CN109949058A - Antifake method for products, device, electronic equipment and read/write memory medium - Google Patents

Antifake method for products, device, electronic equipment and read/write memory medium Download PDF

Info

Publication number
CN109949058A
CN109949058A CN201910248371.4A CN201910248371A CN109949058A CN 109949058 A CN109949058 A CN 109949058A CN 201910248371 A CN201910248371 A CN 201910248371A CN 109949058 A CN109949058 A CN 109949058A
Authority
CN
China
Prior art keywords
security code
product
code
scanning
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910248371.4A
Other languages
Chinese (zh)
Inventor
吴泽亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Special Lanqi (xiamen) Technology Co Ltd
Original Assignee
Special Lanqi (xiamen) Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Special Lanqi (xiamen) Technology Co Ltd filed Critical Special Lanqi (xiamen) Technology Co Ltd
Priority to CN201910248371.4A priority Critical patent/CN109949058A/en
Publication of CN109949058A publication Critical patent/CN109949058A/en
Pending legal-status Critical Current

Links

Landscapes

  • Credit Cards Or The Like (AREA)

Abstract

The embodiment of the present application provides a kind of antifake method for products, device, electronic equipment and read/write memory medium, is related to product false proof identification technology field.The antifake method for products includes: to receive to indicate the scanned scanning information of security code, and scanning information includes security code image, scanning position information, and scanning position information includes geographical location information when security code is scanned every time;Security code is verified based on security code image;It when security code passes through verifying, obtains that security code is corresponding sells status information, sells status information for indicating whether the corresponding product of security code is sold by;Based on selling status information and scanning position information judges whether product is fake products.This method is verified by security code and security code is corresponding sells status information and scanning position information judges whether product is fake products, security code is considered mostly or single place is scanned judge bring Different Effects to fake products, improves the accuracy rate that product false proof determines.

