CN110727937A - Sales chain management method based on industrial internet identification analysis technology - Google Patents

Sales chain management method based on industrial internet identification analysis technology Download PDF

Info

Publication number
CN110727937A
CN110727937A CN201910908577.5A CN201910908577A CN110727937A CN 110727937 A CN110727937 A CN 110727937A CN 201910908577 A CN201910908577 A CN 201910908577A CN 110727937 A CN110727937 A CN 110727937A
Authority
CN
China
Prior art keywords
enterprise
product
code scanning
user
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910908577.5A
Other languages
Chinese (zh)
Other versions
CN110727937B (en
Inventor
黄韬
汪勇
吴兴利
周梅岚
周雅婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NANJING USPEED NETWORK TECHNOLOGY Co Ltd
Original Assignee
NANJING USPEED NETWORK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NANJING USPEED NETWORK TECHNOLOGY Co Ltd filed Critical NANJING USPEED NETWORK TECHNOLOGY Co Ltd
Priority to CN201910908577.5A priority Critical patent/CN110727937B/en
Publication of CN110727937A publication Critical patent/CN110727937A/en
Application granted granted Critical
Publication of CN110727937B publication Critical patent/CN110727937B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a sales chain management method based on an industrial internet identification analysis technology, which comprises the following steps: classifying products, coding the products according to different categories, and registering the products in a system; secondly, in a sales chain, code scanning records are implemented when a product reaches one enterprise, and codes generated by each level of enterprise are sequentially connected after the initial code scanning records of the product; and step three, distributing corresponding authorities according to the hierarchy of the user by the system, logging in the system by the user, acquiring inquiry authorities by the user through the key code, and inquiring the product information. On the basis of the prior art, the invention integrates product sales chain information, and can thoroughly stop the behavior of falsifying the identification to deceive the server through the key code which is uniquely authenticated with the server, the step-by-step authorized key code and the synchronous authentication with the server, thereby realizing the false-proof management of analyzing the whole sales chain by the industrial internet identification.

