CN111242638A - Commodity anti-counterfeiting traceability strategy method based on RFID technology and hierarchical management - Google Patents

Commodity anti-counterfeiting traceability strategy method based on RFID technology and hierarchical management Download PDF

Info

Publication number
CN111242638A
CN111242638A CN202010013713.7A CN202010013713A CN111242638A CN 111242638 A CN111242638 A CN 111242638A CN 202010013713 A CN202010013713 A CN 202010013713A CN 111242638 A CN111242638 A CN 111242638A
Authority
CN
China
Prior art keywords
commodity
information
commodities
counterfeiting
warehouse
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010013713.7A
Other languages
Chinese (zh)
Inventor
魏建香
冯冠中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Posts and Telecommunications filed Critical Nanjing University of Posts and Telecommunications
Priority to CN202010013713.7A priority Critical patent/CN111242638A/en
Publication of CN111242638A publication Critical patent/CN111242638A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management

Abstract

The strategy provides a commodity anti-counterfeiting traceability method based on the combination of RFID (radio frequency identification) technology and hierarchical management. The strategy is based on a layered management mode, and the anti-counterfeiting and tracing functions of the commodity in the whole life cycle are realized by combining the information verification of the RFID electronic tag in a mode that an administrator manages the strategy step by step between a manufacturer and dealers at all levels. The invention combines the anti-counterfeiting technology and the information management system, so that consumers can realize the authenticity identification of the commodities by buying the correct commodities in the correct place at the correct time, and the anti-counterfeiting and tracing problems of the commodities in the processes of production, transportation, storage and sale are really solved. The invention is suitable for any high-grade bottle goods with anti-counterfeiting requirements, such as wine, medicines, health products and the like.

