CN104463606A - Anti-fake tracing method and system based on mobile intelligent terminal - Google Patents
Anti-fake tracing method and system based on mobile intelligent terminal Download PDFInfo
- Publication number
- CN104463606A CN104463606A CN201410819097.9A CN201410819097A CN104463606A CN 104463606 A CN104463606 A CN 104463606A CN 201410819097 A CN201410819097 A CN 201410819097A CN 104463606 A CN104463606 A CN 104463606A
- Authority
- CN
- China
- Prior art keywords
- security code
- intelligent terminal
- mobile intelligent
- product
- fake
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 67
- 238000012795 verification Methods 0.000 claims abstract description 22
- 239000000047 product Substances 0.000 claims description 149
- 238000007689 inspection Methods 0.000 claims description 38
- 230000008859 change Effects 0.000 claims description 33
- 238000012544 monitoring process Methods 0.000 claims description 15
- 230000002452 interceptive effect Effects 0.000 claims description 13
- 238000012019 product validation Methods 0.000 claims description 9
- 238000003860 storage Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 3
- 239000006227 byproduct Substances 0.000 claims description 3
- 238000005303 weighing Methods 0.000 claims description 3
- 230000008569 process Effects 0.000 abstract description 22
- 238000005516 engineering process Methods 0.000 description 10
- 238000004519 manufacturing process Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 6
- 238000012856 packing Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 4
- 238000009826 distribution Methods 0.000 description 4
- 230000007812 deficiency Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000012550 audit Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- HVYWMOMLDIMFJA-DPAQBDIFSA-N cholesterol group Chemical group [C@@H]1(CC[C@H]2[C@@H]3CC=C4C[C@@H](O)CC[C@]4(C)[C@H]3CC[C@]12C)[C@H](C)CCCC(C)C HVYWMOMLDIMFJA-DPAQBDIFSA-N 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 239000007799 cork Substances 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- OWZREIFADZCYQD-NSHGMRRFSA-N deltamethrin Chemical compound CC1(C)[C@@H](C=C(Br)Br)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 OWZREIFADZCYQD-NSHGMRRFSA-N 0.000 description 1
- 238000013213 extrapolation Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to the technical field of product safety, in particular to an anti-fake tracing method and system based on a mobile intelligent terminal. The method comprises the steps that S1 the mobile intelligent terminal reads an anti-fake code and sends the anti-fake code and an identification number corresponding to the mobile intelligent terminal to an anti-fake authentication server; S2 the anti-fake authentication server judges whether the received anti-fake code is legal, if yes, step S3 is executed, and if not, a message that the anti-fake code is illegal is sent back; S3 the anti-fake authentication server judges whether the terminal is a current owner of the anti-fake code or a trial user capable of conducting checking a certain times according to the received terminal identification number, if yes, it is verified that the terminal is qualified, and if not, a message that the terminal does not have a permission to check the anti-fake code is sent back. The method and the system are based on the mobile intelligent terminal, the mobile intelligent terminal is high in popularizing rate, real consumers can easily get involved in an anti-fake system, the anti-fake check process can be completed, cost is low, and verification is easy.
Description
Technical field
The present invention relates to product safety technical field, more specifically, relate to a kind of false proof source tracing method based on mobile intelligent terminal and system.
Background technology
Fake and inferior commodities flood market, and seriously compromise the interests of consumer, bring huge economic loss to commodity production enterprise, have very large social harm.Anti-counterfeiting technology develops into today, and known method for anti-counterfeit, technology and product are innumerable, and main anti-fake product comprises three major types: vision judges, consulting judges, equipment judges:
1), vision judges, i.e. the naked eyes mode of distinguishing true from false.As laser hologram, texture, radium-shine, Ultraluminescence, day phototropic, heat-sensitive variable colour, pressure-sensitive variable color, wet sensitive colour changing, accurate version line, micro printing, thermochromic liquid crystal, super wiping distortion, disposable broken picture and text, open type duplicature applique, irreversible memory-type temperature-sensitive, reversible feel heat-sensitive variable colour, paper water wave, cholesteryl liquid crystal, the miniature stealth of graphic code etc.If adopt the anti-fake product of this technology to identify content and method simply, be then easy to imitated, do not reach antifalse effect; If identify content and method too loaded down with trivial details, then need certain identification experience, be unfavorable for promoting the use of.This technology is owing to only judging the true and false of label by macroscopic visual simultaneously, inaccurate, not rigorous.
2), seek advice from judgement, namely undertaken inquiring about the mode of distinguishing true from false by phone, note, internet etc.If adopt the anti-fake product of this technology not limit inquiry times, then inquiry code can be replicated easily, and antifalse effect is poor; If be defined as one yard of inquiry mode once, then exist before purchasing cannot verify, can only the deficiency of disposable checking.This technology is due to the correctness of only feedback query code book body simultaneously, or only can inform and be queried number of times, the judgement of certified products allows buyer judge voluntarily usually, and Query Result is difficult to convince people, and exist crack, bribe purchase digital come imitated possibility, rigorous not, confidence level is not high.
3), equipment judges, namely use the specialized equipment mode of distinguishing true from false, true and false information shows on specialized equipment.As holographic magnetic card, magnetic ink, smart credit card, bar code, Quick Response Code, metallic barcode, IC-card, rfid card, laser card, biochemistry, atomic nucleus double card, electronic recognition, nuclear track technique etc.By specialized equipment self or send data to the webserver and carry out encryption and decryption and examination during examination, ping procedure is to user transparent, simple, convenient, and product can repeatedly be checked after before sales, has certain practicality and anti-counterfeit capability.The electronic anti-counterfeit tag of some of them anti-fake product is also built-in with random code generator or sequence number generator, realizes often verifying once, and verifying end/server all produces a new random code or sequence number, to product identification; Some anti-fake products additionally provide independent authentication or the two-way authentication function of label and dedicated identification device; Some anti-fake products, also based on PKI/CA pattern, are encrypted product information, identifying code, sequence number/sequence number, implement multistage encryption and decryption, digital signature etc.Although such technology adds imitated difficulty to some extent, but due to the true and false need be judged by specialized equipment, cost is high, versatility is not strong, more crucially, checking means are single, without other, checking means are proved to the puppet checking of imitated identification equipment, although some method for anti-counterfeit proposes label, identification equipment bi-directional verification, if but imitated identification equipment only carries out the puppet reading of label information and the puppet connection examination of server, then emulate to present and " be verified, certified products " information prompting, then crack the method for anti-counterfeit such as bi-directional verification easily, thus realize the object of deception consumer, anti-counterfeit capability surface is powerful, actually very fragile.
In sum, existing method for anti-counterfeit and technology are still relied mainly on prevention, all strengthen from technical standpoint imitated cost of faking, increase imitated complexity of faking, thus reduce imitated possibility of faking, by constantly updating counterfeit protection measures and technique, cost is caused constantly to raise, but cannot predict/anti-the pseudoperiod (being imitated from putting into) of the current counterfeit protection measures of early warning, cause the multiple counterfeit protection measures in the market of identical product and deposit, domestic consumer is puzzlement more.To really address this problem, the cost of manufacture of Antiforge system must be very low, and examination mode is simple, repeatedly checks after purchasing before purchasing, have and independently prove checking method to identify pseudo-checking situation, there is audit when doubtful imitation products is checked and warning function.
