CN109949058A - Antifake method for products, device, electronic equipment and read/write memory medium - Google Patents
Antifake method for products, device, electronic equipment and read/write memory medium Download PDFInfo
- Publication number
- CN109949058A CN109949058A CN201910248371.4A CN201910248371A CN109949058A CN 109949058 A CN109949058 A CN 109949058A CN 201910248371 A CN201910248371 A CN 201910248371A CN 109949058 A CN109949058 A CN 109949058A
- Authority
- CN
- China
- Prior art keywords
- security code
- product
- code
- scanning
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Credit Cards Or The Like (AREA)
Abstract
The embodiment of the present application provides a kind of antifake method for products, device, electronic equipment and read/write memory medium, is related to product false proof identification technology field.The antifake method for products includes: to receive to indicate the scanned scanning information of security code, and scanning information includes security code image, scanning position information, and scanning position information includes geographical location information when security code is scanned every time;Security code is verified based on security code image;It when security code passes through verifying, obtains that security code is corresponding sells status information, sells status information for indicating whether the corresponding product of security code is sold by;Based on selling status information and scanning position information judges whether product is fake products.This method is verified by security code and security code is corresponding sells status information and scanning position information judges whether product is fake products, security code is considered mostly or single place is scanned judge bring Different Effects to fake products, improves the accuracy rate that product false proof determines.
Description
Technical field
This application involves product false proofs to identify field, sets in particular to a kind of antifake method for products, device, electronics
Standby and read/write memory medium.
Background technique
Pursuing economic interests instantly, interests of the fake and forged phenomenon in addition to damaging consumer, also to each brand band
The serious damage in fame and prestige is carried out, or even consumer is allowed to lose the trust to brand.Anti-counterfeiting technology is reasonably utilized,
The powerful mean of maintaining enterprise brand interests and consumers' rights and interests, for traditional anti-counterfeiting technology, mainly have laser hologram,
Laser marking, specialty inks, special paper, conventional digital are anti-fake etc., and each product of manufacturing enterprise's production is all endowed only
One security code, consumer can be convenient to use identification software identification product false proof code, and then verify anti-counterfeiting information of tracing to the source.These
Technology is having certain antifalse effect using initial stage, but as opening up for application is wide, these technologies are increasingly easy to obtain, due to anti-fake
Code is generally disposed at outside product, therefore unique security code is easily replicated and fakes for imitated, therefore anti-fake effect
Limited, or at all cannot be anti-fake, antifalse effect situations such as in particular for falsifying, nonlocal fake products be poor, and personation produces
Product discrimination is lower.
Summary of the invention
In view of this, the embodiment of the present application is designed to provide a kind of antifake method for products, device, electronic equipment and can
Storage medium is read, fake products recognition accuracy existing for existing method for anti-counterfeit is lower and existing method for anti-counterfeit side to improve
For the problem of effect difference.
The embodiment of the present application provides a kind of antifake method for products, which comprises receiving indicates that security code is scanned
Scanning information, the scanning information includes security code image, present scanning position, and the scanning position information includes described anti-
Geographical location information when pseudo-code is scanned every time;The security code is verified based on the security code image;When described
When security code passes through verifying, obtain that the security code is corresponding to sell status information, the status information of selling is for indicating institute
State whether the corresponding product of security code is sold by;Status information is sold and the scanning position information judges the production based on described
Whether product are fake products.
During above-mentioned realization, not only security code is verified, also by security code it is corresponding sell status information with
And scanning position information is as the reference information for judging authenticity of products, it is contemplated that the feelings such as falsifying occurs in security code, strange land is faked
True and false decision problem under condition, to improve the accuracy rate of product false proof judgement.
Further, it is described based on it is described sell status information and the scanning position information judge the product whether be
Fake products, comprising: the current scanning times of the security code are updated based on the scanning information, the scanning times are this
The sum of the history scanning times of scanning and the security code;Indicate that the product has not sold by the status information of selling, institute
Scanning times are stated less than or equal to preset threshold, and the scanning position information indicate the security code present scanning position and
When history scan position is same position, determine that the product is normal product for sale;Institute is indicated in the status information of selling
It states product to be sold by, the scanning times are less than or equal to the preset threshold, and described in scanning position information expression
When the present scanning position and history scan position of security code are same position, determine that the product is fake products;Described
Selling status information indicates that the product has been sold by, and the scanning times are greater than the preset threshold, and the scan position
Information indicate the security code present scanning position and history scan position be different location when, determine the product for personation
Product.
During above-mentioned realization, using the scanned number of security code as one of judgment basis of authenticity of products, improve
True and false judgment accuracy;Whether further comprehensive scanning number is more than preset threshold, present scanning position and history scanning position
Set whether consistent and product is sold by, judges whether product is normal product for sale, is sentenced to improve authenticity of products
Disconnected accuracy and reliability.
Further, before receiving the expression scanned scanning information of security code, the method also includes: corresponding product
Identification code is generated, the identification code is used to be printed on the packaging of the product or the product;By the identification code and at random
It draws a design and is combined, obtain the security code, it is described to be drawn a design at random as by manually scribbling or passing through algorithm conveniently
The pattern that the mode generated at random generates.
During above-mentioned realization, common identification code and random draw a design are combined acquisition security code, increased
The forgery difficulty of security code, improves the security verified of product.
Further, described to be combined the identification code and random draw a design, obtain the security code, comprising:
Obtain the image at the printing of the security code in preset range;By the identification code, described draw a design and described at random
The physical features of image are combined, and obtain the security code, and the physical features include wrapping paper texture, color, printing leakage
At least one of ink trace mark.
During above-mentioned realization, the group to draw a design in identification code and at random is closed, then by surrounding image at printing
The a part of physical features as security code, further improves the forgery difficulty of security code, and safety is enhanced.
Further, described based on being verified to the security code in the security code image, comprising: from described anti-fake
The security code is extracted in code image;Determining in database whether there is and the matched identifying code of the security code, the target
Identifying code is the identification code for including with the security code in the database, described draws a design at random and the physics
The consistent identifying code of feature;When there are the target verification code, determine that the security code passes through verifying;When there is no described
When target verification code, determine that the security code is unverified.
During above-mentioned realization, draw a design respectively by the identification code of security code, at random and physical features and data
Legal security code, that is, target verification code in library is compared, and determines when there is identical target verification code in the database anti-fake
Code is by verifying, to improve the safety and reliability of anti-fake code check.
