CN109360002A - A kind of method for anti-counterfeit and device of product - Google Patents
A kind of method for anti-counterfeit and device of product Download PDFInfo
- Publication number
- CN109360002A CN109360002A CN201811109921.6A CN201811109921A CN109360002A CN 109360002 A CN109360002 A CN 109360002A CN 201811109921 A CN201811109921 A CN 201811109921A CN 109360002 A CN109360002 A CN 109360002A
- Authority
- CN
- China
- Prior art keywords
- information
- product
- verification information
- geographical location
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000012795 verification Methods 0.000 claims abstract description 195
- 230000029058 respiratory gaseous exchange Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 description 10
- 238000012019 product validation Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 5
- 238000004806 packaging method and process Methods 0.000 description 5
- 230000004069 differentiation Effects 0.000 description 4
- 230000006978 adaptation Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 235000013399 edible fruits Nutrition 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000002411 adverse Effects 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0029—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
This application provides a kind of method for anti-counterfeit of product and devices, method includes: to receive terminal when receiving authentication instruction, the product information read from target RFID tag, product information include: identity and the first verification information corresponding with identity;Judge in memory space with the presence or absence of the target information to match with identity and the first verification information;If it does not exist, then authentication is sent to terminal do not pass through information;If it exists, then the second verification information is generated, and the verification information in target information is replaced with into the second verification information, the second verification information is different from the first verification information;Authentication is sent by information and the second verification information, so that the first verification information in the target RFID tag is replaced with the second verification information by terminal to terminal.In this application, the identity of fake product can be accurately verified in the above manner.
Description
Technical field
This application involves qualified products technical field, in particular to the method for anti-counterfeit and device of a kind of product.
Background technique
The presence of a large amount of counterfeit and shoddy goods, the serious interests for affecting certified products business and consumer.In order to guarantee just
The interests of product business and consumer, various products anti-counterfeiting technology (e.g., line holographic projections 3D anti-counterfeiting technology or utilization product identification code
With the anti-counterfeiting technology of quiet code) it comes into being.
But there is poor reliability in current products antifake technique, e.g., line holographic projections 3D anti-counterfeiting technology can be light
Easy imitation, or, quiet code is easy to be replicated and reuse, when causing to verify the identity of fake product, the standard of verification result
True property is low.
Summary of the invention
In order to solve the above technical problems, the embodiment of the present application provides the method for anti-counterfeit and device of a kind of product, to reach quasi-
The purpose of the identity of fake product really is verified, technical solution is as follows:
A kind of method for anti-counterfeit of product, comprising:
Terminal is received when receiving authentication instruction, the product information read from target RFID tag is described
Product information includes: identity and the first verification information corresponding with the identity;
Judge to believe in memory space with the presence or absence of the target to match with the identity and first verification information
Breath;
If it does not exist, then authentication is sent to the terminal do not pass through information;
If it exists, then the second verification information is generated, and the verification information in the target information is replaced with described second
Verification information, second verification information are different from first verification information;
Authentication is sent by information and second verification information to the terminal, so that the terminal is by the mesh
The first verification information in mark RFID tag replaces with second verification information.
Preferably, the method also includes:
The terminal is received when receiving authentication instruction, the product geographical location information navigated to;
There is the mesh to match with the identity and first verification information in judging the memory space
After mark information, further includes:
Judge geographical with the presence or absence of the product sale to match with the product geographical location information in the memory space
Location information;
If it exists, then the second verification information of the generation is executed, and the verification information in the target information is replaced with
The step of second verification information;
If it does not exist, then it executes to the terminal and sends the step of authentication does not pass through information, or, issuing the target
The prompt information that the sale locations and preset sale locations of the affiliated product of RFID tag are not inconsistent.
Preferably, the product information further include: product corresponding with the identity sells geographical location information;
The method also includes:
The terminal is received when receiving authentication instruction, the product geographical location information navigated to;
There is the mesh to match with the identity and first verification information in judging the memory space
After mark information, further includes:
Judge whether the product sale geographical location information and the product geographical location information are consistent;
If consistent, the second verification information of the generation is executed, and the verification information in the target information is replaced with
The step of second verification information;
If inconsistent, execute to the terminal and send the step of authentication does not pass through information, or, issuing the target
The prompt information that the sale locations and preset sale locations of the affiliated product of RFID tag are not inconsistent.
Preferably, if product sale geographical location information is consistent with the product geographical location information, the method
Further include:
Count the number that authentication is carried out to the corresponding product of product sale geographical location information;
Obtain the quantity that the corresponding retailer of the product sale geographical location information buys product;
The number for comparing the authentication counted on and the retailer got buy the quantity of product, obtain comparing knot
Fruit, with the efficiency analysis for carrying out the marketing and sale.
Preferably, the memory space is the block in block chain.
A kind of false proof device of product, comprising:
First receiving module is read from target RFID tag for receiving terminal when receiving authentication instruction
The product information arrived, the product information include: identity and the first verification information corresponding with the identity;
First judgment module is believed in memory space with the presence or absence of with the identity and first verifying for judging
The matched target information of manner of breathing then executes the first sending module, and if it exists, then execute replacement module if it does not exist;
First sending module does not pass through information for sending authentication to the terminal;
The replacement module for generating the second verification information, and the verification information in the target information is replaced with
Second verification information, second verification information are different from first verification information;
Second sending module passes through information and second verification information for sending authentication to the terminal, with
Make the terminal that the first verification information in the target RFID tag is replaced with second verification information.
