CN104463606B - A kind of false proof source tracing method and system based on mobile intelligent terminal - Google Patents
A kind of false proof source tracing method and system based on mobile intelligent terminal Download PDFInfo
- Publication number
- CN104463606B CN104463606B CN201410819097.9A CN201410819097A CN104463606B CN 104463606 B CN104463606 B CN 104463606B CN 201410819097 A CN201410819097 A CN 201410819097A CN 104463606 B CN104463606 B CN 104463606B
- Authority
- CN
- China
- Prior art keywords
- security code
- intelligent terminal
- mobile intelligent
- code
- product
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 238000007689 inspection Methods 0.000 claims abstract description 40
- 238000012019 product validation Methods 0.000 claims abstract description 10
- 230000008859 change Effects 0.000 claims description 55
- 238000012795 verification Methods 0.000 claims description 23
- 238000012544 monitoring process Methods 0.000 claims description 14
- 230000002452 interceptive effect Effects 0.000 claims description 13
- 238000003860 storage Methods 0.000 claims description 11
- 230000005540 biological transmission Effects 0.000 claims description 4
- 238000012360 testing method Methods 0.000 claims description 4
- 230000008569 process Effects 0.000 abstract description 18
- 238000004519 manufacturing process Methods 0.000 description 13
- 238000005516 engineering process Methods 0.000 description 8
- 238000012856 packing Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 4
- 238000009826 distribution Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000015572 biosynthetic process Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 241001439061 Cocksfoot streak virus Species 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004752 cathodic stripping voltammetry Methods 0.000 description 1
- 230000003098 cholesteric effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- OWZREIFADZCYQD-NSHGMRRFSA-N deltamethrin Chemical compound CC1(C)[C@@H](C=C(Br)Br)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 OWZREIFADZCYQD-NSHGMRRFSA-N 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000002845 discoloration Methods 0.000 description 1
- 238000013213 extrapolation Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 239000007788 liquid Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to product safety technical field, more particularly, to a kind of false proof source tracing method based on mobile intelligent terminal and system.Method includes:S1. mobile intelligent terminal reads security code and sends security code and the corresponding identification number of mobile intelligent terminal to fake certification server;S2. fake certification server judges whether the security code received is legal, and step S3 is performed if legal, otherwise returns to security code information unauthorized;S3. fake certification server by the terminal iidentification number received judge the terminal whether be security code current ownership person or with can number of inspections power person on probation, if then returning to the information that Product Validation is certified products, the information that terminal checks authority without security code is otherwise returned.The present invention is based on mobile intelligent terminal, and mobile intelligent terminal popularity rate is high, and actual customer can easily intervene false proof system, can improve the process of Antiforge inquiry, with low cost, and checking is simple.
Description
Technical field
The present invention relates to product safety technical field, traced back more particularly, to a kind of false proof based on mobile intelligent terminal
Source method and system.
Background technology
Fake and inferior commodities flood market, and seriously compromise the interests of consumer, are brought to commodity production enterprise huge
Big economic loss, with very big social harm.Anti-counterfeiting technology is developed into today, known method for anti-counterfeit, technology and production
Product are innumerable, and main anti-fake product includes three major types:Vision judges, consulting judges, equipment judges:
1), vision judges, i.e., the mode visually distinguishing true from false.As laser hologram, texture, radium-shine, Ultraluminescence, daylight become
Color, heat-sensitive variable colour, pressure-sensitive discoloration, wet sensitive colour changing, accurate version line, micro printing, thermochromic liquid crystal, super wiping are deformed, disposably
Crush picture and text, open type duplicature applique, irreversible memory-type temperature-sensitive, reversible feel heat-sensitive variable colour, paper water wave, cholesteric liquid
Brilliant, miniature stealth of graphic code etc..If recognizing that content and method are simple using the anti-fake product of this technology, it is easy to imitative
System, does not reach antifalse effect;If recognizing that content and method are excessively cumbersome, certain identification experience is needed, is unfavorable for promoting
Use.This technology is not inaccurate, rigorous due to only leaning on macroscopic visual to judge the true and false of label simultaneously.
2), consulting judges, i.e., by way of inquire about and distinguish true from false phone, short message, internet etc..Using this skill
If the anti-fake product of art does not limit inquiry times, inquiry code can be replicated easily, and antifalse effect is poor;If being defined to one
The inquiry mode of code once, then in the presence of the deficiency that can not be verified, can only disposably verify before purchase.This technology is due to only anti-simultaneously
Inquiry code correctness in itself is presented, or is only capable of informing and is queried number of times, if the judgement of certified products generally allows buyer voluntarily to sentence
Disconnected, Query Result is difficult to convince people, and in the presence of cracking, bribing the digital possibility to copy of purchase, not rigorous enough, confidence level is not
It is high.
3), equipment judges, i.e., the mode being distinguish true from false using special equipment, true and false information is shown on special equipment.Such as
Holographic magnetic card, magnetic ink, smart credit card, bar code, Quick Response Code, metallic barcode, IC-card, RFID card, laser card, biochemistry, original
Daughter nucleus double card, electronic recognition, nuclear track technique etc..By special equipment itself or send data to the webserver during examination and enter
Row encryption and decryption and examination, ping procedure are transparent to user, simple, convenient, and product can be checked repeatedly after before sales, tool
There is certain practicality and anti-counterfeit capability.The electronic anti-counterfeit tag of some of anti-fake products be also built-in with random code generator or
Sequence number generator, realization often verifies that once verifying end/server all produces a new random code or sequence number, to product identification;
Some anti-fake products additionally provide label and the independent authentication or two-way authentication function of dedicated identification device;Some anti-fake products are also
Based on PKI/CA patterns, product information, identifying code, sequence number/sequence number are encrypted, implement multistage encryption and decryption, digital signature
Deng.Although such technology adds imitated difficulty to some extent, due to the true and false, cost need to be judged by special equipment
Height, versatility is not strong, more it is essential that checking means are single, and the pseudo- checking to imitated identification equipment is tested without other evidences
Card means, although some method for anti-counterfeit propose label, identification equipment bi-directional verification, but if imitated identification equipment is only carried out
The pseudo- reading of label information and the pseudo- connection of server are checked, then the information alert of emulation presentation " being verified, certified products ", then
The method for anti-counterfeit such as bi-directional verification are cracked easily, so as to realize the purpose of deception consumer, anti-counterfeit capability surface is powerful, actually very
It is fragile.
In summary, existing method for anti-counterfeit and technology are still relied mainly on prevention, and are to increase to fake from technical standpoint to copy
Cost, the imitated complexity of increase fraud, so that imitated possibility of faking is reduced, by constantly updating counterfeit protection measures and work
Skill, causes cost constantly to raise, but can not predict/anti-the pseudoperiod of the current counterfeit protection measures of early warning(It is imitated from putting into),
Cause a variety of counterfeit protection measures in market of identical product and deposit, domestic consumer more puzzles.Really to solve this problem, false proof system
The cost of manufacture of system must be very low, and examination mode is simple and easy to apply, is repeatedly checked after being purchased before being purchased, and has independent evidence examination
Method recognizes pseudo- checking situation, audit and warning function when being checked with doubtful imitation products.
