CN109978568A - A kind of retrospect method for anti-counterfeit and system of two dimensional code - Google Patents
A kind of retrospect method for anti-counterfeit and system of two dimensional code Download PDFInfo
- Publication number
- CN109978568A CN109978568A CN201910197658.9A CN201910197658A CN109978568A CN 109978568 A CN109978568 A CN 109978568A CN 201910197658 A CN201910197658 A CN 201910197658A CN 109978568 A CN109978568 A CN 109978568A
- Authority
- CN
- China
- Prior art keywords
- dimensional code
- tracing information
- phone number
- server
- retrospect
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 238000013475 authorization Methods 0.000 claims description 19
- 238000012797 qualification Methods 0.000 abstract description 5
- 238000004519 manufacturing process Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 239000002994 raw material Substances 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000002834 transmittance Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Databases & Information Systems (AREA)
- Marketing (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to the method for anti-counterfeit and system of a kind of retrospect two dimensional code, this method comprises: user terminal scans retrospect two dimensional code, generate tracing information inquiry request according to the phone number of user's input;Server receives tracing information inquiry request, judges whether phone number has the search access right identified to two dimensional code in request in request, if it is, feeding back tracing information corresponding with two dimensional code mark to user terminal;User terminal receives and shows tracing information.In this case; even if retrospect two dimensional code is replicated by other people and is pasted in counterfeit merchandise; other people scan this two dimensional code due to not having permission qualification that cannot obtain corresponding correct tracing information; on the one hand the reliability of traceability system is improved; really the consumption equity of these consumers is arrived in protection; on the other hand other people are increased and identifies the difficulty that duplication stickup is palmed off using to two dimensional code, the interests of certified products businessman can be protected in the counterfeit behavior for containing other people to a certain degree.
Description
Technical field
The present invention relates to method for anti-counterfeit and system that back-tracing anti-fake technical field more particularly to a kind of retrospect use two dimensional code.
Background technique
How strike fake and forged commodity accomplishes thoroughly to prevent from the root, and simple verifying product company-information is much full
The foot not market demand, raw material, the production, storage, logistics information of product can be monitored while anti-fake, becomes anti-in recent years
Thus the main trend of puppet development, anti-fake traceability system develop as independent branch in anti-fake system and go from strength to strength.VFRONT
It is important that information tracing thinks that information tracing mark (including two dimensional code, bar code, RFID) determines that it is assumed responsibility in anti-fake trace to the source
Effect, become the anti-fake indispensable tool traced to the source in existing market.
Wherein, two-dimension code anti-counterfeit verifying is popular, simple, conveniently, undertakes any expense without consumer, improves anti-fake
Verify ratio.Function of tracing to the source trusts consumer more, and has deeper understanding to product, enhances the trust to product brand
Degree.
But two dimensional code generation needs to follow strictly correlation standard, barcode technology itself does not have any anti-fake energy
Power, so retrospect bar code is pasted on counterfeit and shoddy goods once being replicated by other people, it will be to the credible of product quality tracing system
Degree can generate great negative effect.
In addition to this, some product quality tracing systems are anti-fake in order to achieve the purpose that, mandatory requirement traceability code can only make
With primary, this way is not able to satisfy whole retrospect demands of the links user such as storage, transport, sale.
Summary of the invention
Technical problem to be solved by the invention is to provide the method for anti-counterfeit and system of a kind of retrospect two dimensional code, by right
The consumer of purchase certified products carries out the registration and authorization of retrospect permission, improves the reliability of traceability system and to a certain degree
Other people counterfeit behavior is contained.
To solve the above problems, the retrospect of the present invention method for anti-counterfeit of two dimensional code, comprising:
User terminal scan retrospect two dimensional code, according to user input phone number generate tracing information inquiry request and by its
It is sent to server;Wherein, the tracing information inquiry request carries two dimensional code mark and phone number;
The server receives the tracing information inquiry request, according to awarding between the phone number prestored and two dimensional code mark
Power relationship, judges whether the phone number has the search access right to two dimensional code mark, if it is, to the user
Terminal feeds back tracing information corresponding with two dimensional code mark;
The user terminal receives and shows the tracing information, checks for user.
