CN105894296A - Network anti-fake system and method based on Internet technology - Google Patents
Network anti-fake system and method based on Internet technology Download PDFInfo
- Publication number
- CN105894296A CN105894296A CN201410740784.1A CN201410740784A CN105894296A CN 105894296 A CN105894296 A CN 105894296A CN 201410740784 A CN201410740784 A CN 201410740784A CN 105894296 A CN105894296 A CN 105894296A
- Authority
- CN
- China
- Prior art keywords
- password
- setting
- user
- record
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
The present invention provides a network anti-fake system and method based on the Internet technology aiming at the Internet, the telephone security, the phone security and password obtaining and protection. The method comprises the following steps: (1) printing serial numbers, generating the serial numbers by using a ruleless method applying a segment of encrpytion tachniques in the middle, and storing the serial numbers in the network anti-fake database while printing the serial numbers; (2) after generating the serial numbers, pasting two groups of serial numbers on each protected genuine to allow the serial numbers to be in one-to-one correspondence to the genuine; (3) when a client buys products, directly collecting one-dimensional codes through a one-dimensional code or two-dimensional code scanning software, and introducing the one-dimensional codes in the system, directly jumping to the anti-fake system through batch checking or two-dimensional code scanning, automatically analyzing the serial numbers by the system, searching whether there are serial numbers in the anti-fake system database or not, if there are serial numbers in the anti-fake system database, giving out the information of the genuine, and if there are no serial numbers in the anti-fake system database, giving out the prompt information to prompt users to alarm fake merchandise; and (4) providing online a password obtaining function especially aiming at the lock industry, and providing an online modification password and a password protection arrangement function to help users to remember the password information of their own locks.
Description
Technical field
The present invention relates to a kind of method for anti-counterfeit, a kind of network anti-counterfeit system based on Internet technology and
Method.
Background technology
In the fast development of market economy, promote the diversification of market product and rich, sufficiently meet
Consumer demand.But meanwhile, imitation, fake products and the most substantial amounts of appearance of string goods phenomenon, serious shadow
Xiang Liao consumer and the interests of businessman.Counterfeit and the defective phenomenon of product once occurs, will be to social and individual
Bring immeasurable loss.The production of these products, circulate, use, it is desirable to have be safe and effective imitative
Pseudo-safeguard.
Along with constantly expanding and the day by day complexity of distribution system of Sales Channel, enterprise ensures oneself except needs
Outside the quality of product, in addition it is also necessary to vigilant peripheral counterfeit and shoddy goods and pernicious falsifying shape is, personation
Low-quality goods not only directly affects the rights and interests of consumer, is also related to reputation and the image of enterprise simultaneously;Pernicious
Falsifying not only directly affects retail trader's confidence to enterprise, causes harmful competition simultaneously, causes enterprise market to be mixed
Disorderly, client's intensification of contradictions, affect brand and wither away.
False proof, antitheft, anti-channel conflict, anti-lost system the product of enterprise can be managed not either with or without a set of
Copied, carry out maintaining enterprise reputation and ensure brand image, be enterprise in the urgent need to put the axe in the helve!
Summary of the invention
The invention provides that one is directed to the Internet, telephone service, mobile phone are false proof and password obtains and protection
Network anti-counterfeit system based on Internet technology and method.
Realize a kind of based on Internet technology network anti-counterfeit system and the method for the object of the invention, including as follows
Step:
(1) serial number prints, and uses and has uniqueness, and random, one section of encrypted code of middle use
The method of technology produces serial number, is stored in network anti-counterfeit data base while printing serial number;
(2), after serial number generates, need to be attached on each shielded genuine piece two groups of serial numbers, with
Genuine piece one_to_one corresponding;
The mode of patch can take variation, is affixed on outer package as false proof, can also before i.e. client does not buys
True-false inquiring, obtains password and then must use concealed mode labeling, and general recommendations uses Quick Response Code encrypted code
The icon that mode produces after processing, as by a scratch card figure layer, hides serial number, for sale after scrape dispersing and elevation again
For two-dimensional scan, or being placed directly against in inner packing, user takes inner packing apart after buying and just can view.
Product design, genuine piece must first be unblanked when opening, can effectively be prevented from being copied, such as wine industry, can
Being placed on box to fill a wine cup for, increase a lock in the design on box, user buys after drinking, can be by unlocking
Label, obtains unlocking pin in direct Antiforge system, unblanks, as do not opened, and this wine the most provable
It is fake wine, because this product all cannot be inquired on official website.
(3) client is when have purchased product, by one-dimension code or the scanning software of Quick Response Code, and can be direct
Collect one-dimension code, import in system, batch query, or scanned by Quick Response Code, jump directly to prevent
Antiforge system, system resolves serial number automatically, and in Antiforge system data base, whether search sequence number exists, as
Exist, then provide genuine piece information;If do not existed, then provide prompting message, remind user to watch out for fake products;Or
Inquired about by liaison mode, according to voice Self-Service, obtain true and false information;Or by short message sending mode
Inquiry, obtains true and false information.