Description

Antifake method for products, device, electronic equipment and read/write memory medium
Technical field
This application involves product false proofs to identify field, sets in particular to a kind of antifake method for products, device, electronics Standby and read/write memory medium.
Background technique
Pursuing economic interests instantly, interests of the fake and forged phenomenon in addition to damaging consumer, also to each brand band The serious damage in fame and prestige is carried out, or even consumer is allowed to lose the trust to brand.Anti-counterfeiting technology is reasonably utilized, The powerful mean of maintaining enterprise brand interests and consumers' rights and interests, for traditional anti-counterfeiting technology, mainly have laser hologram, Laser marking, specialty inks, special paper, conventional digital are anti-fake etc., and each product of manufacturing enterprise's production is all endowed only One security code, consumer can be convenient to use identification software identification product false proof code, and then verify anti-counterfeiting information of tracing to the source.These Technology is having certain antifalse effect using initial stage, but as opening up for application is wide, these technologies are increasingly easy to obtain, due to anti-fake Code is generally disposed at outside product, therefore unique security code is easily replicated and fakes for imitated, therefore anti-fake effect Limited, or at all cannot be anti-fake, antifalse effect situations such as in particular for falsifying, nonlocal fake products be poor, and personation produces Product discrimination is lower.
Summary of the invention
In view of this, the embodiment of the present application is designed to provide a kind of antifake method for products, device, electronic equipment and can Storage medium is read, fake products recognition accuracy existing for existing method for anti-counterfeit is lower and existing method for anti-counterfeit side to improve For the problem of effect difference.
The embodiment of the present application provides a kind of antifake method for products, which comprises receiving indicates that security code is scanned Scanning information, the scanning information includes security code image, present scanning position, and the scanning position information includes described anti- Geographical location information when pseudo-code is scanned every time;The security code is verified based on the security code image;When described When security code passes through verifying, obtain that the security code is corresponding to sell status information, the status information of selling is for indicating institute State whether the corresponding product of security code is sold by;Status information is sold and the scanning position information judges the production based on described Whether product are fake products.
During above-mentioned realization, not only security code is verified, also by security code it is corresponding sell status information with And scanning position information is as the reference information for judging authenticity of products, it is contemplated that the feelings such as falsifying occurs in security code, strange land is faked True and false decision problem under condition, to improve the accuracy rate of product false proof judgement.
Further, it is described based on it is described sell status information and the scanning position information judge the product whether be Fake products, comprising: the current scanning times of the security code are updated based on the scanning information, the scanning times are this The sum of the history scanning times of scanning and the security code;Indicate that the product has not sold by the status information of selling, institute Scanning times are stated less than or equal to preset threshold, and the scanning position information indicate the security code present scanning position and When history scan position is same position, determine that the product is normal product for sale;Institute is indicated in the status information of selling It states product to be sold by, the scanning times are less than or equal to the preset threshold, and described in scanning position information expression When the present scanning position and history scan position of security code are same position, determine that the product is fake products;Described Selling status information indicates that the product has been sold by, and the scanning times are greater than the preset threshold, and the scan position Information indicate the security code present scanning position and history scan position be different location when, determine the product for personation Product.
During above-mentioned realization, using the scanned number of security code as one of judgment basis of authenticity of products, improve True and false judgment accuracy;Whether further comprehensive scanning number is more than preset threshold, present scanning position and history scanning position Set whether consistent and product is sold by, judges whether product is normal product for sale, is sentenced to improve authenticity of products Disconnected accuracy and reliability.
Further, before receiving the expression scanned scanning information of security code, the method also includes: corresponding product Identification code is generated, the identification code is used to be printed on the packaging of the product or the product;By the identification code and at random It draws a design and is combined, obtain the security code, it is described to be drawn a design at random as by manually scribbling or passing through algorithm conveniently The pattern that the mode generated at random generates.
During above-mentioned realization, common identification code and random draw a design are combined acquisition security code, increased The forgery difficulty of security code, improves the security verified of product.
Further, described to be combined the identification code and random draw a design, obtain the security code, comprising: Obtain the image at the printing of the security code in preset range;By the identification code, described draw a design and described at random The physical features of image are combined, and obtain the security code, and the physical features include wrapping paper texture, color, printing leakage At least one of ink trace mark.
During above-mentioned realization, the group to draw a design in identification code and at random is closed, then by surrounding image at printing The a part of physical features as security code, further improves the forgery difficulty of security code, and safety is enhanced.
Further, described based on being verified to the security code in the security code image, comprising: from described anti-fake The security code is extracted in code image;Determining in database whether there is and the matched identifying code of the security code, the target Identifying code is the identification code for including with the security code in the database, described draws a design at random and the physics The consistent identifying code of feature;When there are the target verification code, determine that the security code passes through verifying;When there is no described When target verification code, determine that the security code is unverified.
During above-mentioned realization, draw a design respectively by the identification code of security code, at random and physical features and data Legal security code, that is, target verification code in library is compared, and determines when there is identical target verification code in the database anti-fake Code is by verifying, to improve the safety and reliability of anti-fake code check.
Further, after obtaining the security code, the method also includes: it generates and the associated pipe of the security code Code is managed, the overhead code is managed operation to the product by the overhead code for administrative staff.
During above-mentioned realization, administrative staff is made to carry out the management of product by overhead code, can effectively avoid pipe Reason personnel improve administrative staff to the efficiency of management of product while leaking security code.
Further, after obtaining the security code, the method also includes: the overhead code is sent to server At least one of block chain node, enterprise's location block chain link point and warehouse block chain link point, are entering for the product Library, outbound and/or fake certification and record are carried out to the associated security code of the overhead code and product when selling.
During above-mentioned realization, using block chain technology to the outbound of product, be put in storage, sell and the numbers such as code scaning information According to progress storage and management, the typing of each related data of product and corresponding security code requires multiple block chain nodes really Recognize, individual node will be unable to realize the modification to data, and data stability is higher, and having can not tamper and non-repudiation Property, it is ensured that the uniqueness and authenticity that entire products in circulation are traced to the source.
The embodiment of the present application also provides a kind of product false proof devices, and described device includes: receiving module, for receiving table Show that the scanned scanning information of security code, the scanning information include security code image, present scanning position, the scan position Information includes the geographical location information when security code is scanned every time;Authentication module, for being based on the security code image The security code is verified;State acquisition module, for obtaining the security code pair when the security code passes through verifying That answers sells status information, and the status information of selling is for indicating whether the corresponding product of the security code is sold by;Judgement Module, for selling status information and the scanning position information judges whether the product is fake products based on described.
Further, the receiving module further includes that the security code is current to be swept for being updated based on the scanning information Retouch the scanning times updating unit of number, the scanning times be present scan and the security code history scanning times it With.The judgment module is specifically used for: indicating that the product has not sold by the status information of selling, the scanning times are small In or be equal to preset threshold, and the scanning position information indicates the present scanning position and history scan position of the security code When for same position, determine that the product is normal product for sale;Indicate that the product has been sold in the status information of selling Out, the scanning times are less than or equal to the preset threshold, and the scanning position information indicates the current of the security code When scan position and history scan position are same position, determine that the product is fake products;Status information is sold described Indicate that the product has been sold by, the scanning times are greater than the preset threshold, and described in scanning position information expression When the present scanning position and history scan position of security code are different location, determine that the product is fake products.
