CN110533430A - A kind of antifake method for products and system and electronic device - Google Patents

A kind of antifake method for products and system and electronic device Download PDF

Info

Publication number
CN110533430A
CN110533430A CN201810429620.5A CN201810429620A CN110533430A CN 110533430 A CN110533430 A CN 110533430A CN 201810429620 A CN201810429620 A CN 201810429620A CN 110533430 A CN110533430 A CN 110533430A
Authority
CN
China
Prior art keywords
information
products
product
following feature
antifake method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810429620.5A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGZHOU SAVETECH Co.,Ltd.
Original Assignee
刘振民
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 刘振民 filed Critical 刘振民
Priority to CN201810429620.5A priority Critical patent/CN110533430A/en
Publication of CN110533430A publication Critical patent/CN110533430A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Abstract

The invention discloses a kind of antifake method for products, it is characterized in that its encryption information changes with supply chain dynamic encryption, the primary embryonics information such as raw material manufacturer can not be obtained and be identified by making to copy, it is excluded in market, it is very convenient to food, drug, the security control of Hazardous Chemical Substances, consumption, it is a kind of antifake method for products of decentralization, important social influence will be generated.Not only it had realized big data to excavate shared but also protect individual privacy and business secret, but also has established role in system and rebuild incentive mechanism.Anti-counterfeiting system based on supply chain includes encryption system, decryption system, distributed and customer end systems.Antiforge electronic device based on supply chain includes computer hardware, radio frequency reading rifle, PAD, mobile phone or Internet of Things endpoint, wireless interconnected system and corresponding software management system.