Preferably, in the above-mentioned methods, the server is determining the phone number with to two dimensional code mark
Search access right after, Xiang Suoshu user terminal is fed back before corresponding with two dimensional code mark tracing information, further includes:
The server sends dynamic short message password to the user terminal;
The user terminal receives the dynamic short message password, and the dynamic password of input is sent to the server;
The server receives the dynamic password, when determining that the dynamic password is consistent with the dynamic short message password, to
The user terminal feeds back tracing information corresponding with two dimensional code mark.
Preferably, in the above-mentioned methods, further includes:
The user terminal or the manager terminal scanning retrospect two dimensional code, Xiang Suoshu server send new user's authorization
Registration request;Wherein, the new user authorizes registration request to carry new subscriber phone number and authorization two dimensional code mark;
The server receives the new user and authorizes registration request, and the new subscriber phone number is stored in the user and is authorized
In registered database, and the authorization two dimensional code is identified to the extent of competence for being included in the new subscriber phone number, completes new use
Family authorizes log-on operation.
Preferably, in the above-mentioned methods, before the user terminal scans retrospect two dimensional code, further includes:
Manager terminal sends tracing information registration request to the server;Wherein, the tracing information registration request carries
The tracing information of product;
The server receives the tracing information registration request, generates corresponding retrospect two dimension according to tracing information therein
Code and two dimensional code mark, and the tracing information is saved.
Correspondingly, the present invention also provides a kind of anti-counterfeiting systems of retrospect two dimensional code, comprising:
User terminal generates tracing information inquiry request according to the phone number of user's input for scanning retrospect two dimensional code
And send it to server;It receives and shows tracing information, checked for user;Wherein, the tracing information inquiry request is taken
Band two dimensional code mark and phone number;
The server identifies it according to the phone number and two dimensional code that prestore for receiving the tracing information inquiry request
Between authorization relationship, judge the phone number whether have to the two dimensional code mark search access right, if it is, to institute
It states user terminal and feeds back tracing information corresponding with two dimensional code mark.
Preferably, in above system, the system further include:
Manager terminal, for sending tracing information registration request to the server;Wherein, the tracing information registration request
Carry the tracing information of product;
The server is also used to receive the tracing information registration request, generates corresponding retrospect according to tracing information therein
It is identified with two dimensional code and two dimensional code, and the tracing information is saved.
Compared with the prior art, the present invention has the following advantages:
In the present invention, permission is traced to it when consumer buys certified products in advance and registers and authorizes, establishes phone number-two
Code mark-tracing information three corresponding relationship is tieed up, server first tells proposition retrospect when receiving tracing information inquiry request
The permission qualification for the person of asking is verified whether this i.e. phone number there is the inquiry two dimensional code to identify corresponding tracing information
Qualification just feeds back corresponding tracing information to user terminal, that is, only buy only in the successful situation of qualification testing
The consumer of certified products (or through the consumer authorization) can just inquire corresponding correct tracing information.
In this case, it is pasted in counterfeit merchandise even if retrospect two dimensional code is replicated by other people, other people scan this two dimension
On the one hand code improves the reliability of traceability system, allows due to not having permission qualification that cannot obtain corresponding correct tracing information
Certified products consumer to be bought accurately distinguish out which be certified products which be counterfeit merchandise, really protection arrive these consumers Consumer right
On the other hand benefit increases other people using to two dimensional code and identifies the difficulty that duplication stickup is palmed off, can hold back to a certain degree
The counterfeit behavior for making other people protects the interests of certified products businessman.
Detailed description of the invention
Specific embodiments of the present invention will be described in further detail with reference to the accompanying drawing.
Fig. 1 is a kind of flow chart of the method for anti-counterfeit of retrospect two dimensional code provided in an embodiment of the present invention.
Fig. 2 is a kind of structural block diagram of the anti-counterfeiting system of retrospect two dimensional code provided in an embodiment of the present invention.
Specific embodiment
Embodiment 1
With reference to Fig. 1, in the inquiry phase of tracing information, the present invention is traced includes: with the method for anti-counterfeit of two dimensional code
S100, user terminal scan retrospect two dimensional code, generate tracing information inquiry request according to the phone number of user's input
And send it to server.
Wherein, tracing information inquiry request carries two dimensional code mark and phone number.User terminal can be smart phone,
The existing wechat of user terminal, QQ etc. can be used in practical applications with the intelligent terminal of camera in Intelligent flat etc.
APP is scanned retrospect with two dimensional code;Two dimensional code can be QR Code, be also possible to Chinese letter co, or use other skills
The two dimensional code that art generates.
