CN104463606A - Anti-fake tracing method and system based on mobile intelligent terminal - Google Patents

Anti-fake tracing method and system based on mobile intelligent terminal Download PDF

Info

Publication number
CN104463606A
CN104463606A CN201410819097.9A CN201410819097A CN104463606A CN 104463606 A CN104463606 A CN 104463606A CN 201410819097 A CN201410819097 A CN 201410819097A CN 104463606 A CN104463606 A CN 104463606A
Authority
CN
China
Prior art keywords
security code
intelligent terminal
mobile intelligent
product
fake
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410819097.9A
Other languages
Chinese (zh)
Other versions
CN104463606B (en
Inventor
张世龙
唐雅娜
郑建华
罗慧慧
邱科宁
沈玉利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Longsheng Technology Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410819097.9A priority Critical patent/CN104463606B/en
Publication of CN104463606A publication Critical patent/CN104463606A/en
Priority to PCT/CN2015/095610 priority patent/WO2016101760A1/en
Application granted granted Critical
Publication of CN104463606B publication Critical patent/CN104463606B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the technical field of product safety, in particular to an anti-fake tracing method and system based on a mobile intelligent terminal. The method comprises the steps that S1 the mobile intelligent terminal reads an anti-fake code and sends the anti-fake code and an identification number corresponding to the mobile intelligent terminal to an anti-fake authentication server; S2 the anti-fake authentication server judges whether the received anti-fake code is legal, if yes, step S3 is executed, and if not, a message that the anti-fake code is illegal is sent back; S3 the anti-fake authentication server judges whether the terminal is a current owner of the anti-fake code or a trial user capable of conducting checking a certain times according to the received terminal identification number, if yes, it is verified that the terminal is qualified, and if not, a message that the terminal does not have a permission to check the anti-fake code is sent back. The method and the system are based on the mobile intelligent terminal, the mobile intelligent terminal is high in popularizing rate, real consumers can easily get involved in an anti-fake system, the anti-fake check process can be completed, cost is low, and verification is easy.

Description

A kind of false proof source tracing method based on mobile intelligent terminal and system
Technical field
The present invention relates to product safety technical field, more specifically, relate to a kind of false proof source tracing method based on mobile intelligent terminal and system.
Background technology
Fake and inferior commodities flood market, and seriously compromise the interests of consumer, bring huge economic loss to commodity production enterprise, have very large social harm.Anti-counterfeiting technology develops into today, and known method for anti-counterfeit, technology and product are innumerable, and main anti-fake product comprises three major types: vision judges, consulting judges, equipment judges:
1), vision judges, i.e. the naked eyes mode of distinguishing true from false.As laser hologram, texture, radium-shine, Ultraluminescence, day phototropic, heat-sensitive variable colour, pressure-sensitive variable color, wet sensitive colour changing, accurate version line, micro printing, thermochromic liquid crystal, super wiping distortion, disposable broken picture and text, open type duplicature applique, irreversible memory-type temperature-sensitive, reversible feel heat-sensitive variable colour, paper water wave, cholesteryl liquid crystal, the miniature stealth of graphic code etc.If adopt the anti-fake product of this technology to identify content and method simply, be then easy to imitated, do not reach antifalse effect; If identify content and method too loaded down with trivial details, then need certain identification experience, be unfavorable for promoting the use of.This technology is owing to only judging the true and false of label by macroscopic visual simultaneously, inaccurate, not rigorous.
2), seek advice from judgement, namely undertaken inquiring about the mode of distinguishing true from false by phone, note, internet etc.If adopt the anti-fake product of this technology not limit inquiry times, then inquiry code can be replicated easily, and antifalse effect is poor; If be defined as one yard of inquiry mode once, then exist before purchasing cannot verify, can only the deficiency of disposable checking.This technology is due to the correctness of only feedback query code book body simultaneously, or only can inform and be queried number of times, the judgement of certified products allows buyer judge voluntarily usually, and Query Result is difficult to convince people, and exist crack, bribe purchase digital come imitated possibility, rigorous not, confidence level is not high.
3), equipment judges, namely use the specialized equipment mode of distinguishing true from false, true and false information shows on specialized equipment.As holographic magnetic card, magnetic ink, smart credit card, bar code, Quick Response Code, metallic barcode, IC-card, rfid card, laser card, biochemistry, atomic nucleus double card, electronic recognition, nuclear track technique etc.By specialized equipment self or send data to the webserver and carry out encryption and decryption and examination during examination, ping procedure is to user transparent, simple, convenient, and product can repeatedly be checked after before sales, has certain practicality and anti-counterfeit capability.The electronic anti-counterfeit tag of some of them anti-fake product is also built-in with random code generator or sequence number generator, realizes often verifying once, and verifying end/server all produces a new random code or sequence number, to product identification; Some anti-fake products additionally provide independent authentication or the two-way authentication function of label and dedicated identification device; Some anti-fake products, also based on PKI/CA pattern, are encrypted product information, identifying code, sequence number/sequence number, implement multistage encryption and decryption, digital signature etc.Although such technology adds imitated difficulty to some extent, but due to the true and false need be judged by specialized equipment, cost is high, versatility is not strong, more crucially, checking means are single, without other, checking means are proved to the puppet checking of imitated identification equipment, although some method for anti-counterfeit proposes label, identification equipment bi-directional verification, if but imitated identification equipment only carries out the puppet reading of label information and the puppet connection examination of server, then emulate to present and " be verified, certified products " information prompting, then crack the method for anti-counterfeit such as bi-directional verification easily, thus realize the object of deception consumer, anti-counterfeit capability surface is powerful, actually very fragile.
In sum, existing method for anti-counterfeit and technology are still relied mainly on prevention, all strengthen from technical standpoint imitated cost of faking, increase imitated complexity of faking, thus reduce imitated possibility of faking, by constantly updating counterfeit protection measures and technique, cost is caused constantly to raise, but cannot predict/anti-the pseudoperiod (being imitated from putting into) of the current counterfeit protection measures of early warning, cause the multiple counterfeit protection measures in the market of identical product and deposit, domestic consumer is puzzlement more.To really address this problem, the cost of manufacture of Antiforge system must be very low, and examination mode is simple, repeatedly checks after purchasing before purchasing, have and independently prove checking method to identify pseudo-checking situation, there is audit when doubtful imitation products is checked and warning function.
Summary of the invention
The present invention, for overcoming at least one defect (deficiency) described in above-mentioned prior art, provides that a kind of cost is low, examination is simply based on the false proof source tracing method of mobile intelligent terminal.
The present invention also provides that a kind of cost is low, examination is simply based on the anti-fake traceability system of mobile intelligent terminal.
For solving the problems of the technologies described above, technical scheme of the present invention is as follows:
Based on a false proof source tracing method for mobile intelligent terminal, comprising:
S1. mobile intelligent terminal reads security code and security code and identification number corresponding to mobile intelligent terminal is sent to fake certification server;
S2. fake certification server judges that whether the security code received is legal, if legal, perform step S3, otherwise returns security code information unauthorized;
S3. by the terminal iidentification number received, fake certification server judges that whether this terminal is the current entitlement person of this security code, if then return the information that Product Validation is certified products, otherwise returns the information that terminal does not have security code examination authority.
In such scheme, the identification number that described mobile intelligent terminal is corresponding be cell-phone number, IMSI or other can one in No. ID of distinctive mark terminal.
In such scheme, described security code stochastic generation, security code and corresponding product coding, the Product Status of stochastic generation are stored in fake certification server.
In such scheme, described security code directly or after encryption forms antifalsification label, the physical interconnection one to one of antifalsification label and corresponding product in generation two-dimension code label or write radio electronic label.
In such scheme, the initial setting up mode of security code current ownership person is as follows:
Predistribution, when circulating initial, is that the security code that the mobile intelligent terminal identification number of the initial entitlement person of product is corresponding with product is bound by product in fake certification server.
In such scheme, security code current ownership person changes with Product Status change, and concrete alter mode is as follows:
When Product Status changes, be sent in fake certification server by the identification number of its terminal iidentification number, security code and the mobile intelligent terminal B that changes to new entitlement person in advance after the mobile intelligent terminal A of security code current ownership reads security code, application is changed;
Fake certification server authentication security code and security code current ownership person legal after, generate and change authority checking code C, and change authority checking code C is sent to mobile intelligent terminal B;
Mobile intelligent terminal B performs and changes authority checking operation, is sent in fake certification server by its terminal iidentification number with change authority checking code C;
After authority checking code C legitimacy is changed in fake certification server authentication, change security code current ownership person is terminal B, and change terminal A is invalid to the entitlement of this security code, and revises corresponding product state.
In such scheme, in described step S3, fake certification server judges that mobile intelligent terminal is not also perform following steps after security code current ownership person:
S4. fake certification server judges whether this terminal is that this security code tries out power person, if then perform step S5, otherwise returns the information that this terminal does not have security code examination authority;
S5. fake certification server judges whether this terminal checking on probation number of times is greater than threshold value, if then checking number of times on probation subtracts 1 and returns the information that Product Validation is certified products, otherwise returns the information of trying out checking number of times and being finished.
In such scheme, having the mobile intelligent terminal that security code tries out power is perform recommendation operation on probation by security code current ownership mobile intelligent terminal to obtain, and is specially:
Security code current ownership mobile intelligent terminal A reads after security code and is sent in fake certification server by the identification number of its terminal iidentification number, security code and the mobile intelligent terminal B that is recommended as power person on probation in advance, and application is on probation to be recommended;
Fake certification server authentication security code and security code current ownership person legal after, generate authority checking code D on probation, and authority checking code D on probation be sent to mobile intelligent terminal B;
Mobile intelligent terminal B performs authority checking operation on probation, is sent in fake certification server by its terminal iidentification number with authority checking code D on probation;
After fake certification server authentication authority checking code D legitimacy, the newly-increased security code that stores tries out the attribute data weighing terminal: the identification number of terminal B, number of inspections on probation and attribute on probation.
In such scheme, described method also comprises data stream in fake certification server and all backups to monitoring and warning and to trace to the source database, and the false proof examination of tracing to the source under all states of database evidence inquiry product by monitoring and warning is traced to the source information.
 