Description

Commodity anti-counterfeiting traceability strategy method based on RFID technology and hierarchical management
Technical Field
The invention belongs to the field of commodity anti-counterfeiting, and particularly relates to a commodity anti-counterfeiting traceability strategy based on an RFID technology and hierarchical management.
Background
In the current society, most of goods are transported by logistics companies, and consumers cannot see details in the circulation process of the goods, so that many valuable wine goods have the possibility of counterfeiting and faking. At present, the anti-counterfeiting problem can be well solved by using the RFID technology, and the RFID electronic tag has the characteristics of difficulty in counterfeiting, easiness in identification, information feedback, unique password, secret password, one-time use and the like. Utilize anti-fake tracing back of RFID technique, compare with traditional anti-fake technique, its advantage lies in:
(1) each label has a globally unique ID number, data are directly written into the chip, and the data cannot be modified and are difficult to imitate;
(2) no mechanical abrasion and pollution resistance;
(3) the reader is provided with a physical interface which is not directly opened to the final user, so that the safety of the reader is ensured;
(4) besides the password protection of the electronic tag, the data part can adopt various encryption algorithms to realize safety management;
(5) the communication between the reader and the electronic tag needs to be subjected to a mutual authentication process;
when the RFID is applied to the anti-counterfeiting tracing of commodities, the RFID can record not only the codes of the products, but also various information related to the products, such as the product types, the production time, the inventory positions, the distribution information, the sales areas and the like, and adds a unique, complete, confidential and traceable identity and attribute identifier for the commodities.
The hierarchical management mode can effectively solve the problem of authenticity identification of commodities in the circulation process, ensures that the distribution of counterfeit commodities is stopped in the current link, and does not circulate to the next level. The RFID technology runs through each link of the life cycle of a product, and under the condition that the RFID technology is combined with a hierarchical management mode, the system not only has an anti-counterfeiting function, but also can realize the logistics tracing function of commodities, thereby providing a logistics visual management function for enterprises, effectively improving the logistics management level of the enterprises, and providing better services for authorized suppliers and final customers.
Disclosure of Invention
The invention aims to solve the anti-counterfeiting problem of high-grade wine and realize the tracing of commodities through an RFID electronic tag.
In order to achieve the aim, the invention provides a commodity anti-counterfeiting traceability strategy method based on an RFID technology and hierarchical management, wherein the strategy method is based on the RFID technology, a commodity ID, a manufacturer ID and each level of distributor IDs are written into an electronic tag through an encryption algorithm, and a corresponding data center server is designed for decrypting and storing data so as to realize information interaction among levels;
the method specifically comprises the following steps:
(1) the RFID electronic tag is characterized in that a special reader-writer writes a unique commodity ID code after encryption into the electronic tag, wherein the ID code corresponds to all information of commodities in a data center and at least comprises a commodity serial number, a manufacturer ID, an agent ID and each level of distributor IDs;
(2) a data center server storing all information related to the goods, including at least each goods ID, manufacturer ID, general agent ID, distributor ID, market ID and warehouse information; and in each link of commodity circulation, the interaction function with a warehouse or a consumer is realized.
Further, the electronic tag is attached to the bottle cap sealing position of the wine bottle, when the bottle cap is opened, an internal circuit of the tag is damaged, and the wine bottle cannot be used continuously.
Furthermore, the RFID electronic tag can achieve the purposes of one-time writing and multiple-time reading, the situation of repeated use of the tag is avoided, and the safety of the electronic tag is enhanced.
Furthermore, the next link can be entered only when the commodity is confirmed to be in accordance with the plan in each circulation link, so that the tracking and tracing in the commodity circulation process can be realized through the identified electronic tags.
S2, the commodity anti-counterfeiting traceability strategy based on the RFID technology and hierarchical management comprises the following steps.
And S21, storing the packaged product in a warehouse by the manufacturer, reading the RFID electronic tag of the commodity by the reader before entering the warehouse, and performing interactive verification with the data center server. And if the manufacturer ID of the label is consistent with the record of the server, allowing the commodity to be put in storage, and simultaneously recording the storage time by the server, otherwise, reminding an administrator of the mismatching of the commodity.
And S22, circulation is carried out to the regional general agency, the commodities are taken out from the warehouse of the manufacturer, and the server records the time of taking out. Before entering a warehouse of a regional general agent, the reader-writer can read the RFID electronic tags of the commodities and interacts with the data center server for verification. And if the agent ID of the label is consistent with the server record, allowing the commodity to be put in storage, and recording the storage time by the server, otherwise, reminding an administrator that the commodity is not matched or the commodity in the batch is possible to be forged.
And S23, the commodities are circulated to distributors in various regions, the commodities are delivered from the warehouse of the regional agent, and the server records delivery time. Before entering the warehouse of each level of distributor, the reader-writer can read the RFID electronic tags of the commodities and interact with the data center server for verification. And if the distributor ID of the label is consistent with the record of the server, allowing the commodity to be put in storage, and recording the storage time by the server, otherwise, reminding an administrator that the commodity is not matched or the commodity in the batch is possible to be forged.
And S24, circulating to various malls and supermarkets, taking the commodities out of the warehouse of each level of distributor, and recording the time of taking the commodities out of the warehouse by the server. Before entering various malls and supermarkets, the reader-writer can read the RFID electronic tags of the commodities and interact with the data center server for verification. If the ID of the label in the market or supermarket is consistent with the ID recorded in the data center server, allowing the commodity to enter the market or supermarket for sale, and simultaneously recording the warehousing time by the server, otherwise reminding an administrator of the mismatching of the commodity or the possibility of counterfeiting of the batch of commodities.
And S25, when the consumer purchases the commodity, the RFID electronic tag is scanned through the mobile phone to download and install the matched app, and the consumer can interact with the data center server after registration is completed. If the read label information is consistent with the server, the server will return confirmation information that the commodity is genuine, and if the read information is inconsistent with the server, the server will remind the consumer that the commodity has a problem and does not need to be purchased, and simultaneously inform the manager that the commodity is abnormal and needs to be processed.
S26, the administrator is responsible for global management. When some batch of goods are abnormal and can not be put in storage, the warehouse informs an administrator. If the goods are not delivered to the corresponding warehouse, the electronic tag information is inconsistent with the records in the data center server and can not be put in storage, the administrator enters the server database with the authority, and the goods are allowed to be put in storage after the information is modified. The mode can avoid the commodity from being transported again after being returned, and the cost is saved. If the commodity is a counterfeit product, the administrator gives an alarm and informs the police to destroy the counterfeit commodity.
