CN105894296A - Network anti-fake system and method based on Internet technology - Google Patents

Network anti-fake system and method based on Internet technology Download PDF

Info

Publication number
CN105894296A
CN105894296A CN201410740784.1A CN201410740784A CN105894296A CN 105894296 A CN105894296 A CN 105894296A CN 201410740784 A CN201410740784 A CN 201410740784A CN 105894296 A CN105894296 A CN 105894296A
Authority
CN
China
Prior art keywords
password
setting
user
record
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410740784.1A
Other languages
Chinese (zh)
Inventor
魏俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HUANGSHI YIMU INFORMATION TECHNOLOGY Co Ltd
Original Assignee
HUANGSHI YIMU INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HUANGSHI YIMU INFORMATION TECHNOLOGY Co Ltd filed Critical HUANGSHI YIMU INFORMATION TECHNOLOGY Co Ltd
Priority to CN201410740784.1A priority Critical patent/CN105894296A/en
Publication of CN105894296A publication Critical patent/CN105894296A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides a network anti-fake system and method based on the Internet technology aiming at the Internet, the telephone security, the phone security and password obtaining and protection. The method comprises the following steps: (1) printing serial numbers, generating the serial numbers by using a ruleless method applying a segment of encrpytion tachniques in the middle, and storing the serial numbers in the network anti-fake database while printing the serial numbers; (2) after generating the serial numbers, pasting two groups of serial numbers on each protected genuine to allow the serial numbers to be in one-to-one correspondence to the genuine; (3) when a client buys products, directly collecting one-dimensional codes through a one-dimensional code or two-dimensional code scanning software, and introducing the one-dimensional codes in the system, directly jumping to the anti-fake system through batch checking or two-dimensional code scanning, automatically analyzing the serial numbers by the system, searching whether there are serial numbers in the anti-fake system database or not, if there are serial numbers in the anti-fake system database, giving out the information of the genuine, and if there are no serial numbers in the anti-fake system database, giving out the prompt information to prompt users to alarm fake merchandise; and (4) providing online a password obtaining function especially aiming at the lock industry, and providing an online modification password and a password protection arrangement function to help users to remember the password information of their own locks.

