CN104463606B - A kind of false proof source tracing method and system based on mobile intelligent terminal - Google Patents

A kind of false proof source tracing method and system based on mobile intelligent terminal Download PDF

Info

Publication number
CN104463606B
CN104463606B CN201410819097.9A CN201410819097A CN104463606B CN 104463606 B CN104463606 B CN 104463606B CN 201410819097 A CN201410819097 A CN 201410819097A CN 104463606 B CN104463606 B CN 104463606B
Authority
CN
China
Prior art keywords
security code
intelligent terminal
mobile intelligent
code
product
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410819097.9A
Other languages
Chinese (zh)
Other versions
CN104463606A (en
Inventor
张世龙
唐雅娜
郑建华
罗慧慧
邱科宁
沈玉利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Longsheng Technology Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410819097.9A priority Critical patent/CN104463606B/en
Publication of CN104463606A publication Critical patent/CN104463606A/en
Priority to PCT/CN2015/095610 priority patent/WO2016101760A1/en
Application granted granted Critical
Publication of CN104463606B publication Critical patent/CN104463606B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to product safety technical field, more particularly, to a kind of false proof source tracing method based on mobile intelligent terminal and system.Method includes:S1. mobile intelligent terminal reads security code and sends security code and the corresponding identification number of mobile intelligent terminal to fake certification server;S2. fake certification server judges whether the security code received is legal, and step S3 is performed if legal, otherwise returns to security code information unauthorized;S3. fake certification server by the terminal iidentification number received judge the terminal whether be security code current ownership person or with can number of inspections power person on probation, if then returning to the information that Product Validation is certified products, the information that terminal checks authority without security code is otherwise returned.The present invention is based on mobile intelligent terminal, and mobile intelligent terminal popularity rate is high, and actual customer can easily intervene false proof system, can improve the process of Antiforge inquiry, with low cost, and checking is simple.