The content of the invention
The present invention is to overcome at least one defect described in above-mentioned prior art(It is not enough)There is provided a kind of cost it is low, examination
The simple false proof source tracing method based on mobile intelligent terminal.
The present invention also provides that a kind of cost is low, the simple anti-fake traceability system based on mobile intelligent terminal of examination.
In order to solve the above technical problems, technical scheme is as follows:
A kind of false proof source tracing method based on mobile intelligent terminal, including:
S1. mobile intelligent terminal reads security code and sends security code and the corresponding identification number of mobile intelligent terminal to anti-
Pseudo- authentication server;
S2. fake certification server judges whether the security code received is legal, and step S3 is performed if legal, is otherwise returned
The pseudo-code that goes back on defense information unauthorized;
S3. fake certification server judges whether the terminal is that the security code is current by the terminal iidentification number received
Ownership person, if then returning to the information that Product Validation is certified products, otherwise returns to the letter that terminal checks authority without security code
Breath.
In such scheme, the corresponding identification number of the mobile intelligent terminal is that cell-phone number, IMSI or other can distinctive marks
One kind in No. ID of terminal.
In such scheme, the security code is generated at random, security code and corresponding product coding, the product shape generated at random
State is stored in fake certification server.
In such scheme, the security code directly or after encryption is generated in two-dimension code label or write-in radio electronic label
Form antifalsification label, antifalsification label and the one-to-one physical interconnection of corresponding product.
In such scheme, the initial setting up mode of security code current ownership person is as follows:
Product will pre-allocate the mobile intelligence for the initial ownership person of product when circulating initial in fake certification server
Energy terminal iidentification number security code corresponding with product is bound.
In such scheme, security code current ownership person changes and changed with Product Status, and specific change mode is as follows:
When Product Status changes, the mobile intelligent terminal A of security code current ownership was read its end after security code
The identification number held identification number, security code and be changed to the mobile intelligent terminal B of new ownership person in advance is sent to fake certification service
In device, application change;
After fake certification server authentication security code and security code current ownership person are legal, generation change authority checking code
C, and change authority checking code C is sent to mobile intelligent terminal B;
Mobile intelligent terminal B performs change authority checking operation, and its terminal iidentification number and change authority checking code C are sent
Into fake certification server;
After fake certification server authentication change authority checking code C legitimacies, change security code current ownership person is eventually
B is held, change terminal A is invalid to the ownership of the security code, and changes corresponding product state.
In such scheme, in the step S3, fake certification server judges that mobile intelligent terminal is not that security code is current
Also executed the following steps after ownership person:
S4. fake certification server judges whether the terminal is that the security code tries out power person, if then performing step S5,
Otherwise the information that the terminal checks authority without security code is returned;
S5. fake certification server judges whether terminal checking number of times on probation is more than threshold value, if then trying out checking time
Number subtracts 1 and returns to the information that Product Validation is certified products, otherwise returns to the information that checking number of times on probation has been used up.
In such scheme, the mobile intelligent terminal with security code power on probation is to move intelligence by security code current ownership
Energy terminal performs recommendation operation on probation and obtained, and is specially:
Security code current ownership mobile intelligent terminal A is pushed away its terminal iidentification number, security code and in advance after reading security code
The identification number for recommending the mobile intelligent terminal B to try out power person is sent in fake certification server, and application is on probation to be recommended;
After fake certification server authentication security code and security code current ownership person are legal, generation authority checking code on probation
D, and authority checking on probation code D is sent to mobile intelligent terminal B;
Mobile intelligent terminal B performs authority checking operation on probation, and its terminal iidentification number and authority checking on probation code D are sent
Into fake certification server;
After fake certification server authentication authority checking code D legitimacies, the attribute of storage security code power terminal on probation is increased newly
Data:Terminal B identification number, number of inspections on probation and attribute on probation.
In such scheme, methods described also includes data flow in fake certification server and backups to monitoring and warning tracing to the source number
According to storehouse, the database that can be traced to the source by monitoring and warning evidence inquiry product it is stateful under false proof examination trace to the source information.
A kind of anti-fake traceability system based on mobile intelligent terminal, including mobile intelligent terminal and fake certification server:
Mobile intelligent terminal includes:
Security code read module, for reading security code;
Security code interactive module, for security code and the corresponding terminal iidentification number of mobile intelligent terminal to be sent into false proof test
Demonstrate,prove in server and receive return information;
Fake certification server includes:
Transceiver module, security code and terminal iidentification number for receiving the transmission of security code interactive module;
Whether security code authentication module, the security code for judging to receive is legal, if then notifying examination Authority Verification
Module, otherwise notifies sending module;
Authority Verification module is checked, judges whether terminal is the current institute of security code for the terminal iidentification number by receiving
The person of having the right or power person on probation, and the result is notified into sending module;
Sending module, for the result according to security code authentication module and examination Authority Verification module, sends " false proof
Code is illegal " information, the either information of " Product Validation is certified products " or " terminal without security code check authority " letter
Breath, or " on probation checking number of times have been used up " information to mobile intelligent terminal interactive module.
In such scheme, security code information storage module is also included in the fake certification server, it is false proof for storing
Code and product coding corresponding with security code, Product Status, wherein security code are generated by random fashion.
In such scheme, also traced to the source module including monitoring and warning in the fake certification server, for proving inquiry production
Product it is stateful under false proof examination trace to the source information.
Compared with prior art, the beneficial effect of technical solution of the present invention is:
1)The present invention is based on mobile intelligent terminal, and mobile intelligent terminal popularity rate is high, and actual customer can be easily
False proof system is intervened, the process of Antiforge inquiry can be improved, with low cost, checking is simple.
2)The present invention, will be false proof by setting up product false proof code examination authority tree and product total state ping procedure message sense
Code with examination mobile intelligent terminal bound, it is allowed to product it is pre-sales, carry out multiple true and false examination after sale, while pass through bind
Mobile intelligent terminal ensure that the credibility and uniqueness of product false proof code verification process.
3)The present invention changes effective examination mobile intelligent terminal of product by the change of product ownership, it is possible to have
Body limits number of inspections, and examination mobile intelligent terminal and number of inspections can be according to the changes of product ownership targetedly
Set, the renewal of number of inspections and Product Status will also be recorded in fake certification server so that counterfeit security code product
Sales volume be limited, counterfeit income is very low with counterfeit benefit cost ratio;And when certified products enters sales section and can not sold
It can be handled automatically into early warning, because the mobile intelligent terminal identification number for the association of adulterant examination originally that is stored with system(Such as
Cell-phone number), to crack down on counterfeit goods, evidence obtaining offers convenience, and increases counterfeit danger coefficient, can effectively contain and hit counterfeit behavior.
4) present invention also simultaneously provides monitoring and warning and traced to the source database, realizes to antifalsification label(Product)Circulation examination
The query function of tracing to the source of information, is independent auxiliary evidence process, effectively prevent mobile intelligent terminal and forge examination result
Pseudo- checking situation.