It for the generating process of retrospect two dimensional code, specifically includes: manager's operational administrative person's terminal request of producer
Tracing information is registered, manager terminal sends tracing information registration request to server, and tracing information registration request carries product
Tracing information;Server receives tracing information registration request, tracing information is saved to tracing information database, according to retrospect
Information generates corresponding retrospect two dimensional code, and matches corresponding two dimensional code mark for the retrospect two dimensional code.
S101, server receive tracing information inquiry request, according between the phone number prestored and two dimensional code mark
Authorization relationship, judge request in phone number whether have in request two dimensional code identify search access right, if it is, to
Family terminal feeds back tracing information corresponding with two dimensional code mark, if it is not, then sending the user to user terminal does not have inquiry
The information of permission.
S102, user terminal receive and show tracing information, check for user.
Specifically, when consumer buys certified products, seller, which traces permission to it and registers and authorize, (is detailed in and implements hereinafter
Example 3), establish new phone number-two dimensional code mark-tracing information three corresponding relationship, and by this corresponding relationship and
Corresponding data record in the database, for server calls.It is understood that a phone number and two dimensional code identify it
Between can be one-to-one relationship, be also possible to a variety of productions that an one-to-many relationship i.e. consumer has purchased a brand
Product;One two dimensional code mark represents a kind of product, is one-to-one relationship between a two dimensional code mark and retrospect two dimensional code.
Server judges whether phone number has the inquiry identified to two dimensional code in request in request in step s101
When permission, first judge whether the phone number belongs in authorized phone number list, and if so, further judgement should
In the scope of authority of phone number whether comprising the two dimensional code identify, if comprising, in decision request phone number have pair
The search access right that two dimensional code identifies in request.
Embodiment 2
Disclosed method based on the above embodiment, server phone number in decision request, which has, identifies two dimensional code in request
Search access right after, can also include as follows before feeding back corresponding with two dimensional code mark tracing information to user terminal
Step:
S200, server in decision request phone number have in request two dimensional code identify search access right after, Xiang Yong
Family terminal sends dynamic short message password.
S201, user terminal receive dynamic short message password, and the dynamic password of input are sent to server.
Specifically, it after user terminal receives dynamic short message password, can voluntarily be checked by user and defeated in designated position
Enter dynamic password, can also detect and parse the dynamic short message password received automatically by associated program, the dynamic that parsing is obtained
Password automatically enters designated position, and the latter is more convenient;It is sent to after detecting that dynamic password has been enter into designated position
To server.
S202, server receive dynamic password, when determining that dynamic password is consistent with dynamic short message password, to user terminal
Feed back tracing information corresponding with two dimensional code mark.
In this case, even if there are authorization relationships for phone number and two dimensional code mark, but as long as dynamic password is tested
It demonstrate,proves unsuccessful, cannot also inquire corresponding tracing information, i.e. the verifying of dynamic short message password can substantially guarantee operator
Be owner either owner authorization, both ensured buy certified products consumer the equity for exclusively enjoying tracing information, also into
One step increases other people and identifies the difficulty that duplication stickup is palmed off using to two dimensional code.
Wherein, the prior art is referred to about dynamic short message password generated, verifying the relevant technologies.
Embodiment 3
Based on method disclosed in the various embodiments described above, is registered for the retrospect permission referred in embodiment 1 and authorization carries out in detail
Illustrate, specifically, the registration of retrospect permission and licensing process include the following steps:
Step S300, user terminal or manager terminal scan retrospect two dimensional code, send new user's authorization to server and step on
Note request.
Wherein, new user authorizes registration request to carry new subscriber phone number and authorization two dimensional code mark.
Step S301, server receives new user and authorizes registration request, and the deposit user's authorization of new subscriber phone number is stepped on
The extent of competence remembered in database, and two dimensional code mark will be authorized to be included in new subscriber phone number completes new user and authorizes registration
Operation.
It should be strongly noted that the registration and authorization of the retrospect permission that the present invention refers to, are suitable for product in production, friendship
Easily, it gives etc. in transmittance process, current owner (old user) traces the registration of permission to next owner (new user) and awards
Power, successively hands on.Further, during this transfer of right, the permission of whole owners can be retained, or even can
To save the trace of whole owners in tracing information.
