CN110503437A - Based on the article anti-counterfeit method more identified and its system - Google Patents

Based on the article anti-counterfeit method more identified and its system Download PDF

Info

Publication number
CN110503437A
CN110503437A CN201810469095.XA CN201810469095A CN110503437A CN 110503437 A CN110503437 A CN 110503437A CN 201810469095 A CN201810469095 A CN 201810469095A CN 110503437 A CN110503437 A CN 110503437A
Authority
CN
China
Prior art keywords
identifier
article
mark
verified
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810469095.XA
Other languages
Chinese (zh)
Inventor
邵祈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidi Jishi Culture Media (beijing) Co Ltd
Original Assignee
Xidi Jishi Culture Media (beijing) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidi Jishi Culture Media (beijing) Co Ltd filed Critical Xidi Jishi Culture Media (beijing) Co Ltd
Priority to CN201810469095.XA priority Critical patent/CN110503437A/en
Publication of CN110503437A publication Critical patent/CN110503437A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Abstract

It is packed this application provides a kind of based on the article anti-counterfeit method more identified, article anti-counterfeit server, client and article anti-counterfeit, its method includes: to generate the first identifier and second identifier that have wrapped article, and the first identifier and second identifier are used to carry out article authentication and behaviour in service verifying;Wherein first identifier can be acquired before use of the article;Second identifier is in hidden state before use of the article and is acquired after in article;The first identifier and second identifier are subjected to being associated with for identity information with article;The checking request to the second mark to be verified of target item is received, the use information of matching second identifier and corresponding article is searched;If found, the use information of the corresponding article is set as having used.According to the scheme of the application, the reliability that user carries out product false proof verifying can be effectively promoted.