Description

A kind of antifake method for products and system and electronic device
Technical field
The present invention relates to a kind of antifake method for products, system and electronic devices, can effectively prevent the false protection manufacture of manufacturing and marketing the fake The legitimate rights and interests of quotient and consumer.
Background technique
For a long time, manufacturing and marketing the fake had not only upset market order but also cannot be guaranteed the product quality of consumer or even will cause Even more serious injury, such as food and drug safety.
Anti-counterfeiting technology is both the hot spot that manufacturer pays close attention to and government and the focus of attention of consumer.
Product is counterfeit in order to prevent by businessman, can convert packaging in different periods to identical product.Businessman is releasing new product When, it can also replace new packing.Therefore, when causing the kind of packing of a kind of product various, consumer also layman mostly, very Hardly possible judges the true and false of the packaging.The true and false for how verifying commodity, becomes the problem of consumer especially pays close attention to.
A mark of the bar code as product, most of commodity are in order to enter market, supermarket is convenient for settling accounts, it is necessary to set Bar code, therefore either genuine piece or fake products are set, bar code can be all set, bar code has national standard, general quotient Product bar code is generally made of prefix part, manufacturer's code, commercial product code and check code, therefore similar commodity its bar codes It is middle identify the commodity part be all it is identical, no matter genuine piece and counterfeit goods, in order to which product can be scanned in market, supermarket Type, the bar code of similar product are identical.It bar code and its is easy counterfeit, does not have antifalsification substantially.
With being widely used for the product identification codes such as two dimensional code, many commodity are both provided with identification code convenient for consumer at present Scanning obtains the information of the commodity, and the two dimensional code is anti-fake as anti-counterfeiting information progress.But two dimensional code is also easy to be imitated It emits, therefore simple also very poor using the antifalsification of two dimensional code, it is anti-fake to generally require the progress such as identifying code of combination product.Identifying code It could be used after needing to buy the product, be difficult to accomplish pre-sales anti-fake.There is the manufacturer of some fake products, in order to avoid disappearing Expense person be scanned using two dimensional code it is anti-fake, specially select not set two-dimension code label packaging carry out it is counterfeit.For more The product with two dimensional code packaging is changed, personation manufacturer then selects the old packaging that antifalsification label is not used before use to be imitated It emits.Since the packaging of many products is varied, consumer is difficult to recognize new second hand packing and expired some packagings, this is disappeared The fake certification of expense person is made troubles.
Based on the above circumstances, commodity counterfeit prevention problem still could not well solve.Therefore, one kind being suitable for the internet of things era Block chain anti-counterfeiting technology be in demand.
Summary of the invention
For method for anti-counterfeit of tracing to the source, system and the electronic device for solving a kind of internet of things oriented technology, the product that we invent Method for anti-counterfeit is achieved in that
When product export raw material of product etc. manufacture information, production information, batch bulk information, geographical location information, price, Manufacturer's information, distributor information, distribution circulation and billing information add information automatically and encrypt generation graphic code by machine It goes together with goods, this process cannot manually intervene, and confirmed to user terminal by user and confidentiality agreement, layering decrypted user are enjoyed The informed information having, while sharable unclassified big data information is passed through permission and the confidentiality agreement side of knowing automatically by machine Formula carries out layering decryption.
The antifake method for products has following feature, is diffused as according to product supply chain presentation distribution non-central anti-
The antifake method for products has following feature, and various clients find illicit sources product, the counterfeit production of cutting in time The entrance of product inflow consumer.Various clients include dealer, consumer and market surpervision department.
The antifake method for products has following feature, and client is fixed in advance according to system to the informed permission of information The role of justice determines, is determined by signing confidentiality agreement when registration with identity validation when decryption.
The antifake method for products is applied after there is following feature, excitation role counterfeit or inferior quality goods are identified and be identified Enthusiasm can reward the ideal money or commodity of certain number.
The antifake method for products has following feature, in order to radio frequency barcode scanning when encryption information circulates with supply chain The two dimension with authentication, three-dimensional or the multidimensional coding figure or bar code table of encryption reach.
The antifake method for products has following feature, and commodity consumption person consumption must pass through body using when checking commodity Part verifying and the prompt of source legitimacy, can prompt commodity circulation abnormal prompt to government regulation cell phone client, can mention to law enforcement For the information that can trace to the source in more detail.
The antifake method for products has following feature, and permission of knowing is will be appreciated that according to market surpervision and client Or not, it should be appreciated that centre can not manually intervene including system super keepe by the predefined come what is realized of system actor.
The antifake method for products has following feature, and identity validation is by people's eyelid, iris, blood vessels, fingerprint etc. The modes such as bio-identification, short message verification code are not limited to realize with upper type.
The anti-counterfeiting system based on supply chain that we invent includes shared encrypting module, deciphering module, distributed data pipe Manage module and customer end systems.
The Antiforge electronic device based on supply chain that we invent includes storage medium, execution unit, input unit and shows Show unit, the computer program for realizing preceding method or system above-mentioned is recorded on storage medium, execution unit is used for Computer program is executed, display unit is used to receive peripheral operation and shows the implementing result of execution unit, and input unit includes It is not limited to various radio frequencies, keyboard, mouse input.
Detailed description of the invention
Fig. 1 is method for anti-counterfeit flow chart of the invention.As seen from the figure, authenticity of products is the necessary way of consumer, otherwise It can not consume and commodity in use.
Fig. 2 is system structure module map of the invention.
Fig. 3 is electronic device construction schematic diagram of the invention.
Specific embodiment
Technical solution of the present invention is further illustrated with reference to the accompanying drawing.
There is provided a kind of fair and just social supervision systems for technical characterstic of the invention, that is, protect businessman's business secret The individual privacy of close and consumer, and can allow social sharing big data achievement, it is common to supervise adulterant and deceptive information.This system adds Close is that system is encrypted automatically, decrypted, and can only manually intervene process and cannot be directly viewable or change data.
As shown in Fig. 1, the antifake method for products of the invention based on supply chain, comprising the following steps:
First step S1: Cryptographic code or two dimensional code generate.When the product export of manufacturer, manufacturer is by the raw material etc. of product Manufacture information, production information, batch bulk information, geographical location information, price, manufacturer's information, distributor information, distribution flow Logical and billing information by machine adds information and encrypting automatically and generates graphic code encrypt and life automatically with goods anti-counterfeiting system of going together At the graphic code or two dimensional code of encryption.