Based on an anti-fake traceability system for mobile intelligent terminal, comprise mobile intelligent terminal and fake certification server:
Mobile intelligent terminal comprises:
Security code read module, for reading security code;
Security code interactive module, for being sent in fake certification server by security code and terminal iidentification number corresponding to mobile intelligent terminal and receiving return message;
Fake certification server comprises:
Transceiver module, for receiving security code and the terminal iidentification number of the transmission of security code interactive module;
Security code authentication module, whether legal for judging the security code received, if then notice checks Authority Verification module, otherwise notice sending module;
For the terminal iidentification by receiving number, examination Authority Verification module, judges whether terminal is security code current ownership person or power person on probation, and the result is notified sending module;
Sending module, for the result according to security code authentication module and examination Authority Verification module, send the information of " security code is illegal ", or the information of " Product Validation is certified products ", or the information of " terminal does not have security code examination authority ", or the information of " checking number of times on probation is finished " is to the interactive module of mobile intelligent terminal.
In such scheme, also comprise security code information storage module in described fake certification server, for storing security code and product coding, the Product Status corresponding with security code, wherein security code is generated by random fashion.
In such scheme, also comprise monitoring and warning in described fake certification server and to trace to the source module, to trace to the source information for the false proof examination of proving under all states of inquiry product.
Compared with prior art, the beneficial effect of technical solution of the present invention is:
1) the present invention is based on mobile intelligent terminal, and mobile intelligent terminal popularity rate is high, actual customer can get involved false proof system like a cork, can improve the process of Antiforge inquiry, with low cost, and checking is simple.
2) the present invention is by setting up product false proof code examination authority tree and product total state ping procedure message sense, security code and examination mobile intelligent terminal are bound, allow product pre-sales, carry out repeatedly true and false examination after sale, ensure that credibility and the uniqueness of product false proof code proof procedure by binding mobile intelligent terminal simultaneously.
3) the present invention changes effective examination mobile intelligent terminal of product by the proprietorial change of product, and specifically can limit number of inspections, examination mobile intelligent terminal and number of inspections can be arranged targetedly according to the proprietorial change of product, the renewal of number of inspections and Product Status also will in fake certification server record, make the sales volume of counterfeit security code product limited, counterfeit income and counterfeit benefit cost ratio very low; And can automatically enter early warning process when certified products enters when sales section cannot be sold, because store the mobile intelligent terminal identification number (as cell-phone number) of the association of adulterant examination originally in system, in order to crack down on counterfeit goods, evidence obtaining offers convenience, increase counterfeit danger coefficient, effectively can contain and hit counterfeit behavior.
4) the present invention also synchronously provides monitoring and warning to trace to the source database, realize the query function of tracing to the source of the circulation examination information to antifalsification label (product), be independently assist evidence process, effectively prevent the puppet checking situation that mobile intelligent terminal forges examination result.
5) the present invention constructs the false proof system of efficient system, and counterfeiter only has the whole system of imitation, just may forge in a large number sole product, considerably increase counterfeit cost, reduce counterfeit possibility.
Accompanying drawing explanation
Fig. 1 is the particular flow sheet of a kind of false proof source tracing method based on mobile intelligent terminal of the present invention.
Fig. 2 is that the present invention is a kind of based on product entitlement person changing process schematic diagram in the false proof source tracing method of mobile intelligent terminal.
Fig. 3 is that the present invention is a kind of based on recommending examination user schematic flow sheet on probation in the false proof source tracing method of mobile intelligent terminal.
Fig. 4 is a kind of false proof source tracing method specific embodiment based on mobile intelligent terminal of the present invention based on system architecture schematic diagram.
Fig. 5 is a kind of security code examination authority tree schematic diagram based on building in the false proof source tracing method specific embodiment of mobile intelligent terminal of the present invention.
Fig. 6 is that the examination of a kind of false proof source tracing method based on mobile intelligent terminal of the present invention is traced to the source acquisition of information process flow diagram.
Embodiment
Accompanying drawing, only for exemplary illustration, can not be interpreted as the restriction to this patent;
In order to better the present embodiment is described, some parts of accompanying drawing have omission, zoom in or out, and do not represent the size of actual product;
To those skilled in the art, in accompanying drawing, some known features and explanation thereof may be omitted is understandable.
In describing the invention, it is to be appreciated that term " first ", " second " only for describing object, and can not be interpreted as the quantity of instruction or hint relative importance or implicit indicated technical characteristic.Thus, one or more these features can be expressed or impliedly be comprised to the feature of " first ", " second " of restriction.In describing the invention, except as otherwise noted, the implication of " multiple " is two or more.
In describing the invention, it should be noted that, unless otherwise clearly defined and limited, term " installation ", " connection " should be interpreted broadly, and such as, can be fixedly connected with, also can be removably connect, or connect integratedly; Can be mechanical connection, also can be electrical connection; Can be directly be connected, also can be indirectly connected by intermediary, the connection of two element internals can be said.For the ordinary skill in the art, concrete condition above-mentioned term can be understood at concrete meaning of the present invention.
Below in conjunction with drawings and Examples, technical scheme of the present invention is described further.
Embodiment 1
As shown in Figure 1, be the process flow diagram of a kind of false proof source tracing method based on mobile intelligent terminal of the present invention.See Fig. 1, the concrete steps of a kind of false proof source tracing method based on mobile intelligent terminal of this specific embodiment comprise:
S101. mobile intelligent terminal reads security code and security code and identification number corresponding to mobile intelligent terminal is sent to fake certification server;
S102. fake certification server judges that whether the security code received is legal, if legal, perform step S103, otherwise returns security code information unauthorized;
S103. by the terminal iidentification number received, fake certification server judges that whether this terminal is the current entitlement person of this security code, if then return the information that Product Validation is certified products, otherwise performs step S104;
S104. fake certification server judges whether this terminal is that this security code tries out power person, if then perform step S105, otherwise returns the information that this terminal does not have security code examination authority;
S105. fake certification server judges whether this terminal checking on probation number of times is greater than threshold value, if then checking number of times on probation subtracts 1 and returns the information that Product Validation is certified products, otherwise returns the information of trying out checking number of times and being finished.
Wherein, the identification number that mobile intelligent terminal is corresponding be cell-phone number, IMSI or other can one in No. ID of distinctive mark terminal.
Wherein, described security code is produced by random fashion, has uniqueness with product one_to_one corresponding.Security code and corresponding product coding, the Product Status of stochastic generation are stored in fake certification server.Preferably, in fake certification server, build security code information bank to store security code relevant information, realize the logic association of security code and product after the product coding write security code information bank corresponding with security code, and Product Status is set for " stock ".
Concrete security code information bank can build data structure main body according to self-defined mode when storing, and stores as built following data structure main body:
[security code, product coding, Product Status].
Directly or after encryption antifalsification label is formed in generation two-dimension code label or write radio electronic label after security code stochastic generation.
