CN110503437A - Based on the article anti-counterfeit method more identified and its system - Google Patents
Based on the article anti-counterfeit method more identified and its system Download PDFInfo
- Publication number
- CN110503437A CN110503437A CN201810469095.XA CN201810469095A CN110503437A CN 110503437 A CN110503437 A CN 110503437A CN 201810469095 A CN201810469095 A CN 201810469095A CN 110503437 A CN110503437 A CN 110503437A
- Authority
- CN
- China
- Prior art keywords
- identifier
- article
- mark
- verified
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000004806 packaging method and process Methods 0.000 claims description 42
- 238000012795 verification Methods 0.000 claims description 24
- 230000005540 biological transmission Effects 0.000 claims description 3
- 238000012360 testing method Methods 0.000 claims description 2
- 238000012856 packing Methods 0.000 description 25
- 230000006399 behavior Effects 0.000 description 10
- 239000002775 capsule Substances 0.000 description 6
- 238000004519 manufacturing process Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 5
- 230000008901 benefit Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 235000013618 yogurt Nutrition 0.000 description 3
- 235000013361 beverage Nutrition 0.000 description 2
- 230000006378 damage Effects 0.000 description 2
- 235000021262 sour milk Nutrition 0.000 description 2
- 206010052804 Drug tolerance Diseases 0.000 description 1
- 241000208125 Nicotiana Species 0.000 description 1
- 235000002637 Nicotiana tabacum Nutrition 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 239000011248 coating agent Substances 0.000 description 1
- 238000000576 coating method Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 239000003814 drug Substances 0.000 description 1
- 229940079593 drug Drugs 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 235000013305 food Nutrition 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000003292 glue Substances 0.000 description 1
- 230000026781 habituation Effects 0.000 description 1
- 230000006698 induction Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012946 outsourcing Methods 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 238000010408 sweeping Methods 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Abstract
It is packed this application provides a kind of based on the article anti-counterfeit method more identified, article anti-counterfeit server, client and article anti-counterfeit, its method includes: to generate the first identifier and second identifier that have wrapped article, and the first identifier and second identifier are used to carry out article authentication and behaviour in service verifying;Wherein first identifier can be acquired before use of the article;Second identifier is in hidden state before use of the article and is acquired after in article;The first identifier and second identifier are subjected to being associated with for identity information with article;The checking request to the second mark to be verified of target item is received, the use information of matching second identifier and corresponding article is searched;If found, the use information of the corresponding article is set as having used.According to the scheme of the application, the reliability that user carries out product false proof verifying can be effectively promoted.
Description
Technical field
This application involves anti-counterfeiting technologies more particularly to a kind of based on the article anti-counterfeit method more identified and its system, including
Server and client side etc..
Background technique
Background that this section is intended to provide an explanation of the embodiments of the present invention set forth in the claims or context.Herein
Description recognizes it is the prior art not because not being included in this section.
In today's society, either enterprise or consumer, is all struggled with fake and inferior commodities trying every possible means, faced
Rampant commodity counterfeit behavior, related anti-counterfeiting technology are also evolving in the market.For example, using two dimension in commodity packaging
Code, a string of security codes of coating covering etc., are scanned two dimensional code by user, are inquired etc. using network security code
Mode carries out fake certification.These anti-fake modes no doubt to a certain extent can be anti-fake, but if adulterator is by certified products
Secondary use is packed on counterfeit product, then is obtained when consumer verifies the counterfeit product based on the packaging of the counterfeit product
To verification result be certified products, this not only compromises the equity of consumer, and compromises certified products production firm and sale
Credibility of the quotient in the minds of the majority of consumers.
Summary of the invention
Although puppet can not be solved from the foregoing, it will be observed that current counterfeit protection measures to a certain extent can be anti-fake
Certified products is packed secondary use on counterfeit product to cheat consumers the problem of by the person of making.
The purpose of the application is to provide a kind of based on the article anti-counterfeit method, server, client and the packet that identify more
Dress is packed secondary use on counterfeit product to cheat consumers the problem of can efficiently solve adulterator for certified products, is mentioned
Rise the reliability that user carries out product false proof verifying.
According to one embodiment of the application, provide a kind of based on the article anti-counterfeit method more identified, this method includes
Following steps: generate the first identifier and second identifier for having wrapped article, the first identifier and second identifier for pair
Article carries out authentication and behaviour in service verifying;Wherein first identifier can be acquired before use of the article, pass through the of acquisition
One mark is proposed that the checking request of first identifier;Second identifier is in hidden state and before use of the article after article use
It is acquired, the checking request of second identifier is proposed that by the second identifier of acquisition;By the first identifier and second identifier with
The association of article progress identity information;The checking request to the second mark to be verified of target item is received, is searched and second
The use information of the matched second identifier of mark to be verified and article corresponding with the matched second identifier;If finding this
The use information of matched second identifier and article corresponding with the matched second identifier, the use of the corresponding article is believed
Breath is set as having used.
It according to another embodiment of the application, additionally provides a kind of based on the article anti-counterfeit server more identified, comprising: use
In the device for generating the first identifier and second identifier that have wrapped article, wherein first identifier and second identifier are used for object
Product carry out authentication and behaviour in service verifying;Wherein first identifier can be acquired before use of the article, pass through the first of acquisition
Mark is proposed that the checking request of first identifier;Second identifier is in hidden state and the quilt after article use before use of the article
It obtains, the checking request of second identifier is proposed that by the second identifier of acquisition;For by the first identifier and second identifier
The associated device of identity information is carried out with article;For receiving the checking request to the second mark to be verified of target item,
It searches and the second use information to be verified for identifying matched second identifier and article corresponding with the matched second identifier
Device;It, will in the use information for finding the matched second identifier and article corresponding with the matched second identifier
The use information of the corresponding article is set as used device.
It according to the another embodiment of the application, additionally provides a kind of based on the article anti-counterfeit client more identified, comprising: use
In the unit for the first mark or/and the second mark to be verified to be verified for reading target item;Based on to the first mark to be verified
Or/and second the information of mark to be verified read, sent to article anti-counterfeit server and checking request and receive the article anti-counterfeit
The unit for the fake certification result that server returns.