Summary of the invention
The present invention, for overcoming at least one defect (deficiency) described in above-mentioned prior art, provides that a kind of cost is low, examination is simply based on the false proof source tracing method of mobile intelligent terminal.
The present invention also provides that a kind of cost is low, examination is simply based on the anti-fake traceability system of mobile intelligent terminal.
For solving the problems of the technologies described above, technical scheme of the present invention is as follows:
Based on a false proof source tracing method for mobile intelligent terminal, comprising:
S1. mobile intelligent terminal reads security code and security code and identification number corresponding to mobile intelligent terminal is sent to fake certification server;
S2. fake certification server judges that whether the security code received is legal, if legal, perform step S3, otherwise returns security code information unauthorized;
S3. by the terminal iidentification number received, fake certification server judges that whether this terminal is the current entitlement person of this security code, if then return the information that Product Validation is certified products, otherwise returns the information that terminal does not have security code examination authority.
In such scheme, the identification number that described mobile intelligent terminal is corresponding be cell-phone number, IMSI or other can one in No. ID of distinctive mark terminal.
In such scheme, described security code stochastic generation, security code and corresponding product coding, the Product Status of stochastic generation are stored in fake certification server.
In such scheme, described security code directly or after encryption forms antifalsification label, the physical interconnection one to one of antifalsification label and corresponding product in generation two-dimension code label or write radio electronic label.
In such scheme, the initial setting up mode of security code current ownership person is as follows:
Predistribution, when circulating initial, is that the security code that the mobile intelligent terminal identification number of the initial entitlement person of product is corresponding with product is bound by product in fake certification server.
In such scheme, security code current ownership person changes with Product Status change, and concrete alter mode is as follows:
When Product Status changes, be sent in fake certification server by the identification number of its terminal iidentification number, security code and the mobile intelligent terminal B that changes to new entitlement person in advance after the mobile intelligent terminal A of security code current ownership reads security code, application is changed;
Fake certification server authentication security code and security code current ownership person legal after, generate and change authority checking code C, and change authority checking code C is sent to mobile intelligent terminal B;
Mobile intelligent terminal B performs and changes authority checking operation, is sent in fake certification server by its terminal iidentification number with change authority checking code C;
After authority checking code C legitimacy is changed in fake certification server authentication, change security code current ownership person is terminal B, and change terminal A is invalid to the entitlement of this security code, and revises corresponding product state.
In such scheme, in described step S3, fake certification server judges that mobile intelligent terminal is not also perform following steps after security code current ownership person:
S4. fake certification server judges whether this terminal is that this security code tries out power person, if then perform step S5, otherwise returns the information that this terminal does not have security code examination authority;
S5. fake certification server judges whether this terminal checking on probation number of times is greater than threshold value, if then checking number of times on probation subtracts 1 and returns the information that Product Validation is certified products, otherwise returns the information of trying out checking number of times and being finished.
In such scheme, having the mobile intelligent terminal that security code tries out power is perform recommendation operation on probation by security code current ownership mobile intelligent terminal to obtain, and is specially:
Security code current ownership mobile intelligent terminal A reads after security code and is sent in fake certification server by the identification number of its terminal iidentification number, security code and the mobile intelligent terminal B that is recommended as power person on probation in advance, and application is on probation to be recommended;
Fake certification server authentication security code and security code current ownership person legal after, generate authority checking code D on probation, and authority checking code D on probation be sent to mobile intelligent terminal B;
Mobile intelligent terminal B performs authority checking operation on probation, is sent in fake certification server by its terminal iidentification number with authority checking code D on probation;
After fake certification server authentication authority checking code D legitimacy, the newly-increased security code that stores tries out the attribute data weighing terminal: the identification number of terminal B, number of inspections on probation and attribute on probation.
In such scheme, described method also comprises data stream in fake certification server and all backups to monitoring and warning and to trace to the source database, and the false proof examination of tracing to the source under all states of database evidence inquiry product by monitoring and warning is traced to the source information.
Based on an anti-fake traceability system for mobile intelligent terminal, comprise mobile intelligent terminal and fake certification server:
Mobile intelligent terminal comprises:
Security code read module, for reading security code;
Security code interactive module, for being sent in fake certification server by security code and terminal iidentification number corresponding to mobile intelligent terminal and receiving return message;
Fake certification server comprises:
Transceiver module, for receiving security code and the terminal iidentification number of the transmission of security code interactive module;
Security code authentication module, whether legal for judging the security code received, if then notice checks Authority Verification module, otherwise notice sending module;
For the terminal iidentification by receiving number, examination Authority Verification module, judges whether terminal is security code current ownership person or power person on probation, and the result is notified sending module;
Sending module, for the result according to security code authentication module and examination Authority Verification module, send the information of " security code is illegal ", or the information of " Product Validation is certified products ", or the information of " terminal does not have security code examination authority ", or the information of " checking number of times on probation is finished " is to the interactive module of mobile intelligent terminal.
In such scheme, also comprise security code information storage module in described fake certification server, for storing security code and product coding, the Product Status corresponding with security code, wherein security code is generated by random fashion.
In such scheme, also comprise monitoring and warning in described fake certification server and to trace to the source module, to trace to the source information for the false proof examination of proving under all states of inquiry product.
Compared with prior art, the beneficial effect of technical solution of the present invention is:
1) the present invention is based on mobile intelligent terminal, and mobile intelligent terminal popularity rate is high, actual customer can get involved false proof system like a cork, can improve the process of Antiforge inquiry, with low cost, and checking is simple.
2) the present invention is by setting up product false proof code examination authority tree and product total state ping procedure message sense, security code and examination mobile intelligent terminal are bound, allow product pre-sales, carry out repeatedly true and false examination after sale, ensure that credibility and the uniqueness of product false proof code proof procedure by binding mobile intelligent terminal simultaneously.
3) the present invention changes effective examination mobile intelligent terminal of product by the proprietorial change of product, and specifically can limit number of inspections, examination mobile intelligent terminal and number of inspections can be arranged targetedly according to the proprietorial change of product, the renewal of number of inspections and Product Status also will in fake certification server record, make the sales volume of counterfeit security code product limited, counterfeit income and counterfeit benefit cost ratio very low; And can automatically enter early warning process when certified products enters when sales section cannot be sold, because store the mobile intelligent terminal identification number (as cell-phone number) of the association of adulterant examination originally in system, in order to crack down on counterfeit goods, evidence obtaining offers convenience, increase counterfeit danger coefficient, effectively can contain and hit counterfeit behavior.
4) the present invention also synchronously provides monitoring and warning to trace to the source database, realize the query function of tracing to the source of the circulation examination information to antifalsification label (product), be independently assist evidence process, effectively prevent the puppet checking situation that mobile intelligent terminal forges examination result.
5) the present invention constructs the false proof system of efficient system, and counterfeiter only has the whole system of imitation, just may forge in a large number sole product, considerably increase counterfeit cost, reduce counterfeit possibility.
Accompanying drawing explanation
Fig. 1 is the particular flow sheet of a kind of false proof source tracing method based on mobile intelligent terminal of the present invention.
Fig. 2 is that the present invention is a kind of based on product entitlement person changing process schematic diagram in the false proof source tracing method of mobile intelligent terminal.
Fig. 3 is that the present invention is a kind of based on recommending examination user schematic flow sheet on probation in the false proof source tracing method of mobile intelligent terminal.
