CN109360002A - A kind of method for anti-counterfeit and device of product - Google Patents

A kind of method for anti-counterfeit and device of product Download PDF

Info

Publication number
CN109360002A
CN109360002A CN201811109921.6A CN201811109921A CN109360002A CN 109360002 A CN109360002 A CN 109360002A CN 201811109921 A CN201811109921 A CN 201811109921A CN 109360002 A CN109360002 A CN 109360002A
Authority
CN
China
Prior art keywords
information
product
verification information
geographical location
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811109921.6A
Other languages
Chinese (zh)
Inventor
亚历山大·布萨罗夫
雅罗斯夫·北雅士
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Frog Limai (zhejiang) Information Technology Co Ltd
Original Assignee
Frog Limai (zhejiang) Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Frog Limai (zhejiang) Information Technology Co Ltd filed Critical Frog Limai (zhejiang) Information Technology Co Ltd
Priority to CN201811109921.6A priority Critical patent/CN109360002A/en
Publication of CN109360002A publication Critical patent/CN109360002A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application provides a kind of method for anti-counterfeit of product and devices, method includes: to receive terminal when receiving authentication instruction, the product information read from target RFID tag, product information include: identity and the first verification information corresponding with identity;Judge in memory space with the presence or absence of the target information to match with identity and the first verification information;If it does not exist, then authentication is sent to terminal do not pass through information;If it exists, then the second verification information is generated, and the verification information in target information is replaced with into the second verification information, the second verification information is different from the first verification information;Authentication is sent by information and the second verification information, so that the first verification information in the target RFID tag is replaced with the second verification information by terminal to terminal.In this application, the identity of fake product can be accurately verified in the above manner.