Further, after obtaining the security code, the method also includes: it generates and the associated pipe of the security code
Code is managed, the overhead code is managed operation to the product by the overhead code for administrative staff.
During above-mentioned realization, administrative staff is made to carry out the management of product by overhead code, can effectively avoid pipe
Reason personnel improve administrative staff to the efficiency of management of product while leaking security code.
Further, after obtaining the security code, the method also includes: the overhead code is sent to server
At least one of block chain node, enterprise's location block chain link point and warehouse block chain link point, are entering for the product
Library, outbound and/or fake certification and record are carried out to the associated security code of the overhead code and product when selling.
During above-mentioned realization, using block chain technology to the outbound of product, be put in storage, sell and the numbers such as code scaning information
According to progress storage and management, the typing of each related data of product and corresponding security code requires multiple block chain nodes really
Recognize, individual node will be unable to realize the modification to data, and data stability is higher, and having can not tamper and non-repudiation
Property, it is ensured that the uniqueness and authenticity that entire products in circulation are traced to the source.
The embodiment of the present application also provides a kind of product false proof devices, and described device includes: receiving module, for receiving table
Show that the scanned scanning information of security code, the scanning information include security code image, present scanning position, the scan position
Information includes the geographical location information when security code is scanned every time;Authentication module, for being based on the security code image
The security code is verified;State acquisition module, for obtaining the security code pair when the security code passes through verifying
That answers sells status information, and the status information of selling is for indicating whether the corresponding product of the security code is sold by;Judgement
Module, for selling status information and the scanning position information judges whether the product is fake products based on described.
Further, the receiving module further includes that the security code is current to be swept for being updated based on the scanning information
Retouch the scanning times updating unit of number, the scanning times be present scan and the security code history scanning times it
With.The judgment module is specifically used for: indicating that the product has not sold by the status information of selling, the scanning times are small
In or be equal to preset threshold, and the scanning position information indicates the present scanning position and history scan position of the security code
When for same position, determine that the product is normal product for sale;Indicate that the product has been sold in the status information of selling
Out, the scanning times are less than or equal to the preset threshold, and the scanning position information indicates the current of the security code
When scan position and history scan position are same position, determine that the product is fake products;Status information is sold described
Indicate that the product has been sold by, the scanning times are greater than the preset threshold, and described in scanning position information expression
When the present scanning position and history scan position of security code are different location, determine that the product is fake products.
Further, described device further includes security code generation module, and the security code generation module includes: that identification code is raw
At unit, identification code is generated for corresponding product, the identification code is used to be printed on the packaging of the product or the product;
Assembled unit obtains the security code, the random drafting figure for the identification code and random draw a design to be combined
Case is the pattern generated by way of manually scribbling or being generated at random conveniently by algorithm.
Further, the security code generation module further includes physical features image acquisition unit, described anti-for obtaining
Image at the printing of pseudo-code in preset range.The assembled unit is also used to: by the identification code, described being drawn a design at random
And the physical features of described image are combined, and obtain the security code, the physical features include wrapping paper texture, face
At least one of color, printing ink leak trace.
Further, the authentication module includes: extraction unit, described anti-fake for extracting from the security code image
Code;Comparison unit, for determine in database with the presence or absence of with the matched identifying code of the security code, the target verification code is
The identification code that includes with the security code in the database described draws a design and the physical features are uniform at random
The target verification code of cause;Judging unit is verified, for determining that the security code passes through verifying when there are the target verification code,
When the target verification code is not present, determine that the security code is unverified.
Further, described device further include: overhead code generation module, for generating and the associated management of the security code
Code, the overhead code are managed operation to the product by the overhead code for administrative staff.
Further, described device further include: block chain data module, for the overhead code to be sent to server area
At least one of block chain node, enterprise's location block chain link point and warehouse block chain link point, for the product storage,
Outbound and/or fake certification and record are carried out to the associated security code of the overhead code and product when selling.
The embodiment of the present application also provides a kind of electronic equipment, the electronic equipment includes processor and memory, described
Computer program instructions are stored in memory, the processor reads and runs the computer program in the memory
When instruction, the step in any of the above-described the method is executed.
The embodiment of the present application also provides a kind of read/write memory medium, calculating is stored in the read/write memory medium
Machine program instruction when the computer program instructions are read and run by a processor, executes in any of the above-described the method
The step of.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application will make below to required in the embodiment of the present application
Attached drawing is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore should not be seen
Work is the restriction to range, for those of ordinary skill in the art, without creative efforts, can be with
Other relevant attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of flow diagram of antifake method for products provided by the embodiments of the present application;
Fig. 2 is a kind of flow diagram of security code generation step provided by the embodiments of the present application;
Fig. 3 is the flow diagram of another security code generation step provided by the embodiments of the present application;
Fig. 4 is a kind of flow diagram of security code verification step provided by the embodiments of the present application;
Fig. 5 is a kind of structural block diagram of product false proof device provided by the embodiments of the present application;
Fig. 6 is a kind of structural block diagram for the electronic equipment that can be applied to antifake method for products provided by the embodiments of the present application.
Icon: 40- product false proof device;41 receiving modules;42- authentication module;43- state acquisition module;44- judges mould
Block;45- security code generation module;50- electronic equipment;51- memory;52- storage control;53- processor.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application is described.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile the application's
In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
First embodiment
Through the applicant the study found that present anti-counterfeiting technology product market confusion, and existing anti-counterfeiting technology is excessively common,
Often do not have uniqueness and exclusivity, the easy costs such as common anti-fake coating, anti-fake two-dimension code, there are authenticity of products judgements
The problem that accuracy is not high, security code safety is poor.To solve the above-mentioned problems, the embodiment of the present application provides a kind of product
Method for anti-counterfeit.
It should be understood that the executing subject of the antifake method for products in the embodiment of the present application can be for executing product
The processing equipment of each step in method for anti-counterfeit, the processing equipment can be computer, Cloud Server, intelligent terminal or other tools
There is the processing equipment of processing function.
Referring to FIG. 1, Fig. 1 is a kind of flow diagram of antifake method for products provided by the embodiments of the present application.The product
The step of method for anti-counterfeit, can be such that
Step S12: receiving indicates that the scanned scanning information of security code, the scanning information include security code image, sweep
Location information is retouched, the scanning position information includes the geographical location information when security code is scanned every time.