5)The present invention constructs the false proof system of efficient system, and counterfeiter only has the whole systems of imitation, is only possible to list
Part commodity are largely forged, and considerably increase counterfeit cost, reduce counterfeit possibility.
Brief description of the drawings
Fig. 1 is a kind of particular flow sheet of the false proof source tracing method based on mobile intelligent terminal of the present invention.
Fig. 2 shows for product ownership person's changing process in a kind of false proof source tracing method based on mobile intelligent terminal of the present invention
It is intended to.
Fig. 3 shows for recommendation examination user's flow on probation in a kind of false proof source tracing method based on mobile intelligent terminal of the present invention
It is intended to.
The system tray that Fig. 4 is based on for a kind of false proof source tracing method specific embodiment based on mobile intelligent terminal of the present invention
Structure schematic diagram.
Fig. 5 is the security code that is built in a kind of false proof source tracing method specific embodiment based on mobile intelligent terminal of the present invention
Check authority tree schematic diagram.
Fig. 6 traces to the source acquisition of information flow for a kind of examination of the false proof source tracing method based on mobile intelligent terminal of the present invention
Figure.
Embodiment
Accompanying drawing being given for example only property explanation, it is impossible to be interpreted as the limitation to this patent;
In order to more preferably illustrate the present embodiment, some parts of accompanying drawing have omission, zoomed in or out, and do not represent actual product
Size;
To those skilled in the art, it is to be appreciated that some known features and its explanation, which may be omitted, in accompanying drawing
's.
In the description of the invention, it is to be understood that term " first ", " second " are only used for describing purpose, and can not
It is interpreted as indicating or implies relative importance or imply the quantity of indicated technical characteristic.Thus, " first " of restriction, "
One or more this feature can be expressed or be implicitly included to two " feature.In the description of the invention, unless otherwise saying
Bright, " multiple " are meant that two or more.
In the description of the invention, it is necessary to illustrate, unless otherwise clearly defined and limited, term " installation ", " company
Connect " it should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected, or it is integrally connected;It can be machine
Tool is connected or electrically connected;It can be joined directly together or be indirectly connected with by intermediary, it may be said that two
The connection of element internal.For the ordinary skill in the art, with concrete condition above-mentioned term can be understood in the present invention
Concrete meaning.
Technical scheme is described further with reference to the accompanying drawings and examples.
Embodiment 1
As shown in figure 1, being a kind of flow chart of the false proof source tracing method based on mobile intelligent terminal of the present invention.Referring to Fig. 1,
A kind of specific steps of the false proof source tracing method based on mobile intelligent terminal of this specific embodiment include:
S101. mobile intelligent terminal reads security code and sends security code and the corresponding identification number of mobile intelligent terminal
To fake certification server;
S102. fake certification server judges whether the security code received is legal, and step S103 is performed if legal,
Otherwise security code information unauthorized is returned;
S103. fake certification server judges whether the terminal is that the security code is worked as by the terminal iidentification number received
Preceding ownership person, if then returning to the information that Product Validation is certified products, otherwise performs step S104;
S104. fake certification server judges whether the terminal is that the security code tries out power person, if then performing step
S105, otherwise returns to the information that the terminal checks authority without security code;
S105. fake certification server judges whether terminal checking number of times on probation is more than threshold value, if then trying out checking
Number of times subtracts 1 and returns to the information that Product Validation is certified products, otherwise returns to the information that checking number of times on probation has been used up.
Wherein, the corresponding identification number of mobile intelligent terminal is that cell-phone number, IMSI or other can be No. ID of distinctive mark terminal
In one kind.
Wherein, the security code is produced by random fashion, is corresponded with product and has uniqueness.Generate at random
Security code and corresponding product coding, Product Status are stored in fake certification server.Preferably, in fake certification server
Middle to build security code information bank to store security code relevant information, product coding corresponding with security code writes security code information bank
The logic association of security code and product is realized afterwards, and sets Product Status to be " stock ".
Data structure main body can be built according to self-defined mode during specific security code information library storage, can such as built such as
Lower data structure main body is stored:
[security code, product coding, Product Status].
Security code directly or after encryption generates formation in two-dimension code label or write-in radio electronic label after generating at random anti-
Pseudo label.
Antifalsification label can be fixed at the opening of product or its outer packing when applying by modes such as stickups, with product thing
Reason association;When product or outer packing opening, antifalsification label will cause security code not read and fail therewith by damaged.
In this specific embodiment, security code and security code current ownership mobile intelligent terminal are bound, only
Security code examination can be carried out by the mobile intelligent terminal of binding, it is ensured that the legitimacy of examination.And it is except when preceding all
Weigh outside terminal, the security code true and false can also be checked by its recommendation mobile intelligent terminal on probation, being extended with the way of recommendation can
The mobile intelligent terminal scope of examination, while the mobile intelligent terminal property for passing through binding(Ownership person, power person on probation)To limit
Determine number of inspections, be the further obstacle of verification setting of pseudo- security code under the premise of it ensure that the legitimacy of examination.
In specific implementation process, the initial setting up mode of security code current ownership person is as follows:
Product will pre-allocate the mobile intelligence for the initial ownership person of product when circulating initial in fake certification server
Energy terminal iidentification number security code corresponding with product is bound, and sets Product Status to be " sale ";
Preferably, as shown in Fig. 2 security code current ownership person changes and changed with Product Status, mode is specifically changed
It is as follows:
When Product Status changes, the mobile intelligent terminal A of security code current ownership was read its end after security code
The identification number held identification number, security code and be changed to the mobile intelligent terminal B of new ownership person in advance is sent to fake certification service
In device, application change;
After fake certification server authentication security code and security code current ownership person are legal, generation change authority checking code
C, and change authority checking code C is sent to mobile intelligent terminal B with communication forms such as short messages;Mobile intelligent terminal B performs change
More authority checking is operated, and its terminal iidentification number and change authority checking code C are sent in fake certification server;
After fake certification server authentication change authority checking code C legitimacies, change security code current ownership person is eventually
B is held, change terminal A is invalid to the ownership of the security code, and changes corresponding product state.
In specific implementation process, as shown in figure 3, the mobile intelligent terminal with security code power on probation is worked as by security code
Preceding ownership mobile intelligent terminal performs recommendation operation on probation and obtained, and is specially:
Security code current ownership mobile intelligent terminal A is pushed away its terminal iidentification number, security code and in advance after reading security code
The identification number for recommending the mobile intelligent terminal B to try out power person is sent in fake certification server, and application is on probation to be recommended;
After fake certification server authentication security code and security code current ownership person are legal, generation authority checking code on probation
D, and authority checking on probation code D is sent to mobile intelligent terminal B with communication forms such as short messages;
Mobile intelligent terminal B performs authority checking operation on probation, and its terminal iidentification number and authority checking on probation code D are sent
Into fake certification server;
After fake certification server authentication authority checking code D legitimacies, the attribute of storage security code power terminal on probation is increased newly
Data:Terminal B identification number, number of inspections on probation and attribute on probation.