Description

A kind of network anti-counterfeit system based on Internet technology and method
Technical field
The present invention relates to a kind of method for anti-counterfeit, a kind of network anti-counterfeit system based on Internet technology and Method.
Background technology
In the fast development of market economy, promote the diversification of market product and rich, sufficiently meet Consumer demand.But meanwhile, imitation, fake products and the most substantial amounts of appearance of string goods phenomenon, serious shadow Xiang Liao consumer and the interests of businessman.Counterfeit and the defective phenomenon of product once occurs, will be to social and individual Bring immeasurable loss.The production of these products, circulate, use, it is desirable to have be safe and effective imitative Pseudo-safeguard.
Along with constantly expanding and the day by day complexity of distribution system of Sales Channel, enterprise ensures oneself except needs Outside the quality of product, in addition it is also necessary to vigilant peripheral counterfeit and shoddy goods and pernicious falsifying shape is, personation Low-quality goods not only directly affects the rights and interests of consumer, is also related to reputation and the image of enterprise simultaneously;Pernicious Falsifying not only directly affects retail trader's confidence to enterprise, causes harmful competition simultaneously, causes enterprise market to be mixed Disorderly, client's intensification of contradictions, affect brand and wither away.
False proof, antitheft, anti-channel conflict, anti-lost system the product of enterprise can be managed not either with or without a set of Copied, carry out maintaining enterprise reputation and ensure brand image, be enterprise in the urgent need to put the axe in the helve!
Summary of the invention
The invention provides that one is directed to the Internet, telephone service, mobile phone are false proof and password obtains and protection Network anti-counterfeit system based on Internet technology and method.
Realize a kind of based on Internet technology network anti-counterfeit system and the method for the object of the invention, including as follows Step:
(1) serial number prints, and uses and has uniqueness, and random, one section of encrypted code of middle use The method of technology produces serial number, is stored in network anti-counterfeit data base while printing serial number;
(2), after serial number generates, need to be attached on each shielded genuine piece two groups of serial numbers, with Genuine piece one_to_one corresponding;
The mode of patch can take variation, is affixed on outer package as false proof, can also before i.e. client does not buys True-false inquiring, obtains password and then must use concealed mode labeling, and general recommendations uses Quick Response Code encrypted code The icon that mode produces after processing, as by a scratch card figure layer, hides serial number, for sale after scrape dispersing and elevation again For two-dimensional scan, or being placed directly against in inner packing, user takes inner packing apart after buying and just can view.
Product design, genuine piece must first be unblanked when opening, can effectively be prevented from being copied, such as wine industry, can Being placed on box to fill a wine cup for, increase a lock in the design on box, user buys after drinking, can be by unlocking Label, obtains unlocking pin in direct Antiforge system, unblanks, as do not opened, and this wine the most provable It is fake wine, because this product all cannot be inquired on official website.
(3) client is when have purchased product, by one-dimension code or the scanning software of Quick Response Code, and can be direct Collect one-dimension code, import in system, batch query, or scanned by Quick Response Code, jump directly to prevent Antiforge system, system resolves serial number automatically, and in Antiforge system data base, whether search sequence number exists, as Exist, then provide genuine piece information;If do not existed, then provide prompting message, remind user to watch out for fake products;Or Inquired about by liaison mode, according to voice Self-Service, obtain true and false information;Or by short message sending mode Inquiry, obtains true and false information.
Described genuine piece information includes the essential information of product, name of product, product specification, sales region, quilt Inquiry times.
The handheld terminal scanning of described step (3), directly obtains false proof by the Internet and obtains message in cipher Breath, comprises the steps:
A Antiforge inquiry
The one-dimension code that user provides according to drop or outer package, user needs login system, true at batch query In the pseudo-page, importing or directly sweep one-dimension code with barcode scanner, barcode scanner parses one-dimension code information, will Serial number band takes in BAR_NO field, searches record in BAR_REC table;Search in BAR_REC table and be No have record, and is simultaneously written inside BAR_HIS by Query Result;If any record, then show certified products result, When searching less than record, then the information of the vigilant fake products of display;When user is provided by drop or outer package Quick Response Code, directly with Quick Response Code scanning software or the handheld terminal of mobile phone, during scanning, can automatic jump to enterprise The official website of industry, and automatically resolve 2 D code information, the information of parsing is delivered to data base BAR_REC Table is searched record, looks for and whether BAR_REC table has record, and Query Result is simultaneously written BAR_HIS The inside;If any record, then show certified products result, when searching less than record, then the letter of the vigilant fake products of display Breath;
B obtains password
When the Quick Response Code that user is provided by drop or outer package, directly use mobile phone Quick Response Code scanning software or Handheld terminal, during scanning, can automatic jump to the official website of enterprise, and automatically resolve 2 D code information, It is delivered to the information of parsing in data base's BAR_REC table search record, looks in BAR_REC table whether having note Record;And Query Result is simultaneously written inside BAR_HIS;
If any record:
Judge that this serial number is " change password ", and arranged and certainly set password, then point out in webpage Input, from setting password, captures from setting password, and coupling is the most correct, and as incorrect, then prompting is re-entered; As correctly, then provide encrypted message;After providing encrypted message, provide Change Password function, Yong Huke simultaneously So that the actual password revising lock is arranged in systems, in order to subsequent extracted;
Judge that this serial number is not " change password ", and arranged and certainly set password, then carry in webpage Showing that input, from setting password, captures from setting password, coupling is the most correct, and as incorrect, then prompting is re-entered; As correctly, then after providing encrypted message;
Judge that this serial number is " changing password ", and be not provided with certainly setting password, then show message in cipher Breath, provides from setting cryptographic function simultaneously, it is provided that user setup protection password, prevents password from being asked for by others, After arranging successfully, providing setting change cryptographic function, the actual password revising lock can be set by user simultaneously Put in systems, in order to subsequent extracted;