Description

Based on the article anti-counterfeit method more identified and its system
Technical field
This application involves anti-counterfeiting technologies more particularly to a kind of based on the article anti-counterfeit method more identified and its system, including Server and client side etc..
Background technique
Background that this section is intended to provide an explanation of the embodiments of the present invention set forth in the claims or context.Herein Description recognizes it is the prior art not because not being included in this section.
In today's society, either enterprise or consumer, is all struggled with fake and inferior commodities trying every possible means, faced Rampant commodity counterfeit behavior, related anti-counterfeiting technology are also evolving in the market.For example, using two dimension in commodity packaging Code, a string of security codes of coating covering etc., are scanned two dimensional code by user, are inquired etc. using network security code Mode carries out fake certification.These anti-fake modes no doubt to a certain extent can be anti-fake, but if adulterator is by certified products Secondary use is packed on counterfeit product, then is obtained when consumer verifies the counterfeit product based on the packaging of the counterfeit product To verification result be certified products, this not only compromises the equity of consumer, and compromises certified products production firm and sale Credibility of the quotient in the minds of the majority of consumers.
Summary of the invention
Although puppet can not be solved from the foregoing, it will be observed that current counterfeit protection measures to a certain extent can be anti-fake Certified products is packed secondary use on counterfeit product to cheat consumers the problem of by the person of making.
The purpose of the application is to provide a kind of based on the article anti-counterfeit method, server, client and the packet that identify more Dress is packed secondary use on counterfeit product to cheat consumers the problem of can efficiently solve adulterator for certified products, is mentioned Rise the reliability that user carries out product false proof verifying.
According to one embodiment of the application, provide a kind of based on the article anti-counterfeit method more identified, this method includes Following steps: generate the first identifier and second identifier for having wrapped article, the first identifier and second identifier for pair Article carries out authentication and behaviour in service verifying;Wherein first identifier can be acquired before use of the article, pass through the of acquisition One mark is proposed that the checking request of first identifier;Second identifier is in hidden state and before use of the article after article use It is acquired, the checking request of second identifier is proposed that by the second identifier of acquisition;By the first identifier and second identifier with The association of article progress identity information;The checking request to the second mark to be verified of target item is received, is searched and second The use information of the matched second identifier of mark to be verified and article corresponding with the matched second identifier;If finding this The use information of matched second identifier and article corresponding with the matched second identifier, the use of the corresponding article is believed Breath is set as having used.
It according to another embodiment of the application, additionally provides a kind of based on the article anti-counterfeit server more identified, comprising: use In the device for generating the first identifier and second identifier that have wrapped article, wherein first identifier and second identifier are used for object Product carry out authentication and behaviour in service verifying;Wherein first identifier can be acquired before use of the article, pass through the first of acquisition Mark is proposed that the checking request of first identifier;Second identifier is in hidden state and the quilt after article use before use of the article It obtains, the checking request of second identifier is proposed that by the second identifier of acquisition;For by the first identifier and second identifier The associated device of identity information is carried out with article;For receiving the checking request to the second mark to be verified of target item, It searches and the second use information to be verified for identifying matched second identifier and article corresponding with the matched second identifier Device;It, will in the use information for finding the matched second identifier and article corresponding with the matched second identifier The use information of the corresponding article is set as used device.
It according to the another embodiment of the application, additionally provides a kind of based on the article anti-counterfeit client more identified, comprising: use In the unit for the first mark or/and the second mark to be verified to be verified for reading target item;Based on to the first mark to be verified Or/and second the information of mark to be verified read, sent to article anti-counterfeit server and checking request and receive the article anti-counterfeit The unit for the fake certification result that server returns.
According to the another embodiment of the application, additionally provide a kind of based on the article anti-counterfeit more identified packaging, the packaging packet It includes: can be used in the first identifier and second identifier that carry out authentication and behaviour in service verifying to article, wherein first identifier It can be acquired before use of the article, the checking request of first identifier is proposed that by the first identifier of acquisition;Second identifier is in object Product, in hidden state and being acquired after in article, are proposed that testing for second identifier by the second identifier of acquisition using preceding Card request, first identifier and second identifier are associated with article progress identity information, and the use information of the article can be according to the Two identify the historical record searched in particular server and modify.
Compared with prior art, embodiments herein has the advantage that
Embodiments herein carries out multiple anti-fake verifying to article by the more marks of setting, and the in especially more marks One mark can be acquired before use of the article, and second identifier is in hidden state before use of the article and is obtained in article using rear It takes, at least part mark therein can be acquired before use of the article, and in addition at least part mark is in article It is in hidden state using preceding, this allows for user can both identify based on a part got to the object before using article The true and false of product carries out preliminary verifying, promotes the convenience of authenticity verification;It again can be based on using before article and using article mistake Multiple anti-counterfeit label in journey promotes the real reliability of item authentication.More particularly, once the second identifier quilt of the application Authenticated, then the use information of the corresponding article of the second identifier is changed to use, then no matter next time receive it is right with this When the verifying of any mark for the article answered, the corresponding used information of article will be all fed back.Then if there is adulterator Certified products is packed into secondary use when on counterfeit product, consumer can also obtain the article of certified products packaging based on Antiforge inquiry Used information, to know that the article is non-certified products.
In addition, a possibility that adulterator forges can also be effectively reduced in more mark fake certifications of the application.Specifically, Due in more marks for being arranged of the present invention second identifier used before in hidden state, even if the adulterator of article has forged the One mark, but the second identifier of commodity can not be obtained easily when not destroying or opening commodity outer packing or packaging, It can only guess the content of second identifier, and if adulterator will guess that obtained second identifier is placed in counterfeit commodity outer packing Interior, then there is in the case where verifying the greater risk for being found to be forgery in the counterfeit commodity, moreover, the conjecture will not only be spent Certain intelligence, it is also desirable to carry out actual cost input.Therefore, higher cost and biggish risk is undertaken when needing to expend In the case where going forgery, a possibility that forgery behavior, be can be effectively reduced.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 schematically shows the flow chart based on the article anti-counterfeit method more identified of the application one embodiment;
Fig. 2 schematically shows positions applied by multiple marks in the article anti-counterfeit of the application one embodiment packaging The schematic diagram set;
Fig. 3 schematically shows the process based on the article anti-counterfeit method more identified of another embodiment of the application Figure;
Fig. 4 schematically shows the processes based on the article anti-counterfeit method more identified of another embodiment of the application Figure;
Fig. 5 schematically shows the process based on the article anti-counterfeit method more identified of another embodiment of the application Figure;
Fig. 6 is schematically shown according to the offer of the application one embodiment based on the article anti-counterfeit server more identified Schematic diagram;
What Fig. 7 was schematically shown according to the application another embodiment based on the article anti-counterfeit server more identified Schematic diagram;
Fig. 8 is schematically shown according to the offer of the application one embodiment based on the article anti-counterfeit client more identified Schematic diagram;
The same or similar appended drawing reference represents the same or similar component in attached drawing.
Specific embodiment