The opening part of product or its external packing can be fixed on by modes such as stickups, with product physical interconnection during antifalsification label application; When product or external packing are opened, antifalsification label will cause security code to read thereupon by breakage and lose efficacy.
In this specific embodiment, security code and security code current ownership mobile intelligent terminal are bound, only have and can carry out security code examination by the mobile intelligent terminal of binding, ensure that the legitimacy of examination.And except current ownership terminal, recommend mobile intelligent terminal on probation also can check the security code true and false by it, the mobile intelligent terminal scope that can check is extended with the way of recommendation, limit number of inspections by the mobile intelligent terminal character (entitlement person, power person on probation) of binding simultaneously, under the legitimacy prerequisite that ensure that examination, it is the further obstacle of verification setting of pseudo-security code.
In specific implementation process, the initial setting up mode of security code current ownership person is as follows:
Predistribution, when circulating initial, is that the security code that the mobile intelligent terminal identification number of the initial entitlement person of product is corresponding with product is bound by product in fake certification server, and to arrange Product Status be " sale ";
Preferably, as shown in Figure 2, security code current ownership person changes with Product Status change, and concrete alter mode is as follows:
When Product Status changes, be sent in fake certification server by the identification number of its terminal iidentification number, security code and the mobile intelligent terminal B that changes to new entitlement person in advance after the mobile intelligent terminal A of security code current ownership reads security code, application is changed;
Fake certification server authentication security code and security code current ownership person legal after, generate and change authority checking code C, and change authority checking code C is sent to mobile intelligent terminal B with communication form such as notes; Mobile intelligent terminal B performs and changes authority checking operation, is sent in fake certification server by its terminal iidentification number with change authority checking code C;
After authority checking code C legitimacy is changed in fake certification server authentication, change security code current ownership person is terminal B, and change terminal A is invalid to the entitlement of this security code, and revises corresponding product state.
In specific implementation process, as shown in Figure 3, having the mobile intelligent terminal that security code tries out power is perform recommendation operation on probation by security code current ownership mobile intelligent terminal to obtain, and is specially:
Security code current ownership mobile intelligent terminal A reads after security code and is sent in fake certification server by the identification number of its terminal iidentification number, security code and the mobile intelligent terminal B that is recommended as power person on probation in advance, and application is on probation to be recommended;
Fake certification server authentication security code and security code current ownership person legal after, generate authority checking code D on probation, and authority checking code D on probation be sent to mobile intelligent terminal B with communication form such as notes;
Mobile intelligent terminal B performs authority checking operation on probation, is sent in fake certification server by its terminal iidentification number with authority checking code D on probation;
After fake certification server authentication authority checking code D legitimacy, the newly-increased security code that stores tries out the attribute data weighing terminal: the identification number of terminal B, number of inspections on probation and attribute on probation.
In specific implementation process, described method of the present invention also comprises data stream in fake certification server and all backups to monitoring and warning and to trace to the source database, and the false proof examination of tracing to the source under all states of database evidence inquiry product by monitoring and warning is traced to the source information.Specifically trace to the source information inquiry mode as shown in Figure 6.
Based on above-mentioned specific embodiment, a specific embodiment is provided to set forth method of the present invention further based on method of the present invention below.
In this specific embodiment, as shown in Figure 4, include fake certification server 201, to trace to the source the web terminal 205 of database as the mobile phone 202 of mobile intelligent terminal, mobile phone 202 possessing the read write line 203 of antifalsification label read functions, product 204 and can connecting monitoring and warning, wherein on product 204, the antifalsification label of its correspondence in physical interconnection.
The generation of security code: the unique security code of random generation, in fake certification server, build security code information bank, the data structure main body of security code information bank is: [security code, product coding, Product Status]; Security code directly or after encryption forms antifalsification label in generation two-dimension code label or write radio electronic label.
Antifalsification label is fixed on the opening part of product or its external packing by modes such as stickups, with product physical interconnection; When product or external packing are opened, antifalsification label will cause security code to read thereupon by breakage and lose efficacy; After security code stochastic generation, product coding and security code are mapped, and product coding are write in security code information table corresponding to security code information bank, realize the logic association of security code and product, and Product Status is set for " stock ".
In order to review each state in intermediate links of product and process, this example has preset the multiple state of product, comprise " stock ", " sale ", " purchase ", " gifting " etc.
Production marketing personnel certification cellphone information storehouse is built in fake certification server, data structure main body is: [sales force's cell-phone number, store numbers, sales force numbers, authenticated time, effective status], [effective status] initial value is " effectively ", when certain sales force leaves office, amendment [effective status] value is engineering noise.
During product introduction sales section, change Product Status for " sale " in fake certification server, in fake certification server, now build this security code mandate examination certification tree, it is one-to-one relationship that security code and certification are set.The data structure of certification tree node is: [node type allows examination cell-phone number, allows number of inspections, child pointers], and wherein [node type] value is " production marketing ", " product purchase ", " product is gifted ", " checking on probation "; [allowing examination cell-phone number] can have one or more cell-phone number, multiple cell-phone number CSV in root node, and can only be effective sales force's certification cell-phone number; Have in remaining descendant nodes and can only have a cell-phone number, the cell-phone number in tree in each node allows to repeat; [permission number of inspections] value be 0(represent do not allow checking), 1(represent allow checking once) ,-1(indicate without checking number of times limit); Wherein node type is the node of " production marketing " can only be root node, the child nodes of node type to be the node of " product purchase " can only be root node, and the type node can only have one at most in certification tree; Node type is the node of " checking on probation " can only be leaf node.
In concrete building process, person is corresponding with Product Status for security code current ownership, in binding procedure, the number of inspections of security code current ownership person is not limited, but the number of inspections of non-security code current ownership person is set to 1 time usually, and need by recommending the mode of trying out to obtain legal examination authority.
When building security code mandate examination certification tree first in fake certification server, the root node type setting up examination certification tree is " production marketing ", number of inspections is allowed to be-1, allow examination cell-phone number to be one or more effective sales force's certification cell-phone numbers, change Product Status is " sale " state simultaneously.Complete the logic binding of security code and sales force's certification cell-phone number.
Therefore based on this mode, during security code mandate examination certification tree initial construction, product is in distribution state, now security code current ownership person is sales force, now the original state of product is distribution state, automatically constructs the cell-phone number of sales force and the binding relationship of security code in security code mandate examination certification tree.When Product Status changes, child nodes can be formed in security code mandate examination certification tree to upgrade data corresponding to security code examination certification.