Description

Sales chain management method based on industrial internet identification analysis technology
Technical Field
The invention relates to a sales chain management method based on an industrial internet identification analysis technology, and relates to the field of industrial internet identification analysis.
Background
Aiming at the industrial internet identification analysis, the existing scheme is to realize the registration and query of identification registration information based on an industrial internet identification analysis architecture, and the technical flow chart of the whole scheme is shown in fig. 1 and comprises the following steps:
enterprises in different industries register marks on a secondary node platform in a corresponding industry, and mark mapping of secondary node addresses, and the secondary nodes register corresponding information to national top nodes; the state top level node/the second level node judges whether to acquire corresponding identification information through the second level node/the state top level node or not based on whether to store the inquired identification or not; the state top level node judges whether to acquire information again through the secondary node or not based on the updating time and the information integrity of the stored identification registration information; if the information is acquired again, the result of the state top-level node replying the query client is the information obtained by integrating the stored information and the newly acquired information.
The prior art scheme can be compatible with various identification systems, and realizes the shared query of identification registration information. However, unique product information identification analysis cannot be performed on the whole product sales chain, and production, sales, logistics, retail, post-query information and the like need to be included in identification information in order to achieve thorough anti-counterfeit, so that the uniqueness of the identification and the product is ensured.
Disclosure of Invention
In order to overcome the problems, the invention integrates the product sales chain information on the basis of the prior art, can thoroughly stop the behavior of falsifying an identifier to deceive a server through a key code which is uniquely authenticated with the server, a step-by-step authorization key code and synchronous authentication with the server, and realizes the counterfeit and tamper-proof management of analyzing the whole sales chain by the industrial internet identifier.
The invention provides the following technical scheme: the sales chain management method based on the industrial Internet identification analysis technology comprises the following steps:
classifying products, coding the products according to different categories, and registering the products in a system;
secondly, in a sales chain, code scanning records are implemented when a product reaches one enterprise, and codes generated by each level of enterprise are sequentially connected after the initial code scanning records of the product;
and step three, distributing corresponding authorities according to the hierarchy of the user by the system, logging in the system by the user, acquiring inquiry authorities by the user through the key code, and inquiring the product information.
Further, the first step specifically comprises:
step 101, dividing products into big bags and small bags according to the package size;
step 102, the large packet coding rule is: industry + enterprise + product + batch + box number;
step 103, the packet coding rule is: industry + enterprise + product + batch + box number + numbering;
and step 104, synchronizing the code scanning record of the big packet to the code scanning record of the small packet in the product before the product sale chain enters retail.
Further, the second step is specifically as follows:
step 201, a manufacturer scans a code, and adds an initial code scanning record in a code scanning record, wherein the initial code scanning record comprises production information of a product;
step 202, a lower-level enterprise applies for a key code to a server step by step, corresponding code scanning records are added after the initial code scanning records in sequence, and the key code is updated every time the code scanning records are added;
step 203, a common user queries a product code scanning record through registration, and records the code scanning record into the code scanning record; when a common user scans the code, the whole code scanning record is scored.
Further, the third step is specifically:
step 301, firstly, judging whether the user is an enterprise user or a common user, wherein the enterprise user uploads enterprise information; uploading personal identity information by a common user;
step 302, the authority of the common user is only limited to the query function;
and step 303, classifying the enterprise users according to the division of labor of the sales chain, wherein different categories are matched with different authorities.
Further, in step 202, the enterprise is divided into a distributor, a retailer and a logistics enterprise according to its division in the sales chain, and its hierarchical relationship is distributor-logistics-retailer;
if the same level contains a plurality of enterprises, each enterprise belonging to the level requires an authorization key code to the corresponding upper-level enterprise, and the key codes generated by each enterprise belonging to the level are different.
Further, in step 301, the enterprise information includes: enterprise legal person ID card information, contact mailbox, legal person certificate, official network address and belonging industry;
the personal identity information comprises identity card information and contact modes.
Preferably, the step 203 specifically includes:
scoring the product according to a specific product flow, comprising: the integrity of the product flow, the number of times of code scanning by a common user after passing through several levels of dealers;
if more dealers, the lower the score; the more times the same item is scanned by a common user, the lower the score.
Compared with the prior art, the invention has the following advantages:
in the prior art, the query of the identification registration information is realized by recording the address mapping or the identification information of the secondary node. Although the query of the identification registration information can be realized, the unique identification of the product cannot be carried out aiming at the whole product sales chain, and the counterfeit and tamper resistance of the product cannot be thoroughly realized.
On the basis of the prior art, the proposal of the sales chain management method based on the industrial internet identification analysis has the following four advantages:
1. the hierarchical management of the sales chain authority is realized, and the sales chain management efficiency is improved;