Dealer is gone together graphic code or two dimensional code by what manufacturer issued with goods, and scanning input is generated into stores list bitmap Shape code (with storage bill and), automatically generate to go together with goods again when selling out inventory and code and check with batch quantity in stock=storage quantity- Sales volume, is such as veritified successfully, is circulated to next stage dealer or consumer with goods colleague's code.
Second step S2: barcode scanning verifying and hierarchical decoding.
It prevents from palming off safely for merchandise news, various Role Identity registrations, and electronic signature agreement clearly maintains secrecy, identity is true Reality and purposes or use scope agreement.
Consumer would know that the commodity by verification information by mobile phone or intelligent terminal scanning figure shape code or two dimensional code Whether source legal or authenticity of products.
Logistics would know that the information such as Shipping Address and the contact person, phone of the cargo or product by verifying by barcode scanning, It is very suitable to the secret protection of the stronger products customers of the privacy such as drug.
After next stage dealer scanning is by verifying, it is known that authenticity of products, anti-channel conflict.
In the case where executing quotient's privacy protection by verifying and agreement after market surpervision personnel scanning, it is known that this product is in locality Sales volume, quantity in stock, judgement is illegal flows into situation, can arrive any one market and check commodity true and false, find the problem in time, in time It solves, it is very convenient and reliable to guarantee drug and food safety.
According to the role of registration and by accordingly auditing, the identification of people's eyelid, iris recognition, fingerprint recognition or short can be passed through The modes such as letter verifying pass through verifying.It can be for different role layering decryption.As consumer it is available whether genuine article or source it is legal Information, make consumer the true and false of product or the legitimacy in source as product consumption or the first step used.This point pair Drug, food or staple commodities are even more important.
Third step S3: role's excitation.It was found that after source of goods exception, consumer, sell commercial city can be in first time to manufacturer It is reported with government regulator, market surpervision law enforcement group can then put on record executions, we will be using integrating or credit or bit coin Incentive mechanism rewards various roles, works as one man, and false pseudo- product is evicted from market.
For example we implement following incentive mechanism: to the exception of discovery, taking incentive mechanism, report primary reward bit Coin or the every report of consumer be primary and be verified as very rewarding 1000 bit coin, can convert and consume for several RMB.
Or integral 2000.
Another embodiment takes incentive mechanism to the exception of discovery, reports primary reward bit coin or integral 500;Quotient Family's credit value increases at 1000 points;Supervision department's disposition is primary, and public letter value increases at 1000 points;The same day announces disposition result, public affairs letter Value increases at 5000 points;Disposition result is announced in 2 days, public letter value increases at 3000 points;The increase of government regulator public affairs letter value, can As the foundation of reward related personnel, and the foundation of related government functionary's quantitative appraisal.
Specific excitation value adjusts stage by stage according to the actual situation.
4th step S4: disposition and feedback
Role's excitation makes various roles work hard, and most critical is also resided in the disposition after the discovery of true and false product, according to existing Regulation and law enforcement situation, product false proof is the important process of governance market order, it is therefore desirable to which government participates in, this will beat Broken product false proof is the thinking boundary in manufacturer's ego-defense market, and product false proof work is established and is ensureing that market order is public Ideological plane that is just, protecting the legitimate rights and interests of consumers with the security of the lives and property is equalled, government, enterprise, consumer participate in jointly, close Note, can just carry out, especially drug, food relationship citizen's life security product it is anti-fake, it is even more so.
Business and government market surpervision department will put on record immediately after receiving or finding the abnormal conditions of product anti-fake system, adopt Card, rapid field examination, until quickly disposition, allows manufacturing and marketing the fake person nowhere to dodge.This system will track government regulation portion The putting on record of door, the sealing up for safekeeping of Cha Zhenghou, disappears and the whole process such as ruins, punish at task assignment and on-site verification, and the nothing that makes to crack down on counterfeit goods is discussed, processing stream Journey legalization is without asking panel discussion for instructions.
Disposition result is fed back into reporter simultaneously, advantageously forms the benign cycle of closed loop management.
As shown in Fig. 2, the anti-counterfeiting system of the invention based on supply chain includes shared encrypting module, deciphering module, registration Module, distributed data management module and customer end systems.Shared encrypting module is not disclose to disclosed merchandise news and Information encrypted, for example raw material sources and amount can disclose no one as important business secret, and every family does not know Road.But total amount can be summarized, there is one accurately to hold the injected volume in market for manufacturer, in order to avoid accumulate a large amount of production Data occupies substantial contribution, very good for the in due course material supply of enterprise, but this information is a transitional information, Only machine is known all right, and any other people is not necessarily to know, quickly judges that system, illicit sources product or product are true Puppet is beneficial.Therefore, only machine encrypts and assigns pre- special quick-searching identification information, is conducive to information retrieval, feedback.
The security mechanism that system encryption is decrypted automatically, can software copyright registration unit or software test mechanism tested Card after test passes through repeatedly, grants registration or operation.
Deciphering module is directed to different clients, decrypts information needed respectively, and the seller of the fake goods that rehearses can not obtain comprehensively Product information is found once appearing in market.
Accordingly, the authentication and information privacy of government market supervisor is crucial, and registration module is necessary this The important composition of the anti-counterfeiting system of invention.
Distributed data inventory's management uses HADOOP technological frame.Since encryption data is using retrieval code is generated, believe Breath feedback is very quick, solves the problems, such as data redundancy and data safety by distributed data base Storage Techniques.
The present invention solves the problems, such as the increase of explosion type amount of access by HADOOP technology, it is ensured that data safety, transmission are suitable Freely.
Data encryption and data sharing are conflicts, therefore, fast and effeciently filter out and share by data, to greatest extent Business secret is protected on ground and individual privacy is the key that one of of the invention.Distributed data storage had not only solved data safety but also energy Prevention breaks out the problem of formula access causes data transmission blocking.
Antiforge electronic device of the invention is collectively constituted by software and hardware.Including computer hardware, radio frequency reading rifle, PAD, hand Machine, intelligent terminal or Internet of Things endpoint, wireless interconnected system and corresponding software management system.Specifically be classified as memory cell, Input or data acquisition unit, arithmetic element, execution unit, as shown in figure 3, the technology upgrading of each unit has no effect on the present invention Protection to technological system.
Wherein, the method and system of the embodiment of the present invention can be realized by way of computer program, and computer journey Sequence can store in the electronic device for including storage medium, such as in smart machine (mobile phone, wrist-watch, tablet computer etc.).This Sample, so that it may realize the smart machine of the above method or system by recording and provide corresponding service for user, equally Including passing through Internet of Things, internet and other intelligent wireless communication modes.
Above-described is only some embodiments of the present invention.For those of ordinary skill in the art, not Under the premise of being detached from the invention design, various modifications and improvements can be made, these belong to protection model of the invention It encloses.