Description

A kind of method for anti-counterfeit and device of product
Technical field
This application involves qualified products technical field, in particular to the method for anti-counterfeit and device of a kind of product.
Background technique
The presence of a large amount of counterfeit and shoddy goods, the serious interests for affecting certified products business and consumer.In order to guarantee just The interests of product business and consumer, various products anti-counterfeiting technology (e.g., line holographic projections 3D anti-counterfeiting technology or utilization product identification code With the anti-counterfeiting technology of quiet code) it comes into being.
But there is poor reliability in current products antifake technique, e.g., line holographic projections 3D anti-counterfeiting technology can be light Easy imitation, or, quiet code is easy to be replicated and reuse, when causing to verify the identity of fake product, the standard of verification result True property is low.
Summary of the invention
In order to solve the above technical problems, the embodiment of the present application provides the method for anti-counterfeit and device of a kind of product, to reach quasi- The purpose of the identity of fake product really is verified, technical solution is as follows:
A kind of method for anti-counterfeit of product, comprising:
Terminal is received when receiving authentication instruction, the product information read from target RFID tag is described Product information includes: identity and the first verification information corresponding with the identity;
Judge to believe in memory space with the presence or absence of the target to match with the identity and first verification information Breath;
If it does not exist, then authentication is sent to the terminal do not pass through information;
If it exists, then the second verification information is generated, and the verification information in the target information is replaced with described second Verification information, second verification information are different from first verification information;
Authentication is sent by information and second verification information to the terminal, so that the terminal is by the mesh The first verification information in mark RFID tag replaces with second verification information.
Preferably, the method also includes:
The terminal is received when receiving authentication instruction, the product geographical location information navigated to;
There is the mesh to match with the identity and first verification information in judging the memory space After mark information, further includes:
Judge geographical with the presence or absence of the product sale to match with the product geographical location information in the memory space Location information;
If it exists, then the second verification information of the generation is executed, and the verification information in the target information is replaced with The step of second verification information;
If it does not exist, then it executes to the terminal and sends the step of authentication does not pass through information, or, issuing the target The prompt information that the sale locations and preset sale locations of the affiliated product of RFID tag are not inconsistent.
Preferably, the product information further include: product corresponding with the identity sells geographical location information;
The method also includes:
The terminal is received when receiving authentication instruction, the product geographical location information navigated to;
There is the mesh to match with the identity and first verification information in judging the memory space After mark information, further includes:
Judge whether the product sale geographical location information and the product geographical location information are consistent;
If consistent, the second verification information of the generation is executed, and the verification information in the target information is replaced with The step of second verification information;
If inconsistent, execute to the terminal and send the step of authentication does not pass through information, or, issuing the target The prompt information that the sale locations and preset sale locations of the affiliated product of RFID tag are not inconsistent.
Preferably, if product sale geographical location information is consistent with the product geographical location information, the method Further include:
Count the number that authentication is carried out to the corresponding product of product sale geographical location information;
Obtain the quantity that the corresponding retailer of the product sale geographical location information buys product;
The number for comparing the authentication counted on and the retailer got buy the quantity of product, obtain comparing knot Fruit, with the efficiency analysis for carrying out the marketing and sale.
Preferably, the memory space is the block in block chain.
A kind of false proof device of product, comprising:
First receiving module is read from target RFID tag for receiving terminal when receiving authentication instruction The product information arrived, the product information include: identity and the first verification information corresponding with the identity;
First judgment module is believed in memory space with the presence or absence of with the identity and first verifying for judging The matched target information of manner of breathing then executes the first sending module, and if it exists, then execute replacement module if it does not exist;
First sending module does not pass through information for sending authentication to the terminal;
The replacement module for generating the second verification information, and the verification information in the target information is replaced with Second verification information, second verification information are different from first verification information;
Second sending module passes through information and second verification information for sending authentication to the terminal, with Make the terminal that the first verification information in the target RFID tag is replaced with second verification information.
Preferably, described device further include:
Second receiving module, for receiving the terminal when receiving authentication instruction, the product navigated to Geographical location information;
Second judgment module is tested for existing in judging the memory space with the identity and described first After the target information that card information matches, judge to whether there is and the product geographical location information phase in the memory space Matched product sells geographical location information, and if it exists, then executes the replacement module, if it does not exist, then executes described first Sending module, or, executing the first cue module;
First cue module, for issuing the sale locations of the affiliated product of the target RFID tag and presetting The prompt information that is not inconsistent of sale locations.
Preferably, the product information further include: product corresponding with the identity sells geographical location information;
Described device further include:
Third receiving module, for receiving the terminal when receiving authentication instruction, the product navigated to Geographical location information;
Third judgment module is tested for existing in judging the memory space with the identity and described first After the target information that card information matches, the product sale geographical location information and the product geographical location information are judged It is whether consistent, if unanimously, executing the replacement module, if inconsistent, first sending module is executed, or, executing the Two cue modules;
Second cue module, for issuing the sale locations of the affiliated product of the target RFID tag and presetting The prompt information that is not inconsistent of sale locations.
Preferably, if product sale geographical location information is consistent with the product geographical location information, described device Further include:
Statistical module, for counting time for carrying out authentication to the corresponding product of product sale geographical location information Number;
Module is obtained, the quantity of product is bought for obtaining the corresponding retailer of the product sale geographical location information;
Comparison module, number and the retailer got for comparing the authentication counted on buy the number of product Amount, obtains comparison result, with the efficiency analysis for carrying out the marketing and sale.
Preferably, the memory space is the block in block chain.
Compared with prior art, the application has the beneficial effect that
In this application, using identity and the corresponding verification information of identity as the anti-counterfeiting information of product, and During Product Validation, the verification information in space and the verification information in RFID tag are dynamically updated storage, guarantees product Anti-counterfeiting information can dynamically update.On this basis, since the product information in the RFID tag of fake product is from certified products The same fix information copied in the RFID tag of product, dynamic has occurred more in corresponding verification information in memory space After new, it can match in memory space less than the target information to match with identity in fake product and verification information, from And accurately verify the identity of fake product.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for For those of ordinary skill in the art, without any creative labor, it can also be obtained according to these attached drawings His attached drawing.
Fig. 1 is a kind of flow chart of the method for anti-counterfeit of product provided by the present application;
Fig. 2 is another flow chart of the method for anti-counterfeit of product provided by the present application;