Preferably, described device further include:
Second receiving module, for receiving the terminal when receiving authentication instruction, the product navigated to
Geographical location information;
Second judgment module is tested for existing in judging the memory space with the identity and described first
After the target information that card information matches, judge to whether there is and the product geographical location information phase in the memory space
Matched product sells geographical location information, and if it exists, then executes the replacement module, if it does not exist, then executes described first
Sending module, or, executing the first cue module;
First cue module, for issuing the sale locations of the affiliated product of the target RFID tag and presetting
The prompt information that is not inconsistent of sale locations.
Preferably, the product information further include: product corresponding with the identity sells geographical location information;
Described device further include:
Third receiving module, for receiving the terminal when receiving authentication instruction, the product navigated to
Geographical location information;
Third judgment module is tested for existing in judging the memory space with the identity and described first
After the target information that card information matches, the product sale geographical location information and the product geographical location information are judged
It is whether consistent, if unanimously, executing the replacement module, if inconsistent, first sending module is executed, or, executing the
Two cue modules;
Second cue module, for issuing the sale locations of the affiliated product of the target RFID tag and presetting
The prompt information that is not inconsistent of sale locations.
Preferably, if product sale geographical location information is consistent with the product geographical location information, described device
Further include:
Statistical module, for counting time for carrying out authentication to the corresponding product of product sale geographical location information
Number;
Module is obtained, the quantity of product is bought for obtaining the corresponding retailer of the product sale geographical location information;
Comparison module, number and the retailer got for comparing the authentication counted on buy the number of product
Amount, obtains comparison result, with the efficiency analysis for carrying out the marketing and sale.
Preferably, the memory space is the block in block chain.
Compared with prior art, the application has the beneficial effect that
In this application, using identity and the corresponding verification information of identity as the anti-counterfeiting information of product, and
During Product Validation, the verification information in space and the verification information in RFID tag are dynamically updated storage, guarantees product
Anti-counterfeiting information can dynamically update.On this basis, since the product information in the RFID tag of fake product is from certified products
The same fix information copied in the RFID tag of product, dynamic has occurred more in corresponding verification information in memory space
After new, it can match in memory space less than the target information to match with identity in fake product and verification information, from
And accurately verify the identity of fake product.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for
For those of ordinary skill in the art, without any creative labor, it can also be obtained according to these attached drawings
His attached drawing.
Fig. 1 is a kind of flow chart of the method for anti-counterfeit of product provided by the present application;
Fig. 2 is another flow chart of the method for anti-counterfeit of product provided by the present application;
Fig. 3 is another flow chart of the method for anti-counterfeit of product provided by the present application;
Fig. 4 is another flow chart of the method for anti-counterfeit of product provided by the present application;
Fig. 5 is another flow chart of the method for anti-counterfeit of product provided by the present application;
Fig. 6 is a kind of logical construction schematic diagram of the false proof device of product provided by the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall in the protection scope of this application.
The embodiment of the present application discloses a kind of method for anti-counterfeit of product, comprising: receives terminal and refers to receiving authentication
When enabling, the product information read from target RFID tag, product information includes: identity and corresponding with identity
First verification information;Judge in memory space with the presence or absence of the target information to match with identity and the first verification information;
If it exists, then the second verification information is generated, and the verification information in target information is replaced with into the second verification information, the second verifying
Information is different from the first verification information;Authentication is sent by information and the second verification information to terminal, so that terminal is by mesh
The first verification information in mark RFID tag replaces with the second verification information;If it does not exist, then authentication is sent not to terminal
Pass through information.In this application, the identity of fake product can accurately be verified.
Next the method for anti-counterfeit of product disclosed in the embodiment of the present application is introduced, referring to Figure 1, may include:
Step S11, terminal is received when receiving authentication instruction, the product letter read from target RFID tag
Breath.
Respective product information is stored in the RFID tag of each product respectively.
Before user buys product, when needing to verify the true and false of product, authentication process itself can be triggered, is sent out to terminal
Authentication is sent to instruct, terminal scans target RFID tag, read from target RFID tag when receiving authentication instruction
Product information is taken, and the product information read is sent to background server.
Background server then can receive terminal when receiving authentication instruction, read from target RFID tag
Product information.
In the present embodiment, the product information may include but be not limited to: identity and with the identity pair
The first verification information answered.
The identity of identity product for identification.The identity of each product is unique, and the body of each product
Part mark is different.
It should be noted that the identity of each product is randomly generated and distributes, adulterator's decoding can be increased
Difficulty, reduce the risk that the identity of product is forged.
Also, it in an rfid tag due to identity storage, rather than is stored directly in product packaging, puppet can be increased
The person of making replicates the difficulty of identity, further decreases the risk that the identity of product is forged.
The first verification information corresponding with the identity, can generate according to identity, e.g., to identity into
Row transformation, transformed information is as the first verification information, or, a random information is added after identity, as first
Verification information.
Certainly, the first verification information corresponding with the identity, can not also generate according to identity, e.g., with
Machine generates a string of contents information unrelated with identity, as the first verification information.
Target RFID tag can be but be not limited to: NFC (Near Field Communication, near radio
Mechanics of communication) label.
Step S12, judging whether there is in memory space matches with the identity and first verification information
Target information.
If it exists, S13 is thened follow the steps;If it does not exist, S15 is thened follow the steps.
It is corresponding with respective product information is stored in the RFID tag of product respectively, it is stored in memory space each
The product information of product.
Step S13, the second verification information is generated, and the verification information in the target information is replaced with described second and is tested
Information is demonstrate,proved, second verification information is different from first verification information.
Judge to exist in memory space in step S12 and match with the identity and first verification information
After target information, the second verification information is generated, and the verification information in the target information is replaced with into second verifying
Information completes the update of the corresponding verification information of identity described in memory space.
After the verification information in the target information is replaced with second verification information, it can be sent to terminal
The information that verification information is updated successfully.
Step S14, authentication is sent by information and second verification information, so that the terminal to the terminal
The first verification information in the target RFID tag is replaced with into second verification information.
