number of the encryption At short sequence number, to further increase the difficulty of reproduction of personator, and it is being set to equipment (such as the intelligence electricity that can be surfed the Internet Words) low-resolution camera obtain two-dimensional bar form short sequence number have any problem in the case where, client can be easily Manually type in the sequence number.Based on above-mentioned " encryption+compression " method, personator at all can not be according to the short sequence of print form It number derives original sequence number or regenerates and the identical one group of short sequence of short sequence number used in client's project Number.
In fact, this short sequence number of the invention is arranged in such as packaging, product, the file confined space in which can be convenient It is interior.In addition, the short sequence number or mobile phone of two-dimensional bar form can not be read in barcode scanner application program Low-resolution camera is manually entered when can not obtain the short sequence number of two-dimensional bar form convenient for client.
The short sequence number that ciphering sequence number can not be replicated for generating personator is very important.Generating short sequence After the sequence of row number, if the database corruption of short sequence number, it may require that and short sequence is regenerated by the ciphering sequence number Number sequence.Therefore, for security reasons, ciphering sequence number is stored in the server of separation preferably as backup or storage is situated between In matter.
For the sake of clarity, Fig. 2 a, Fig. 2 b respectively illustrate the safety label with dominant character and have recessive character Safety label.Safety label shown by Fig. 2 a are as follows: hologram 21(embossing), it is sequence number 22, miniature text 23, machine readable Code 24, safety turn round rope decorative pattern 25, breach 26.Safety label shown by Fig. 2 b are as follows: invisible Ultraluminescence Yellow ink 27, life Change label 28(to collect evidence feature), the infrared miniature label 29(of multiple features is recessive and evidence obtaining feature), tamper-evident feature 210.
In addition, it is proposed that safety label is designed to be extremely hard to replicate or imitate so that can not surf the Internet The evidence that can be used for prosecuting personator or parallel trading person still safely can be verified or be provided in area.For reality Existing above-mentioned technical effect can be chosen at least from dominant character listed by demonstration in table 1, recessive character, evidence obtaining feature 10 kinds of features are arranged on safety label.
The security feature on safety label of the invention can be set in table 1.
One embodiment (two server architecture) of online verification system according to the present invention is illustrated in general in Fig. 3 Main component, such as: user terminal 4, processing user request server 1, server 2, server 2 for implement verifying simultaneously It is used to store comprising for the original sequence number of verifying, ciphering sequence number, the database of short sequence number, administrator's (or brand Owner) equipment 5.User terminal 4 is preferably the smart phone for having camera, which can pass through 3G network The access of the telecommunication links such as (such as CDMA 2000, UMTS, EDGE) or 4G network (such as Wimax2, LTE-Advance) Internet.Manager device 5 can be an interface equipment (such as interface computer) and be used to receive verifying report or will test Card report is shown to for example authorized brand-owner.The brand-owner be allowed through login check with sequence number and Be verified the relevant data of product, such as: date of issuance of original sequence number, production site (original sequence number sends destination, Such as the manufacturer positioned at Shenzhen to secure permission).
Preferably, server 1 and server 2 based on Amazon computer cloud (Amazon EC2, referring tohttp:// aws.amazon.com/ec2/) platform on realize.The platform provides selection different instances (instance) number of types Flexibility is to meet the calculating requirement of each server.Each example provides predictable dedicated computing capacity and according to example Hourly.
Specifically, server 1 is used as interface computer, request and generate to see for user for handling the user of arrival User's request is transmitted to the server 2 verified without interfering user's at the same time by the customization content seen/interacted Interaction.
Optionally, server 1 can be the low capacity server for being enough to handle user's request.It is exemplarily arranged in table 2 The typical technical indicator of server 1 is gone out.
The technical indicator of 2. server 1 of table
Optionally, server 2 is designed to safely handle a large amount of operations in a short time.It is exemplarily arranged in table 3 The typical technical indicator of server 2 is gone out.
The technical indicator of 3. server 2 of table
Server 1 and server 2 are calculated preferably by such as MD5 Message-Digest algorithm, secure hash between each other Method (such as SHA-0, SHA-1, SHA-2), perfect privacy (PGP) algorithm are communicated to improve the safety of server architecture Property.
Preferably, in the present embodiment, the safety of server architecture can be by being implemented as AMS for server 2 RDS (Amazon Relation Database Service) server and further improved.AMS RDS is by sub- horse The distributed relational database business that inferior company (Amazon.com) provides.The business is operate in " cloud " and provides a user Relational database used in its application program.AMS RDS is established, is run Relational database with making it easy to.Automatically it manages all Such as: repairing data library software, backup database, activationary time recovery point complexity management process (reference can be made tohttp:// en.wikipedia.org/wiki/Amazon_Relational_Database_Service).In addition, being stored in server 2 On database safety by by server 2 and server 1 with virtual private cloud mechanism (VPC set-up) is isolated and It is further improved.The support of the VPC functionality preferably by MySQL database engine.
Alternatively, can select other suitable Cloud Servers, such as Rackspace Cloud Server and Geodrid Cloud Server is as server 1 and server 2.