Fig. 3 is another flow chart of the method for anti-counterfeit of product provided by the present application;
Fig. 4 is another flow chart of the method for anti-counterfeit of product provided by the present application;
Fig. 5 is another flow chart of the method for anti-counterfeit of product provided by the present application;
Fig. 6 is a kind of logical construction schematic diagram of the false proof device of product provided by the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall in the protection scope of this application.
The embodiment of the present application discloses a kind of method for anti-counterfeit of product, comprising: receives terminal and refers to receiving authentication When enabling, the product information read from target RFID tag, product information includes: identity and corresponding with identity First verification information;Judge in memory space with the presence or absence of the target information to match with identity and the first verification information; If it exists, then the second verification information is generated, and the verification information in target information is replaced with into the second verification information, the second verifying Information is different from the first verification information;Authentication is sent by information and the second verification information to terminal, so that terminal is by mesh The first verification information in mark RFID tag replaces with the second verification information;If it does not exist, then authentication is sent not to terminal Pass through information.In this application, the identity of fake product can accurately be verified.
Next the method for anti-counterfeit of product disclosed in the embodiment of the present application is introduced, referring to Figure 1, may include:
Step S11, terminal is received when receiving authentication instruction, the product letter read from target RFID tag Breath.
Respective product information is stored in the RFID tag of each product respectively.
Before user buys product, when needing to verify the true and false of product, authentication process itself can be triggered, is sent out to terminal Authentication is sent to instruct, terminal scans target RFID tag, read from target RFID tag when receiving authentication instruction Product information is taken, and the product information read is sent to background server.
Background server then can receive terminal when receiving authentication instruction, read from target RFID tag Product information.
In the present embodiment, the product information may include but be not limited to: identity and with the identity pair The first verification information answered.
The identity of identity product for identification.The identity of each product is unique, and the body of each product Part mark is different.
It should be noted that the identity of each product is randomly generated and distributes, adulterator's decoding can be increased Difficulty, reduce the risk that the identity of product is forged.
Also, it in an rfid tag due to identity storage, rather than is stored directly in product packaging, puppet can be increased The person of making replicates the difficulty of identity, further decreases the risk that the identity of product is forged.
The first verification information corresponding with the identity, can generate according to identity, e.g., to identity into Row transformation, transformed information is as the first verification information, or, a random information is added after identity, as first Verification information.
Certainly, the first verification information corresponding with the identity, can not also generate according to identity, e.g., with Machine generates a string of contents information unrelated with identity, as the first verification information.
Target RFID tag can be but be not limited to: NFC (Near Field Communication, near radio Mechanics of communication) label.
Step S12, judging whether there is in memory space matches with the identity and first verification information Target information.
If it exists, S13 is thened follow the steps;If it does not exist, S15 is thened follow the steps.
It is corresponding with respective product information is stored in the RFID tag of product respectively, it is stored in memory space each The product information of product.
Step S13, the second verification information is generated, and the verification information in the target information is replaced with described second and is tested Information is demonstrate,proved, second verification information is different from first verification information.
Judge to exist in memory space in step S12 and match with the identity and first verification information After target information, the second verification information is generated, and the verification information in the target information is replaced with into second verifying Information completes the update of the corresponding verification information of identity described in memory space.
After the verification information in the target information is replaced with second verification information, it can be sent to terminal The information that verification information is updated successfully.
Step S14, authentication is sent by information and second verification information, so that the terminal to the terminal The first verification information in the target RFID tag is replaced with into second verification information.
The first verification information in the target RFID tag is replaced with second verification information by the terminal, can be with Guarantee to pass through authentication when carrying out authentication to product next time.
It, can be with after the first verification information in the target RFID tag is replaced with second verification information by terminal The information that verification information is updated successfully in RFID tag is sent to background server.
Step S15, authentication is sent to the terminal do not pass through information.
The same certified products product RFID tag by batch duplicating, the RFID of multiple fake products as same batch is marked In the case where label, when user sends authentication instruction to terminal for some fake product with batch for the first time, backstage Server can receive the product information that terminal is read from target RFID tag, and judge that memory space whether there is and body The target information that part mark and the first verification information match, if the unauthenticated true and false of certified products product, judging result are at this time In the presence of, the second verification information can be generated, and the verification information in the target information is replaced with into second verification information, and Authentication, which is sent, to the terminal passes through information and second verification information.And judging that memory space whether there is and body When the target information that part mark and the first verification information match, if certified products product has been verified the true and false, due in memory space The first verification information have been replaced with the second verification information, therefore match in memory space and tested less than with identity and first The target information that card information matches can send the unsanctioned message of authentication to terminal, and identifying product is fake product.
From the foregoing, it will be observed that after the fake product or certified products product that are verified at first are verified the true and false, in memory space Verification information has turned into the second verification information, if user instructs for other fake products to terminal transmission authentication at this time When, since the product information in the RFID tag of each fake product is still identity and the first verification information, sentencing When disconnected memory space whether there is the target information to match with identity and the first verification information, obtained judging result is It is not present, so that sending authentication to terminal does not pass through information, accurately verifies the identity of fake product.
Therefore, background server can be in the case where the same RFID tag be forged by batch duplicating, accurately Other all fake products in addition to identifying all fake products or the fake product being verified except first, can seriously damage The economic benefit of evil adulterator, to preferably restrict the forgery behavior of adulterator.
In this application, using identity and the corresponding verification information of identity as the anti-counterfeiting information of product, and During Product Validation, the verification information in space and the verification information in RFID tag are dynamically updated storage, guarantees product Anti-counterfeiting information can dynamically update.On this basis, since the product information in the RFID tag of fake product is from certified products The same fix information copied in the RFID tag of product, dynamic has occurred more in corresponding verification information in memory space After new, it can match in memory space less than the target information to match with identity in fake product and verification information, from And accurately verify the identity of fake product.
In the application, target RFID tag, which can be firmly attached in the packaging of certified products product, (e.g., to be adhered to by glue-line In the packaging of certified products product), guarantee when removing target RFID tag in the packaging from certified products product, in target RFID tag Circuit can damage, so that the RFID tag in certified products product packaging be avoided directly to be recycled, increase the forgery of adulterator Cost reduces and forges risk, achievees the purpose that from side anti-fake.