Judge that this serial number is not " changing password ", and be not provided with certainly setting password, then show password Information, provides from setting cryptographic function simultaneously, it is provided that user setup protection password, prevents password from being asked for by others;
No record, then prompting sequence number does not exists, and please watch out for fake products.
Except the handheld terminal of described step (3) scans, directly obtain false proof by the Internet and obtain password Outside information, it is also possible to inquired about by liaison mode, comprise the steps:
A Antiforge inquiry
User, according to drop or outer package, obtains the telephone number of Antiforge inquiry platform, dials this number and enters Voice system;According to voice message, select language other;Capture the serial number that user inputs in the phone, will Serial number band takes in BAR_NO field, searches record in BAR_REC table;Search in BAR_REC table and be No have record, and is simultaneously written inside BAR_HIS by Query Result;
If any record:
" change no " that then please judge this serial number is T, and arranges and certainly set password, then provide language Sound prompting " please input from setting password, with No. # end ", captures from setting password, and coupling is the most correct, if not Correctly, then prompting " Password Input is wrong, please re-enter ";As correctly, then provide voice message " you Unlocking cipher be XXX, thanks ", after finishing, three options of voice message: the most hard of hearing, 2. change Unlocking cipher, 3. return last layer, 4. on-hook function;Select 1. hard of hearing, then replay Query Result; Select 2. Change Passwords, then provide voice message and " input new unlocking cipher, terminate with # ", point out input two Secondary, final unlocking cipher is passed to data base, is saved in data base;After end of operation, prompting " is newly opened Lock cipher is arranged successfully!", terminate on-hook.3. return last layer, then return to C.;4. on-hook, then terminate.
" change no " that then please judge this serial number is F, and arranges and certainly set password, then provide language Sound prompting " please input from setting password, with No. # end ", captures from setting password, and coupling is the most correct, then give Go out voice message " your unlocking cipher is XXX, thanks ", after finishing, three options of voice message: The most hard of hearing, 2. return last layer, 3. on-hook function;Select 1. hard of hearing, then replay Query Result;Choosing Select 2. return last layers, then return to C.;3. on-hook, then terminate.
" change no " that then please judge this serial number is T, and is not provided with certainly setting password, then provide language Sound prompting " your unlocking cipher is XXX, for ensureing your cryptosecurity, can arrange from setting password, in order to Subsequent extracted, can operate according to phonetic guiding as arranged, thanks ", after finishing, voice message three Individual option: the most hard of hearing, 2. arrange from set password, 3. return last layer, 4. on-hook function;Select 1. hard of hearing, Then replay Query Result;2. arrange from setting password, then provide voice message, " please input from setting password, Terminate with # ", prompting input twice, by setting password passes to data base the most certainly, it is saved in data base;Behaviour After work, prompting " sets password to arrange successfully certainly!As continued to change unlocking cipher, please continue to become by 1. More unlocking cipher;Terminate please hang up ", when selecting 1. continuation change unlocking cipher, then provide voice message " input new unlocking cipher, terminate with # ", prompting input twice, final unlocking cipher is passed to data base, It is saved in data base;After end of operation, point out " new unlocking cipher is arranged successfully ", terminate on-hook.3. Return last layer, then return to C.;4. on-hook, then terminate.
" change no " that then please judge this serial number is F, and is not provided with certainly setting password, then provide language Sound prompting " your unlocking cipher is XXX, for ensureing your cryptosecurity, can arrange from setting password, in order to Subsequent extracted, can operate according to phonetic guiding as arranged, thanks ", after finishing, voice message three Individual option: the most hard of hearing, 2. arrange from set password, 3. return last layer, 4. on-hook function;Select 1. hard of hearing, Then replay Query Result;2. arrange from setting password, then provide voice message, " please input from setting password, Terminate with # ", prompting input twice, by setting password passes to data base the most certainly, it is saved in data base;Behaviour After work, point out " certainly setting password to arrange successfully ", terminate on-hook.3. return last layer, then return to C.;4. on-hook, then terminate.
No record, then prompting " serial number does not exists, and please watch out for fake products ".
Except the handheld terminal of described step (3) scans, directly obtain false proof by the Internet and obtain password Outside information, it is also possible to inquired about by mobile phone short messages, comprise the steps: that user is according to drop or outsourcing Dress, according to prompting above, sends false-proof short message, by short message content, as sent CODE_ID+ numeral extremely Sms platform;Sms platform, after receiving information, according to CODE_ID, analysis is false proof looking into Ask and still obtain password;
Antiforge inquiry, is brought into serial number in the BAR_NO field in BAR_REC table, searches whether to deposit At record;
Exist, then check whether BAR_HIS has existence inquiry record, if any, then send Query Result to visitor Family, and point out be queried which time;Such as nothing, then show that inquiry is normal;
Do not exist, provide warning message;
Obtain password, serial number is brought in the BAR_NO field in BAR_REC table, searches whether to deposit At record;
Exist:
Change password
Having setting from setting password: answer short message, prompting needs user to send from setting password;User sends from setting After password, system Auto-matching is the most correct from setting password, as correctly, then sends correct encrypted message, And remind the need of change and send Change Password instruction, after user sends Change Password instruction, then reply Short message password is arranged successfully;Reply incorrect as certainly set password, then reply the information of code error;
Without arranging from setting password: system sends correct password short message automatically, and reminds user can carry out from setting Password, after user is according to message reply password, answer short message, password arranges successfully and reminds the need of change More and send Change Password instruction, user send Change Password instruction after, then answer short message password is arranged successfully;
Can not Change Password
Having setting from setting password: answer short message, prompting needs user to send from setting password;User sends from setting After password, system Auto-matching is the most correct from setting password, as correctly, then sends correct encrypted message, Then answer short message password is arranged successfully;Reply incorrect as certainly set password, then reply the information of code error;