According to the another embodiment of the application, additionally provide a kind of based on the article anti-counterfeit more identified packaging, the packaging packet
It includes: can be used in the first identifier and second identifier that carry out authentication and behaviour in service verifying to article, wherein first identifier
It can be acquired before use of the article, the checking request of first identifier is proposed that by the first identifier of acquisition;Second identifier is in object
Product, in hidden state and being acquired after in article, are proposed that testing for second identifier by the second identifier of acquisition using preceding
Card request, first identifier and second identifier are associated with article progress identity information, and the use information of the article can be according to the
Two identify the historical record searched in particular server and modify.
Compared with prior art, embodiments herein has the advantage that
Embodiments herein carries out multiple anti-fake verifying to article by the more marks of setting, and the in especially more marks
One mark can be acquired before use of the article, and second identifier is in hidden state before use of the article and is obtained in article using rear
It takes, at least part mark therein can be acquired before use of the article, and in addition at least part mark is in article
It is in hidden state using preceding, this allows for user can both identify based on a part got to the object before using article
The true and false of product carries out preliminary verifying, promotes the convenience of authenticity verification;It again can be based on using before article and using article mistake
Multiple anti-counterfeit label in journey promotes the real reliability of item authentication.More particularly, once the second identifier quilt of the application
Authenticated, then the use information of the corresponding article of the second identifier is changed to use, then no matter next time receive it is right with this
When the verifying of any mark for the article answered, the corresponding used information of article will be all fed back.Then if there is adulterator
Certified products is packed into secondary use when on counterfeit product, consumer can also obtain the article of certified products packaging based on Antiforge inquiry
Used information, to know that the article is non-certified products.
In addition, a possibility that adulterator forges can also be effectively reduced in more mark fake certifications of the application.Specifically,
Due in more marks for being arranged of the present invention second identifier used before in hidden state, even if the adulterator of article has forged the
One mark, but the second identifier of commodity can not be obtained easily when not destroying or opening commodity outer packing or packaging,
It can only guess the content of second identifier, and if adulterator will guess that obtained second identifier is placed in counterfeit commodity outer packing
Interior, then there is in the case where verifying the greater risk for being found to be forgery in the counterfeit commodity, moreover, the conjecture will not only be spent
Certain intelligence, it is also desirable to carry out actual cost input.Therefore, higher cost and biggish risk is undertaken when needing to expend
In the case where going forgery, a possibility that forgery behavior, be can be effectively reduced.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 schematically shows the flow chart based on the article anti-counterfeit method more identified of the application one embodiment;
Fig. 2 schematically shows positions applied by multiple marks in the article anti-counterfeit of the application one embodiment packaging
The schematic diagram set;
Fig. 3 schematically shows the process based on the article anti-counterfeit method more identified of another embodiment of the application
Figure;
Fig. 4 schematically shows the processes based on the article anti-counterfeit method more identified of another embodiment of the application
Figure;
Fig. 5 schematically shows the process based on the article anti-counterfeit method more identified of another embodiment of the application
Figure;
Fig. 6 is schematically shown according to the offer of the application one embodiment based on the article anti-counterfeit server more identified
Schematic diagram;
What Fig. 7 was schematically shown according to the application another embodiment based on the article anti-counterfeit server more identified
Schematic diagram;
Fig. 8 is schematically shown according to the offer of the application one embodiment based on the article anti-counterfeit client more identified
Schematic diagram;
The same or similar appended drawing reference represents the same or similar component in attached drawing.
Specific embodiment
The principle and spirit of the invention are described below with reference to several illustrative embodiments.It should be appreciated that providing this
A little embodiments are used for the purpose of making those skilled in the art can better understand that realizing the present invention in turn, and be not with any
Mode limits the scope of the invention.On the contrary, these embodiments are provided so that this disclosure will be more thorough and complete, and energy
It is enough that the scope of the present disclosure is completely communicated to those skilled in the art.
Those skilled in the art will understand that embodiments of the present invention can be implemented as a kind of method, server, client
End, computer program product and article packaging.Therefore, the application can be implemented as complete hardware, complete software or
The combination of person's hardware and software or only article packaging etc..
Herein, it is to be understood that any name is only used for distinguishing, without any restrictions meaning.
Below with reference to several representative embodiments of the invention, the principle and spirit of the present invention are explained in detail.
Summary of the invention
The inventors discovered that in the prior art, it, to a certain extent can be anti-fake although there are many anti-counterfeiting technologies,
Be can not solve the problems, such as that certified products is packed secondary use on counterfeit product to cheat consumers by adulterator, and it is anti-fake can
It is also required to further strengthen in property.
In embodiment of the present invention, fake certification is carried out to having wrapped article by using more marks.For example, using
At least first identifier and second identifier carry out identity and verifying to same article, and first identifier before use of the article can
Be easier to, be clearly readily accessible by the user, for example, first identifier be located on the outside of the outer packing of article, can be directly by mobile phone
Scanner program carries out barcode scanning identification, and the information after the identification is automatically sent to corresponding server by the mobile phone and is tested
Card;And second identifier is located on the inside of article packaging before being used in hidden state, such as second identifier, needs to open or destroy
The packaging of article can just be got.To which user can not only be before being not used article at least based on obvious clear first identifier
Quickly preliminary identification is carried out to the true and false of the article, moreover it is possible to by obtaining the second mark after the packaging for opening or destroying the article
The information of knowledge further verifies the true and false of the article, to further promote anti-fake reliability based on multiple-authentication.
And in method of the invention, after second identifier is used for verifying, no matter whether first identifier has been verified, corresponding
Article use state information is all modified to use, and can effectively solve adulterator in this way certified products is packed secondary use to exist
Come the problem of cheating consumers on counterfeit product.Method of the invention can also include in addition to the first identifier and second identifier
Third in addition or more mark.
Illustrative methods
According to one embodiment of the application, provide a kind of based on the article anti-counterfeit method more identified, Fig. 1 is schematically
Show the flow chart of the first exemplary embodiment of the article anti-counterfeit method.
In the present embodiment, the article is the article with outer packing.In a more preferred embodiment, the article is also
Article with inner packing.The contact of the article is needed by releasing (destruction) described outer packing and/or the inner packing.