Described genuine piece information includes the essential information of product, name of product, product specification, sales region, quilt
Inquiry times.
The handheld terminal scanning of described step (3), directly obtains false proof by the Internet and obtains message in cipher
Breath, comprises the steps:
A Antiforge inquiry
The one-dimension code that user provides according to drop or outer package, user needs login system, true at batch query
In the pseudo-page, importing or directly sweep one-dimension code with barcode scanner, barcode scanner parses one-dimension code information, will
Serial number band takes in BAR_NO field, searches record in BAR_REC table;Search in BAR_REC table and be
No have record, and is simultaneously written inside BAR_HIS by Query Result;If any record, then show certified products result,
When searching less than record, then the information of the vigilant fake products of display;When user is provided by drop or outer package
Quick Response Code, directly with Quick Response Code scanning software or the handheld terminal of mobile phone, during scanning, can automatic jump to enterprise
The official website of industry, and automatically resolve 2 D code information, the information of parsing is delivered to data base BAR_REC
Table is searched record, looks for and whether BAR_REC table has record, and Query Result is simultaneously written BAR_HIS
The inside;If any record, then show certified products result, when searching less than record, then the letter of the vigilant fake products of display
Breath;
B obtains password
When the Quick Response Code that user is provided by drop or outer package, directly use mobile phone Quick Response Code scanning software or
Handheld terminal, during scanning, can automatic jump to the official website of enterprise, and automatically resolve 2 D code information,
It is delivered to the information of parsing in data base's BAR_REC table search record, looks in BAR_REC table whether having note
Record;And Query Result is simultaneously written inside BAR_HIS;
If any record:
Judge that this serial number is " change password ", and arranged and certainly set password, then point out in webpage
Input, from setting password, captures from setting password, and coupling is the most correct, and as incorrect, then prompting is re-entered;
As correctly, then provide encrypted message;After providing encrypted message, provide Change Password function, Yong Huke simultaneously
So that the actual password revising lock is arranged in systems, in order to subsequent extracted;
Judge that this serial number is not " change password ", and arranged and certainly set password, then carry in webpage
Showing that input, from setting password, captures from setting password, coupling is the most correct, and as incorrect, then prompting is re-entered;
As correctly, then after providing encrypted message;
Judge that this serial number is " changing password ", and be not provided with certainly setting password, then show message in cipher
Breath, provides from setting cryptographic function simultaneously, it is provided that user setup protection password, prevents password from being asked for by others,
After arranging successfully, providing setting change cryptographic function, the actual password revising lock can be set by user simultaneously
Put in systems, in order to subsequent extracted;
Judge that this serial number is not " changing password ", and be not provided with certainly setting password, then show password
Information, provides from setting cryptographic function simultaneously, it is provided that user setup protection password, prevents password from being asked for by others;
No record, then prompting sequence number does not exists, and please watch out for fake products.
Except the handheld terminal of described step (3) scans, directly obtain false proof by the Internet and obtain password
Outside information, it is also possible to inquired about by liaison mode, comprise the steps:
A Antiforge inquiry
User, according to drop or outer package, obtains the telephone number of Antiforge inquiry platform, dials this number and enters
Voice system;According to voice message, select language other;Capture the serial number that user inputs in the phone, will
Serial number band takes in BAR_NO field, searches record in BAR_REC table;Search in BAR_REC table and be
No have record, and is simultaneously written inside BAR_HIS by Query Result;
If any record:
" change no " that then please judge this serial number is T, and arranges and certainly set password, then provide language
Sound prompting " please input from setting password, with No. # end ", captures from setting password, and coupling is the most correct, if not
Correctly, then prompting " Password Input is wrong, please re-enter ";As correctly, then provide voice message " you
Unlocking cipher be XXX, thanks ", after finishing, three options of voice message: the most hard of hearing, 2. change
Unlocking cipher, 3. return last layer, 4. on-hook function;Select 1. hard of hearing, then replay Query Result;
Select 2. Change Passwords, then provide voice message and " input new unlocking cipher, terminate with # ", point out input two
Secondary, final unlocking cipher is passed to data base, is saved in data base;After end of operation, prompting " is newly opened
Lock cipher is arranged successfully!", terminate on-hook.3. return last layer, then return to C.;4. on-hook, then terminate.
" change no " that then please judge this serial number is F, and arranges and certainly set password, then provide language
Sound prompting " please input from setting password, with No. # end ", captures from setting password, and coupling is the most correct, then give
Go out voice message " your unlocking cipher is XXX, thanks ", after finishing, three options of voice message:
The most hard of hearing, 2. return last layer, 3. on-hook function;Select 1. hard of hearing, then replay Query Result;Choosing
Select 2. return last layers, then return to C.;3. on-hook, then terminate.