In specific implementation process, the method described in the present invention also includes data flow in fake certification server and backups to prison
Early warning is surveyed to trace to the source database, the database that can be traced to the source by monitoring and warning evidence inquiry product it is stateful under false proof examination trace to the source
Information.Specific information inquiry mode of tracing to the source is as shown in Figure 6.
Based on above-mentioned specific embodiment, it is expanded on further below based on method one specific embodiment of offer of the present invention
The method of the present invention.
In this specific embodiment, as shown in figure 4, including fake certification server 201, as mobile intelligent terminal
Possess the read write lines 203 of antifalsification label read functions, product 204 on mobile phone 202, mobile phone 202 and monitoring and warning can be connected
Trace to the source the web terminals 205 of database, wherein its corresponding antifalsification label in physical interconnection on product 204.
The generation of security code:Unique security code is randomly generated, security code information bank is built in fake certification server, is prevented
The data structure main body of pseudo-code information bank is:[security code, product coding, Product Status];Security code directly or after encryption is generated
Antifalsification label is formed in two-dimension code label or write-in radio electronic label.
Antifalsification label is fixed at the opening of product or its outer packing by modes such as stickups, with product physical interconnection;Production
When product or outer packing opening, antifalsification label will cause security code not read and fail therewith by damaged;Security code is given birth at random
Product coding and security code are mapped after, and product coding is write into the corresponding security code information table of security code information bank
In, the logic association of security code and product is realized, and set Product Status to be " stock ".
In order to review each state and process of product in intermediate links, this example has preset the multiple states of product, bag
Include " stock ", " sale ", " purchase ", " gifting " etc..
Production marketing personnel's certification cellphone information storehouse is built in fake certification server, data structure main body is:[sale
Personnel's cell-phone number, store's numbering, sales force's numbering, authenticated time, effective status], [effective status] initial value is " to have
Effect ", when certain sales force leaves office, modification [effective status] value is engineering noise.
When product enters sales section, change Product Status is " sale " in fake certification server, is now tested false proof
Security code mandate examination certification tree is built in card server, security code and certification tree are one-to-one relationships.Certification tree node
Data structure be:[node type, it is allowed to check cell-phone number, it is allowed to number of inspections, child pointers], wherein [node type] takes
It is worth for " production marketing ", " product purchase ", " product is gifted ", " checking on probation ";[allowing to check cell-phone number] can in root node
To have one or more cell-phone numbers, multiple cell-phone number CSVs, and it can only be effective sales force's certification cell-phone number;Its
Have in remaining descendant nodes and there can only be the cell-phone number in a cell-phone number, tree in each node to allow repetition;[allow examination time
Number] value be 0(Expression does not allow checking)、1(Expression allows checking once)、-1(Indicate without checking number of times limitation);Wherein save
Vertex type can only be root node for the node of " production marketing ", and node type can only be root node for the node of " product purchase "
Child nodes, and the type node can only at most have one in certification tree;Node type can only for the node of " checking on probation "
It is leaf node.
In specific building process, security code current ownership person is corresponding with Product Status, in binding procedure, security code
The number of inspections of current ownership person is unrestricted, but the number of inspections of non-security code current ownership person is usually arranged as 1 time, and
And need to obtain legal examination authority by way of recommending to try out.
When building security code mandate examination certification tree first in fake certification server, the root section of examination certification tree is set up
Vertex type is " production marketing ", it is allowed to which number of inspections is -1, it is allowed to checks cell-phone number and recognizes for one or more effective sales forces
Cell-phone number is demonstrate,proved, while it is " sale " state to change Product Status.The logic for completing security code and sales force's certification cell-phone number is tied up
It is fixed.
Therefore based on this mode, product is in distribution state during security code mandate examination certification tree initial construction, now prevents
Pseudo-code current ownership person is sales force, and now the original state of product is distribution state, security code mandate examination certification
The cell-phone number of sales force and the binding relationship of security code are constructed in tree automatically.When Product Status changes, security code
Child nodes can be formed to update the corresponding data of security code examination certification in examination certification tree by authorizing.
In a particular application, corresponding APP softwares can be installed in smart mobile phone to be inquired about.As shown in Fig. 2 specific
Verify antifalsification label(Product)Authenticity verification when, in smart mobile phone run APP softwares, pass through built-in camera or extrapolation
(It is external)Read write line directly or indirectly reads security code information in antifalsification label, APP softwares the security code information of reading, itself
The information such as cell-phone number are submitted to fake certification server;Fake certification server verifies according to proof rule to security code,
Verification process is illustrated below by citing proof rule:
Rule 1:Security code is effectively legal:The security code of checking must be that legal and checking cell-phone number must be this
" allowing to check cell-phone number " in the examination certification tree node of security code, and the permission number of inspections value of the node is 1 or -1.
Rule 2:If security code state is " sale " state, checks cell-phone number and appear in the security code mandate and check and recognize
Demonstrate,prove in the root node of tree, node number of inspections is -1, then allow the mobile phone to verify the true and false and return to certified products information.After examination not more
Change the number of inspections of the node, add up number of inspections of the cell-phone number to security code.
Rule 3:If security code state is " sale " state, in the root node that certification tree is checked in the security code mandate
One or more certification sales force mobile phones, one or more other users mobile phones can be recommended to carry out on probation look into APP
Test, in security code mandate examination certification tree, node where it(That is root node)Under newly-built child nodes, the child nodes
Entitled " on probation checking ", number of inspections is 1, and examination cell-phone number is recommended cell-phone number on probation.This recommendation process can be as
Flow shown in Fig. 3 is operated
Rule 4:If security code state is " sale " state, checks cell-phone number and appear in the security code mandate and check and recognize
Card is set in non-root node, node number of inspections is 1, then allows the mobile phone to check and return to certified products information, and contain additional information:
" distribution state, can only try out checking once, verify that number of times is unrestricted after purchase ".The number of inspections value of the node is changed after examination
For 0, number of inspections of the accumulative cell-phone number to the security code.
Rule 5:If security code state is " sale " state, in the root node that certification tree is checked in the security code mandate
One or more certification sales force mobile phones, it is " purchase " state to change security code state by APP when product is sold,
In security code mandate examination certification tree, node where it(That is root node)Number of inspections be revised as 0, node where it
Under newly-built child nodes, entitled " the product purchase " of the child nodes be set, and number of inspections is -1, examination cell-phone number is purchase
Person's cell-phone number.
Rule 6:If security code state is " purchase " state, there is security code mandate examination certification in examination cell-phone number
The nodename of tree is " product purchase ", node number of inspections is " -1 ", then allows the mobile phone to verify the true and false and return to certified products letter
Breath.The number of inspections of the node is not changed after examination, adds up number of inspections of the cell-phone number to security code.Simultaneously can be in APP
One or more other users mobile phones are recommended to be checked, in security code mandate examination certification tree, under node where it
Newly-built child nodes, the nodename of the child nodes is " checking on probation ", and number of inspections is 1, and examination cell-phone number is recommended
Cell-phone number.