In a particular application, corresponding APP software can be installed in smart mobile phone to inquire about.As shown in Figure 2, during the authenticity verification of concrete checking antifalsification label (product), APP software is run in smart mobile phone, directly or indirectly read security code information in antifalsification label by built-in camera or extrapolation (external) read write line, APP software is submitted to fake certification server the information such as security code information, self cell-phone number read; Fake certification server is verified security code according to proof rule, illustrates proof procedure below by citing proof rule:
Rule 1: security code is effectively legal: the security code of checking must to be cell-phone number that is legal and checking must be in the examination certification tree node of this security code " allowing examination cell-phone number ", and the permission number of inspections value of this node is 1 or-1.
Rule 2: if security code state be " sale " state, examination cell-phone number appears in the root node of this security code mandate examination certification tree, node number of inspections be-1, then allow this mobile phone checking true and false and return certified products information.Do not change the number of inspections of this node after examination, accumulative cell-phone number is to the number of inspections of security code.
Rule 3: if security code state is " sale " state, one or more certification sales force mobile phones in the root node of this security code mandate examination certification tree, other user mobile phones one or more can be recommended in APP to carry out examination on probation, in this security code mandate examination certification tree, newly-built child nodes under its place node (i.e. root node), the name of this child nodes is called " checking on probation ", and number of inspections is 1, and examination cell-phone number is recommended cell-phone number on probation.This recommendation process can flow process as shown in Figure 3 operate
Rule 4: if security code state be " sale " state, examination cell-phone number appears in this security code mandate examination certification tree non-root node, node number of inspections is 1, then allow this mobile phone to check and return certified products information, and containing additional information: " distribution state; checking can only be tried out once, after buying, checking number of times is unrestricted ".After examination, the number of inspections value of this node of change is 0, and accumulative cell-phone number is to the number of inspections of this security code.
Rule 5: if security code state is " sale " state, one or more certification sales force mobile phones in the root node of this security code mandate examination certification tree, revising security code state when product is sold by APP is " purchase " state, in this security code mandate examination certification tree, the number of inspections of its place node (i.e. root node) is revised as 0, newly-built child nodes under its place node, the name arranging this child nodes is called " product purchase ", number of inspections is-1, and examination cell-phone number is buyer's cell-phone number.
Rule 6: if security code state is " purchase " state, examination cell-phone number occurs that the nodename of this security code mandate examination certification tree is " product purchase ", node number of inspections is "-1 ", then allow this mobile phone verify the true and false and return certified products information.Do not change the number of inspections of this node after examination, accumulative cell-phone number is to the number of inspections of security code.Other user mobile phones one or more can be recommended in APP to check simultaneously, in this security code mandate examination certification tree, newly-built child nodes under its place node, the nodename of this child nodes is " checking on probation ", number of inspections is 1, and examination cell-phone number is recommended cell-phone number.
Rule 7: if security code state be " purchase " state, examination cell-phone number occurs that the non-root node name of this security code mandate examination certification tree is called " on probation checking ", node number of inspections is 1, then allow this mobile phone to check and return certified products information, and containing additional information: " product is sold; sell state; can only try out checking 1 time; as needed repeatedly; then need repeatedly to recommend; or after gifting, verify that number of times is unrestricted ", also can comprise store in return message, sell time, buyer etc. and can to trace to the source information.After examination, the number of inspections value of this node of change is 0, and accumulative cell-phone number is to the number of inspections of this security code.
Rule 8: if security code state is " purchase " state, examination cell-phone number occurs that the nodename of this security code mandate examination certification tree is " product purchase ", node number of inspections is-1, be " gifting " state representing product to the security code state revised in certificate server by APP during other users, in this security code mandate examination certification tree, the number of inspections of its place node is revised as 0, newly-built child nodes under its place node, the name arranging this child nodes is called " product is gifted ", number of inspections is-1, examination cell-phone number is acceptor's cell-phone number.
Rule 9: if security code state be " gifting " state, examination cell-phone number occurs that the nodename of this security code mandate examination certification tree is the mobile phone of " product is gifted ", node number of inspections-1, allow this mobile phone to check and return certified products information, in return message, comprising store, selling the time, buyer, time etc. of gifting can trace to the source information.Other user mobile phones one or more can be recommended in APP to check simultaneously, in this security code mandate examination certification tree, newly-built child nodes under its place node, the nodename of this child nodes is " checking on probation ", number of inspections is 1, and examination cell-phone number is recommended cell-phone number.
Rule 10: if security code state be " gifting " state, examination cell-phone number occurs that the nodename of this security code mandate examination certification tree is the mobile phone of " product is gifted ", node number of inspections-1, product can be again represented to other cellphone subscribers by APP, in this security code mandate examination certification tree, the number of inspections of its place node is revised as 0, newly-built child nodes under its place node, the name arranging this child nodes is called " product is gifted ", number of inspections is-1, and examination cell-phone number is acceptor's cell-phone number.Product number of times of gifting is unrestricted.
Rule 11: do not meeting aforementioned rule, when cannot verify, the examination information returned is as follows:
R11-1: when security code is illegal, returns " security code is illegal, and regular store please be gone to buy ";
R11-2: security code is legal and state is " sale " state, then return " in production marketing, only have sales force's mobile phone of mandate and recommend user mobile phone on probation just can carry out authenticity verification ";
R11-3: security code is legal and state is " purchase " state, then return " product is sold, and only has buyer's mobile phone and recommends user mobile phone on probation just can carry out authenticity verification ";
R11-4: security code is legal and state is " gifting " state, then return " product has been sold and gifted, and only has acceptor's mobile phone and recommends user mobile phone on probation just can carry out authenticity verification ".
Rule 12: set the cellphone subscriber in each node in security code mandate examination certification, all can be traced to the source information by the examination circulation of identifying code inquiry antifalsification label (product) submitting to security code, cell-phone number and mobile phone receive in official WEB website, the overall processes such as information comprises production marketing in chronological order, buys, gifts, examination are traced to the source information, and the examination mobile phone (part cell-phone number shielding processing) each time in process, independently secondary au-thentication process, the puppet checking after faking for preventing APP.
Rule 13: following situation will be traced to the source the examination information such as cell-phone number, examination time write monitoring and warning database, carry out product examination data monitoring and early warning process:
R13-1: when security code is illegal;
R13-2: when the examination of sales force's mobile phone to the legal security code of " distribution state " of certification exists loop situations, if ping procedure is security code 1-> security code 2-> security code 1, the situation of person oneself sell-fake-products that now shows to there is production marketing.
R13-3: bind one or more certification sales force cell-phone number and set up certain security code mandate examination certification tree and this security code mandate examination certification tree when existing, now show to exist adulterant prior to certified products sell may.
R13-4: security code is legal, and when the number of inspections of certain cell-phone number to this security code appeared in the node of this security code mandate examination certification tree exceedes threshold value, now show to there is the possibility that security code is replicated fraud.
R13-5: security code is legal, and when the number of inspections of certain cell-phone number to this security code do not appeared in the node of this security code mandate examination certification tree exceedes threshold value, now show to exist the possibility attempting cracking Antiforge system.