Description

A kind of false proof source tracing method and system based on mobile intelligent terminal
Technical field
The present invention relates to product safety technical field, traced back more particularly, to a kind of false proof based on mobile intelligent terminal Source method and system.
Background technology
Fake and inferior commodities flood market, and seriously compromise the interests of consumer, are brought to commodity production enterprise huge Big economic loss, with very big social harm.Anti-counterfeiting technology is developed into today, known method for anti-counterfeit, technology and production Product are innumerable, and main anti-fake product includes three major types:Vision judges, consulting judges, equipment judges:
1), vision judges, i.e., the mode visually distinguishing true from false.As laser hologram, texture, radium-shine, Ultraluminescence, daylight become Color, heat-sensitive variable colour, pressure-sensitive discoloration, wet sensitive colour changing, accurate version line, micro printing, thermochromic liquid crystal, super wiping are deformed, disposably Crush picture and text, open type duplicature applique, irreversible memory-type temperature-sensitive, reversible feel heat-sensitive variable colour, paper water wave, cholesteric liquid Brilliant, miniature stealth of graphic code etc..If recognizing that content and method are simple using the anti-fake product of this technology, it is easy to imitative System, does not reach antifalse effect;If recognizing that content and method are excessively cumbersome, certain identification experience is needed, is unfavorable for promoting Use.This technology is not inaccurate, rigorous due to only leaning on macroscopic visual to judge the true and false of label simultaneously.
2), consulting judges, i.e., by way of inquire about and distinguish true from false phone, short message, internet etc..Using this skill If the anti-fake product of art does not limit inquiry times, inquiry code can be replicated easily, and antifalse effect is poor;If being defined to one The inquiry mode of code once, then in the presence of the deficiency that can not be verified, can only disposably verify before purchase.This technology is due to only anti-simultaneously Inquiry code correctness in itself is presented, or is only capable of informing and is queried number of times, if the judgement of certified products generally allows buyer voluntarily to sentence Disconnected, Query Result is difficult to convince people, and in the presence of cracking, bribing the digital possibility to copy of purchase, not rigorous enough, confidence level is not It is high.
3), equipment judges, i.e., the mode being distinguish true from false using special equipment, true and false information is shown on special equipment.Such as Holographic magnetic card, magnetic ink, smart credit card, bar code, Quick Response Code, metallic barcode, IC-card, RFID card, laser card, biochemistry, original Daughter nucleus double card, electronic recognition, nuclear track technique etc..By special equipment itself or send data to the webserver during examination and enter Row encryption and decryption and examination, ping procedure are transparent to user, simple, convenient, and product can be checked repeatedly after before sales, tool There is certain practicality and anti-counterfeit capability.The electronic anti-counterfeit tag of some of anti-fake products be also built-in with random code generator or Sequence number generator, realization often verifies that once verifying end/server all produces a new random code or sequence number, to product identification; Some anti-fake products additionally provide label and the independent authentication or two-way authentication function of dedicated identification device;Some anti-fake products are also Based on PKI/CA patterns, product information, identifying code, sequence number/sequence number are encrypted, implement multistage encryption and decryption, digital signature Deng.Although such technology adds imitated difficulty to some extent, due to the true and false, cost need to be judged by special equipment Height, versatility is not strong, more it is essential that checking means are single, and the pseudo- checking to imitated identification equipment is tested without other evidences Card means, although some method for anti-counterfeit propose label, identification equipment bi-directional verification, but if imitated identification equipment is only carried out The pseudo- reading of label information and the pseudo- connection of server are checked, then the information alert of emulation presentation " being verified, certified products ", then The method for anti-counterfeit such as bi-directional verification are cracked easily, so as to realize the purpose of deception consumer, anti-counterfeit capability surface is powerful, actually very It is fragile.
In summary, existing method for anti-counterfeit and technology are still relied mainly on prevention, and are to increase to fake from technical standpoint to copy Cost, the imitated complexity of increase fraud, so that imitated possibility of faking is reduced, by constantly updating counterfeit protection measures and work Skill, causes cost constantly to raise, but can not predict/anti-the pseudoperiod of the current counterfeit protection measures of early warning(It is imitated from putting into), Cause a variety of counterfeit protection measures in market of identical product and deposit, domestic consumer more puzzles.Really to solve this problem, false proof system The cost of manufacture of system must be very low, and examination mode is simple and easy to apply, is repeatedly checked after being purchased before being purchased, and has independent evidence examination Method recognizes pseudo- checking situation, audit and warning function when being checked with doubtful imitation products.
The content of the invention
The present invention is to overcome at least one defect described in above-mentioned prior art(It is not enough)There is provided a kind of cost it is low, examination The simple false proof source tracing method based on mobile intelligent terminal.
The present invention also provides that a kind of cost is low, the simple anti-fake traceability system based on mobile intelligent terminal of examination.
In order to solve the above technical problems, technical scheme is as follows:
A kind of false proof source tracing method based on mobile intelligent terminal, including:
S1. mobile intelligent terminal reads security code and sends security code and the corresponding identification number of mobile intelligent terminal to anti- Pseudo- authentication server;
S2. fake certification server judges whether the security code received is legal, and step S3 is performed if legal, is otherwise returned The pseudo-code that goes back on defense information unauthorized;
S3. fake certification server judges whether the terminal is that the security code is current by the terminal iidentification number received Ownership person, if then returning to the information that Product Validation is certified products, otherwise returns to the letter that terminal checks authority without security code Breath.
In such scheme, the corresponding identification number of the mobile intelligent terminal is that cell-phone number, IMSI or other can distinctive marks One kind in No. ID of terminal.
In such scheme, the security code is generated at random, security code and corresponding product coding, the product shape generated at random State is stored in fake certification server.
In such scheme, the security code directly or after encryption is generated in two-dimension code label or write-in radio electronic label Form antifalsification label, antifalsification label and the one-to-one physical interconnection of corresponding product.
In such scheme, the initial setting up mode of security code current ownership person is as follows:
Product will pre-allocate the mobile intelligence for the initial ownership person of product when circulating initial in fake certification server Energy terminal iidentification number security code corresponding with product is bound.
In such scheme, security code current ownership person changes and changed with Product Status, and specific change mode is as follows:
When Product Status changes, the mobile intelligent terminal A of security code current ownership was read its end after security code The identification number held identification number, security code and be changed to the mobile intelligent terminal B of new ownership person in advance is sent to fake certification service In device, application change;
After fake certification server authentication security code and security code current ownership person are legal, generation change authority checking code C, and change authority checking code C is sent to mobile intelligent terminal B;
Mobile intelligent terminal B performs change authority checking operation, and its terminal iidentification number and change authority checking code C are sent Into fake certification server;
After fake certification server authentication change authority checking code C legitimacies, change security code current ownership person is eventually B is held, change terminal A is invalid to the ownership of the security code, and changes corresponding product state.
In such scheme, in the step S3, fake certification server judges that mobile intelligent terminal is not that security code is current Also executed the following steps after ownership person:
S4. fake certification server judges whether the terminal is that the security code tries out power person, if then performing step S5, Otherwise the information that the terminal checks authority without security code is returned;
S5. fake certification server judges whether terminal checking number of times on probation is more than threshold value, if then trying out checking time Number subtracts 1 and returns to the information that Product Validation is certified products, otherwise returns to the information that checking number of times on probation has been used up.
In such scheme, the mobile intelligent terminal with security code power on probation is to move intelligence by security code current ownership Energy terminal performs recommendation operation on probation and obtained, and is specially:
Security code current ownership mobile intelligent terminal A is pushed away its terminal iidentification number, security code and in advance after reading security code The identification number for recommending the mobile intelligent terminal B to try out power person is sent in fake certification server, and application is on probation to be recommended;
After fake certification server authentication security code and security code current ownership person are legal, generation authority checking code on probation D, and authority checking on probation code D is sent to mobile intelligent terminal B;
Mobile intelligent terminal B performs authority checking operation on probation, and its terminal iidentification number and authority checking on probation code D are sent Into fake certification server;
After fake certification server authentication authority checking code D legitimacies, the attribute of storage security code power terminal on probation is increased newly Data:Terminal B identification number, number of inspections on probation and attribute on probation.
In such scheme, methods described also includes data flow in fake certification server and backups to monitoring and warning tracing to the source number According to storehouse, the database that can be traced to the source by monitoring and warning evidence inquiry product it is stateful under false proof examination trace to the source information.
A kind of anti-fake traceability system based on mobile intelligent terminal, including mobile intelligent terminal and fake certification server:
Mobile intelligent terminal includes:
Security code read module, for reading security code;
Security code interactive module, for security code and the corresponding terminal iidentification number of mobile intelligent terminal to be sent into false proof test Demonstrate,prove in server and receive return information;
Fake certification server includes:
Transceiver module, security code and terminal iidentification number for receiving the transmission of security code interactive module;
Whether security code authentication module, the security code for judging to receive is legal, if then notifying examination Authority Verification Module, otherwise notifies sending module;
Authority Verification module is checked, judges whether terminal is the current institute of security code for the terminal iidentification number by receiving The person of having the right or power person on probation, and the result is notified into sending module;
Sending module, for the result according to security code authentication module and examination Authority Verification module, sends " false proof Code is illegal " information, the either information of " Product Validation is certified products " or " terminal without security code check authority " letter Breath, or " on probation checking number of times have been used up " information to mobile intelligent terminal interactive module.
In such scheme, security code information storage module is also included in the fake certification server, it is false proof for storing Code and product coding corresponding with security code, Product Status, wherein security code are generated by random fashion.
In such scheme, also traced to the source module including monitoring and warning in the fake certification server, for proving inquiry production Product it is stateful under false proof examination trace to the source information.
Compared with prior art, the beneficial effect of technical solution of the present invention is:
1)The present invention is based on mobile intelligent terminal, and mobile intelligent terminal popularity rate is high, and actual customer can be easily False proof system is intervened, the process of Antiforge inquiry can be improved, with low cost, checking is simple.
2)The present invention, will be false proof by setting up product false proof code examination authority tree and product total state ping procedure message sense Code with examination mobile intelligent terminal bound, it is allowed to product it is pre-sales, carry out multiple true and false examination after sale, while pass through bind Mobile intelligent terminal ensure that the credibility and uniqueness of product false proof code verification process.
3)The present invention changes effective examination mobile intelligent terminal of product by the change of product ownership, it is possible to have Body limits number of inspections, and examination mobile intelligent terminal and number of inspections can be according to the changes of product ownership targetedly Set, the renewal of number of inspections and Product Status will also be recorded in fake certification server so that counterfeit security code product Sales volume be limited, counterfeit income is very low with counterfeit benefit cost ratio;And when certified products enters sales section and can not sold It can be handled automatically into early warning, because the mobile intelligent terminal identification number for the association of adulterant examination originally that is stored with system(Such as Cell-phone number), to crack down on counterfeit goods, evidence obtaining offers convenience, and increases counterfeit danger coefficient, can effectively contain and hit counterfeit behavior.
4) present invention also simultaneously provides monitoring and warning and traced to the source database, realizes to antifalsification label(Product)Circulation examination The query function of tracing to the source of information, is independent auxiliary evidence process, effectively prevent mobile intelligent terminal and forge examination result Pseudo- checking situation.
5)The present invention constructs the false proof system of efficient system, and counterfeiter only has the whole systems of imitation, is only possible to list Part commodity are largely forged, and considerably increase counterfeit cost, reduce counterfeit possibility.
Brief description of the drawings
Fig. 1 is a kind of particular flow sheet of the false proof source tracing method based on mobile intelligent terminal of the present invention.
Fig. 2 shows for product ownership person's changing process in a kind of false proof source tracing method based on mobile intelligent terminal of the present invention It is intended to.
Fig. 3 shows for recommendation examination user's flow on probation in a kind of false proof source tracing method based on mobile intelligent terminal of the present invention It is intended to.
The system tray that Fig. 4 is based on for a kind of false proof source tracing method specific embodiment based on mobile intelligent terminal of the present invention Structure schematic diagram.
Fig. 5 is the security code that is built in a kind of false proof source tracing method specific embodiment based on mobile intelligent terminal of the present invention Check authority tree schematic diagram.
Fig. 6 traces to the source acquisition of information flow for a kind of examination of the false proof source tracing method based on mobile intelligent terminal of the present invention Figure.
Embodiment
Accompanying drawing being given for example only property explanation, it is impossible to be interpreted as the limitation to this patent;
In order to more preferably illustrate the present embodiment, some parts of accompanying drawing have omission, zoomed in or out, and do not represent actual product Size;
To those skilled in the art, it is to be appreciated that some known features and its explanation, which may be omitted, in accompanying drawing 's.
In the description of the invention, it is to be understood that term " first ", " second " are only used for describing purpose, and can not It is interpreted as indicating or implies relative importance or imply the quantity of indicated technical characteristic.Thus, " first " of restriction, " One or more this feature can be expressed or be implicitly included to two " feature.In the description of the invention, unless otherwise saying Bright, " multiple " are meant that two or more.
In the description of the invention, it is necessary to illustrate, unless otherwise clearly defined and limited, term " installation ", " company Connect " it should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected, or it is integrally connected;It can be machine Tool is connected or electrically connected;It can be joined directly together or be indirectly connected with by intermediary, it may be said that two The connection of element internal.For the ordinary skill in the art, with concrete condition above-mentioned term can be understood in the present invention Concrete meaning.
Technical scheme is described further with reference to the accompanying drawings and examples.
Embodiment 1
As shown in figure 1, being a kind of flow chart of the false proof source tracing method based on mobile intelligent terminal of the present invention.Referring to Fig. 1, A kind of specific steps of the false proof source tracing method based on mobile intelligent terminal of this specific embodiment include:
S101. mobile intelligent terminal reads security code and sends security code and the corresponding identification number of mobile intelligent terminal To fake certification server;
S102. fake certification server judges whether the security code received is legal, and step S103 is performed if legal, Otherwise security code information unauthorized is returned;
S103. fake certification server judges whether the terminal is that the security code is worked as by the terminal iidentification number received Preceding ownership person, if then returning to the information that Product Validation is certified products, otherwise performs step S104;
S104. fake certification server judges whether the terminal is that the security code tries out power person, if then performing step S105, otherwise returns to the information that the terminal checks authority without security code;
S105. fake certification server judges whether terminal checking number of times on probation is more than threshold value, if then trying out checking Number of times subtracts 1 and returns to the information that Product Validation is certified products, otherwise returns to the information that checking number of times on probation has been used up.