In another embodiment of the application, the method for anti-counterfeit of another product is provided, Fig. 2 is referred to, can wrap It includes:
Step S21, terminal is received when receiving authentication instruction, the product letter read from target RFID tag Breath.
The product information includes: identity and the first verification information corresponding with the identity.
Step S21 is identical as the step S11 in previous embodiment, and the detailed process of step S21 may refer to step S11's Related introduction, details are not described herein.
Step S22, the terminal is received when receiving authentication instruction, the product geographical location letter navigated to Breath.
Terminal can position the geographical location for being verified product, and will determine when receiving authentication instruction Position to product geographical location information be sent to background server.What what background server then received that the terminal sends navigated to Product geographical location information.
Step S23, judging whether there is in memory space matches with the identity and first verification information Target information.
If it exists, S24 is thened follow the steps;If it does not exist, S27 is thened follow the steps.
Step S23 is identical as the step S12 in previous embodiment, and the detailed process of step S23 may refer to step S12's Related introduction, details are not described herein.
Step S24, judge in the memory space with the presence or absence of the product to match with the product geographical location information Sell geographical location information.
In the present embodiment, the sale geographical location information of each product can be stored in advance.Selling geographical location information can To understand are as follows: sell the geographical location information in the place of product.
If it exists, S25 is thened follow the steps;If it does not exist, S27 is thened follow the steps.
Step S25, the second verification information is generated, and the verification information in the target information is replaced with described second and is tested Demonstrate,prove information, second verification information and the first verification information difference
Step S26, authentication is sent by information and second verification information, so that the terminal to the terminal The first verification information in the target RFID tag is replaced with into second verification information.
Step S27, authentication is sent to the terminal do not pass through information.
Step S25-S27 is identical as the step S13-S15 in previous embodiment, and the detailed process of step S25-S27 can be with Referring to the related introduction of step S13-S15, details are not described herein.
In the present embodiment, using identity and the corresponding verification information of identity as the anti-counterfeiting information of product, and During Product Validation, the verification information in space and the verification information in RFID tag are dynamically updated storage, guarantees product Anti-counterfeiting information can dynamically update.On this basis, since the product information in the RFID tag of fake product is from certified products The same fix information copied in the RFID tag of product, dynamic has occurred more in corresponding verification information in memory space After new, it can match in memory space less than the target information to match with identity in fake product and verification information, from And accurately verify the identity of fake product.
Also, in the case where the authentication of fake product is carried out before the authentication of certified products product, sentencing After there is the target information to match with the identity and first verification information in disconnected memory space out, continue to judge Geographical location information is sold with the presence or absence of the product to match with the product geographical location information in the memory space, it can be with Further increase the accuracy of fake product authentication.Such as, in rare cases, the geographical location letter of fake product is sold Breath with the geographical location information of certified products product be it is identical, in most cases, sell fake product geographical location information and The geographical location information of certified products product is different.In the different situation of geographic location information, although fake product exists Can be by authentication before certified products Product Validation, but there is no believe with the geographical location of fake product in memory space When ceasing matched sale geographical location information, the identity of fake product still can be accurately verified.
Meanwhile there is the mesh to match with the identity and first verification information in judging memory space After marking information, continue to judge to sell in the memory space with the presence or absence of the product to match with the product geographical location information Geographical location information gives the unfavorable shadow of certified products product bring when can reduce the verifying fake product before verifying certified products product It rings.
In another embodiment of the application, the method for anti-counterfeit of another product is provided, Fig. 3 is referred to, can wrap It includes:
Step S31, terminal is received when receiving authentication instruction, the product letter read from target RFID tag Breath.
The product information includes: identity and the first verification information corresponding with the identity.
Step S32, the terminal is received when receiving authentication instruction, the product geographical location letter navigated to Breath.
Terminal can position the geographical location for being verified product, and will determine when receiving authentication instruction Position to product geographical location information be sent to background server.What what background server then received that the terminal sends navigated to Product geographical location information.
Step S33, judging whether there is in memory space matches with the identity and first verification information Target information.
If it exists, S34 is thened follow the steps;If it does not exist, S37 is thened follow the steps.
Step S34, judge in the memory space with the presence or absence of the product to match with the product geographical location information Sell geographical location information.
In the present embodiment, the sale geographical location information of each product can be stored in advance.Selling geographical location information can To understand are as follows: sell the geographical location information in the place of product.
If it exists, S35 is thened follow the steps;If it does not exist, S38 is thened follow the steps.
Step S35, the second verification information is generated, and the verification information in the target information is replaced with described second and is tested Demonstrate,prove information, second verification information and the first verification information difference
Step S36, authentication is sent by information and second verification information, so that the terminal to the terminal The first verification information in the target RFID tag is replaced with into second verification information.
Step S37, authentication is sent to the terminal do not pass through information.
Step S31-S37 is identical as the step S21-S27 in previous embodiment, and the detailed process of step S31-S37 can be with Referring to the related introduction of step S21-S27, details are not described herein.
Step S38, the sale locations and preset sale locations for issuing the affiliated product of target RFID tag are not The prompt information of symbol.
In the present embodiment, using identity and the corresponding verification information of identity as the anti-counterfeiting information of product, and During Product Validation, the verification information in space and the verification information in RFID tag are dynamically updated storage, guarantees product Anti-counterfeiting information can dynamically update.On this basis, since the product information in the RFID tag of fake product is from certified products The same fix information copied in the RFID tag of product, dynamic has occurred more in corresponding verification information in memory space After new, it can match in memory space less than the target information to match with identity in fake product and verification information, from And accurately verify the identity of fake product.
Also, what the sale locations and preset sale locations for issuing the affiliated product of target RFID tag were not inconsistent Prompt information can prompt manufacturer to verify whether certified products product is sold in designated sale place, and manufacturer is helped to realize Following target:
Enhance product distribution: sale locations and preset sale position using the affiliated product of the target RFID tag Set the prompt information not being inconsistent, manufacturer can analyze the sales range of product, judge product whether export trade to setting geographical model Except enclosing, its network for distributed sales is significantly improved, certain areas market especially significant in area differentiation, and being difficult to enter and control In.Since a large amount of consumer goods are by wholesale distributor sales, and wholesale retail trader is usually in designated area or particular retailer It manages, therefore manufacturer must be strictly controlled retail trader, to improve the efficiency of network for distributed sales to greatest extent.