Further, described device further includes security code generation module, and the security code generation module includes: that identification code is raw At unit, identification code is generated for corresponding product, the identification code is used to be printed on the packaging of the product or the product; Assembled unit obtains the security code, the random drafting figure for the identification code and random draw a design to be combined Case is the pattern generated by way of manually scribbling or being generated at random conveniently by algorithm.
Further, the security code generation module further includes physical features image acquisition unit, described anti-for obtaining Image at the printing of pseudo-code in preset range.The assembled unit is also used to: by the identification code, described being drawn a design at random And the physical features of described image are combined, and obtain the security code, the physical features include wrapping paper texture, face At least one of color, printing ink leak trace.
Further, the authentication module includes: extraction unit, described anti-fake for extracting from the security code image Code;Comparison unit, for determine in database with the presence or absence of with the matched identifying code of the security code, the target verification code is The identification code that includes with the security code in the database described draws a design and the physical features are uniform at random The target verification code of cause;Judging unit is verified, for determining that the security code passes through verifying when there are the target verification code, When the target verification code is not present, determine that the security code is unverified.
Further, described device further include: overhead code generation module, for generating and the associated management of the security code Code, the overhead code are managed operation to the product by the overhead code for administrative staff.
Further, described device further include: block chain data module, for the overhead code to be sent to server area At least one of block chain node, enterprise's location block chain link point and warehouse block chain link point, for the product storage, Outbound and/or fake certification and record are carried out to the associated security code of the overhead code and product when selling.
The embodiment of the present application also provides a kind of electronic equipment, the electronic equipment includes processor and memory, described Computer program instructions are stored in memory, the processor reads and runs the computer program in the memory When instruction, the step in any of the above-described the method is executed.
The embodiment of the present application also provides a kind of read/write memory medium, calculating is stored in the read/write memory medium Machine program instruction when the computer program instructions are read and run by a processor, executes in any of the above-described the method The step of.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application will make below to required in the embodiment of the present application Attached drawing is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore should not be seen Work is the restriction to range, for those of ordinary skill in the art, without creative efforts, can be with Other relevant attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of flow diagram of antifake method for products provided by the embodiments of the present application;
Fig. 2 is a kind of flow diagram of security code generation step provided by the embodiments of the present application;
Fig. 3 is the flow diagram of another security code generation step provided by the embodiments of the present application;
Fig. 4 is a kind of flow diagram of security code verification step provided by the embodiments of the present application;
Fig. 5 is a kind of structural block diagram of product false proof device provided by the embodiments of the present application;
Fig. 6 is a kind of structural block diagram for the electronic equipment that can be applied to antifake method for products provided by the embodiments of the present application.
Icon: 40- product false proof device;41 receiving modules;42- authentication module;43- state acquisition module;44- judges mould Block;45- security code generation module;50- electronic equipment;51- memory;52- storage control;53- processor.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application is described.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile the application's In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
First embodiment
Through the applicant the study found that present anti-counterfeiting technology product market confusion, and existing anti-counterfeiting technology is excessively common, Often do not have uniqueness and exclusivity, the easy costs such as common anti-fake coating, anti-fake two-dimension code, there are authenticity of products judgements The problem that accuracy is not high, security code safety is poor.To solve the above-mentioned problems, the embodiment of the present application provides a kind of product Method for anti-counterfeit.
It should be understood that the executing subject of the antifake method for products in the embodiment of the present application can be for executing product The processing equipment of each step in method for anti-counterfeit, the processing equipment can be computer, Cloud Server, intelligent terminal or other tools There is the processing equipment of processing function.
Referring to FIG. 1, Fig. 1 is a kind of flow diagram of antifake method for products provided by the embodiments of the present application.The product The step of method for anti-counterfeit, can be such that
Step S12: receiving indicates that the scanned scanning information of security code, the scanning information include security code image, sweep Location information is retouched, the scanning position information includes the geographical location information when security code is scanned every time.
The anti-counterfeit server that can be for carrying out fake certification of scanning information is received in the embodiment of the present application, acquisition is swept The equipment for retouching information can be the anti-pseudo terminal device that smart phone, security code scanner etc. have shooting function.
Optionally, when user is scanned security code using anti-pseudo terminal device can using with security code is matched answers With program, present scanning position can be the application program obtain and the anti-pseudo terminal device that uploads when scanning security code i.e. When location information.
Step S14: the security code is verified based on the security code image.
Step S16: when the security code passes through verifying, obtaining that the security code is corresponding to sell status information, described Status information is sold for indicating whether the corresponding product of the security code is sold by.
Optionally, the status information of selling of the corresponding product of security code includes to have been sold out state and unsold state, this is sold The information that does well can store in corresponding database, and be sold by product, receive should in database after corresponding fund Product sells status information and can be changed to have been sold out state by unsold state.
Step S18: status information is sold and the scanning position information judges whether the product is personation based on described Product.
In the above-described embodiments, after verifying to security code, security code corresponding product is also sold into status information And scanning position information is as the reference information for judging authenticity of products, it is contemplated that falsifying occurs in security code, strange land is faked etc. In the case of true and false decision problem, instant scanning position information when scanning input security code is introduced, so that it is anti-to improve product The accuracy rate that puppet determines.
For step S12, security code image can be colored, black and white or gray level image.Optionally, due to two dimensional code, item The security codes such as shape code are required to identify the patterns such as thinner lines, dot matrix in scanning, in order to accurately identify The resolution ratio of security code in security code image, the security code image used in the present embodiment can be greater than 300*300.
Optionally, scanning position information can position scan position using longitude and latitude, can also be using default The positioning of products in circulation point progress fixed point.Wherein, pre-set product circulation point can be the warehouse pre-registered, point of sale etc. The fixation geographical location that product flows into, flows out or sell, meanwhile, the information of pre-set product circulation point can also carry product In the date and time information that corresponding pre-set product circulation point flows into, flows out or sell.Further, using default circulation point Positioning method when, if position of the security code except default circulation point is scanned, may determine that the product may palm off production Product.
For traditional anti-counterfeiting technology, mainly there are laser hologram, laser marking, specialty inks, special paper, conventional digital It is anti-fake etc..Each product of manufacturing enterprise's production is all endowed unique security code, and it is soft that consumer can be convenient to use identification Part identifies commodity counterfeit prevention code, and then verifies anti-counterfeiting information of tracing to the source.These technologies are having certain antifalse effect using initial stage, but with Opening up for application is wide, these technologies are increasingly easy to obtain, and since security code is generally disposed at outside commodity, this is unique anti- Pseudo-code is easily replicated and fakes for imitated, therefore anti-fake modest efficacy, or at all cannot be anti-fake.Therefore the application is implemented Further include the generation step of security code in the antifake method for products of example, the security code in the present embodiment have higher uniqueness, Unforgeable and safety.