Wherein, the corresponding identification number of mobile intelligent terminal is that cell-phone number, IMSI or other can be No. ID of distinctive mark terminal In one kind.
Wherein, the security code is produced by random fashion, is corresponded with product and has uniqueness.Generate at random Security code and corresponding product coding, Product Status are stored in fake certification server.Preferably, in fake certification server Middle to build security code information bank to store security code relevant information, product coding corresponding with security code writes security code information bank The logic association of security code and product is realized afterwards, and sets Product Status to be " stock ".
Data structure main body can be built according to self-defined mode during specific security code information library storage, can such as built such as Lower data structure main body is stored:
[security code, product coding, Product Status].
Security code directly or after encryption generates formation in two-dimension code label or write-in radio electronic label after generating at random anti- Pseudo label.
Antifalsification label can be fixed at the opening of product or its outer packing when applying by modes such as stickups, with product thing Reason association;When product or outer packing opening, antifalsification label will cause security code not read and fail therewith by damaged.
In this specific embodiment, security code and security code current ownership mobile intelligent terminal are bound, only Security code examination can be carried out by the mobile intelligent terminal of binding, it is ensured that the legitimacy of examination.And it is except when preceding all Weigh outside terminal, the security code true and false can also be checked by its recommendation mobile intelligent terminal on probation, being extended with the way of recommendation can The mobile intelligent terminal scope of examination, while the mobile intelligent terminal property for passing through binding(Ownership person, power person on probation)To limit Determine number of inspections, be the further obstacle of verification setting of pseudo- security code under the premise of it ensure that the legitimacy of examination.
In specific implementation process, the initial setting up mode of security code current ownership person is as follows:
Product will pre-allocate the mobile intelligence for the initial ownership person of product when circulating initial in fake certification server Energy terminal iidentification number security code corresponding with product is bound, and sets Product Status to be " sale ";
Preferably, as shown in Fig. 2 security code current ownership person changes and changed with Product Status, mode is specifically changed It is as follows:
When Product Status changes, the mobile intelligent terminal A of security code current ownership was read its end after security code The identification number held identification number, security code and be changed to the mobile intelligent terminal B of new ownership person in advance is sent to fake certification service In device, application change;
After fake certification server authentication security code and security code current ownership person are legal, generation change authority checking code C, and change authority checking code C is sent to mobile intelligent terminal B with communication forms such as short messages;Mobile intelligent terminal B performs change More authority checking is operated, and its terminal iidentification number and change authority checking code C are sent in fake certification server;
After fake certification server authentication change authority checking code C legitimacies, change security code current ownership person is eventually B is held, change terminal A is invalid to the ownership of the security code, and changes corresponding product state.
In specific implementation process, as shown in figure 3, the mobile intelligent terminal with security code power on probation is worked as by security code Preceding ownership mobile intelligent terminal performs recommendation operation on probation and obtained, and is specially:
Security code current ownership mobile intelligent terminal A is pushed away its terminal iidentification number, security code and in advance after reading security code The identification number for recommending the mobile intelligent terminal B to try out power person is sent in fake certification server, and application is on probation to be recommended;
After fake certification server authentication security code and security code current ownership person are legal, generation authority checking code on probation D, and authority checking on probation code D is sent to mobile intelligent terminal B with communication forms such as short messages;
Mobile intelligent terminal B performs authority checking operation on probation, and its terminal iidentification number and authority checking on probation code D are sent Into fake certification server;
After fake certification server authentication authority checking code D legitimacies, the attribute of storage security code power terminal on probation is increased newly Data:Terminal B identification number, number of inspections on probation and attribute on probation.
In specific implementation process, the method described in the present invention also includes data flow in fake certification server and backups to prison Early warning is surveyed to trace to the source database, the database that can be traced to the source by monitoring and warning evidence inquiry product it is stateful under false proof examination trace to the source Information.Specific information inquiry mode of tracing to the source is as shown in Figure 6.
Based on above-mentioned specific embodiment, it is expanded on further below based on method one specific embodiment of offer of the present invention The method of the present invention.
In this specific embodiment, as shown in figure 4, including fake certification server 201, as mobile intelligent terminal Possess the read write lines 203 of antifalsification label read functions, product 204 on mobile phone 202, mobile phone 202 and monitoring and warning can be connected Trace to the source the web terminals 205 of database, wherein its corresponding antifalsification label in physical interconnection on product 204.
The generation of security code:Unique security code is randomly generated, security code information bank is built in fake certification server, is prevented The data structure main body of pseudo-code information bank is:[security code, product coding, Product Status];Security code directly or after encryption is generated Antifalsification label is formed in two-dimension code label or write-in radio electronic label.
Antifalsification label is fixed at the opening of product or its outer packing by modes such as stickups, with product physical interconnection;Production When product or outer packing opening, antifalsification label will cause security code not read and fail therewith by damaged;Security code is given birth at random Product coding and security code are mapped after, and product coding is write into the corresponding security code information table of security code information bank In, the logic association of security code and product is realized, and set Product Status to be " stock ".
In order to review each state and process of product in intermediate links, this example has preset the multiple states of product, bag Include " stock ", " sale ", " purchase ", " gifting " etc..
Production marketing personnel's certification cellphone information storehouse is built in fake certification server, data structure main body is:[sale Personnel's cell-phone number, store's numbering, sales force's numbering, authenticated time, effective status], [effective status] initial value is " to have Effect ", when certain sales force leaves office, modification [effective status] value is engineering noise.
When product enters sales section, change Product Status is " sale " in fake certification server, is now tested false proof Security code mandate examination certification tree is built in card server, security code and certification tree are one-to-one relationships.Certification tree node Data structure be:[node type, it is allowed to check cell-phone number, it is allowed to number of inspections, child pointers], wherein [node type] takes It is worth for " production marketing ", " product purchase ", " product is gifted ", " checking on probation ";[allowing to check cell-phone number] can in root node To have one or more cell-phone numbers, multiple cell-phone number CSVs, and it can only be effective sales force's certification cell-phone number;Its Have in remaining descendant nodes and there can only be the cell-phone number in a cell-phone number, tree in each node to allow repetition;[allow examination time Number] value be 0(Expression does not allow checking)、1(Expression allows checking once)、-1(Indicate without checking number of times limitation);Wherein save Vertex type can only be root node for the node of " production marketing ", and node type can only be root node for the node of " product purchase " Child nodes, and the type node can only at most have one in certification tree;Node type can only for the node of " checking on probation " It is leaf node.
In specific building process, security code current ownership person is corresponding with Product Status, in binding procedure, security code The number of inspections of current ownership person is unrestricted, but the number of inspections of non-security code current ownership person is usually arranged as 1 time, and And need to obtain legal examination authority by way of recommending to try out.
When building security code mandate examination certification tree first in fake certification server, the root section of examination certification tree is set up Vertex type is " production marketing ", it is allowed to which number of inspections is -1, it is allowed to checks cell-phone number and recognizes for one or more effective sales forces Cell-phone number is demonstrate,proved, while it is " sale " state to change Product Status.The logic for completing security code and sales force's certification cell-phone number is tied up It is fixed.