The security code mandate examination certification tree built based on above-mentioned proof rule and node structure schematic diagram thereof are as shown in Figure 5.
In this specific embodiment, build production marketing, buy, multiple state such as to gift, under different conditions according to the data interaction of mobile intelligent terminal and fake certification server can change Product Status, the cell-phone number of security code current ownership person, the inquiry times of security code current ownership person, security code current ownership person recommend the inquiry times etc. of the cell-phone number of user and the recommended user on probation tried out, recommended user on probation.
Embodiment 2
On the basis of embodiment 1, the present invention also provides a kind of anti-fake traceability system based on mobile intelligent terminal.Mobile intelligent terminal and fake certification server is specifically comprised in this specific embodiment a kind of is based on the anti-fake traceability system of mobile intelligent terminal:
Mobile intelligent terminal comprises:
Security code read module, for reading security code;
Security code interactive module, for being sent in fake certification server by security code and cell-phone number corresponding to mobile intelligent terminal and receiving return message;
Fake certification server comprises:
Transceiver module, for receiving security code and the cell-phone number of the transmission of security code interactive module;
Security code authentication module, whether legal for judging the security code received, if then notice checks Authority Verification module, otherwise notice sending module;
For the cell-phone number by receiving, examination Authority Verification module, judges whether terminal is security code current ownership person or power person on probation, and the result is notified sending module;
Sending module, for the result according to security code authentication module and examination Authority Verification module, send the information of " security code is illegal ", or the information of " Product Validation is certified products ", or the information of " terminal does not have security code examination authority ", or the information of " checking number of times on probation is finished " is to the interactive module of mobile intelligent terminal.
In specific implementation process, also comprise security code information storage module in described fake certification server, for storing security code and product coding, the Product Status corresponding with security code, wherein security code is generated by random fashion.
Wherein, described security code is produced by random fashion, has uniqueness with product one_to_one corresponding.Security code and corresponding product coding, the Product Status of stochastic generation are stored in the security code information storage module of fake certification server.Preferably, in fake certification server, build security code information bank to store security code relevant information, realize the logic association of security code and product after the product coding write security code information bank corresponding with security code, and product original state is set for " stock ".
Concrete security code information bank can build data structure main body according to self-defined mode when storing, and stores as built following data structure main body:
[security code, product coding, Product Status].
Directly or after encryption antifalsification label is formed in generation two-dimension code label or write radio electronic label after security code stochastic generation.
The opening part of product or its external packing can be fixed on by modes such as stickups, with product physical interconnection during antifalsification label application; When product or external packing are opened, antifalsification label will cause security code to read thereupon by breakage and lose efficacy.
In this specific embodiment, the mobile phone of security code and security code current ownership is bound, only have and can carry out security code examination by the mobile phone of binding, ensure that the legitimacy of examination.And except current ownership terminal, recommend mobile phone on probation also can check the security code true and false by it, the mobile intelligent terminal scope that can check is extended with the way of recommendation, limit inquiry times by the mobile intelligent terminal character (entitlement person, power person on probation) of binding simultaneously, under the legitimacy prerequisite that ensure that examination, for pseudo-the further obstacle of the verification setting of security code.
In specific implementation process, also comprise security code mandate examination certification tree in fake certification server and build module, for arranging the relevant information storing security code current ownership person, wherein, the initial setting up mode of security code current ownership person is as follows:
Product is when circulating initial, and predistribution is that the security code that the cell-phone number of the initial entitlement person of product is corresponding with product is bound by security code mandate examination certification tree structure module, and arranges Product Status for " sale ";
Preferably, security code current ownership person changes with Product Status change, and concrete alter mode is as follows:
When Product Status changes, the security code read module of security code current ownership mobile intelligent terminal A reads security code;
Security code interactive module by its cell-phone number, security code and and the cell-phone number of the mobile intelligent terminal B that changes to new entitlement person be in advance sent in the transceiver module of fake certification server;
The security code authentication module of fake certification server and examination Authority Verification module verification security code and security code current ownership person legal after, generate and change authority checking code C and will authority checking code C be changed to send to communication form such as notes the security code interactive module of mobile intelligent terminal B;
Also being provided with operation executing module in mobile intelligent terminal, changing authority checking operation for performing, the cell-phone number of new for security code entitlement person B and change authority checking code C are sent in the transceiver module of fake certification server;
After authority checking code C legitimacy is changed in fake certification server authentication, it arranges change module is terminal B for changing the new entitlement person of security code, and change terminal A is invalid to the entitlement of this security code, and revises corresponding product state.
In specific implementation process, security code recommends user on probation to recommend operation on probation to obtain by the mobile intelligent terminal execution that security code current ownership person is corresponding, is specially:
The security code read module of the mobile intelligent terminal A that security code current ownership person is corresponding reads security code;
Its cell-phone number, security code and security code recommend the cell-phone number of user B to be sent in the transceiver module of fake certification server by security code interactive module;
The security code authentication module of fake certification server and examination Authority Verification module verification security code and security code current ownership person legal after, generate authority checking code D on probation and authority checking code D on probation sent to the security code interactive module of mobile intelligent terminal with communication form such as notes;
The operation executing module of mobile intelligent terminal performs recommends authority checking operation on probation, is recommended by security code the cell-phone number of user B and authority checking code D on probation to be sent in the transceiver module of fake certification server;
After the legitimacy of fake certification server authentication authority checking code D, it arranges change module stores security code and recommends the attribute data of user on probation: security code recommends user B cell-phone number on probation, number of inspections and recommendation to try out attribute.
In specific implementation process, described system of the present invention also comprises monitoring and warning and to trace to the source database, in fake certification server, data stream all backups to monitoring and warning and to trace to the source database, to be traced to the source information by the false proof examination under all states of monitoring and warning database evidence inquiry product.
The corresponding same or analogous parts of same or analogous label;
Describe in accompanying drawing position relationship for only for exemplary illustration, the restriction to this patent can not be interpreted as;
Obviously, the above embodiment of the present invention is only for example of the present invention is clearly described, and is not the restriction to embodiments of the present invention.For those of ordinary skill in the field, can also make other changes in different forms on the basis of the above description.Here exhaustive without the need to also giving all embodiments.All any amendments done within the spirit and principles in the present invention, equivalent to replace and improvement etc., within the protection domain that all should be included in the claims in the present invention.