Referring to FIG. 2, Fig. 2 is a kind of flow diagram of security code generation step provided by the embodiments of the present application, this is anti- Pseudo-code generation step may include following sub-step:
Step S21: corresponding product generates identification code, and the identification code is used to be printed on the packet of the product or the product It loads onto.
It should be understood that the identification code in the present embodiment, which can be but be not limited to two dimensional code, bar code, temperature, becomes anti-fake Label code, gold stamping antifalsification label code, fragile paper antifalsification label code or other have anti-fraud functional identification code.
Further, packing of this product can be but be not limited to papery packaging, plastics package, carton package or hard It packs or other is capable of the packaging type of definition printing identification code.
Step S22: the identification code and random draw a design being combined, the security code is obtained, described to draw at random Pattern is the pattern generated by way of manually scribbling or being generated at random conveniently by algorithm.
In the present embodiment at random drawing a design can be but be not limited to by manually conveniently scribble or by algorithm with The pattern that the mode that machine generates generates.Wherein, generating pattern at random by algorithm can be completed using OpenCV or other tools, To improve the formation efficiency of random pattern.
When identification draws a design at random, usually identify that this draws a design at random using image processing method, with data Verifying is compared in the corresponding random drawing image of the pre-stored identification code in library.It should be understood that random draw figure Case can be cromogram or grayscale image, while it should have certain transparency, not impact to the identification of identification code.
In the above-described embodiments, it draws a design by the simple identification code of the types such as common two dimensional code, bar code and at random It is combined acquisition security code, needs to carry out image recognition to drawing a design at random and compare, is known not influencing identification code scanning The forgery difficulty of security code is increased in other situation, improves the safety of product verified by security code.
In order to further increase the unforgeable of security code, the present embodiment additionally provides a kind of security code generation step, Referring to FIG. 3, Fig. 3 is the flow diagram of another security code generation step provided by the embodiments of the present application.The security code is raw It specifically can be such that at step
Step S31: corresponding product generates identification code, and the identification code is used to be printed on the packet of the product or the product It loads onto.
Step S32: obtaining the image at the printing of the security code in preset range and draws a design at random.
Optionally, the preset range in the present embodiment can be arbitrary default magnitude range, such as by each side of identification code Edge extends 1 cm range as preset range.Further, which can also be the top from identification code, a following, left side Certain in, the right is extended on one side or while a few, and development length can be the random length including above-mentioned 1 centimetre.
Step S33: by the identification code, it is described draw a design and the physical features of described image are combined at random, The security code is obtained, the physical features include at least one of wrapping paper texture, color, printing ink leak trace.
Optionally, physical features are in addition to including the wrapping paper texture of identification code printed perimeter, color, printing ink leak trace, Can also include printing distinctive skin texture etc. when being formed, combine formation security code can be effectively prevented fake producer's batch duplicating this Product, because the security code of each product is uniquely, fake producer is difficult one mould one of physical speciality security code periphery Sample copies to allow system barcode scanning to be verified again, to further improve the unforgeable of security code.
For step S14, in order to improve the accuracy rate and safety of security code verifying, in the present embodiment, swept receiving After retouching information, the security code image in scanning information can be identified, to the identification code, random in the security code identified It draws a design and verifying is compared in physical features respectively.Referring to FIG. 4, Fig. 4 is provided by the embodiments of the present application a kind of anti- The flow diagram of pseudo-code verification step.The security code verification step specifically can be such that
Step S141: the security code is extracted from the security code image.
When security code image carries out image procossing extraction security code, extracting region be can be with identification code plus physics The region of feature preset range size.
Step S142: determining whether there is in database tests with the matched target verification code of the security code, the target Card code is the identification code for including with the security code in the database, described draws a design at random and the physics is special Levy consistent target verification code.
The present embodiment can be carried out successively when carrying out security code and target verification code matches, for example, identifying first anti-fake Identification code in code, then determines the security code of the corresponding preparatory typing of the identification code, then obtain preparatory typing in the database Security code in draw a design and physical features at random, identifying drawing a design and preparatory typing at random for current security code Drawn a design after phase at random, then confirm whether physical features identical as the physical features of preparatory typing.In other embodiments, Carry out when security code and target verification code match can also simultaneously to identification code, draw a design at random and physical features are tested Card.Wherein, in database can typing multiple legal security codes in advance, comprising identification code, random in each legal security code It draws a design and physical features.Meanwhile the identification code of preparatory typing, random draw a design can also be that basis is reflected with physical features The corresponding storage of relationship is penetrated, to determine corresponding draw a design at random and physical features according to identification code.
Step S143: when there are the target verification code, determine that the security code passes through verifying.
Step S144: when the target verification code is not present, determine that the security code is unverified.
In the above-described embodiments, it draws a design respectively by the identification code of security code, at random and physical features and database In legal security code be compared, determined when there is identical target verification code in the database security code by verifying, from And improve the safety and reliability of anti-fake code check.
For step S16, selling status information and being stored in correspondence database for product is receiving security code Corresponding product sell after payment completion information after, the product in database is sold into status information from unsold state It is revised as having been sold out state.
In order to further increase Information Security, avoids selling status information or payment completion information etc. and be forged, this reality Applying example can also be stored and be managed by various information of the block chain technology to product.
Block chain is different from common centralization information storage mechanism, it can be understood as a kind of database of decentralization, The characteristic of decentralization determines that block chain is safeguarded the opening and equality of data by numerous nodes jointly, and has data Be difficult to tamper with, retrospective feature, thus in the embodiment of the present application can by block chain technology to the various information of product into Row storage and management.Platform (anti-counterfeiting system) can be in (whole world, the whole nation, or as required in other regional scopes) first (block chain node refers to the equipment in block chain network, such as computer, hand to various regions cloud storage point of building more as far as possible Machine, mine machine, desktop computer and server etc., these block chain nodes constitute the block chain network based on the form of P2P network), And the cloud in various clouds and enterprise or individual on the market is combined to be cooperated, utilize the increasing pair of respective cloud storage resource Memory node dispersion is layouted, and is reduced the self-built cloud of plateform system unicity, is not broken through whole memory node chances to lawbreaker, Guarantee the safe and reliable of data of tracing to the source.
Such as server block chain link point, enterprise's location block chain link point, warehouse block chain link point, shop can be built For block chain node equal distribution in the block chain node of each department, product is in production factory, storage, outbound and the circulating steps such as sells In by corresponding block chain node corresponding products in circulation information is issued in block chain so that other block chain nodes can Typing and verification are carried out to the products in circulation information simultaneously, avoid the occurrence of the feelings of some node fake product or security code information Condition.Wherein, server block chain link point is the corresponding block chain node of server of entire anti-counterfeiting system, enterprise's location block Chain node is the corresponding block chain node in enterprise, total library, location.
The working principle of above-mentioned block chain node is illustrated, such as when the security code of product A is logged, system The real-time positioning automatically generated for security code and generation time, by security code image, in real time positioning and the generation time when generating As security code as security code information simultaneous transmission to server block chain link point and corresponding enterprise location block chain link Point in.What the present embodiment improved security code through the above way can not tamper and safety.