" change no " that then please judge this serial number is T, and is not provided with certainly setting password, then provide language
Sound prompting " your unlocking cipher is XXX, for ensureing your cryptosecurity, can arrange from setting password, in order to
Subsequent extracted, can operate according to phonetic guiding as arranged, thanks ", after finishing, voice message three
Individual option: the most hard of hearing, 2. arrange from set password, 3. return last layer, 4. on-hook function;Select 1. hard of hearing,
Then replay Query Result;2. arrange from setting password, then provide voice message, " please input from setting password,
Terminate with # ", prompting input twice, by setting password passes to data base the most certainly, it is saved in data base;Behaviour
After work, prompting " sets password to arrange successfully certainly!As continued to change unlocking cipher, please continue to become by 1.
More unlocking cipher;Terminate please hang up ", when selecting 1. continuation change unlocking cipher, then provide voice message
" input new unlocking cipher, terminate with # ", prompting input twice, final unlocking cipher is passed to data base,
It is saved in data base;After end of operation, point out " new unlocking cipher is arranged successfully ", terminate on-hook.3.
Return last layer, then return to C.;4. on-hook, then terminate.
" change no " that then please judge this serial number is F, and is not provided with certainly setting password, then provide language
Sound prompting " your unlocking cipher is XXX, for ensureing your cryptosecurity, can arrange from setting password, in order to
Subsequent extracted, can operate according to phonetic guiding as arranged, thanks ", after finishing, voice message three
Individual option: the most hard of hearing, 2. arrange from set password, 3. return last layer, 4. on-hook function;Select 1. hard of hearing,
Then replay Query Result;2. arrange from setting password, then provide voice message, " please input from setting password,
Terminate with # ", prompting input twice, by setting password passes to data base the most certainly, it is saved in data base;Behaviour
After work, point out " certainly setting password to arrange successfully ", terminate on-hook.3. return last layer, then return to
C.;4. on-hook, then terminate.
No record, then prompting " serial number does not exists, and please watch out for fake products ".
Except the handheld terminal of described step (3) scans, directly obtain false proof by the Internet and obtain password
Outside information, it is also possible to inquired about by mobile phone short messages, comprise the steps: that user is according to drop or outsourcing
Dress, according to prompting above, sends false-proof short message, by short message content, as sent CODE_ID+ numeral extremely
Sms platform;Sms platform, after receiving information, according to CODE_ID, analysis is false proof looking into
Ask and still obtain password;
Antiforge inquiry, is brought into serial number in the BAR_NO field in BAR_REC table, searches whether to deposit
At record;
Exist, then check whether BAR_HIS has existence inquiry record, if any, then send Query Result to visitor
Family, and point out be queried which time;Such as nothing, then show that inquiry is normal;
Do not exist, provide warning message;
Obtain password, serial number is brought in the BAR_NO field in BAR_REC table, searches whether to deposit
At record;
Exist:
Change password
Having setting from setting password: answer short message, prompting needs user to send from setting password;User sends from setting
After password, system Auto-matching is the most correct from setting password, as correctly, then sends correct encrypted message,
And remind the need of change and send Change Password instruction, after user sends Change Password instruction, then reply
Short message password is arranged successfully;Reply incorrect as certainly set password, then reply the information of code error;
Without arranging from setting password: system sends correct password short message automatically, and reminds user can carry out from setting
Password, after user is according to message reply password, answer short message, password arranges successfully and reminds the need of change
More and send Change Password instruction, user send Change Password instruction after, then answer short message password is arranged successfully;
Can not Change Password
Having setting from setting password: answer short message, prompting needs user to send from setting password;User sends from setting
After password, system Auto-matching is the most correct from setting password, as correctly, then sends correct encrypted message,
Then answer short message password is arranged successfully;Reply incorrect as certainly set password, then reply the information of code error;
Without arranging from setting password: system sends correct password short message automatically, and reminds user can carry out from setting
Password, after user is according to message reply password, answer short message, answer short message password is arranged successfully.
A kind of based on Internet technology the network anti-counterfeit system of the present invention and having the beneficial effect that of method:
A kind of based on Internet technology the network anti-counterfeit system of the present invention and method, gathered false proof, antitheft,
Anti-channel conflict, loss prevention function in one, by the Internet, phone or mobile phone carry out false proof and password obtain and
Protection, safe and reliable.
Accompanying drawing explanation
Fig. 1 is a kind of based on Internet technology network anti-counterfeit system and the flow chart of method of the present invention.
Fig. 2 is a kind of based on Internet technology the network anti-counterfeit system of the present invention and the liaison mode of method is looked into
The flow chart of inquiry method.
Fig. 3 is a kind of based on Internet technology network anti-counterfeit system and the SMS side of method of the present invention
The flow chart of formula querying method.
Detailed description of the invention
As it is shown in figure 1, a kind of based on Internet technology the network anti-counterfeit system of the present invention and method, including
Following steps:
(1) serial number prints, and uses and has uniqueness, and random, one section of encrypted code of middle use
The method of technology produces serial number, is stored in network anti-counterfeit data base while printing serial number;
(2), after serial number generates, need to be attached on each shielded genuine piece two groups of serial numbers, with
Genuine piece one_to_one corresponding;
The mode of patch can take variation, is affixed on outer package as false proof, can also before i.e. client does not buys
True-false inquiring, obtains password and then must use concealed mode labeling, and general recommendations uses Quick Response Code encrypted code
The icon that mode produces after processing, as by a scratch card figure layer, hides serial number, for sale after scrape dispersing and elevation again
For two-dimensional scan, or being placed directly against in inner packing, user takes inner packing apart after buying and just can view.
Product design, genuine piece must first be unblanked when opening, can effectively be prevented from being copied, such as wine industry, can
Being placed on box to fill a wine cup for, increase a lock in the design on box, user buys after drinking, can be by unlocking
Label, obtains unlocking pin in direct Antiforge system, unblanks, as do not opened, and this wine the most provable
It is fake wine, because this product all cannot be inquired on official website.
(3) client is when have purchased product, by one-dimension code or the scanning software of Quick Response Code, and can be direct
Collect one-dimension code, import in system, batch query, or scanned by Quick Response Code, jump directly to prevent
Antiforge system, system resolves serial number automatically, and in Antiforge system data base, whether search sequence number exists, as
Exist, then provide genuine piece information;If do not existed, then provide prompting message, remind user to watch out for fake products;Or
Inquired about by liaison mode, according to voice Self-Service, obtain true and false information;Or by short message sending mode
Inquiry, obtains true and false information.
Described genuine piece information includes the essential information of product, name of product, product specification, sales region, quilt
Inquiry times.
As in figure 2 it is shown, the handheld terminal scanning of described step (3), directly obtained false proof by the Internet
And acquisition encrypted message, comprise the steps:
A Antiforge inquiry
The one-dimension code that user provides according to drop or outer package, user needs login system, true at batch query
In the pseudo-page, importing or directly sweep one-dimension code with barcode scanner, barcode scanner parses one-dimension code information, will
Serial number band takes in BAR_NO field, searches record in BAR_REC table;Search in BAR_REC table and be
No have record, and is simultaneously written inside BAR_HIS by Query Result;If any record, then show certified products result,
When searching less than record, then the information of the vigilant fake products of display;When user is provided by drop or outer package
Quick Response Code, directly with Quick Response Code scanning software or the handheld terminal of mobile phone, during scanning, can automatic jump to enterprise
The official website of industry, and automatically resolve 2 D code information, the information of parsing is delivered to data base BAR_REC
Table is searched record, looks for and whether BAR_REC table has record, and Query Result is simultaneously written BAR_HIS
The inside;If any record, then show certified products result, when searching less than record, then the letter of the vigilant fake products of display
Breath;
B obtains password
When the Quick Response Code that user is provided by drop or outer package, directly use mobile phone Quick Response Code scanning software or
Handheld terminal, during scanning, can automatic jump to the official website of enterprise, and automatically resolve 2 D code information,
It is delivered to the information of parsing in data base's BAR_REC table search record, looks in BAR_REC table whether having note
Record;And Query Result is simultaneously written inside BAR_HIS;
If any record:
Judge that this serial number is " change password ", and arranged and certainly set password, then point out in webpage
Input, from setting password, captures from setting password, and coupling is the most correct, and as incorrect, then prompting is re-entered;
As correctly, then provide encrypted message;After providing encrypted message, provide Change Password function, Yong Huke simultaneously
So that the actual password revising lock is arranged in systems, in order to subsequent extracted;
Judge that this serial number is not " change password ", and arranged and certainly set password, then carry in webpage
Showing that input, from setting password, captures from setting password, coupling is the most correct, and as incorrect, then prompting is re-entered;
As correctly, then after providing encrypted message;
Judge that this serial number is " changing password ", and be not provided with certainly setting password, then show message in cipher
Breath, provides from setting cryptographic function simultaneously, it is provided that user setup protection password, prevents password from being asked for by others,
After arranging successfully, providing setting change cryptographic function, the actual password revising lock can be set by user simultaneously
Put in systems, in order to subsequent extracted;
Judge that this serial number is not " changing password ", and be not provided with certainly setting password, then show password
Information, provides from setting cryptographic function simultaneously, it is provided that user setup protection password, prevents password from being asked for by others;
No record, then prompting sequence number does not exists, and please watch out for fake products.
Except the handheld terminal of described step (3) scans, directly obtain false proof by the Internet and obtain password
Outside information, it is also possible to inquired about by liaison mode, comprise the steps:
A Antiforge inquiry
User, according to drop or outer package, obtains the telephone number of Antiforge inquiry platform, dials this number and enters
Voice system;According to voice message, select language other;Capture the serial number that user inputs in the phone, will
Serial number band takes in BAR_NO field, searches record in BAR_REC table;Search in BAR_REC table and be
No have record, and is simultaneously written inside BAR_HIS by Query Result;
If any record:
" change no " that then please judge this serial number is T, and arranges and certainly set password, then provide language
Sound prompting " please input from setting password, with No. # end ", captures from setting password, and coupling is the most correct, if not
Correctly, then prompting " Password Input is wrong, please re-enter ";As correctly, then provide voice message " you
Unlocking cipher be XXX, thanks ", after finishing, three options of voice message: the most hard of hearing, 2. change
Unlocking cipher, 3. return last layer, 4. on-hook function;Select 1. hard of hearing, then replay Query Result;
Select 2. Change Passwords, then provide voice message and " input new unlocking cipher, terminate with # ", point out input two
Secondary, final unlocking cipher is passed to data base, is saved in data base;After end of operation, prompting " is newly opened
Lock cipher is arranged successfully ", terminate on-hook.3. return last layer, then return to C.;4. on-hook, then terminate.
" change no " that then please judge this serial number is F, and arranges and certainly set password, then provide language
Sound prompting " please input from setting password, with No. # end ", captures from setting password, and coupling is the most correct, then give
Go out voice message " your unlocking cipher is XXX, thanks ", after finishing, three options of voice message:
The most hard of hearing, 2. return last layer, 3. on-hook function;Select 1. hard of hearing, then replay Query Result;Choosing
Select 2. return last layers, then return to C.;3. on-hook, then terminate.
" change no " that then please judge this serial number is T, and is not provided with certainly setting password, then provide language
Sound prompting " your unlocking cipher is XXX, for ensureing your cryptosecurity, can arrange from setting password, in order to
Subsequent extracted, can operate according to phonetic guiding as arranged, thanks ", after finishing, voice message three
Individual option: the most hard of hearing, 2. arrange from set password, 3. return last layer, 4. on-hook function;Select 1. hard of hearing,
Then replay Query Result;2. arrange from setting password, then provide voice message, " please input from setting password,
Terminate with # ", prompting input twice, by setting password passes to data base the most certainly, it is saved in data base;Behaviour
After work, prompting " sets password to arrange successfully certainly!As continued to change unlocking cipher, please continue to become by 1.
More unlocking cipher;Terminate please hang up ", when selecting 1. continuation change unlocking cipher, then provide voice message
" input new unlocking cipher, terminate with # ", prompting input twice, final unlocking cipher is passed to data base,
It is saved in data base;After end of operation, point out " new unlocking cipher is arranged successfully ", terminate on-hook.3.
Return last layer, then return to C.;4. on-hook, then terminate.
" change no " that then please judge this serial number is F, and is not provided with certainly setting password, then provide language
Sound prompting " your unlocking cipher is XXX, for ensureing your cryptosecurity, can arrange from setting password, in order to
Subsequent extracted, can operate according to phonetic guiding as arranged, thanks ", after finishing, voice message three
Individual option: the most hard of hearing, 2. arrange from set password, 3. return last layer, 4. on-hook function;Select 1. hard of hearing,
Then replay Query Result;2. arrange from setting password, then provide voice message, " please input from setting password,
Terminate with # ", prompting input twice, by setting password passes to data base the most certainly, it is saved in data base;Behaviour
After work, point out " certainly setting password to arrange successfully ", terminate on-hook.3. return last layer, then return to
C.;4. on-hook, then terminate.
No record, then prompting " serial number does not exists, and please watch out for fake products ".
Except the handheld terminal of described step (3) scans, directly obtain false proof by the Internet and obtain password
Outside information, it is also possible to inquired about by mobile phone short messages, comprise the steps: that user is according to drop or outsourcing
Dress, according to prompting above, sends false-proof short message, by short message content, as sent CODE_ID+ numeral extremely
Sms platform;Sms platform, after receiving information, according to CODE ID, analysis is false proof looking into
Ask and still obtain password;
Antiforge inquiry, is brought into serial number in the BAR_NO field in BAR_REC table, searches whether to deposit
At record;
Exist, then check whether BAR_HIS has existence inquiry record, if any, then send Query Result to visitor
Family, and point out be queried which time;Such as nothing, then show that inquiry is normal;
Do not exist, provide warning message;
Obtain password, serial number is brought in the BAR_NO field in BAR_REC table, searches whether to deposit
At record;
Exist:
Change password
Having setting from setting password: answer short message, prompting needs user to send from setting password;User sends from setting
After password, system Auto-matching is the most correct from setting password, as correctly, then sends correct encrypted message,
And remind the need of change and send Change Password instruction, after user sends Change Password instruction, then reply
Short message password is arranged successfully;Reply incorrect as certainly set password, then reply the information of code error;
Without arranging from setting password: system sends correct password short message automatically, and reminds user can carry out from setting
Password, after user is according to message reply password, answer short message, password arranges successfully and reminds the need of change
More and send Change Password instruction, user send Change Password instruction after, then answer short message password is arranged successfully;
Can not Change Password
Having setting from setting password: answer short message, prompting needs user to send from setting password;User sends from setting
After password, system Auto-matching is the most correct from setting password, as correctly, then sends correct encrypted message,
Then answer short message password is arranged successfully;Reply incorrect as certainly set password, then reply the information of code error;
Without arranging from setting password: system sends correct password short message automatically, and reminds user can carry out from setting
Password, after user is according to message reply password, answer short message, answer short message password is arranged successfully.
Embodiment described above is only to be described the preferred embodiment of the present invention, not to this
Bright scope is defined, under design spirit premise without departing from the present invention, and this area ordinary skill technology people
Member's various deformation of making technical solution of the present invention and improvement, all should fall into claims of the present invention true
In fixed protection domain.
Claims (5)
1. network anti-counterfeit system based on Internet technology and a method, comprise the steps:
(1) serial number prints, and uses and has uniqueness, and random, one section of encrypted code of middle use
The method of technology produces serial number, is stored in network anti-counterfeit data base while printing serial number;
(2), after serial number generates, need to be attached on each shielded genuine piece two groups of serial numbers, with
Genuine piece one_to_one corresponding;
(3) client is when have purchased product, by one-dimension code or the scanning software of Quick Response Code, and can be direct
Collect one-dimension code, import in system, batch query, or scanned by Quick Response Code, jump directly to prevent
Antiforge system, system resolves serial number automatically, and in Antiforge system data base, whether search sequence number exists, as
Exist, then provide genuine piece information;If do not existed, then provide prompting message, remind user to watch out for fake products;Or
Inquired about by liaison mode, according to voice Self-Service, obtain true and false information;Or by short message sending mode
Inquiry, obtains true and false information;
(4) it is particularly directed to lock industry, it is provided that obtain cryptographic function online, be simultaneously provided in line Modify password
And protection cryptographic function is set, help user remembers the encrypted message of the lock of oneself.
A kind of network anti-counterfeit system based on Internet technology the most according to claim 1 and method,
It is characterized in that: described genuine piece information includes the essential information of product, name of product, product specification, sale
Region, it is queried number of times.
A kind of network anti-counterfeit system based on Internet technology the most according to claim 1 and method,
It is characterized in that: the handheld terminal scanning of described step (3), directly obtain false proof by the Internet and obtain
Take encrypted message, comprise the steps:
A Antiforge inquiry
The one-dimension code that user provides according to drop or outer package, user needs login system, true at batch query
In the pseudo-page, importing or directly sweep one-dimension code with barcode scanner, barcode scanner parses one-dimension code information, will
Serial number band takes in BAR_NO field, searches record in BAR_REC table;Search in BAR_REC table and be
No have record, and is simultaneously written inside BAR_HIS by Query Result;If any record, then show certified products result,
When searching less than record, then the information of the vigilant fake products of display;When user is provided by drop or outer package
Quick Response Code, directly with Quick Response Code scanning software or the handheld terminal of mobile phone, during scanning, can automatic jump to enterprise
The official website of industry, and automatically resolve 2 D code information, the information of parsing is delivered to data base BAR_REC
Table is searched record, looks for and whether BAR_REC table has record, and Query Result is simultaneously written BAR_HIS
The inside;If any record, then show certified products result, when searching less than record, then the letter of the vigilant fake products of display
Breath;
B obtains password
When the Quick Response Code that user is provided by drop or outer package, directly use mobile phone Quick Response Code scanning software or
Handheld terminal, during scanning, can automatic jump to the official website of enterprise, and automatically resolve 2 D code information,
It is delivered to the information of parsing in data base's BAR_REC table search record, looks in BAR_REC table whether having note
Record;And Query Result is simultaneously written inside BAR_HIS;
If any record:
Judge that this serial number is " change password ", and arranged and certainly set password, then point out in webpage
Input, from setting password, captures from setting password, and coupling is the most correct, and as incorrect, then prompting is re-entered;
As correctly, then provide encrypted message;After providing encrypted message, provide Change Password function, Yong Huke simultaneously
So that the actual password revising lock is arranged in systems, in order to subsequent extracted;
Judge that this serial number is not " change password ", and arranged and certainly set password, then carry in webpage
Showing that input, from setting password, captures from setting password, coupling is the most correct, and as incorrect, then prompting is re-entered;
As correctly, then after providing encrypted message;
Judge that this serial number is " changing password ", and be not provided with certainly setting password, then show message in cipher
Breath, provides from setting cryptographic function simultaneously, it is provided that user setup protection password, prevents password from being asked for by others,
After arranging successfully, providing setting change cryptographic function, the actual password revising lock can be set by user simultaneously
Put in systems, in order to subsequent extracted;
Judge that this serial number is not " changing password ", and be not provided with certainly setting password, then show password
Information, provides from setting cryptographic function simultaneously, it is provided that user setup protection password, prevents password from being asked for by others;
No record, then prompting sequence number does not exists, and please watch out for fake products.
A kind of network anti-counterfeit system based on Internet technology the most according to claim 1 and method,
It is characterized in that: except the handheld terminal of described step (3) scans, directly by the Internet obtain false proof and
Outside acquisition encrypted message, it is also possible to inquired about by liaison mode, comprise the steps:
A Antiforge inquiry
User, according to drop or outer package, obtains the telephone number of Antiforge inquiry platform, dials this number and enters
Voice system;According to voice message, select language other;Capture the serial number that user inputs in the phone, will
Serial number band takes in BAR_NO field, searches record in BAR_REC table;Search in BAR_REC table and be
No have record, and is simultaneously written inside BAR_HIS by Query Result;
If any record:
" change no " that then please judge this serial number is T, and arranges and certainly set password, then provide language
Sound prompting " please input from setting password, with No. # end ", captures from setting password, and coupling is the most correct, if not
Correctly, then prompting " Password Input is wrong, please re-enter ";As correctly, then provide voice message " you
Unlocking cipher be XXX, thanks ", after finishing, three options of voice message: the most hard of hearing, 2. change
Unlocking cipher, 3. return last layer, 4. on-hook function;Select 1. hard of hearing, then replay Query Result;
Select 2. Change Passwords, then provide voice message and " input new unlocking cipher, terminate with # ", point out input two
Secondary, final unlocking cipher is passed to data base, is saved in data base;After end of operation, prompting " is newly opened
Lock cipher is arranged successfully ", terminate on-hook.3. return last layer, then return to C.;4. on-hook, then terminate;
" change no " that then please judge this serial number is F, and arranges and certainly set password, then provide language
Sound prompting " please input from setting password, with No. # end ", captures from setting password, and coupling is the most correct, then give
Go out voice message " your unlocking cipher is XXX, thanks ", after finishing, three options of voice message:
The most hard of hearing, 2. return last layer, 3. on-hook function;Select 1. hard of hearing, then replay Query Result;Choosing
Select 2. return last layers, then return to C.;3. on-hook, then terminate;
" change no " that then please judge this serial number is T, and is not provided with certainly setting password, then provide language
Sound prompting " your unlocking cipher is XXX, for ensureing your cryptosecurity, can arrange from setting password, in order to
Subsequent extracted, can operate according to phonetic guiding as arranged, thanks ", after finishing, voice message three
Individual option: the most hard of hearing, 2. arrange from set password, 3. return last layer, 4. on-hook function;Select 1. hard of hearing,
Then replay Query Result;2. arrange from setting password, then provide voice message, " please input from setting password,
Terminate with # ", prompting input twice, by setting password passes to data base the most certainly, it is saved in data base;Behaviour
After work, point out " certainly setting password to arrange successfully ";As continued to change unlocking cipher, please continue by 1.
Change unlocking cipher;Terminate please hang up ", when selecting 1. continuation change unlocking cipher, then provide voice and carry
Show " inputting new unlocking cipher, terminate with # " that final unlocking cipher is passed to data base by prompting input twice,
It is saved in data base;After end of operation, point out " new unlocking cipher is arranged successfully ", terminate on-hook.3.
Return last layer, then return to C.;4. on-hook, then terminate.
" change no " that then please judge this serial number is F, and is not provided with certainly setting password, then provide language
Sound prompting " your unlocking cipher is XXX, for ensureing your cryptosecurity, can arrange from setting password, in order to
Subsequent extracted, can operate according to phonetic guiding as arranged, thanks ", after finishing, voice message three
Individual option: the most hard of hearing, 2. arrange from set password, 3. return last layer, 4. on-hook function;Select 1. hard of hearing,
Then replay Query Result;2. arrange from setting password, then provide voice message, " please input from setting password,
Terminate with # ", prompting input twice, by setting password passes to data base the most certainly, it is saved in data base;Behaviour
After work, point out " certainly setting password to arrange successfully ", terminate on-hook.3. return last layer, then return to
C.;4. on-hook, then terminate.
No record, then prompting " serial number does not exists, and please watch out for fake products ".
A kind of network anti-counterfeit system based on Internet technology the most according to claim 1 and method,
It is characterized in that: except the handheld terminal of described step (3) scans, directly by the Internet obtain false proof and
Outside acquisition encrypted message, it is also possible to inquired about by mobile phone short messages, comprise the steps: that user is according to hanging
Board or outer package, according to prompting above, send false-proof short message, by short message content, as sent CODE_ID+
Numeral is to sms platform;Sms platform, after receiving information, according to CODE_ID, analysis is
Antiforge inquiry still obtains password;
Antiforge inquiry, is brought into serial number in the BAR_NO field in BAR_REC table, searches whether to deposit
At record;
Exist, then check whether BAR_HIS has existence inquiry record, if any, then send Query Result to visitor
Family, and point out be queried which time;Such as nothing, then show that inquiry is normal;
Do not exist, provide warning message;
Obtain password, serial number is brought in the BAR_NO field in BAR_REC table, searches whether to deposit
At record;
Exist:
Change password
Having setting from setting password: answer short message, prompting needs user to send from setting password;User sends from setting
After password, system Auto-matching is the most correct from setting password, as correctly, then sends correct encrypted message,
And remind the need of change and send Change Password instruction, after user sends Change Password instruction, then reply
Short message password is arranged successfully;Reply incorrect as certainly set password, then reply the information of code error;
Without arranging from setting password: system sends correct password short message automatically, and reminds user can carry out from setting
Password, after user is according to message reply password, answer short message, password arranges successfully and reminds the need of change
More and send Change Password instruction, user send Change Password instruction after, then answer short message password is arranged successfully;
Can not Change Password
Having setting from setting password: answer short message, prompting needs user to send from setting password;User sends from setting
After password, system Auto-matching is the most correct from setting password, as correctly, then sends correct encrypted message,
Then answer short message password is arranged successfully;Reply incorrect as certainly set password, then reply the information of code error;
Without arranging from setting password: system sends correct password short message automatically, and reminds user can carry out from setting
Password, after user is according to message reply password, answer short message, answer short message password is arranged successfully.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410740784.1A CN105894296A (en) | 2014-11-30 | 2014-11-30 | Network anti-fake system and method based on Internet technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410740784.1A CN105894296A (en) | 2014-11-30 | 2014-11-30 | Network anti-fake system and method based on Internet technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105894296A true CN105894296A (en) | 2016-08-24 |
Family
ID=56699564
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410740784.1A Pending CN105894296A (en) | 2014-11-30 | 2014-11-30 | Network anti-fake system and method based on Internet technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105894296A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019119381A1 (en) * | 2016-12-22 | 2019-06-27 | 陈勇 | Password generated by corresponding card and application thereof |
-
2014
- 2014-11-30 CN CN201410740784.1A patent/CN105894296A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019119381A1 (en) * | 2016-12-22 | 2019-06-27 | 陈勇 | Password generated by corresponding card and application thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103841239B (en) | Terminal authenticity verification method and device | |
CN107451820A (en) | On line, multiple, dynamic anti-fake under line, anti-channel conflict, can traceability system | |
CN104992337A (en) | Commodity anti-counterfeiting tracing online and offline identification system and method | |
JP2017504866A (en) | System and method for verifying clock synchronous dynamic password forgery prevention label legality in real time | |
CN109583894A (en) | Offer, verification method and the device of two dimensional code | |
CN105894304A (en) | Product anti-counterfeiting method | |
CN104299146A (en) | Product anti-counterfeiting inquiry system | |
CN103886469A (en) | Product two-dimension code generation and query system | |
CN107705139A (en) | A kind of novel article anti-counterfeiting authentication method | |
CN106157056A (en) | A kind of product is traced to the source method for anti-counterfeit | |
CN103886470A (en) | Cloud server based merchandise anti-counterfeiting implementing method and system | |
CN107358283A (en) | A kind of Quick Response Code shows the method and system of express delivery information, mobile terminal | |
CN105426744A (en) | Method and apparatus for setting password protection question | |
CN110348243A (en) | The method and system of online shopping and/or express delivery secret protection | |
CN105631687B (en) | Product Validation method and device | |
WO2008056105A1 (en) | Verification method | |
CN100407860C (en) | Movable terminal verifying method | |
CN111274307A (en) | Product information display method, device and system and related equipment | |
CN113094616A (en) | Information pushing method, information associating method, information pushing equipment, information associating equipment and computer storage medium | |
CN110059779A (en) | A kind of customized commodity anti-counterfeit two-dimensional bar code detection system | |
CN105894296A (en) | Network anti-fake system and method based on Internet technology | |
CN107292633A (en) | Article dynamic anti-fake retroactive method and system based on internet platform | |
CN108108780A (en) | A kind of commodity packaging and its dimension code anti-counterfeit method | |
CN104103000A (en) | Network false proof system and method based on Internet technology | |
KR20150045543A (en) | Genuine product certification and sns posting system, and method using nfc tag and smart phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160824 |