Embodiment 4
Based on the method for anti-counterfeit of retrospect two dimensional code disclosed in the various embodiments described above, correspondingly, the present invention also provides a kind of retrospects
With the anti-counterfeiting system system of two dimensional code, with reference to Fig. 2, which includes following content:
User terminal 100 generates tracing information inquiry according to the phone number of user's input and asks for scanning retrospect two dimensional code
It asks and sends it to server 101;It receives and shows tracing information, checked for user.
Server 101, for receiving tracing information inquiry request, according between the phone number prestored and two dimensional code mark
Authorization relationship, judge phone number whether have to two dimensional code mark search access right, if it is, to user terminal 100
Feed back tracing information corresponding with two dimensional code mark.
The system further includes manager terminal 102, for sending tracing information registration request to server 101;Server
101 are also used to receive tracing information registration request, generate corresponding retrospect two dimensional code and two dimension according to tracing information therein
Code mark, and tracing information is saved.
As for other contents of system, with reference to the content of above-described embodiment 1 ~ 3.
Technical solution provided by the present invention is described in detail above.Specific case used herein is to this hair
Bright principle and embodiment is expounded, method of the invention that the above embodiments are only used to help understand and its
Core concept.It should be pointed out that for those skilled in the art, in the premise for not departing from the principle of the invention
Under, it can be with several improvements and modifications are made to the present invention, these improvement and modification also fall into the protection of the claims in the present invention
In range.
Claims (6)
1. the method for anti-counterfeit that two dimensional code is used in a kind of retrospect, which is characterized in that this method comprises:
User terminal scan retrospect two dimensional code, according to user input phone number generate tracing information inquiry request and by its
It is sent to server;Wherein, the tracing information inquiry request carries two dimensional code mark and phone number;
The server receives the tracing information inquiry request, according to awarding between the phone number prestored and two dimensional code mark
Power relationship, judges whether the phone number has the search access right to two dimensional code mark, if it is, to the user
Terminal feeds back tracing information corresponding with two dimensional code mark;
The user terminal receives and shows the tracing information, checks for user.
2. the method as described in claim 1, which is characterized in that the server is determining the phone number with to described
After the search access right of two dimensional code mark, Xiang Suoshu user terminal feed back corresponding with two dimensional code mark tracing information it
Before, further includes:
The server sends dynamic short message password to the user terminal;
The user terminal receives the dynamic short message password, and the dynamic password of input is sent to the server;
The server receives the dynamic password, when determining that the dynamic password is consistent with the dynamic short message password, to
The user terminal feeds back tracing information corresponding with two dimensional code mark.
3. the method as described in claim 1, which is characterized in that further include:
The user terminal or the manager terminal scanning retrospect two dimensional code, Xiang Suoshu server send new user's authorization
Registration request;Wherein, the new user authorizes registration request to carry new subscriber phone number and authorization two dimensional code mark;
The server receives the new user and authorizes registration request, and the new subscriber phone number is stored in the user and is authorized
In registered database, and the authorization two dimensional code is identified to the extent of competence for being included in the new subscriber phone number, completes new use
Family authorizes log-on operation.
4. the method as described in claims 1 to 3 any one, which is characterized in that trace in user terminal scanning with two
Before dimension code, further includes:
Manager terminal sends tracing information registration request to the server;Wherein, the tracing information registration request carries
The tracing information of product;
The server receives the tracing information registration request, generates corresponding retrospect two dimension according to tracing information therein
Code and two dimensional code mark, and the tracing information is saved.
5. the anti-counterfeiting system that two dimensional code is used in a kind of retrospect, which is characterized in that the system includes:
User terminal generates tracing information inquiry request according to the phone number of user's input for scanning retrospect two dimensional code
And send it to server;It receives and shows tracing information, checked for user;Wherein, the tracing information inquiry request is taken
Band two dimensional code mark and phone number;
The server identifies it according to the phone number and two dimensional code that prestore for receiving the tracing information inquiry request
Between authorization relationship, judge the phone number whether have to the two dimensional code mark search access right, if it is, to institute
It states user terminal and feeds back tracing information corresponding with two dimensional code mark.