Prevent arbitrage: area differentiation promotes the producer to establish region " price discrimination " (price discrimination), Or adaptation to local conditions price.This may result in certain retail traders by buying product in the area compared with low price, and at other Area sells at a premium prices them, to destroy market order, to remove the interests of the producer He other sellers.This In application, by judging in the memory space with the presence or absence of the product market to match with the product geographical location information Reason location information can be convenient tracking and close the channel for being not intended to arbitrage.
Preferably control the business scope of dealer: since the profit that manufacturer obtains in selling retailer directly to households is higher than The profit obtained in the distribution channel of retail trader.Therefore, consider for interests, manufacturer establishes and retailer in a region Between direct business relation after, can by judge in the memory space whether there is and the product geographical location information phase The product sale geographical location information matched, protects this direct business relation, prevents the dealer of close region from snatching away business.
In another embodiment of the application, the method for anti-counterfeit of another product is provided, Fig. 4 is referred to, it can be with Include:
Step S41, terminal is received when receiving authentication instruction, the product letter read from target RFID tag Breath.
The product information may include: identity and the first verification information corresponding with the identity and with institute State the corresponding product sale geographical location information of identity.
Step S42, the terminal is received when receiving authentication instruction, the product geographical location letter navigated to Breath.
Terminal can position the geographical location for being verified product, and will determine when receiving authentication instruction Position to product geographical location information be sent to background server.What what background server then received that the terminal sends navigated to Product geographical location information.
Step S43, judging whether there is in memory space matches with the identity and first verification information Target information.
If it exists, S44 is thened follow the steps;If it does not exist, S47 is thened follow the steps.
Step S44, judge whether the product sale geographical location information and the product geographical location information are consistent.
If consistent, S45 is thened follow the steps;If inconsistent, S47 is thened follow the steps.
In the present embodiment, the corresponding product sale geographical location information of identity can not be stored in advance in memory space, The corresponding product of identity is only stored in the RFID tag of product and sells geographical location information, is saved memory space, is subtracted The maintenance cost of memory space is lacked.
Step S45, the second verification information is generated, and the verification information in the target information is replaced with described second and is tested Information is demonstrate,proved, second verification information is different from first verification information.
Step S44 judge product sale geographical location information it is consistent with the product geographical location information it Afterwards, the second verification information is generated, and the verification information in the target information is replaced with into second verification information, completes to deposit Store up the update of the corresponding verification information of identity described in space.
Step S46, authentication is sent by information and second verification information, so that the terminal to the terminal The first verification information in the target RFID tag is replaced with into second verification information.
Step S47, authentication is sent to the terminal do not pass through information.
In the present embodiment, using identity and the corresponding verification information of identity as the anti-counterfeiting information of product, and During Product Validation, the verification information in space and the verification information in RFID tag are dynamically updated storage, guarantees product Anti-counterfeiting information can dynamically update.On this basis, since the product information in the RFID tag of fake product is from certified products The same fix information copied in the RFID tag of product, dynamic has occurred more in corresponding verification information in memory space After new, it can match in memory space less than the target information to match with identity in fake product and verification information, from And accurately verify the identity of fake product.
Also, in the case where the authentication of fake product is carried out before the authentication of certified products product, sentencing After there is the target information to match with the identity and first verification information in disconnected memory space out, continue to judge Whether the product sale geographical location information and the product geographical location information are consistent, can be further improved fake product The accuracy of authentication.Such as, in rare cases, the geographical location information of fake product and the geography of certified products product are sold Location information be it is identical, in most cases, sell the geographical location information of fake product and the geographical location of certified products product Information is different.In the different situation of geographic location information, although fake product can before certified products Product Validation To pass through authentication, but judge that the product sale geographical location information and the product geographical location information are inconsistent When, it still can accurately verify the identity of fake product.
Meanwhile there is the mesh to match with the identity and first verification information in judging memory space After marking information, continue to judge whether the product sale geographical location information and the product geographical location information are consistent, it can be with When reducing the verifying fake product before verifying certified products product, adversely affected to certified products product bring.
In another embodiment of the application, the method for anti-counterfeit of another product is provided, Fig. 5 is referred to, it can be with Include:
Step S51, terminal is received when receiving authentication instruction, the product letter read from target RFID tag Breath.
The product information may include: identity and the first verification information corresponding with the identity and with institute State the corresponding product sale geographical location information of identity.
Step S52, the terminal is received when receiving authentication instruction, the product geographical location letter navigated to Breath.
Step S53, judging whether there is in memory space matches with the identity and first verification information Target information.
If it exists, S54 is thened follow the steps;If it does not exist, S57 is thened follow the steps.
Step S54, judge whether the product sale geographical location information and the product geographical location information are consistent.
If consistent, S55 is thened follow the steps;If inconsistent, S58 is thened follow the steps.
Step S55, the second verification information is generated, and the verification information in the target information is replaced with described second and is tested Information is demonstrate,proved, second verification information is different from first verification information.
Step S56, authentication is sent by information and second verification information, so that the terminal to the terminal The first verification information in the target RFID tag is replaced with into second verification information.
Step S57, authentication is sent to the terminal do not pass through information.
Step S51-S57 is identical as the step S41-S47 in previous embodiment, and the detailed process of step S51-S57 can be with Referring to the related introduction of step S41-S47, details are not described herein.
Step S58, the sale locations and preset sale locations for issuing the affiliated product of target RFID tag are not The prompt information of symbol.
In the present embodiment, using identity and the corresponding verification information of identity as the anti-counterfeiting information of product, and During Product Validation, the verification information in space and the verification information in RFID tag are dynamically updated storage, guarantees product Anti-counterfeiting information can dynamically update.On this basis, since the product information in the RFID tag of fake product is from certified products The same fix information copied in the RFID tag of product, dynamic has occurred more in corresponding verification information in memory space After new, it can match in memory space less than the target information to match with identity in fake product and verification information, from And accurately verify the identity of fake product.
Also, what the sale locations and preset sale locations for issuing the affiliated product of target RFID tag were not inconsistent Prompt information can prompt manufacturer to verify whether certified products product is sold in designated sale place, and manufacturer is helped to realize Following target:
Enhance product distribution: sale locations and preset sale position using the affiliated product of the target RFID tag Set the prompt information not being inconsistent, manufacturer can analyze the sales range of product, judge product whether export trade to setting geographical model Except enclosing, its network for distributed sales is significantly improved, certain areas market especially significant in area differentiation, and being difficult to enter and control In.Since a large amount of consumer goods are by wholesale distributor sales, and wholesale retail trader is usually in designated area or particular retailer It manages, therefore manufacturer must be strictly controlled retail trader, to improve the efficiency of network for distributed sales to greatest extent.
