CN107705134A - Anti-fake network system based on block chain - Google Patents
Anti-fake network system based on block chain Download PDFInfo
- Publication number
- CN107705134A CN107705134A CN201710943650.3A CN201710943650A CN107705134A CN 107705134 A CN107705134 A CN 107705134A CN 201710943650 A CN201710943650 A CN 201710943650A CN 107705134 A CN107705134 A CN 107705134A
- Authority
- CN
- China
- Prior art keywords
- node
- common recognition
- block
- agent
- ordinary
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Economics (AREA)
- Finance (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of anti-fake network system based on block chain, including the ordinary node and common recognition node being connected with chain network, the common recognition node is used to assembling block and heap is loaded onto the chain network, ordinary node, common recognition node be traded operation between any two caused by transaction data broadcast to the chain network;Manufacturer's node is used to generate security code and broadcasted to chain network;Agent's node decodes to the circulation and transfer of goods to next agent or user, user to security code.Beneficial effect:False proof digitization is realized using block chain network, data committed memory is small, and the true and false process of people's inquiry and checking commodity is simple and convenient.The circulation process of commodity is clear, and circulation process has with circulation code.Security code is not easy to be replicated, can also avert misconceptions code by the way of preservation is hidden.False proof verification cost is low.
Description
Technical field
The present invention relates to block chain technical field, specifically a kind of anti-fake network system based on block chain.
Background technology
With the improvement of living standards, article is abundant, when people do shopping, under being had no way of for a feast for the eyes commodity
Hand, the reason for its is important are that " mountain vallage " is too many, it is difficult to are differentiated, consumers' rights and interests cannot be guaranteed.
Particularly, platform is consumed for electric business, people are in process of consumption, it is impossible to which live mirror is carried out to the commodity of purchase
Not, electric business can only provide some pictures or video by beautification, allow consumer to be compared, this exhibition method is easily made
Vacation, consumer be difficult to differentiate, causes actual thing in one's hands often to be differed greatly with the imagination, and also straight line declines the prestige of electric business,
Therefore fake products has become the maximum enemy of existing electric business.
Commodity are from dispatching from the factory into consumer's hand, and centre, which can undergo, repeatedly changes hands, such as multiple businessmans, dispatching person, courier
After repeatedly being transmitted Deng, commodity experience, the authenticity for finally reaching the commodity in consumer's hand is difficult to ensure that consumer can not confirm
The problem of being production firm or the produced problem in transmittance process, consumers' rights and interests can not be guaranteed, while to production
Producer causes much to perplex.
The content of the invention
In view of the above-mentioned problems, the invention provides a kind of anti-fake network system based on block chain, by real commodity transaction
It is combined with block chain data transfer, passes through block chain data query, you can the true and false of commodity is examined.
To reach above-mentioned purpose, the concrete technical scheme that the present invention uses is as follows:
A kind of anti-fake network system based on block chain, its key are:Including m ordinary node being connected with chain network
With n common recognition node, the common recognition node is used to assemble block and heap is loaded onto the chain network, and the m ordinary nodes, n are individual
It is described common recognition node be traded between any two operation caused by transaction data broadcast to the chain network;The ordinary node
X1 manufacturer's ordinary node, y1 agent's ordinary node and z1 user's ordinary node are provided with, the common recognition node is set
It is equipped with x2 manufacturer's common recognition node, y2 agent's common recognition node and z2 user's common recognition node;Any manufacturer is general
Logical node or the manufacturer know together node for generating security code and broadcasting to the chain network;Any agent is general
The circulation and transfer of goods that logical node or agent common recognition node are used to that security code will to be pasted with is common to other any agents
Node or any agent common recognition node or any user ordinary node or any user common recognition node;Any institute
State user's ordinary node or any user common recognition node is used to decode security code.
By above-mentioned design, any manufacturer generates security code and broadcasts the security code to chain network, meanwhile, this is prevented
Pseudo-code is attached on commodity, and after security code is decoded, security code failure, corresponding commodity correspond to distortion.It is effectively protected
Commodity authenticity, it is effectively false proof, it is easy to consumer query, improves the genuine piece reliability of commodity.It is in office during commodity circulation
One agent circulation can all leave circulation mark, and circulation mark broadcast to chain network, any node can be in chain network
In inquired about and download chain network data, be easy to any node to determine commodity true and false.