When the circulation for sale of N part product, administrative staff carry out barcode scanning one by one to N part product and verify outbound, corresponding Warehouse block chain link point issues the outbound information of N part product in block chain, server block chain link point, enterprise location Other block chain nodes such as block chain node, shop block chain link point are confirmed and are stored to the outbound information.
Next, the product A in N part product is sold by shop X, the terminal device of shop X completes the payment of product A Information is issued in the shop block chain link point of shop X, after other block chain nodes confirm the information, server block chain link point By product A and its security code it is corresponding to sell status information from unsold status modifier be to have been sold out state, and on block chain The variation for selling status information is issued, other nodes in block chain network then can sell status information to product A Variation confirmed and stored.
Similarly, in product when executing other flow-through operations, also corresponding circulation information can be issued in block chain so that Other block chain links click through row information confirmation and storage, and so on, each product is from factory is produced to purchased end, quilt Authenticated information is added to each block chain node and by permanent storage, and single block chain node will be unable to realize to information Modification, thus based on block chain store and verify data stability it is higher, and have can not tamper and non repudiation, can To guarantee uniqueness and authenticity that entire products in circulation are traced to the source.
In order to enhance the accuracy for verifying authenticity of products by security code, the embodiment of the present application also introduces security code scanning Number is as judgment basis, i.e. the present embodiment further include: updates the security code current scanning time based on the scanning information Number, the scanning times are the sum of present scan and the history scanning times of the security code.
It should be understood that the scanning times can be each security code single corresponding coding counter or all anti-fake The corresponding unified coding counter of code is counted.Optionally, when security code corresponding product circulation sale in the market, consumption When person is scanned security code using the correspondence application program in the terminal devices such as smart phone, then basis connects coding counter The scanning information received charges to a barcode scanning verifying number to this security code, while can be according to the scan position in scanning information The positioning map of geographic location when one security code of Automatic generation of information is scanned.
For step S18, since each product is all based on the mode of the corresponding unique security code of a product in city It circulates in, therefore the fake products determines that situation specifically can be such that
Situation 1: indicate that the product has not sold by the status information of selling, the scanning times are less than or equal to pre- If threshold value, and the scanning position information indicates the present scanning position of the security code and history scan position is same position When, determine that the product is normal product for sale.
Situation 2: indicate that the product has been sold by the status information of selling, the scanning times are less than or equal to institute Preset threshold is stated, and the scanning position information indicates the present scanning position of the security code and history scan position is same When position, determine that the product is fake products.
Situation 3: indicate that the product has been sold by the status information of selling, the scanning times are greater than described default Threshold value, and the scanning position information indicates the present scanning position of the security code and history scan position is different location When, determine that the product is fake products.
It should be understood that above-mentioned preset threshold can be adaptively adjusted according to the sphere of circulation size of product.
Further, when security code is scanned, it is anti-that server can send this to the terminal device for scanning the security code The scanned number of pseudo-code, and when product is confirmed as normal product for sale or fake products, phase is sent to terminal device The authenticity of products prompt information answered, so that consumer rationally judges product in the true and false based on above- mentioned information.
It should be understood that in addition to the scanned number of security code, security code scanned date and time every time, and Current Scan date and time can send and show to terminal device, carry out very so that consumer is based on the date and time Puppet judgement.
In the present embodiment, it using the scanned number of security code as one of judgment basis of authenticity of products, improves true Pseudo- judgment accuracy;Whether further comprehensive scanning number is more than that preset threshold, present scanning position and history scan position are Whether no consistent and product is sold by, and judges whether product is normal product for sale, to improve authenticity of products judgement Accuracy and reliability.Meanwhile after preventing fake producer from taking one of security code product progress batch duplicating production, same Place is distributed to multiple places and carries out this security code product sales behavior.
It should be understood that security code, during inside generates and is managed personnel's use, there is also leakage wind Danger, therefore the embodiment of the present application can also generate after security code generation and be used to manage with the associated overhead code of security code, overhead code Reason personnel are managed operation to the product by the overhead code.
When enterprise one by one takes pictures security code or infrared scan is entered into the server of anti-counterfeiting system, server understands these The visible original fake certification code generated is stored directly in corporate boss's account database, this corporate boss's account database only has Corporate boss or particular account number can check, while can automatically generate one and visible with the associated overhead code of original security code and protect There are in account executive system, administrative staff can not see the apperance of true original security code, but can be on account executive Security code is checked, quantity in stock statistics etc. management works, can be very good to prevent internal staff in this way security code Other fake producers are copied or be leaked in advance, avoid causing huge brand credit influence and economic loss to enterprise.
Further, in order to prevent falsifying the occurrence of, enterprise takes pictures one by one to newly-generated security code or infrared sweeps It retouches after being entered into lane database, each purchase channel quotient account can be added in the enterprise's main account of oneself again, automatically will This enterprise's main account is bound with purchase channel quotient's account, when purchase channel quotient directly enters the account of oneself, so that it may see To N number of different product list oneself acted on behalf of, purchase channel quotient can be used unified terminal device carry out barcode scanning verifying with And the operation such as purchase, the return of goods, storage, outbound, logistics enquiring.
When enterprise delivers product to some purchase channel quotient, inquiry determines corresponding purchase channel quotient account first, right Product of delivering carries out barcode scanning one by one and verifies outbound, the product of at this moment institute's useful purchase channel quotient account barcode scanning verifying outbound it is right The security code answered all can in this purchase channel quotient's account, enterprise's main account can be clearly apparent with administrator's account for typing one by one Any dynamic in account, the terminal device that purchase channel quotient opens oneself also can directly be seen that enterprise has delivered to oneself The information such as quantity.
When product arrival, purchase channel quotient verifies the true and false by carrying out barcode scanning to every arrival product, and confirmation is genuine piece Afterwards, the product that rigid barcode scanning is verified is entered into the commodity library of purchase channel quotient by server, when purchase channel quotient production for sale It is every to sell away one when product, the product inventory and purchase channel quotient oneself that enterprise's main account and administrator's account can inquire Inventory will reduce one simultaneously, enterprise's main account can be with any trend of the sold product of real time inspection purchase channel quotient, such as When the product of the one of purchase channel quotient storage of fruit is beyond sales range is allowed, enterprise's main account can receive this canal of stocking up Road quotient's abnormal prompt can effectively control the sales behavior in each region of product in this way.
In addition, product consumer in sale is also based on security code and pays, therefore canal of stocking up in the present embodiment When buying enterprise product commercially available from road, enterprise's main account can preset the rate of gross profit of purchase channel quotient, if consumer on line according to After the payment of product institute target price, server can be assigned to directly according to enterprise's main account feed preset gross profit of goods distributor and be stocked up Money of stocking up need not be all paid in distributor's account or even after purchase channel quotient, it is only necessary to a small cash pledge can buy goods, This mode is that enterprise directly spreads goods at purchase channel quotient, and the fund for often selling a commodity is all introduced into enterprise's main account On, then the profit of purchase channel quotient calculated to corresponding purchase channel quotient.