Without arranging from setting password: system sends correct password short message automatically, and reminds user can carry out from setting Password, after user is according to message reply password, answer short message, answer short message password is arranged successfully.
A kind of based on Internet technology the network anti-counterfeit system of the present invention and having the beneficial effect that of method:
A kind of based on Internet technology the network anti-counterfeit system of the present invention and method, gathered false proof, antitheft, Anti-channel conflict, loss prevention function in one, by the Internet, phone or mobile phone carry out false proof and password obtain and Protection, safe and reliable.
Accompanying drawing explanation
Fig. 1 is a kind of based on Internet technology network anti-counterfeit system and the flow chart of method of the present invention.
Fig. 2 is a kind of based on Internet technology the network anti-counterfeit system of the present invention and the liaison mode of method is looked into The flow chart of inquiry method.
Fig. 3 is a kind of based on Internet technology network anti-counterfeit system and the SMS side of method of the present invention The flow chart of formula querying method.
Detailed description of the invention
As it is shown in figure 1, a kind of based on Internet technology the network anti-counterfeit system of the present invention and method, including Following steps:
(1) serial number prints, and uses and has uniqueness, and random, one section of encrypted code of middle use The method of technology produces serial number, is stored in network anti-counterfeit data base while printing serial number;
(2), after serial number generates, need to be attached on each shielded genuine piece two groups of serial numbers, with Genuine piece one_to_one corresponding;
The mode of patch can take variation, is affixed on outer package as false proof, can also before i.e. client does not buys True-false inquiring, obtains password and then must use concealed mode labeling, and general recommendations uses Quick Response Code encrypted code The icon that mode produces after processing, as by a scratch card figure layer, hides serial number, for sale after scrape dispersing and elevation again For two-dimensional scan, or being placed directly against in inner packing, user takes inner packing apart after buying and just can view.
Product design, genuine piece must first be unblanked when opening, can effectively be prevented from being copied, such as wine industry, can Being placed on box to fill a wine cup for, increase a lock in the design on box, user buys after drinking, can be by unlocking Label, obtains unlocking pin in direct Antiforge system, unblanks, as do not opened, and this wine the most provable It is fake wine, because this product all cannot be inquired on official website.
(3) client is when have purchased product, by one-dimension code or the scanning software of Quick Response Code, and can be direct Collect one-dimension code, import in system, batch query, or scanned by Quick Response Code, jump directly to prevent Antiforge system, system resolves serial number automatically, and in Antiforge system data base, whether search sequence number exists, as Exist, then provide genuine piece information;If do not existed, then provide prompting message, remind user to watch out for fake products;Or Inquired about by liaison mode, according to voice Self-Service, obtain true and false information;Or by short message sending mode Inquiry, obtains true and false information.
Described genuine piece information includes the essential information of product, name of product, product specification, sales region, quilt Inquiry times.
As in figure 2 it is shown, the handheld terminal scanning of described step (3), directly obtained false proof by the Internet And acquisition encrypted message, comprise the steps:
A Antiforge inquiry
The one-dimension code that user provides according to drop or outer package, user needs login system, true at batch query In the pseudo-page, importing or directly sweep one-dimension code with barcode scanner, barcode scanner parses one-dimension code information, will Serial number band takes in BAR_NO field, searches record in BAR_REC table;Search in BAR_REC table and be No have record, and is simultaneously written inside BAR_HIS by Query Result;If any record, then show certified products result, When searching less than record, then the information of the vigilant fake products of display;When user is provided by drop or outer package Quick Response Code, directly with Quick Response Code scanning software or the handheld terminal of mobile phone, during scanning, can automatic jump to enterprise The official website of industry, and automatically resolve 2 D code information, the information of parsing is delivered to data base BAR_REC Table is searched record, looks for and whether BAR_REC table has record, and Query Result is simultaneously written BAR_HIS The inside;If any record, then show certified products result, when searching less than record, then the letter of the vigilant fake products of display Breath;
B obtains password
When the Quick Response Code that user is provided by drop or outer package, directly use mobile phone Quick Response Code scanning software or Handheld terminal, during scanning, can automatic jump to the official website of enterprise, and automatically resolve 2 D code information, It is delivered to the information of parsing in data base's BAR_REC table search record, looks in BAR_REC table whether having note Record;And Query Result is simultaneously written inside BAR_HIS;
If any record:
Judge that this serial number is " change password ", and arranged and certainly set password, then point out in webpage Input, from setting password, captures from setting password, and coupling is the most correct, and as incorrect, then prompting is re-entered; As correctly, then provide encrypted message;After providing encrypted message, provide Change Password function, Yong Huke simultaneously So that the actual password revising lock is arranged in systems, in order to subsequent extracted;
Judge that this serial number is not " change password ", and arranged and certainly set password, then carry in webpage Showing that input, from setting password, captures from setting password, coupling is the most correct, and as incorrect, then prompting is re-entered; As correctly, then after providing encrypted message;
Judge that this serial number is " changing password ", and be not provided with certainly setting password, then show message in cipher Breath, provides from setting cryptographic function simultaneously, it is provided that user setup protection password, prevents password from being asked for by others, After arranging successfully, providing setting change cryptographic function, the actual password revising lock can be set by user simultaneously Put in systems, in order to subsequent extracted;
Judge that this serial number is not " changing password ", and be not provided with certainly setting password, then show password Information, provides from setting cryptographic function simultaneously, it is provided that user setup protection password, prevents password from being asked for by others;
No record, then prompting sequence number does not exists, and please watch out for fake products.
Except the handheld terminal of described step (3) scans, directly obtain false proof by the Internet and obtain password Outside information, it is also possible to inquired about by liaison mode, comprise the steps:
A Antiforge inquiry
User, according to drop or outer package, obtains the telephone number of Antiforge inquiry platform, dials this number and enters Voice system;According to voice message, select language other;Capture the serial number that user inputs in the phone, will Serial number band takes in BAR_NO field, searches record in BAR_REC table;Search in BAR_REC table and be No have record, and is simultaneously written inside BAR_HIS by Query Result;
If any record:
" change no " that then please judge this serial number is T, and arranges and certainly set password, then provide language Sound prompting " please input from setting password, with No. # end ", captures from setting password, and coupling is the most correct, if not Correctly, then prompting " Password Input is wrong, please re-enter ";As correctly, then provide voice message " you Unlocking cipher be XXX, thanks ", after finishing, three options of voice message: the most hard of hearing, 2. change Unlocking cipher, 3. return last layer, 4. on-hook function;Select 1. hard of hearing, then replay Query Result; Select 2. Change Passwords, then provide voice message and " input new unlocking cipher, terminate with # ", point out input two Secondary, final unlocking cipher is passed to data base, is saved in data base;After end of operation, prompting " is newly opened Lock cipher is arranged successfully ", terminate on-hook.3. return last layer, then return to C.;4. on-hook, then terminate.
" change no " that then please judge this serial number is F, and arranges and certainly set password, then provide language Sound prompting " please input from setting password, with No. # end ", captures from setting password, and coupling is the most correct, then give Go out voice message " your unlocking cipher is XXX, thanks ", after finishing, three options of voice message: The most hard of hearing, 2. return last layer, 3. on-hook function;Select 1. hard of hearing, then replay Query Result;Choosing Select 2. return last layers, then return to C.;3. on-hook, then terminate.
" change no " that then please judge this serial number is T, and is not provided with certainly setting password, then provide language Sound prompting " your unlocking cipher is XXX, for ensureing your cryptosecurity, can arrange from setting password, in order to Subsequent extracted, can operate according to phonetic guiding as arranged, thanks ", after finishing, voice message three Individual option: the most hard of hearing, 2. arrange from set password, 3. return last layer, 4. on-hook function;Select 1. hard of hearing, Then replay Query Result;2. arrange from setting password, then provide voice message, " please input from setting password, Terminate with # ", prompting input twice, by setting password passes to data base the most certainly, it is saved in data base;Behaviour After work, prompting " sets password to arrange successfully certainly!As continued to change unlocking cipher, please continue to become by 1. More unlocking cipher;Terminate please hang up ", when selecting 1. continuation change unlocking cipher, then provide voice message " input new unlocking cipher, terminate with # ", prompting input twice, final unlocking cipher is passed to data base, It is saved in data base;After end of operation, point out " new unlocking cipher is arranged successfully ", terminate on-hook.3. Return last layer, then return to C.;4. on-hook, then terminate.
" change no " that then please judge this serial number is F, and is not provided with certainly setting password, then provide language Sound prompting " your unlocking cipher is XXX, for ensureing your cryptosecurity, can arrange from setting password, in order to Subsequent extracted, can operate according to phonetic guiding as arranged, thanks ", after finishing, voice message three Individual option: the most hard of hearing, 2. arrange from set password, 3. return last layer, 4. on-hook function;Select 1. hard of hearing, Then replay Query Result;2. arrange from setting password, then provide voice message, " please input from setting password, Terminate with # ", prompting input twice, by setting password passes to data base the most certainly, it is saved in data base;Behaviour After work, point out " certainly setting password to arrange successfully ", terminate on-hook.3. return last layer, then return to C.;4. on-hook, then terminate.
No record, then prompting " serial number does not exists, and please watch out for fake products ".
Except the handheld terminal of described step (3) scans, directly obtain false proof by the Internet and obtain password Outside information, it is also possible to inquired about by mobile phone short messages, comprise the steps: that user is according to drop or outsourcing Dress, according to prompting above, sends false-proof short message, by short message content, as sent CODE_ID+ numeral extremely Sms platform;Sms platform, after receiving information, according to CODE ID, analysis is false proof looking into Ask and still obtain password;
Antiforge inquiry, is brought into serial number in the BAR_NO field in BAR_REC table, searches whether to deposit At record;
Exist, then check whether BAR_HIS has existence inquiry record, if any, then send Query Result to visitor Family, and point out be queried which time;Such as nothing, then show that inquiry is normal;
Do not exist, provide warning message;
Obtain password, serial number is brought in the BAR_NO field in BAR_REC table, searches whether to deposit At record;
Exist:
Change password
Having setting from setting password: answer short message, prompting needs user to send from setting password;User sends from setting After password, system Auto-matching is the most correct from setting password, as correctly, then sends correct encrypted message, And remind the need of change and send Change Password instruction, after user sends Change Password instruction, then reply Short message password is arranged successfully;Reply incorrect as certainly set password, then reply the information of code error;
Without arranging from setting password: system sends correct password short message automatically, and reminds user can carry out from setting Password, after user is according to message reply password, answer short message, password arranges successfully and reminds the need of change More and send Change Password instruction, user send Change Password instruction after, then answer short message password is arranged successfully;
Can not Change Password
Having setting from setting password: answer short message, prompting needs user to send from setting password;User sends from setting After password, system Auto-matching is the most correct from setting password, as correctly, then sends correct encrypted message, Then answer short message password is arranged successfully;Reply incorrect as certainly set password, then reply the information of code error;
Without arranging from setting password: system sends correct password short message automatically, and reminds user can carry out from setting Password, after user is according to message reply password, answer short message, answer short message password is arranged successfully.
Embodiment described above is only to be described the preferred embodiment of the present invention, not to this Bright scope is defined, under design spirit premise without departing from the present invention, and this area ordinary skill technology people Member's various deformation of making technical solution of the present invention and improvement, all should fall into claims of the present invention true In fixed protection domain.