Fig. 4 is a kind of false proof source tracing method specific embodiment based on mobile intelligent terminal of the present invention based on system architecture schematic diagram.
Fig. 5 is a kind of security code examination authority tree schematic diagram based on building in the false proof source tracing method specific embodiment of mobile intelligent terminal of the present invention.
Fig. 6 is that the examination of a kind of false proof source tracing method based on mobile intelligent terminal of the present invention is traced to the source acquisition of information process flow diagram.
Embodiment
Accompanying drawing, only for exemplary illustration, can not be interpreted as the restriction to this patent;
In order to better the present embodiment is described, some parts of accompanying drawing have omission, zoom in or out, and do not represent the size of actual product;
To those skilled in the art, in accompanying drawing, some known features and explanation thereof may be omitted is understandable.
In describing the invention, it is to be appreciated that term " first ", " second " only for describing object, and can not be interpreted as the quantity of instruction or hint relative importance or implicit indicated technical characteristic.Thus, one or more these features can be expressed or impliedly be comprised to the feature of " first ", " second " of restriction.In describing the invention, except as otherwise noted, the implication of " multiple " is two or more.
In describing the invention, it should be noted that, unless otherwise clearly defined and limited, term " installation ", " connection " should be interpreted broadly, and such as, can be fixedly connected with, also can be removably connect, or connect integratedly; Can be mechanical connection, also can be electrical connection; Can be directly be connected, also can be indirectly connected by intermediary, the connection of two element internals can be said.For the ordinary skill in the art, concrete condition above-mentioned term can be understood at concrete meaning of the present invention.
Below in conjunction with drawings and Examples, technical scheme of the present invention is described further.
Embodiment 1
As shown in Figure 1, be the process flow diagram of a kind of false proof source tracing method based on mobile intelligent terminal of the present invention.See Fig. 1, the concrete steps of a kind of false proof source tracing method based on mobile intelligent terminal of this specific embodiment comprise:
S101. mobile intelligent terminal reads security code and security code and identification number corresponding to mobile intelligent terminal is sent to fake certification server;
S102. fake certification server judges that whether the security code received is legal, if legal, perform step S103, otherwise returns security code information unauthorized;
S103. by the terminal iidentification number received, fake certification server judges that whether this terminal is the current entitlement person of this security code, if then return the information that Product Validation is certified products, otherwise performs step S104;
S104. fake certification server judges whether this terminal is that this security code tries out power person, if then perform step S105, otherwise returns the information that this terminal does not have security code examination authority;
S105. fake certification server judges whether this terminal checking on probation number of times is greater than threshold value, if then checking number of times on probation subtracts 1 and returns the information that Product Validation is certified products, otherwise returns the information of trying out checking number of times and being finished.
Wherein, the identification number that mobile intelligent terminal is corresponding be cell-phone number, IMSI or other can one in No. ID of distinctive mark terminal.
Wherein, described security code is produced by random fashion, has uniqueness with product one_to_one corresponding.Security code and corresponding product coding, the Product Status of stochastic generation are stored in fake certification server.Preferably, in fake certification server, build security code information bank to store security code relevant information, realize the logic association of security code and product after the product coding write security code information bank corresponding with security code, and Product Status is set for " stock ".
Concrete security code information bank can build data structure main body according to self-defined mode when storing, and stores as built following data structure main body:
[security code, product coding, Product Status].
Directly or after encryption antifalsification label is formed in generation two-dimension code label or write radio electronic label after security code stochastic generation.
The opening part of product or its external packing can be fixed on by modes such as stickups, with product physical interconnection during antifalsification label application; When product or external packing are opened, antifalsification label will cause security code to read thereupon by breakage and lose efficacy.
In this specific embodiment, security code and security code current ownership mobile intelligent terminal are bound, only have and can carry out security code examination by the mobile intelligent terminal of binding, ensure that the legitimacy of examination.And except current ownership terminal, recommend mobile intelligent terminal on probation also can check the security code true and false by it, the mobile intelligent terminal scope that can check is extended with the way of recommendation, limit number of inspections by the mobile intelligent terminal character (entitlement person, power person on probation) of binding simultaneously, under the legitimacy prerequisite that ensure that examination, it is the further obstacle of verification setting of pseudo-security code.
In specific implementation process, the initial setting up mode of security code current ownership person is as follows:
Predistribution, when circulating initial, is that the security code that the mobile intelligent terminal identification number of the initial entitlement person of product is corresponding with product is bound by product in fake certification server, and to arrange Product Status be " sale ";
Preferably, as shown in Figure 2, security code current ownership person changes with Product Status change, and concrete alter mode is as follows:
When Product Status changes, be sent in fake certification server by the identification number of its terminal iidentification number, security code and the mobile intelligent terminal B that changes to new entitlement person in advance after the mobile intelligent terminal A of security code current ownership reads security code, application is changed;
Fake certification server authentication security code and security code current ownership person legal after, generate and change authority checking code C, and change authority checking code C is sent to mobile intelligent terminal B with communication form such as notes; Mobile intelligent terminal B performs and changes authority checking operation, is sent in fake certification server by its terminal iidentification number with change authority checking code C;
After authority checking code C legitimacy is changed in fake certification server authentication, change security code current ownership person is terminal B, and change terminal A is invalid to the entitlement of this security code, and revises corresponding product state.
In specific implementation process, as shown in Figure 3, having the mobile intelligent terminal that security code tries out power is perform recommendation operation on probation by security code current ownership mobile intelligent terminal to obtain, and is specially:
Security code current ownership mobile intelligent terminal A reads after security code and is sent in fake certification server by the identification number of its terminal iidentification number, security code and the mobile intelligent terminal B that is recommended as power person on probation in advance, and application is on probation to be recommended;
Fake certification server authentication security code and security code current ownership person legal after, generate authority checking code D on probation, and authority checking code D on probation be sent to mobile intelligent terminal B with communication form such as notes;
Mobile intelligent terminal B performs authority checking operation on probation, is sent in fake certification server by its terminal iidentification number with authority checking code D on probation;
After fake certification server authentication authority checking code D legitimacy, the newly-increased security code that stores tries out the attribute data weighing terminal: the identification number of terminal B, number of inspections on probation and attribute on probation.
In specific implementation process, described method of the present invention also comprises data stream in fake certification server and all backups to monitoring and warning and to trace to the source database, and the false proof examination of tracing to the source under all states of database evidence inquiry product by monitoring and warning is traced to the source information.Specifically trace to the source information inquiry mode as shown in Figure 6.
Based on above-mentioned specific embodiment, a specific embodiment is provided to set forth method of the present invention further based on method of the present invention below.
In this specific embodiment, as shown in Figure 4, include fake certification server 201, to trace to the source the web terminal 205 of database as the mobile phone 202 of mobile intelligent terminal, mobile phone 202 possessing the read write line 203 of antifalsification label read functions, product 204 and can connecting monitoring and warning, wherein on product 204, the antifalsification label of its correspondence in physical interconnection.
The generation of security code: the unique security code of random generation, in fake certification server, build security code information bank, the data structure main body of security code information bank is: [security code, product coding, Product Status]; Security code directly or after encryption forms antifalsification label in generation two-dimension code label or write radio electronic label.