The anti-counterfeit server that can be for carrying out fake certification of scanning information is received in the embodiment of the present application, acquisition is swept
The equipment for retouching information can be the anti-pseudo terminal device that smart phone, security code scanner etc. have shooting function.
Optionally, when user is scanned security code using anti-pseudo terminal device can using with security code is matched answers
With program, present scanning position can be the application program obtain and the anti-pseudo terminal device that uploads when scanning security code i.e.
When location information.
Step S14: the security code is verified based on the security code image.
Step S16: when the security code passes through verifying, obtaining that the security code is corresponding to sell status information, described
Status information is sold for indicating whether the corresponding product of the security code is sold by.
Optionally, the status information of selling of the corresponding product of security code includes to have been sold out state and unsold state, this is sold
The information that does well can store in corresponding database, and be sold by product, receive should in database after corresponding fund
Product sells status information and can be changed to have been sold out state by unsold state.
Step S18: status information is sold and the scanning position information judges whether the product is personation based on described
Product.
In the above-described embodiments, after verifying to security code, security code corresponding product is also sold into status information
And scanning position information is as the reference information for judging authenticity of products, it is contemplated that falsifying occurs in security code, strange land is faked etc.
In the case of true and false decision problem, instant scanning position information when scanning input security code is introduced, so that it is anti-to improve product
The accuracy rate that puppet determines.
For step S12, security code image can be colored, black and white or gray level image.Optionally, due to two dimensional code, item
The security codes such as shape code are required to identify the patterns such as thinner lines, dot matrix in scanning, in order to accurately identify
The resolution ratio of security code in security code image, the security code image used in the present embodiment can be greater than 300*300.
Optionally, scanning position information can position scan position using longitude and latitude, can also be using default
The positioning of products in circulation point progress fixed point.Wherein, pre-set product circulation point can be the warehouse pre-registered, point of sale etc.
The fixation geographical location that product flows into, flows out or sell, meanwhile, the information of pre-set product circulation point can also carry product
In the date and time information that corresponding pre-set product circulation point flows into, flows out or sell.Further, using default circulation point
Positioning method when, if position of the security code except default circulation point is scanned, may determine that the product may palm off production
Product.
For traditional anti-counterfeiting technology, mainly there are laser hologram, laser marking, specialty inks, special paper, conventional digital
It is anti-fake etc..Each product of manufacturing enterprise's production is all endowed unique security code, and it is soft that consumer can be convenient to use identification
Part identifies commodity counterfeit prevention code, and then verifies anti-counterfeiting information of tracing to the source.These technologies are having certain antifalse effect using initial stage, but with
Opening up for application is wide, these technologies are increasingly easy to obtain, and since security code is generally disposed at outside commodity, this is unique anti-
Pseudo-code is easily replicated and fakes for imitated, therefore anti-fake modest efficacy, or at all cannot be anti-fake.Therefore the application is implemented
Further include the generation step of security code in the antifake method for products of example, the security code in the present embodiment have higher uniqueness,
Unforgeable and safety.
Referring to FIG. 2, Fig. 2 is a kind of flow diagram of security code generation step provided by the embodiments of the present application, this is anti-
Pseudo-code generation step may include following sub-step:
Step S21: corresponding product generates identification code, and the identification code is used to be printed on the packet of the product or the product
It loads onto.
It should be understood that the identification code in the present embodiment, which can be but be not limited to two dimensional code, bar code, temperature, becomes anti-fake
Label code, gold stamping antifalsification label code, fragile paper antifalsification label code or other have anti-fraud functional identification code.
Further, packing of this product can be but be not limited to papery packaging, plastics package, carton package or hard
It packs or other is capable of the packaging type of definition printing identification code.
Step S22: the identification code and random draw a design being combined, the security code is obtained, described to draw at random
Pattern is the pattern generated by way of manually scribbling or being generated at random conveniently by algorithm.
In the present embodiment at random drawing a design can be but be not limited to by manually conveniently scribble or by algorithm with
The pattern that the mode that machine generates generates.Wherein, generating pattern at random by algorithm can be completed using OpenCV or other tools,
To improve the formation efficiency of random pattern.
When identification draws a design at random, usually identify that this draws a design at random using image processing method, with data
Verifying is compared in the corresponding random drawing image of the pre-stored identification code in library.It should be understood that random draw figure
Case can be cromogram or grayscale image, while it should have certain transparency, not impact to the identification of identification code.
In the above-described embodiments, it draws a design by the simple identification code of the types such as common two dimensional code, bar code and at random
It is combined acquisition security code, needs to carry out image recognition to drawing a design at random and compare, is known not influencing identification code scanning
The forgery difficulty of security code is increased in other situation, improves the safety of product verified by security code.
In order to further increase the unforgeable of security code, the present embodiment additionally provides a kind of security code generation step,
Referring to FIG. 3, Fig. 3 is the flow diagram of another security code generation step provided by the embodiments of the present application.The security code is raw
It specifically can be such that at step
Step S31: corresponding product generates identification code, and the identification code is used to be printed on the packet of the product or the product
It loads onto.
Step S32: obtaining the image at the printing of the security code in preset range and draws a design at random.
Optionally, the preset range in the present embodiment can be arbitrary default magnitude range, such as by each side of identification code
Edge extends 1 cm range as preset range.Further, which can also be the top from identification code, a following, left side
Certain in, the right is extended on one side or while a few, and development length can be the random length including above-mentioned 1 centimetre.
Step S33: by the identification code, it is described draw a design and the physical features of described image are combined at random,
The security code is obtained, the physical features include at least one of wrapping paper texture, color, printing ink leak trace.
Optionally, physical features are in addition to including the wrapping paper texture of identification code printed perimeter, color, printing ink leak trace,
Can also include printing distinctive skin texture etc. when being formed, combine formation security code can be effectively prevented fake producer's batch duplicating this
Product, because the security code of each product is uniquely, fake producer is difficult one mould one of physical speciality security code periphery
Sample copies to allow system barcode scanning to be verified again, to further improve the unforgeable of security code.
For step S14, in order to improve the accuracy rate and safety of security code verifying, in the present embodiment, swept receiving
After retouching information, the security code image in scanning information can be identified, to the identification code, random in the security code identified
It draws a design and verifying is compared in physical features respectively.Referring to FIG. 4, Fig. 4 is provided by the embodiments of the present application a kind of anti-
The flow diagram of pseudo-code verification step.The security code verification step specifically can be such that
Step S141: the security code is extracted from the security code image.