Therefore based on this mode, product is in distribution state during security code mandate examination certification tree initial construction, now prevents Pseudo-code current ownership person is sales force, and now the original state of product is distribution state, security code mandate examination certification The cell-phone number of sales force and the binding relationship of security code are constructed in tree automatically.When Product Status changes, security code Child nodes can be formed to update the corresponding data of security code examination certification in examination certification tree by authorizing.
In a particular application, corresponding APP softwares can be installed in smart mobile phone to be inquired about.As shown in Fig. 2 specific Verify antifalsification label(Product)Authenticity verification when, in smart mobile phone run APP softwares, pass through built-in camera or extrapolation (It is external)Read write line directly or indirectly reads security code information in antifalsification label, APP softwares the security code information of reading, itself The information such as cell-phone number are submitted to fake certification server;Fake certification server verifies according to proof rule to security code, Verification process is illustrated below by citing proof rule:
Rule 1:Security code is effectively legal:The security code of checking must be that legal and checking cell-phone number must be this " allowing to check cell-phone number " in the examination certification tree node of security code, and the permission number of inspections value of the node is 1 or -1.
Rule 2:If security code state is " sale " state, checks cell-phone number and appear in the security code mandate and check and recognize Demonstrate,prove in the root node of tree, node number of inspections is -1, then allow the mobile phone to verify the true and false and return to certified products information.After examination not more Change the number of inspections of the node, add up number of inspections of the cell-phone number to security code.
Rule 3:If security code state is " sale " state, in the root node that certification tree is checked in the security code mandate One or more certification sales force mobile phones, one or more other users mobile phones can be recommended to carry out on probation look into APP Test, in security code mandate examination certification tree, node where it(That is root node)Under newly-built child nodes, the child nodes Entitled " on probation checking ", number of inspections is 1, and examination cell-phone number is recommended cell-phone number on probation.This recommendation process can be as Flow shown in Fig. 3 is operated
Rule 4:If security code state is " sale " state, checks cell-phone number and appear in the security code mandate and check and recognize Card is set in non-root node, node number of inspections is 1, then allows the mobile phone to check and return to certified products information, and contain additional information: " distribution state, can only try out checking once, verify that number of times is unrestricted after purchase ".The number of inspections value of the node is changed after examination For 0, number of inspections of the accumulative cell-phone number to the security code.
Rule 5:If security code state is " sale " state, in the root node that certification tree is checked in the security code mandate One or more certification sales force mobile phones, it is " purchase " state to change security code state by APP when product is sold, In security code mandate examination certification tree, node where it(That is root node)Number of inspections be revised as 0, node where it Under newly-built child nodes, entitled " the product purchase " of the child nodes be set, and number of inspections is -1, examination cell-phone number is purchase Person's cell-phone number.
Rule 6:If security code state is " purchase " state, there is security code mandate examination certification in examination cell-phone number The nodename of tree is " product purchase ", node number of inspections is " -1 ", then allows the mobile phone to verify the true and false and return to certified products letter Breath.The number of inspections of the node is not changed after examination, adds up number of inspections of the cell-phone number to security code.Simultaneously can be in APP One or more other users mobile phones are recommended to be checked, in security code mandate examination certification tree, under node where it Newly-built child nodes, the nodename of the child nodes is " checking on probation ", and number of inspections is 1, and examination cell-phone number is recommended Cell-phone number.
Rule 7:If security code state is " purchase " state, security code mandate examination certification occurs in examination cell-phone number The non-root node entitled " checking on probation " of tree, node number of inspections are 1, then allow the mobile phone to check and return to certified products information, And contain additional information:" product has been sold out, and sells state, can only try out checking 1 time, such as needs repeatedly, then needs repeatedly recommendation, Or verify that number of times is unrestricted after gifting ", store is may also include in return information, time, buyer etc. is sold and can trace to the source information. The number of inspections value that the node is changed after examination is 0, adds up number of inspections of the cell-phone number to the security code.
Rule 8:If security code state is " purchase " state, security code mandate examination certification occurs in examination cell-phone number The nodename of tree is " product purchase ", node number of inspections is -1, is recognized when representing product to other users by APP modifications It is " gifting " state to demonstrate,prove the security code state in server, in security code mandate examination certification tree, node where it Number of inspections is revised as 0, newly-built child nodes under node where it, sets entitled " product is gifted " of the child nodes, Number of inspections is -1, and examination cell-phone number is acceptor's cell-phone number.
Rule 9:If security code state is " gifting " state, security code mandate examination certification occurs in examination cell-phone number The nodename of tree is " product is gifted ", the mobile phone of node number of inspections -1, it is allowed to which the mobile phone is checked and returns to certified products information, returns Write in reply in breath comprising store, sell time, buyer, time of gifting etc. and can trace to the source information.One can be recommended in APP simultaneously Individual or multiple other users mobile phones are checked, in security code mandate examination certification tree, newly-built child under node where it Child node, the nodename of the child nodes is " checking on probation ", and number of inspections is 1, and examination cell-phone number is recommended cell-phone number.
Rule 10:If security code state is " gifting " state, security code mandate examination certification occurs in examination cell-phone number The nodename of tree is " product is gifted ", the mobile phone of node number of inspections -1, can represent product again by APP to other hands The number of inspections of node where it, in security code mandate examination certification tree, is revised as 0, node where it by machine user Under newly-built child nodes, entitled " product is gifted " of the child nodes be set, and number of inspections is -1, examination cell-phone number is is given Person's cell-phone number.Product number of times of gifting is unrestricted.
Rule 11:It is being unsatisfactory for aforementioned rule, it is impossible to when being verified, the examination information of return is as follows:
R11-1:When security code is illegal, return " security code is illegal, and regular store please be gone to buy ";
R11-2:Security code is legal and state is " sale " state, then return " in production marketing, the sale people only authorized Member's mobile phone and its recommendation user mobile phone on probation could carry out authenticity verification ";
R11-3:Security code is legal and state is " purchase " state, then " product has been sold out, only buyer's mobile phone for return And its recommend user mobile phone on probation to carry out authenticity verification ";
R11-4:Security code is legal and state is " gifting " state, then " product has been sold out and gifted, and is only given for return Person's mobile phone and its recommendation user mobile phone on probation could carry out authenticity verification ".
Rule 12:Cellphone subscriber in each node of certification tree is checked in security code mandate, can be logical in official WEB websites Cross the identifying code inquiry antifalsification label for submitting security code, cell-phone number and mobile phone to receive(Product)Examination circulation trace to the source information, letter Breath in chronological order comprising production marketing, the overall process such as buy, gift, checking and trace to the source information, and during each time Check mobile phone(Part cell-phone number shielding processing), it is independent secondary au-thentication process, is verified for the puppet after preventing APP from faking.
Rule 13:Situations below will trace to the source the information such as examination cell-phone number, examination time write-in monitoring and warning database, Carry out product examination data monitoring and early warning processing:
R13-1:When security code is illegal;
R13-2:When there are loop situations in examination of the sales force's mobile phone of certification to the legal security code of " distribution state ", As ping procedure be security code 1->Security code 2->Security code 1, now shows there are the feelings of product seller oneself sell-fake-products Condition.
R13-3:One or more certification sales force cell-phone numbers are bound to set up certain security code mandate examination certification tree and be somebody's turn to do In the presence of security code mandate checks certification tree, now show there is the possibility that adulterant has been sold prior to certified products.