6. system as claimed in claim 5, which is characterized in that the system further include:
Manager terminal, for sending tracing information registration request to the server;Wherein, the tracing information registration request
Carry the tracing information of product;
The server is also used to receive the tracing information registration request, generates corresponding retrospect according to tracing information therein
It is identified with two dimensional code and two dimensional code, and the tracing information is saved.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910197658.9A CN109978568A (en) | 2019-03-15 | 2019-03-15 | A kind of retrospect method for anti-counterfeit and system of two dimensional code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910197658.9A CN109978568A (en) | 2019-03-15 | 2019-03-15 | A kind of retrospect method for anti-counterfeit and system of two dimensional code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109978568A true CN109978568A (en) | 2019-07-05 |
Family
ID=67079086
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910197658.9A Pending CN109978568A (en) | 2019-03-15 | 2019-03-15 | A kind of retrospect method for anti-counterfeit and system of two dimensional code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109978568A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110675161A (en) * | 2019-08-22 | 2020-01-10 | 上海汽车制动系统有限公司 | A system of traceing back for braking pincers product |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103106594A (en) * | 2012-07-23 | 2013-05-15 | 北京金源茂丰新技术开发有限公司 | Product quality tracing anti-fake system and tracing anti-fake method |
CN103295137A (en) * | 2013-04-11 | 2013-09-11 | 济南润土农业科技有限公司 | Two-dimensional code dynamic anti-fake information intelligent tracing system based on network |
CN104992335A (en) * | 2015-07-02 | 2015-10-21 | 刘洋 | Full-circulation type two-dimensional code anti-counterfeiting system and realization method thereof |
-
2019
- 2019-03-15 CN CN201910197658.9A patent/CN109978568A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103106594A (en) * | 2012-07-23 | 2013-05-15 | 北京金源茂丰新技术开发有限公司 | Product quality tracing anti-fake system and tracing anti-fake method |
CN103295137A (en) * | 2013-04-11 | 2013-09-11 | 济南润土农业科技有限公司 | Two-dimensional code dynamic anti-fake information intelligent tracing system based on network |
CN104992335A (en) * | 2015-07-02 | 2015-10-21 | 刘洋 | Full-circulation type two-dimensional code anti-counterfeiting system and realization method thereof |
Non-Patent Citations (1)
Title |
---|
吴明华, 重庆大学出版社 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110675161A (en) * | 2019-08-22 | 2020-01-10 | 上海汽车制动系统有限公司 | A system of traceing back for braking pincers product |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104992335B (en) | A kind of current global mechanism type two-dimension code anti-counterfeit system and its implementation | |
CN103825734B (en) | Sensitive operation verification method, terminal device, server and checking system | |
CN105894304B (en) | Product anti-counterfeiting method | |
CN111861677A (en) | Intelligent purchase, sale, storage and express delivery method based on e-commerce platform | |
WO2019062377A1 (en) | Product anti-counterfeiting management system and method | |
CN109101839B (en) | Product maintenance support system based on block chain | |
CN108573384A (en) | Possess the product and product back-tracing anti-fake verification method and device of dual identification code | |
CN108154362A (en) | Method of commerce, apparatus and system based on figure bar code | |
CN104299146A (en) | Product anti-counterfeiting inquiry system | |
CN109034832A (en) | The information processing method and device of block chain, information processing node and storage medium | |
US20220158997A1 (en) | End-to-End Product Authentication Technique | |
KR101580846B1 (en) | System for verification of authenticity if parallel import goods and method therefor | |
CN104182866A (en) | Product or object anti-counterfeiting system and method suitable for situations, such as switch transaction and the like | |
CN111445246A (en) | Block chain-based data recording method, device, equipment and storage medium | |
CN109559136A (en) | Information management system and method | |
CN105631687B (en) | Product Validation method and device | |
CN110147991A (en) | A kind of method, apparatus and system of the multi-platform payment of graphic code | |
CN108985431B (en) | Anti-counterfeit label and method for detecting and identifying genuine goods of registered trademark | |
CN109640297A (en) | No card interactive system and simulation card apparatus | |
CN103996122A (en) | Merchandise anti-counterfeiting system and method | |
JP2020197937A (en) | Authenticity determining apparatus, authenticity determining system, and authenticity determining method | |
CN109978568A (en) | A kind of retrospect method for anti-counterfeit and system of two dimensional code | |
CN110349322B (en) | Invoice data verification method, device and equipment | |
CN109670563A (en) | A kind of anti-counterfeit authentication method and device | |
CN109544146A (en) | No card interactive system and simulation card apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190705 |
|
RJ01 | Rejection of invention patent application after publication |