Referring now to Fig. 5, the figure shows the online verification methods implemented in two server architecture shown in Fig. 3 Exemplary flow chart.Specifically, the client in such as point of sale can be used its smart phone and scan its purchase product safety QR-Code or key entry short sequence number and one user of transmission on label are requested to watch any interested content or have Close the content (such as amusement and related content) of its customization for buying product.Server 1 requests to generate customization according to the user The content of change and the smart phone that the content is sent back to client.At the same time, user's request of arrival is transmitted to from server 1 Server 2.The data read time/or ground of the smart phone of the client in relation to sending user request are obtained at server 2 Institute in the QR code that smart phone is scanned simultaneously is retrieved from the user of forwarding request by the corresponding functional module of server 2 in reason position The short sequence number perhaps manually typed in that includes or optionally any other information in relation to the smart phone, such as equipment Type, explorer type, language setting etc..The content of the customization can be for example: related specific subject disappears Breath, popular cartoon figure, information of discount etc..
Preferably, the geographical location for sending the smart phone of the client of user request is determined using following technological means: logical Cross the multilateration (such as 3 dependent surveillances: trilateration, precision are ± 500 meters) of base station, GPS or The technology of GPS auxiliary (precision is ± 10 meters).In addition, as an alternative, the case where desktop computer sends user's request Under, it can use the geographical location that IP address determines client terminal (precision is ± 100 kilometers).
In addition, by server 2 the corresponding function module by the short sequence number retrieved decompression contract then be decrypted into it is original Sequence number.The authentication function module of server 2 is verified by searching original sequence number in the database for being set to server 2 The authenticity of the article, wherein if finding original series identical with the original sequence number being decrypted in the database Number, then it is assumed that bought product has the original serial number for being uniquely assigned to it, thus is true product.
Above-mentioned verification result be can use to export following characterization information:
A. if in the database not with from user request in the identical original sequence number of acquired original sequence number, Then bought product is personation;
B. if there is the original sequence number obtained from user's request in database, but (do not have in unactivated state Have from the confirmation for receiving the sequence number for being licensed manufacturer), then the sequence number is stolen in transmission process;
C. if the sequence number is scanned outside specified region, there are parallel trades;
D. if identical sequence number is scanned repeatedly in same place or different location, there is personation.
According to above-mentioned characterization information, a survey report is generated by the corresponding functional module of server 2.
Finally, administrator or brand owner can check the survey report by login in detail or interrupt true Property verify and the report classified according to various criterion.
Another embodiment (three server architecture knot of online verification system according to the present invention are illustrated in general in Fig. 4 Structure) main component.The difference of the embodiment and embodiment illustrated in fig. 3, which is only that, also possesses server 3.In this embodiment Server 3 is specifically used to store the database comprising the original sequence number for verifying.In addition, with two server shown in Fig. 3 The safety that architecture is compared to improve entire server architecture, without direct between server 3 and server 1 Communication, and the safety for the database being stored on server 3 by by server 3 and server 2 with virtual private cloud machine Structure (VPC set-up) is isolated and is further improved.The branch of the VPC functionality preferably by MySQL database engine It holds.Server technology index listed by table 3 is equally applicable to the server 2 in server 3 and the present embodiment, and takes listed by table 1 The business equally applicable server 1 in this present embodiment of device technical indicator.It can also be used between server 2 and server 3 all As MD5 Message-Digest algorithm, secure hash algorithm (such as SHA-0, SHA-1, SHA-2), perfect privacy (PGP) are calculated Method is protected to further increase the safety of server architecture.Server 3 also may be implemented as AMS RDS (Amazon Relation Database Service) server.
Referring now to Fig. 6, the figure shows implement online verification of the invention in three server architecture shown in Fig. 4 The exemplary flow chart of method.The difference of flow chart shown in Fig. 6 and flow chart shown in Fig. 5 is to search original sequence number to verify The step of authenticity of the article and the step of searching the original sequence number affiliated information, carry out in server 3, and It is not as shown in Figure 5 to be carried out in server 2.Obvious Fig. 4, Fig. 6 disclosed embodiment and Fig. 3, Fig. 5 disclosed embodiment phase Than with higher safety and higher verification efficiency.
By originally using multiserver architecture of the invention, and combine the safety post of special designing of the present invention Label and sequence number (original sequence number, ciphering sequence number, short sequence number) (are produced with the article that the sequence number has been uniquely assigned Product, packaging, file) between unique relationship, on the one hand due between each server security protection and parallel processing greatly It improves security verified and improves verification efficiency;And still further aspect has been greatly promoted due to the automatic participation of customer Effect is determined to be acquired with the data of positioning fake products, parallel trade, unauthorized production.
It should be noted that: it will be apparent to practitioners skilled in the art any to defined herein The modifications and changes of preferred embodiment belong to content of this disclosure range.For example, can according to system requirements, performance requirement, And other requirements are arranged and exchange to each configuration unit according to a known manner.