2. the products are divided into big and small bags according to the package, and meanwhile, the code scanning records of the big bag are recorded to the small bag in the bag before retail, so that the completeness of the code scanning records of each product is ensured, the thought is reasonable, and the actual operation is convenient;
3. each level of operation of the sales chain is recorded by scanning codes, so that the reasonability of the sales chain process can be ensured, a user can conveniently obtain complete product identification information, and the experience degree of user identification analysis is improved;
4. according to the proposal, after the product is sold to a common user, the common user scans the code times and the integrity of the sales chain is graded, so that reference is provided for the authenticity identification of the product.
Drawings
FIG. 1 is a flow chart of a prior art scheme;
FIG. 2 is a block diagram of the overall arrangement of the present invention;
FIG. 3 is a detailed flow diagram of rights management;
FIG. 4 is a registration scheme flow diagram;
FIG. 5 is a diagram illustrating a detailed flow of an analysis scheme.
Detailed Description
The technical solutions of the embodiments of the present invention will be described below with reference to the drawings of the embodiments of the present invention. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
The invention provides a sales chain management method based on an industrial internet identification analysis technology, and figure 2 is a general scheme architecture diagram of the scheme, and the sales chain management of the industrial internet identification analysis is completed through three parts of authority management, a registration scheme and an analysis scheme. The detailed working flow of the scheme comprises the following steps:
classifying products, coding the products according to different categories, and registering the products in a system;
secondly, in a sales chain, code scanning records are implemented when a product reaches one enterprise, and codes generated by each level of enterprise are sequentially connected after the initial code scanning records of the product;
and step three, distributing corresponding authorities according to the hierarchy of the user by the system, logging in the system by the user, acquiring inquiry authorities by the user through the key code, and inquiring the product information.
Further, fig. 4 is a flowchart of a registration scheme, that is, the first step specifically includes:
step 101, dividing products into big bags and small bags according to the package size;
step 102, the large packet coding rule is: industry + enterprise + product + batch + box number;
step 103, the packet coding rule is: industry + enterprise + product + batch + box number + numbering;
and step 104, synchronizing the code scanning record of the big packet to the code scanning record of the small packet in the product before the product sale chain enters retail.
Furthermore, the product needs to be scanned in the sales chain through each level of enterprises, the scanned code is communicated with the server every time, the uniquely authenticated key code is updated, and the next level of the product is scanned through the authenticated key code and updated. A common user can scan the code to inquire the code scanning record of the product. The process corresponds to the second step, and the content and format of the code scanning record comprise the following steps:
code scanning record format table for table 1
Serial number Enterprise name/common user Locality (precision to market) Code scanning date Reason for scanning code Scoring
In the aspect of a registration scheme, identifiers are divided into big packets and small packets according to packaging, and the one-to-one correspondence of the product identifiers is realized according to the rules of industry, enterprise, product, batch and box number (numbering is added to the small packets). Before retail sale, the code scanning records of the big bag can be synchronized to the small bag in the bag, and the correct and complete code scanning records of each product are guaranteed.
As shown in fig. 5, the second step specifically includes:
step 201, a manufacturer scans a code, and adds an initial code scanning record in a code scanning record, wherein the initial code scanning record comprises production information of a product;
step 202, a lower-level enterprise applies for a key code to a server step by step, corresponding code scanning records are added after the initial code scanning records in sequence, and the key code is updated every time the code scanning records are added; in this step, the enterprise is divided into a distributor, a retailer and a logistics enterprise according to the division of the enterprise in the sales chain, and the hierarchical relationship is distributor-logistics-retailer;
if the dealer category includes several different dealer enterprises, then the dealer category is divided into the first dealer-second dealer … … -Nth dealer according to the direct superior-inferior relationship of the dealer;
the logistics and the retailer classification are also subjected to the same hierarchical division, the key codes are issued from the enterprises of the upper type to the enterprises of the lower type, each type of enterprise corresponds to a unique key code, and the last-stage enterprise of each type of enterprise updates the key codes in the server.
Step 203, a common user queries a product code scanning record through registration, and records the code scanning record into the code scanning record; when a common user scans the code, the whole code scanning record is scored.
When the sales chain enters the grade of code scanning of a common user, the integrity and the standardization of the code scanning record need to be graded, if the number of times of inquiry of the common user is too many, the grade is greatly influenced, the grade represents the quality of the product, and a certain reference value is provided for the authenticity of the product. An example of a complete scan record is as follows:
table 2 complete scan record example
Figure BDA0002214027010000041
Figure BDA0002214027010000051
When there are multiple enterprises in the same level, for example, there are multiple manufacturers and multiple distributors, each distributor requests the authorized key code from the corresponding manufacturer, and the updated key codes of the multiple manufacturers are different. All enterprises at the same level can update the key codes to the server, so that the uniqueness of the key codes is ensured, and the conditions of key code leakage, counterfeit products and the like are not easy to occur.
That is, the last level of a plurality of enterprises of the same level is uniquely determined. And all enterprises at the same level can update the key code, and the key code is unique.