When security code image carries out image procossing extraction security code, extracting region be can be with identification code plus physics
The region of feature preset range size.
Step S142: determining whether there is in database tests with the matched target verification code of the security code, the target
Card code is the identification code for including with the security code in the database, described draws a design at random and the physics is special
Levy consistent target verification code.
The present embodiment can be carried out successively when carrying out security code and target verification code matches, for example, identifying first anti-fake
Identification code in code, then determines the security code of the corresponding preparatory typing of the identification code, then obtain preparatory typing in the database
Security code in draw a design and physical features at random, identifying drawing a design and preparatory typing at random for current security code
Drawn a design after phase at random, then confirm whether physical features identical as the physical features of preparatory typing.In other embodiments,
Carry out when security code and target verification code match can also simultaneously to identification code, draw a design at random and physical features are tested
Card.Wherein, in database can typing multiple legal security codes in advance, comprising identification code, random in each legal security code
It draws a design and physical features.Meanwhile the identification code of preparatory typing, random draw a design can also be that basis is reflected with physical features
The corresponding storage of relationship is penetrated, to determine corresponding draw a design at random and physical features according to identification code.
Step S143: when there are the target verification code, determine that the security code passes through verifying.
Step S144: when the target verification code is not present, determine that the security code is unverified.
In the above-described embodiments, it draws a design respectively by the identification code of security code, at random and physical features and database
In legal security code be compared, determined when there is identical target verification code in the database security code by verifying, from
And improve the safety and reliability of anti-fake code check.
For step S16, selling status information and being stored in correspondence database for product is receiving security code
Corresponding product sell after payment completion information after, the product in database is sold into status information from unsold state
It is revised as having been sold out state.
In order to further increase Information Security, avoids selling status information or payment completion information etc. and be forged, this reality
Applying example can also be stored and be managed by various information of the block chain technology to product.
Block chain is different from common centralization information storage mechanism, it can be understood as a kind of database of decentralization,
The characteristic of decentralization determines that block chain is safeguarded the opening and equality of data by numerous nodes jointly, and has data
Be difficult to tamper with, retrospective feature, thus in the embodiment of the present application can by block chain technology to the various information of product into
Row storage and management.Platform (anti-counterfeiting system) can be in (whole world, the whole nation, or as required in other regional scopes) first
(block chain node refers to the equipment in block chain network, such as computer, hand to various regions cloud storage point of building more as far as possible
Machine, mine machine, desktop computer and server etc., these block chain nodes constitute the block chain network based on the form of P2P network),
And the cloud in various clouds and enterprise or individual on the market is combined to be cooperated, utilize the increasing pair of respective cloud storage resource
Memory node dispersion is layouted, and is reduced the self-built cloud of plateform system unicity, is not broken through whole memory node chances to lawbreaker,
Guarantee the safe and reliable of data of tracing to the source.
Such as server block chain link point, enterprise's location block chain link point, warehouse block chain link point, shop can be built
For block chain node equal distribution in the block chain node of each department, product is in production factory, storage, outbound and the circulating steps such as sells
In by corresponding block chain node corresponding products in circulation information is issued in block chain so that other block chain nodes can
Typing and verification are carried out to the products in circulation information simultaneously, avoid the occurrence of the feelings of some node fake product or security code information
Condition.Wherein, server block chain link point is the corresponding block chain node of server of entire anti-counterfeiting system, enterprise's location block
Chain node is the corresponding block chain node in enterprise, total library, location.
The working principle of above-mentioned block chain node is illustrated, such as when the security code of product A is logged, system
The real-time positioning automatically generated for security code and generation time, by security code image, in real time positioning and the generation time when generating
As security code as security code information simultaneous transmission to server block chain link point and corresponding enterprise location block chain link
Point in.What the present embodiment improved security code through the above way can not tamper and safety.
When the circulation for sale of N part product, administrative staff carry out barcode scanning one by one to N part product and verify outbound, corresponding
Warehouse block chain link point issues the outbound information of N part product in block chain, server block chain link point, enterprise location
Other block chain nodes such as block chain node, shop block chain link point are confirmed and are stored to the outbound information.
Next, the product A in N part product is sold by shop X, the terminal device of shop X completes the payment of product A
Information is issued in the shop block chain link point of shop X, after other block chain nodes confirm the information, server block chain link point
By product A and its security code it is corresponding to sell status information from unsold status modifier be to have been sold out state, and on block chain
The variation for selling status information is issued, other nodes in block chain network then can sell status information to product A
Variation confirmed and stored.
Similarly, in product when executing other flow-through operations, also corresponding circulation information can be issued in block chain so that
Other block chain links click through row information confirmation and storage, and so on, each product is from factory is produced to purchased end, quilt
Authenticated information is added to each block chain node and by permanent storage, and single block chain node will be unable to realize to information
Modification, thus based on block chain store and verify data stability it is higher, and have can not tamper and non repudiation, can
To guarantee uniqueness and authenticity that entire products in circulation are traced to the source.
In order to enhance the accuracy for verifying authenticity of products by security code, the embodiment of the present application also introduces security code scanning
Number is as judgment basis, i.e. the present embodiment further include: updates the security code current scanning time based on the scanning information
Number, the scanning times are the sum of present scan and the history scanning times of the security code.
It should be understood that the scanning times can be each security code single corresponding coding counter or all anti-fake
The corresponding unified coding counter of code is counted.Optionally, when security code corresponding product circulation sale in the market, consumption
When person is scanned security code using the correspondence application program in the terminal devices such as smart phone, then basis connects coding counter
The scanning information received charges to a barcode scanning verifying number to this security code, while can be according to the scan position in scanning information
The positioning map of geographic location when one security code of Automatic generation of information is scanned.
For step S18, since each product is all based on the mode of the corresponding unique security code of a product in city
It circulates in, therefore the fake products determines that situation specifically can be such that
Situation 1: indicate that the product has not sold by the status information of selling, the scanning times are less than or equal to pre-
If threshold value, and the scanning position information indicates the present scanning position of the security code and history scan position is same position
When, determine that the product is normal product for sale.
Situation 2: indicate that the product has been sold by the status information of selling, the scanning times are less than or equal to institute
Preset threshold is stated, and the scanning position information indicates the present scanning position of the security code and history scan position is same
When position, determine that the product is fake products.
Situation 3: indicate that the product has been sold by the status information of selling, the scanning times are greater than described default
Threshold value, and the scanning position information indicates the present scanning position of the security code and history scan position is different location
When, determine that the product is fake products.