The principle and spirit of the invention are described below with reference to several illustrative embodiments.It should be appreciated that providing this A little embodiments are used for the purpose of making those skilled in the art can better understand that realizing the present invention in turn, and be not with any Mode limits the scope of the invention.On the contrary, these embodiments are provided so that this disclosure will be more thorough and complete, and energy It is enough that the scope of the present disclosure is completely communicated to those skilled in the art.
Those skilled in the art will understand that embodiments of the present invention can be implemented as a kind of method, server, client End, computer program product and article packaging.Therefore, the application can be implemented as complete hardware, complete software or The combination of person's hardware and software or only article packaging etc..
Herein, it is to be understood that any name is only used for distinguishing, without any restrictions meaning.
Below with reference to several representative embodiments of the invention, the principle and spirit of the present invention are explained in detail.
Summary of the invention
The inventors discovered that in the prior art, it, to a certain extent can be anti-fake although there are many anti-counterfeiting technologies, Be can not solve the problems, such as that certified products is packed secondary use on counterfeit product to cheat consumers by adulterator, and it is anti-fake can It is also required to further strengthen in property.
In embodiment of the present invention, fake certification is carried out to having wrapped article by using more marks.For example, using At least first identifier and second identifier carry out identity and verifying to same article, and first identifier before use of the article can Be easier to, be clearly readily accessible by the user, for example, first identifier be located on the outside of the outer packing of article, can be directly by mobile phone Scanner program carries out barcode scanning identification, and the information after the identification is automatically sent to corresponding server by the mobile phone and is tested Card;And second identifier is located on the inside of article packaging before being used in hidden state, such as second identifier, needs to open or destroy The packaging of article can just be got.To which user can not only be before being not used article at least based on obvious clear first identifier Quickly preliminary identification is carried out to the true and false of the article, moreover it is possible to by obtaining the second mark after the packaging for opening or destroying the article The information of knowledge further verifies the true and false of the article, to further promote anti-fake reliability based on multiple-authentication. And in method of the invention, after second identifier is used for verifying, no matter whether first identifier has been verified, corresponding Article use state information is all modified to use, and can effectively solve adulterator in this way certified products is packed secondary use to exist Come the problem of cheating consumers on counterfeit product.Method of the invention can also include in addition to the first identifier and second identifier Third in addition or more mark.
Illustrative methods
According to one embodiment of the application, provide a kind of based on the article anti-counterfeit method more identified, Fig. 1 is schematically Show the flow chart of the first exemplary embodiment of the article anti-counterfeit method.
In the present embodiment, the article is the article with outer packing.In a more preferred embodiment, the article is also Article with inner packing.The contact of the article is needed by releasing (destruction) described outer packing and/or the inner packing. Use to the article is generally also considered as to the releasing (destruction) of the outer packing and/or the inner packing.
In the present embodiment, the executing subject of article anti-counterfeit method can for user terminal or/and be mounted on user terminal On client communication connection server, which can be by manufacturer that the manufacturer of article, article are packed or/and anti- Pseudo- service provider's setting.Wherein, server includes but is not limited to the clothes of single network server, multiple network servers composition Device group of being engaged in or the cloud consisting of a large number of computers or network servers for being based on cloud computing (Cloud Computing);User is whole End include but is not limited to mobile phone, smartwatch, computer, code reader, scanner, specific information reader (such as RFID read Device), client can include but is not limited to can be with the barcode scanning app of readout code category information (such as with the micro- of " sweep and sweep " function Letter, Alipay etc.), in user terminal for identification with the program module that reads information etc..
In the present embodiment, the form of expression of mark includes but is not limited to code category information (such as bar code, two dimensional code etc.), number One or more any combination such as word, letter, character string, figure, symbol is identified based on radio-frequency technique, optical technology etc. Label or carrier (such as induction type electronic chip or proximity card, contactless card, non-contact card, electronic tag, electronic bar code etc.).
Wherein, the first identifier of article is provided in the method for the present embodiment.The first identifier can be not used by article It is acquired in the case where (outer packing including the article is not destroyed), especially by being visually immediately seen or can be used The mode that aforementioned client terminal and/or client obtain is acquired.For example, the first identifier can be to print, be engraved in or glue The modes such as patch are attached to the surface of package of article or article, or integral with the outer packing of article or article, or positioned at article In other adjuncts.Wherein, the checking request of first identifier is proposed that by the first identifier of acquisition.Such as user can pass through Naked eyes are immediately seen or with the directly scanning recognition mark such as mobile phone and can directly read the information of the mark.More specifically example Such as, user scans the first identifier of article packaging by mobile phone, sends verifying first mark to the letter bill member of particular server The request of knowledge, particular server upon receiving the request, search whether to exist in the storage device of the server with this The corresponding matching of one mark, if it is present being existed in the server from letter bill member to the information that mobile phone terminal returns to the article Verification result;Otherwise, then the verification result being not present in the server to the information that mobile phone terminal returns to the article.
The second identifier of article is also provided in the method for the present embodiment, is in hidden state before use of the article, and Article is acquired after.For example, the second identifier article packaging especially outer packing be destroyed in the case where It can be acquired.The second identifier can be realized using suitable method it is hiding, it is only just right under the conditions of meeting specific User is visible.Such as second identifier is the number of naked eyes identification or the two dimensional code of handset program identification, is located at the outsourcing of article The inside of dress needs to obtain after destroying outer packing.In another example second identifier is located at the object of the inside of opaque outer packing On body, to only destroy outer packing, the mark could be obtained after taking out object.In another example second identifier is located at outside transparent On the object of the inside of packaging, covering can scrape figure layer to realize that is at least partly identified hides, thus only extremely in mark Small part can scrape the hiding portion identification in the case that figure layer is destroyed and just be shown.It can be to by the second identifier of acquisition Server proposes the checking request of the second mark to be verified.Wherein, checking request is sent to server based on second identifier and obtained The description of verification process of the upper section based on first identifier can be referred to the description of verification result, it is for purpose of brevity, not superfluous herein It states.
Wherein, the original state with first identifier or/and the associated article use information of second identifier can be by the article The special delegated authority personnel of production firm be arranged and be stored in advance in the server, and according to specific modification mechanism or more New mechanism is manually or automatically updated by the people of specified permission.
Such as before server receives first time to the checking request of second identifier, the initial shape of the use information of article State is arranged to unused state, once server received the checking request of second identifier, then in the server makes article Use state is revised as after, so that server receives the second identifier or receives and second mark next time When knowing associated first identifier, the status information of " article has used " is all returned to the terminal for sending checking request.