Rule 7:If security code state is " purchase " state, security code mandate examination certification occurs in examination cell-phone number
The non-root node entitled " checking on probation " of tree, node number of inspections are 1, then allow the mobile phone to check and return to certified products information,
And contain additional information:" product has been sold out, and sells state, can only try out checking 1 time, such as needs repeatedly, then needs repeatedly recommendation,
Or verify that number of times is unrestricted after gifting ", store is may also include in return information, time, buyer etc. is sold and can trace to the source information.
The number of inspections value that the node is changed after examination is 0, adds up number of inspections of the cell-phone number to the security code.
Rule 8:If security code state is " purchase " state, security code mandate examination certification occurs in examination cell-phone number
The nodename of tree is " product purchase ", node number of inspections is -1, is recognized when representing product to other users by APP modifications
It is " gifting " state to demonstrate,prove the security code state in server, in security code mandate examination certification tree, node where it
Number of inspections is revised as 0, newly-built child nodes under node where it, sets entitled " product is gifted " of the child nodes,
Number of inspections is -1, and examination cell-phone number is acceptor's cell-phone number.
Rule 9:If security code state is " gifting " state, security code mandate examination certification occurs in examination cell-phone number
The nodename of tree is " product is gifted ", the mobile phone of node number of inspections -1, it is allowed to which the mobile phone is checked and returns to certified products information, returns
Write in reply in breath comprising store, sell time, buyer, time of gifting etc. and can trace to the source information.One can be recommended in APP simultaneously
Individual or multiple other users mobile phones are checked, in security code mandate examination certification tree, newly-built child under node where it
Child node, the nodename of the child nodes is " checking on probation ", and number of inspections is 1, and examination cell-phone number is recommended cell-phone number.
Rule 10:If security code state is " gifting " state, security code mandate examination certification occurs in examination cell-phone number
The nodename of tree is " product is gifted ", the mobile phone of node number of inspections -1, can represent product again by APP to other hands
The number of inspections of node where it, in security code mandate examination certification tree, is revised as 0, node where it by machine user
Under newly-built child nodes, entitled " product is gifted " of the child nodes be set, and number of inspections is -1, examination cell-phone number is is given
Person's cell-phone number.Product number of times of gifting is unrestricted.
Rule 11:It is being unsatisfactory for aforementioned rule, it is impossible to when being verified, the examination information of return is as follows:
R11-1:When security code is illegal, return " security code is illegal, and regular store please be gone to buy ";
R11-2:Security code is legal and state is " sale " state, then return " in production marketing, the sale people only authorized
Member's mobile phone and its recommendation user mobile phone on probation could carry out authenticity verification ";
R11-3:Security code is legal and state is " purchase " state, then " product has been sold out, only buyer's mobile phone for return
And its recommend user mobile phone on probation to carry out authenticity verification ";
R11-4:Security code is legal and state is " gifting " state, then " product has been sold out and gifted, and is only given for return
Person's mobile phone and its recommendation user mobile phone on probation could carry out authenticity verification ".
Rule 12:Cellphone subscriber in each node of certification tree is checked in security code mandate, can be logical in official WEB websites
Cross the identifying code inquiry antifalsification label for submitting security code, cell-phone number and mobile phone to receive(Product)Examination circulation trace to the source information, letter
Breath in chronological order comprising production marketing, the overall process such as buy, gift, checking and trace to the source information, and during each time
Check mobile phone(Part cell-phone number shielding processing), it is independent secondary au-thentication process, is verified for the puppet after preventing APP from faking.
Rule 13:Situations below will trace to the source the information such as examination cell-phone number, examination time write-in monitoring and warning database,
Carry out product examination data monitoring and early warning processing:
R13-1:When security code is illegal;
R13-2:When there are loop situations in examination of the sales force's mobile phone of certification to the legal security code of " distribution state ",
As ping procedure be security code 1->Security code 2->Security code 1, now shows there are the feelings of product seller oneself sell-fake-products
Condition.
R13-3:One or more certification sales force cell-phone numbers are bound to set up certain security code mandate examination certification tree and be somebody's turn to do
In the presence of security code mandate checks certification tree, now show there is the possibility that adulterant has been sold prior to certified products.
R13-4:Security code is legal, and appears in certain cell-phone number in the node of security code mandate examination certification tree to this
When the number of inspections of security code exceedes threshold value, now show there is the possibility that security code is replicated fraud.
R13-5:Security code is legal, and certain cell-phone number not appeared in the node of security code mandate examination certification tree
When exceeding threshold value to the number of inspections of the security code, now show there is the possibility for attempting to crack Antiforge system.
The security code mandate examination certification tree built based on above-mentioned proof rule and its node structure schematic diagram such as Fig. 5 institutes
Show.
In this specific embodiment, build production marketing, multiple states such as buy, gift, according to shifting under different conditions
The data interaction of dynamic intelligent terminal and fake certification server can change Product Status, the mobile phone of security code current ownership person
Number, the inquiry times of security code current ownership person, security code current ownership person recommend user on probation and recommended
The cell-phone number of user on probation, inquiry times of recommended user on probation etc..
Embodiment 2
On the basis of embodiment 1, the present invention also provides a kind of anti-fake traceability system based on mobile intelligent terminal.At this
Mobile intelligent terminal is specifically included in a kind of anti-fake traceability system based on mobile intelligent terminal of specific embodiment and false proof is tested
Demonstrate,prove server:
Mobile intelligent terminal includes:
Security code read module, for reading security code;
Security code interactive module, for security code and the corresponding cell-phone number of mobile intelligent terminal to be sent into fake certification clothes
It is engaged in device and receives return information;
Fake certification server includes:
Transceiver module, security code and cell-phone number for receiving the transmission of security code interactive module;
Whether security code authentication module, the security code for judging to receive is legal, if then notifying examination Authority Verification
Module, otherwise notifies sending module;
Authority Verification module is checked, judges whether terminal is security code current ownership for the cell-phone number by receiving
Person or power person on probation, and the result is notified into sending module;
Sending module, for the result according to security code authentication module and examination Authority Verification module, sends " false proof
Code is illegal " information, the either information of " Product Validation is certified products " or " terminal without security code check authority " letter
Breath, or " on probation checking number of times have been used up " information to mobile intelligent terminal interactive module.
In specific implementation process, security code information storage module is also included in the fake certification server, for depositing
Security code and product coding corresponding with security code, Product Status are stored up, wherein security code is generated by random fashion.
Wherein, the security code is produced by random fashion, is corresponded with product and has uniqueness.Generate at random
Security code and corresponding product coding, Product Status are stored in the security code information storage module of fake certification server.It is excellent
Selection of land, builds security code information bank to store security code relevant information in fake certification server, production corresponding with security code
The logic association of security code and product is realized after product coding write-in security code information bank, and sets product original state to be " storehouse
Deposit ".
Data structure main body can be built according to self-defined mode during specific security code information library storage, can such as built such as
Lower data structure main body is stored:
[security code, product coding, Product Status].
Security code directly or after encryption generates formation in two-dimension code label or write-in radio electronic label after generating at random anti-
Pseudo label.