M, n, x1, y1, z1, x2, y2, z2 are the positive integer more than 0.
Further, the ordinary node and the common recognition or are established a connection at node by APP and the chain network,
Or established a connection by intelligent terminal instrument and the chain network.
Using such scheme, ordinary node and common recognition node can be downloaded in corresponding intelligence tool corresponding to APP, pass through
APP is established with chain network and connected, and carries out data upload and download, real-time update data.
Ordinary node and common recognition node directly can also be established a connection using intelligent terminal instrument with chain network, example
Such as, using modes such as mobile datas, data upload and download, real time data renewal are carried out.
Further describe, in addition to server node, the server node or be server ordinary node or service
Device common recognition node;Any manufacturer's ordinary node, manufacturer know together node, agent's ordinary node, agent's common recognition save
Point, user's ordinary node, user's common recognition node are established a connection by small routine and the server node;Or pass through
Webpage establishes a connection with the server node;The server node is also connected with the chain network, the server
Node is used to know together and save as any manufacturer's ordinary node, manufacturer's common recognition node, agent's ordinary node, agent
Point, user's ordinary node, user are known together the node data transmission channel between the chain network respectively.
Using aforesaid way, server node is easy to any manufacturer commonly to save as a data transmission channel
Point, manufacturer's common recognition node, agent's ordinary node, agent's common recognition node, user's ordinary node, user's common recognition node difference
Carry out data transmission between chain network.
Further describe, the stream that any agent's ordinary node, agent's common recognition node are carried out to any commodity
When turning operation, the identification digital content for the security code being attached on the commodity can increase a circulation code, agent's ordinary node
Or agent knows together and node and broadcasted the circulation code to the chain network.
Commodity are produced to during the whole circulation of consumer's purchase from manufacturer, middle also there is multiple agents, are led to
This programme is crossed, when any circulation occurs for commodity, can produce corresponding circulation code, the circulation code comprises at least agent's identity letter
Breath, it is caused circulation code be uploaded to chain network and broadcasted, other any ordinary nodes or common recognition node by data more
New or inquiry, you can the circulation information to any commodity is inquired about, and prevents agent from substituting commodity for another surreptitiously, improves commodity genuine piece
Rate.
Further describe, the principle that any node is upgraded to corresponding common recognition node by ordinary node is:
A:The ordinary node downloads block, chain network is reached newest;
B:The first transaction is produced within h hours;
C:Accumulation credit value reaches access credit value;
D:Pay access guarantee fund;
E:Any common recognition node is provided with packing block function.
Also including node includes ordinary node, common recognition node, in addition to light node, light node include block head.It is wherein general
Logical node is scalable to turn into common recognition node, and after mentioned above principle is met, ordinary node is scalable as common recognition node.Wherein produce
The interval time of raw first transaction sets at random.Access guarantee fund is paid also to set at random.Access credit value is also set at random.
Wherein, block can be assembled in node of knowing together, and any common recognition node population block principle is:
A:The common recognition node to the chain network pay packing block expense, the packing block expense include token expense and
Service charge is used;
B:The credit value of the common recognition node is more than or equal to access credit value, and the guarantee fund of the common recognition node is more than or equal to access
Guarantee fund;
C:Block includes block head and transaction List Table, the block head include block people information, block packing temporal information and
Mei Keer tree roots, the transaction List Table of block can be obtained according to the Mei Keer tree roots;
D:The block committed memory amount is less than or equal to 2M;
E:Time consistency corresponding to the time of packing block and block packing temporal information.
Further describe, the content of the security code is labeled in Quick Response Code, and the picture of the Quick Response Code is randomly divided into hidden
Part and display portion are hidden, wherein display portion, which is shown, is attached to commodity surface, and the hidden parts, which do to hide, is attached to commodity
On.