Prevent arbitrage: area differentiation promotes the producer to establish region " price discrimination " (price discrimination), Or adaptation to local conditions price.This may result in certain retail traders by buying product in the area compared with low price, and at other Area sells at a premium prices them, to destroy market order, to remove the interests of the producer He other sellers.This In application, by judging in the memory space with the presence or absence of the product market to match with the product geographical location information Reason location information can be convenient tracking and close the channel for being not intended to arbitrage.
Preferably control the business scope of dealer: since the profit that manufacturer obtains in selling retailer directly to households is higher than The profit obtained in the distribution channel of retail trader.Therefore, consider for interests, manufacturer establishes and retailer in a region Between direct business relation after, can by judge in the memory space whether there is and the product geographical location information phase The product sale geographical location information matched, protects this direct business relation, prevents the dealer of close region from snatching away business.
In another embodiment of the application, the method for anti-counterfeit of the product shown in Fig. 4 or Fig. 5 is extended, is extended Content may include:
If the product sale geographical location information is consistent with the product geographical location information, following steps are executed:
A11, statistics carry out the number of authentication to the corresponding product of product sale geographical location information.
Count the number that authentication is carried out to the corresponding product of product sale geographical location information, it is possible to understand that Are as follows: count the number that authentication is carried out to the product in the corresponding selling spot of product sale geographical location information.
A12, the quantity that the corresponding retailer of the product sale geographical location information buys product is obtained.
The product sells the corresponding retailer of geographical location information and buys the quantity of product it is to be understood that the product The retailer for selling the corresponding selling spot of geographical location information buys the quantity of product from manufacturer.
A13, the number for comparing the authentication counted on buy the quantity of product with the retailer got, are compared As a result, with the efficiency analysis for carrying out the marketing and sale.
The number for comparing the authentication counted on and the retailer got buy the quantity of product, obtain comparing knot Fruit, with the efficiency analysis for carrying out the marketing and sale, for example, adjusting manufacturer to retailer according to comparison result The product quantity of supply.
In another embodiment in this application, the memory space in foregoing individual embodiments is introduced, specifically It can be but be not limited to: the block in block chain.
Since block chain has HC hard copy, it can not be tampered and decentralization collaboration, common data are transparent visible Characteristic, therefore any one single mechanism (e.g., manufacturer, retailer or dealer) can not all fake, and distort letter wantonly Breath plays the role of everybody and supervises " audit ", guarantees that the information of the block storage in block chain is not easy to be tampered, can be further Improve the accuracy of fake product authentication.Also, has the case where permission of access block chain in user (e.g., manufacturer) Under, it is no longer necessary to data system is individually constructed, can guarantee that data utilization is simpler directly using data disclosed in block chain Just.
Next the false proof device of product provided by the present application is introduced, the false proof device for the product being introduced below with The false proof device of product described above can correspond to each other reference.
Fig. 6 is referred to, the false proof device of product includes: the first receiving module 11, the transmission mould of first judgment module 12, first Block 13, replacement module 14 and the second sending module 15.
First receiving module 11 is read from target RFID tag for receiving terminal when receiving authentication instruction The product information got, the product information include: identity and the first verification information corresponding with the identity.
First judgment module 12 is verified in memory space with the presence or absence of with the identity and described first for judging The target information that information matches then executes the first sending module 13, and if it exists, then execute replacement module 14 if it does not exist.
First sending module 13 does not pass through information for sending authentication to the terminal.
The replacement module 14 is replaced for generating the second verification information, and by the verification information in the target information For second verification information, second verification information is different from first verification information.
Second sending module 15 passes through information and second verification information for sending authentication to the terminal, So that the first verification information in the target RFID tag is replaced with second verification information by the terminal.
In the present embodiment, the false proof device of the said goods can also include:
Second receiving module, for receiving the terminal when receiving authentication instruction, the product navigated to Geographical location information.
Second judgment module is tested for existing in judging the memory space with the identity and described first After the target information that card information matches, judge to whether there is and the product geographical location information phase in the memory space Matched product sells geographical location information, and if it exists, then executes the replacement module 14, if it does not exist, then executes described the One sending module 13, or, executing the first cue module.
First cue module, for issuing the sale locations of the affiliated product of the target RFID tag and presetting The prompt information that is not inconsistent of sale locations.
In the present embodiment, the said goods information can also include: that product sale corresponding with the identity is geographical Location information.
Correspondingly, the false proof device of the said goods can also include:
Third receiving module, for receiving the terminal when receiving authentication instruction, the product navigated to Geographical location information.
Third judgment module is tested for existing in judging the memory space with the identity and described first After the target information that card information matches, the product sale geographical location information and the product geographical location information are judged It is whether consistent, if unanimously, executing the replacement module 14, if inconsistent, first sending module 13 is executed, or, holding The second cue module of row.
Second cue module, for issuing the sale locations of the affiliated product of the target RFID tag and presetting The prompt information that is not inconsistent of sale locations.
It is described if product sale geographical location information is consistent with the product geographical location information in the present embodiment Device can also include:
Statistical module, for counting time for carrying out authentication to the corresponding product of product sale geographical location information Number.
Module is obtained, the quantity of product is bought for obtaining the corresponding retailer of the product sale geographical location information.
Comparison module, number and the retailer got for comparing the authentication counted on buy the number of product Amount, obtains comparison result, with the efficiency analysis for carrying out the marketing and sale.
In the present embodiment, above-mentioned memory space can be the block in block chain.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other. For device class embodiment, since it is basically similar to the method embodiment, so being described relatively simple, related place ginseng See the part explanation of embodiment of the method.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except there is also other identical elements in the process, method, article or apparatus that includes the element.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit can be realized in the same or multiple software and or hardware when application.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can It realizes by means of software and necessary general hardware platform.Based on this understanding, the technical solution essence of the application On in other words the part that contributes to existing technology can be embodied in the form of software products, the computer software product It can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) executes the certain of each embodiment of the application or embodiment Method described in part.
The method for anti-counterfeit and device of a kind of product provided herein are described in detail above, it is used herein The principle and implementation of this application are described for specific case, and the above embodiments are only used to help understand The present processes and its core concept;At the same time, for those skilled in the art is having according to the thought of the application There will be changes in body embodiment and application range, in conclusion the content of the present specification should not be construed as to the application Limitation.