Claims (11)

1. a kind of antifake method for products is achieved in that
When product export raw material of product etc. manufacture information, production information, batch bulk information, geographical location information, price, Manufacturer's information, distributor information, distribution circulation and billing information are added information automatically and are encrypted by machine, are generated same with goods Capable graphic code or two dimensional code, is unable to manual intervention, is confirmed to user terminal by user and confidentiality agreement, decrypted user are enjoyed Informed information, while sharable unclassified big data information is passed through know permission and confidentiality agreement mode automatically by machine Carry out layering decryption.
2. antifake method for products as described in claim 1 has following feature, distribution is presented according to product supply chain and is diffused as Non-central method for anti-counterfeit solves contradiction disclosed in privacy, privacy protection and data.
3. antifake method for products as described in claim 1 has following feature, various clients find that illicit sources produce in time Product, cutting counterfeit product flow into the entrance of consumer.
4. antifake method for products as described in claim 1 has following feature, client is basis to the informed permission of information System role predetermined determines, is determined by signing confidentiality agreement with identity validation when decrypting when registration.
5. antifake method for products as described in claim 1 has following feature, counterfeit or inferior quality goods are identified and known for excitation role The enthusiasm that do not apply afterwards can reward the ideal money or commodity of certain number.
6. antifake method for products as claimed in claim 2 have following feature, when encryption information circulates with supply chain so as to It is reached in the two dimension with authentication, three-dimensional or the multidimensional coding figure or bar code table of the encryption of radio frequency barcode scanning.
7. antifake method for products as claimed in claim 3 has following feature, when commodity consumption person consumes using commodity are checked It must pass through authentication and the prompt of source legitimacy, commodity circulation abnormal prompt can be prompted to government regulation cell phone client, The information that can trace to the source in more detail can provide to law enforcement.
8. antifake method for products as claimed in claim 4 has following feature, permission of knowing is according to market surpervision and visitor Family will be appreciated that or not, it should be appreciated that by the predefined come what is realized of system actor, centre can not manually intervene super including system Grade administrator.
9. antifake method for products as claimed in claim 5 has following feature, identity validation is by people's eyelid, iris, blood The modes such as the bio-identifications such as arteries and veins, fingerprint, short message verification code are not limited to realize with upper type.
10. a kind of anti-counterfeiting system based on supply chain include shared encrypting module, deciphering module, distributed data management module and Customer end systems.
11. a kind of Antiforge electronic device based on supply chain includes storage medium, execution unit, input unit and display unit, The computer program for realizing preceding method or system above-mentioned is recorded on storage medium, execution unit is for executing calculating Machine program, display unit are used to receive peripheral operation and show the implementing result of execution unit, and input unit includes being not limited to Various radio frequencies, keyboard, mouse input.
CN201810429620.5A 2018-05-08 2018-05-08 A kind of antifake method for products and system and electronic device Pending CN110533430A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810429620.5A CN110533430A (en) 2018-05-08 2018-05-08 A kind of antifake method for products and system and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810429620.5A CN110533430A (en) 2018-05-08 2018-05-08 A kind of antifake method for products and system and electronic device

Publications (1)

Publication Number Publication Date
CN110533430A true CN110533430A (en) 2019-12-03

Family

ID=68656302

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810429620.5A Pending CN110533430A (en) 2018-05-08 2018-05-08 A kind of antifake method for products and system and electronic device