R13-4:Security code is legal, and appears in certain cell-phone number in the node of security code mandate examination certification tree to this When the number of inspections of security code exceedes threshold value, now show there is the possibility that security code is replicated fraud.
R13-5:Security code is legal, and certain cell-phone number not appeared in the node of security code mandate examination certification tree When exceeding threshold value to the number of inspections of the security code, now show there is the possibility for attempting to crack Antiforge system.
The security code mandate examination certification tree built based on above-mentioned proof rule and its node structure schematic diagram such as Fig. 5 institutes Show.
In this specific embodiment, build production marketing, multiple states such as buy, gift, according to shifting under different conditions The data interaction of dynamic intelligent terminal and fake certification server can change Product Status, the mobile phone of security code current ownership person Number, the inquiry times of security code current ownership person, security code current ownership person recommend user on probation and recommended The cell-phone number of user on probation, inquiry times of recommended user on probation etc..
Embodiment 2
On the basis of embodiment 1, the present invention also provides a kind of anti-fake traceability system based on mobile intelligent terminal.At this Mobile intelligent terminal is specifically included in a kind of anti-fake traceability system based on mobile intelligent terminal of specific embodiment and false proof is tested Demonstrate,prove server:
Mobile intelligent terminal includes:
Security code read module, for reading security code;
Security code interactive module, for security code and the corresponding cell-phone number of mobile intelligent terminal to be sent into fake certification clothes It is engaged in device and receives return information;
Fake certification server includes:
Transceiver module, security code and cell-phone number for receiving the transmission of security code interactive module;
Whether security code authentication module, the security code for judging to receive is legal, if then notifying examination Authority Verification Module, otherwise notifies sending module;
Authority Verification module is checked, judges whether terminal is security code current ownership for the cell-phone number by receiving Person or power person on probation, and the result is notified into sending module;
Sending module, for the result according to security code authentication module and examination Authority Verification module, sends " false proof Code is illegal " information, the either information of " Product Validation is certified products " or " terminal without security code check authority " letter Breath, or " on probation checking number of times have been used up " information to mobile intelligent terminal interactive module.
In specific implementation process, security code information storage module is also included in the fake certification server, for depositing Security code and product coding corresponding with security code, Product Status are stored up, wherein security code is generated by random fashion.
Wherein, the security code is produced by random fashion, is corresponded with product and has uniqueness.Generate at random Security code and corresponding product coding, Product Status are stored in the security code information storage module of fake certification server.It is excellent Selection of land, builds security code information bank to store security code relevant information in fake certification server, production corresponding with security code The logic association of security code and product is realized after product coding write-in security code information bank, and sets product original state to be " storehouse Deposit ".
Data structure main body can be built according to self-defined mode during specific security code information library storage, can such as built such as Lower data structure main body is stored:
[security code, product coding, Product Status].
Security code directly or after encryption generates formation in two-dimension code label or write-in radio electronic label after generating at random anti- Pseudo label.
Antifalsification label can be fixed at the opening of product or its outer packing when applying by modes such as stickups, with product thing Reason association;When product or outer packing opening, antifalsification label will cause security code not read and fail therewith by damaged.
In this specific embodiment, the mobile phone of security code and security code current ownership is bound, only by tying up Fixed mobile phone can carry out security code examination, it is ensured that the legitimacy of examination.And in addition to current ownership terminal, by it Recommend mobile phone on probation to check the security code true and false, the mobile intelligent terminal scope that can be checked extended with the way of recommendation, Pass through the mobile intelligent terminal property of binding simultaneously(Ownership person, power person on probation)To limit inquiry times, examination ensure that Legitimacy under the premise of, be the further obstacle of verification setting of pseudo- security code.
Also include security code mandate examination certification tree in specific implementation process, in fake certification server and build module, use In the relevant information for setting storage security code current ownership person, wherein, the initial setting up mode of security code current ownership person It is as follows:
Product is when circulating initial, and it is the initial ownership of product that security code mandate examination certification tree, which builds module and will pre-allocated, The cell-phone number of person security code corresponding with product is bound, and sets Product Status to be " sale ";
Preferably, security code current ownership person changes and changed with Product Status, and specific change mode is as follows:
When Product Status changes, security code current ownership mobile intelligent terminal A security code read module is read Security code;
Security code interactive module is by its cell-phone number, security code and and is changed to the mobile intelligent terminal B of new ownership person in advance Cell-phone number be sent in the transceiver module of fake certification server;
The security code authentication module and examination Authority Verification module verification security code and security code of fake certification server are worked as After preceding ownership person is legal, change authority checking code C is simultaneously sent to by generation change authority checking code C with communication forms such as short messages Mobile intelligent terminal B security code interactive module;
Operation executing module is additionally provided with mobile intelligent terminal, for performing change authority checking operation, by security code New ownership person B cell-phone number and change authority checking code C is sent in the transceiver module of fake certification server;
After fake certification server authentication change authority checking code C legitimacies, it sets change module to be used to change false proof The new ownership person of code is terminal B, and change terminal A is invalid to the ownership of the security code, and changes corresponding product state.
In specific implementation process, security code recommends user on probation to pass through the corresponding intelligent movable of security code current ownership person Terminal, which is performed, recommends operation on probation to obtain, and is specially:
The corresponding mobile intelligent terminal A of security code current ownership person security code read module reads security code;
The cell-phone number of its cell-phone number, security code and security code recommended user B is sent to false proof test by security code interactive module In the transceiver module for demonstrate,proving server;
The security code authentication module and examination Authority Verification module verification security code and security code of fake certification server are worked as After preceding ownership person is legal, authority checking on probation code D is simultaneously sent to by generation authority checking code D on probation with communication forms such as short messages The security code interactive module of mobile intelligent terminal;
The operation executing module of mobile intelligent terminal, which is performed, recommends authority checking operation on probation, by security code recommended user B Cell-phone number and authority checking on probation code D be sent in the transceiver module of fake certification server;
After fake certification server authentication authority checking code D legitimacy, it sets change module storage security code to recommend The attribute data of user on probation:Security code recommends user B cell-phone numbers on probation, number of inspections and recommends attribute on probation.
In specific implementation process, the system of the invention is also traced to the source database, fake certification service including monitoring and warning Data flow backups to monitoring and warning and traced to the source database in device, by monitoring and warning database evidence inquiry product institute it is stateful under False proof examination trace to the source information.
The same or analogous part of same or analogous label correspondence;
Position relationship is used for being given for example only property explanation described in accompanying drawing, it is impossible to be interpreted as the limitation to this patent;
Obviously, the above embodiment of the present invention is only intended to clearly illustrate example of the present invention, and is not pair The restriction of embodiments of the present invention.For those of ordinary skill in the field, may be used also on the basis of the above description To make other changes in different forms.There is no necessity and possibility to exhaust all the enbodiments.It is all this Any modifications, equivalent substitutions and improvements made within the spirit and principle of invention etc., should be included in the claims in the present invention Protection domain within.