And S3, the data center server stores information related to all commodities, including each commodity ID, manufacturer ID, total agent ID, distributor ID, market ID, warehouse information and the like. And in each link in the commodity circulation process, the interaction function with a warehouse or a consumer is realized.
Further, the data center server can record the encrypted data and the corresponding decrypted data of each commodity, and the data in the electronic tag is guaranteed to be difficult to be maliciously tampered by the outside.
Further, the data center server can perform information interaction with the warehouse in the process of commodity warehouse-out and warehouse-in, and the correct commodities (genuine commodities) can enter the correct warehouse at the correct time.
Further, the electronic tag is scanned through a mobile phone supporting NFC, and encrypted information in the tag is obtained. And the consumer sends the obtained data to the data center server through the app for verification and receives the decrypted detailed commodity information returned by the server.
Description of the drawings:
FIG. 1 shows the position of the RFID tag on the liquor commodity according to the present invention.
FIG. 2 is a schematic diagram of a method for combining RFID technology with a hierarchical management mode according to the present invention.
Description of the drawings, 1-electronic label.
The specific implementation mode is as follows:
the technical solution of the present invention is further described in detail below with reference to the accompanying drawings.
FIG. 1 illustrates the position of an RFID tag at the bottle cap of a wine commodity. When the product is packaged, the electronic tag is attached to the joint of the bottle cap and the bottle body. The mode is easy for the reader-writer and the consumer to scan the label, and meanwhile, the label can be guaranteed to be destroyed after the commodity is opened.
Further explanation of S1 is:
the consumer can scan the label to obtain the commodity information when purchasing the wine, and the label can be scanned for many times after purchasing. When a consumer opens the commodity, the bottle cap is rotated at first, the bottle cap is separated from the bottle body, the circuit in the label is destroyed, the electronic label is destroyed, and the electronic label cannot be used again, so that the counterfeit person is prevented from obtaining the electronic label for reuse. By the mode, the electronic tag can be read for multiple times only by writing the ciphertext once, and the use safety of the RFID electronic tag is ensured.
Similarly, the method is suitable for anti-counterfeiting of any bottled commodity (such as medicines, health products and the like).
Fig. 2 illustrates the process of the method of combining the whole RFID technology and the hierarchical management approach.
The involved links are manufacturers, regional general agencies, dealers at all levels, various markets and supermarkets, consumers and managers throughout the life cycle of the goods. The S2 hierarchical management model will be further explained from these six aspects.
Before the commodity enters the circulation link, the manufacturer, the agent and all levels of dealers require to complete registration, and the registration information comprises enterprise names, warehouse addresses and information of responsible persons. After the audit is passed, the administrator indicates that the department has the qualification for transporting and selling the commodity, and meanwhile, corresponding ID information in the RFID electronic tags is distributed to all levels of departments. Data in the RFID electronic tag is represented by 64 bits, the first 32 bits store information of manufacturers and departments at all levels, and the second 32 bits store commodity IDs. Of the first 32 digits, digits 1-8 represent manufacturer ID, digits 9-16 represent regional general agent ID, digits 17-24 represent dealer ID of each level, and digits 25-32 represent department and supermarket ID. The data is written into the electronic tag in an encrypted manner and cannot be changed once written. Meanwhile, the data center server records the information in each label for subsequent information verification.
Further explanation of S21 is:
and information verification is required before the manufacturer puts the product in storage, and if the information in the label read by the reader-writer is inconsistent with that in the data center server, the commodity is not required to be sent to a specified warehouse. Since the goods manufactured by the authorized manufacturer are not subject to forgery, the possibility of counterfeit goods is eliminated. And if the commodity is not successfully put in a warehouse, the administrator receives an exception handling signal. The administrator uses the authority to adjust the recorded information in the database, so that the warehouse can receive the batch of commodities, and the cost of re-delivery is saved. And when the commodities are put in storage, the data center server records the storage time.
Further explanation of S22 is:
the goods are delivered from the manufacturer warehouse, the server records the delivery time, and information verification is required before entering the regional general agency warehouse. If the information in the read label of the reader-writer is inconsistent with the information in the data center server, the commodity is not sent to a designated warehouse, or the possibility of counterfeiting exists in the batch of commodities. And if the commodity is not successfully put in a warehouse, the administrator receives the exception handling information. And the administrator makes corresponding treatment according to different conditions. If the commodities cannot be put in the warehouse because the commodities are not delivered to the designated warehouse, the administrator uses the authority to adjust the recorded information in the database, so that the warehouse can receive the batches of commodities, the cost is saved, and meanwhile, the server records the warehousing time. If the merchandise is certified as counterfeit, the administrator notifies the police and destroys the batch of products.
The anti-counterfeiting processes of S23 and S24 are the same as S22.
Further explanation of S25 is:
when a consumer purchases goods in a market or a supermarket, the RFID electronic tag can be scanned through the mobile phone supporting the NFC function, the first scanning can prompt downloading and installing of matched apps, and the software can require short message verification. The consumer can scan the label again after completing registration. If the commodity is a genuine product, the software interacts with the data center server and returns the corresponding decrypted commodity information in the label to the consumer. If the commodity is a fake product, the data center server can display that the information of the commodity does not exist in the database, so that the commodity is reminded not to be purchased, and meanwhile, the software can automatically remind a manager that the commodity is abnormal and needs to be processed.
Further explanation of S3 is:
when the RFID electronic tag is generated, the data center server records the tag information in a database, wherein the tag information comprises encryption information and decryption information. The server interacts with the warehouse before each commodity is put in storage, so that the confirmation information is sent only when each commodity is recorded in the data center, and the commodity is allowed to be put in storage. And finally, when the consumer inquires the commodity information, the server returns the decryption information corresponding to the label information to the software end of the mobile phone. The name and the warehouse position of each agent are recorded in the database in advance, so that the server can also visually display the positions of the commodity at different time nodes in the whole life cycle on the mobile phone client to realize the tracking and source tracing functions of the commodity.
The innovation points of the invention are as follows:
an effective commodity anti-counterfeiting and tracing management mode. By means of the combination of the RFID technology and the hierarchical management, once the commodities are abnormal in a certain circulation link, the commodities are rejected by the warehouse to be put in storage, and the commodities cannot be transported next step. Therefore, the administrator only needs to process abnormal commodities in the current link, and the counterfeit commodities can not be circulated to the next link. The layered management mode can effectively combine with the RFID technology to well realize the anti-counterfeiting function of the commodities. Meanwhile, the commodities distributed to the hands of the consumers are genuine commodities verified in each link, so that the positions of the commodities at each time node can be displayed by corresponding the commodities to the warehouse entry and exit time recorded in the data center server through identifying information in the labels, and the function of tracing the commodities is realized.