Specifically, such as consumer has bought an article A (referred to herein as target item), has in the outer packing of article A One 1 (the referred to here as first mark to be verified) of mark, having a mark 2 in the outer packing of article A, (referred to here as second is to be tested Card mark).It is assumed that consumer sends checking request by be verified identify to server of mobile phone scanning second, then when server connects Receive the checking request to the second mark to be verified of target item, search with the matched second identifier of the second mark to be verified and The use information of article corresponding with the matched second identifier.If finding the matched second identifier and matched with this The use information of the corresponding article of second identifier, then be revised as having used by the use information of the corresponding article.By server Corresponding executive device the use information that the corresponding article is stored on server is revised as having used, i.e. second identifier The use information of article corresponding with the associated first identifier of second identifier is all that article had been used.As a result, in server When receiving the checking request to the checking request of the first mark to be verified of target item or the second mark to be verified next time, all It is used information to the use information of corresponding client returned articles.For example, receive to the second of target item to Verify the checking request of mark, search with second it is to be verified identify matched second identifier and with the matched second identifier it is corresponding Article use information.If finding the matched second identifier and making with the matched corresponding article of second identifier With information, and the use information of the corresponding article of the matched second identifier shows that the corresponding article was not used, then modifies The use information of the corresponding article, and returning to the target item is certified products and original anti-fake result.
It is the second mark when finding its matching since the second mark to be verified received verifying in the server after upper example Know, and the use information of its corresponding article is modified to use, then under the premise of this, if consumer prepares verifying together The first mark to be verified on one article A, no matter first mark to be verified is to verify to go back right and wrong for the first time for the first time in the server Verify in the server, then in the case where server receives the checking request of the first mark to be verified, search with first to Verifying identifies the use information of matched first identifier and article corresponding with the matched first identifier, due to corresponding article Use information be modified to use after the second identity verification to be verified, then server had used corresponding article Information return to the client for issuing the first identity verification to be verified request.
It should be noted that consumer is for the first time if the second mark to be verified did not receive verifying in the server In the case where verifying the first mark to be verified in the server, when server is searched and the first matched first mark of mark to be verified Know and the use information of article corresponding with the matched first identifier, if the matched corresponding article of first identifier makes Show that the corresponding article was not used with information, then returning to the target item is certified products and original anti-fake result.
According to above, in order to preferably guide consumer to verify in a predetermined sequence to multiple marks, such as first First identifier is verified, then verifies second identifier ..., checking request can be sent to server by mobile phone in consumer In the case of, reminded by the way that built-in reminder is arranged on mobile phone consumer identification verifying sequence or by server to Mobile phone terminal returns to the modes such as the reminder message of identity verification sequence, to remind consumer to verify according to preset sequence, from And first identifier is verified after avoiding consumer from first verifying second identifier after having bought certified products, it is obtained when verifying first identifier The case where to the used information of the certified products to produce misunderstandings.
Wherein the first identifier and second identifier can be located at the identical or different region of product or/and product packaging, excellent Bit selecting is located at the outside of product packaging in product or/and the different zones of product packaging, such as first identifier, and second identifier is located at The inside of product packaging.And it is preferably based on the features of shape of different product or product packaging itself, user is used for Mode etc. and by multiple mark scattering devices in different positions, to promote user while promoting anti-fake reliability anti-fake Use upper convenience.Specifically for example, for one bottle of Yoghourt, at least part mark is located at the outside of the Sour milk bottle, At least another part identifies the bottle cap inner surface for being located at the Sour milk bottle, so that user can not only be before using Yoghourt based on outside bottle The obvious mark of side carries out preliminary identification, moreover it is possible to be observed after uncapping based on the habituation to bottle cap, utilize the mark in bottle cap Yoghourt is further verified.
In the present invention, article involved in article anti-counterfeit method is described as user's object to be certified, including but unlimited In commodity, commodity packaging, file, bill etc., the commodity include but is not limited to food, drink, drug, drinks, particularly for tobacco items etc.. Article of the invention has outer packing, preferably also has inner packing.
According to Fig. 1, the article anti-counterfeit method be may comprise steps of:
Step S101 generates the first identifier and second identifier with the article of outer packing.Wherein first identifier and second Mark is for carrying out authentication and behaviour in service verifying to article;Wherein first identifier can be acquired before use of the article, be led to Cross the checking request that the first identifier obtained is proposed that first identifier;Second identifier be in front of use of the article hidden state and Article is acquired after, and the checking request of second identifier is proposed that by the second identifier of acquisition.
Wherein, first identifier or second identifier can refer to single mark, can also refer to identification sets.
Wherein, the first identifier can be located at the package outer of article, and user can be directly observed by naked eyes, or The corresponding information of first identifier is directly obtained by information reading manners such as scannings based on corresponding device.Alternatively, It, can in the case where the packaging of the article is not yet destroyed though the first identifier is not located at the package outer of article It is readily accessible by the user, such as although the first identifier is not at the package outer of article, but passes through near-field sensing device etc. The corresponding information of first identifier can directly be sensed.
Wherein preferably, the second identifier can be realized hiding based on the mode of following one: the second identifier quilt It is closed in packaging inside;The second identifier is located on the article in packaging.To even if article adulterator can learn the One identification information, but since it can not be easily obtained second identifier letter in the case where not destroying or not opening article packaging Breath, thus can not absolutely puppet produce with the identical anti-counterfeiting mark of certified products, thus see from this point on, second identifier Hiding setting can be effectively reduced a possibility that anti-fake.In addition, as described above, user is when using the article due to being capable of base The second identifier is got in specific mode (such as destroying or open article outer packing), and then the second identifier can be based on The true and false of the article is verified again, effectively promotes the reliability of the Application in Anti-counterfeiting.
For step S101, for example, generating first identifier A and second identifier B, first identifier A and second identifier B Authentication can be carried out to same article.More specifically for example, this two marks can be used in same box body shown in Fig. 2 Authentication is carried out, wherein first identifier A is located at position 1 shown in the outside of the box body, and second identifier B is located at the interior of the box body Position 2 shown in side.It, can be with as to how carry out the process of authentication to same article based on first identifier and second identifier With reference to hereafter, hereafter will be discussed in more detail.
Preferably, the first identifier and second identifier are interrelated.For example, first identifier and second identifier are in server Middle there are the mapping relations of one-to-one or one-to-many or many-one or multi-to-multi, or pass through the data processings such as encrypting and decrypting Journey can obtain another mark in the case where known one of mark.
It is further preferred that the second identifier of same article is unidirectional according to first identifier and uniquely generates, consequently facilitating When being managed in the database of server to multiple marks of multiple articles, based on the retrieval or parsing to first identifier Deng carrying out more unified data management to second identifier corresponding with first identifier, also better ensure that second identifier and the The relevance that one mark is clearly directed toward.
Certainly, in addition to generating first identifier and second identifier, other multiclass or multiple in the prior art can also be generated Other identifier.
First identifier and second identifier are carried out being associated with for identity information with article by step S102.
Wherein, lot number, unique identifying number ID, date of manufacture, specification, the name of an article of the identity information of article for example including article Etc. a variety of for distinguishing and identifying the information of article.
For step S102, can by first identifier generated and second identifier and it is to be produced, produced or to The identity information of the article of delivery is associated, and the identity information of first identifier, second identifier and these articles is deposited together It is stored in server.Such as first identifier A and second identifier B is subjected to being associated with for identity information with same article W, thus user It can realize following data retrieving in the database of server based on specific permission: input first identifier A or/and the Two mark B, retrieval obtain the lot number of article W, date of manufacture, unique identifying number ID these identity informations.
Step S103, receives the checking request to the second mark to be verified of target item, searches and second is to be verified Identify the use information of matched second identifier and article corresponding with the matched second identifier.