Use to the article is generally also considered as to the releasing (destruction) of the outer packing and/or the inner packing.
In the present embodiment, the executing subject of article anti-counterfeit method can for user terminal or/and be mounted on user terminal
On client communication connection server, which can be by manufacturer that the manufacturer of article, article are packed or/and anti-
Pseudo- service provider's setting.Wherein, server includes but is not limited to the clothes of single network server, multiple network servers composition
Device group of being engaged in or the cloud consisting of a large number of computers or network servers for being based on cloud computing (Cloud Computing);User is whole
End include but is not limited to mobile phone, smartwatch, computer, code reader, scanner, specific information reader (such as RFID read
Device), client can include but is not limited to can be with the barcode scanning app of readout code category information (such as with the micro- of " sweep and sweep " function
Letter, Alipay etc.), in user terminal for identification with the program module that reads information etc..
In the present embodiment, the form of expression of mark includes but is not limited to code category information (such as bar code, two dimensional code etc.), number
One or more any combination such as word, letter, character string, figure, symbol is identified based on radio-frequency technique, optical technology etc.
Label or carrier (such as induction type electronic chip or proximity card, contactless card, non-contact card, electronic tag, electronic bar code etc.).
Wherein, the first identifier of article is provided in the method for the present embodiment.The first identifier can be not used by article
It is acquired in the case where (outer packing including the article is not destroyed), especially by being visually immediately seen or can be used
The mode that aforementioned client terminal and/or client obtain is acquired.For example, the first identifier can be to print, be engraved in or glue
The modes such as patch are attached to the surface of package of article or article, or integral with the outer packing of article or article, or positioned at article
In other adjuncts.Wherein, the checking request of first identifier is proposed that by the first identifier of acquisition.Such as user can pass through
Naked eyes are immediately seen or with the directly scanning recognition mark such as mobile phone and can directly read the information of the mark.More specifically example
Such as, user scans the first identifier of article packaging by mobile phone, sends verifying first mark to the letter bill member of particular server
The request of knowledge, particular server upon receiving the request, search whether to exist in the storage device of the server with this
The corresponding matching of one mark, if it is present being existed in the server from letter bill member to the information that mobile phone terminal returns to the article
Verification result;Otherwise, then the verification result being not present in the server to the information that mobile phone terminal returns to the article.
The second identifier of article is also provided in the method for the present embodiment, is in hidden state before use of the article, and
Article is acquired after.For example, the second identifier article packaging especially outer packing be destroyed in the case where
It can be acquired.The second identifier can be realized using suitable method it is hiding, it is only just right under the conditions of meeting specific
User is visible.Such as second identifier is the number of naked eyes identification or the two dimensional code of handset program identification, is located at the outsourcing of article
The inside of dress needs to obtain after destroying outer packing.In another example second identifier is located at the object of the inside of opaque outer packing
On body, to only destroy outer packing, the mark could be obtained after taking out object.In another example second identifier is located at outside transparent
On the object of the inside of packaging, covering can scrape figure layer to realize that is at least partly identified hides, thus only extremely in mark
Small part can scrape the hiding portion identification in the case that figure layer is destroyed and just be shown.It can be to by the second identifier of acquisition
Server proposes the checking request of the second mark to be verified.Wherein, checking request is sent to server based on second identifier and obtained
The description of verification process of the upper section based on first identifier can be referred to the description of verification result, it is for purpose of brevity, not superfluous herein
It states.
Wherein, the original state with first identifier or/and the associated article use information of second identifier can be by the article
The special delegated authority personnel of production firm be arranged and be stored in advance in the server, and according to specific modification mechanism or more
New mechanism is manually or automatically updated by the people of specified permission.
Such as before server receives first time to the checking request of second identifier, the initial shape of the use information of article
State is arranged to unused state, once server received the checking request of second identifier, then in the server makes article
Use state is revised as after, so that server receives the second identifier or receives and second mark next time
When knowing associated first identifier, the status information of " article has used " is all returned to the terminal for sending checking request.
Specifically, such as consumer has bought an article A (referred to herein as target item), has in the outer packing of article A
One 1 (the referred to here as first mark to be verified) of mark, having a mark 2 in the outer packing of article A, (referred to here as second is to be tested
Card mark).It is assumed that consumer sends checking request by be verified identify to server of mobile phone scanning second, then when server connects
Receive the checking request to the second mark to be verified of target item, search with the matched second identifier of the second mark to be verified and
The use information of article corresponding with the matched second identifier.If finding the matched second identifier and matched with this
The use information of the corresponding article of second identifier, then be revised as having used by the use information of the corresponding article.By server
Corresponding executive device the use information that the corresponding article is stored on server is revised as having used, i.e. second identifier
The use information of article corresponding with the associated first identifier of second identifier is all that article had been used.As a result, in server
When receiving the checking request to the checking request of the first mark to be verified of target item or the second mark to be verified next time, all
It is used information to the use information of corresponding client returned articles.For example, receive to the second of target item to
Verify the checking request of mark, search with second it is to be verified identify matched second identifier and with the matched second identifier it is corresponding
Article use information.If finding the matched second identifier and making with the matched corresponding article of second identifier
With information, and the use information of the corresponding article of the matched second identifier shows that the corresponding article was not used, then modifies
The use information of the corresponding article, and returning to the target item is certified products and original anti-fake result.
It is the second mark when finding its matching since the second mark to be verified received verifying in the server after upper example
Know, and the use information of its corresponding article is modified to use, then under the premise of this, if consumer prepares verifying together
The first mark to be verified on one article A, no matter first mark to be verified is to verify to go back right and wrong for the first time for the first time in the server
Verify in the server, then in the case where server receives the checking request of the first mark to be verified, search with first to
Verifying identifies the use information of matched first identifier and article corresponding with the matched first identifier, due to corresponding article
Use information be modified to use after the second identity verification to be verified, then server had used corresponding article
Information return to the client for issuing the first identity verification to be verified request.
It should be noted that consumer is for the first time if the second mark to be verified did not receive verifying in the server
In the case where verifying the first mark to be verified in the server, when server is searched and the first matched first mark of mark to be verified
Know and the use information of article corresponding with the matched first identifier, if the matched corresponding article of first identifier makes
Show that the corresponding article was not used with information, then returning to the target item is certified products and original anti-fake result.