Claims (5)

1. network anti-counterfeit system based on Internet technology and a method, comprise the steps:
(1) serial number prints, and uses and has uniqueness, and random, one section of encrypted code of middle use The method of technology produces serial number, is stored in network anti-counterfeit data base while printing serial number;
(2), after serial number generates, need to be attached on each shielded genuine piece two groups of serial numbers, with Genuine piece one_to_one corresponding;
(3) client is when have purchased product, by one-dimension code or the scanning software of Quick Response Code, and can be direct Collect one-dimension code, import in system, batch query, or scanned by Quick Response Code, jump directly to prevent Antiforge system, system resolves serial number automatically, and in Antiforge system data base, whether search sequence number exists, as Exist, then provide genuine piece information;If do not existed, then provide prompting message, remind user to watch out for fake products;Or Inquired about by liaison mode, according to voice Self-Service, obtain true and false information;Or by short message sending mode Inquiry, obtains true and false information;
(4) it is particularly directed to lock industry, it is provided that obtain cryptographic function online, be simultaneously provided in line Modify password And protection cryptographic function is set, help user remembers the encrypted message of the lock of oneself.
A kind of network anti-counterfeit system based on Internet technology the most according to claim 1 and method, It is characterized in that: described genuine piece information includes the essential information of product, name of product, product specification, sale Region, it is queried number of times.
A kind of network anti-counterfeit system based on Internet technology the most according to claim 1 and method, It is characterized in that: the handheld terminal scanning of described step (3), directly obtain false proof by the Internet and obtain Take encrypted message, comprise the steps:
A Antiforge inquiry
The one-dimension code that user provides according to drop or outer package, user needs login system, true at batch query In the pseudo-page, importing or directly sweep one-dimension code with barcode scanner, barcode scanner parses one-dimension code information, will Serial number band takes in BAR_NO field, searches record in BAR_REC table;Search in BAR_REC table and be No have record, and is simultaneously written inside BAR_HIS by Query Result;If any record, then show certified products result, When searching less than record, then the information of the vigilant fake products of display;When user is provided by drop or outer package Quick Response Code, directly with Quick Response Code scanning software or the handheld terminal of mobile phone, during scanning, can automatic jump to enterprise The official website of industry, and automatically resolve 2 D code information, the information of parsing is delivered to data base BAR_REC Table is searched record, looks for and whether BAR_REC table has record, and Query Result is simultaneously written BAR_HIS The inside;If any record, then show certified products result, when searching less than record, then the letter of the vigilant fake products of display Breath;
B obtains password
When the Quick Response Code that user is provided by drop or outer package, directly use mobile phone Quick Response Code scanning software or Handheld terminal, during scanning, can automatic jump to the official website of enterprise, and automatically resolve 2 D code information, It is delivered to the information of parsing in data base's BAR_REC table search record, looks in BAR_REC table whether having note Record;And Query Result is simultaneously written inside BAR_HIS;
If any record:
Judge that this serial number is " change password ", and arranged and certainly set password, then point out in webpage Input, from setting password, captures from setting password, and coupling is the most correct, and as incorrect, then prompting is re-entered; As correctly, then provide encrypted message;After providing encrypted message, provide Change Password function, Yong Huke simultaneously So that the actual password revising lock is arranged in systems, in order to subsequent extracted;
Judge that this serial number is not " change password ", and arranged and certainly set password, then carry in webpage Showing that input, from setting password, captures from setting password, coupling is the most correct, and as incorrect, then prompting is re-entered; As correctly, then after providing encrypted message;
Judge that this serial number is " changing password ", and be not provided with certainly setting password, then show message in cipher Breath, provides from setting cryptographic function simultaneously, it is provided that user setup protection password, prevents password from being asked for by others, After arranging successfully, providing setting change cryptographic function, the actual password revising lock can be set by user simultaneously Put in systems, in order to subsequent extracted;
Judge that this serial number is not " changing password ", and be not provided with certainly setting password, then show password Information, provides from setting cryptographic function simultaneously, it is provided that user setup protection password, prevents password from being asked for by others;
No record, then prompting sequence number does not exists, and please watch out for fake products.
A kind of network anti-counterfeit system based on Internet technology the most according to claim 1 and method, It is characterized in that: except the handheld terminal of described step (3) scans, directly by the Internet obtain false proof and Outside acquisition encrypted message, it is also possible to inquired about by liaison mode, comprise the steps:
A Antiforge inquiry
User, according to drop or outer package, obtains the telephone number of Antiforge inquiry platform, dials this number and enters Voice system;According to voice message, select language other;Capture the serial number that user inputs in the phone, will Serial number band takes in BAR_NO field, searches record in BAR_REC table;Search in BAR_REC table and be No have record, and is simultaneously written inside BAR_HIS by Query Result;
If any record:
" change no " that then please judge this serial number is T, and arranges and certainly set password, then provide language Sound prompting " please input from setting password, with No. # end ", captures from setting password, and coupling is the most correct, if not Correctly, then prompting " Password Input is wrong, please re-enter ";As correctly, then provide voice message " you Unlocking cipher be XXX, thanks ", after finishing, three options of voice message: the most hard of hearing, 2. change Unlocking cipher, 3. return last layer, 4. on-hook function;Select 1. hard of hearing, then replay Query Result; Select 2. Change Passwords, then provide voice message and " input new unlocking cipher, terminate with # ", point out input two Secondary, final unlocking cipher is passed to data base, is saved in data base;After end of operation, prompting " is newly opened Lock cipher is arranged successfully ", terminate on-hook.3. return last layer, then return to C.;4. on-hook, then terminate;
" change no " that then please judge this serial number is F, and arranges and certainly set password, then provide language Sound prompting " please input from setting password, with No. # end ", captures from setting password, and coupling is the most correct, then give Go out voice message " your unlocking cipher is XXX, thanks ", after finishing, three options of voice message: The most hard of hearing, 2. return last layer, 3. on-hook function;Select 1. hard of hearing, then replay Query Result;Choosing Select 2. return last layers, then return to C.;3. on-hook, then terminate;
" change no " that then please judge this serial number is T, and is not provided with certainly setting password, then provide language Sound prompting " your unlocking cipher is XXX, for ensureing your cryptosecurity, can arrange from setting password, in order to Subsequent extracted, can operate according to phonetic guiding as arranged, thanks ", after finishing, voice message three Individual option: the most hard of hearing, 2. arrange from set password, 3. return last layer, 4. on-hook function;Select 1. hard of hearing, Then replay Query Result;2. arrange from setting password, then provide voice message, " please input from setting password, Terminate with # ", prompting input twice, by setting password passes to data base the most certainly, it is saved in data base;Behaviour After work, point out " certainly setting password to arrange successfully ";As continued to change unlocking cipher, please continue by 1. Change unlocking cipher;Terminate please hang up ", when selecting 1. continuation change unlocking cipher, then provide voice and carry Show " inputting new unlocking cipher, terminate with # " that final unlocking cipher is passed to data base by prompting input twice, It is saved in data base;After end of operation, point out " new unlocking cipher is arranged successfully ", terminate on-hook.3. Return last layer, then return to C.;4. on-hook, then terminate.
" change no " that then please judge this serial number is F, and is not provided with certainly setting password, then provide language Sound prompting " your unlocking cipher is XXX, for ensureing your cryptosecurity, can arrange from setting password, in order to Subsequent extracted, can operate according to phonetic guiding as arranged, thanks ", after finishing, voice message three Individual option: the most hard of hearing, 2. arrange from set password, 3. return last layer, 4. on-hook function;Select 1. hard of hearing, Then replay Query Result;2. arrange from setting password, then provide voice message, " please input from setting password, Terminate with # ", prompting input twice, by setting password passes to data base the most certainly, it is saved in data base;Behaviour After work, point out " certainly setting password to arrange successfully ", terminate on-hook.3. return last layer, then return to C.;4. on-hook, then terminate.
No record, then prompting " serial number does not exists, and please watch out for fake products ".
A kind of network anti-counterfeit system based on Internet technology the most according to claim 1 and method, It is characterized in that: except the handheld terminal of described step (3) scans, directly by the Internet obtain false proof and Outside acquisition encrypted message, it is also possible to inquired about by mobile phone short messages, comprise the steps: that user is according to hanging Board or outer package, according to prompting above, send false-proof short message, by short message content, as sent CODE_ID+ Numeral is to sms platform;Sms platform, after receiving information, according to CODE_ID, analysis is Antiforge inquiry still obtains password;
Antiforge inquiry, is brought into serial number in the BAR_NO field in BAR_REC table, searches whether to deposit At record;
Exist, then check whether BAR_HIS has existence inquiry record, if any, then send Query Result to visitor Family, and point out be queried which time;Such as nothing, then show that inquiry is normal;
Do not exist, provide warning message;
Obtain password, serial number is brought in the BAR_NO field in BAR_REC table, searches whether to deposit At record;
Exist:
Change password
Having setting from setting password: answer short message, prompting needs user to send from setting password;User sends from setting After password, system Auto-matching is the most correct from setting password, as correctly, then sends correct encrypted message, And remind the need of change and send Change Password instruction, after user sends Change Password instruction, then reply Short message password is arranged successfully;Reply incorrect as certainly set password, then reply the information of code error;
Without arranging from setting password: system sends correct password short message automatically, and reminds user can carry out from setting Password, after user is according to message reply password, answer short message, password arranges successfully and reminds the need of change More and send Change Password instruction, user send Change Password instruction after, then answer short message password is arranged successfully;
Can not Change Password
Having setting from setting password: answer short message, prompting needs user to send from setting password;User sends from setting After password, system Auto-matching is the most correct from setting password, as correctly, then sends correct encrypted message, Then answer short message password is arranged successfully;Reply incorrect as certainly set password, then reply the information of code error;
Without arranging from setting password: system sends correct password short message automatically, and reminds user can carry out from setting Password, after user is according to message reply password, answer short message, answer short message password is arranged successfully.
CN201410740784.1A 2014-11-30 2014-11-30 Network anti-fake system and method based on Internet technology Pending CN105894296A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410740784.1A CN105894296A (en) 2014-11-30 2014-11-30 Network anti-fake system and method based on Internet technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410740784.1A CN105894296A (en) 2014-11-30 2014-11-30 Network anti-fake system and method based on Internet technology