Further, enterprise's main account one by one takes pictures the security code of generation or when infrared scan typing server, service Device can be automatically to the security code allocated code counter, positioning generator and binding enterprise's collecting account of each new typing.When this When market circulation is sold, when consumer makes to carry out barcode scanning verifying, the terminal device of consumer receives security code corresponding product Prompt show security code the scanned number in same place, this product to mid-sales and support barcode scanning verifying direct payment purchase It buys, it is normal product for sale that system, which can prompt this commodity of consumer, can trust purchase.Because of the security code of each product It is bound with the sale collecting account of enterprise, the money as long as the direct validation of payment of this security code of consumer scans is done shopping, shopping money is same On the sale collecting account that direct payment is bound to enterprise.To make adulterator forge others' commodity, consumer is directly scanned When security code buys product and payment, on the sale collecting account of payment for goods direct payment to binding enterprise, directly prevent to make False possibility.
Second embodiment
In order to cooperate the antifake method for products of the embodiment of the present application, it is anti-that the application second embodiment additionally provides a kind of product Pseudo-device 40.
Referring to FIG. 5, Fig. 5 is a kind of structural block diagram of product false proof device provided by the embodiments of the present application.
Product false proof device 40 includes receiving module 41, authentication module 42, state acquisition module 43 and judgment module 44.
Receiving module 41 indicates the scanned scanning information of security code for receiving, and the scanning information includes security code Image, scanning position information, the scanning position information include the geographical location information when security code is scanned every time.
Authentication module 42, for being verified based on the security code image to the security code.
State acquisition module 43, for obtaining when the security code passes through verifying, the security code is corresponding to sell shape State information, the status information of selling is for indicating whether the corresponding product of the security code is sold by;
Judgment module 44, for selling status information and whether the scanning position information judges the product based on described For fake products.
Further, receiving module 41 further includes for updating the current scanning of the security code based on the scanning information The scanning times updating unit of number, the scanning times are the sum of present scan and the history scanning times of the security code. Then judgment module 44 is used for: indicating that the product has not sold by the status information of selling, the scanning times are less than or wait In preset threshold, and the scanning position information indicates the present scanning position of the security code and history scan position is same When position, determine that the product is normal product for sale;Indicate that the product has been sold by the status information of selling, it is described Scanning times are less than or equal to the preset threshold, and the scanning position information indicates the present scanning position of the security code With history scan position be same position when, determine the product be fake products;It is sold described in status information expression described Product has been sold by, and the scanning times are greater than the preset threshold, and the scanning position information indicates the security code When present scanning position and history scan position are different location, determine that the product is fake products.
Product false proof device 40 can also include security code generation module 45, and security code generation module 45 is raw including identification code At unit, assembled unit.
Wherein, identification code generation unit generates identification code for corresponding product, and the identification code is for being printed on the production In the packaging of product or the product.Assembled unit, for the identification code and random draw a design to be combined, described in acquisition Security code, it is described to be drawn a design at random as the pattern generated by way of manually scribbling or being generated at random by algorithm conveniently.
Further, security code generation module 45 can also include physical features image acquisition unit, described for obtaining Image at the printing of security code in preset range.Then the assembled unit is also used to: by the identification code, the random drafting Pattern and the physical features of described image are combined, and obtain the security code, the physical features include wrapping paper texture, At least one of color, printing ink leak trace.
Authentication module 42 includes extraction unit, comparison unit and verifying judging unit.
Wherein, extraction unit, for extracting the security code from the security code image.
Comparison unit is tested for determining to whether there is in database with the matched identifying code of the security code, the target Card code is the identification code for including with the security code in the database, described draws a design at random and the physics is special Levy consistent target verification code.
Judging unit is verified, for determining that the security code by verifying, is not being deposited when there are the target verification code In the target verification code, determine that the security code is unverified.
Product false proof device 40 can also include overhead code generation module, for generating and the associated management of the security code Code, the overhead code are managed operation to the product by the overhead code for administrative staff.
Further, product false proof device 40 can also include block chain data module, for sending the overhead code At least one of to server block chain link point, enterprise's location block chain link point and warehouse block chain link point, for described Product in storage, outbound and/or carries out fake certification and record to the associated security code of the overhead code and product when selling.
3rd embodiment
Referring to FIG. 6, Fig. 6 is a kind of electronic equipment that can be applied to antifake method for products provided by the embodiments of the present application Structural block diagram.
Electronic equipment 50 provided in this embodiment may include product false proof device 40, memory 51, storage control 52, Processor 53.
The memory 51, storage control 52, each element of processor 53 are directly or indirectly electrically connected between each other, To realize the transmission or interaction of data.For example, these elements can pass through one or more communication bus or signal wire between each other It realizes and is electrically connected.The product false proof device 40 includes that at least one can be stored in the form of software or firmware (firmware) In the memory 51 or the software function that is solidificated in the operating system (operating system, OS) of electronic equipment 50 Module.The processor 53 is used to execute the executable module stored in memory 51, such as product false proof device 40 includes Software function module or computer program.
Wherein, memory 51 may be, but not limited to, random access memory (Random Access Memory, RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable Read-Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM), Electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc.. Wherein, memory 51 is for storing program, and the processor 53 executes described program after receiving and executing instruction, and aforementioned Method performed by the server that the stream process that inventive embodiments any embodiment discloses defines can be applied in processor 53, Or it is realized by processor 53.
Processor 53 can be a kind of IC chip, the processing capacity with signal.Above-mentioned processor 53 can be with It is general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network processing unit (Network Processor, abbreviation NP) etc.;Can also be digital signal processor (DSP), specific integrated circuit (ASIC), Ready-made programmable gate array (FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hard Part component.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.General processor It can be microprocessor or the processor 53 be also possible to any conventional processor etc..
In conclusion the embodiment of the present application provides a kind of antifake method for products, device, electronic equipment and storage can be read Medium, which comprises receive indicate the scanned scanning information of security code, the scanning information include security code image, Scanning position information, the scanning position information include the geographical location information when security code is scanned every time;Based on institute Security code image is stated to verify the security code;When the security code passes through verifying, it is corresponding to obtain the security code Status information is sold, the status information of selling is for indicating whether the corresponding product of the security code is sold by;Based on described It sells status information and the scanning position information judges whether the product is fake products.
During above-mentioned realization, not only security code is verified, also by security code it is corresponding sell status information with And scanning position information is as the reference information for judging authenticity of products, it is contemplated that the feelings such as falsifying occurs in security code, strange land is faked True and false decision problem under condition, to improve the accuracy rate of product false proof judgement.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing Show the device of multiple embodiments according to the application, the architectural framework in the cards of method and computer program product, Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the application can integrate one independent portion of formation together Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of the steps. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
The above description is only an example of the present application, the protection scope being not intended to limit this application, for ability For the technical staff in domain, various changes and changes are possible in this application.Within the spirit and principles of this application, made Any modification, equivalent substitution, improvement and etc. should be included within the scope of protection of this application.It should also be noted that similar label and Letter indicates similar terms in following attached drawing, therefore, once it is defined in a certain Xiang Yi attached drawing, then in subsequent attached drawing In do not need that it is further defined and explained.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any Those familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all contain Lid is within the scope of protection of this application.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.

Claims (10)

1. a kind of antifake method for products, which is characterized in that the described method includes:
Receiving indicates the scanned scanning information of security code, and the scanning information includes security code image, scanning position information, institute Stating scanning position information includes the geographical location information when security code is scanned every time;
The security code is verified based on the security code image;
When the security code passes through verifying, obtain that the security code is corresponding to sell status information, it is described to sell status information For indicating whether the corresponding product of the security code is sold by;
Status information is sold and the scanning position information judges whether the product is fake products based on described.
2. antifake method for products according to claim 1, which is characterized in that described to sell status information and institute based on described It states scanning position information and judges whether the product is fake products, comprising:
The current scanning times of the security code are updated based on the scanning information, and the scanning times are present scan and described The sum of history scanning times of security code;
Indicating that the product has not sold by the status information of selling, the scanning times are less than or equal to preset threshold, and The scanning position information indicate the security code present scanning position and history scan position be same position when, determine institute Stating product is normal product for sale;
Indicate that the product has been sold by the status information of selling, the scanning times are less than or equal to the default threshold Value, and the scanning position information indicate the security code present scanning position and history scan position be same position when, Determine that the product is fake products;
Indicate that the product has been sold by the status information of selling, the scanning times are greater than the preset threshold, and institute State scanning position information indicate the security code present scanning position and history scan position be different location when, determine described in Product is fake products.
3. antifake method for products according to claim 1, which is characterized in that indicate the scanned scanning of security code receiving Before information, the method also includes:
Corresponding product generates identification code, and the identification code is used to be printed on the packaging of the product or the product;
The identification code and random draw a design are combined, the security code is obtained, it is described to draw a design at random to pass through The artificial pattern scribbled or generated in such a way that algorithm generates at random conveniently.
4. antifake method for products according to claim 3, which is characterized in that described to scheme the identification code with random draw Case is combined, and obtains the security code, comprising:
Obtain the image at the printing of the security code in preset range;
By the identification code, it is described draw a design and the physical features of described image are combined at random, obtain described anti-fake Code, the physical features include at least one of wrapping paper texture, color, printing ink leak trace.
5. antifake method for products according to claim 4, which is characterized in that described to be based in the security code image to institute Security code is stated to be verified, comprising:
The security code is extracted from the security code image;
Determine in database with the presence or absence of with the matched target verification code of the security code, the target verification code be the data The identification code that includes with the security code in library described draws a design and the consistent verifying of the physical features at random Code;
When there are the target verification code, determine that the security code passes through verifying;
When the target verification code is not present, determine that the security code is unverified.
6. antifake method for products according to claim 3, which is characterized in that after obtaining the security code, the side Method further include:
It generates and is used for administrative staff by the overhead code to the production with the associated overhead code of the security code, the overhead code Product are managed operation.
7. antifake method for products according to claim 6, which is characterized in that after obtaining the security code, the side Method further include:
The overhead code is sent in server block chain link point, enterprise's location block chain link point and warehouse block chain link point At least one, for the product storage, outbound and/or when selling to the associated security code of the overhead code and product into Row fake certification and record.
8. a kind of product false proof device, which is characterized in that described device includes:
Receiving module indicates that the scanned scanning information of security code, the scanning information include security code image, sweep for receiving Location information is retouched, the scanning position information includes the geographical location information when security code is scanned every time;
Authentication module, for being verified based on the security code image to the security code;
State acquisition module, the security code is corresponding to sell status information for obtaining when the security code passes through verifying, The status information of selling is for indicating whether the corresponding product of the security code is sold by;
Judgment module, for selling status information and the scanning position information judges whether the product is personation based on described Product.
9. a kind of electronic equipment, which is characterized in that the electronic equipment includes processor and memory, is stored in the memory There are computer program instructions, when the processor reads and runs the computer program instructions in the memory, executes Step in any one of claim 1-7 the method.
10. a kind of read/write memory medium, which is characterized in that be stored with computer program in the read/write memory medium and refer to It enables, when the computer program instructions are read and run by a processor, perform claim is required in any one of 1-7 the method Step.
CN201910248371.4A 2019-03-29 2019-03-29 Antifake method for products, device, electronic equipment and read/write memory medium Pending CN109949058A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910248371.4A CN109949058A (en) 2019-03-29 2019-03-29 Antifake method for products, device, electronic equipment and read/write memory medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910248371.4A CN109949058A (en) 2019-03-29 2019-03-29 Antifake method for products, device, electronic equipment and read/write memory medium