The first verification information in the target RFID tag is replaced with second verification information by the terminal, can be with
Guarantee to pass through authentication when carrying out authentication to product next time.
It, can be with after the first verification information in the target RFID tag is replaced with second verification information by terminal
The information that verification information is updated successfully in RFID tag is sent to background server.
Step S15, authentication is sent to the terminal do not pass through information.
The same certified products product RFID tag by batch duplicating, the RFID of multiple fake products as same batch is marked
In the case where label, when user sends authentication instruction to terminal for some fake product with batch for the first time, backstage
Server can receive the product information that terminal is read from target RFID tag, and judge that memory space whether there is and body
The target information that part mark and the first verification information match, if the unauthenticated true and false of certified products product, judging result are at this time
In the presence of, the second verification information can be generated, and the verification information in the target information is replaced with into second verification information, and
Authentication, which is sent, to the terminal passes through information and second verification information.And judging that memory space whether there is and body
When the target information that part mark and the first verification information match, if certified products product has been verified the true and false, due in memory space
The first verification information have been replaced with the second verification information, therefore match in memory space and tested less than with identity and first
The target information that card information matches can send the unsanctioned message of authentication to terminal, and identifying product is fake product.
From the foregoing, it will be observed that after the fake product or certified products product that are verified at first are verified the true and false, in memory space
Verification information has turned into the second verification information, if user instructs for other fake products to terminal transmission authentication at this time
When, since the product information in the RFID tag of each fake product is still identity and the first verification information, sentencing
When disconnected memory space whether there is the target information to match with identity and the first verification information, obtained judging result is
It is not present, so that sending authentication to terminal does not pass through information, accurately verifies the identity of fake product.
Therefore, background server can be in the case where the same RFID tag be forged by batch duplicating, accurately
Other all fake products in addition to identifying all fake products or the fake product being verified except first, can seriously damage
The economic benefit of evil adulterator, to preferably restrict the forgery behavior of adulterator.
In this application, using identity and the corresponding verification information of identity as the anti-counterfeiting information of product, and
During Product Validation, the verification information in space and the verification information in RFID tag are dynamically updated storage, guarantees product
Anti-counterfeiting information can dynamically update.On this basis, since the product information in the RFID tag of fake product is from certified products
The same fix information copied in the RFID tag of product, dynamic has occurred more in corresponding verification information in memory space
After new, it can match in memory space less than the target information to match with identity in fake product and verification information, from
And accurately verify the identity of fake product.
In the application, target RFID tag, which can be firmly attached in the packaging of certified products product, (e.g., to be adhered to by glue-line
In the packaging of certified products product), guarantee when removing target RFID tag in the packaging from certified products product, in target RFID tag
Circuit can damage, so that the RFID tag in certified products product packaging be avoided directly to be recycled, increase the forgery of adulterator
Cost reduces and forges risk, achievees the purpose that from side anti-fake.
In another embodiment of the application, the method for anti-counterfeit of another product is provided, Fig. 2 is referred to, can wrap
It includes:
Step S21, terminal is received when receiving authentication instruction, the product letter read from target RFID tag
Breath.
The product information includes: identity and the first verification information corresponding with the identity.
Step S21 is identical as the step S11 in previous embodiment, and the detailed process of step S21 may refer to step S11's
Related introduction, details are not described herein.
Step S22, the terminal is received when receiving authentication instruction, the product geographical location letter navigated to
Breath.
Terminal can position the geographical location for being verified product, and will determine when receiving authentication instruction
Position to product geographical location information be sent to background server.What what background server then received that the terminal sends navigated to
Product geographical location information.
Step S23, judging whether there is in memory space matches with the identity and first verification information
Target information.
If it exists, S24 is thened follow the steps;If it does not exist, S27 is thened follow the steps.
Step S23 is identical as the step S12 in previous embodiment, and the detailed process of step S23 may refer to step S12's
Related introduction, details are not described herein.
Step S24, judge in the memory space with the presence or absence of the product to match with the product geographical location information
Sell geographical location information.
In the present embodiment, the sale geographical location information of each product can be stored in advance.Selling geographical location information can
To understand are as follows: sell the geographical location information in the place of product.
If it exists, S25 is thened follow the steps;If it does not exist, S27 is thened follow the steps.
Step S25, the second verification information is generated, and the verification information in the target information is replaced with described second and is tested
Demonstrate,prove information, second verification information and the first verification information difference
Step S26, authentication is sent by information and second verification information, so that the terminal to the terminal
The first verification information in the target RFID tag is replaced with into second verification information.
Step S27, authentication is sent to the terminal do not pass through information.
Step S25-S27 is identical as the step S13-S15 in previous embodiment, and the detailed process of step S25-S27 can be with
Referring to the related introduction of step S13-S15, details are not described herein.
In the present embodiment, using identity and the corresponding verification information of identity as the anti-counterfeiting information of product, and
During Product Validation, the verification information in space and the verification information in RFID tag are dynamically updated storage, guarantees product
Anti-counterfeiting information can dynamically update.On this basis, since the product information in the RFID tag of fake product is from certified products
The same fix information copied in the RFID tag of product, dynamic has occurred more in corresponding verification information in memory space
After new, it can match in memory space less than the target information to match with identity in fake product and verification information, from
And accurately verify the identity of fake product.
Also, in the case where the authentication of fake product is carried out before the authentication of certified products product, sentencing
After there is the target information to match with the identity and first verification information in disconnected memory space out, continue to judge
Geographical location information is sold with the presence or absence of the product to match with the product geographical location information in the memory space, it can be with
Further increase the accuracy of fake product authentication.Such as, in rare cases, the geographical location letter of fake product is sold
Breath with the geographical location information of certified products product be it is identical, in most cases, sell fake product geographical location information and
The geographical location information of certified products product is different.In the different situation of geographic location information, although fake product exists
Can be by authentication before certified products Product Validation, but there is no believe with the geographical location of fake product in memory space
When ceasing matched sale geographical location information, the identity of fake product still can be accurately verified.