Antifalsification label is fixed on the opening part of product or its external packing by modes such as stickups, with product physical interconnection; When product or external packing are opened, antifalsification label will cause security code to read thereupon by breakage and lose efficacy; After security code stochastic generation, product coding and security code are mapped, and product coding are write in security code information table corresponding to security code information bank, realize the logic association of security code and product, and Product Status is set for " stock ".
In order to review each state in intermediate links of product and process, this example has preset the multiple state of product, comprise " stock ", " sale ", " purchase ", " gifting " etc.
Production marketing personnel certification cellphone information storehouse is built in fake certification server, data structure main body is: [sales force's cell-phone number, store numbers, sales force numbers, authenticated time, effective status], [effective status] initial value is " effectively ", when certain sales force leaves office, amendment [effective status] value is engineering noise.
During product introduction sales section, change Product Status for " sale " in fake certification server, in fake certification server, now build this security code mandate examination certification tree, it is one-to-one relationship that security code and certification are set.The data structure of certification tree node is: [node type allows examination cell-phone number, allows number of inspections, child pointers], and wherein [node type] value is " production marketing ", " product purchase ", " product is gifted ", " checking on probation "; [allowing examination cell-phone number] can have one or more cell-phone number, multiple cell-phone number CSV in root node, and can only be effective sales force's certification cell-phone number; Have in remaining descendant nodes and can only have a cell-phone number, the cell-phone number in tree in each node allows to repeat; [permission number of inspections] value be 0(represent do not allow checking), 1(represent allow checking once) ,-1(indicate without checking number of times limit); Wherein node type is the node of " production marketing " can only be root node, the child nodes of node type to be the node of " product purchase " can only be root node, and the type node can only have one at most in certification tree; Node type is the node of " checking on probation " can only be leaf node.
In concrete building process, person is corresponding with Product Status for security code current ownership, in binding procedure, the number of inspections of security code current ownership person is not limited, but the number of inspections of non-security code current ownership person is set to 1 time usually, and need by recommending the mode of trying out to obtain legal examination authority.
When building security code mandate examination certification tree first in fake certification server, the root node type setting up examination certification tree is " production marketing ", number of inspections is allowed to be-1, allow examination cell-phone number to be one or more effective sales force's certification cell-phone numbers, change Product Status is " sale " state simultaneously.Complete the logic binding of security code and sales force's certification cell-phone number.
Therefore based on this mode, during security code mandate examination certification tree initial construction, product is in distribution state, now security code current ownership person is sales force, now the original state of product is distribution state, automatically constructs the cell-phone number of sales force and the binding relationship of security code in security code mandate examination certification tree.When Product Status changes, child nodes can be formed in security code mandate examination certification tree to upgrade data corresponding to security code examination certification.
In a particular application, corresponding APP software can be installed in smart mobile phone to inquire about.As shown in Figure 2, during the authenticity verification of concrete checking antifalsification label (product), APP software is run in smart mobile phone, directly or indirectly read security code information in antifalsification label by built-in camera or extrapolation (external) read write line, APP software is submitted to fake certification server the information such as security code information, self cell-phone number read; Fake certification server is verified security code according to proof rule, illustrates proof procedure below by citing proof rule:
Rule 1: security code is effectively legal: the security code of checking must to be cell-phone number that is legal and checking must be in the examination certification tree node of this security code " allowing examination cell-phone number ", and the permission number of inspections value of this node is 1 or-1.
Rule 2: if security code state be " sale " state, examination cell-phone number appears in the root node of this security code mandate examination certification tree, node number of inspections be-1, then allow this mobile phone checking true and false and return certified products information.Do not change the number of inspections of this node after examination, accumulative cell-phone number is to the number of inspections of security code.
Rule 3: if security code state is " sale " state, one or more certification sales force mobile phones in the root node of this security code mandate examination certification tree, other user mobile phones one or more can be recommended in APP to carry out examination on probation, in this security code mandate examination certification tree, newly-built child nodes under its place node (i.e. root node), the name of this child nodes is called " checking on probation ", and number of inspections is 1, and examination cell-phone number is recommended cell-phone number on probation.This recommendation process can flow process as shown in Figure 3 operate
Rule 4: if security code state be " sale " state, examination cell-phone number appears in this security code mandate examination certification tree non-root node, node number of inspections is 1, then allow this mobile phone to check and return certified products information, and containing additional information: " distribution state; checking can only be tried out once, after buying, checking number of times is unrestricted ".After examination, the number of inspections value of this node of change is 0, and accumulative cell-phone number is to the number of inspections of this security code.
Rule 5: if security code state is " sale " state, one or more certification sales force mobile phones in the root node of this security code mandate examination certification tree, revising security code state when product is sold by APP is " purchase " state, in this security code mandate examination certification tree, the number of inspections of its place node (i.e. root node) is revised as 0, newly-built child nodes under its place node, the name arranging this child nodes is called " product purchase ", number of inspections is-1, and examination cell-phone number is buyer's cell-phone number.
Rule 6: if security code state is " purchase " state, examination cell-phone number occurs that the nodename of this security code mandate examination certification tree is " product purchase ", node number of inspections is "-1 ", then allow this mobile phone verify the true and false and return certified products information.Do not change the number of inspections of this node after examination, accumulative cell-phone number is to the number of inspections of security code.Other user mobile phones one or more can be recommended in APP to check simultaneously, in this security code mandate examination certification tree, newly-built child nodes under its place node, the nodename of this child nodes is " checking on probation ", number of inspections is 1, and examination cell-phone number is recommended cell-phone number.
Rule 7: if security code state be " purchase " state, examination cell-phone number occurs that the non-root node name of this security code mandate examination certification tree is called " on probation checking ", node number of inspections is 1, then allow this mobile phone to check and return certified products information, and containing additional information: " product is sold; sell state; can only try out checking 1 time; as needed repeatedly; then need repeatedly to recommend; or after gifting, verify that number of times is unrestricted ", also can comprise store in return message, sell time, buyer etc. and can to trace to the source information.After examination, the number of inspections value of this node of change is 0, and accumulative cell-phone number is to the number of inspections of this security code.
Rule 8: if security code state is " purchase " state, examination cell-phone number occurs that the nodename of this security code mandate examination certification tree is " product purchase ", node number of inspections is-1, be " gifting " state representing product to the security code state revised in certificate server by APP during other users, in this security code mandate examination certification tree, the number of inspections of its place node is revised as 0, newly-built child nodes under its place node, the name arranging this child nodes is called " product is gifted ", number of inspections is-1, examination cell-phone number is acceptor's cell-phone number.
Rule 9: if security code state be " gifting " state, examination cell-phone number occurs that the nodename of this security code mandate examination certification tree is the mobile phone of " product is gifted ", node number of inspections-1, allow this mobile phone to check and return certified products information, in return message, comprising store, selling the time, buyer, time etc. of gifting can trace to the source information.Other user mobile phones one or more can be recommended in APP to check simultaneously, in this security code mandate examination certification tree, newly-built child nodes under its place node, the nodename of this child nodes is " checking on probation ", number of inspections is 1, and examination cell-phone number is recommended cell-phone number.
Rule 10: if security code state be " gifting " state, examination cell-phone number occurs that the nodename of this security code mandate examination certification tree is the mobile phone of " product is gifted ", node number of inspections-1, product can be again represented to other cellphone subscribers by APP, in this security code mandate examination certification tree, the number of inspections of its place node is revised as 0, newly-built child nodes under its place node, the name arranging this child nodes is called " product is gifted ", number of inspections is-1, and examination cell-phone number is acceptor's cell-phone number.Product number of times of gifting is unrestricted.