Step S104, if finding the matched second identifier and making with the matched corresponding article of second identifier With information, the use information of the corresponding article is set as having used.
Example: target item is installed in one bottle of wine in wooden box, and the first mark to be verified is black and white two dimensional code, is located at wooden box Outside, second it is to be verified mark be color 2 D code, positioned at bottle body on the outside of, if the wine is certified products, positive reason Under condition, it is assumed that first mark to be verified is matched with the first identifier in server, second mark to be verified and service Second identifier matching in device, and presets program performed below in the server: once terminal to server send this The use state of the corresponding article of the second identifier then is changed to be used by the checking request of two marks, server.
Then in order to verify the true and false of target item, user scans the on the outside of wooden box by mobile phone before opening wooden box One mark " black and white two dimensional code " to be verified, then server is issued based on the scanning carried out to black and white two dimensional code receiving mobile phone Checking request in the case where, be based on scheduled proof rule, preliminary identification carried out to the true and false of the wine, obtains preliminary identification knot Fruit, for example, " information of wine is not present in the database ", or " information of wine is necessary being in the database ".It connects Get off, after opening wooden box, user can continue through the second mark " colour two to be verified on the outside of mobile phone scanning bottle body Tie up code " mode send checking request to server, then server is receiving mobile phone based on sweeping to color 2 D code It retouches in the case where the checking request that issues, is based on scheduled proof rule, the true and false of the wine is further verified, the wine is obtained Further verification result, include the case where the wine with the presence or absence of being used.It such as can be with are as follows: (1) " this bottle of wine is in data Display has been used in library ";Or (2) " this bottle of wine shows be not used by the database ".Under situation (2), when again to clothes Business device receives the checking request for second mark to be verified that any terminal is sent next time, and server all can also return to transmission The verification result of " this bottle of wine shows have been used in the database ".
According to the application preferred embodiment, referring to FIG. 3, the article anti-counterfeit method of the application can also include:
Step S105 is right receiving this if the use information of the corresponding article is modified to use In the case where the first identifier for the item associations answered or the checking request of second identifier, the use information of the corresponding article is returned For used anti-fake result.
After the verifying example that target item above is wine, once the use state of the wine is changed to be made by server With, if server receive again first it is to be verified mark or the second mark to be verified checking request, by searching for first to It is to have used that verifying mark or the second mark to be verified, which have matching and the use information of matched wine, then the server can be to Terminal sends the verification result of " this bottle of wine shows have been used in the database ".
From the foregoing, it will be observed that fakement usurps that second identifier is subsequent verify with passing a fake product off as a genuine one to the application in order to prevent, will service The use state information of the wine stored in device is revised as " use ", even if then counterfeiter usurps the second identifier and applies On bottle, if bought by consumer is mistakenly purchased, also can its using when remind consumer's wine to use well, avoid it Infringement by non-certified products.
According to the application preferred embodiment, referring to FIG. 4, the article anti-counterfeit method of the application further include:
Step S201 receives the checking request to the first mark or the second mark to be verified to be verified of target item, It searches and the first mark to be verified or the second matched first identifier of mark to be verified or second identifier.
Such as with example above for, user scans the first identifier two dimensional code on the outside of Wine packing box by mobile phone come to clothes Device of being engaged in sends checking request, server upon receiving the request, based on the two dimension that it is identified received by the mobile phone terminal Code information, searches whether there is matching identical with the two-dimensional barcode information from the respective memory device of server.
Wherein, the two-dimensional barcode information can refer to and code sequence or Serial No. etc. corresponding to two dimensional code.
Step S202 returns to the object if not finding the matched first identifier or second identifier The anti-fake result that product information is not present.
After upper example, if server does not find matching identical with the two-dimensional barcode information, such as " wine is obtained Information be not present, be counterfeit merchandise " verification result, and verification result is sent to corresponding mobile phone terminal by server.
Preferably, further includes:
Step S203, if finding the matching of the described first mark or the second mark to be verified to be verified, further Article use state information corresponding to the matching is obtained, obtains the target item including article use state information Verification result.
After upper example, if server finds the matching of the described first mark or the second mark to be verified to be verified, into One step obtains the use state information of the corresponding wine of the matching, such as can be with are as follows: (1) " this bottle of wine is shown in the database It is used ";Or (2) " this bottle of wine shows be not used by the database ".
Preferably, the information in server is inquired and is managed for the ease of corresponding information manager, according to The preferred embodiment of the application, referring to FIG. 5, the article anti-counterfeit method can also include:
Step S401 receives the permissions data access request from client, right according to the Authority Verification rule of setting The access request is verified.
For example, corresponding information manager logs in specific client by input account and password on computers, to Server sends the request for inquiring certain commodity sign, then after server receives the request, based on account and password to the administrator The permission of member is verified, and determines whether it has the permission for the identification information for accessing some or all commodity.
Step S402 is then based on first identifier or second identifier retrieval the receiving the client if the verification passes In the case of the request of two marks or first identifier, it will be closed with the associated second identifier information of the first identifier or with the second identifier The first identifier information of connection is back to the client.
For example, if verifying the result is that the user has the permission for accessing storewide identification information, receiving It, will be with the first identifier associated the in the case of the request based on first identifier retrieval second identifier sent to user client Two identification informations are back to the client.It preferably, will also Item Information associated with the first identifier or/and second identifier It is back to the client, to provide more fully information to the user.
Optionally, in the case where being verified, the relevance based on first identifier and second identifier, user can basis First identifier retrieves the information of second identifier, and the information of first identifier can also be retrieved according to second identifier.
Exemplary servers
After describing the method for exemplary embodiment of the invention, next, with reference to Fig. 6 to the exemplary reality of the present invention Apply mode, be illustrated based on the article anti-counterfeit server more identified.
Fig. 6 schematically shows the showing based on the article anti-counterfeit server more identified provided according to embodiments of the present invention It is intended to.As shown in fig. 6, described may include: based on the article anti-counterfeit server more identified
For generating the first identifier of the article with outer packing and (referred to as " the mark generation dress of device 11 of second identifier Set 11 "), wherein first identifier and second identifier are used to carry out authentication to article and behaviour in service is verified;Wherein the first mark Knowledge can be acquired before use of the article, and the checking request of first identifier is proposed that by the first identifier of acquisition;Second identifier exists Article, in hidden state and being acquired after in article, is proposed that second identifier by the second identifier of acquisition using preceding Checking request;
For the first identifier and second identifier and article to be carried out the associated 12 (referred to as " mark of device of identity information With Item Information associated apparatus 12 ");
For receiving the checking request to the second mark to be verified of target item, search and the second mark to be verified (referred to as " the second identifier of device 13 of the second identifier matched and the use information of article corresponding with the matched second identifier With lookup device 13 ");
For in the use information for finding the matched second identifier and article corresponding with the matched second identifier, The use information of the corresponding article is set as used device 14 (referred to as " information modifies device 14 ").
Optionally, the article anti-counterfeit server further include:
For in the case where the use information of the corresponding article is modified to used situation, if it is right to receive this The first identifier for the item associations answered or the checking request of second identifier, the then use information for returning to the corresponding article are to have made The device 15 (referred to as " information return mechanism 15 ") of used anti-fake result.
Optionally, the first identifier and second identifier are interrelated.
Optionally, the article anti-counterfeit server further include:
For receiving the permissions data access request from client, according to the Authority Verification rule of setting to the access Request the device 16 (referred to as " Authority Verification device 16 ") verified;
For being based on first identifier or second identifier retrieval second identifier or the being verified and receive the client In the case where one mark, it will believe with the associated second identifier information of the first identifier or with the associated first identifier of the second identifier Breath is back to the device 17 (referred to as " Authority Verification information return mechanism 17 ") of the client.
Optionally, the second identifier of same article is unidirectional according to first identifier and uniquely generates.
Optionally, referring to FIG. 7, further include:
For receiving the checking request to the first of target item the mark or the second mark to be verified to be verified, search and the One mark to be verified or the second unit 21 (referred to as " matching unit to be verified for identifying matched first identifier or second identifier 21");
For returning to the target item in the case where not finding the matched first identifier or second identifier The unit 22 (referred to as " return unit 22 is not present in information ") for the anti-fake result that information is not present.
Exemplary client
In some possible embodiments, the present invention is also implemented as a kind of form of program product comprising journey Sequence code, it is described when described program product is run on terminal device (such as mobile phone, computer, specific information reader etc.) Program code is for making terminal device execute some steps described in this specification.
With reference to Fig. 8 to exemplary embodiment of the invention, be illustrated based on the article anti-counterfeit client more identified.Such as It is described to may include: based on the article anti-counterfeit client more identified shown in Fig. 8
The unit 41 of the first mark or/and the second mark to be verified to be verified for reading target item (referred to as " is read Unit 41 ");
It is read based on the information to the first mark or/and the second mark to be verified to be verified, is sent out to article anti-counterfeit server It send checking request and receives (referred to as " the letter bill member of unit 42 for the fake certification result that the article anti-counterfeit server returns 42");
The wherein article anti-counterfeit server, comprising:
For generating the first identifier of the article with outer packing and the device of second identifier, wherein first identifier and second Mark is for carrying out authentication and behaviour in service verifying to article;Wherein first identifier can be acquired before use of the article, be led to Cross the checking request that the first identifier obtained is proposed that first identifier;Second identifier be in front of use of the article hidden state and Article is acquired after, and the checking request of second identifier is proposed that by the second identifier of acquisition;
For the first identifier and second identifier and article to be carried out the associated device of identity information;
For receiving the checking request to the second mark to be verified of target item, search and the second mark to be verified The device of the second identifier matched and the use information of article corresponding with the matched second identifier;
For in the use information for finding the matched second identifier and article corresponding with the matched second identifier, The use information of the corresponding article is set as used device.
Example package
According to the application preferred embodiment, provide a kind of based on the article anti-counterfeit more identified packaging, the packaging It include: the first identifier and second identifier that can be used in carrying out article authentication and behaviour in service verifying, wherein the first mark Knowledge can be acquired before use of the article, and the checking request of first identifier is proposed that by the first identifier of acquisition;Second identifier exists Article, in hidden state and being acquired after in article, is proposed that second identifier by the second identifier of acquisition using preceding Checking request, first identifier and second identifier carry out being associated with for identity information with article, and the use information of the article can basis Historical record that second identifier is searched in particular server and modify.
The packaging of the application includes but is not limited to apply on commodity, commodity packaging, file, bill and other items, Ke Yiyu Article separation, can also be integral with article.The mark can be attached to article or object in a manner of printing, be engraved in or paste etc. In the packaging of product, or it is integral with the outer packing of article or article.First identifier and second identifier quantitatively can be respectively Odd number, or plural number.For example, multiple groups OID code, multiple groups OID can be arranged on coffee capsule by taking coffee capsule as an example Each group of scattering device in code is in the corresponding position of capsule, consequently facilitating the identification device of beverage machine corresponds to each group of OID code It can identify identical capsule information (date of manufacture, the points for attention drunk for example including capsule etc.).That is, making It is unrelated with the placement location of capsule in the recognition accuracy of OID, to promote the identification of the identification device in beverage machine OID information just Benefit is stablized, is reliable.
Preferably, the first identifier be located at article package outer or the first identifier the article packaging It can be readily accessible by the user in the case where being not yet destroyed.
Preferably, the second identifier is realized hiding based on the mode of following one:
The second identifier is closed in packaging inside;
The second identifier is located on the article in packaging.
Preferably, the first identifier and second identifier are interrelated.
Preferably, the second identifier of same article is unidirectional according to first identifier and uniquely generates.
It should be noted that anti-pseudoprocess of the invention can be related to production phase, distribution stage and sales stage etc. extremely A few link, in addition it can be applied in other scenes, such as authenticates the noncommoditys such as file, bill.
Technical solution of the present invention can also be asked by server receiving verifying other than it can verify to article When asking, other information including verification result including is returned to relative client, such as verify the article corresponding to identifying close Preferential action message, anti-fake notice of such article that the relevent information of phase, the commodity for generating the article or manufacturer release etc., Further to promote the practicability of fake certification.
In addition, in order to preferably safeguard certified products market order, the server of the application can save the verifying every time of each mark Record, and can according to the record of verifying execute corresponding operation.For example, being verified before the identification information received It crosses, is then given a warning to the client for issuing checking request.
Preferably, the server of the application can also be tracked counterfeit and shoddy goods based on the record verified, example Such as, for verification result be non-certified products the case where, agreements based on user get transmission checking request terminal where position Confidence breath, so as to understand and hit fake and forged behavior more in time.
It should be understood that although the application has used term " first ", " second " etc. to describe each object, These objects should not be limited by these terms.The use of these items is only for carry out an object and another object It distinguishes.For example, without departing substantially from the range of exemplary embodiment, the first object can be referred to as the second object, And similarly the second object can be referred to as the first object.Term "and/or" used herein above include one of them or more Any and all combinations of more listed associated items.
Term used herein above is not intended to limit exemplary embodiment just for the sake of description specific embodiment.Unless Context clearly refers else, otherwise singular used herein above "one", " one " also attempt to include plural number.Also answer When understanding, term " includes " and/or "comprising" used herein above provide stated feature, integer, step, operation, The presence of unit and/or component, and do not preclude the presence or addition of other one or more features, integer, step, operation, unit, Component and/or combination thereof.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned exemplary embodiment, Er Qie In the case where without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and scope of the present application is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included in the application.Any reference signs in the claims should not be construed as limiting the involved claims.This Outside, it is clear that one word of " comprising " does not exclude other units or steps, and odd number is not excluded for plural number.That states in system claims is multiple Unit or device can also be implemented through software or hardware by a unit or device.The first, the second equal words are used to table Show title, and does not indicate any particular order.
Although front is specifically shown and describes exemplary embodiment, it will be understood to those of skill in the art that It is that without departing substantially from the spirit and scope of claims, can be varied in terms of its form and details.