Meanwhile there is the mesh to match with the identity and first verification information in judging memory space
After marking information, continue to judge to sell in the memory space with the presence or absence of the product to match with the product geographical location information
Geographical location information gives the unfavorable shadow of certified products product bring when can reduce the verifying fake product before verifying certified products product
It rings.
In another embodiment of the application, the method for anti-counterfeit of another product is provided, Fig. 3 is referred to, can wrap
It includes:
Step S31, terminal is received when receiving authentication instruction, the product letter read from target RFID tag
Breath.
The product information includes: identity and the first verification information corresponding with the identity.
Step S32, the terminal is received when receiving authentication instruction, the product geographical location letter navigated to
Breath.
Terminal can position the geographical location for being verified product, and will determine when receiving authentication instruction
Position to product geographical location information be sent to background server.What what background server then received that the terminal sends navigated to
Product geographical location information.
Step S33, judging whether there is in memory space matches with the identity and first verification information
Target information.
If it exists, S34 is thened follow the steps;If it does not exist, S37 is thened follow the steps.
Step S34, judge in the memory space with the presence or absence of the product to match with the product geographical location information
Sell geographical location information.
In the present embodiment, the sale geographical location information of each product can be stored in advance.Selling geographical location information can
To understand are as follows: sell the geographical location information in the place of product.
If it exists, S35 is thened follow the steps;If it does not exist, S38 is thened follow the steps.
Step S35, the second verification information is generated, and the verification information in the target information is replaced with described second and is tested
Demonstrate,prove information, second verification information and the first verification information difference
Step S36, authentication is sent by information and second verification information, so that the terminal to the terminal
The first verification information in the target RFID tag is replaced with into second verification information.
Step S37, authentication is sent to the terminal do not pass through information.
Step S31-S37 is identical as the step S21-S27 in previous embodiment, and the detailed process of step S31-S37 can be with
Referring to the related introduction of step S21-S27, details are not described herein.
Step S38, the sale locations and preset sale locations for issuing the affiliated product of target RFID tag are not
The prompt information of symbol.
In the present embodiment, using identity and the corresponding verification information of identity as the anti-counterfeiting information of product, and
During Product Validation, the verification information in space and the verification information in RFID tag are dynamically updated storage, guarantees product
Anti-counterfeiting information can dynamically update.On this basis, since the product information in the RFID tag of fake product is from certified products
The same fix information copied in the RFID tag of product, dynamic has occurred more in corresponding verification information in memory space
After new, it can match in memory space less than the target information to match with identity in fake product and verification information, from
And accurately verify the identity of fake product.
Also, what the sale locations and preset sale locations for issuing the affiliated product of target RFID tag were not inconsistent
Prompt information can prompt manufacturer to verify whether certified products product is sold in designated sale place, and manufacturer is helped to realize
Following target:
Enhance product distribution: sale locations and preset sale position using the affiliated product of the target RFID tag
Set the prompt information not being inconsistent, manufacturer can analyze the sales range of product, judge product whether export trade to setting geographical model
Except enclosing, its network for distributed sales is significantly improved, certain areas market especially significant in area differentiation, and being difficult to enter and control
In.Since a large amount of consumer goods are by wholesale distributor sales, and wholesale retail trader is usually in designated area or particular retailer
It manages, therefore manufacturer must be strictly controlled retail trader, to improve the efficiency of network for distributed sales to greatest extent.
Prevent arbitrage: area differentiation promotes the producer to establish region " price discrimination " (price discrimination),
Or adaptation to local conditions price.This may result in certain retail traders by buying product in the area compared with low price, and at other
Area sells at a premium prices them, to destroy market order, to remove the interests of the producer He other sellers.This
In application, by judging in the memory space with the presence or absence of the product market to match with the product geographical location information
Reason location information can be convenient tracking and close the channel for being not intended to arbitrage.
Preferably control the business scope of dealer: since the profit that manufacturer obtains in selling retailer directly to households is higher than
The profit obtained in the distribution channel of retail trader.Therefore, consider for interests, manufacturer establishes and retailer in a region
Between direct business relation after, can by judge in the memory space whether there is and the product geographical location information phase
The product sale geographical location information matched, protects this direct business relation, prevents the dealer of close region from snatching away business.
In another embodiment of the application, the method for anti-counterfeit of another product is provided, Fig. 4 is referred to, it can be with
Include:
Step S41, terminal is received when receiving authentication instruction, the product letter read from target RFID tag
Breath.
The product information may include: identity and the first verification information corresponding with the identity and with institute
State the corresponding product sale geographical location information of identity.
Step S42, the terminal is received when receiving authentication instruction, the product geographical location letter navigated to
Breath.
Terminal can position the geographical location for being verified product, and will determine when receiving authentication instruction
Position to product geographical location information be sent to background server.What what background server then received that the terminal sends navigated to
Product geographical location information.
Step S43, judging whether there is in memory space matches with the identity and first verification information
Target information.
If it exists, S44 is thened follow the steps;If it does not exist, S47 is thened follow the steps.
Step S44, judge whether the product sale geographical location information and the product geographical location information are consistent.
If consistent, S45 is thened follow the steps;If inconsistent, S47 is thened follow the steps.
In the present embodiment, the corresponding product sale geographical location information of identity can not be stored in advance in memory space,
The corresponding product of identity is only stored in the RFID tag of product and sells geographical location information, is saved memory space, is subtracted
The maintenance cost of memory space is lacked.