Rule 11: do not meeting aforementioned rule, when cannot verify, the examination information returned is as follows:
R11-1: when security code is illegal, returns " security code is illegal, and regular store please be gone to buy ";
R11-2: security code is legal and state is " sale " state, then return " in production marketing, only have sales force's mobile phone of mandate and recommend user mobile phone on probation just can carry out authenticity verification ";
R11-3: security code is legal and state is " purchase " state, then return " product is sold, and only has buyer's mobile phone and recommends user mobile phone on probation just can carry out authenticity verification ";
R11-4: security code is legal and state is " gifting " state, then return " product has been sold and gifted, and only has acceptor's mobile phone and recommends user mobile phone on probation just can carry out authenticity verification ".
Rule 12: set the cellphone subscriber in each node in security code mandate examination certification, all can be traced to the source information by the examination circulation of identifying code inquiry antifalsification label (product) submitting to security code, cell-phone number and mobile phone receive in official WEB website, the overall processes such as information comprises production marketing in chronological order, buys, gifts, examination are traced to the source information, and the examination mobile phone (part cell-phone number shielding processing) each time in process, independently secondary au-thentication process, the puppet checking after faking for preventing APP.
Rule 13: following situation will be traced to the source the examination information such as cell-phone number, examination time write monitoring and warning database, carry out product examination data monitoring and early warning process:
R13-1: when security code is illegal;
R13-2: when the examination of sales force's mobile phone to the legal security code of " distribution state " of certification exists loop situations, if ping procedure is security code 1-> security code 2-> security code 1, the situation of person oneself sell-fake-products that now shows to there is production marketing.
R13-3: bind one or more certification sales force cell-phone number and set up certain security code mandate examination certification tree and this security code mandate examination certification tree when existing, now show to exist adulterant prior to certified products sell may.
R13-4: security code is legal, and when the number of inspections of certain cell-phone number to this security code appeared in the node of this security code mandate examination certification tree exceedes threshold value, now show to there is the possibility that security code is replicated fraud.
R13-5: security code is legal, and when the number of inspections of certain cell-phone number to this security code do not appeared in the node of this security code mandate examination certification tree exceedes threshold value, now show to exist the possibility attempting cracking Antiforge system.
The security code mandate examination certification tree built based on above-mentioned proof rule and node structure schematic diagram thereof are as shown in Figure 5.
In this specific embodiment, build production marketing, buy, multiple state such as to gift, under different conditions according to the data interaction of mobile intelligent terminal and fake certification server can change Product Status, the cell-phone number of security code current ownership person, the inquiry times of security code current ownership person, security code current ownership person recommend the inquiry times etc. of the cell-phone number of user and the recommended user on probation tried out, recommended user on probation.
Embodiment 2
On the basis of embodiment 1, the present invention also provides a kind of anti-fake traceability system based on mobile intelligent terminal.Mobile intelligent terminal and fake certification server is specifically comprised in this specific embodiment a kind of is based on the anti-fake traceability system of mobile intelligent terminal:
Mobile intelligent terminal comprises:
Security code read module, for reading security code;
Security code interactive module, for being sent in fake certification server by security code and cell-phone number corresponding to mobile intelligent terminal and receiving return message;
Fake certification server comprises:
Transceiver module, for receiving security code and the cell-phone number of the transmission of security code interactive module;
Security code authentication module, whether legal for judging the security code received, if then notice checks Authority Verification module, otherwise notice sending module;
For the cell-phone number by receiving, examination Authority Verification module, judges whether terminal is security code current ownership person or power person on probation, and the result is notified sending module;
Sending module, for the result according to security code authentication module and examination Authority Verification module, send the information of " security code is illegal ", or the information of " Product Validation is certified products ", or the information of " terminal does not have security code examination authority ", or the information of " checking number of times on probation is finished " is to the interactive module of mobile intelligent terminal.
In specific implementation process, also comprise security code information storage module in described fake certification server, for storing security code and product coding, the Product Status corresponding with security code, wherein security code is generated by random fashion.
Wherein, described security code is produced by random fashion, has uniqueness with product one_to_one corresponding.Security code and corresponding product coding, the Product Status of stochastic generation are stored in the security code information storage module of fake certification server.Preferably, in fake certification server, build security code information bank to store security code relevant information, realize the logic association of security code and product after the product coding write security code information bank corresponding with security code, and product original state is set for " stock ".
Concrete security code information bank can build data structure main body according to self-defined mode when storing, and stores as built following data structure main body:
[security code, product coding, Product Status].
Directly or after encryption antifalsification label is formed in generation two-dimension code label or write radio electronic label after security code stochastic generation.
The opening part of product or its external packing can be fixed on by modes such as stickups, with product physical interconnection during antifalsification label application; When product or external packing are opened, antifalsification label will cause security code to read thereupon by breakage and lose efficacy.
In this specific embodiment, the mobile phone of security code and security code current ownership is bound, only have and can carry out security code examination by the mobile phone of binding, ensure that the legitimacy of examination.And except current ownership terminal, recommend mobile phone on probation also can check the security code true and false by it, the mobile intelligent terminal scope that can check is extended with the way of recommendation, limit inquiry times by the mobile intelligent terminal character (entitlement person, power person on probation) of binding simultaneously, under the legitimacy prerequisite that ensure that examination, for
pseudo-the further obstacle of the verification setting of security code.
In specific implementation process, also comprise security code mandate examination certification tree in fake certification server and build module, for arranging the relevant information storing security code current ownership person, wherein, the initial setting up mode of security code current ownership person is as follows:
Product is when circulating initial, and predistribution is that the security code that the cell-phone number of the initial entitlement person of product is corresponding with product is bound by security code mandate examination certification tree structure module, and arranges Product Status for " sale ";
Preferably, security code current ownership person changes with Product Status change, and concrete alter mode is as follows:
When Product Status changes, the security code read module of security code current ownership mobile intelligent terminal A reads security code;
Security code interactive module by its cell-phone number, security code and and the cell-phone number of the mobile intelligent terminal B that changes to new entitlement person be in advance sent in the transceiver module of fake certification server;
The security code authentication module of fake certification server and examination Authority Verification module verification security code and security code current ownership person legal after, generate and change authority checking code C and will authority checking code C be changed to send to communication form such as notes the security code interactive module of mobile intelligent terminal B;
Also being provided with operation executing module in mobile intelligent terminal, changing authority checking operation for performing, the cell-phone number of new for security code entitlement person B and change authority checking code C are sent in the transceiver module of fake certification server;
After authority checking code C legitimacy is changed in fake certification server authentication, it arranges change module is terminal B for changing the new entitlement person of security code, and change terminal A is invalid to the entitlement of this security code, and revises corresponding product state.