In the aspect of analysis scheme, each stage of the sales chain process obtains a corresponding key code through application of the previous stage, the server completes identification according to the uniquely authenticated key code and records corresponding operation, and when the commodity is sold to a common user, the code scanning record can be scored once. The ordinary user can be according to the mark of sweeping the sign indicating number record as the reference basis of judging the product true and false.
As shown in fig. 3, the third step is specifically:
step 301, firstly, judging whether the user is an enterprise user or a common user, wherein the enterprise user uploads enterprise information; uploading personal identity information by a common user; the enterprise information includes: enterprise legal person ID card information, contact mailbox, legal person certificate, official network address and belonging industry;
the personal identity information comprises identity card information and contact modes.
The producer rights include:
the product mark registration authority is possessed, namely the authority of the registration mark can be applied to the products produced in the enterprise;
the method has a key code updating function of unique authentication and identification with a server, namely, enterprises of the type have the authority of updating the key code after products are generated, and the next level (distributor) of a sales chain can scan the code to obtain identification information according to the obtained uniquely identified key code;
and the next-level (distributor/logistics enterprise) key code approval authority is possessed, namely the next-level distributor or the logistics enterprise obtains the key code updated by the manufacturer through application, and the manufacturer has approval/rejection authority for the application of the distributor/logistics enterprise.
The dealer authority includes:
the key code updating function which is uniquely authenticated and identified with the server is possessed, namely, the key code can be updated before the enterprise enters the next-stage process after the enterprise obtains the product sales authority;
and the next-level (retailer/logistics enterprise) key code approval authority is possessed, namely the next-level retailer or the logistics enterprise obtains the updated key code of the dealer through application, and the dealer has approval/rejection authority for the application of the retailer/logistics enterprise.
Retailer privileges include:
the system has a key code updating function which is uniquely authenticated and identified with the server, namely, after the enterprise obtains the product sales authority, the enterprise can obtain the key code updating authority;
and the next level (logistics enterprise) key code approval authority is possessed, namely the logistics enterprise obtains the retailer key code through application, and the retailer has approval/rejection authority for the logistics application.
The logistics enterprise authority comprises:
the key code updating function which is uniquely authenticated and identified with the server is possessed, namely the key code can be updated after the enterprises of the type finish transportation;
step 302, the authority of the common user is only limited to the query function;
and step 303, classifying the enterprise users according to the division of labor of the sales chain, wherein different categories are matched with different authorities.
Preferably, the step 203 specifically includes:
determining a score according to a specific product flow, mainly comprising: the integrity of the product flow, the number of times of code scanning by the common user after passing through several levels of dealers. Normally, the product flow mainly includes manufacturers, distributors, logistics, retailers, and the like; if the number of dealers is too many, the scores are low after multiple transactions; if the same commodity is scanned by a common user for a plurality of times, the commodity is likely to be a counterfeit commodity, and the score is low.
In the aspect of authority management, classified management is carried out according to enterprise users and ordinary users, different types of users have different authorities, and the enterprise users are divided into various categories. The enterprise users with different division on the sales chain are classified according to the front and back of the process, and the next level needs to apply corresponding authority to the previous level. The sales chain authority management is standardized, and the sales chain management efficiency is improved.
According to the sales chain management method based on industrial internet identification resolution, the authority management, the registration scheme and the resolution scheme are combined, and the production, sales and logistics of the whole sales chain are connected in series, so that the product sales chain is transparent, and a user can clearly and visually see the safety of the product from the production to the sales process; meanwhile, the standardization of production and sale of industrial products is enhanced, and the management of a product sale chain is facilitated.
In the prior art, the query of the identification registration information is realized by recording the address mapping or the identification information of the secondary node. Although the query of the identification registration information can be realized, the unique identification of the product cannot be carried out aiming at the whole product sales chain, and the counterfeit and tamper resistance of the product cannot be thoroughly realized.
On the basis of the prior art, the proposal of the sales chain management method based on the industrial internet identification analysis has the following four advantages:
1. the hierarchical management of the sales chain authority is realized, and the sales chain management efficiency is improved;
2. the products are divided into big and small bags according to the package, and meanwhile, the code scanning records of the big bag are recorded to the small bag in the bag before retail, so that the completeness of the code scanning records of each product is ensured, the thought is reasonable, and the actual operation is convenient;
3. each level of operation of the sales chain is recorded by scanning codes, so that the reasonability of the sales chain process can be ensured, a user can conveniently obtain complete product identification information, and the experience degree of user identification analysis is improved;
4. according to the proposal, after the product is sold to a common user, the common user scans the code times and the integrity of the sales chain is graded, so that reference is provided for the authenticity identification of the product.
The application mode of the invention can be adjusted according to the actual situation, and is not used for limiting the invention. The technical scheme provided by the invention is described in detail above; the description of the present embodiment is intended only to aid in the understanding of the method of the present invention. The application mode of the present invention can be adjusted according to the actual situation, and is not intended to limit the present invention.