Security code is labeled in Quick Response Code and is easy to any user to be read out and decode, by the way of being hidden using part, first
Commodity counterfeit prevention code can be avoided to be replicated, improve the genuine piece rate of commodity;Second, which is also prevented from security code, is misunderstood code, causes not
Necessary loss.
Further describe, the two-dimension code image is attached at seal;The two-dimension code image display portion includes
First display portion and the second display portion, first display portion are attached in the first vector of seal, and described second is aobvious
Show that part is attached on the Second support of seal, when the first vector and Second support are carried out into sealing treatment, first is aobvious
Show that part and the two-dimension code image of the second display portion composition change with first vector and Second support relative position.
Two-dimension code image is attached at seal, wherein display portion is attached to first vector and Second support respectively
On, and when first vector and Second support progress sealing treatment, the two dimension of the first display portion and the second display portion composition
Code picture changes with first vector and Second support relative position, the generation and imperfect at random of the two-dimension code image of composition, even if
People are replicated, and can not also obtain complete Quick Response Code, it is impossible to are completely replicated, ensure that the reliable of security code
Property.
Further describe, the two-dimension code image is double-deck pattern, and wherein bottom pattern is attached on commodity, top level diagram
Case is plotted on transparent paster, and the transparent paster connects with sealing, when top layer pattern is attached on bottom pattern, the two composition
Two-dimension code image with seal location change and change.
In order to further be protected to security code, two-dimension code image is made up of double-deck pattern, is applied using on cellophane paper
Pattern is covered, and cellophane paper is attached on the drawing containing Quick Response Code, wherein cellophane paper by the way of attaching at random, and to whole
Individual two-dimension code image take pictures being uploaded to chain network, when being decoded, when any user is decoded, can obtain complete
The picture of taking pictures of Quick Response Code, any user can be to the conscientious comparisons of Quick Response Code and inspection on commodity.
Beneficial effects of the present invention:False proof digitization is realized using block chain network, data committed memory is small, people's inquiry
It is simple and convenient with the true and false process of checking commodity.The circulation process of commodity is clear, and circulation process has with circulation code.It is anti-
Pseudo-code is not easy to be replicated, can also avert misconceptions code by the way of preservation is hidden.False proof verification cost is low.
Brief description of the drawings
Fig. 1 is the chain network security code data transfer schematic diagram of the present invention;
Fig. 2 is the system block diagram of the present invention;
Fig. 3 is the Quick Response Code schematic diagram of the present invention;
Fig. 4 is two-dimension code image schematic diagram of the present invention.
Embodiment
The embodiment and operation principle of the present invention are described in further detail below in conjunction with the accompanying drawings.
A kind of anti-fake network system based on block chain, including the m being connected with chain network are can be seen that with reference to Fig. 1 and Fig. 2
Individual ordinary node and n common recognition node, the common recognition node is used to assemble block and heap is loaded onto the chain network, and m described general
Logical node, the n common recognition nodes be traded operation between any two caused by transaction data broadcast to the chain network;
It is common that the ordinary node is provided with x1 manufacturer's ordinary node, y1 agent's ordinary node and z1 user
Node, the common recognition node are provided with x2 manufacturer's common recognition node, y2 agent's common recognition node and z2 user and know together and save
Point;
Any manufacturer's ordinary node or the manufacturer know together node for generating security code and broadcasting to institute
State chain network;Any agent's ordinary node or agent common recognition node are used for the commodity that will be pasted with security code
Circulation to other any agent's ordinary nodes or any agent know together node or any user ordinary node or
Any user common recognition node;
Any user's ordinary node or any user common recognition node is used to decode security code.
In the present embodiment, m, n, x1, y1, z1, x2, y2, z2 are the positive integer more than 0.
As a kind of embodiment, the ordinary node and the common recognition node are established by APP and the chain network and connected
Connect relation.
As another embodiment, the ordinary node and the common recognition node pass through intelligent terminal instrument and the chain
Network establishes a connection.