Claims (11)

1. a kind of false proof source tracing method based on mobile intelligent terminal, it is characterised in that including
S1. mobile intelligent terminal reads security code and security code and the corresponding identification number of mobile intelligent terminal is sent to false proof and tested Demonstrate,prove server;
S2. fake certification server judges whether the security code received is legal, and step S3 is performed if legal, otherwise returns anti- Pseudo-code information unauthorized;
S3. fake certification server judges whether the mobile intelligent terminal is that the security code is worked as by the terminal iidentification number received Preceding ownership person, if then returning to the information that Product Validation is certified products, otherwise returns to mobile intelligent terminal and does not have security code Check the information of authority;
Security code current ownership person changes and changed with Product Status, and specific change mode is as follows:
When Product Status changes, the mobile intelligent terminal A of security code current ownership is read its terminal mark after security code Know number, security code and be changed to the mobile intelligent terminal B identification number of new ownership person in advance and be sent in fake certification server, Application change;
After fake certification server authentication security code and security code current ownership person are legal, generation change authority checking code C, and Generation change authority checking code C is sent to mobile intelligent terminal B;
Mobile intelligent terminal B performs change authority checking operation, its terminal iidentification number and change authority checking code C is sent to anti- In pseudo- authentication server;
After fake certification server authentication change authority checking code C legitimacies, change security code current ownership person is mobile intelligence Energy terminal B, change mobile intelligent terminal A are invalid to the ownership of the security code, and change corresponding product state.
2. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 1, it is characterised in that the shifting The dynamic corresponding identification number of intelligent terminal is one kind that cell-phone number, IMSI or other can be in No. ID of distinctive mark terminal.
3. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 1, it is characterised in that described anti- Pseudo-code is generated at random, and the security code and corresponding product coding, Product Status generated at random is stored in fake certification server.
4. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 3, it is characterised in that described anti- Pseudo-code directly or after encryption forms antifalsification label in generation two-dimension code label or write-in radio electronic label, antifalsification label with it is right Answer the one-to-one physical interconnection of product.
5. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 3, it is characterised in that security code The initial setting up mode of current ownership person is as follows:
Product will be pre-allocated whole for the intelligent movable of the initial ownership person of product when circulating initial in fake certification server Identification number security code corresponding with product in end is bound.
6. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 1, it is characterised in that the step In rapid S3, fake certification server judges that mobile intelligent terminal is also executed the following steps after security code current ownership person:
S4. fake certification server judges whether the mobile intelligent terminal is that the security code tries out power person, if then performing step S5, otherwise returns to the information that the mobile intelligent terminal checks authority without security code;
S5. fake certification server judges whether mobile intelligent terminal checking number of times on probation is more than threshold value, is tested if then trying out Card number of times subtracts 1 and returns to the information that Product Validation is certified products, otherwise returns to the information that checking number of times on probation has been used up.
7. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 6, it is characterised in that with anti- The mobile intelligent terminal of pseudo-code power on probation is to perform recommendation on probation by security code current ownership mobile intelligent terminal to operate Arrive, be specially:
Security code current ownership mobile intelligent terminal A is recommended as its terminal iidentification number, security code and in advance after reading security code The mobile intelligent terminal B of power person on probation identification number is sent in fake certification server, and application is on probation to be recommended;
After fake certification server authentication security code and security code current ownership person are legal, generation authority checking code D on probation, and Authority checking on probation code D is sent to mobile intelligent terminal B;
Mobile intelligent terminal B performs authority checking operation on probation, its terminal iidentification number and authority checking on probation code D is sent to anti- In pseudo- authentication server;
After fake certification server authentication authority checking code D legitimacies, the attribute data of storage security code power terminal on probation is increased newly: Mobile intelligent terminal B identification number, number of inspections on probation and attribute on probation.
8. a kind of false proof source tracing method based on mobile intelligent terminal according to any one of claim 1 to 7, its feature exists Also include data flow in fake certification server in, methods described and backup to monitoring and warning to trace to the source database, monitoring can be passed through Early warning trace to the source database evidence inquiry product it is stateful under false proof examination trace to the source information.
9. a kind of anti-fake traceability system based on mobile intelligent terminal, it is characterised in that including mobile intelligent terminal and false proof test Demonstrate,prove server:
Mobile intelligent terminal includes:
Security code read module, for reading security code;
Security code interactive module, for security code and the corresponding terminal iidentification number of mobile intelligent terminal to be sent into fake certification clothes It is engaged in device and receives return information;
Fake certification server includes:
Transceiver module, security code and terminal iidentification number for receiving the transmission of security code interactive module;
Whether security code authentication module, the security code for judging to receive is legal, if then notifying examination Authority Verification module, Otherwise sending module is notified;
Authority Verification module is checked, judges whether terminal is security code current ownership for the terminal iidentification number by receiving Person or power person on probation, and the result is notified into sending module;Wherein security code current ownership person is with Product Status change Change, specific change mode is as follows:
When Product Status changes, the mobile intelligent terminal A of security code current ownership is read its terminal mark after security code Know number, security code and be changed to the mobile intelligent terminal B identification number of new ownership person in advance and be sent in fake certification server, Application change;
After fake certification server authentication security code and security code current ownership person are legal, generation change authority checking code C, and Generation change authority checking code C is sent to mobile intelligent terminal B;
Mobile intelligent terminal B performs change authority checking operation, its terminal iidentification number and change authority checking code C is sent to anti- In pseudo- authentication server;
After fake certification server authentication change authority checking code C legitimacies, change security code current ownership person is mobile intelligence Energy terminal B, change mobile intelligent terminal A are invalid to the ownership of the security code, and change corresponding product state;
Sending module, for the result according to security code authentication module and examination Authority Verification module, " security code is or not transmission It is legal " information, the either information of " Product Validation is certified products " or " terminal without security code check authority " information, Or the information of " on probation checking number of times have been used up " is to the interactive module of mobile intelligent terminal.
10. a kind of anti-fake traceability system based on mobile intelligent terminal according to claim 9, it is characterised in that described Also include security code information storage module in fake certification server, for storing security code and product corresponding with security code Coding, Product Status, wherein security code are generated by random fashion.
11. a kind of anti-fake traceability system based on mobile intelligent terminal according to claim 9, it is characterised in that described Also traced to the source module including monitoring and warning in fake certification server, for prove inquiry product it is stateful under false proof examination trace back Source information.
CN201410819097.9A 2014-12-25 2014-12-25 A kind of false proof source tracing method and system based on mobile intelligent terminal Active CN104463606B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410819097.9A CN104463606B (en) 2014-12-25 2014-12-25 A kind of false proof source tracing method and system based on mobile intelligent terminal
PCT/CN2015/095610 WO2016101760A1 (en) 2014-12-25 2015-11-26 Anti-counterfeit method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410819097.9A CN104463606B (en) 2014-12-25 2014-12-25 A kind of false proof source tracing method and system based on mobile intelligent terminal

Publications (2)

Publication Number Publication Date
CN104463606A CN104463606A (en) 2015-03-25
CN104463606B true CN104463606B (en) 2017-09-05

Family

ID=52909598

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410819097.9A Active CN104463606B (en) 2014-12-25 2014-12-25 A kind of false proof source tracing method and system based on mobile intelligent terminal

Country Status (2)

Country Link
CN (1) CN104463606B (en)
WO (1) WO2016101760A1 (en)

Families Citing this family (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104463606B (en) * 2014-12-25 2017-09-05 张世龙 A kind of false proof source tracing method and system based on mobile intelligent terminal
CN105654316A (en) * 2016-01-04 2016-06-08 河海大学 NFC product anti-counterfeiting traceability system and anti-counterfeiting traceability method thereof
CN107665436A (en) * 2016-07-29 2018-02-06 吴茂全 The fake certification device and method of article
CN106600296B (en) * 2016-12-16 2021-01-15 北京慧眼智行科技有限公司 Anti-counterfeiting traceability method and system based on total amount control
CN106651404B (en) * 2016-12-30 2021-02-02 王清萍 Article anti-counterfeiting analysis method and article anti-counterfeiting analysis system
CN106997540A (en) * 2017-03-22 2017-08-01 北京向芯力科技有限公司 A kind of commodity counterfeit prevention traceability system and method based on dual authentication mechanism
CN109102302A (en) * 2018-03-20 2018-12-28 黎凯还 A kind of distributed validation method for anti-counterfeit based on Internet technology
CN108763939A (en) * 2018-05-02 2018-11-06 开源物联网(广州)有限公司 The encryption method and encryption system of security code
CN109298843A (en) * 2018-11-29 2019-02-01 珠海趣印科技有限公司 A kind of print system
CN109635551B (en) * 2018-12-18 2022-11-22 有份儿智慧科技股份有限公司 Method for anti-counterfeiting tracing and authenticating information data through digital intelligent terminal
CN110210871A (en) * 2019-02-15 2019-09-06 浙江萨宝信息科技有限公司 A kind of false proof device and its method of cash register
CN110310130B (en) * 2019-06-19 2022-12-06 张学忠 Anti-counterfeiting method and system
CN110472710B (en) * 2019-07-31 2022-04-19 安徽连营电子科技有限公司 Rice paper anti-counterfeiting traceability system based on internally-implanted RFID intelligent chip
CN110533128B (en) * 2019-08-21 2023-08-04 上海唯链信息科技有限公司 Encryption-based anti-counterfeiting traceability data processing method, device, system and medium
CN111027983A (en) * 2019-08-23 2020-04-17 北京中电华大电子设计有限责任公司 Anti-counterfeiting identification method and system for intelligent household appliance
CN110517053A (en) * 2019-09-02 2019-11-29 武汉长利新材料科技有限公司 A kind of product transfers the possession of anti-fake source tracing method and system
CN110675171A (en) * 2019-09-29 2020-01-10 匿名科技(重庆)集团有限公司 Anti-counterfeiting tracing method based on block chain
CN111460341A (en) * 2020-04-01 2020-07-28 北京德豹科技有限公司 Double anti-counterfeiting checking method
CN113673999A (en) * 2020-05-01 2021-11-19 福州英流信息科技有限公司 Article tracing anti-counterfeiting identification authentication system and method
CN111708955A (en) * 2020-06-10 2020-09-25 武汉钢铁有限公司 Steel product anti-counterfeiting verification system based on two-dimensional code
CN111898165B (en) * 2020-07-09 2023-07-07 宁波浙大联科科技有限公司 Technical parameter change tracing method and system in PDM system
CN112001630B (en) * 2020-08-24 2024-05-31 中国建材检验认证集团股份有限公司 Product quality monitoring method and device
CN113516482B (en) * 2020-08-28 2024-04-05 王东升 Anti-fake password and anti-fake method
CN112508582A (en) * 2020-11-17 2021-03-16 广东职业技术学院 Multiple invisible pattern anti-counterfeiting system
CN112381553B (en) * 2020-11-20 2024-05-28 王永攀 Product anti-counterfeiting method
CN112669536A (en) * 2020-12-16 2021-04-16 建信金融科技有限责任公司 Management method, management system, management device and medium for shared articles
CN112686074B (en) * 2020-12-29 2023-06-16 永发(河南)模塑科技发展有限公司 Intelligent packaging box capable of checking information of articles in box and checking method thereof
CN112561546A (en) * 2020-12-29 2021-03-26 郭昆 Anti-counterfeiting traceability system and method based on Internet of things
CN113239067B (en) * 2021-04-30 2023-07-18 国网河北省电力有限公司沧州供电分公司 Anti-counterfeiting method for right-confirming certificate
CN113159690A (en) * 2021-05-08 2021-07-23 包头市畅行交通信息科技有限公司 Method and system for anti-counterfeiting tracing of cross-border commodities based on Internet of things
CN113435917A (en) * 2021-08-24 2021-09-24 深圳市将维可变数据赋码技术有限公司 Anti-counterfeiting tracing method and system based on block chain
CN113693297A (en) * 2021-09-28 2021-11-26 深圳市吉迩科技有限公司 Anti-counterfeiting method for aerosol generating device and aerosol generating device
CN114363897A (en) * 2021-11-02 2022-04-15 四川天邑康和通信股份有限公司 Method and system for identifying and inquiring authenticity of two-dimensional code of pon terminal device
CN114826621A (en) * 2022-06-27 2022-07-29 中化现代农业有限公司 Seed tracing method and device, electronic equipment and storage medium
CN118153599B (en) * 2024-02-21 2024-08-23 江苏稻源科技集团有限公司 High-frequency anti-counterfeiting method and system based on UID reading counting
CN118229308B (en) * 2024-05-23 2024-07-23 北京中科金有限元技术有限公司 Multi-mode anti-counterfeiting verification method and system based on deep learning

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101458806A (en) * 2009-01-09 2009-06-17 黄建湘 Mobile phone electronic ticket anti-counterfeiting verification method and system
CN102376031B (en) * 2011-05-27 2015-06-24 杭州博联智芯科技有限公司 Anti-counterfeiting tracking system using chip to identify articles
CN102289767A (en) * 2011-08-19 2011-12-21 段红双 Commodity anti-counterfeiting method
CN102411750A (en) * 2011-11-09 2012-04-11 浙江腾昌信息科技有限公司 Digital dual anti-counterfeiting authentication system and method
CN104463606B (en) * 2014-12-25 2017-09-05 张世龙 A kind of false proof source tracing method and system based on mobile intelligent terminal

Also Published As

Publication number Publication date
WO2016101760A1 (en) 2016-06-30
CN104463606A (en) 2015-03-25

Similar Documents

Publication Publication Date Title
CN104463606B (en) A kind of false proof source tracing method and system based on mobile intelligent terminal
US8421593B2 (en) Apparatus, systems and methods for authentication of objects having multiple components
CN109949058A (en) Antifake method for products, device, electronic equipment and read/write memory medium
WO2007107068A1 (en) Anti-forgery method and apparatus based on cpk electronic label
CN104252677A (en) Two-dimension code anti-counterfeiting technology and two-dimension code anti-counterfeiting system-based platform system
CN105654316A (en) NFC product anti-counterfeiting traceability system and anti-counterfeiting traceability method thereof
CN110310130B (en) Anti-counterfeiting method and system
CN101388086A (en) Digital coding method for products anti-counterfeiting physical distribution monitoring system
CN103903150A (en) Verification system and verification method thereof
CN102982463A (en) Commodity anti-counterfeiting system and two-channel method to realize commodity anti-counterfeiting
CN102779284A (en) RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like
CN104217241A (en) Electronic anti-fake label and realizing method
CN101814152B (en) Anti-counterfeit method and system based on readable identification code and answerback code of identification code
JP2016511466A (en) Product counterfeit prevention discrimination method
Hetcher Changing the Social meaning of privacy in Cyberspace
CN109472620A (en) A kind of anti-fake and integrating system based on block chain
CN108880789A (en) The anti-fake source tracing method of hardware product, node device and system
Zhang et al. Appb: Anti-counterfeiting and privacy-preserving blockchain-based vehicle supply chains
CN108985431B (en) Anti-counterfeit label and method for detecting and identifying genuine goods of registered trademark
CN112070567B (en) Quality control system based on block chain and control method thereof
CN102082815B (en) Terminal-based stepwise anti-counterfeiting verification and identity authentication system and method
CN101661561B (en) Product information query system with remote data server and product information query method
CN106815614A (en) A kind of bank acceptance Antiforge system of use NFC anti-counterfeiting technologies
CN103778540A (en) Verification system and method thereof
CN111127037B (en) Commodity universal anti-counterfeiting method based on blockchain account system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190116

Address after: 510000 First Floor 101, 58 Jinzhongheng Road, Baiyun District, Guangzhou City, Guangdong Province

Patentee after: Guangzhou Longsheng Technology Co., Ltd.

Address before: 510240 Academy of Information Sciences, No. 24 Dongsha Street, Textile Road, Haizhu District, Guangzhou City, Guangdong Province

Patentee before: Zhang Shilong

TR01 Transfer of patent right