Claims (40)

1. a kind of method for online verification article, method includes the following steps:
A) it is set using the movement or non-mobile device read machine readable data, the machine-readable data that can surf the Internet In article;
B) user's checking request is sent to first server, user's checking request includes the machine-readable data read, with Afterwards by the user's checking request be transmitted to second server, responded in first server the user's checking request come generate for The customization content of family viewing and/interaction, and the customization content is sent back into the movement that can be surfed the Internet or non-immediately Forwarding of the mobile device without interfering above-mentioned user's checking request;
C) relevant information and short sequence number are retrieved from user's checking request on second server;
D) the true of the article is verified by searching original sequence number in the database being set in second server Property, which corresponds to the short sequence number that is retrieved, wherein the original sequence number be uniquely assigned to it is described Article;
E) in the case where the short sequence number for finding with being retrieved corresponding original sequence number, it is original that search distributes to this The information of sequence number;
F) survey report is generated on second server, which includes the relevant information and/or authenticity result;
G) login of response management person and/or brand owners and from the second server to the administrator and/or brand Holder sends the survey report with for checking,
The machine-readable data includes the short sequence number of one-dimensional bar code and/or two-dimensional bar and/or RFID label tag form, The short sequence number by using Encryption Algorithm by the original sequence number encryption become encryption sequence number, then by using Shorten algorithm or application bijective function and compresses the sequence number of the encryption to obtain.
2. according to the method described in claim 1,
It is characterized in that,
The database is not arranged in the second server but is arranged and is passing through virtual private with the second server In the third server that cloud mechanism that is, VPC set-up are isolated, and
Implement the step d) and step e) on the third server rather than on the second server.
3. according to claim 1 or claim 2,
It is characterized in that,
The first server includes multiple child servers, these child servers are respectively configured to the request according to the user Provide a user or do not provide a user feedback information.
4. according to claim 1 or claim 2,
It is characterized in that,
The relevant information is data read time and/or geographical position in relation to the movement that can be surfed the Internet or non-mobile device The information set,
According to whether having found the original sequence number for corresponding to the short sequence number being retrieved, the authenticity result shows to be tested Whether the article of card is personation, and
If it find that the original sequence number is in except specified region, then the authenticity result shows that there are parallel trades Easily.
5. according to the method described in claim 4,
It is characterized in that,
The Encryption Algorithm is the Encryption Algorithm according to data encryption standards that is, DES, or according to Advanced Encryption Standard, That is, the Encryption Algorithm of AES, and
The shortening algorithm is one of following algorithm: run length coding that is, RLE, Kolmogorov compression, Lempel- Ziv-Welch lossless data compression algorithms.
6. according to the method described in claim 4,
It is characterized in that,
The one-dimensional bar code and/or the two-dimensional bar can be read by image acquisition unit, and the RFID label tag energy Enough to be read by RFID reader, wherein described image acquiring unit and/or RFID reader are arranged at the shifting that can be surfed the Internet In dynamic or non-mobile device.
7. according to the method described in claim 6,
It is characterized in that,
Described image acquiring unit is scanner or digital camera;And
The RFID reader works in high frequency that is, HF, or works in hyperfrequency that is, UHF.
8. according to the method described in claim 4,
It is characterized in that,
The short sequence number can be decompressed and then be decrypted into the original sequence number that be used for verifying.
9. according to claim 1 or claim 2,
It is characterized in that,
The article is product and/or packaging and/or file.
10. according to the method described in claim 9,
It is characterized in that,
The product is the one or more in items set forth below:
Clothes, consumer electronics product, battery, mobile phone, wallet, knapsack, wrist-watch, drug, sunglasses, footwear and tobacco;
The packaging is made of following one or more:
Paper, carton, plastics, blister package, glass, metal and wood materials;And
The file is following one or more:
Certificate, window label, visa pastes, identity card, token, safety label, operation instruction, RFID label tag, textile label for clothing, lead to With printed label and stamp.
11. according to claim 1 or claim 2,
It is characterized in that,
The movement that can be surfed the Internet or non-mobile device can access internet using telecommunication technology.
12. according to claim 1 or claim 2,
It is characterized in that,
The mobile device that can be surfed the Internet is one of following equipment: smart phone, laptop computer, palmtop computer, notes This computer;And
The non-mobile device that can be surfed the Internet is desktop computer.
13. according to the method described in claim 4,