According to above, in order to preferably guide consumer to verify in a predetermined sequence to multiple marks, such as first
First identifier is verified, then verifies second identifier ..., checking request can be sent to server by mobile phone in consumer
In the case of, reminded by the way that built-in reminder is arranged on mobile phone consumer identification verifying sequence or by server to
Mobile phone terminal returns to the modes such as the reminder message of identity verification sequence, to remind consumer to verify according to preset sequence, from
And first identifier is verified after avoiding consumer from first verifying second identifier after having bought certified products, it is obtained when verifying first identifier
The case where to the used information of the certified products to produce misunderstandings.
Wherein the first identifier and second identifier can be located at the identical or different region of product or/and product packaging, excellent
Bit selecting is located at the outside of product packaging in product or/and the different zones of product packaging, such as first identifier, and second identifier is located at
The inside of product packaging.And it is preferably based on the features of shape of different product or product packaging itself, user is used for
Mode etc. and by multiple mark scattering devices in different positions, to promote user while promoting anti-fake reliability anti-fake
Use upper convenience.Specifically for example, for one bottle of Yoghourt, at least part mark is located at the outside of the Sour milk bottle,
At least another part identifies the bottle cap inner surface for being located at the Sour milk bottle, so that user can not only be before using Yoghourt based on outside bottle
The obvious mark of side carries out preliminary identification, moreover it is possible to be observed after uncapping based on the habituation to bottle cap, utilize the mark in bottle cap
Yoghourt is further verified.
In the present invention, article involved in article anti-counterfeit method is described as user's object to be certified, including but unlimited
In commodity, commodity packaging, file, bill etc., the commodity include but is not limited to food, drink, drug, drinks, particularly for tobacco items etc..
Article of the invention has outer packing, preferably also has inner packing.
According to Fig. 1, the article anti-counterfeit method be may comprise steps of:
Step S101 generates the first identifier and second identifier with the article of outer packing.Wherein first identifier and second
Mark is for carrying out authentication and behaviour in service verifying to article;Wherein first identifier can be acquired before use of the article, be led to
Cross the checking request that the first identifier obtained is proposed that first identifier;Second identifier be in front of use of the article hidden state and
Article is acquired after, and the checking request of second identifier is proposed that by the second identifier of acquisition.
Wherein, first identifier or second identifier can refer to single mark, can also refer to identification sets.
Wherein, the first identifier can be located at the package outer of article, and user can be directly observed by naked eyes, or
The corresponding information of first identifier is directly obtained by information reading manners such as scannings based on corresponding device.Alternatively,
It, can in the case where the packaging of the article is not yet destroyed though the first identifier is not located at the package outer of article
It is readily accessible by the user, such as although the first identifier is not at the package outer of article, but passes through near-field sensing device etc.
The corresponding information of first identifier can directly be sensed.
Wherein preferably, the second identifier can be realized hiding based on the mode of following one: the second identifier quilt
It is closed in packaging inside;The second identifier is located on the article in packaging.To even if article adulterator can learn the
One identification information, but since it can not be easily obtained second identifier letter in the case where not destroying or not opening article packaging
Breath, thus can not absolutely puppet produce with the identical anti-counterfeiting mark of certified products, thus see from this point on, second identifier
Hiding setting can be effectively reduced a possibility that anti-fake.In addition, as described above, user is when using the article due to being capable of base
The second identifier is got in specific mode (such as destroying or open article outer packing), and then the second identifier can be based on
The true and false of the article is verified again, effectively promotes the reliability of the Application in Anti-counterfeiting.
For step S101, for example, generating first identifier A and second identifier B, first identifier A and second identifier B
Authentication can be carried out to same article.More specifically for example, this two marks can be used in same box body shown in Fig. 2
Authentication is carried out, wherein first identifier A is located at position 1 shown in the outside of the box body, and second identifier B is located at the interior of the box body
Position 2 shown in side.It, can be with as to how carry out the process of authentication to same article based on first identifier and second identifier
With reference to hereafter, hereafter will be discussed in more detail.
Preferably, the first identifier and second identifier are interrelated.For example, first identifier and second identifier are in server
Middle there are the mapping relations of one-to-one or one-to-many or many-one or multi-to-multi, or pass through the data processings such as encrypting and decrypting
Journey can obtain another mark in the case where known one of mark.
It is further preferred that the second identifier of same article is unidirectional according to first identifier and uniquely generates, consequently facilitating
When being managed in the database of server to multiple marks of multiple articles, based on the retrieval or parsing to first identifier
Deng carrying out more unified data management to second identifier corresponding with first identifier, also better ensure that second identifier and the
The relevance that one mark is clearly directed toward.
Certainly, in addition to generating first identifier and second identifier, other multiclass or multiple in the prior art can also be generated
Other identifier.
First identifier and second identifier are carried out being associated with for identity information with article by step S102.
Wherein, lot number, unique identifying number ID, date of manufacture, specification, the name of an article of the identity information of article for example including article
Etc. a variety of for distinguishing and identifying the information of article.
For step S102, can by first identifier generated and second identifier and it is to be produced, produced or to
The identity information of the article of delivery is associated, and the identity information of first identifier, second identifier and these articles is deposited together
It is stored in server.Such as first identifier A and second identifier B is subjected to being associated with for identity information with same article W, thus user
It can realize following data retrieving in the database of server based on specific permission: input first identifier A or/and the
Two mark B, retrieval obtain the lot number of article W, date of manufacture, unique identifying number ID these identity informations.
Step S103, receives the checking request to the second mark to be verified of target item, searches and second is to be verified
Identify the use information of matched second identifier and article corresponding with the matched second identifier.
Step S104, if finding the matched second identifier and making with the matched corresponding article of second identifier
With information, the use information of the corresponding article is set as having used.
Example: target item is installed in one bottle of wine in wooden box, and the first mark to be verified is black and white two dimensional code, is located at wooden box
Outside, second it is to be verified mark be color 2 D code, positioned at bottle body on the outside of, if the wine is certified products, positive reason
Under condition, it is assumed that first mark to be verified is matched with the first identifier in server, second mark to be verified and service
Second identifier matching in device, and presets program performed below in the server: once terminal to server send this
The use state of the corresponding article of the second identifier then is changed to be used by the checking request of two marks, server.