Claims (8)

1. The commodity anti-counterfeiting tracing strategy method based on the RFID technology and the hierarchical management is characterized by comprising the following steps: the strategy method is based on the RFID technology, commodity ID, manufacturer ID and dealer ID of each level are written into the electronic tags through an encryption algorithm, and a corresponding data center server is designed for decrypting and storing data, so that information interaction between levels is realized;
the method specifically comprises the following steps:
(1) the RFID electronic tag is characterized in that a special reader-writer writes a unique commodity ID code after encryption into the electronic tag, wherein the ID code corresponds to all information of commodities in a data center and at least comprises a commodity serial number, a manufacturer ID, an agent ID and each level of distributor IDs;
(2) a data center server storing all information related to the goods, including at least each goods ID, manufacturer ID, general agent ID, distributor ID, market ID and warehouse information; and in each link of commodity circulation, the interaction function with a warehouse or a consumer is realized.
2. The commodity anti-counterfeiting traceability strategy method based on RFID technology and hierarchical management according to claim 1, wherein: the electronic tag is attached to the bottle cap sealing position of the wine bottle, when the bottle cap is opened, the internal circuit of the tag is damaged, and the electronic tag cannot be used continuously.
3. The commodity anti-counterfeiting traceability strategy method based on RFID technology and hierarchical management according to claim 2, wherein: by the method, the RFID electronic tag can be written once and read for multiple times, the tag is prevented from being reused, and the safety of the electronic tag is enhanced.
4. The commodity anti-counterfeiting traceability strategy method based on RFID technology and hierarchical management according to claim 1, wherein: RFID technology and a hierarchical management mode are combined, commodities verified through labels flow to the next layer, and an administrator is responsible for handling possible abnormity of each layer, so that further circulation of problem commodities is avoided.
5. The RFID technology and hierarchical management based commodity anti-counterfeiting traceability policy method according to claim 4, wherein: the manufacturer stores the packaged product in a warehouse, and before entering the warehouse, the reader-writer can read the RFID electronic tag of the commodity and interact with the data center server for verification; if the manufacturer ID of the label is consistent with the record of the server, allowing the commodity to be put in storage, and simultaneously recording the storage time by the server, otherwise reminding an administrator that the information is not matched, the commodity is abnormal, cannot be circulated to the next layer and needs to be processed;
the flow of goods to regional agents, dealers of various levels, supermarkets and malls is in accordance with the manufacturer's flow as described in claim 5.
6. The commodity anti-counterfeiting traceability strategy method based on RFID technology and hierarchical management according to claim 1, wherein: when a consumer purchases goods, the RFID electronic tag is scanned through the mobile phone, interaction can be carried out with the data center server after corresponding app is registered, if the read tag information is consistent with the server, the server can return confirmation information that the goods are genuine, and if the read information is inconsistent with the server, the server can remind the consumer that the goods have problems, so that the consumer does not need to purchase the goods, and meanwhile, an administrator is informed that the goods are abnormal. The anti-counterfeiting of the commodity is realized through the mode.
7. The commodity anti-counterfeiting traceability strategy method based on RFID technology and hierarchical management according to claim 1, wherein: the data center server can record the encrypted data and the decryption method of each electronic tag, and the data in the electronic tags are guaranteed to be difficult to be maliciously tampered by the outside.
8. The commodity anti-counterfeiting traceability strategy method based on RFID technology and hierarchical management as claimed in claim 7, wherein: the data center server can perform information interaction with the warehouse in the process of commodity warehouse-out and warehouse-in, and ensures that correct commodities, namely genuine commodities, enter the correct warehouse at the correct time;
according to the strategy, the next link can be entered only when the commodity is confirmed to be in accordance with the plan in each circulation link, so that the tracking and tracing in the commodity circulation process can be realized through the verified electronic tag.
CN202010013713.7A 2020-01-07 2020-01-07 Commodity anti-counterfeiting traceability strategy method based on RFID technology and hierarchical management Withdrawn CN111242638A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010013713.7A CN111242638A (en) 2020-01-07 2020-01-07 Commodity anti-counterfeiting traceability strategy method based on RFID technology and hierarchical management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010013713.7A CN111242638A (en) 2020-01-07 2020-01-07 Commodity anti-counterfeiting traceability strategy method based on RFID technology and hierarchical management