In specific implementation process, security code recommends user on probation to recommend operation on probation to obtain by the mobile intelligent terminal execution that security code current ownership person is corresponding, is specially:
The security code read module of the mobile intelligent terminal A that security code current ownership person is corresponding reads security code;
Its cell-phone number, security code and security code recommend the cell-phone number of user B to be sent in the transceiver module of fake certification server by security code interactive module;
The security code authentication module of fake certification server and examination Authority Verification module verification security code and security code current ownership person legal after, generate authority checking code D on probation and authority checking code D on probation sent to the security code interactive module of mobile intelligent terminal with communication form such as notes;
The operation executing module of mobile intelligent terminal performs recommends authority checking operation on probation, is recommended by security code the cell-phone number of user B and authority checking code D on probation to be sent in the transceiver module of fake certification server;
After the legitimacy of fake certification server authentication authority checking code D, it arranges change module stores security code and recommends the attribute data of user on probation: security code recommends user B cell-phone number on probation, number of inspections and recommendation to try out attribute.
In specific implementation process, described system of the present invention also comprises monitoring and warning and to trace to the source database, in fake certification server, data stream all backups to monitoring and warning and to trace to the source database, to be traced to the source information by the false proof examination under all states of monitoring and warning database evidence inquiry product.
The corresponding same or analogous parts of same or analogous label;
Describe in accompanying drawing position relationship for only for exemplary illustration, the restriction to this patent can not be interpreted as;
Obviously, the above embodiment of the present invention is only for example of the present invention is clearly described, and is not the restriction to embodiments of the present invention.For those of ordinary skill in the field, can also make other changes in different forms on the basis of the above description.Here exhaustive without the need to also giving all embodiments.All any amendments done within the spirit and principles in the present invention, equivalent to replace and improvement etc., within the protection domain that all should be included in the claims in the present invention.
Claims (12)
1., based on a false proof source tracing method for mobile intelligent terminal, it is characterized in that, comprise
S1. mobile intelligent terminal reads security code and security code and identification number corresponding to mobile intelligent terminal is sent to fake certification server;
S2. fake certification server judges that whether the security code received is legal, if legal, perform step S3, otherwise returns security code information unauthorized;
S3. by the terminal iidentification number received, fake certification server judges that whether this mobile intelligent terminal is the current entitlement person of this security code, if then return the information that Product Validation is certified products, otherwise return the information that mobile intelligent terminal does not have security code examination authority.
2. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 1, is characterized in that, the identification number that described mobile intelligent terminal is corresponding be cell-phone number, IMSI or other can one in No. ID of distinctive mark terminal.
3. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 1, is characterized in that, described security code stochastic generation, and security code and corresponding product coding, the Product Status of stochastic generation are stored in fake certification server.
4. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 3, it is characterized in that, described security code directly or after encryption forms antifalsification label, the physical interconnection one to one of antifalsification label and corresponding product in generation two-dimension code label or write radio electronic label.
5. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 3, it is characterized in that, the initial setting up mode of security code current ownership person is as follows:
Predistribution, when circulating initial, is that the security code that the mobile intelligent terminal identification number of the initial entitlement person of product is corresponding with product is bound by product in fake certification server.
6. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 5, is characterized in that, security code current ownership person changes with Product Status change, and concrete alter mode is as follows:
When Product Status changes, be sent in fake certification server by the identification number of its terminal iidentification number, security code and the mobile intelligent terminal B that changes to new entitlement person in advance after the mobile intelligent terminal A of security code current ownership reads security code, application is changed;
Fake certification server authentication security code and security code current ownership person legal after, generate and change authority checking code C, and generations change authority checking code C is sent to mobile intelligent terminal B;
Mobile intelligent terminal B performs and changes authority checking operation, is sent in fake certification server by its terminal iidentification number with change authority checking code C;
After authority checking code C legitimacy is changed in fake certification server authentication, change security code current ownership person is mobile intelligent terminal B, and change mobile intelligent terminal A is invalid to the entitlement of this security code, and revises corresponding product state.
7. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 1, is characterized in that, in described step S3, fake certification server judges that mobile intelligent terminal is not also perform following steps after security code current ownership person:
S4. fake certification server judges whether this mobile intelligent terminal is that this security code tries out power person, if then perform step S5, otherwise returns the information that this mobile intelligent terminal does not have security code examination authority;
S5. fake certification server judges whether this mobile intelligent terminal checking on probation number of times is greater than threshold value, if then checking number of times on probation subtracts 1 and returns the information that Product Validation is certified products, otherwise returns the information of trying out checking number of times and being finished.
8. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 7, it is characterized in that, having the mobile intelligent terminal that security code tries out power is perform recommendation operation on probation by security code current ownership mobile intelligent terminal to obtain, and is specially:
Security code current ownership mobile intelligent terminal A reads after security code and is sent in fake certification server by the identification number of its terminal iidentification number, security code and the mobile intelligent terminal B that is recommended as power person on probation in advance, and application is on probation to be recommended;
Fake certification server authentication security code and security code current ownership person legal after, generate authority checking code D on probation, and authority checking code D on probation be sent to mobile intelligent terminal B;
Mobile intelligent terminal B performs authority checking operation on probation, is sent in fake certification server by its terminal iidentification number with authority checking code D on probation;
After fake certification server authentication authority checking code D legitimacy, the newly-increased security code that stores tries out the attribute data weighing terminal: the identification number of mobile intelligent terminal B, number of inspections on probation and attribute on probation.
9. a kind of false proof source tracing method based on mobile intelligent terminal according to any one of claim 1 to 8, it is characterized in that, described method also comprises data stream in fake certification server and all backups to monitoring and warning and to trace to the source database, and the false proof examination of tracing to the source under all states of database evidence inquiry product by monitoring and warning is traced to the source information.
10. based on an anti-fake traceability system for mobile intelligent terminal, it is characterized in that, comprise mobile intelligent terminal and fake certification server:
Mobile intelligent terminal comprises:
Security code read module, for reading security code;
Security code interactive module, for being sent in fake certification server by security code and terminal iidentification number corresponding to mobile intelligent terminal and receiving return message;
Fake certification server comprises:
Transceiver module, for receiving security code and the terminal iidentification number of the transmission of security code interactive module;
Security code authentication module, whether legal for judging the security code received, if then notice checks Authority Verification module, otherwise notice sending module;
For the terminal iidentification by receiving number, examination Authority Verification module, judges whether terminal is security code current ownership person or power person on probation, and the result is notified sending module;
Sending module, for the result according to security code authentication module and examination Authority Verification module, send the information of " security code is illegal ", or the information of " Product Validation is certified products ", or the information of " terminal does not have security code examination authority ", or the information of " checking number of times on probation is finished " is to the interactive module of mobile intelligent terminal.
11. a kind of anti-fake traceability system based on mobile intelligent terminal according to claim 10, it is characterized in that, security code information storage module is also comprised in described fake certification server, for storing security code and product coding, the Product Status corresponding with security code, wherein security code is generated by random fashion.
12. a kind of anti-fake traceability system based on mobile intelligent terminal according to claim 10, is characterized in that, also comprise monitoring and warning and trace to the source module in described fake certification server, to trace to the source information for the false proof examination of proving under all states of inquiry product.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410819097.9A CN104463606B (en) | 2014-12-25 | 2014-12-25 | A kind of false proof source tracing method and system based on mobile intelligent terminal |
PCT/CN2015/095610 WO2016101760A1 (en) | 2014-12-25 | 2015-11-26 | Anti-counterfeit method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410819097.9A CN104463606B (en) | 2014-12-25 | 2014-12-25 | A kind of false proof source tracing method and system based on mobile intelligent terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104463606A true CN104463606A (en) | 2015-03-25 |
CN104463606B CN104463606B (en) | 2017-09-05 |
Family
ID=52909598
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410819097.9A Active CN104463606B (en) | 2014-12-25 | 2014-12-25 | A kind of false proof source tracing method and system based on mobile intelligent terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104463606B (en) |
WO (1) | WO2016101760A1 (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105654316A (en) * | 2016-01-04 | 2016-06-08 | 河海大学 | NFC product anti-counterfeiting traceability system and anti-counterfeiting traceability method thereof |
WO2016101760A1 (en) * | 2014-12-25 | 2016-06-30 | 张世龙 | Anti-counterfeit method and system |
CN106600296A (en) * | 2016-12-16 | 2017-04-26 | 北京慧眼智行科技有限公司 | Total quantity control-based anti-counterfeiting tracing method and system |
CN106651404A (en) * | 2016-12-30 | 2017-05-10 | 王清萍 | Item anti-counterfeiting analysis method and item anti-counterfeiting analysis system |
CN106997540A (en) * | 2017-03-22 | 2017-08-01 | 北京向芯力科技有限公司 | A kind of commodity counterfeit prevention traceability system and method based on dual authentication mechanism |
CN107665436A (en) * | 2016-07-29 | 2018-02-06 | 吴茂全 | The fake certification device and method of article |
CN108763939A (en) * | 2018-05-02 | 2018-11-06 | 开源物联网(广州)有限公司 | The encryption method and encryption system of security code |
CN110310130A (en) * | 2019-06-19 | 2019-10-08 | 张学忠 | A kind of method for anti-counterfeit and system |
CN110472710A (en) * | 2019-07-31 | 2019-11-19 | 安徽连营电子科技有限公司 | Rice paper anti-fake traceability system based on internal implantation RFID intelligent chip |
CN110517053A (en) * | 2019-09-02 | 2019-11-29 | 武汉长利新材料科技有限公司 | A kind of product transfers the possession of anti-fake source tracing method and system |
CN110533128A (en) * | 2019-08-21 | 2019-12-03 | 上海唯链信息科技有限公司 | A kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption |
CN110675171A (en) * | 2019-09-29 | 2020-01-10 | 匿名科技(重庆)集团有限公司 | Anti-counterfeiting tracing method based on block chain |
CN111460341A (en) * | 2020-04-01 | 2020-07-28 | 北京德豹科技有限公司 | Double anti-counterfeiting checking method |
CN111708955A (en) * | 2020-06-10 | 2020-09-25 | 武汉钢铁有限公司 | Steel product anti-counterfeiting verification system based on two-dimensional code |
CN111898165A (en) * | 2020-07-09 | 2020-11-06 | 宁波浙大联科科技有限公司 | Technical parameter change tracing method and system in PDM system |
CN112508582A (en) * | 2020-11-17 | 2021-03-16 | 广东职业技术学院 | Multiple invisible pattern anti-counterfeiting system |
CN112669536A (en) * | 2020-12-16 | 2021-04-16 | 建信金融科技有限责任公司 | Management method, management system, management device and medium for shared articles |
CN113435917A (en) * | 2021-08-24 | 2021-09-24 | 深圳市将维可变数据赋码技术有限公司 | Anti-counterfeiting tracing method and system based on block chain |
CN114826621A (en) * | 2022-06-27 | 2022-07-29 | 中化现代农业有限公司 | Seed tracing method and device, electronic equipment and storage medium |
CN118229308A (en) * | 2024-05-23 | 2024-06-21 | 北京中科金有限元技术有限公司 | Multi-mode anti-counterfeiting verification method and system based on deep learning |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109102302A (en) * | 2018-03-20 | 2018-12-28 | 黎凯还 | A kind of distributed validation method for anti-counterfeit based on Internet technology |
CN109298843A (en) * | 2018-11-29 | 2019-02-01 | 珠海趣印科技有限公司 | A kind of print system |
CN109635551B (en) * | 2018-12-18 | 2022-11-22 | 有份儿智慧科技股份有限公司 | Method for anti-counterfeiting tracing and authenticating information data through digital intelligent terminal |
CN110210871A (en) * | 2019-02-15 | 2019-09-06 | 浙江萨宝信息科技有限公司 | A kind of false proof device and its method of cash register |
CN111027983A (en) * | 2019-08-23 | 2020-04-17 | 北京中电华大电子设计有限责任公司 | Anti-counterfeiting identification method and system for intelligent household appliance |
CN113673999A (en) * | 2020-05-01 | 2021-11-19 | 福州英流信息科技有限公司 | Article tracing anti-counterfeiting identification authentication system and method |
CN112001630B (en) * | 2020-08-24 | 2024-05-31 | 中国建材检验认证集团股份有限公司 | Product quality monitoring method and device |
CN113516482B (en) * | 2020-08-28 | 2024-04-05 | 王东升 | Anti-fake password and anti-fake method |
CN112381553B (en) * | 2020-11-20 | 2024-05-28 | 王永攀 | Product anti-counterfeiting method |
CN112561546A (en) * | 2020-12-29 | 2021-03-26 | 郭昆 | Anti-counterfeiting traceability system and method based on Internet of things |
CN112686074B (en) * | 2020-12-29 | 2023-06-16 | 永发(河南)模塑科技发展有限公司 | Intelligent packaging box capable of checking information of articles in box and checking method thereof |
CN113239067B (en) * | 2021-04-30 | 2023-07-18 | 国网河北省电力有限公司沧州供电分公司 | Anti-counterfeiting method for right-confirming certificate |
CN113159690A (en) * | 2021-05-08 | 2021-07-23 | 包头市畅行交通信息科技有限公司 | Method and system for anti-counterfeiting tracing of cross-border commodities based on Internet of things |
CN113693297A (en) * | 2021-09-28 | 2021-11-26 | 深圳市吉迩科技有限公司 | Anti-counterfeiting method for aerosol generating device and aerosol generating device |
CN114363897A (en) * | 2021-11-02 | 2022-04-15 | 四川天邑康和通信股份有限公司 | Method and system for identifying and inquiring authenticity of two-dimensional code of pon terminal device |
CN118153599B (en) * | 2024-02-21 | 2024-08-23 | 江苏稻源科技集团有限公司 | High-frequency anti-counterfeiting method and system based on UID reading counting |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101458806A (en) * | 2009-01-09 | 2009-06-17 | 黄建湘 | Mobile phone electronic ticket anti-counterfeiting verification method and system |
CN102289767A (en) * | 2011-08-19 | 2011-12-21 | 段红双 | Commodity anti-counterfeiting method |
CN102376031A (en) * | 2011-05-27 | 2012-03-14 | 徐良雨 | Anti-counterfeiting tracking system using chip to identify articles |
CN102411750A (en) * | 2011-11-09 | 2012-04-11 | 浙江腾昌信息科技有限公司 | Digital dual anti-counterfeiting authentication system and method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104463606B (en) * | 2014-12-25 | 2017-09-05 | 张世龙 | A kind of false proof source tracing method and system based on mobile intelligent terminal |
-
2014
- 2014-12-25 CN CN201410819097.9A patent/CN104463606B/en active Active
-
2015