Then in order to verify the true and false of target item, user scans the on the outside of wooden box by mobile phone before opening wooden box
One mark " black and white two dimensional code " to be verified, then server is issued based on the scanning carried out to black and white two dimensional code receiving mobile phone
Checking request in the case where, be based on scheduled proof rule, preliminary identification carried out to the true and false of the wine, obtains preliminary identification knot
Fruit, for example, " information of wine is not present in the database ", or " information of wine is necessary being in the database ".It connects
Get off, after opening wooden box, user can continue through the second mark " colour two to be verified on the outside of mobile phone scanning bottle body
Tie up code " mode send checking request to server, then server is receiving mobile phone based on sweeping to color 2 D code
It retouches in the case where the checking request that issues, is based on scheduled proof rule, the true and false of the wine is further verified, the wine is obtained
Further verification result, include the case where the wine with the presence or absence of being used.It such as can be with are as follows: (1) " this bottle of wine is in data
Display has been used in library ";Or (2) " this bottle of wine shows be not used by the database ".Under situation (2), when again to clothes
Business device receives the checking request for second mark to be verified that any terminal is sent next time, and server all can also return to transmission
The verification result of " this bottle of wine shows have been used in the database ".
According to the application preferred embodiment, referring to FIG. 3, the article anti-counterfeit method of the application can also include:
Step S105 is right receiving this if the use information of the corresponding article is modified to use
In the case where the first identifier for the item associations answered or the checking request of second identifier, the use information of the corresponding article is returned
For used anti-fake result.
After the verifying example that target item above is wine, once the use state of the wine is changed to be made by server
With, if server receive again first it is to be verified mark or the second mark to be verified checking request, by searching for first to
It is to have used that verifying mark or the second mark to be verified, which have matching and the use information of matched wine, then the server can be to
Terminal sends the verification result of " this bottle of wine shows have been used in the database ".
From the foregoing, it will be observed that fakement usurps that second identifier is subsequent verify with passing a fake product off as a genuine one to the application in order to prevent, will service
The use state information of the wine stored in device is revised as " use ", even if then counterfeiter usurps the second identifier and applies
On bottle, if bought by consumer is mistakenly purchased, also can its using when remind consumer's wine to use well, avoid it
Infringement by non-certified products.
According to the application preferred embodiment, referring to FIG. 4, the article anti-counterfeit method of the application further include:
Step S201 receives the checking request to the first mark or the second mark to be verified to be verified of target item,
It searches and the first mark to be verified or the second matched first identifier of mark to be verified or second identifier.
Such as with example above for, user scans the first identifier two dimensional code on the outside of Wine packing box by mobile phone come to clothes
Device of being engaged in sends checking request, server upon receiving the request, based on the two dimension that it is identified received by the mobile phone terminal
Code information, searches whether there is matching identical with the two-dimensional barcode information from the respective memory device of server.
Wherein, the two-dimensional barcode information can refer to and code sequence or Serial No. etc. corresponding to two dimensional code.
Step S202 returns to the object if not finding the matched first identifier or second identifier
The anti-fake result that product information is not present.
After upper example, if server does not find matching identical with the two-dimensional barcode information, such as " wine is obtained
Information be not present, be counterfeit merchandise " verification result, and verification result is sent to corresponding mobile phone terminal by server.
Preferably, further includes:
Step S203, if finding the matching of the described first mark or the second mark to be verified to be verified, further
Article use state information corresponding to the matching is obtained, obtains the target item including article use state information
Verification result.
After upper example, if server finds the matching of the described first mark or the second mark to be verified to be verified, into
One step obtains the use state information of the corresponding wine of the matching, such as can be with are as follows: (1) " this bottle of wine is shown in the database
It is used ";Or (2) " this bottle of wine shows be not used by the database ".
Preferably, the information in server is inquired and is managed for the ease of corresponding information manager, according to
The preferred embodiment of the application, referring to FIG. 5, the article anti-counterfeit method can also include:
Step S401 receives the permissions data access request from client, right according to the Authority Verification rule of setting
The access request is verified.
For example, corresponding information manager logs in specific client by input account and password on computers, to
Server sends the request for inquiring certain commodity sign, then after server receives the request, based on account and password to the administrator
The permission of member is verified, and determines whether it has the permission for the identification information for accessing some or all commodity.
Step S402 is then based on first identifier or second identifier retrieval the receiving the client if the verification passes
In the case of the request of two marks or first identifier, it will be closed with the associated second identifier information of the first identifier or with the second identifier
The first identifier information of connection is back to the client.
For example, if verifying the result is that the user has the permission for accessing storewide identification information, receiving
It, will be with the first identifier associated the in the case of the request based on first identifier retrieval second identifier sent to user client
Two identification informations are back to the client.It preferably, will also Item Information associated with the first identifier or/and second identifier
It is back to the client, to provide more fully information to the user.
Optionally, in the case where being verified, the relevance based on first identifier and second identifier, user can basis
First identifier retrieves the information of second identifier, and the information of first identifier can also be retrieved according to second identifier.
Exemplary servers
After describing the method for exemplary embodiment of the invention, next, with reference to Fig. 6 to the exemplary reality of the present invention
Apply mode, be illustrated based on the article anti-counterfeit server more identified.
Fig. 6 schematically shows the showing based on the article anti-counterfeit server more identified provided according to embodiments of the present invention
It is intended to.As shown in fig. 6, described may include: based on the article anti-counterfeit server more identified
For generating the first identifier of the article with outer packing and (referred to as " the mark generation dress of device 11 of second identifier
Set 11 "), wherein first identifier and second identifier are used to carry out authentication to article and behaviour in service is verified;Wherein the first mark
Knowledge can be acquired before use of the article, and the checking request of first identifier is proposed that by the first identifier of acquisition;Second identifier exists
Article, in hidden state and being acquired after in article, is proposed that second identifier by the second identifier of acquisition using preceding
Checking request;
For the first identifier and second identifier and article to be carried out the associated 12 (referred to as " mark of device of identity information
With Item Information associated apparatus 12 ");
For receiving the checking request to the second mark to be verified of target item, search and the second mark to be verified
(referred to as " the second identifier of device 13 of the second identifier matched and the use information of article corresponding with the matched second identifier
With lookup device 13 ");
For in the use information for finding the matched second identifier and article corresponding with the matched second identifier,
The use information of the corresponding article is set as used device 14 (referred to as " information modifies device 14 ").