Claims (10)

1. a kind of method for anti-counterfeit of product characterized by comprising
Terminal is received when receiving authentication instruction, the product information read from target RFID tag, the product Information includes: identity and the first verification information corresponding with the identity;
Judge in memory space with the presence or absence of the target information to match with the identity and first verification information;
If it does not exist, then authentication is sent to the terminal do not pass through information;
If it exists, then the second verification information is generated, and the verification information in the target information is replaced with into second verifying Information, second verification information are different from first verification information;
Authentication is sent by information and second verification information to the terminal, so that the terminal is by the target The first verification information in RFID tag replaces with second verification information.
2. the method according to claim 1, wherein the method also includes:
The terminal is received when receiving authentication instruction, the product geographical location information navigated to;
There is the target to match with the identity and first verification information in judging the memory space to believe After breath, further includes:
Judge to sell geographical location with the presence or absence of the product to match with the product geographical location information in the memory space Information;
If it exists, then it executes the second verification information of the generation, and the verification information in the target information is replaced with described The step of second verification information;
If it does not exist, then it executes to the terminal and sends the step of authentication does not pass through information, or, issuing the target RFID The prompt information that the sale locations and preset sale locations of the affiliated product of label are not inconsistent.
3. the method according to claim 1, wherein the product information further include: with the identity pair The product sale geographical location information answered;
The method also includes:
The terminal is received when receiving authentication instruction, the product geographical location information navigated to;
There is the target to match with the identity and first verification information in judging the memory space to believe After breath, further includes:
Judge whether the product sale geographical location information and the product geographical location information are consistent;
If consistent, the second verification information of generations is executed, and described in the verification information in the target information replaced with The step of second verification information;
If inconsistent, execute to the terminal and send the step of authentication does not pass through information, or, issuing the target RFID The prompt information that the sale locations and preset sale locations of the affiliated product of label are not inconsistent.
4. according to the method described in claim 3, it is characterized in that, if product sale geographical location information and the product Geographical location information is consistent, the method also includes:
Count the number that authentication is carried out to the corresponding product of product sale geographical location information;
Obtain the quantity that the corresponding retailer of the product sale geographical location information buys product;
The number for comparing the authentication counted on and the retailer got buy the quantity of product, obtain comparison result, with For carrying out the efficiency analysis of the marketing and sale.
5. method according to any of claims 1-4, which is characterized in that the memory space is the area in block chain Block.
6. a kind of false proof device of product characterized by comprising
First receiving module is read from target RFID tag for receiving terminal when receiving authentication instruction Product information, the product information include: identity and the first verification information corresponding with the identity;
First judgment module whether there is and the identity and the first verification information phase in memory space for judging Matched target information then executes the first sending module, and if it exists, then execute replacement module if it does not exist;
First sending module does not pass through information for sending authentication to the terminal;
The replacement module for generating the second verification information, and the verification information in the target information is replaced with described Second verification information, second verification information are different from first verification information;
Second sending module, for sending authentication by information and second verification information, so that institute to the terminal It states terminal and the first verification information in the target RFID tag is replaced with into second verification information.
7. device according to claim 6, which is characterized in that described device further include:
Second receiving module, for receiving the terminal when receiving authentication instruction, the product navigated to is geographical Location information;
Second judgment module is believed for existing in judging the memory space with the identity and first verifying After the matched target information of manner of breathing, judging whether there is in the memory space matches with the product geographical location information Product sell geographical location information, and if it exists, then execute the replacement module, if it does not exist, then execute it is described first send Module, or, executing the first cue module;
First cue module, for issue the affiliated product of the target RFID tag sale locations and preset pin Sell the prompt information that position is not inconsistent.
8. device according to claim 6, which is characterized in that the product information further include: with the identity pair The product sale geographical location information answered;
Described device further include:
Third receiving module, for receiving the terminal when receiving authentication instruction, the product navigated to is geographical Location information;
Third judgment module is believed for existing in judging the memory space with the identity and first verifying After the matched target information of manner of breathing, judge whether are product sale geographical location information and the product geographical location information Unanimously, if unanimously, executing the replacement module, if inconsistent, first sending module is executed, is mentioned or, executing second Show module;
Second cue module, for issue the affiliated product of the target RFID tag sale locations and preset pin Sell the prompt information that position is not inconsistent.
9. device according to claim 8, which is characterized in that if product sale geographical location information and the product Geographical location information is consistent, described device further include:
Statistical module, for counting the number for carrying out authentication to the corresponding product of product sale geographical location information;
Module is obtained, the quantity of product is bought for obtaining the corresponding retailer of the product sale geographical location information;
Comparison module, number and the retailer got for comparing the authentication counted on are bought the quantity of product, are obtained To comparison result, with the efficiency analysis for carrying out the marketing and sale.
10. according to device described in claim 6-9 any one, which is characterized in that the memory space is in block chain Block.
CN201811109921.6A 2018-09-21 2018-09-21 A kind of method for anti-counterfeit and device of product Pending CN109360002A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811109921.6A CN109360002A (en) 2018-09-21 2018-09-21 A kind of method for anti-counterfeit and device of product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811109921.6A CN109360002A (en) 2018-09-21 2018-09-21 A kind of method for anti-counterfeit and device of product