- 2015-11-26 WO PCT/CN2015/095610 patent/WO2016101760A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101458806A (en) * | 2009-01-09 | 2009-06-17 | 黄建湘 | Mobile phone electronic ticket anti-counterfeiting verification method and system |
CN102376031A (en) * | 2011-05-27 | 2012-03-14 | 徐良雨 | Anti-counterfeiting tracking system using chip to identify articles |
CN102289767A (en) * | 2011-08-19 | 2011-12-21 | 段红双 | Commodity anti-counterfeiting method |
CN102411750A (en) * | 2011-11-09 | 2012-04-11 | 浙江腾昌信息科技有限公司 | Digital dual anti-counterfeiting authentication system and method |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016101760A1 (en) * | 2014-12-25 | 2016-06-30 | 张世龙 | Anti-counterfeit method and system |
CN105654316A (en) * | 2016-01-04 | 2016-06-08 | 河海大学 | NFC product anti-counterfeiting traceability system and anti-counterfeiting traceability method thereof |
CN107665436A (en) * | 2016-07-29 | 2018-02-06 | 吴茂全 | The fake certification device and method of article |
CN106600296A (en) * | 2016-12-16 | 2017-04-26 | 北京慧眼智行科技有限公司 | Total quantity control-based anti-counterfeiting tracing method and system |
CN106600296B (en) * | 2016-12-16 | 2021-01-15 | 北京慧眼智行科技有限公司 | Anti-counterfeiting traceability method and system based on total amount control |
CN106651404A (en) * | 2016-12-30 | 2017-05-10 | 王清萍 | Item anti-counterfeiting analysis method and item anti-counterfeiting analysis system |
CN106651404B (en) * | 2016-12-30 | 2021-02-02 | 王清萍 | Article anti-counterfeiting analysis method and article anti-counterfeiting analysis system |
CN106997540A (en) * | 2017-03-22 | 2017-08-01 | 北京向芯力科技有限公司 | A kind of commodity counterfeit prevention traceability system and method based on dual authentication mechanism |
CN108763939A (en) * | 2018-05-02 | 2018-11-06 | 开源物联网(广州)有限公司 | The encryption method and encryption system of security code |
CN110310130A (en) * | 2019-06-19 | 2019-10-08 | 张学忠 | A kind of method for anti-counterfeit and system |
CN110472710A (en) * | 2019-07-31 | 2019-11-19 | 安徽连营电子科技有限公司 | Rice paper anti-fake traceability system based on internal implantation RFID intelligent chip |
CN110472710B (en) * | 2019-07-31 | 2022-04-19 | 安徽连营电子科技有限公司 | Rice paper anti-counterfeiting traceability system based on internally-implanted RFID intelligent chip |
CN110533128A (en) * | 2019-08-21 | 2019-12-03 | 上海唯链信息科技有限公司 | A kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption |
CN110533128B (en) * | 2019-08-21 | 2023-08-04 | 上海唯链信息科技有限公司 | Encryption-based anti-counterfeiting traceability data processing method, device, system and medium |
CN110517053A (en) * | 2019-09-02 | 2019-11-29 | 武汉长利新材料科技有限公司 | A kind of product transfers the possession of anti-fake source tracing method and system |
CN110675171A (en) * | 2019-09-29 | 2020-01-10 | 匿名科技(重庆)集团有限公司 | Anti-counterfeiting tracing method based on block chain |
CN111460341A (en) * | 2020-04-01 | 2020-07-28 | 北京德豹科技有限公司 | Double anti-counterfeiting checking method |
CN111708955A (en) * | 2020-06-10 | 2020-09-25 | 武汉钢铁有限公司 | Steel product anti-counterfeiting verification system based on two-dimensional code |
CN111898165A (en) * | 2020-07-09 | 2020-11-06 | 宁波浙大联科科技有限公司 | Technical parameter change tracing method and system in PDM system |
CN112508582A (en) * | 2020-11-17 | 2021-03-16 | 广东职业技术学院 | Multiple invisible pattern anti-counterfeiting system |
CN112669536A (en) * | 2020-12-16 | 2021-04-16 | 建信金融科技有限责任公司 | Management method, management system, management device and medium for shared articles |
CN113435917A (en) * | 2021-08-24 | 2021-09-24 | 深圳市将维可变数据赋码技术有限公司 | Anti-counterfeiting tracing method and system based on block chain |
CN114826621A (en) * | 2022-06-27 | 2022-07-29 | 中化现代农业有限公司 | Seed tracing method and device, electronic equipment and storage medium |
CN118229308A (en) * | 2024-05-23 | 2024-06-21 | 北京中科金有限元技术有限公司 | Multi-mode anti-counterfeiting verification method and system based on deep learning |
CN118229308B (en) * | 2024-05-23 | 2024-07-23 | 北京中科金有限元技术有限公司 | Multi-mode anti-counterfeiting verification method and system based on deep learning |
Also Published As
Publication number | Publication date |
---|---|
CN104463606B (en) | 2017-09-05 |
WO2016101760A1 (en) | 2016-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104463606A (en) | Anti-fake tracing method and system based on mobile intelligent terminal | |
Abeyratne et al. | Blockchain ready manufacturing supply chain using distributed ledger | |
William et al. | Framework for product anti-counterfeiting using blockchain technology | |
CN109949058A (en) | Antifake method for products, device, electronic equipment and read/write memory medium | |
CN105654316A (en) | NFC product anti-counterfeiting traceability system and anti-counterfeiting traceability method thereof | |
WO2007107068A1 (en) | Anti-forgery method and apparatus based on cpk electronic label | |
CN110310130B (en) | Anti-counterfeiting method and system | |
CN104217241A (en) | Electronic anti-fake label and realizing method | |
JP2016511466A (en) | Product counterfeit prevention discrimination method | |
Hetcher | Changing the Social meaning of privacy in Cyberspace | |
CN101814152B (en) | Anti-counterfeit method and system based on readable identification code and answerback code of identification code | |
CN113450092A (en) | Block chain network-based article safe and efficient transaction method, system and storage medium | |
KR101798603B1 (en) | Manufacturing method of label comprising a code for certificating an item's authentication | |
CN109472620A (en) | A kind of anti-fake and integrating system based on block chain | |
CN111967821A (en) | Method, device, equipment and system for generating clearance confirmation information | |
CN112070567B (en) | Quality control system based on block chain and control method thereof | |
CN108985431A (en) | A kind of method of antifalsification label and its commodity genuine piece of Testing and appraisal registered trademark | |
KR20150045543A (en) | Genuine product certification and sns posting system, and method using nfc tag and smart phone | |
CN106815614A (en) | A kind of bank acceptance Antiforge system of use NFC anti-counterfeiting technologies | |
CN109003097A (en) | A kind of antifake method for products | |
Zhang | Internet of things supervision system and supply chain financial supervision methods based on blockchain technology | |
CN103778540A (en) | Verification system and method thereof | |
CN105894302A (en) | Product anti-counterfeiting method | |
CN100399346C (en) | Combined address identification system and method, and automatic identification device | |
CN108694585A (en) | The internet trading system of compound authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190116 Address after: 510000 First Floor 101, 58 Jinzhongheng Road, Baiyun District, Guangzhou City, Guangdong Province Patentee after: Guangzhou Longsheng Technology Co., Ltd. Address before: 510240 Academy of Information Sciences, No. 24 Dongsha Street, Textile Road, Haizhu District, Guangzhou City, Guangdong Province Patentee before: Zhang Shilong |
|
TR01 | Transfer of patent right |