Optionally, the article anti-counterfeit server further include:
For in the case where the use information of the corresponding article is modified to used situation, if it is right to receive this
The first identifier for the item associations answered or the checking request of second identifier, the then use information for returning to the corresponding article are to have made
The device 15 (referred to as " information return mechanism 15 ") of used anti-fake result.
Optionally, the first identifier and second identifier are interrelated.
Optionally, the article anti-counterfeit server further include:
For receiving the permissions data access request from client, according to the Authority Verification rule of setting to the access
Request the device 16 (referred to as " Authority Verification device 16 ") verified;
For being based on first identifier or second identifier retrieval second identifier or the being verified and receive the client
In the case where one mark, it will believe with the associated second identifier information of the first identifier or with the associated first identifier of the second identifier
Breath is back to the device 17 (referred to as " Authority Verification information return mechanism 17 ") of the client.
Optionally, the second identifier of same article is unidirectional according to first identifier and uniquely generates.
Optionally, referring to FIG. 7, further include:
For receiving the checking request to the first of target item the mark or the second mark to be verified to be verified, search and the
One mark to be verified or the second unit 21 (referred to as " matching unit to be verified for identifying matched first identifier or second identifier
21");
For returning to the target item in the case where not finding the matched first identifier or second identifier
The unit 22 (referred to as " return unit 22 is not present in information ") for the anti-fake result that information is not present.
Exemplary client
In some possible embodiments, the present invention is also implemented as a kind of form of program product comprising journey
Sequence code, it is described when described program product is run on terminal device (such as mobile phone, computer, specific information reader etc.)
Program code is for making terminal device execute some steps described in this specification.
With reference to Fig. 8 to exemplary embodiment of the invention, be illustrated based on the article anti-counterfeit client more identified.Such as
It is described to may include: based on the article anti-counterfeit client more identified shown in Fig. 8
The unit 41 of the first mark or/and the second mark to be verified to be verified for reading target item (referred to as " is read
Unit 41 ");
It is read based on the information to the first mark or/and the second mark to be verified to be verified, is sent out to article anti-counterfeit server
It send checking request and receives (referred to as " the letter bill member of unit 42 for the fake certification result that the article anti-counterfeit server returns
42");
The wherein article anti-counterfeit server, comprising:
For generating the first identifier of the article with outer packing and the device of second identifier, wherein first identifier and second
Mark is for carrying out authentication and behaviour in service verifying to article;Wherein first identifier can be acquired before use of the article, be led to
Cross the checking request that the first identifier obtained is proposed that first identifier;Second identifier be in front of use of the article hidden state and
Article is acquired after, and the checking request of second identifier is proposed that by the second identifier of acquisition;
For the first identifier and second identifier and article to be carried out the associated device of identity information;
For receiving the checking request to the second mark to be verified of target item, search and the second mark to be verified
The device of the second identifier matched and the use information of article corresponding with the matched second identifier;
For in the use information for finding the matched second identifier and article corresponding with the matched second identifier,
The use information of the corresponding article is set as used device.
Example package
According to the application preferred embodiment, provide a kind of based on the article anti-counterfeit more identified packaging, the packaging
It include: the first identifier and second identifier that can be used in carrying out article authentication and behaviour in service verifying, wherein the first mark
Knowledge can be acquired before use of the article, and the checking request of first identifier is proposed that by the first identifier of acquisition;Second identifier exists
Article, in hidden state and being acquired after in article, is proposed that second identifier by the second identifier of acquisition using preceding
Checking request, first identifier and second identifier carry out being associated with for identity information with article, and the use information of the article can basis
Historical record that second identifier is searched in particular server and modify.
The packaging of the application includes but is not limited to apply on commodity, commodity packaging, file, bill and other items, Ke Yiyu
Article separation, can also be integral with article.The mark can be attached to article or object in a manner of printing, be engraved in or paste etc.
In the packaging of product, or it is integral with the outer packing of article or article.First identifier and second identifier quantitatively can be respectively
Odd number, or plural number.For example, multiple groups OID code, multiple groups OID can be arranged on coffee capsule by taking coffee capsule as an example
Each group of scattering device in code is in the corresponding position of capsule, consequently facilitating the identification device of beverage machine corresponds to each group of OID code
It can identify identical capsule information (date of manufacture, the points for attention drunk for example including capsule etc.).That is, making
It is unrelated with the placement location of capsule in the recognition accuracy of OID, to promote the identification of the identification device in beverage machine OID information just
Benefit is stablized, is reliable.
Preferably, the first identifier be located at article package outer or the first identifier the article packaging
It can be readily accessible by the user in the case where being not yet destroyed.
Preferably, the second identifier is realized hiding based on the mode of following one:
The second identifier is closed in packaging inside;
The second identifier is located on the article in packaging.
Preferably, the first identifier and second identifier are interrelated.
Preferably, the second identifier of same article is unidirectional according to first identifier and uniquely generates.
It should be noted that anti-pseudoprocess of the invention can be related to production phase, distribution stage and sales stage etc. extremely
A few link, in addition it can be applied in other scenes, such as authenticates the noncommoditys such as file, bill.
Technical solution of the present invention can also be asked by server receiving verifying other than it can verify to article
When asking, other information including verification result including is returned to relative client, such as verify the article corresponding to identifying close
Preferential action message, anti-fake notice of such article that the relevent information of phase, the commodity for generating the article or manufacturer release etc.,
Further to promote the practicability of fake certification.
In addition, in order to preferably safeguard certified products market order, the server of the application can save the verifying every time of each mark
Record, and can according to the record of verifying execute corresponding operation.For example, being verified before the identification information received
It crosses, is then given a warning to the client for issuing checking request.