Claims (7)

1. The sales chain management method based on the industrial Internet identification analysis technology is characterized by comprising the following steps:
classifying products, coding the products according to different categories, and registering the products in a system;
secondly, in a sales chain, code scanning records are implemented when a product reaches one enterprise, and codes generated by each level of enterprise are sequentially connected after the initial code scanning records of the product;
and step three, distributing corresponding authorities according to the hierarchy of the user by the system, logging in the system by the user, acquiring inquiry authorities by the user through the key code, and inquiring the product information.
2. The method for managing the sales chain based on the industrial internet identification and resolution technology according to claim 1, wherein the first step is specifically as follows:
step 101, dividing products into big bags and small bags according to the package size;
step 102, the large packet coding rule is: industry + enterprise + product + batch + box number;
step 103, the packet coding rule is: industry + enterprise + product + batch + box number + numbering;
and step 104, synchronizing the code scanning record of the big packet to the code scanning record of the small packet in the product before the product sale chain enters retail.
3. The method for managing the sales chain based on the industrial internet identification and resolution technology according to claim 1, wherein the second step is specifically as follows:
step 201, a manufacturer scans a code, and adds an initial code scanning record in a code scanning record, wherein the initial code scanning record comprises production information of a product;
step 202, a lower-level enterprise applies for a key code to a server step by step, corresponding code scanning records are added after the initial code scanning records in sequence, and the key code is updated every time the code scanning records are added;
step 203, a common user queries a product code scanning record through registration, and records the code scanning record into the code scanning record; when a common user scans the code, the whole code scanning record is scored.
4. The method for managing the sales chain based on the industrial internet identification and analysis technology according to claim 1, wherein the third step is specifically as follows:
step 301, firstly, judging whether the user is an enterprise user or a common user, wherein the enterprise user uploads enterprise information; uploading personal identity information by a common user;
step 302, the authority of the common user is only limited to the query function;
and step 303, classifying the enterprise users according to the division of labor of the sales chain, wherein different categories are matched with different authorities.
5. The method for managing a sales chain according to claim 3, wherein in step 202, the enterprises are classified into distributors, retailers and logistics enterprises according to their division into sales chains, and the hierarchical relationship is distributor-logistics-retailer;
if the same level contains a plurality of enterprises, each enterprise belonging to the level requires an authorization key code to the corresponding upper-level enterprise, and the key codes generated by each enterprise belonging to the level are different.
6. The method for managing a sales chain based on industrial internet id resolution technology as claimed in claim 4, wherein in said step 301, said enterprise information includes: enterprise legal person ID card information, contact mailbox, legal person certificate, official network address and belonging industry;
the personal identity information comprises identity card information and contact modes.
7. The method for managing a sales chain based on the industrial internet identification parsing technology as claimed in claim 3, wherein the step 203 specifically comprises:
scoring the product according to a specific product flow, comprising: the integrity of the product flow, the number of times of code scanning by a common user after passing through several levels of dealers;
if more dealers, the lower the score; the more times the same item is scanned by a common user, the lower the score.
CN201910908577.5A 2019-09-25 2019-09-25 Marketing chain management method based on industrial Internet identification analysis technology Active CN110727937B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910908577.5A CN110727937B (en) 2019-09-25 2019-09-25 Marketing chain management method based on industrial Internet identification analysis technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910908577.5A CN110727937B (en) 2019-09-25 2019-09-25 Marketing chain management method based on industrial Internet identification analysis technology

Publications (2)

Publication Number Publication Date
CN110727937A true CN110727937A (en) 2020-01-24
CN110727937B CN110727937B (en) 2023-08-11

Family

ID=69218342

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910908577.5A Active CN110727937B (en) 2019-09-25 2019-09-25 Marketing chain management method based on industrial Internet identification analysis technology

Country Status (1)