Publications (1)

Publication Number Publication Date
CN109949058A true CN109949058A (en) 2019-06-28

Family

ID=67012988

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910248371.4A Pending CN109949058A (en) 2019-03-29 2019-03-29 Antifake method for products, device, electronic equipment and read/write memory medium

Country Status (1)

Country Link
CN (1) CN109949058A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110472522A (en) * 2019-07-25 2019-11-19 徐竹范 Intermediary assists method for anti-counterfeit, recognition methods and identification device
CN111027986A (en) * 2019-12-02 2020-04-17 深圳市智微智能软件开发有限公司 Anti-counterfeiting code verification method and system
CN111210238A (en) * 2020-01-13 2020-05-29 杭州沃朴物联科技有限公司 Warranty registration method, warranty registration device, warranty registration apparatus, and warranty registration medium
CN111597265A (en) * 2020-05-15 2020-08-28 无锡珍岛智能技术有限公司 E-commerce commodity anti-counterfeiting traceability management system based on block chain
CN111815335A (en) * 2020-06-11 2020-10-23 兰州集智信息技术有限公司 Service platform and method for judging authenticity of product
CN112346097A (en) * 2020-10-26 2021-02-09 成都商通时代数字科技有限公司 System and method for precisely managing positions of high-end white spirits by block chain and GPS (global positioning system)
CN113129030A (en) * 2021-04-06 2021-07-16 南京质子链科技有限公司 Calligraphy and painting anti-counterfeiting transaction platform and method based on block chain and paper pattern recognition
CN113723968A (en) * 2021-07-30 2021-11-30 浙江工商大学 Cubilose anti-counterfeiting tracing method based on block chain
CN114529315A (en) * 2022-02-23 2022-05-24 南京第壹时间信息科技有限公司 Verification method and device based on Internet
CN114943544A (en) * 2022-05-19 2022-08-26 南京数睿数据科技有限公司 Verification information sending method and device, electronic equipment and computer readable medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761799A (en) * 2014-01-13 2014-04-30 王波 Bill anti-counterfeit method and device based on texture image characteristics
CN103870862A (en) * 2014-03-03 2014-06-18 汤永平 Method for realizing anti-counterfeiting effect by separated graph random combination and realization thereof
CN104700284A (en) * 2015-04-03 2015-06-10 周勇 Commodity identity monitoring and anti-counterfeiting method
CN105303223A (en) * 2015-11-18 2016-02-03 广东正迪科技股份有限公司 Random image anti-fake conflict logistics logo preparation method, logos and identification method
CN106485509A (en) * 2016-10-12 2017-03-08 广州云溯科技有限公司 A kind of commodity multi-stage authentication anti-fake traceability system based on Quick Response Code and method
CN106682917A (en) * 2016-12-29 2017-05-17 马军 Artwork authentication and transaction method and system based on digital signature
CN107451820A (en) * 2016-04-29 2017-12-08 卢念秋 On line, multiple, dynamic anti-fake under line, anti-channel conflict, can traceability system
CN107491973A (en) * 2017-09-30 2017-12-19 特兰旗(厦门)科技有限公司 Product false proof management system and method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761799A (en) * 2014-01-13 2014-04-30 王波 Bill anti-counterfeit method and device based on texture image characteristics
CN103870862A (en) * 2014-03-03 2014-06-18 汤永平 Method for realizing anti-counterfeiting effect by separated graph random combination and realization thereof
CN104700284A (en) * 2015-04-03 2015-06-10 周勇 Commodity identity monitoring and anti-counterfeiting method
CN105303223A (en) * 2015-11-18 2016-02-03 广东正迪科技股份有限公司 Random image anti-fake conflict logistics logo preparation method, logos and identification method
CN107451820A (en) * 2016-04-29 2017-12-08 卢念秋 On line, multiple, dynamic anti-fake under line, anti-channel conflict, can traceability system
CN106485509A (en) * 2016-10-12 2017-03-08 广州云溯科技有限公司 A kind of commodity multi-stage authentication anti-fake traceability system based on Quick Response Code and method
CN106682917A (en) * 2016-12-29 2017-05-17 马军 Artwork authentication and transaction method and system based on digital signature
CN107491973A (en) * 2017-09-30 2017-12-19 特兰旗(厦门)科技有限公司 Product false proof management system and method

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110472522A (en) * 2019-07-25 2019-11-19 徐竹范 Intermediary assists method for anti-counterfeit, recognition methods and identification device
CN111027986A (en) * 2019-12-02 2020-04-17 深圳市智微智能软件开发有限公司 Anti-counterfeiting code verification method and system
CN111210238A (en) * 2020-01-13 2020-05-29 杭州沃朴物联科技有限公司 Warranty registration method, warranty registration device, warranty registration apparatus, and warranty registration medium
CN111210238B (en) * 2020-01-13 2023-10-20 杭州沃朴物联科技有限公司 Quality assurance registering method, device, equipment and medium
CN111597265B (en) * 2020-05-15 2023-06-09 无锡珍岛智能技术有限公司 Block chain-based electronic commerce commodity anti-counterfeiting traceability management system
CN111597265A (en) * 2020-05-15 2020-08-28 无锡珍岛智能技术有限公司 E-commerce commodity anti-counterfeiting traceability management system based on block chain
CN111815335A (en) * 2020-06-11 2020-10-23 兰州集智信息技术有限公司 Service platform and method for judging authenticity of product
CN112346097A (en) * 2020-10-26 2021-02-09 成都商通时代数字科技有限公司 System and method for precisely managing positions of high-end white spirits by block chain and GPS (global positioning system)
CN113129030A (en) * 2021-04-06 2021-07-16 南京质子链科技有限公司 Calligraphy and painting anti-counterfeiting transaction platform and method based on block chain and paper pattern recognition
CN113723968A (en) * 2021-07-30 2021-11-30 浙江工商大学 Cubilose anti-counterfeiting tracing method based on block chain
CN114529315A (en) * 2022-02-23 2022-05-24 南京第壹时间信息科技有限公司 Verification method and device based on Internet
CN114529315B (en) * 2022-02-23 2023-12-26 南京第壹时间信息科技有限公司 Verification method and device based on Internet
CN114943544A (en) * 2022-05-19 2022-08-26 南京数睿数据科技有限公司 Verification information sending method and device, electronic equipment and computer readable medium
CN114943544B (en) * 2022-05-19 2024-04-23 南京数睿数据科技有限公司 Verification information transmitting method, device, electronic equipment and computer readable medium

Similar Documents

Publication Publication Date Title
CN109949058A (en) Antifake method for products, device, electronic equipment and read/write memory medium
US7996319B2 (en) Authentication and tracking system
US8615470B2 (en) Authentication and tracking system
WO2019062377A1 (en) Product anti-counterfeiting management system and method
CN111587445A (en) Security tag
CN105046504A (en) Multiple key checking, inspection and forgery prevention source forming method and forgery prevention label
CN102129637A (en) Commodity anti-counterfeiting method based on security mechanism
CN102708391B (en) A kind of antifalsification label based on fractal graph and anti-counterfeit authentication method
KR20060009874A (en) Method for tracking and tracing marked articles
CN105190663A (en) System for authenticating items
CN105678369A (en) Anti-counterfeiting-tag-based anti-counterfeiting method for commodity
CN202512601U (en) Commodity anti-counterfeit bar code
CN102722824A (en) Method for distinguishing authenticity of goods by using bar codes
CN108604261A (en) For preventing the method and system that product is sold on online website without permission
US20130317996A1 (en) Systems and Methods for Tracking Status of Random Unique Code Strings and Generation of Random Unique Code Strings
US20130024387A1 (en) Systems and Methods for Tracking Assigned Code Strings
Ting et al. A two-factor authentication system using radio frequency identification and watermarking technology
CN108985431B (en) Anti-counterfeit label and method for detecting and identifying genuine goods of registered trademark
CN114169476A (en) Quantum anti-counterfeiting tracing method and system based on security chip
CN108154207A (en) The anti-pseudo-unique code generation of one kind and anti-counterfeit authentication method
CN1331455A (en) Antiforge electronic label scanned over network for commodites and its making method
CN1670753A (en) Real-time anti-false searching system and anti-false discriminating method thereof
CN112070567A (en) Quality control system based on block chain and control method thereof
CN106815614A (en) A kind of bank acceptance Antiforge system of use NFC anti-counterfeiting technologies
CN104616391B (en) Note validating method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190628

RJ01 Rejection of invention patent application after publication