Preferably, the server of the application can also be tracked counterfeit and shoddy goods based on the record verified, example
Such as, for verification result be non-certified products the case where, agreements based on user get transmission checking request terminal where position
Confidence breath, so as to understand and hit fake and forged behavior more in time.
It should be understood that although the application has used term " first ", " second " etc. to describe each object,
These objects should not be limited by these terms.The use of these items is only for carry out an object and another object
It distinguishes.For example, without departing substantially from the range of exemplary embodiment, the first object can be referred to as the second object,
And similarly the second object can be referred to as the first object.Term "and/or" used herein above include one of them or more
Any and all combinations of more listed associated items.
Term used herein above is not intended to limit exemplary embodiment just for the sake of description specific embodiment.Unless
Context clearly refers else, otherwise singular used herein above "one", " one " also attempt to include plural number.Also answer
When understanding, term " includes " and/or "comprising" used herein above provide stated feature, integer, step, operation,
The presence of unit and/or component, and do not preclude the presence or addition of other one or more features, integer, step, operation, unit,
Component and/or combination thereof.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned exemplary embodiment, Er Qie
In the case where without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and scope of the present application is by appended power
Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims
Variation is included in the application.Any reference signs in the claims should not be construed as limiting the involved claims.This
Outside, it is clear that one word of " comprising " does not exclude other units or steps, and odd number is not excluded for plural number.That states in system claims is multiple
Unit or device can also be implemented through software or hardware by a unit or device.The first, the second equal words are used to table
Show title, and does not indicate any particular order.
Although front is specifically shown and describes exemplary embodiment, it will be understood to those of skill in the art that
It is that without departing substantially from the spirit and scope of claims, can be varied in terms of its form and details.
Claims (10)
1. a kind of based on the article anti-counterfeit method more identified, comprising:
Generate the first identifier and second identifier for having wrapped article, the first identifier and second identifier be used for article into
Row authentication and behaviour in service verifying;Wherein first identifier can be acquired before use of the article, pass through the first identifier of acquisition
It is proposed that the checking request of first identifier;Second identifier is in hidden state before use of the article and is obtained in article using rear
It takes, the checking request of second identifier is proposed that by the second identifier of acquisition;
The first identifier and second identifier are subjected to being associated with for identity information with article;
The checking request to the second mark to be verified of target item is received, is searched and the second mark matched second to be verified
The use information of mark and article corresponding with the matched second identifier;
It is if finding the use information of the matched second identifier and article corresponding with the matched second identifier, this is right
The use information for the article answered is set as having used,
Preferably, the first identifier be located at article package outer or the first identifier the article packaging not yet
It can be readily accessible by the user in the case where being destroyed.
Or, it is preferred that the second identifier is realized hiding based on the mode of following one:
The second identifier is closed in packaging inside;
The second identifier is located on the article in packaging.
2. article anti-counterfeit method according to claim 1, which is characterized in that further include:
If the use information of the corresponding article is modified to use, the corresponding item associations are being received
In the case where the checking request of first identifier or second identifier, it is used anti-for returning to the use information of the corresponding article
Pseudo- result.
3. article anti-counterfeit method according to claim 1, which is characterized in that the first identifier and second identifier are mutually closed
Connection,
Preferably, the second identifier of same article is unidirectional according to first identifier and uniquely generates.
4. article anti-counterfeit method according to claim 3, which is characterized in that further include:
Receive the permissions data access request from client, according to the Authority Verification rule of setting to the access request into
Row verifying;
If the verification passes, then the client is being received based on first identifier or second identifier retrieval second identifier or the first mark
In the case of the request of knowledge, it will believe with the associated second identifier information of the first identifier or with the associated first identifier of the second identifier
Breath is back to the client.
5. article anti-counterfeit method according to claim 1, which is characterized in that further include:
The checking request to the first of target item the mark or the second mark to be verified to be verified is received, searches and first is to be tested
Card mark or the second matched first identifier of mark to be verified or second identifier;
If not finding the matched first identifier or second identifier, return to what the target item information was not present
Anti-fake result.
6. a kind of based on the article anti-counterfeit server more identified, comprising:
Have the first identifier of wrapped article and the device of second identifier for generating, wherein first identifier and second identifier are used
It is verified in article progress authentication and behaviour in service;Wherein first identifier can be acquired before use of the article, pass through acquisition
First identifier be proposed that the checking request of first identifier;Second identifier is in hidden state before use of the article and makes in article
It is acquired after, the checking request of second identifier is proposed that by the second identifier of acquisition;
For the first identifier and second identifier and article to be carried out the associated device of identity information;
For receiving the checking request to the second mark to be verified of target item, search matched with the second mark to be verified
The device of second identifier and the use information of article corresponding with the matched second identifier;
For in the use information for finding the matched second identifier and article corresponding with the matched second identifier, by this
The use information of corresponding article is set as used device.
7. article anti-counterfeit server according to claim 6, which is characterized in that further include:
For in the case where the use information of the corresponding article is modified to used situation, if it is corresponding to receive this
The first identifier of item associations or the checking request of second identifier, the then use information for returning to the corresponding article are to have used
Anti-fake result device.
8. a kind of based on the article anti-counterfeit client more identified, comprising:
The unit of the first mark or/and the second mark to be verified to be verified for reading target item;
It is read based on the information to the first mark or/and the second mark to be verified to be verified, is tested to the transmission of article anti-counterfeit server
Card requests and receives the unit for the fake certification result that the article anti-counterfeit server returns;
The wherein article anti-counterfeit server, comprising:
Have the first identifier of wrapped article and the device of second identifier for generating, wherein first identifier and second identifier are used
It is verified in article progress authentication and behaviour in service;Wherein first identifier can be acquired before use of the article, pass through acquisition
First identifier be proposed that the checking request of first identifier;Second identifier is in hidden state before use of the article and makes in article
It is acquired after, the checking request of second identifier is proposed that by the second identifier of acquisition;
For the first identifier and second identifier and article to be carried out the associated device of identity information;
For receiving the checking request to the second mark to be verified of target item, search matched with the second mark to be verified
The device of second identifier and the use information of article corresponding with the matched second identifier;
For in the use information for finding the matched second identifier and article corresponding with the matched second identifier, by this
The use information of corresponding article is set as used device.