Country Status (1)

Country Link
CN (1) CN110533430A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111104882A (en) * 2019-12-09 2020-05-05 曹玉平 Scanning identification method
CN115293311A (en) * 2022-10-08 2022-11-04 北京微点科学技术有限公司 Color watermark anti-counterfeiting method and device based on micro-point code

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102956005A (en) * 2011-08-24 2013-03-06 中国移动通信集团设计院有限公司 Anti-counterfeiting method, anti-counterfeiting system and packaging structure
CN103295137A (en) * 2013-04-11 2013-09-11 济南润土农业科技有限公司 Two-dimensional code dynamic anti-fake information intelligent tracing system based on network
CN104156865A (en) * 2014-08-26 2014-11-19 昆明特康科技有限公司 Commodity anti-counterfeiting, verifying and tracing system and use method thereof
CN106548354A (en) * 2016-10-10 2017-03-29 广州智慧城市发展研究院 A kind of commodity traceability system
CN107103480A (en) * 2017-05-18 2017-08-29 电子科技大学 Supply chain management method based on block chain with sovereign right

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102956005A (en) * 2011-08-24 2013-03-06 中国移动通信集团设计院有限公司 Anti-counterfeiting method, anti-counterfeiting system and packaging structure
CN103295137A (en) * 2013-04-11 2013-09-11 济南润土农业科技有限公司 Two-dimensional code dynamic anti-fake information intelligent tracing system based on network
CN104156865A (en) * 2014-08-26 2014-11-19 昆明特康科技有限公司 Commodity anti-counterfeiting, verifying and tracing system and use method thereof
CN106548354A (en) * 2016-10-10 2017-03-29 广州智慧城市发展研究院 A kind of commodity traceability system
CN107103480A (en) * 2017-05-18 2017-08-29 电子科技大学 Supply chain management method based on block chain with sovereign right

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111104882A (en) * 2019-12-09 2020-05-05 曹玉平 Scanning identification method
CN115293311A (en) * 2022-10-08 2022-11-04 北京微点科学技术有限公司 Color watermark anti-counterfeiting method and device based on micro-point code

Similar Documents

Publication Publication Date Title
Maesa et al. Blockchain 3.0 applications survey
Ahmadi et al. Drug governance: IoT-based blockchain implementation in the pharmaceutical supply chain
US8421593B2 (en) Apparatus, systems and methods for authentication of objects having multiple components
JP5890834B2 (en) Product authentication method and system for executing the product authentication method
CN108389059A (en) Digital copyrighted work protection, transaction and distributing method based on ownership and system
US20050234823A1 (en) Systems and methods to prevent products from counterfeiting and surplus production also of tracking their way of distribution.
JP2013541077A5 (en)
CN104217241A (en) Electronic anti-fake label and realizing method
CN104574092A (en) Commodity anti-counterfeiting system based on invoice and commodity stocks accounting and anti-counterfeiting method
Ionescu et al. Fraud, corruption and cyber crime in a global digital network
CN109903135A (en) A kind of jewelry electronic information shared system based on block chain
CN110310130B (en) Anti-counterfeiting method and system
Wei Blockchain-based data traceability platform architecture for supply chain management
CN110533430A (en) A kind of antifake method for products and system and electronic device
CN112884485A (en) Symmetric encryption traceability transaction method, system and storage medium based on block chain network
CN100492968C (en) Anti-fake technology based on dynamic cipher
Han et al. Fine-grained business data confidentiality control in cross-organizational tracking
Al Noman et al. An intelligent application for preventing the counterfeit medicines through a distributed blockchain
Thanasi-Boçe et al. Combating Luxury Counterfeiting Through Blockchain Technology
WO2015140643A2 (en) Rfid based anti-counterfeiting, distribution enhancement and customer analysis system
Berg et al. Analyzing the TJ Maxx data security fiasco: lessons for auditors
Devi et al. Fake Product Identification with the Help Of Block Chain Technology
Srivastava et al. E-commerce and privacy issues
Nagar et al. Product Authentication System using Blockchain
Mohite et al. Blockchain Technology Based Supply Chain Management System

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210408

Address after: 510070 Room 411, 83 Xianlie Middle Road, Yuexiu District, Guangzhou City, Guangdong Province

Applicant after: GUANGZHOU SAVETECH Co.,Ltd.

Applicant after: Liu Zhenmin

Address before: 510093 Room 411, 83 Xianlie Road, Yuexiu District, Guangzhou City, Guangdong Province

Applicant before: Liu Zhenmin