Publications (1)

Publication Number Publication Date
CN109360002A true CN109360002A (en) 2019-02-19

Family

ID=65351332

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811109921.6A Pending CN109360002A (en) 2018-09-21 2018-09-21 A kind of method for anti-counterfeit and device of product

Country Status (1)

Country Link
CN (1) CN109360002A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110232574A (en) * 2019-05-07 2019-09-13 中国平安财产保险股份有限公司 Product Validation method, apparatus, equipment and storage medium based on block chain
CN110717566A (en) * 2019-09-12 2020-01-21 跃明科技成都有限公司 Anti-counterfeiting electronic code label, commodity with anti-counterfeiting electronic code and anti-counterfeiting verification method
CN111865558A (en) * 2019-05-19 2020-10-30 北京骑胜科技有限公司 Service data processing method and device, electronic equipment and storage medium
CN117875990A (en) * 2024-03-13 2024-04-12 贵州省畜牧兽医研究所 Honey tracing method and system based on blockchain

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101872460A (en) * 2010-05-27 2010-10-27 上海华彩科技有限公司 Treatment method of RFID online anti-counterfeiting system based on dynamic anti-counterfeiting mark
US20130320079A1 (en) * 2012-06-01 2013-12-05 Panduit Corp. Anti-Counterfeiting Methods
CN103971250A (en) * 2014-04-09 2014-08-06 四川谦泰仁投资管理有限公司 One-time-one-certificate anti-fake traceability system based on mobile terminal and RFID (radio frequency identification)
CN105631690A (en) * 2015-06-05 2016-06-01 南京普尚信息科技有限公司 Product forgery prevention and management system based on radio frequency identification (RFID) chip and method thereof
EP3125177A1 (en) * 2015-07-29 2017-02-01 Palo Alto Research Center, Incorporated A printable, writeable article for tracking counterfeit and diverted products
CN107563767A (en) * 2017-07-25 2018-01-09 浙江惠码科技有限公司 A kind of method of false proof anti-channel conflict

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101872460A (en) * 2010-05-27 2010-10-27 上海华彩科技有限公司 Treatment method of RFID online anti-counterfeiting system based on dynamic anti-counterfeiting mark
US20130320079A1 (en) * 2012-06-01 2013-12-05 Panduit Corp. Anti-Counterfeiting Methods
CN103971250A (en) * 2014-04-09 2014-08-06 四川谦泰仁投资管理有限公司 One-time-one-certificate anti-fake traceability system based on mobile terminal and RFID (radio frequency identification)
CN105631690A (en) * 2015-06-05 2016-06-01 南京普尚信息科技有限公司 Product forgery prevention and management system based on radio frequency identification (RFID) chip and method thereof
EP3125177A1 (en) * 2015-07-29 2017-02-01 Palo Alto Research Center, Incorporated A printable, writeable article for tracking counterfeit and diverted products
CN107563767A (en) * 2017-07-25 2018-01-09 浙江惠码科技有限公司 A kind of method of false proof anti-channel conflict

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110232574A (en) * 2019-05-07 2019-09-13 中国平安财产保险股份有限公司 Product Validation method, apparatus, equipment and storage medium based on block chain
CN111865558A (en) * 2019-05-19 2020-10-30 北京骑胜科技有限公司 Service data processing method and device, electronic equipment and storage medium
CN110717566A (en) * 2019-09-12 2020-01-21 跃明科技成都有限公司 Anti-counterfeiting electronic code label, commodity with anti-counterfeiting electronic code and anti-counterfeiting verification method
CN117875990A (en) * 2024-03-13 2024-04-12 贵州省畜牧兽医研究所 Honey tracing method and system based on blockchain
CN117875990B (en) * 2024-03-13 2024-05-28 贵州省畜牧兽医研究所 Honey tracing method and system based on blockchain

Similar Documents

Publication Publication Date Title
CN109345264B (en) Wine product traceability anti-counterfeiting system and method based on block chain
US8421593B2 (en) Apparatus, systems and methods for authentication of objects having multiple components
US10152720B2 (en) Authentication tags and systems for golf clubs
CN109360002A (en) A kind of method for anti-counterfeit and device of product
US20090167489A1 (en) Anti-forgery method and apparatus based on cpk electronic tag
CN108573384B (en) Product with double identification codes and product tracing anti-counterfeiting verification method and device
US20160098730A1 (en) System and Method for Block-Chain Verification of Goods
US20140095398A1 (en) Double ID Anti-Counterfeit Method and System
WO2019192072A1 (en) Blockchain-based merchandise anti-counterfeiting system, and method for checking authenticity of merchandise
CN109767247A (en) A kind of distribution commodity traceability system and source tracing method
CN109118219A (en) Transaction data processing method and device
CN109949058A (en) Antifake method for products, device, electronic equipment and read/write memory medium
CN102063633A (en) Anti-counterfeiting method based on radio frequency identification technology
CN102129637A (en) Commodity anti-counterfeiting method based on security mechanism
Saeed et al. An NFC based consumer-level counterfeit detection framework
WO2017116303A1 (en) Secure dual-mode anti-counterfeit product authentication methodology and system
CN113450092A (en) Block chain network-based article safe and efficient transaction method, system and storage medium
CN102622624B (en) A kind of commodity counterfeit prevention identification system and method
CN110310130B (en) Anti-counterfeiting method and system
CN104021487A (en) Digital anti-counterfeiting method for implementing repeated verification
WO2005083644A1 (en) Method and system for verifying the authenticity of goods
CN101356538A (en) Method of authentication of items put into circulation field
KR101527582B1 (en) System for verifying product genuineness using double security key and method thereof
CN113379428A (en) Bottled wine circulation tracing method and system
CN110097378B (en) Commodity transaction recording and circulation incentive method based on block chain technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190219

RJ01 Rejection of invention patent application after publication