9. a kind of based on the article anti-counterfeit more identified packaging, which includes:
It can be used in first identifier and second identifier that authentication and behaviour in service verifying are carried out to article, wherein first identifier
It can be acquired before use of the article, the checking request of first identifier is proposed that by the first identifier of acquisition;Second identifier is in object
Product, in hidden state and being acquired after in article, are proposed that testing for second identifier by the second identifier of acquisition using preceding
Card request, first identifier and second identifier are associated with article progress identity information, and the use information of the article can be according to the
Two identify the historical record searched in particular server and modify,
Wherein, it is preferred that the first identifier be located at article package outer or the first identifier the article packaging
It can be readily accessible by the user in the case where being not yet destroyed.
And, it is preferred that article anti-counterfeit packaging according to claim 17, which is characterized in that the second identifier is based on
The mode of following one is realized hiding:
The second identifier is closed in packaging inside;
The second identifier is located on the article in packaging.
10. article anti-counterfeit packaging according to claim 9, which is characterized in that the first identifier and second identifier are mutual
Association, it is preferred that the second identifier of same article is unidirectional according to first identifier and uniquely generates.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810469095.XA CN110503437A (en) | 2018-05-16 | 2018-05-16 | Based on the article anti-counterfeit method more identified and its system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810469095.XA CN110503437A (en) | 2018-05-16 | 2018-05-16 | Based on the article anti-counterfeit method more identified and its system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110503437A true CN110503437A (en) | 2019-11-26 |
Family
ID=68584730
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810469095.XA Withdrawn CN110503437A (en) | 2018-05-16 | 2018-05-16 | Based on the article anti-counterfeit method more identified and its system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110503437A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112541773A (en) * | 2020-12-09 | 2021-03-23 | 睿丰宝科技有限公司 | Anti-counterfeiting method and client system |
CN116561822A (en) * | 2023-07-07 | 2023-08-08 | 中科鉴芯(北京)科技有限责任公司 | Product anti-counterfeiting method, component and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102722822A (en) * | 2012-06-01 | 2012-10-10 | 王学武 | Method and system for anti-counterfeiting product by using identification code |
CN103390187A (en) * | 2013-06-25 | 2013-11-13 | 深圳劲嘉彩印集团股份有限公司 | Packaging box on basis of two-dimensional codes and having verification function and achieving method thereof |
CN105761087A (en) * | 2016-02-03 | 2016-07-13 | 上海皆普信息科技有限公司 | Packaging product two-dimensional matching verification anti-fake method and system |
CN105931059A (en) * | 2016-04-14 | 2016-09-07 | 北京安讯奔科技有限责任公司 | Product with double-layer anti-counterfeiting code and product tracing anti-counterfeiting method and device |
CN106295741A (en) * | 2016-08-09 | 2017-01-04 | 中国科学院计算机网络信息中心 | Method for anti-counterfeit and system |
-
2018
- 2018-05-16 CN CN201810469095.XA patent/CN110503437A/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102722822A (en) * | 2012-06-01 | 2012-10-10 | 王学武 | Method and system for anti-counterfeiting product by using identification code |
CN103390187A (en) * | 2013-06-25 | 2013-11-13 | 深圳劲嘉彩印集团股份有限公司 | Packaging box on basis of two-dimensional codes and having verification function and achieving method thereof |
CN105761087A (en) * | 2016-02-03 | 2016-07-13 | 上海皆普信息科技有限公司 | Packaging product two-dimensional matching verification anti-fake method and system |
CN105931059A (en) * | 2016-04-14 | 2016-09-07 | 北京安讯奔科技有限责任公司 | Product with double-layer anti-counterfeiting code and product tracing anti-counterfeiting method and device |
CN106295741A (en) * | 2016-08-09 | 2017-01-04 | 中国科学院计算机网络信息中心 | Method for anti-counterfeit and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112541773A (en) * | 2020-12-09 | 2021-03-23 | 睿丰宝科技有限公司 | Anti-counterfeiting method and client system |
CN116561822A (en) * | 2023-07-07 | 2023-08-08 | 中科鉴芯(北京)科技有限责任公司 | Product anti-counterfeiting method, component and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9449325B2 (en) | System and method for authenticity verification | |
US8791794B2 (en) | Method and device for obtaining item information using RFID tags | |
US20170017967A1 (en) | Electronic anti-counterfeiting system and electronic anti-counterfeiting method thereof | |
US20180108024A1 (en) | Open registry for provenance and tracking of goods in the supply chain | |
US8421593B2 (en) | Apparatus, systems and methods for authentication of objects having multiple components | |
US7277601B2 (en) | Remote authentication system | |
CN111587445A (en) | Security tag | |
US9076024B2 (en) | Anti-counterfeiting system and method | |
US7581242B1 (en) | Authenticating products | |
US20060010503A1 (en) | Product authentication system for preventing distribution of counterfeits in market | |
US20130262330A1 (en) | Managing objects in a supply chain using a secure identifier | |
US11748768B2 (en) | Commodity anti-counterfeit verification system based on natural biological information | |
CN102708391B (en) | A kind of antifalsification label based on fractal graph and anti-counterfeit authentication method | |
US8872622B2 (en) | Authentication of “source” for brands | |
CN105894303A (en) | Product anti-counterfeiting method, product anti-counterfeit examination method and anti-counterfeit package | |
CN105894304A (en) | Product anti-counterfeiting method | |
CN102629357A (en) | Secure access method of product information and system thereof | |
WO2015089555A1 (en) | Method and system for verifying of the authenticity of a consumer product | |
JP2021524638A (en) | Anti-counterfeit protection of goods | |
CN102663590A (en) | System and method of commodity anti-counterfeiting authentication based on restriction of authentication frequency | |
CN103400270A (en) | Article anti-counterfeiting method for realizing multi-time authentication through associated anti-counterfeiting set codes | |
CN110570204A (en) | anti-fake method and system for packed article | |
CN105894301A (en) | Product anti-counterfeiting method | |
CN110503437A (en) | Based on the article anti-counterfeit method more identified and its system | |
US20130024387A1 (en) | Systems and Methods for Tracking Assigned Code Strings |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20191126 |