Step S45, the second verification information is generated, and the verification information in the target information is replaced with described second and is tested
Information is demonstrate,proved, second verification information is different from first verification information.
Step S44 judge product sale geographical location information it is consistent with the product geographical location information it
Afterwards, the second verification information is generated, and the verification information in the target information is replaced with into second verification information, completes to deposit
Store up the update of the corresponding verification information of identity described in space.
Step S46, authentication is sent by information and second verification information, so that the terminal to the terminal
The first verification information in the target RFID tag is replaced with into second verification information.
Step S47, authentication is sent to the terminal do not pass through information.
In the present embodiment, using identity and the corresponding verification information of identity as the anti-counterfeiting information of product, and
During Product Validation, the verification information in space and the verification information in RFID tag are dynamically updated storage, guarantees product
Anti-counterfeiting information can dynamically update.On this basis, since the product information in the RFID tag of fake product is from certified products
The same fix information copied in the RFID tag of product, dynamic has occurred more in corresponding verification information in memory space
After new, it can match in memory space less than the target information to match with identity in fake product and verification information, from
And accurately verify the identity of fake product.
Also, in the case where the authentication of fake product is carried out before the authentication of certified products product, sentencing
After there is the target information to match with the identity and first verification information in disconnected memory space out, continue to judge
Whether the product sale geographical location information and the product geographical location information are consistent, can be further improved fake product
The accuracy of authentication.Such as, in rare cases, the geographical location information of fake product and the geography of certified products product are sold
Location information be it is identical, in most cases, sell the geographical location information of fake product and the geographical location of certified products product
Information is different.In the different situation of geographic location information, although fake product can before certified products Product Validation
To pass through authentication, but judge that the product sale geographical location information and the product geographical location information are inconsistent
When, it still can accurately verify the identity of fake product.
Meanwhile there is the mesh to match with the identity and first verification information in judging memory space
After marking information, continue to judge whether the product sale geographical location information and the product geographical location information are consistent, it can be with
When reducing the verifying fake product before verifying certified products product, adversely affected to certified products product bring.
In another embodiment of the application, the method for anti-counterfeit of another product is provided, Fig. 5 is referred to, it can be with
Include:
Step S51, terminal is received when receiving authentication instruction, the product letter read from target RFID tag
Breath.
The product information may include: identity and the first verification information corresponding with the identity and with institute
State the corresponding product sale geographical location information of identity.
Step S52, the terminal is received when receiving authentication instruction, the product geographical location letter navigated to
Breath.
Step S53, judging whether there is in memory space matches with the identity and first verification information
Target information.
If it exists, S54 is thened follow the steps;If it does not exist, S57 is thened follow the steps.
Step S54, judge whether the product sale geographical location information and the product geographical location information are consistent.
If consistent, S55 is thened follow the steps;If inconsistent, S58 is thened follow the steps.
Step S55, the second verification information is generated, and the verification information in the target information is replaced with described second and is tested
Information is demonstrate,proved, second verification information is different from first verification information.
Step S56, authentication is sent by information and second verification information, so that the terminal to the terminal
The first verification information in the target RFID tag is replaced with into second verification information.
Step S57, authentication is sent to the terminal do not pass through information.
Step S51-S57 is identical as the step S41-S47 in previous embodiment, and the detailed process of step S51-S57 can be with
Referring to the related introduction of step S41-S47, details are not described herein.
Step S58, the sale locations and preset sale locations for issuing the affiliated product of target RFID tag are not
The prompt information of symbol.
In the present embodiment, using identity and the corresponding verification information of identity as the anti-counterfeiting information of product, and
During Product Validation, the verification information in space and the verification information in RFID tag are dynamically updated storage, guarantees product
Anti-counterfeiting information can dynamically update.On this basis, since the product information in the RFID tag of fake product is from certified products
The same fix information copied in the RFID tag of product, dynamic has occurred more in corresponding verification information in memory space
After new, it can match in memory space less than the target information to match with identity in fake product and verification information, from
And accurately verify the identity of fake product.
Also, what the sale locations and preset sale locations for issuing the affiliated product of target RFID tag were not inconsistent
Prompt information can prompt manufacturer to verify whether certified products product is sold in designated sale place, and manufacturer is helped to realize
Following target:
Enhance product distribution: sale locations and preset sale position using the affiliated product of the target RFID tag
Set the prompt information not being inconsistent, manufacturer can analyze the sales range of product, judge product whether export trade to setting geographical model
Except enclosing, its network for distributed sales is significantly improved, certain areas market especially significant in area differentiation, and being difficult to enter and control
In.Since a large amount of consumer goods are by wholesale distributor sales, and wholesale retail trader is usually in designated area or particular retailer
It manages, therefore manufacturer must be strictly controlled retail trader, to improve the efficiency of network for distributed sales to greatest extent.
Prevent arbitrage: area differentiation promotes the producer to establish region " price discrimination " (price discrimination),
Or adaptation to local conditions price.This may result in certain retail traders by buying product in the area compared with low price, and at other
Area sells at a premium prices them, to destroy market order, to remove the interests of the producer He other sellers.This
In application, by judging in the memory space with the presence or absence of the product market to match with the product geographical location information
Reason location information can be convenient tracking and close the channel for being not intended to arbitrage.
Preferably control the business scope of dealer: since the profit that manufacturer obtains in selling retailer directly to households is higher than
The profit obtained in the distribution channel of retail trader.Therefore, consider for interests, manufacturer establishes and retailer in a region
Between direct business relation after, can by judge in the memory space whether there is and the product geographical location information phase
The product sale geographical location information matched, protects this direct business relation, prevents the dealer of close region from snatching away business.