It is characterized in that,
The geographical location of the movement or non-mobile device that can be surfed the Internet: IP address is determined using one of the following terms, By the multilateration that is, Mutilateration of base station, global positioning system that is, GPS.
14. according to the method described in claim 1,
It is characterized in that,
The first server and second server are the Cloud Servers protected by safe encryption method.
15. according to the method described in claim 2,
It is characterized in that,
The third server is the Cloud Server protected by safe encryption method.
16. method described in 4 or 15 according to claim 1,
It is characterized in that,
The Cloud Server is one of following server:
Rackspace Cloud Server, GeGrid Cloud Server, Amazon Cloud Server;And
The safe encryption method is one of the following terms:
MD5 Message-Digest algorithm, secure hash algorithm that is, SHA, perfect privacy that is, PGP.
17. according to claim 1 or claim 2,
It is characterized in that,
The machine-readable data and at least three kinds of security features are provided on the safety label for being attached to the article.
18. according to the method for claim 17,
It is characterized in that,
At least three kinds of security features are selected from: overt security features, recessive security feature, evidence obtaining security feature and the mark Tamper-evident feature in the substrate of label.
19. according to the method for claim 18,
It is characterized in that,
The overt security features are selected from: safety turn round rope decorative pattern, wechat, microfilm of characters, watermark, hologram, fiber, watermark, And ink;
The recessiveness security feature is selected from: hologram, fiber, watermark, ink, ultraviolet marking, infrared markers and safety are miniature Label;
The evidence obtaining security feature is selected from: there is the miniature label of optical activity ceramics or biochemical miniature label of evidence obtaining feature, this A little miniature labels respond single composition or double composition verification methods;And
Tamper-evident feature in the substrate of the label is breach or frangible substrate.
20. according to claim 1 or claim 2,
It is characterized in that,
The content that customizes can be displayed on the display of the movement or non-mobile device that can be surfed the Internet.
21. a kind of system for online verification article, the system include:
The movement that can be surfed the Internet or non-mobile device;
First server;
Second server;
Wherein
The movement that can be surfed the Internet or non-mobile device include:
It is used for the device of read machine readable data, which to be arranged in the article;
For user's checking request to be sent to the device of first server, user's checking request includes the machine read can Read data;
First server includes:
For user's checking request to be transmitted to the device of second server,
Device, the device are used to respond user's checking request to generate the customization content for user's viewing and/interaction, and The customization content is sent back into the movement that can be surfed the Internet or non-mobile device without interfering above-mentioned user's checking immediately The forwarding of request;
Second server includes:
For the device of relevant information and short sequence number to be retrieved from user's checking request on second server;
For verifying the true of the article by searching original sequence number in the database being set in second server The device of reality, which corresponds to the short sequence number being retrieved, wherein the original sequence number is uniquely divided Article described in dispensing;
This is assigned to for searching in the case where the short sequence number for finding with being retrieved corresponding original sequence number The device of the information of original sequence number;
For generating the device of survey report, which includes the relevant information and/or authenticity result;
It is used for the login of response management person and/or brand owners and sends inspection to the administrator and/or brand owners It tests and reports with the device for checking,
The machine-readable data includes the short sequence number of one-dimensional bar code and/or two-dimensional bar and/or RFID label tag form, The short sequence number by using Encryption Algorithm by the original sequence number encryption become encryption sequence number, then by using Shorten algorithm or application bijective function and compresses the sequence number of the encryption to obtain.
22. system according to claim 21,
It is characterized in that,
The system further includes being taken with the second server by the third that virtual private cloud mechanism that is, VPC set-up are isolated Business device, the database are not arranged in the second server but are set in the third server, and
Following devices are not arranged on the second server but are set to the third server:
For verifying the device of the authenticity of the article by searching original sequence number in the database, this is original Sequence number corresponds to the short sequence number being retrieved, wherein the original sequence number is uniquely assigned to the article;
This is assigned to for searching in the case where the short sequence number for finding with being retrieved corresponding original sequence number The device of the information of original sequence number.
23. according to system described in claim 21 or 22,
It is further characterized in that
The first server includes multiple child servers, these child servers are respectively configured to the request according to the user Provide a user or do not provide a user feedback information.