Claims (12)

1., based on a false proof source tracing method for mobile intelligent terminal, it is characterized in that, comprise
S1. mobile intelligent terminal reads security code and security code and identification number corresponding to mobile intelligent terminal is sent to fake certification server;
S2. fake certification server judges that whether the security code received is legal, if legal, perform step S3, otherwise returns security code information unauthorized;
S3. by the terminal iidentification number received, fake certification server judges that whether this mobile intelligent terminal is the current entitlement person of this security code, if then return the information that Product Validation is certified products, otherwise return the information that mobile intelligent terminal does not have security code examination authority.
2. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 1, is characterized in that, the identification number that described mobile intelligent terminal is corresponding be cell-phone number, IMSI or other can one in No. ID of distinctive mark terminal.
3. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 1, is characterized in that, described security code stochastic generation, and security code and corresponding product coding, the Product Status of stochastic generation are stored in fake certification server.
4. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 3, it is characterized in that, described security code directly or after encryption forms antifalsification label, the physical interconnection one to one of antifalsification label and corresponding product in generation two-dimension code label or write radio electronic label.
5. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 3, it is characterized in that, the initial setting up mode of security code current ownership person is as follows:
Predistribution, when circulating initial, is that the security code that the mobile intelligent terminal identification number of the initial entitlement person of product is corresponding with product is bound by product in fake certification server.
6. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 5, is characterized in that, security code current ownership person changes with Product Status change, and concrete alter mode is as follows:
When Product Status changes, be sent in fake certification server by the identification number of its terminal iidentification number, security code and the mobile intelligent terminal B that changes to new entitlement person in advance after the mobile intelligent terminal A of security code current ownership reads security code, application is changed;
Fake certification server authentication security code and security code current ownership person legal after, generate and change authority checking code C, and generations change authority checking code C is sent to mobile intelligent terminal B;
Mobile intelligent terminal B performs and changes authority checking operation, is sent in fake certification server by its terminal iidentification number with change authority checking code C;
After authority checking code C legitimacy is changed in fake certification server authentication, change security code current ownership person is mobile intelligent terminal B, and change mobile intelligent terminal A is invalid to the entitlement of this security code, and revises corresponding product state.
7. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 1, is characterized in that, in described step S3, fake certification server judges that mobile intelligent terminal is not also perform following steps after security code current ownership person:
S4. fake certification server judges whether this mobile intelligent terminal is that this security code tries out power person, if then perform step S5, otherwise returns the information that this mobile intelligent terminal does not have security code examination authority;
S5. fake certification server judges whether this mobile intelligent terminal checking on probation number of times is greater than threshold value, if then checking number of times on probation subtracts 1 and returns the information that Product Validation is certified products, otherwise returns the information of trying out checking number of times and being finished.
8. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 7, it is characterized in that, having the mobile intelligent terminal that security code tries out power is perform recommendation operation on probation by security code current ownership mobile intelligent terminal to obtain, and is specially:
Security code current ownership mobile intelligent terminal A reads after security code and is sent in fake certification server by the identification number of its terminal iidentification number, security code and the mobile intelligent terminal B that is recommended as power person on probation in advance, and application is on probation to be recommended;
Fake certification server authentication security code and security code current ownership person legal after, generate authority checking code D on probation, and authority checking code D on probation be sent to mobile intelligent terminal B;
Mobile intelligent terminal B performs authority checking operation on probation, is sent in fake certification server by its terminal iidentification number with authority checking code D on probation;
After fake certification server authentication authority checking code D legitimacy, the newly-increased security code that stores tries out the attribute data weighing terminal: the identification number of mobile intelligent terminal B, number of inspections on probation and attribute on probation.
9. a kind of false proof source tracing method based on mobile intelligent terminal according to any one of claim 1 to 8, it is characterized in that, described method also comprises data stream in fake certification server and all backups to monitoring and warning and to trace to the source database, and the false proof examination of tracing to the source under all states of database evidence inquiry product by monitoring and warning is traced to the source information.
10. based on an anti-fake traceability system for mobile intelligent terminal, it is characterized in that, comprise mobile intelligent terminal and fake certification server:
Mobile intelligent terminal comprises:
Security code read module, for reading security code;
Security code interactive module, for being sent in fake certification server by security code and terminal iidentification number corresponding to mobile intelligent terminal and receiving return message;
Fake certification server comprises:
Transceiver module, for receiving security code and the terminal iidentification number of the transmission of security code interactive module;
Security code authentication module, whether legal for judging the security code received, if then notice checks Authority Verification module, otherwise notice sending module;
For the terminal iidentification by receiving number, examination Authority Verification module, judges whether terminal is security code current ownership person or power person on probation, and the result is notified sending module;
Sending module, for the result according to security code authentication module and examination Authority Verification module, send the information of " security code is illegal ", or the information of " Product Validation is certified products ", or the information of " terminal does not have security code examination authority ", or the information of " checking number of times on probation is finished " is to the interactive module of mobile intelligent terminal.
11. a kind of anti-fake traceability system based on mobile intelligent terminal according to claim 10, it is characterized in that, security code information storage module is also comprised in described fake certification server, for storing security code and product coding, the Product Status corresponding with security code, wherein security code is generated by random fashion.
12. a kind of anti-fake traceability system based on mobile intelligent terminal according to claim 10, is characterized in that, also comprise monitoring and warning and trace to the source module in described fake certification server, to trace to the source information for the false proof examination of proving under all states of inquiry product.
CN201410819097.9A 2014-12-25 2014-12-25 A kind of false proof source tracing method and system based on mobile intelligent terminal Active CN104463606B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410819097.9A CN104463606B (en) 2014-12-25 2014-12-25 A kind of false proof source tracing method and system based on mobile intelligent terminal
PCT/CN2015/095610 WO2016101760A1 (en) 2014-12-25 2015-11-26 Anti-counterfeit method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410819097.9A CN104463606B (en) 2014-12-25 2014-12-25 A kind of false proof source tracing method and system based on mobile intelligent terminal

Publications (2)

Publication Number Publication Date
CN104463606A true CN104463606A (en) 2015-03-25
CN104463606B CN104463606B (en) 2017-09-05

Family

ID=52909598

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410819097.9A Active CN104463606B (en) 2014-12-25 2014-12-25 A kind of false proof source tracing method and system based on mobile intelligent terminal

Country Status (2)

Country Link
CN (1) CN104463606B (en)
WO (1) WO2016101760A1 (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105654316A (en) * 2016-01-04 2016-06-08 河海大学 NFC product anti-counterfeiting traceability system and anti-counterfeiting traceability method thereof
WO2016101760A1 (en) * 2014-12-25 2016-06-30 张世龙 Anti-counterfeit method and system
CN106600296A (en) * 2016-12-16 2017-04-26 北京慧眼智行科技有限公司 Total quantity control-based anti-counterfeiting tracing method and system
CN106651404A (en) * 2016-12-30 2017-05-10 王清萍 Item anti-counterfeiting analysis method and item anti-counterfeiting analysis system
CN106997540A (en) * 2017-03-22 2017-08-01 北京向芯力科技有限公司 A kind of commodity counterfeit prevention traceability system and method based on dual authentication mechanism
CN107665436A (en) * 2016-07-29 2018-02-06 吴茂全 The fake certification device and method of article
CN108763939A (en) * 2018-05-02 2018-11-06 开源物联网(广州)有限公司 The encryption method and encryption system of security code
CN110310130A (en) * 2019-06-19 2019-10-08 张学忠 A kind of method for anti-counterfeit and system
CN110472710A (en) * 2019-07-31 2019-11-19 安徽连营电子科技有限公司 Rice paper anti-fake traceability system based on internal implantation RFID intelligent chip
CN110517053A (en) * 2019-09-02 2019-11-29 武汉长利新材料科技有限公司 A kind of product transfers the possession of anti-fake source tracing method and system
CN110533128A (en) * 2019-08-21 2019-12-03 上海唯链信息科技有限公司 A kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption
CN110675171A (en) * 2019-09-29 2020-01-10 匿名科技(重庆)集团有限公司 Anti-counterfeiting tracing method based on block chain
CN111460341A (en) * 2020-04-01 2020-07-28 北京德豹科技有限公司 Double anti-counterfeiting checking method
CN111708955A (en) * 2020-06-10 2020-09-25 武汉钢铁有限公司 Steel product anti-counterfeiting verification system based on two-dimensional code
CN111898165A (en) * 2020-07-09 2020-11-06 宁波浙大联科科技有限公司 Technical parameter change tracing method and system in PDM system
CN112508582A (en) * 2020-11-17 2021-03-16 广东职业技术学院 Multiple invisible pattern anti-counterfeiting system
CN112669536A (en) * 2020-12-16 2021-04-16 建信金融科技有限责任公司 Management method, management system, management device and medium for shared articles
CN113435917A (en) * 2021-08-24 2021-09-24 深圳市将维可变数据赋码技术有限公司 Anti-counterfeiting tracing method and system based on block chain
CN114826621A (en) * 2022-06-27 2022-07-29 中化现代农业有限公司 Seed tracing method and device, electronic equipment and storage medium
CN118229308A (en) * 2024-05-23 2024-06-21 北京中科金有限元技术有限公司 Multi-mode anti-counterfeiting verification method and system based on deep learning

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109102302A (en) * 2018-03-20 2018-12-28 黎凯还 A kind of distributed validation method for anti-counterfeit based on Internet technology
CN109298843A (en) * 2018-11-29 2019-02-01 珠海趣印科技有限公司 A kind of print system
CN109635551B (en) * 2018-12-18 2022-11-22 有份儿智慧科技股份有限公司 Method for anti-counterfeiting tracing and authenticating information data through digital intelligent terminal
CN110210871A (en) * 2019-02-15 2019-09-06 浙江萨宝信息科技有限公司 A kind of false proof device and its method of cash register
CN111027983A (en) * 2019-08-23 2020-04-17 北京中电华大电子设计有限责任公司 Anti-counterfeiting identification method and system for intelligent household appliance
CN113673999A (en) * 2020-05-01 2021-11-19 福州英流信息科技有限公司 Article tracing anti-counterfeiting identification authentication system and method
CN112001630B (en) * 2020-08-24 2024-05-31 中国建材检验认证集团股份有限公司 Product quality monitoring method and device
CN113516482B (en) * 2020-08-28 2024-04-05 王东升 Anti-fake password and anti-fake method
CN112381553B (en) * 2020-11-20 2024-05-28 王永攀 Product anti-counterfeiting method
CN112561546A (en) * 2020-12-29 2021-03-26 郭昆 Anti-counterfeiting traceability system and method based on Internet of things
CN112686074B (en) * 2020-12-29 2023-06-16 永发(河南)模塑科技发展有限公司 Intelligent packaging box capable of checking information of articles in box and checking method thereof
CN113239067B (en) * 2021-04-30 2023-07-18 国网河北省电力有限公司沧州供电分公司 Anti-counterfeiting method for right-confirming certificate
CN113159690A (en) * 2021-05-08 2021-07-23 包头市畅行交通信息科技有限公司 Method and system for anti-counterfeiting tracing of cross-border commodities based on Internet of things
CN113693297A (en) * 2021-09-28 2021-11-26 深圳市吉迩科技有限公司 Anti-counterfeiting method for aerosol generating device and aerosol generating device
CN114363897A (en) * 2021-11-02 2022-04-15 四川天邑康和通信股份有限公司 Method and system for identifying and inquiring authenticity of two-dimensional code of pon terminal device
CN118153599B (en) * 2024-02-21 2024-08-23 江苏稻源科技集团有限公司 High-frequency anti-counterfeiting method and system based on UID reading counting