It can further be seen from figure 2 that also include server node, the server node or be server ordinary node or clothes
Business device common recognition node;Any manufacturer's ordinary node, manufacturer's common recognition node, agent's ordinary node, agent's common recognition
Node, user's ordinary node, user's common recognition node are established a connection by small routine and the server node;It is or logical
Webpage is crossed to establish a connection with the server node;The server node is also connected with the chain network, the service
Device node is used for as any manufacturer's ordinary node, manufacturer's common recognition node, agent's ordinary node, agent's common recognition
Node, user's ordinary node, user are known together the node data transmission channel between the chain network respectively.
In the present embodiment, server node is also connected with database, for preserving intermediate data and making dirty data.
Preferably, in order to record the agent of the circulation and transfer of goods, any agent's ordinary node, agent are known together node
When being operated to the circulation that any commodity are carried out, the identification digital content for the security code being attached on the commodity can increase a circulation
Code, agent's ordinary node or agent's common recognition node simultaneously broadcast the circulation code to the chain network.Circulation code includes
Circulation agent identity information, buy in time, a upper vendor information, sell time, next Bidder Information.
In the present embodiment, any node by ordinary node upgrade to corresponding to common recognition node principle be:
A:The ordinary node downloads block, chain network is reached newest;
B:The first transaction was produced in 24 hours;
C:Accumulation credit value reaches access credit value, and wherein access credit value comprises at least 1 credit value;
D:Pay access guarantee fund;
E:Any common recognition node is provided with packing block function.
In the present embodiment, any common recognition node population block principle is:
A:The common recognition node to the chain network pay packing block expense, the packing block expense include token expense and
Service charge is used;
B:The credit value of the common recognition node is more than or equal to access credit value, and the guarantee fund of the common recognition node is more than or equal to access
Guarantee fund;
C:Block includes block head and transaction List Table, the block head include block people information, block packing temporal information and
Mei Keer tree roots, the transaction List Table of block can be obtained according to the Mei Keer tree roots;
D:The block committed memory amount is equal to 2M;
E:Time consistency corresponding to the time of packing block and block packing temporal information.
From figure 3, it can be seen that the content of the security code is labeled in Quick Response Code, the picture of the Quick Response Code is randomly divided into hidden
Part and display portion are hidden, wherein display portion, which is shown, is attached to commodity surface, and the hidden parts, which do to hide, is attached to commodity
On.
It is attached to from Fig. 3 and Fig. 4 with reference to can be seen that the two-dimension code image at seal;The two-dimension code image shows
Show that part includes the first display portion and the second display portion, first display portion is attached in the first vector of seal,
Second display portion is attached on the Second support of seal, and the first vector and Second support are carried out into sealing treatment
When, the two-dimension code image of the first display portion and the second display portion composition becomes with first vector and Second support relative position
Change.
It can be seen that from Fig. 3 and Fig. 4;The two-dimension code image is double-deck pattern, and wherein bottom pattern is attached on commodity,
Top layer pattern is plotted on transparent paster, and the transparent paster connects with sealing, when top layer pattern is attached on bottom pattern, two
The two-dimension code image of person's composition changes and changed with seal location.
It should be pointed out that it is limitation of the present invention that described above, which is not, the present invention is also not limited to the example above,
What those skilled in the art were made in the essential scope of the present invention changes, is modified, adds or replaces, and also should
Belong to protection scope of the present invention.
Claims (9)
- A kind of 1. anti-fake network system based on block chain, it is characterised in that:Including m ordinary node being connected with chain network and N common recognition node, the common recognition node is used to assemble block and heap is loaded onto the chain network, m the ordinary nodes, n institutes State common recognition node be traded between any two operation caused by transaction data broadcast to the chain network;The ordinary node is provided with x1 manufacturer's ordinary node, y1 agent's ordinary node and z1 user and commonly saved Point, the common recognition node are provided with x2 manufacturer's common recognition node, y2 agent's common recognition node and z2 user's common recognition node;Any manufacturer's ordinary node or the manufacturer know together node for generating security code and broadcasting to the chain Network;Any agent's ordinary node or agent common recognition node are used for the circulation and transfer of goods that will be pasted with security code Known together node or any user ordinary node or any to other any agent's ordinary nodes or any agent User's common recognition node;Any user's ordinary node or any user common recognition node is used to decode security code.