In another embodiment of the application, the method for anti-counterfeit of the product shown in Fig. 4 or Fig. 5 is extended, is extended
Content may include:
If the product sale geographical location information is consistent with the product geographical location information, following steps are executed:
A11, statistics carry out the number of authentication to the corresponding product of product sale geographical location information.
Count the number that authentication is carried out to the corresponding product of product sale geographical location information, it is possible to understand that
Are as follows: count the number that authentication is carried out to the product in the corresponding selling spot of product sale geographical location information.
A12, the quantity that the corresponding retailer of the product sale geographical location information buys product is obtained.
The product sells the corresponding retailer of geographical location information and buys the quantity of product it is to be understood that the product
The retailer for selling the corresponding selling spot of geographical location information buys the quantity of product from manufacturer.
A13, the number for comparing the authentication counted on buy the quantity of product with the retailer got, are compared
As a result, with the efficiency analysis for carrying out the marketing and sale.
The number for comparing the authentication counted on and the retailer got buy the quantity of product, obtain comparing knot
Fruit, with the efficiency analysis for carrying out the marketing and sale, for example, adjusting manufacturer to retailer according to comparison result
The product quantity of supply.
In another embodiment in this application, the memory space in foregoing individual embodiments is introduced, specifically
It can be but be not limited to: the block in block chain.
Since block chain has HC hard copy, it can not be tampered and decentralization collaboration, common data are transparent visible
Characteristic, therefore any one single mechanism (e.g., manufacturer, retailer or dealer) can not all fake, and distort letter wantonly
Breath plays the role of everybody and supervises " audit ", guarantees that the information of the block storage in block chain is not easy to be tampered, can be further
Improve the accuracy of fake product authentication.Also, has the case where permission of access block chain in user (e.g., manufacturer)
Under, it is no longer necessary to data system is individually constructed, can guarantee that data utilization is simpler directly using data disclosed in block chain
Just.
Next the false proof device of product provided by the present application is introduced, the false proof device for the product being introduced below with
The false proof device of product described above can correspond to each other reference.
Fig. 6 is referred to, the false proof device of product includes: the first receiving module 11, the transmission mould of first judgment module 12, first
Block 13, replacement module 14 and the second sending module 15.
First receiving module 11 is read from target RFID tag for receiving terminal when receiving authentication instruction
The product information got, the product information include: identity and the first verification information corresponding with the identity.
First judgment module 12 is verified in memory space with the presence or absence of with the identity and described first for judging
The target information that information matches then executes the first sending module 13, and if it exists, then execute replacement module 14 if it does not exist.
First sending module 13 does not pass through information for sending authentication to the terminal.
The replacement module 14 is replaced for generating the second verification information, and by the verification information in the target information
For second verification information, second verification information is different from first verification information.
Second sending module 15 passes through information and second verification information for sending authentication to the terminal,
So that the first verification information in the target RFID tag is replaced with second verification information by the terminal.
In the present embodiment, the false proof device of the said goods can also include:
Second receiving module, for receiving the terminal when receiving authentication instruction, the product navigated to
Geographical location information.
Second judgment module is tested for existing in judging the memory space with the identity and described first
After the target information that card information matches, judge to whether there is and the product geographical location information phase in the memory space
Matched product sells geographical location information, and if it exists, then executes the replacement module 14, if it does not exist, then executes described the
One sending module 13, or, executing the first cue module.
First cue module, for issuing the sale locations of the affiliated product of the target RFID tag and presetting
The prompt information that is not inconsistent of sale locations.
In the present embodiment, the said goods information can also include: that product sale corresponding with the identity is geographical
Location information.
Correspondingly, the false proof device of the said goods can also include:
Third receiving module, for receiving the terminal when receiving authentication instruction, the product navigated to
Geographical location information.
Third judgment module is tested for existing in judging the memory space with the identity and described first
After the target information that card information matches, the product sale geographical location information and the product geographical location information are judged
It is whether consistent, if unanimously, executing the replacement module 14, if inconsistent, first sending module 13 is executed, or, holding
The second cue module of row.
Second cue module, for issuing the sale locations of the affiliated product of the target RFID tag and presetting
The prompt information that is not inconsistent of sale locations.
It is described if product sale geographical location information is consistent with the product geographical location information in the present embodiment
Device can also include:
Statistical module, for counting time for carrying out authentication to the corresponding product of product sale geographical location information
Number.
Module is obtained, the quantity of product is bought for obtaining the corresponding retailer of the product sale geographical location information.
Comparison module, number and the retailer got for comparing the authentication counted on buy the number of product
Amount, obtains comparison result, with the efficiency analysis for carrying out the marketing and sale.
In the present embodiment, above-mentioned memory space can be the block in block chain.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight
Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other.
For device class embodiment, since it is basically similar to the method embodiment, so being described relatively simple, related place ginseng
See the part explanation of embodiment of the method.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that
A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or
The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except there is also other identical elements in the process, method, article or apparatus that includes the element.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this
The function of each unit can be realized in the same or multiple software and or hardware when application.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can
It realizes by means of software and necessary general hardware platform.Based on this understanding, the technical solution essence of the application
On in other words the part that contributes to existing technology can be embodied in the form of software products, the computer software product
It can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are used so that a computer equipment
(can be personal computer, server or the network equipment etc.) executes the certain of each embodiment of the application or embodiment
Method described in part.
The method for anti-counterfeit and device of a kind of product provided herein are described in detail above, it is used herein
The principle and implementation of this application are described for specific case, and the above embodiments are only used to help understand
The present processes and its core concept;At the same time, for those skilled in the art is having according to the thought of the application
There will be changes in body embodiment and application range, in conclusion the content of the present specification should not be construed as to the application
Limitation.
Claims (10)
1. a kind of method for anti-counterfeit of product characterized by comprising
Terminal is received when receiving authentication instruction, the product information read from target RFID tag, the product
Information includes: identity and the first verification information corresponding with the identity;
Judge in memory space with the presence or absence of the target information to match with the identity and first verification information;
If it does not exist, then authentication is sent to the terminal do not pass through information;
If it exists, then the second verification information is generated, and the verification information in the target information is replaced with into second verifying
Information, second verification information are different from first verification information;
Authentication is sent by information and second verification information to the terminal, so that the terminal is by the target
The first verification information in RFID tag replaces with second verification information.
2. the method according to claim 1, wherein the method also includes:
The terminal is received when receiving authentication instruction, the product geographical location information navigated to;
There is the target to match with the identity and first verification information in judging the memory space to believe
After breath, further includes:
Judge to sell geographical location with the presence or absence of the product to match with the product geographical location information in the memory space
Information;
If it exists, then it executes the second verification information of the generation, and the verification information in the target information is replaced with described
The step of second verification information;
If it does not exist, then it executes to the terminal and sends the step of authentication does not pass through information, or, issuing the target RFID
The prompt information that the sale locations and preset sale locations of the affiliated product of label are not inconsistent.
3. the method according to claim 1, wherein the product information further include: with the identity pair
The product sale geographical location information answered;
The method also includes:
The terminal is received when receiving authentication instruction, the product geographical location information navigated to;
There is the target to match with the identity and first verification information in judging the memory space to believe
After breath, further includes:
Judge whether the product sale geographical location information and the product geographical location information are consistent;
If consistent, the second verification information of generations is executed, and described in the verification information in the target information replaced with
The step of second verification information;
If inconsistent, execute to the terminal and send the step of authentication does not pass through information, or, issuing the target RFID
The prompt information that the sale locations and preset sale locations of the affiliated product of label are not inconsistent.
4. according to the method described in claim 3, it is characterized in that, if product sale geographical location information and the product
Geographical location information is consistent, the method also includes:
Count the number that authentication is carried out to the corresponding product of product sale geographical location information;
Obtain the quantity that the corresponding retailer of the product sale geographical location information buys product;
The number for comparing the authentication counted on and the retailer got buy the quantity of product, obtain comparison result, with
For carrying out the efficiency analysis of the marketing and sale.
5. method according to any of claims 1-4, which is characterized in that the memory space is the area in block chain
Block.
6. a kind of false proof device of product characterized by comprising
First receiving module is read from target RFID tag for receiving terminal when receiving authentication instruction
Product information, the product information include: identity and the first verification information corresponding with the identity;
First judgment module whether there is and the identity and the first verification information phase in memory space for judging
Matched target information then executes the first sending module, and if it exists, then execute replacement module if it does not exist;
First sending module does not pass through information for sending authentication to the terminal;
The replacement module for generating the second verification information, and the verification information in the target information is replaced with described
Second verification information, second verification information are different from first verification information;
Second sending module, for sending authentication by information and second verification information, so that institute to the terminal
It states terminal and the first verification information in the target RFID tag is replaced with into second verification information.
7. device according to claim 6, which is characterized in that described device further include:
Second receiving module, for receiving the terminal when receiving authentication instruction, the product navigated to is geographical
Location information;
Second judgment module is believed for existing in judging the memory space with the identity and first verifying
After the matched target information of manner of breathing, judging whether there is in the memory space matches with the product geographical location information
Product sell geographical location information, and if it exists, then execute the replacement module, if it does not exist, then execute it is described first send
Module, or, executing the first cue module;
First cue module, for issue the affiliated product of the target RFID tag sale locations and preset pin
Sell the prompt information that position is not inconsistent.
8. device according to claim 6, which is characterized in that the product information further include: with the identity pair
The product sale geographical location information answered;
Described device further include:
Third receiving module, for receiving the terminal when receiving authentication instruction, the product navigated to is geographical
Location information;
Third judgment module is believed for existing in judging the memory space with the identity and first verifying
After the matched target information of manner of breathing, judge whether are product sale geographical location information and the product geographical location information
Unanimously, if unanimously, executing the replacement module, if inconsistent, first sending module is executed, is mentioned or, executing second
Show module;
Second cue module, for issue the affiliated product of the target RFID tag sale locations and preset pin
Sell the prompt information that position is not inconsistent.
9. device according to claim 8, which is characterized in that if product sale geographical location information and the product
Geographical location information is consistent, described device further include:
Statistical module, for counting the number for carrying out authentication to the corresponding product of product sale geographical location information;
Module is obtained, the quantity of product is bought for obtaining the corresponding retailer of the product sale geographical location information;
Comparison module, number and the retailer got for comparing the authentication counted on are bought the quantity of product, are obtained
To comparison result, with the efficiency analysis for carrying out the marketing and sale.
10. according to device described in claim 6-9 any one, which is characterized in that the memory space is in block chain
Block.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811109921.6A CN109360002A (en) | 2018-09-21 | 2018-09-21 | A kind of method for anti-counterfeit and device of product |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811109921.6A CN109360002A (en) | 2018-09-21 | 2018-09-21 | A kind of method for anti-counterfeit and device of product |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109360002A true CN109360002A (en) | 2019-02-19 |
Family
ID=65351332
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811109921.6A Pending CN109360002A (en) | 2018-09-21 | 2018-09-21 | A kind of method for anti-counterfeit and device of product |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109360002A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110232574A (en) * | 2019-05-07 | 2019-09-13 | 中国平安财产保险股份有限公司 | Product Validation method, apparatus, equipment and storage medium based on block chain |
CN110717566A (en) * | 2019-09-12 | 2020-01-21 | 跃明科技成都有限公司 | Anti-counterfeiting electronic code label, commodity with anti-counterfeiting electronic code and anti-counterfeiting verification method |
CN111865558A (en) * | 2019-05-19 | 2020-10-30 | 北京骑胜科技有限公司 | Service data processing method and device, electronic equipment and storage medium |
CN117875990A (en) * | 2024-03-13 | 2024-04-12 | 贵州省畜牧兽医研究所 | Honey tracing method and system based on blockchain |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101872460A (en) * | 2010-05-27 | 2010-10-27 | 上海华彩科技有限公司 | Treatment method of RFID online anti-counterfeiting system based on dynamic anti-counterfeiting mark |
US20130320079A1 (en) * | 2012-06-01 | 2013-12-05 | Panduit Corp. | Anti-Counterfeiting Methods |
CN103971250A (en) * | 2014-04-09 | 2014-08-06 | 四川谦泰仁投资管理有限公司 | One-time-one-certificate anti-fake traceability system based on mobile terminal and RFID (radio frequency identification) |
CN105631690A (en) * | 2015-06-05 | 2016-06-01 | 南京普尚信息科技有限公司 | Product forgery prevention and management system based on radio frequency identification (RFID) chip and method thereof |
EP3125177A1 (en) * | 2015-07-29 | 2017-02-01 | Palo Alto Research Center, Incorporated | A printable, writeable article for tracking counterfeit and diverted products |
CN107563767A (en) * | 2017-07-25 | 2018-01-09 | 浙江惠码科技有限公司 | A kind of method of false proof anti-channel conflict |
-
2018
- 2018-09-21 CN CN201811109921.6A patent/CN109360002A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101872460A (en) * | 2010-05-27 | 2010-10-27 | 上海华彩科技有限公司 | Treatment method of RFID online anti-counterfeiting system based on dynamic anti-counterfeiting mark |
US20130320079A1 (en) * | 2012-06-01 | 2013-12-05 | Panduit Corp. | Anti-Counterfeiting Methods |
CN103971250A (en) * | 2014-04-09 | 2014-08-06 | 四川谦泰仁投资管理有限公司 | One-time-one-certificate anti-fake traceability system based on mobile terminal and RFID (radio frequency identification) |
CN105631690A (en) * | 2015-06-05 | 2016-06-01 | 南京普尚信息科技有限公司 | Product forgery prevention and management system based on radio frequency identification (RFID) chip and method thereof |
EP3125177A1 (en) * | 2015-07-29 | 2017-02-01 | Palo Alto Research Center, Incorporated | A printable, writeable article for tracking counterfeit and diverted products |
CN107563767A (en) * | 2017-07-25 | 2018-01-09 | 浙江惠码科技有限公司 | A kind of method of false proof anti-channel conflict |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110232574A (en) * | 2019-05-07 | 2019-09-13 | 中国平安财产保险股份有限公司 | Product Validation method, apparatus, equipment and storage medium based on block chain |
CN111865558A (en) * | 2019-05-19 | 2020-10-30 | 北京骑胜科技有限公司 | Service data processing method and device, electronic equipment and storage medium |
CN110717566A (en) * | 2019-09-12 | 2020-01-21 | 跃明科技成都有限公司 | Anti-counterfeiting electronic code label, commodity with anti-counterfeiting electronic code and anti-counterfeiting verification method |
CN117875990A (en) * | 2024-03-13 | 2024-04-12 | 贵州省畜牧兽医研究所 | Honey tracing method and system based on blockchain |
CN117875990B (en) * | 2024-03-13 | 2024-05-28 | 贵州省畜牧兽医研究所 | Honey tracing method and system based on blockchain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109345264B (en) | Wine product traceability anti-counterfeiting system and method based on block chain | |
US8421593B2 (en) | Apparatus, systems and methods for authentication of objects having multiple components | |
US10152720B2 (en) | Authentication tags and systems for golf clubs | |
CN109360002A (en) | A kind of method for anti-counterfeit and device of product | |
US20090167489A1 (en) | Anti-forgery method and apparatus based on cpk electronic tag | |
CN108573384B (en) | Product with double identification codes and product tracing anti-counterfeiting verification method and device | |
US20160098730A1 (en) | System and Method for Block-Chain Verification of Goods | |
US20140095398A1 (en) | Double ID Anti-Counterfeit Method and System | |
WO2019192072A1 (en) | Blockchain-based merchandise anti-counterfeiting system, and method for checking authenticity of merchandise | |
CN109767247A (en) | A kind of distribution commodity traceability system and source tracing method | |
CN109118219A (en) | Transaction data processing method and device | |
CN109949058A (en) | Antifake method for products, device, electronic equipment and read/write memory medium | |
CN102063633A (en) | Anti-counterfeiting method based on radio frequency identification technology | |
CN102129637A (en) | Commodity anti-counterfeiting method based on security mechanism | |
Saeed et al. | An NFC based consumer-level counterfeit detection framework | |
WO2017116303A1 (en) | Secure dual-mode anti-counterfeit product authentication methodology and system | |
CN113450092A (en) | Block chain network-based article safe and efficient transaction method, system and storage medium | |
CN102622624B (en) | A kind of commodity counterfeit prevention identification system and method | |
CN110310130B (en) | Anti-counterfeiting method and system | |
CN104021487A (en) | Digital anti-counterfeiting method for implementing repeated verification | |
WO2005083644A1 (en) | Method and system for verifying the authenticity of goods | |
CN101356538A (en) | Method of authentication of items put into circulation field | |
KR101527582B1 (en) | System for verifying product genuineness using double security key and method thereof | |
CN113379428A (en) | Bottled wine circulation tracing method and system | |
CN110097378B (en) | Commodity transaction recording and circulation incentive method based on block chain technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190219 |
|
RJ01 | Rejection of invention patent application after publication |