It should be understood that above-mentioned preset threshold can be adaptively adjusted according to the sphere of circulation size of product.
Further, when security code is scanned, it is anti-that server can send this to the terminal device for scanning the security code
The scanned number of pseudo-code, and when product is confirmed as normal product for sale or fake products, phase is sent to terminal device
The authenticity of products prompt information answered, so that consumer rationally judges product in the true and false based on above- mentioned information.
It should be understood that in addition to the scanned number of security code, security code scanned date and time every time, and
Current Scan date and time can send and show to terminal device, carry out very so that consumer is based on the date and time
Puppet judgement.
In the present embodiment, it using the scanned number of security code as one of judgment basis of authenticity of products, improves true
Pseudo- judgment accuracy;Whether further comprehensive scanning number is more than that preset threshold, present scanning position and history scan position are
Whether no consistent and product is sold by, and judges whether product is normal product for sale, to improve authenticity of products judgement
Accuracy and reliability.Meanwhile after preventing fake producer from taking one of security code product progress batch duplicating production, same
Place is distributed to multiple places and carries out this security code product sales behavior.
It should be understood that security code, during inside generates and is managed personnel's use, there is also leakage wind
Danger, therefore the embodiment of the present application can also generate after security code generation and be used to manage with the associated overhead code of security code, overhead code
Reason personnel are managed operation to the product by the overhead code.
When enterprise one by one takes pictures security code or infrared scan is entered into the server of anti-counterfeiting system, server understands these
The visible original fake certification code generated is stored directly in corporate boss's account database, this corporate boss's account database only has
Corporate boss or particular account number can check, while can automatically generate one and visible with the associated overhead code of original security code and protect
There are in account executive system, administrative staff can not see the apperance of true original security code, but can be on account executive
Security code is checked, quantity in stock statistics etc. management works, can be very good to prevent internal staff in this way security code
Other fake producers are copied or be leaked in advance, avoid causing huge brand credit influence and economic loss to enterprise.
Further, in order to prevent falsifying the occurrence of, enterprise takes pictures one by one to newly-generated security code or infrared sweeps
It retouches after being entered into lane database, each purchase channel quotient account can be added in the enterprise's main account of oneself again, automatically will
This enterprise's main account is bound with purchase channel quotient's account, when purchase channel quotient directly enters the account of oneself, so that it may see
To N number of different product list oneself acted on behalf of, purchase channel quotient can be used unified terminal device carry out barcode scanning verifying with
And the operation such as purchase, the return of goods, storage, outbound, logistics enquiring.
When enterprise delivers product to some purchase channel quotient, inquiry determines corresponding purchase channel quotient account first, right
Product of delivering carries out barcode scanning one by one and verifies outbound, the product of at this moment institute's useful purchase channel quotient account barcode scanning verifying outbound it is right
The security code answered all can in this purchase channel quotient's account, enterprise's main account can be clearly apparent with administrator's account for typing one by one
Any dynamic in account, the terminal device that purchase channel quotient opens oneself also can directly be seen that enterprise has delivered to oneself
The information such as quantity.
When product arrival, purchase channel quotient verifies the true and false by carrying out barcode scanning to every arrival product, and confirmation is genuine piece
Afterwards, the product that rigid barcode scanning is verified is entered into the commodity library of purchase channel quotient by server, when purchase channel quotient production for sale
It is every to sell away one when product, the product inventory and purchase channel quotient oneself that enterprise's main account and administrator's account can inquire
Inventory will reduce one simultaneously, enterprise's main account can be with any trend of the sold product of real time inspection purchase channel quotient, such as
When the product of the one of purchase channel quotient storage of fruit is beyond sales range is allowed, enterprise's main account can receive this canal of stocking up
Road quotient's abnormal prompt can effectively control the sales behavior in each region of product in this way.
In addition, product consumer in sale is also based on security code and pays, therefore canal of stocking up in the present embodiment
When buying enterprise product commercially available from road, enterprise's main account can preset the rate of gross profit of purchase channel quotient, if consumer on line according to
After the payment of product institute target price, server can be assigned to directly according to enterprise's main account feed preset gross profit of goods distributor and be stocked up
Money of stocking up need not be all paid in distributor's account or even after purchase channel quotient, it is only necessary to a small cash pledge can buy goods,
This mode is that enterprise directly spreads goods at purchase channel quotient, and the fund for often selling a commodity is all introduced into enterprise's main account
On, then the profit of purchase channel quotient calculated to corresponding purchase channel quotient.
Further, enterprise's main account one by one takes pictures the security code of generation or when infrared scan typing server, service
Device can be automatically to the security code allocated code counter, positioning generator and binding enterprise's collecting account of each new typing.When this
When market circulation is sold, when consumer makes to carry out barcode scanning verifying, the terminal device of consumer receives security code corresponding product
Prompt show security code the scanned number in same place, this product to mid-sales and support barcode scanning verifying direct payment purchase
It buys, it is normal product for sale that system, which can prompt this commodity of consumer, can trust purchase.Because of the security code of each product
It is bound with the sale collecting account of enterprise, the money as long as the direct validation of payment of this security code of consumer scans is done shopping, shopping money is same
On the sale collecting account that direct payment is bound to enterprise.To make adulterator forge others' commodity, consumer is directly scanned
When security code buys product and payment, on the sale collecting account of payment for goods direct payment to binding enterprise, directly prevent to make
False possibility.
Second embodiment
In order to cooperate the antifake method for products of the embodiment of the present application, it is anti-that the application second embodiment additionally provides a kind of product
Pseudo-device 40.
Referring to FIG. 5, Fig. 5 is a kind of structural block diagram of product false proof device provided by the embodiments of the present application.
Product false proof device 40 includes receiving module 41, authentication module 42, state acquisition module 43 and judgment module 44.
Receiving module 41 indicates the scanned scanning information of security code for receiving, and the scanning information includes security code
Image, scanning position information, the scanning position information include the geographical location information when security code is scanned every time.
Authentication module 42, for being verified based on the security code image to the security code.
State acquisition module 43, for obtaining when the security code passes through verifying, the security code is corresponding to sell shape
State information, the status information of selling is for indicating whether the corresponding product of the security code is sold by;
Judgment module 44, for selling status information and whether the scanning position information judges the product based on described
For fake products.
Further, receiving module 41 further includes for updating the current scanning of the security code based on the scanning information
The scanning times updating unit of number, the scanning times are the sum of present scan and the history scanning times of the security code.
Then judgment module 44 is used for: indicating that the product has not sold by the status information of selling, the scanning times are less than or wait
In preset threshold, and the scanning position information indicates the present scanning position of the security code and history scan position is same
When position, determine that the product is normal product for sale;Indicate that the product has been sold by the status information of selling, it is described
Scanning times are less than or equal to the preset threshold, and the scanning position information indicates the present scanning position of the security code
With history scan position be same position when, determine the product be fake products;It is sold described in status information expression described
Product has been sold by, and the scanning times are greater than the preset threshold, and the scanning position information indicates the security code
When present scanning position and history scan position are different location, determine that the product is fake products.
Product false proof device 40 can also include security code generation module 45, and security code generation module 45 is raw including identification code
At unit, assembled unit.
Wherein, identification code generation unit generates identification code for corresponding product, and the identification code is for being printed on the production
In the packaging of product or the product.Assembled unit, for the identification code and random draw a design to be combined, described in acquisition
Security code, it is described to be drawn a design at random as the pattern generated by way of manually scribbling or being generated at random by algorithm conveniently.
Further, security code generation module 45 can also include physical features image acquisition unit, described for obtaining
Image at the printing of security code in preset range.Then the assembled unit is also used to: by the identification code, the random drafting
Pattern and the physical features of described image are combined, and obtain the security code, the physical features include wrapping paper texture,
At least one of color, printing ink leak trace.
Authentication module 42 includes extraction unit, comparison unit and verifying judging unit.
Wherein, extraction unit, for extracting the security code from the security code image.
Comparison unit is tested for determining to whether there is in database with the matched identifying code of the security code, the target
Card code is the identification code for including with the security code in the database, described draws a design at random and the physics is special
Levy consistent target verification code.
Judging unit is verified, for determining that the security code by verifying, is not being deposited when there are the target verification code
In the target verification code, determine that the security code is unverified.
Product false proof device 40 can also include overhead code generation module, for generating and the associated management of the security code
Code, the overhead code are managed operation to the product by the overhead code for administrative staff.
Further, product false proof device 40 can also include block chain data module, for sending the overhead code
At least one of to server block chain link point, enterprise's location block chain link point and warehouse block chain link point, for described
Product in storage, outbound and/or carries out fake certification and record to the associated security code of the overhead code and product when selling.
3rd embodiment
Referring to FIG. 6, Fig. 6 is a kind of electronic equipment that can be applied to antifake method for products provided by the embodiments of the present application
Structural block diagram.
Electronic equipment 50 provided in this embodiment may include product false proof device 40, memory 51, storage control 52,
Processor 53.
The memory 51, storage control 52, each element of processor 53 are directly or indirectly electrically connected between each other,
To realize the transmission or interaction of data.For example, these elements can pass through one or more communication bus or signal wire between each other
It realizes and is electrically connected.The product false proof device 40 includes that at least one can be stored in the form of software or firmware (firmware)
In the memory 51 or the software function that is solidificated in the operating system (operating system, OS) of electronic equipment 50
Module.The processor 53 is used to execute the executable module stored in memory 51, such as product false proof device 40 includes
Software function module or computer program.
Wherein, memory 51 may be, but not limited to, random access memory (Random Access Memory,
RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable Read-Only
Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM),
Electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc..
Wherein, memory 51 is for storing program, and the processor 53 executes described program after receiving and executing instruction, and aforementioned
Method performed by the server that the stream process that inventive embodiments any embodiment discloses defines can be applied in processor 53,
Or it is realized by processor 53.
Processor 53 can be a kind of IC chip, the processing capacity with signal.Above-mentioned processor 53 can be with
It is general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network processing unit
(Network Processor, abbreviation NP) etc.;Can also be digital signal processor (DSP), specific integrated circuit (ASIC),
Ready-made programmable gate array (FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hard
Part component.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.General processor
It can be microprocessor or the processor 53 be also possible to any conventional processor etc..
In conclusion the embodiment of the present application provides a kind of antifake method for products, device, electronic equipment and storage can be read
Medium, which comprises receive indicate the scanned scanning information of security code, the scanning information include security code image,
Scanning position information, the scanning position information include the geographical location information when security code is scanned every time;Based on institute
Security code image is stated to verify the security code;When the security code passes through verifying, it is corresponding to obtain the security code
Status information is sold, the status information of selling is for indicating whether the corresponding product of the security code is sold by;Based on described
It sells status information and the scanning position information judges whether the product is fake products.
During above-mentioned realization, not only security code is verified, also by security code it is corresponding sell status information with
And scanning position information is as the reference information for judging authenticity of products, it is contemplated that the feelings such as falsifying occurs in security code, strange land is faked
True and false decision problem under condition, to improve the accuracy rate of product false proof judgement.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through
Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing
Show the device of multiple embodiments according to the application, the architectural framework in the cards of method and computer program product,
Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code
Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held
Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement
The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes
It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart
The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement
It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the application can integrate one independent portion of formation together
Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module
It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of the steps.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
The above description is only an example of the present application, the protection scope being not intended to limit this application, for ability
For the technical staff in domain, various changes and changes are possible in this application.Within the spirit and principles of this application, made
Any modification, equivalent substitution, improvement and etc. should be included within the scope of protection of this application.It should also be noted that similar label and
Letter indicates similar terms in following attached drawing, therefore, once it is defined in a certain Xiang Yi attached drawing, then in subsequent attached drawing
In do not need that it is further defined and explained.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any
Those familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all contain
Lid is within the scope of protection of this application.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
Claims (10)
1. a kind of antifake method for products, which is characterized in that the described method includes:
Receiving indicates the scanned scanning information of security code, and the scanning information includes security code image, scanning position information, institute
Stating scanning position information includes the geographical location information when security code is scanned every time;
The security code is verified based on the security code image;
When the security code passes through verifying, obtain that the security code is corresponding to sell status information, it is described to sell status information
For indicating whether the corresponding product of the security code is sold by;
Status information is sold and the scanning position information judges whether the product is fake products based on described.
2. antifake method for products according to claim 1, which is characterized in that described to sell status information and institute based on described
It states scanning position information and judges whether the product is fake products, comprising:
The current scanning times of the security code are updated based on the scanning information, and the scanning times are present scan and described
The sum of history scanning times of security code;
Indicating that the product has not sold by the status information of selling, the scanning times are less than or equal to preset threshold, and
The scanning position information indicate the security code present scanning position and history scan position be same position when, determine institute
Stating product is normal product for sale;
Indicate that the product has been sold by the status information of selling, the scanning times are less than or equal to the default threshold
Value, and the scanning position information indicate the security code present scanning position and history scan position be same position when,
Determine that the product is fake products;
Indicate that the product has been sold by the status information of selling, the scanning times are greater than the preset threshold, and institute
State scanning position information indicate the security code present scanning position and history scan position be different location when, determine described in
Product is fake products.
3. antifake method for products according to claim 1, which is characterized in that indicate the scanned scanning of security code receiving
Before information, the method also includes:
Corresponding product generates identification code, and the identification code is used to be printed on the packaging of the product or the product;
The identification code and random draw a design are combined, the security code is obtained, it is described to draw a design at random to pass through
The artificial pattern scribbled or generated in such a way that algorithm generates at random conveniently.
4. antifake method for products according to claim 3, which is characterized in that described to scheme the identification code with random draw
Case is combined, and obtains the security code, comprising:
Obtain the image at the printing of the security code in preset range;
By the identification code, it is described draw a design and the physical features of described image are combined at random, obtain described anti-fake
Code, the physical features include at least one of wrapping paper texture, color, printing ink leak trace.
5. antifake method for products according to claim 4, which is characterized in that described to be based in the security code image to institute
Security code is stated to be verified, comprising:
The security code is extracted from the security code image;
Determine in database with the presence or absence of with the matched target verification code of the security code, the target verification code be the data
The identification code that includes with the security code in library described draws a design and the consistent verifying of the physical features at random
Code;
When there are the target verification code, determine that the security code passes through verifying;
When the target verification code is not present, determine that the security code is unverified.
6. antifake method for products according to claim 3, which is characterized in that after obtaining the security code, the side
Method further include:
It generates and is used for administrative staff by the overhead code to the production with the associated overhead code of the security code, the overhead code
Product are managed operation.
7. antifake method for products according to claim 6, which is characterized in that after obtaining the security code, the side
Method further include:
The overhead code is sent in server block chain link point, enterprise's location block chain link point and warehouse block chain link point
At least one, for the product storage, outbound and/or when selling to the associated security code of the overhead code and product into
Row fake certification and record.
8. a kind of product false proof device, which is characterized in that described device includes:
Receiving module indicates that the scanned scanning information of security code, the scanning information include security code image, sweep for receiving
Location information is retouched, the scanning position information includes the geographical location information when security code is scanned every time;
Authentication module, for being verified based on the security code image to the security code;
State acquisition module, the security code is corresponding to sell status information for obtaining when the security code passes through verifying,
The status information of selling is for indicating whether the corresponding product of the security code is sold by;
Judgment module, for selling status information and the scanning position information judges whether the product is personation based on described
Product.
9. a kind of electronic equipment, which is characterized in that the electronic equipment includes processor and memory, is stored in the memory
There are computer program instructions, when the processor reads and runs the computer program instructions in the memory, executes
Step in any one of claim 1-7 the method.
10. a kind of read/write memory medium, which is characterized in that be stored with computer program in the read/write memory medium and refer to
It enables, when the computer program instructions are read and run by a processor, perform claim is required in any one of 1-7 the method
Step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910248371.4A CN109949058A (en) | 2019-03-29 | 2019-03-29 | Antifake method for products, device, electronic equipment and read/write memory medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910248371.4A CN109949058A (en) | 2019-03-29 | 2019-03-29 | Antifake method for products, device, electronic equipment and read/write memory medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109949058A true CN109949058A (en) | 2019-06-28 |
Family
ID=67012988
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910248371.4A Pending CN109949058A (en) | 2019-03-29 | 2019-03-29 | Antifake method for products, device, electronic equipment and read/write memory medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109949058A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110472522A (en) * | 2019-07-25 | 2019-11-19 | 徐竹范 | Intermediary assists method for anti-counterfeit, recognition methods and identification device |
CN111027986A (en) * | 2019-12-02 | 2020-04-17 | 深圳市智微智能软件开发有限公司 | Anti-counterfeiting code verification method and system |
CN111210238A (en) * | 2020-01-13 | 2020-05-29 | 杭州沃朴物联科技有限公司 | Warranty registration method, warranty registration device, warranty registration apparatus, and warranty registration medium |
CN111597265A (en) * | 2020-05-15 | 2020-08-28 | 无锡珍岛智能技术有限公司 | E-commerce commodity anti-counterfeiting traceability management system based on block chain |
CN111815335A (en) * | 2020-06-11 | 2020-10-23 | 兰州集智信息技术有限公司 | Service platform and method for judging authenticity of product |
CN112346097A (en) * | 2020-10-26 | 2021-02-09 | 成都商通时代数字科技有限公司 | System and method for precisely managing positions of high-end white spirits by block chain and GPS (global positioning system) |
CN113129030A (en) * | 2021-04-06 | 2021-07-16 | 南京质子链科技有限公司 | Calligraphy and painting anti-counterfeiting transaction platform and method based on block chain and paper pattern recognition |
CN113723968A (en) * | 2021-07-30 | 2021-11-30 | 浙江工商大学 | Cubilose anti-counterfeiting tracing method based on block chain |
CN114529315A (en) * | 2022-02-23 | 2022-05-24 | 南京第壹时间信息科技有限公司 | Verification method and device based on Internet |
CN114943544A (en) * | 2022-05-19 | 2022-08-26 | 南京数睿数据科技有限公司 | Verification information sending method and device, electronic equipment and computer readable medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103761799A (en) * | 2014-01-13 | 2014-04-30 | 王波 | Bill anti-counterfeit method and device based on texture image characteristics |
CN103870862A (en) * | 2014-03-03 | 2014-06-18 | 汤永平 | Method for realizing anti-counterfeiting effect by separated graph random combination and realization thereof |
CN104700284A (en) * | 2015-04-03 | 2015-06-10 | 周勇 | Commodity identity monitoring and anti-counterfeiting method |
CN105303223A (en) * | 2015-11-18 | 2016-02-03 | 广东正迪科技股份有限公司 | Random image anti-fake conflict logistics logo preparation method, logos and identification method |
CN106485509A (en) * | 2016-10-12 | 2017-03-08 | 广州云溯科技有限公司 | A kind of commodity multi-stage authentication anti-fake traceability system based on Quick Response Code and method |
CN106682917A (en) * | 2016-12-29 | 2017-05-17 | 马军 | Artwork authentication and transaction method and system based on digital signature |
CN107451820A (en) * | 2016-04-29 | 2017-12-08 | 卢念秋 | On line, multiple, dynamic anti-fake under line, anti-channel conflict, can traceability system |
CN107491973A (en) * | 2017-09-30 | 2017-12-19 | 特兰旗(厦门)科技有限公司 | Product false proof management system and method |
-
2019
- 2019-03-29 CN CN201910248371.4A patent/CN109949058A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103761799A (en) * | 2014-01-13 | 2014-04-30 | 王波 | Bill anti-counterfeit method and device based on texture image characteristics |
CN103870862A (en) * | 2014-03-03 | 2014-06-18 | 汤永平 | Method for realizing anti-counterfeiting effect by separated graph random combination and realization thereof |
CN104700284A (en) * | 2015-04-03 | 2015-06-10 | 周勇 | Commodity identity monitoring and anti-counterfeiting method |
CN105303223A (en) * | 2015-11-18 | 2016-02-03 | 广东正迪科技股份有限公司 | Random image anti-fake conflict logistics logo preparation method, logos and identification method |
CN107451820A (en) * | 2016-04-29 | 2017-12-08 | 卢念秋 | On line, multiple, dynamic anti-fake under line, anti-channel conflict, can traceability system |
CN106485509A (en) * | 2016-10-12 | 2017-03-08 | 广州云溯科技有限公司 | A kind of commodity multi-stage authentication anti-fake traceability system based on Quick Response Code and method |
CN106682917A (en) * | 2016-12-29 | 2017-05-17 | 马军 | Artwork authentication and transaction method and system based on digital signature |
CN107491973A (en) * | 2017-09-30 | 2017-12-19 | 特兰旗(厦门)科技有限公司 | Product false proof management system and method |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110472522A (en) * | 2019-07-25 | 2019-11-19 | 徐竹范 | Intermediary assists method for anti-counterfeit, recognition methods and identification device |
CN111027986A (en) * | 2019-12-02 | 2020-04-17 | 深圳市智微智能软件开发有限公司 | Anti-counterfeiting code verification method and system |
CN111210238A (en) * | 2020-01-13 | 2020-05-29 | 杭州沃朴物联科技有限公司 | Warranty registration method, warranty registration device, warranty registration apparatus, and warranty registration medium |
CN111210238B (en) * | 2020-01-13 | 2023-10-20 | 杭州沃朴物联科技有限公司 | Quality assurance registering method, device, equipment and medium |
CN111597265B (en) * | 2020-05-15 | 2023-06-09 | 无锡珍岛智能技术有限公司 | Block chain-based electronic commerce commodity anti-counterfeiting traceability management system |
CN111597265A (en) * | 2020-05-15 | 2020-08-28 | 无锡珍岛智能技术有限公司 | E-commerce commodity anti-counterfeiting traceability management system based on block chain |
CN111815335A (en) * | 2020-06-11 | 2020-10-23 | 兰州集智信息技术有限公司 | Service platform and method for judging authenticity of product |
CN112346097A (en) * | 2020-10-26 | 2021-02-09 | 成都商通时代数字科技有限公司 | System and method for precisely managing positions of high-end white spirits by block chain and GPS (global positioning system) |
CN113129030A (en) * | 2021-04-06 | 2021-07-16 | 南京质子链科技有限公司 | Calligraphy and painting anti-counterfeiting transaction platform and method based on block chain and paper pattern recognition |
CN113723968A (en) * | 2021-07-30 | 2021-11-30 | 浙江工商大学 | Cubilose anti-counterfeiting tracing method based on block chain |
CN114529315A (en) * | 2022-02-23 | 2022-05-24 | 南京第壹时间信息科技有限公司 | Verification method and device based on Internet |
CN114529315B (en) * | 2022-02-23 | 2023-12-26 | 南京第壹时间信息科技有限公司 | Verification method and device based on Internet |
CN114943544A (en) * | 2022-05-19 | 2022-08-26 | 南京数睿数据科技有限公司 | Verification information sending method and device, electronic equipment and computer readable medium |
CN114943544B (en) * | 2022-05-19 | 2024-04-23 | 南京数睿数据科技有限公司 | Verification information transmitting method, device, electronic equipment and computer readable medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109949058A (en) | Antifake method for products, device, electronic equipment and read/write memory medium | |
US7996319B2 (en) | Authentication and tracking system | |
US8615470B2 (en) | Authentication and tracking system | |
WO2019062377A1 (en) | Product anti-counterfeiting management system and method | |
CN111587445A (en) | Security tag | |
CN105046504A (en) | Multiple key checking, inspection and forgery prevention source forming method and forgery prevention label | |
CN102129637A (en) | Commodity anti-counterfeiting method based on security mechanism | |
CN102708391B (en) | A kind of antifalsification label based on fractal graph and anti-counterfeit authentication method | |
KR20060009874A (en) | Method for tracking and tracing marked articles | |
CN105190663A (en) | System for authenticating items | |
CN105678369A (en) | Anti-counterfeiting-tag-based anti-counterfeiting method for commodity | |
CN202512601U (en) | Commodity anti-counterfeit bar code | |
CN102722824A (en) | Method for distinguishing authenticity of goods by using bar codes | |
CN108604261A (en) | For preventing the method and system that product is sold on online website without permission | |
US20130317996A1 (en) | Systems and Methods for Tracking Status of Random Unique Code Strings and Generation of Random Unique Code Strings | |
US20130024387A1 (en) | Systems and Methods for Tracking Assigned Code Strings | |
Ting et al. | A two-factor authentication system using radio frequency identification and watermarking technology | |
CN108985431B (en) | Anti-counterfeit label and method for detecting and identifying genuine goods of registered trademark | |
CN114169476A (en) | Quantum anti-counterfeiting tracing method and system based on security chip | |
CN108154207A (en) | The anti-pseudo-unique code generation of one kind and anti-counterfeit authentication method | |
CN1331455A (en) | Antiforge electronic label scanned over network for commodites and its making method | |
CN1670753A (en) | Real-time anti-false searching system and anti-false discriminating method thereof | |
CN112070567A (en) | Quality control system based on block chain and control method thereof | |
CN106815614A (en) | A kind of bank acceptance Antiforge system of use NFC anti-counterfeiting technologies | |
CN104616391B (en) | Note validating method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190628 |
|
RJ01 | Rejection of invention patent application after publication |