- 2. the anti-fake network system according to claim 1 based on block chain, it is characterised in that:The ordinary node and institute State common recognition node or established a connection by APP and the chain network, or built by intelligent terminal instrument and the chain network Vertical annexation.
- 3. the anti-fake network system according to claim 1 or 2 based on block chain, it is characterised in that:Also include server Node, the server node or knows together node for server ordinary node or server;Any manufacturer's ordinary node, manufacturer's common recognition node, agent's ordinary node, agent's common recognition node, user Ordinary node, user's common recognition node are established a connection by small routine and the server node;Or by webpage with The server node establishes a connection;The server node is also connected with the chain network, and the server node is used for common as any manufacturer Node, manufacturer's common recognition node, agent's ordinary node, agent's common recognition node, user's ordinary node, user's common recognition node point Data transmission channel not between the chain network.
- 4. the anti-fake network system according to claim 1 based on block chain, it is characterised in that:Any agent is general During the circulation operation that logical node, agent's common recognition node are carried out to any commodity, the identification for the security code being attached on the commodity Digital content can increase a circulation code, agent's ordinary node or agent's common recognition node and broadcast the circulation code to institute State chain network.
- 5. the anti-fake network system according to claim 1 based on block chain, it is characterised in that:Any node is by commonly saving Point upgrades to the corresponding principle for knowing together node:A:The ordinary node downloads block, chain network is reached newest;B:The first transaction is produced within h hours;C:Accumulation credit value reaches access credit value;D:Pay access guarantee fund;E:Any common recognition node is provided with packing block function.
- 6. the anti-fake network system according to claim 1 based on block chain, it is characterised in that:Any common recognition node population Block principle is:A:The common recognition node pays packing block expense to the chain network, and the packing block expense includes token expense and formality Expense;B:The credit value of the common recognition node is more than or equal to access credit value, and the guarantee fund of the common recognition node ensures more than or equal to access Gold;C:Block includes block head and transaction List Table, and the block head includes block people information, block packing temporal information and Mei Ke That tree root, the transaction List Table of block can be obtained according to the Mei Keer tree roots;D:The block committed memory amount is less than or equal to 2M;E:Time consistency corresponding to the time of packing block and block packing temporal information.
- 7. the anti-fake network system according to claim 1 based on block chain, it is characterised in that:The content of the security code It is labeled in Quick Response Code, the picture of the Quick Response Code is randomly divided into hidden parts and display portion, and wherein display portion display attaches On commodity surface, the hidden parts do to hide and are attached on commodity.
- 8. the anti-fake network system according to claim 7 based on block chain, it is characterised in that:The two-dimension code image patch It is attached at seal;The two-dimension code image display portion includes the first display portion and the second display portion, first display Part is attached in the first vector of seal, and second display portion is attached on the Second support of seal, by described in When first vector and Second support carry out sealing treatment, the two-dimension code image of the first display portion and the second display portion composition with First vector and the change of Second support relative position.
- 9. the anti-fake network system according to claim 8 based on block chain, it is characterised in that:The two-dimension code image is Double-deck pattern, wherein bottom pattern are attached on commodity, and top layer pattern is plotted on transparent paster, and the transparent paster connects with sealing Connect, when top layer pattern is attached on bottom pattern, the two-dimension code image of the two composition changes and changed with seal location.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710943650.3A CN107705134A (en) | 2017-10-11 | 2017-10-11 | Anti-fake network system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710943650.3A CN107705134A (en) | 2017-10-11 | 2017-10-11 | Anti-fake network system based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107705134A true CN107705134A (en) | 2018-02-16 |
Family
ID=61184151
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710943650.3A Pending CN107705134A (en) | 2017-10-11 | 2017-10-11 | Anti-fake network system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107705134A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108924232A (en) * | 2018-07-11 | 2018-11-30 | 佛山伊苏巨森科技有限公司 | A kind of distributed block chain network system |
WO2020063185A1 (en) * | 2018-09-30 | 2020-04-02 | 阿里巴巴集团控股有限公司 | Blockchain-based anti-counterfeiting method and apparatus, and electronic device |
CN111127037A (en) * | 2019-12-19 | 2020-05-08 | 盐城工学院 | Commodity universal anti-counterfeiting method based on block chain account system |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1645400A (en) * | 2005-01-28 | 2005-07-27 | 高治中 | Dynamic combined code inquiring technology and use for anti-fogery and commodity interflow monitor of goods |
CN102999771A (en) * | 2011-09-19 | 2013-03-27 | 周锡卫 | Commodity anti-counterfeiting code construction and verification method |
CN104070869A (en) * | 2013-12-27 | 2014-10-01 | 湖北联合天诚防伪技术股份有限公司 | Manufacturing method for double-layer holographic anti-counterfeiting film |
CN204713597U (en) * | 2015-05-27 | 2015-10-21 | 信码互通(北京)科技有限公司 | Be provided with the box type packages container of Quick Response Code |
CN204965916U (en) * | 2015-09-25 | 2016-01-13 | 成都通通印防伪票证标签有限公司 | Double -deck two -dimensional code antifalsification label |
CN105469268A (en) * | 2015-12-19 | 2016-04-06 | 北海鸿旺电子科技有限公司 | Anti-counterfeiting method for import and export commodities |
CN105469132A (en) * | 2016-01-13 | 2016-04-06 | 上海众烁信息科技有限公司 | Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method |
CN106209877A (en) * | 2016-07-19 | 2016-12-07 | 井创(北京)科技有限公司 | A kind of be certification core with block chain backstage false-proof authentication system |
CN106203573A (en) * | 2016-07-26 | 2016-12-07 | 闫河 | Antifalsification label and Antiforge system |
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
CN106709734A (en) * | 2016-12-21 | 2017-05-24 | 毛巨林 | Multiple-two-dimensional code tracing method based on digital identity and system thereof |
CN107067272A (en) * | 2017-04-18 | 2017-08-18 | 北京首溯科技有限公司 | A kind of efficient retroactive method of agricultural byproducts intermediate links |
CN107169547A (en) * | 2017-04-13 | 2017-09-15 | 华南理工大学 | A kind of double-deck double exposure photoresponse Quick Response Code and preparation method thereof |
CN107220836A (en) * | 2017-05-31 | 2017-09-29 | 无锡井通网络科技有限公司 | A kind of block chain logistics based on Quick Response Code is traced to the source tracking method for anti-counterfeit |
-
2017
- 2017-10-11 CN CN201710943650.3A patent/CN107705134A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1645400A (en) * | 2005-01-28 | 2005-07-27 | 高治中 | Dynamic combined code inquiring technology and use for anti-fogery and commodity interflow monitor of goods |
CN102999771A (en) * | 2011-09-19 | 2013-03-27 | 周锡卫 | Commodity anti-counterfeiting code construction and verification method |
CN104070869A (en) * | 2013-12-27 | 2014-10-01 | 湖北联合天诚防伪技术股份有限公司 | Manufacturing method for double-layer holographic anti-counterfeiting film |
CN204713597U (en) * | 2015-05-27 | 2015-10-21 | 信码互通(北京)科技有限公司 | Be provided with the box type packages container of Quick Response Code |
CN204965916U (en) * | 2015-09-25 | 2016-01-13 | 成都通通印防伪票证标签有限公司 | Double -deck two -dimensional code antifalsification label |
CN105469268A (en) * | 2015-12-19 | 2016-04-06 | 北海鸿旺电子科技有限公司 | Anti-counterfeiting method for import and export commodities |
CN105469132A (en) * | 2016-01-13 | 2016-04-06 | 上海众烁信息科技有限公司 | Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method |
CN106209877A (en) * | 2016-07-19 | 2016-12-07 | 井创(北京)科技有限公司 | A kind of be certification core with block chain backstage false-proof authentication system |
CN106203573A (en) * | 2016-07-26 | 2016-12-07 | 闫河 | Antifalsification label and Antiforge system |
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
CN106709734A (en) * | 2016-12-21 | 2017-05-24 | 毛巨林 | Multiple-two-dimensional code tracing method based on digital identity and system thereof |
CN107169547A (en) * | 2017-04-13 | 2017-09-15 | 华南理工大学 | A kind of double-deck double exposure photoresponse Quick Response Code and preparation method thereof |
CN107067272A (en) * | 2017-04-18 | 2017-08-18 | 北京首溯科技有限公司 | A kind of efficient retroactive method of agricultural byproducts intermediate links |
CN107220836A (en) * | 2017-05-31 | 2017-09-29 | 无锡井通网络科技有限公司 | A kind of block chain logistics based on Quick Response Code is traced to the source tracking method for anti-counterfeit |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108924232A (en) * | 2018-07-11 | 2018-11-30 | 佛山伊苏巨森科技有限公司 | A kind of distributed block chain network system |
WO2020063185A1 (en) * | 2018-09-30 | 2020-04-02 | 阿里巴巴集团控股有限公司 | Blockchain-based anti-counterfeiting method and apparatus, and electronic device |
US11562375B2 (en) | 2018-09-30 | 2023-01-24 | Advanced New Technologies Co., Ltd. | Blockchain-based data verification method, apparatus, and electronic device |
CN111127037A (en) * | 2019-12-19 | 2020-05-08 | 盐城工学院 | Commodity universal anti-counterfeiting method based on block chain account system |
CN111127037B (en) * | 2019-12-19 | 2024-01-05 | 盐城工学院 | Commodity universal anti-counterfeiting method based on blockchain account system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210049696A1 (en) | Trading platform networks for rarities | |
Quelch | Global brands: Taking stock | |
CN108985926A (en) | Output system of object resume identification code | |
CN107705134A (en) | Anti-fake network system based on block chain | |
CN101461235A (en) | Dynamic replacement and insertion of cinematic stage props in program content | |
CN104852892B (en) | A kind of autonomous login method of novel Internet of Things web station system | |
CN101248664A (en) | System for electric tag broadcasting and method thereof | |
US20220358186A1 (en) | Generating and issuing secondary digital assets based on ownership of primary assets | |
WO2001007985A3 (en) | Method and system for selling and purchasing media advertising over a distributed communication network | |
CN108537562A (en) | Bind the bar code anti-counterfeit method and system in commodity ownership transfer path | |
AU2020100312A4 (en) | A blockchain system for holding the provenance of valuable items including artworks and identifying original art and artists. The system includes Unique Identifiers using ARTIFICIAL INTELLIGENCE and a proprietary blockchain trading platform. | |
CN108985431A (en) | A kind of method of antifalsification label and its commodity genuine piece of Testing and appraisal registered trademark | |
Edensor et al. | Extending networks and mediating brands: stallholder strategies in a Mauritian market | |
Ratna | Territorial Marketing And Collective Branding To Support Regional Development: A Study Of SMEs Batik Industry | |
AU2019100182A4 (en) | A system for upholding the provenance of a particular artwork and identifying the original arts or artists. The system includes a unique identifier and a blockchain trading platform. | |
Church et al. | The emergence of modern marketing | |
Keane et al. | Worlds apart? Finance and investment in creative industries in the People’s Republic of China and Latin America | |
WO2008154459A2 (en) | Retail derivative financial products | |
Grant et al. | The limitations of internationalisation in e-commerce | |
Berta | Constructing, commodifying, and consuming invented ethnic provenance among Romanian Roma | |
Przyswa | Counterfeiting in the wine and spirits market | |
TWI234122B (en) | System, method and computer program product for targeted update of information based on the electronic content of a laser-centric medium | |
Elasrag | Blockchain for Halal industry | |
Djeflat | High-technology buying in low-technology environment: the issues in new market economies | |
US20220189160A1 (en) | Augmented, virtual and mixed-reality content selection & display for real estate |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20190904 Address after: 401147 Digital Economic Development Exhibition Center No. 1, Middle Section of Huangshan Avenue, Liangjiang New District, Yubei District, Chongqing with A19-04-0050 Applicant after: Prophecy Machine (Chongqing) Technology Co., Ltd. Address before: 400024 No. 14-2, 61 Dongshengmen Road, Jiangbei District, Chongqing Applicant before: Chongqing printing chain Technology Co., Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180216 |