Antifalsification label can be fixed at the opening of product or its outer packing when applying by modes such as stickups, with product thing
Reason association;When product or outer packing opening, antifalsification label will cause security code not read and fail therewith by damaged.
In this specific embodiment, the mobile phone of security code and security code current ownership is bound, only by tying up
Fixed mobile phone can carry out security code examination, it is ensured that the legitimacy of examination.And in addition to current ownership terminal, by it
Recommend mobile phone on probation to check the security code true and false, the mobile intelligent terminal scope that can be checked extended with the way of recommendation,
Pass through the mobile intelligent terminal property of binding simultaneously(Ownership person, power person on probation)To limit inquiry times, examination ensure that
Legitimacy under the premise of, be the further obstacle of verification setting of pseudo- security code.
Also include security code mandate examination certification tree in specific implementation process, in fake certification server and build module, use
In the relevant information for setting storage security code current ownership person, wherein, the initial setting up mode of security code current ownership person
It is as follows:
Product is when circulating initial, and it is the initial ownership of product that security code mandate examination certification tree, which builds module and will pre-allocated,
The cell-phone number of person security code corresponding with product is bound, and sets Product Status to be " sale ";
Preferably, security code current ownership person changes and changed with Product Status, and specific change mode is as follows:
When Product Status changes, security code current ownership mobile intelligent terminal A security code read module is read
Security code;
Security code interactive module is by its cell-phone number, security code and and is changed to the mobile intelligent terminal B of new ownership person in advance
Cell-phone number be sent in the transceiver module of fake certification server;
The security code authentication module and examination Authority Verification module verification security code and security code of fake certification server are worked as
After preceding ownership person is legal, change authority checking code C is simultaneously sent to by generation change authority checking code C with communication forms such as short messages
Mobile intelligent terminal B security code interactive module;
Operation executing module is additionally provided with mobile intelligent terminal, for performing change authority checking operation, by security code
New ownership person B cell-phone number and change authority checking code C is sent in the transceiver module of fake certification server;
After fake certification server authentication change authority checking code C legitimacies, it sets change module to be used to change false proof
The new ownership person of code is terminal B, and change terminal A is invalid to the ownership of the security code, and changes corresponding product state.
In specific implementation process, security code recommends user on probation to pass through the corresponding intelligent movable of security code current ownership person
Terminal, which is performed, recommends operation on probation to obtain, and is specially:
The corresponding mobile intelligent terminal A of security code current ownership person security code read module reads security code;
The cell-phone number of its cell-phone number, security code and security code recommended user B is sent to false proof test by security code interactive module
In the transceiver module for demonstrate,proving server;
The security code authentication module and examination Authority Verification module verification security code and security code of fake certification server are worked as
After preceding ownership person is legal, authority checking on probation code D is simultaneously sent to by generation authority checking code D on probation with communication forms such as short messages
The security code interactive module of mobile intelligent terminal;
The operation executing module of mobile intelligent terminal, which is performed, recommends authority checking operation on probation, by security code recommended user B
Cell-phone number and authority checking on probation code D be sent in the transceiver module of fake certification server;
After fake certification server authentication authority checking code D legitimacy, it sets change module storage security code to recommend
The attribute data of user on probation:Security code recommends user B cell-phone numbers on probation, number of inspections and recommends attribute on probation.
In specific implementation process, the system of the invention is also traced to the source database, fake certification service including monitoring and warning
Data flow backups to monitoring and warning and traced to the source database in device, by monitoring and warning database evidence inquiry product institute it is stateful under
False proof examination trace to the source information.
The same or analogous part of same or analogous label correspondence;
Position relationship is used for being given for example only property explanation described in accompanying drawing, it is impossible to be interpreted as the limitation to this patent;
Obviously, the above embodiment of the present invention is only intended to clearly illustrate example of the present invention, and is not pair
The restriction of embodiments of the present invention.For those of ordinary skill in the field, may be used also on the basis of the above description
To make other changes in different forms.There is no necessity and possibility to exhaust all the enbodiments.It is all this
Any modifications, equivalent substitutions and improvements made within the spirit and principle of invention etc., should be included in the claims in the present invention
Protection domain within.
Claims (11)
1. a kind of false proof source tracing method based on mobile intelligent terminal, it is characterised in that including
S1. mobile intelligent terminal reads security code and security code and the corresponding identification number of mobile intelligent terminal is sent to false proof and tested
Demonstrate,prove server;
S2. fake certification server judges whether the security code received is legal, and step S3 is performed if legal, otherwise returns anti-
Pseudo-code information unauthorized;
S3. fake certification server judges whether the mobile intelligent terminal is that the security code is worked as by the terminal iidentification number received
Preceding ownership person, if then returning to the information that Product Validation is certified products, otherwise returns to mobile intelligent terminal and does not have security code
Check the information of authority;
Security code current ownership person changes and changed with Product Status, and specific change mode is as follows:
When Product Status changes, the mobile intelligent terminal A of security code current ownership is read its terminal mark after security code
Know number, security code and be changed to the mobile intelligent terminal B identification number of new ownership person in advance and be sent in fake certification server,
Application change;
After fake certification server authentication security code and security code current ownership person are legal, generation change authority checking code C, and
Generation change authority checking code C is sent to mobile intelligent terminal B;
Mobile intelligent terminal B performs change authority checking operation, its terminal iidentification number and change authority checking code C is sent to anti-
In pseudo- authentication server;
After fake certification server authentication change authority checking code C legitimacies, change security code current ownership person is mobile intelligence
Energy terminal B, change mobile intelligent terminal A are invalid to the ownership of the security code, and change corresponding product state.
2. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 1, it is characterised in that the shifting
The dynamic corresponding identification number of intelligent terminal is one kind that cell-phone number, IMSI or other can be in No. ID of distinctive mark terminal.
3. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 1, it is characterised in that described anti-
Pseudo-code is generated at random, and the security code and corresponding product coding, Product Status generated at random is stored in fake certification server.
4. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 3, it is characterised in that described anti-
Pseudo-code directly or after encryption forms antifalsification label in generation two-dimension code label or write-in radio electronic label, antifalsification label with it is right
Answer the one-to-one physical interconnection of product.
5. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 3, it is characterised in that security code
The initial setting up mode of current ownership person is as follows:
Product will be pre-allocated whole for the intelligent movable of the initial ownership person of product when circulating initial in fake certification server
Identification number security code corresponding with product in end is bound.
6. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 1, it is characterised in that the step
In rapid S3, fake certification server judges that mobile intelligent terminal is also executed the following steps after security code current ownership person:
S4. fake certification server judges whether the mobile intelligent terminal is that the security code tries out power person, if then performing step
S5, otherwise returns to the information that the mobile intelligent terminal checks authority without security code;
S5. fake certification server judges whether mobile intelligent terminal checking number of times on probation is more than threshold value, is tested if then trying out
Card number of times subtracts 1 and returns to the information that Product Validation is certified products, otherwise returns to the information that checking number of times on probation has been used up.