24. according to system described in claim 21 or 22,
It is characterized in that,
The relevant information is data read time and/or geographical position in relation to the movement that can be surfed the Internet or non-mobile device The information set,
According to whether having found the original sequence number for corresponding to the short sequence number being retrieved, the authenticity result shows to be tested Whether the article of card is personation, and
If it find that the original sequence number is in except specified region, then the authenticity result shows that there are parallel trades Easily.
25. system according to claim 24,
It is characterized in that,
The Encryption Algorithm is the Encryption Algorithm according to data encryption standards that is, DES, or according to Advanced Encryption Standard, That is, the Encryption Algorithm of AES, and
The shortening algorithm is one of following algorithm: run length coding that is, RLE, Kolmogorov compression, Lempel- Ziv-Welch lossless data compression algorithms.
26. system according to claim 24,
It is characterized in that,
The device for read machine readable data is image acquisition unit and/or RFID reader, the one-dimensional barcode Code and/or two-dimensional bar can be read by image acquisition unit, and the RFID label tag can be read by RFID reader, Described in image acquisition unit and/or RFID reader be set in the movement that can be surfed the Internet or non-mobile device.
27. system according to claim 26,
It is characterized in that,
Described image acquiring unit is scanner or digital camera;And
The RFID reader works in high frequency that is, HF, or works in hyperfrequency that is, UHF.
28. system according to claim 24,
It is characterized in that,
The short sequence number can be decompressed and then be decrypted into the original sequence number that be used for verifying.
29. according to system described in claim 21 or 22,
It is characterized in that,
The article is product and/or packaging and/or file.
30. system according to claim 29,
It is characterized in that,
The product is the one or more in items set forth below:
Clothes, consumer electronics product, battery, mobile phone, wallet, knapsack, wrist-watch, drug, sunglasses, footwear and tobacco;
The packaging is made of following one or more:
Paper, carton, plastics, blister package, glass, metal and wood materials;And
The file is following one or more:
Certificate, window label, visa pastes, identity card, token, safety label, operation instruction, RFID label tag, textile label for clothing, lead to With printed label and stamp.
31. according to system described in claim 21 or 22,
It is characterized in that,
The movement that can be surfed the Internet or non-mobile device can access internet using telecommunication technology.
32. according to system described in claim 21 or 22,
It is characterized in that,
The mobile device that can be surfed the Internet is one of following equipment: smart phone, laptop computer, palmtop computer, notes This computer;And
The non-mobile device that can be surfed the Internet is desktop computer.
33. according to system described in claim 21 or 22,
It is characterized in that,
The geographical location of the movement or non-mobile device that can be surfed the Internet: IP address is determined using one of the following terms, By the multilateration that is, Mutilateration of base station, global positioning system that is, GPS.
34. system according to claim 21,
It is characterized in that,
The first server and second server are the Cloud Servers protected by safe encryption method.
35. system according to claim 22,
It is characterized in that,
The third server is the Cloud Server protected by safe encryption method.
36. according to system described in claim 34 or 35,
It is characterized in that,
The Cloud Server is one of following server:
Rackspace Cloud Server, GeGrid Cloud Server, Amazon Cloud Server;And
The safe encryption method is one of the following terms:
MD5 Message-Digest algorithm, secure hash algorithm that is, SHA, perfect privacy that is, PGP.
37. according to system described in claim 21 or 22,
It is characterized in that,
The machine-readable data and at least three kinds of security features are provided on the safety label for being attached to the article.
38. the system according to claim 37,
It is characterized in that,
At least three kinds of security features are selected from: overt security features, recessive security feature, evidence obtaining security feature and the mark Tamper-evident feature in the substrate of label.
39. the system according to claim 38,
It is characterized in that,
The overt security features are selected from: safety turn round rope decorative pattern, wechat, microfilm of characters, watermark, hologram, fiber, watermark, And ink;
The recessiveness security feature is selected from: hologram, fiber, watermark, ink, ultraviolet marking, infrared markers and safety are miniature Label;
The evidence obtaining security feature is selected from: there is the miniature label of optical activity ceramics or biochemical miniature label of evidence obtaining feature, this A little miniature labels respond single composition or double composition verification methods;And
Tamper-evident feature in the substrate of the label is breach or frangible substrate.
40. according to system described in claim 21 or 22,
It is characterized in that,
The content that customizes can be displayed on the display of the movement or non-mobile device that can be surfed the Internet.
CN201210432502.2A 2012-07-25 2012-11-02 Online verification method and system Active CN103577996B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210432502.2A CN103577996B (en) 2012-07-25 2012-11-02 Online verification method and system

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN2012102591168 2012-07-25
CN201210259116.8 2012-07-25
CN201210259116 2012-07-25
CN201210432502.2A CN103577996B (en) 2012-07-25 2012-11-02 Online verification method and system

Publications (2)

Publication Number Publication Date
CN103577996A CN103577996A (en) 2014-02-12
CN103577996B true CN103577996B (en) 2019-04-09

Family

ID=50049731

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210432502.2A Active CN103577996B (en) 2012-07-25 2012-11-02 Online verification method and system

Country Status (1)

Country Link
CN (1) CN103577996B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103903151B (en) * 2014-03-19 2016-11-23 苏州市职业大学 A kind of household electrical appliances based on Internet of Things are on probation in real time checks system
CN106934626A (en) * 2015-12-28 2017-07-07 佳能市场营销日本株式会社 Information processor, information processing system and its processing method and program
CN108764336A (en) * 2018-05-28 2018-11-06 北京陌上花科技有限公司 For the deep learning method and device of image recognition, client, server
CN113111989A (en) * 2020-12-31 2021-07-13 绍兴亿都信息技术股份有限公司 Production and identification system of product serial number
CN112860975A (en) * 2021-03-05 2021-05-28 深圳市西城微科电子有限公司 Article uniqueness coding cloud verification method and system
CN114697117B (en) * 2022-04-07 2023-11-24 中国工商银行股份有限公司 Verification method, device, cipher device and system based on positioning information

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101872460A (en) * 2010-05-27 2010-10-27 上海华彩科技有限公司 Treatment method of RFID online anti-counterfeiting system based on dynamic anti-counterfeiting mark

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7686231B2 (en) * 2005-05-27 2010-03-30 Xerox Corporation Secure product authentication method and system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101872460A (en) * 2010-05-27 2010-10-27 上海华彩科技有限公司 Treatment method of RFID online anti-counterfeiting system based on dynamic anti-counterfeiting mark

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A New Forward-Secure Digital Signature Scheme;HONG Jingxin;《IEEE International Workshop on Anti-counterfeiting》;20070418;第254-257页 *
电子商务安全中的数字签名技术;严翠玲 等;《商业现代化》;20070531;第2007年卷(第13期);第101-102页 *

Also Published As

Publication number Publication date
CN103577996A (en) 2014-02-12

Similar Documents

Publication Publication Date Title
CN103577996B (en) Online verification method and system
RU2762500C2 (en) Comprehensive protective anti-counterfeiting marking based on physically unclonable functions
CN110062940B (en) PUF-based composite security markings for protection against counterfeiting
US10176481B2 (en) Method and apparatus for managing and providing provenance of product using blockchain
US20180240129A1 (en) Method and a system of electronic verification of reliability of goods introduced to the trade turnover and of transmission of data concerning the origin of goods
JP6189454B2 (en) Unlicensed product detection techniques
CN107657457B (en) The method, apparatus and system of multi-level two-dimension code anti-counterfeit Internet-based
US20160098723A1 (en) System and method for block-chain verification of goods
RU2622840C2 (en) Object management in supply chain with use of protected identifier
US20160098730A1 (en) System and Method for Block-Chain Verification of Goods
CN112042153A (en) Composite security marking and method and device for providing and reading a composite security marking
Jadhav et al. System for identifying fake product using blockchain technology
AU2018205172A1 (en) Method and apparatus for managing and providing provenance of product using blockchain
CN105469132A (en) Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method
CN107431622A (en) The blocking tracking in supply chain occurs
US20190197562A1 (en) System and method for product authentication
JP5260795B2 (en) Product distribution management method via the Internet
CN102831528A (en) Commodity anti-counterfeiting method and commodity anti-counterfeiting system
JP6549692B2 (en) Transmission of certification mark
US9836720B1 (en) Systems for secure tracking code generation, application, and verification
CN106022797A (en) Smart device APP image recognition method
CA2339894A1 (en) Authentication technology of digital barcode & numerical coding system
CN100492968C (en) Anti-fake technology based on dynamic cipher
WO2012020291A2 (en) System for checking the authenticity of articles
Stein Supply chain with blockchain—showcase RFID

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1194845

Country of ref document: HK

EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder
CP02 Change in the address of a patent holder

Address after: Room 06-07, 18th floor, Huafei Commercial Building, Sheffield Road, Wanchai District, Hong Kong, China

Patentee after: NANOMATRIX INTERNATIONAL LIMITED

Address before: 9A Xinbang Building, 5-11 Tanchen Road, Wanchai, Hong Kong, China

Patentee before: NANOMATRIX INTERNATIONAL LIMITED

CP02 Change in the address of a patent holder
CP02 Change in the address of a patent holder

Address after: Room 06-07, 18th floor, Huafei Commercial Building, Sheffield Road, Wanchai District, Hong Kong, China

Patentee after: NANOMATRIX INTERNATIONAL LIMITED

Address before: Room 06-07, 18th floor, Huafei Commercial Building, Sheffield Road, Wanchai District, Hong Kong, China

Patentee before: NANOMATRIX INTERNATIONAL LIMITED