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101458806A (en) * 2009-01-09 2009-06-17 黄建湘 Mobile phone electronic ticket anti-counterfeiting verification method and system
CN102289767A (en) * 2011-08-19 2011-12-21 段红双 Commodity anti-counterfeiting method
CN102376031A (en) * 2011-05-27 2012-03-14 徐良雨 Anti-counterfeiting tracking system using chip to identify articles
CN102411750A (en) * 2011-11-09 2012-04-11 浙江腾昌信息科技有限公司 Digital dual anti-counterfeiting authentication system and method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104463606B (en) * 2014-12-25 2017-09-05 张世龙 A kind of false proof source tracing method and system based on mobile intelligent terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101458806A (en) * 2009-01-09 2009-06-17 黄建湘 Mobile phone electronic ticket anti-counterfeiting verification method and system
CN102376031A (en) * 2011-05-27 2012-03-14 徐良雨 Anti-counterfeiting tracking system using chip to identify articles
CN102289767A (en) * 2011-08-19 2011-12-21 段红双 Commodity anti-counterfeiting method
CN102411750A (en) * 2011-11-09 2012-04-11 浙江腾昌信息科技有限公司 Digital dual anti-counterfeiting authentication system and method

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016101760A1 (en) * 2014-12-25 2016-06-30 张世龙 Anti-counterfeit method and system
CN105654316A (en) * 2016-01-04 2016-06-08 河海大学 NFC product anti-counterfeiting traceability system and anti-counterfeiting traceability method thereof
CN107665436A (en) * 2016-07-29 2018-02-06 吴茂全 The fake certification device and method of article
CN106600296A (en) * 2016-12-16 2017-04-26 北京慧眼智行科技有限公司 Total quantity control-based anti-counterfeiting tracing method and system
CN106600296B (en) * 2016-12-16 2021-01-15 北京慧眼智行科技有限公司 Anti-counterfeiting traceability method and system based on total amount control
CN106651404A (en) * 2016-12-30 2017-05-10 王清萍 Item anti-counterfeiting analysis method and item anti-counterfeiting analysis system
CN106651404B (en) * 2016-12-30 2021-02-02 王清萍 Article anti-counterfeiting analysis method and article anti-counterfeiting analysis system
CN106997540A (en) * 2017-03-22 2017-08-01 北京向芯力科技有限公司 A kind of commodity counterfeit prevention traceability system and method based on dual authentication mechanism
CN108763939A (en) * 2018-05-02 2018-11-06 开源物联网(广州)有限公司 The encryption method and encryption system of security code
CN110310130A (en) * 2019-06-19 2019-10-08 张学忠 A kind of method for anti-counterfeit and system
CN110472710A (en) * 2019-07-31 2019-11-19 安徽连营电子科技有限公司 Rice paper anti-fake traceability system based on internal implantation RFID intelligent chip
CN110472710B (en) * 2019-07-31 2022-04-19 安徽连营电子科技有限公司 Rice paper anti-counterfeiting traceability system based on internally-implanted RFID intelligent chip
CN110533128A (en) * 2019-08-21 2019-12-03 上海唯链信息科技有限公司 A kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption
CN110533128B (en) * 2019-08-21 2023-08-04 上海唯链信息科技有限公司 Encryption-based anti-counterfeiting traceability data processing method, device, system and medium
CN110517053A (en) * 2019-09-02 2019-11-29 武汉长利新材料科技有限公司 A kind of product transfers the possession of anti-fake source tracing method and system
CN110675171A (en) * 2019-09-29 2020-01-10 匿名科技(重庆)集团有限公司 Anti-counterfeiting tracing method based on block chain
CN111460341A (en) * 2020-04-01 2020-07-28 北京德豹科技有限公司 Double anti-counterfeiting checking method
CN111708955A (en) * 2020-06-10 2020-09-25 武汉钢铁有限公司 Steel product anti-counterfeiting verification system based on two-dimensional code
CN111898165A (en) * 2020-07-09 2020-11-06 宁波浙大联科科技有限公司 Technical parameter change tracing method and system in PDM system
CN112508582A (en) * 2020-11-17 2021-03-16 广东职业技术学院 Multiple invisible pattern anti-counterfeiting system
CN112669536A (en) * 2020-12-16 2021-04-16 建信金融科技有限责任公司 Management method, management system, management device and medium for shared articles
CN113435917A (en) * 2021-08-24 2021-09-24 深圳市将维可变数据赋码技术有限公司 Anti-counterfeiting tracing method and system based on block chain
CN114826621A (en) * 2022-06-27 2022-07-29 中化现代农业有限公司 Seed tracing method and device, electronic equipment and storage medium
CN118229308A (en) * 2024-05-23 2024-06-21 北京中科金有限元技术有限公司 Multi-mode anti-counterfeiting verification method and system based on deep learning
CN118229308B (en) * 2024-05-23 2024-07-23 北京中科金有限元技术有限公司 Multi-mode anti-counterfeiting verification method and system based on deep learning

Also Published As

Publication number Publication date
CN104463606B (en) 2017-09-05
WO2016101760A1 (en) 2016-06-30

Similar Documents

Publication Publication Date Title
CN104463606A (en) Anti-fake tracing method and system based on mobile intelligent terminal
Abeyratne et al. Blockchain ready manufacturing supply chain using distributed ledger
William et al. Framework for product anti-counterfeiting using blockchain technology
CN109949058A (en) Antifake method for products, device, electronic equipment and read/write memory medium
CN105654316A (en) NFC product anti-counterfeiting traceability system and anti-counterfeiting traceability method thereof
WO2007107068A1 (en) Anti-forgery method and apparatus based on cpk electronic label
CN110310130B (en) Anti-counterfeiting method and system
CN104217241A (en) Electronic anti-fake label and realizing method
JP2016511466A (en) Product counterfeit prevention discrimination method
Hetcher Changing the Social meaning of privacy in Cyberspace
CN101814152B (en) Anti-counterfeit method and system based on readable identification code and answerback code of identification code
CN113450092A (en) Block chain network-based article safe and efficient transaction method, system and storage medium
KR101798603B1 (en) Manufacturing method of label comprising a code for certificating an item's authentication
CN109472620A (en) A kind of anti-fake and integrating system based on block chain
CN111967821A (en) Method, device, equipment and system for generating clearance confirmation information
CN112070567B (en) Quality control system based on block chain and control method thereof
CN108985431A (en) A kind of method of antifalsification label and its commodity genuine piece of Testing and appraisal registered trademark
KR20150045543A (en) Genuine product certification and sns posting system, and method using nfc tag and smart phone
CN106815614A (en) A kind of bank acceptance Antiforge system of use NFC anti-counterfeiting technologies
CN109003097A (en) A kind of antifake method for products
Zhang Internet of things supervision system and supply chain financial supervision methods based on blockchain technology
CN103778540A (en) Verification system and method thereof
CN105894302A (en) Product anti-counterfeiting method
CN100399346C (en) Combined address identification system and method, and automatic identification device
CN108694585A (en) The internet trading system of compound authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190116

Address after: 510000 First Floor 101, 58 Jinzhongheng Road, Baiyun District, Guangzhou City, Guangdong Province

Patentee after: Guangzhou Longsheng Technology Co., Ltd.

Address before: 510240 Academy of Information Sciences, No. 24 Dongsha Street, Textile Road, Haizhu District, Guangzhou City, Guangdong Province

Patentee before: Zhang Shilong

TR01 Transfer of patent right