7. a kind of false proof source tracing method based on mobile intelligent terminal according to claim 6, it is characterised in that with anti-
The mobile intelligent terminal of pseudo-code power on probation is to perform recommendation on probation by security code current ownership mobile intelligent terminal to operate
Arrive, be specially:
Security code current ownership mobile intelligent terminal A is recommended as its terminal iidentification number, security code and in advance after reading security code
The mobile intelligent terminal B of power person on probation identification number is sent in fake certification server, and application is on probation to be recommended;
After fake certification server authentication security code and security code current ownership person are legal, generation authority checking code D on probation, and
Authority checking on probation code D is sent to mobile intelligent terminal B;
Mobile intelligent terminal B performs authority checking operation on probation, its terminal iidentification number and authority checking on probation code D is sent to anti-
In pseudo- authentication server;
After fake certification server authentication authority checking code D legitimacies, the attribute data of storage security code power terminal on probation is increased newly:
Mobile intelligent terminal B identification number, number of inspections on probation and attribute on probation.
8. a kind of false proof source tracing method based on mobile intelligent terminal according to any one of claim 1 to 7, its feature exists
Also include data flow in fake certification server in, methods described and backup to monitoring and warning to trace to the source database, monitoring can be passed through
Early warning trace to the source database evidence inquiry product it is stateful under false proof examination trace to the source information.
9. a kind of anti-fake traceability system based on mobile intelligent terminal, it is characterised in that including mobile intelligent terminal and false proof test
Demonstrate,prove server:
Mobile intelligent terminal includes:
Security code read module, for reading security code;
Security code interactive module, for security code and the corresponding terminal iidentification number of mobile intelligent terminal to be sent into fake certification clothes
It is engaged in device and receives return information;
Fake certification server includes:
Transceiver module, security code and terminal iidentification number for receiving the transmission of security code interactive module;
Whether security code authentication module, the security code for judging to receive is legal, if then notifying examination Authority Verification module,
Otherwise sending module is notified;
Authority Verification module is checked, judges whether terminal is security code current ownership for the terminal iidentification number by receiving
Person or power person on probation, and the result is notified into sending module;Wherein security code current ownership person is with Product Status change
Change, specific change mode is as follows:
When Product Status changes, the mobile intelligent terminal A of security code current ownership is read its terminal mark after security code
Know number, security code and be changed to the mobile intelligent terminal B identification number of new ownership person in advance and be sent in fake certification server,
Application change;
After fake certification server authentication security code and security code current ownership person are legal, generation change authority checking code C, and
Generation change authority checking code C is sent to mobile intelligent terminal B;
Mobile intelligent terminal B performs change authority checking operation, its terminal iidentification number and change authority checking code C is sent to anti-
In pseudo- authentication server;
After fake certification server authentication change authority checking code C legitimacies, change security code current ownership person is mobile intelligence
Energy terminal B, change mobile intelligent terminal A are invalid to the ownership of the security code, and change corresponding product state;
Sending module, for the result according to security code authentication module and examination Authority Verification module, " security code is or not transmission
It is legal " information, the either information of " Product Validation is certified products " or " terminal without security code check authority " information,
Or the information of " on probation checking number of times have been used up " is to the interactive module of mobile intelligent terminal.
10. a kind of anti-fake traceability system based on mobile intelligent terminal according to claim 9, it is characterised in that described
Also include security code information storage module in fake certification server, for storing security code and product corresponding with security code
Coding, Product Status, wherein security code are generated by random fashion.
11. a kind of anti-fake traceability system based on mobile intelligent terminal according to claim 9, it is characterised in that described
Also traced to the source module including monitoring and warning in fake certification server, for prove inquiry product it is stateful under false proof examination trace back
Source information.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410819097.9A CN104463606B (en) | 2014-12-25 | 2014-12-25 | A kind of false proof source tracing method and system based on mobile intelligent terminal |
PCT/CN2015/095610 WO2016101760A1 (en) | 2014-12-25 | 2015-11-26 | Anti-counterfeit method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410819097.9A CN104463606B (en) | 2014-12-25 | 2014-12-25 | A kind of false proof source tracing method and system based on mobile intelligent terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104463606A CN104463606A (en) | 2015-03-25 |
CN104463606B true CN104463606B (en) | 2017-09-05 |
Family
ID=52909598
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410819097.9A Active CN104463606B (en) | 2014-12-25 | 2014-12-25 | A kind of false proof source tracing method and system based on mobile intelligent terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104463606B (en) |
WO (1) | WO2016101760A1 (en) |
Families Citing this family (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104463606B (en) * | 2014-12-25 | 2017-09-05 | 张世龙 | A kind of false proof source tracing method and system based on mobile intelligent terminal |
CN105654316A (en) * | 2016-01-04 | 2016-06-08 | 河海大学 | NFC product anti-counterfeiting traceability system and anti-counterfeiting traceability method thereof |
CN107665436A (en) * | 2016-07-29 | 2018-02-06 | 吴茂全 | The fake certification device and method of article |
CN106600296B (en) * | 2016-12-16 | 2021-01-15 | 北京慧眼智行科技有限公司 | Anti-counterfeiting traceability method and system based on total amount control |
CN106651404B (en) * | 2016-12-30 | 2021-02-02 | 王清萍 | Article anti-counterfeiting analysis method and article anti-counterfeiting analysis system |
CN106997540A (en) * | 2017-03-22 | 2017-08-01 | 北京向芯力科技有限公司 | A kind of commodity counterfeit prevention traceability system and method based on dual authentication mechanism |
CN109102302A (en) * | 2018-03-20 | 2018-12-28 | 黎凯还 | A kind of distributed validation method for anti-counterfeit based on Internet technology |
CN108763939A (en) * | 2018-05-02 | 2018-11-06 | 开源物联网(广州)有限公司 | The encryption method and encryption system of security code |
CN109298843A (en) * | 2018-11-29 | 2019-02-01 | 珠海趣印科技有限公司 | A kind of print system |