Claims (10)

1. a kind of based on the article anti-counterfeit method more identified, comprising:
Generate the first identifier and second identifier for having wrapped article, the first identifier and second identifier be used for article into Row authentication and behaviour in service verifying;Wherein first identifier can be acquired before use of the article, pass through the first identifier of acquisition It is proposed that the checking request of first identifier;Second identifier is in hidden state before use of the article and is obtained in article using rear It takes, the checking request of second identifier is proposed that by the second identifier of acquisition;
The first identifier and second identifier are subjected to being associated with for identity information with article;
The checking request to the second mark to be verified of target item is received, is searched and the second mark matched second to be verified The use information of mark and article corresponding with the matched second identifier;
It is if finding the use information of the matched second identifier and article corresponding with the matched second identifier, this is right The use information for the article answered is set as having used,
Preferably, the first identifier be located at article package outer or the first identifier the article packaging not yet It can be readily accessible by the user in the case where being destroyed.
Or, it is preferred that the second identifier is realized hiding based on the mode of following one:
The second identifier is closed in packaging inside;
The second identifier is located on the article in packaging.
2. article anti-counterfeit method according to claim 1, which is characterized in that further include:
If the use information of the corresponding article is modified to use, the corresponding item associations are being received In the case where the checking request of first identifier or second identifier, it is used anti-for returning to the use information of the corresponding article Pseudo- result.
3. article anti-counterfeit method according to claim 1, which is characterized in that the first identifier and second identifier are mutually closed Connection,
Preferably, the second identifier of same article is unidirectional according to first identifier and uniquely generates.
4. article anti-counterfeit method according to claim 3, which is characterized in that further include:
Receive the permissions data access request from client, according to the Authority Verification rule of setting to the access request into Row verifying;
If the verification passes, then the client is being received based on first identifier or second identifier retrieval second identifier or the first mark In the case of the request of knowledge, it will believe with the associated second identifier information of the first identifier or with the associated first identifier of the second identifier Breath is back to the client.
5. article anti-counterfeit method according to claim 1, which is characterized in that further include:
The checking request to the first of target item the mark or the second mark to be verified to be verified is received, searches and first is to be tested Card mark or the second matched first identifier of mark to be verified or second identifier;
If not finding the matched first identifier or second identifier, return to what the target item information was not present Anti-fake result.
6. a kind of based on the article anti-counterfeit server more identified, comprising:
Have the first identifier of wrapped article and the device of second identifier for generating, wherein first identifier and second identifier are used It is verified in article progress authentication and behaviour in service;Wherein first identifier can be acquired before use of the article, pass through acquisition First identifier be proposed that the checking request of first identifier;Second identifier is in hidden state before use of the article and makes in article It is acquired after, the checking request of second identifier is proposed that by the second identifier of acquisition;
For the first identifier and second identifier and article to be carried out the associated device of identity information;
For receiving the checking request to the second mark to be verified of target item, search matched with the second mark to be verified The device of second identifier and the use information of article corresponding with the matched second identifier;
For in the use information for finding the matched second identifier and article corresponding with the matched second identifier, by this The use information of corresponding article is set as used device.
7. article anti-counterfeit server according to claim 6, which is characterized in that further include:
For in the case where the use information of the corresponding article is modified to used situation, if it is corresponding to receive this The first identifier of item associations or the checking request of second identifier, the then use information for returning to the corresponding article are to have used Anti-fake result device.
8. a kind of based on the article anti-counterfeit client more identified, comprising:
The unit of the first mark or/and the second mark to be verified to be verified for reading target item;
It is read based on the information to the first mark or/and the second mark to be verified to be verified, is tested to the transmission of article anti-counterfeit server Card requests and receives the unit for the fake certification result that the article anti-counterfeit server returns;
The wherein article anti-counterfeit server, comprising:
Have the first identifier of wrapped article and the device of second identifier for generating, wherein first identifier and second identifier are used It is verified in article progress authentication and behaviour in service;Wherein first identifier can be acquired before use of the article, pass through acquisition First identifier be proposed that the checking request of first identifier;Second identifier is in hidden state before use of the article and makes in article It is acquired after, the checking request of second identifier is proposed that by the second identifier of acquisition;
For the first identifier and second identifier and article to be carried out the associated device of identity information;
For receiving the checking request to the second mark to be verified of target item, search matched with the second mark to be verified The device of second identifier and the use information of article corresponding with the matched second identifier;
For in the use information for finding the matched second identifier and article corresponding with the matched second identifier, by this The use information of corresponding article is set as used device.
9. a kind of based on the article anti-counterfeit more identified packaging, which includes:
It can be used in first identifier and second identifier that authentication and behaviour in service verifying are carried out to article, wherein first identifier It can be acquired before use of the article, the checking request of first identifier is proposed that by the first identifier of acquisition;Second identifier is in object Product, in hidden state and being acquired after in article, are proposed that testing for second identifier by the second identifier of acquisition using preceding Card request, first identifier and second identifier are associated with article progress identity information, and the use information of the article can be according to the Two identify the historical record searched in particular server and modify,
Wherein, it is preferred that the first identifier be located at article package outer or the first identifier the article packaging It can be readily accessible by the user in the case where being not yet destroyed.
And, it is preferred that article anti-counterfeit packaging according to claim 17, which is characterized in that the second identifier is based on The mode of following one is realized hiding:
The second identifier is closed in packaging inside;
The second identifier is located on the article in packaging.
10. article anti-counterfeit packaging according to claim 9, which is characterized in that the first identifier and second identifier are mutual Association, it is preferred that the second identifier of same article is unidirectional according to first identifier and uniquely generates.
CN201810469095.XA 2018-05-16 2018-05-16 Based on the article anti-counterfeit method more identified and its system Withdrawn CN110503437A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810469095.XA CN110503437A (en) 2018-05-16 2018-05-16 Based on the article anti-counterfeit method more identified and its system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810469095.XA CN110503437A (en) 2018-05-16 2018-05-16 Based on the article anti-counterfeit method more identified and its system