Publications (1)

Publication Number Publication Date
CN111242638A true CN111242638A (en) 2020-06-05

Family

ID=70876002

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010013713.7A Withdrawn CN111242638A (en) 2020-01-07 2020-01-07 Commodity anti-counterfeiting traceability strategy method based on RFID technology and hierarchical management

Country Status (1)

Country Link
CN (1) CN111242638A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111815336A (en) * 2020-07-07 2020-10-23 中建材大宗物联有限公司 Traceability system and traceability method for metal product
CN116452223A (en) * 2023-06-12 2023-07-18 酒仙网络科技股份有限公司 RFID-based original bottle imported wine information management system
CN116542494A (en) * 2023-07-05 2023-08-04 北京物联网智能技术应用协会 Resource allocation method and device, electronic equipment and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111815336A (en) * 2020-07-07 2020-10-23 中建材大宗物联有限公司 Traceability system and traceability method for metal product
CN116452223A (en) * 2023-06-12 2023-07-18 酒仙网络科技股份有限公司 RFID-based original bottle imported wine information management system
CN116452223B (en) * 2023-06-12 2023-09-22 酒仙网络科技股份有限公司 RFID-based original bottle imported wine information management system
CN116542494A (en) * 2023-07-05 2023-08-04 北京物联网智能技术应用协会 Resource allocation method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US7277601B2 (en) Remote authentication system
US9256881B2 (en) Authenticating and managing item ownership and authenticity
US7917443B2 (en) Authentication and tracking system
CN111242638A (en) Commodity anti-counterfeiting traceability strategy method based on RFID technology and hierarchical management
US20170032382A1 (en) System and Method for Product Authentication
CN102339399B (en) A kind of method for anti-counterfeit based on RFID
US20140014714A1 (en) Product authentication and registration
US20230010172A1 (en) Tracking apparel items using distributed ledgers
KR101905730B1 (en) Integrated Logistics Management System
CN103797475A (en) Anti-counterfeiting marking with asymmetrical concealment
CN103797476A (en) Anti-counterfeiting marking with asymmetrical concealment
CN104992335A (en) Full-circulation type two-dimensional code anti-counterfeiting system and realization method thereof
CN103985043A (en) Electronic encryption label, false proof label system, and article false proof system and method
CN111639729B (en) RFID and blockchain-based anti-counterfeiting tracing method
Sun et al. Application of Blockchain and RFID in Anti-counterfeiting Traceability of Liquor
CN102622624B (en) A kind of commodity counterfeit prevention identification system and method
King et al. Securing the pharmaceutical supply chain using RFID
US20160125380A1 (en) Apparatus and methods for communicating asset information
CN103649976A (en) Anti-counterfeiting marking with asymmetrical concealment
CN106339888A (en) RFID wine product all-round anti-fake monitoring method
CN113129029A (en) Wine anti-counterfeiting traceability system based on block chain and RFID
JP2002149776A (en) Physical distribution system for article and physical distribution system for automobile
US20190156090A1 (en) Warranty tracking method for a consumer product
CN109636423A (en) A kind of anti-fake supervisory systems of labour protection articles for use based on RFID
US9652775B2 (en) System, method, procedure and components for preparing an article for authentication and tracking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200605