CN109635551B (en) * | 2018-12-18 | 2022-11-22 | 有份儿智慧科技股份有限公司 | Method for anti-counterfeiting tracing and authenticating information data through digital intelligent terminal |
CN110210871A (en) * | 2019-02-15 | 2019-09-06 | 浙江萨宝信息科技有限公司 | A kind of false proof device and its method of cash register |
CN110310130B (en) * | 2019-06-19 | 2022-12-06 | 张学忠 | Anti-counterfeiting method and system |
CN110472710B (en) * | 2019-07-31 | 2022-04-19 | 安徽连营电子科技有限公司 | Rice paper anti-counterfeiting traceability system based on internally-implanted RFID intelligent chip |
CN110533128B (en) * | 2019-08-21 | 2023-08-04 | 上海唯链信息科技有限公司 | Encryption-based anti-counterfeiting traceability data processing method, device, system and medium |
CN111027983A (en) * | 2019-08-23 | 2020-04-17 | 北京中电华大电子设计有限责任公司 | Anti-counterfeiting identification method and system for intelligent household appliance |
CN110517053A (en) * | 2019-09-02 | 2019-11-29 | 武汉长利新材料科技有限公司 | A kind of product transfers the possession of anti-fake source tracing method and system |
CN110675171A (en) * | 2019-09-29 | 2020-01-10 | 匿名科技(重庆)集团有限公司 | Anti-counterfeiting tracing method based on block chain |
CN111460341A (en) * | 2020-04-01 | 2020-07-28 | 北京德豹科技有限公司 | Double anti-counterfeiting checking method |
CN113673999A (en) * | 2020-05-01 | 2021-11-19 | 福州英流信息科技有限公司 | Article tracing anti-counterfeiting identification authentication system and method |
CN111708955A (en) * | 2020-06-10 | 2020-09-25 | 武汉钢铁有限公司 | Steel product anti-counterfeiting verification system based on two-dimensional code |
CN111898165B (en) * | 2020-07-09 | 2023-07-07 | 宁波浙大联科科技有限公司 | Technical parameter change tracing method and system in PDM system |
CN112001630B (en) * | 2020-08-24 | 2024-05-31 | 中国建材检验认证集团股份有限公司 | Product quality monitoring method and device |
CN113516482B (en) * | 2020-08-28 | 2024-04-05 | 王东升 | Anti-fake password and anti-fake method |
CN112508582A (en) * | 2020-11-17 | 2021-03-16 | 广东职业技术学院 | Multiple invisible pattern anti-counterfeiting system |
CN112381553B (en) * | 2020-11-20 | 2024-05-28 | 王永攀 | Product anti-counterfeiting method |
CN112669536A (en) * | 2020-12-16 | 2021-04-16 | 建信金融科技有限责任公司 | Management method, management system, management device and medium for shared articles |
CN112686074B (en) * | 2020-12-29 | 2023-06-16 | 永发(河南)模塑科技发展有限公司 | Intelligent packaging box capable of checking information of articles in box and checking method thereof |
CN112561546A (en) * | 2020-12-29 | 2021-03-26 | 郭昆 | Anti-counterfeiting traceability system and method based on Internet of things |
CN113239067B (en) * | 2021-04-30 | 2023-07-18 | 国网河北省电力有限公司沧州供电分公司 | Anti-counterfeiting method for right-confirming certificate |
CN113159690A (en) * | 2021-05-08 | 2021-07-23 | 包头市畅行交通信息科技有限公司 | Method and system for anti-counterfeiting tracing of cross-border commodities based on Internet of things |
CN113435917A (en) * | 2021-08-24 | 2021-09-24 | 深圳市将维可变数据赋码技术有限公司 | Anti-counterfeiting tracing method and system based on block chain |
CN113693297A (en) * | 2021-09-28 | 2021-11-26 | 深圳市吉迩科技有限公司 | Anti-counterfeiting method for aerosol generating device and aerosol generating device |
CN114363897A (en) * | 2021-11-02 | 2022-04-15 | 四川天邑康和通信股份有限公司 | Method and system for identifying and inquiring authenticity of two-dimensional code of pon terminal device |
CN114826621A (en) * | 2022-06-27 | 2022-07-29 | 中化现代农业有限公司 | Seed tracing method and device, electronic equipment and storage medium |
CN118153599B (en) * | 2024-02-21 | 2024-08-23 | 江苏稻源科技集团有限公司 | High-frequency anti-counterfeiting method and system based on UID reading counting |
CN118229308B (en) * | 2024-05-23 | 2024-07-23 | 北京中科金有限元技术有限公司 | Multi-mode anti-counterfeiting verification method and system based on deep learning |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101458806A (en) * | 2009-01-09 | 2009-06-17 | 黄建湘 | Mobile phone electronic ticket anti-counterfeiting verification method and system |
CN102376031B (en) * | 2011-05-27 | 2015-06-24 | 杭州博联智芯科技有限公司 | Anti-counterfeiting tracking system using chip to identify articles |
CN102289767A (en) * | 2011-08-19 | 2011-12-21 | 段红双 | Commodity anti-counterfeiting method |
CN102411750A (en) * | 2011-11-09 | 2012-04-11 | 浙江腾昌信息科技有限公司 | Digital dual anti-counterfeiting authentication system and method |
CN104463606B (en) * | 2014-12-25 | 2017-09-05 | 张世龙 | A kind of false proof source tracing method and system based on mobile intelligent terminal |
-
2014
- 2014-12-25 CN CN201410819097.9A patent/CN104463606B/en active Active
-
2015
- 2015-11-26 WO PCT/CN2015/095610 patent/WO2016101760A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2016101760A1 (en) | 2016-06-30 |
CN104463606A (en) | 2015-03-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104463606B (en) | A kind of false proof source tracing method and system based on mobile intelligent terminal | |
US8421593B2 (en) | Apparatus, systems and methods for authentication of objects having multiple components | |
CN109949058A (en) | Antifake method for products, device, electronic equipment and read/write memory medium | |
WO2007107068A1 (en) | Anti-forgery method and apparatus based on cpk electronic label | |
CN104252677A (en) | Two-dimension code anti-counterfeiting technology and two-dimension code anti-counterfeiting system-based platform system | |
CN105654316A (en) | NFC product anti-counterfeiting traceability system and anti-counterfeiting traceability method thereof | |
CN110310130B (en) | Anti-counterfeiting method and system | |
CN101388086A (en) | Digital coding method for products anti-counterfeiting physical distribution monitoring system | |
CN103903150A (en) | Verification system and verification method thereof | |
CN102982463A (en) | Commodity anti-counterfeiting system and two-channel method to realize commodity anti-counterfeiting | |
CN102779284A (en) | RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like | |
CN104217241A (en) | Electronic anti-fake label and realizing method | |
CN101814152B (en) | Anti-counterfeit method and system based on readable identification code and answerback code of identification code | |
JP2016511466A (en) | Product counterfeit prevention discrimination method | |
Hetcher | Changing the Social meaning of privacy in Cyberspace | |
CN109472620A (en) | A kind of anti-fake and integrating system based on block chain | |
CN108880789A (en) | The anti-fake source tracing method of hardware product, node device and system | |
Zhang et al. | Appb: Anti-counterfeiting and privacy-preserving blockchain-based vehicle supply chains | |
CN108985431B (en) | Anti-counterfeit label and method for detecting and identifying genuine goods of registered trademark | |
CN112070567B (en) | Quality control system based on block chain and control method thereof | |
CN102082815B (en) | Terminal-based stepwise anti-counterfeiting verification and identity authentication system and method | |
CN101661561B (en) | Product information query system with remote data server and product information query method | |
CN106815614A (en) | A kind of bank acceptance Antiforge system of use NFC anti-counterfeiting technologies | |
CN103778540A (en) | Verification system and method thereof | |
CN111127037B (en) | Commodity universal anti-counterfeiting method based on blockchain account system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190116 Address after: 510000 First Floor 101, 58 Jinzhongheng Road, Baiyun District, Guangzhou City, Guangdong Province Patentee after: Guangzhou Longsheng Technology Co., Ltd. Address before: 510240 Academy of Information Sciences, No. 24 Dongsha Street, Textile Road, Haizhu District, Guangzhou City, Guangdong Province Patentee before: Zhang Shilong |
|
TR01 | Transfer of patent right |