Publications (1)

Publication Number Publication Date
CN110503437A true CN110503437A (en) 2019-11-26

Family

ID=68584730

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810469095.XA Withdrawn CN110503437A (en) 2018-05-16 2018-05-16 Based on the article anti-counterfeit method more identified and its system

Country Status (1)

Country Link
CN (1) CN110503437A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112541773A (en) * 2020-12-09 2021-03-23 睿丰宝科技有限公司 Anti-counterfeiting method and client system
CN116561822A (en) * 2023-07-07 2023-08-08 中科鉴芯(北京)科技有限责任公司 Product anti-counterfeiting method, component and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102722822A (en) * 2012-06-01 2012-10-10 王学武 Method and system for anti-counterfeiting product by using identification code
CN103390187A (en) * 2013-06-25 2013-11-13 深圳劲嘉彩印集团股份有限公司 Packaging box on basis of two-dimensional codes and having verification function and achieving method thereof
CN105761087A (en) * 2016-02-03 2016-07-13 上海皆普信息科技有限公司 Packaging product two-dimensional matching verification anti-fake method and system
CN105931059A (en) * 2016-04-14 2016-09-07 北京安讯奔科技有限责任公司 Product with double-layer anti-counterfeiting code and product tracing anti-counterfeiting method and device
CN106295741A (en) * 2016-08-09 2017-01-04 中国科学院计算机网络信息中心 Method for anti-counterfeit and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102722822A (en) * 2012-06-01 2012-10-10 王学武 Method and system for anti-counterfeiting product by using identification code
CN103390187A (en) * 2013-06-25 2013-11-13 深圳劲嘉彩印集团股份有限公司 Packaging box on basis of two-dimensional codes and having verification function and achieving method thereof
CN105761087A (en) * 2016-02-03 2016-07-13 上海皆普信息科技有限公司 Packaging product two-dimensional matching verification anti-fake method and system
CN105931059A (en) * 2016-04-14 2016-09-07 北京安讯奔科技有限责任公司 Product with double-layer anti-counterfeiting code and product tracing anti-counterfeiting method and device
CN106295741A (en) * 2016-08-09 2017-01-04 中国科学院计算机网络信息中心 Method for anti-counterfeit and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112541773A (en) * 2020-12-09 2021-03-23 睿丰宝科技有限公司 Anti-counterfeiting method and client system
CN116561822A (en) * 2023-07-07 2023-08-08 中科鉴芯(北京)科技有限责任公司 Product anti-counterfeiting method, component and system

Similar Documents

Publication Publication Date Title
US9449325B2 (en) System and method for authenticity verification
US8791794B2 (en) Method and device for obtaining item information using RFID tags
US20170017967A1 (en) Electronic anti-counterfeiting system and electronic anti-counterfeiting method thereof
US20180108024A1 (en) Open registry for provenance and tracking of goods in the supply chain
US8421593B2 (en) Apparatus, systems and methods for authentication of objects having multiple components
US7277601B2 (en) Remote authentication system
CN111587445A (en) Security tag
US9076024B2 (en) Anti-counterfeiting system and method
US7581242B1 (en) Authenticating products
US20060010503A1 (en) Product authentication system for preventing distribution of counterfeits in market
US20130262330A1 (en) Managing objects in a supply chain using a secure identifier
US11748768B2 (en) Commodity anti-counterfeit verification system based on natural biological information
CN102708391B (en) A kind of antifalsification label based on fractal graph and anti-counterfeit authentication method
US8872622B2 (en) Authentication of “source” for brands
CN105894303A (en) Product anti-counterfeiting method, product anti-counterfeit examination method and anti-counterfeit package
CN105894304A (en) Product anti-counterfeiting method
CN102629357A (en) Secure access method of product information and system thereof
WO2015089555A1 (en) Method and system for verifying of the authenticity of a consumer product
JP2021524638A (en) Anti-counterfeit protection of goods
CN102663590A (en) System and method of commodity anti-counterfeiting authentication based on restriction of authentication frequency
CN103400270A (en) Article anti-counterfeiting method for realizing multi-time authentication through associated anti-counterfeiting set codes
CN110570204A (en) anti-fake method and system for packed article
CN105894301A (en) Product anti-counterfeiting method
CN110503437A (en) Based on the article anti-counterfeit method more identified and its system
US20130024387A1 (en) Systems and Methods for Tracking Assigned Code Strings

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20191126