Publications (1)

Publication Number Publication Date
CN105894296A true CN105894296A (en) 2016-08-24

Family

ID=56699564

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410740784.1A Pending CN105894296A (en) 2014-11-30 2014-11-30 Network anti-fake system and method based on Internet technology

Country Status (1)

Country Link
CN (1) CN105894296A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019119381A1 (en) * 2016-12-22 2019-06-27 陈勇 Password generated by corresponding card and application thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019119381A1 (en) * 2016-12-22 2019-06-27 陈勇 Password generated by corresponding card and application thereof

Similar Documents

Publication Publication Date Title
CN103841239B (en) Terminal authenticity verification method and device
CN107451820A (en) On line, multiple, dynamic anti-fake under line, anti-channel conflict, can traceability system
CN104992337A (en) Commodity anti-counterfeiting tracing online and offline identification system and method
JP2017504866A (en) System and method for verifying clock synchronous dynamic password forgery prevention label legality in real time
CN109583894A (en) Offer, verification method and the device of two dimensional code
CN105894304A (en) Product anti-counterfeiting method
CN104299146A (en) Product anti-counterfeiting inquiry system
CN103886469A (en) Product two-dimension code generation and query system
CN107705139A (en) A kind of novel article anti-counterfeiting authentication method
CN106157056A (en) A kind of product is traced to the source method for anti-counterfeit
CN103886470A (en) Cloud server based merchandise anti-counterfeiting implementing method and system
CN107358283A (en) A kind of Quick Response Code shows the method and system of express delivery information, mobile terminal
CN105426744A (en) Method and apparatus for setting password protection question
CN110348243A (en) The method and system of online shopping and/or express delivery secret protection
CN105631687B (en) Product Validation method and device
WO2008056105A1 (en) Verification method
CN100407860C (en) Movable terminal verifying method
CN111274307A (en) Product information display method, device and system and related equipment
CN113094616A (en) Information pushing method, information associating method, information pushing equipment, information associating equipment and computer storage medium
CN110059779A (en) A kind of customized commodity anti-counterfeit two-dimensional bar code detection system
CN105894296A (en) Network anti-fake system and method based on Internet technology
CN107292633A (en) Article dynamic anti-fake retroactive method and system based on internet platform
CN108108780A (en) A kind of commodity packaging and its dimension code anti-counterfeit method
CN104103000A (en) Network false proof system and method based on Internet technology
KR20150045543A (en) Genuine product certification and sns posting system, and method using nfc tag and smart phone

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160824