Country Link
CN (1) CN110727937B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111367245A (en) * 2020-03-18 2020-07-03 贵阳块数据城市建设有限公司 Production equipment monitoring system based on identification analysis technology
CN111414401A (en) * 2020-03-19 2020-07-14 贵阳块数据城市建设有限公司 Historical product information analysis method based on identification analysis technology
CN112163865A (en) * 2020-08-05 2021-01-01 宁夏无线互通信息技术有限公司 Product life cycle management method based on industrial internet identification analysis
CN113704786A (en) * 2021-08-25 2021-11-26 重庆沄析工业互联网有限公司 Supply chain management method based on industrial internet identification analysis
CN113743833A (en) * 2021-11-05 2021-12-03 中国信息通信研究院 Production control method and system based on identification analysis

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105931056A (en) * 2016-04-13 2016-09-07 孙巍 Commodity anti-counterfeiting method and device
CN109670562A (en) * 2018-12-19 2019-04-23 吉林省世晖科技有限公司 A kind of anti-fake, retrospect based on commodity, it is anti-exchange goods, anti-channel conflict management method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105931056A (en) * 2016-04-13 2016-09-07 孙巍 Commodity anti-counterfeiting method and device
CN109670562A (en) * 2018-12-19 2019-04-23 吉林省世晖科技有限公司 A kind of anti-fake, retrospect based on commodity, it is anti-exchange goods, anti-channel conflict management method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111367245A (en) * 2020-03-18 2020-07-03 贵阳块数据城市建设有限公司 Production equipment monitoring system based on identification analysis technology
CN111414401A (en) * 2020-03-19 2020-07-14 贵阳块数据城市建设有限公司 Historical product information analysis method based on identification analysis technology
CN112163865A (en) * 2020-08-05 2021-01-01 宁夏无线互通信息技术有限公司 Product life cycle management method based on industrial internet identification analysis
CN113704786A (en) * 2021-08-25 2021-11-26 重庆沄析工业互联网有限公司 Supply chain management method based on industrial internet identification analysis
CN113743833A (en) * 2021-11-05 2021-12-03 中国信息通信研究院 Production control method and system based on identification analysis

Also Published As

Publication number Publication date
CN110727937B (en) 2023-08-11

Similar Documents

Publication Publication Date Title
CN110727937B (en) Marketing chain management method based on industrial Internet identification analysis technology
US11710091B2 (en) Method and apparatus for identifying, authenticating, tracking and tracing manufactured items
US7590544B2 (en) Method for correcting a mailing address
CN106779737B (en) Product traceability verification method based on block chain technology
CN109214829B (en) Food safety tracing method and device
CN109345264B (en) Wine product traceability anti-counterfeiting system and method based on block chain
CN109598540B (en) Advertisement accurate pushing method and advertisement accurate pushing system
JP2022519768A (en) Food chain product labels and usage, as well as food trust identifier system
CN109087005B (en) Monitoring method of commodity logistics environment based on intelligent contract and fog calculation
US20160253622A1 (en) Tracking unitization occurring in a supply chain
CN111414429B (en) Block chain-based commodity information management method, electronic equipment and storage medium
JP2013515305A (en) Method and apparatus for defining a manufactured item and storing data relating to the manufactured item
CN112732703B (en) Metadata processing method, metadata processing apparatus, and readable storage medium
JP2008515741A (en) Method and system for product marking, tracking and certification
AU2014324171A1 (en) System for authenticating items
EP3948724A1 (en) Product labels, trust identifier systems containing the same, and methods of use thereof
CN101303757B (en) Multifunctional safety false-proof method and system being suitable for a plurality of anti-fake sign
CN113743833B (en) Production control method and system based on identification analysis
CN111414430B (en) Block chain-based commodity information management method, electronic equipment and storage medium
CN101388086A (en) Digital coding method for products anti-counterfeiting physical distribution monitoring system
CN104851002A (en) User query system for product tracing and counterfeiting prevention
CN110059779A (en) A kind of customized commodity anti-counterfeit two-dimensional bar code detection system
CN112883086B (en) Product supply chain query management device and method based on block chain
CN112330340B (en) Block chain-based food tracing method
RU2322692C1 (en) Method for identification and accounting of movement of marked objects and informational system for realization of the method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant