CN111582890B - Anti-counterfeiting tracing and positioning system, commodity, method, device, platform and medium - Google Patents

Anti-counterfeiting tracing and positioning system, commodity, method, device, platform and medium Download PDF

Info

Publication number
CN111582890B
CN111582890B CN202010428993.8A CN202010428993A CN111582890B CN 111582890 B CN111582890 B CN 111582890B CN 202010428993 A CN202010428993 A CN 202010428993A CN 111582890 B CN111582890 B CN 111582890B
Authority
CN
China
Prior art keywords
commodity
iot module
unique
module
iot
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010428993.8A
Other languages
Chinese (zh)
Other versions
CN111582890A (en
Inventor
贺斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010428993.8A priority Critical patent/CN111582890B/en
Publication of CN111582890A publication Critical patent/CN111582890A/en
Application granted granted Critical
Publication of CN111582890B publication Critical patent/CN111582890B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/45Commerce
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y20/00Information sensed or collected by the things
    • G16Y20/20Information sensed or collected by the things relating to the thing itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Economics (AREA)
  • Computing Systems (AREA)
  • Development Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Operations Research (AREA)
  • Finance (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The application provides an anti-counterfeiting traceability, positioning system, commodity, method, device, platform and medium. The module is fixed in the commodity, and when triggered, sends first identification information containing an unalterable unique ID solidified in the module IOT chip to the identification platform; when the authentication platform receives the first authentication information, judging whether the untagged unique ID exists locally or not; if the commodity is true, marking the unique ID, and feeding back a first message to preset alarm equipment so that the alarm equipment prompts the commodity to be true; if the commodity is not false, feeding back a second message to the preset alarm equipment, so that the alarm equipment prompts the commodity to be false. Thus, active anti-counterfeiting is realized through the module, the risk of middle layer attack is reduced, and the reliability of the anti-counterfeiting verification process is improved. Meanwhile, the module cracking difficulty is high, identification information is not easy to crack, the information security is higher, and the anti-counterfeiting performance is more reliable.

Description

Anti-counterfeiting tracing and positioning system, commodity, method, device, platform and medium
Technical Field
The application relates to the technical field of anti-counterfeiting, in particular to an anti-counterfeiting tracing and positioning system, a commodity, a method, a device, a platform and a medium.
Background
With the continuous development of commerce, the counterfeiting and imitation of commodities, especially valuable or well-known commodities, are increasing, and accordingly, the cracking and anti-cracking of anti-counterfeiting technologies of commodities are also increasing.
Currently, commonly used anti-counterfeiting techniques generally include the following:
1. The two-dimension code is traced to the source and anti-counterfeiting, through setting up the two-dimension code on commodity to the user logs in on the merchant website through the two-dimension code, if this two-dimension code has not been registered on the merchant website, then show as genuine.
2. RFID (Radio Frequency Identificatio, radio frequency identification) or NFC (NEAR FIELD Communication technology) is anti-counterfeiting, through setting an RFID or NFC label on the commodity, a user reads anti-counterfeiting information in the RFID or NFC label through a mobile phone or a card reader, and further, the commodity is determined to be true or false based on the anti-counterfeiting information through comparison.
However, the two-dimensional code anti-counterfeiting has a large risk, for example, in a circulation link, people recover the two-dimensional code, if an end user does not sweep the code, the two-dimensional code does not fail, and the two-dimensional code has the risk of being used in counterfeit commodities; in addition, in the packaging process, the two-dimensional code is easy to copy, so that the counterfeit commodity can have the real two-dimensional code; moreover, the information mode with too simple two-dimension code is also easy to be implanted with virus, and an attacker can also modify the content in a small part after cloning the icon, so that the method has inherent unsafe.
For the RFID or NFC anti-counterfeiting technology, the RFID or NFC anti-counterfeiting technology belongs to IC (SMART CARD ) card anti-counterfeiting, and locally stored data is easy to crack by a programmer or mobile phone tool software.
Disclosure of Invention
The embodiment of the application aims to provide an anti-counterfeiting tracing and positioning system, a commodity, a method, a device, a platform and a medium, which are used for solving the problems of unsafe and easy cracking of the traditional anti-counterfeiting technology.
The embodiment of the application provides an anti-counterfeiting system, which comprises: IOT (Internet of Things ) modules and an authentication platform; the IOT module is fixed in the commodity and sends first identification information containing unique ID to the identification platform when triggered; the unique ID is an unalterable unique identifier physically cured in an IOT chip of the IOT module; the authentication platform is in communication connection with the IOT module and is used for judging whether the unique ID which is not marked exists in a local database or not when receiving first authentication information which is transmitted by the IOT module and contains the unique ID; if the commodity is true, marking the unique ID, and feeding back a first message for identifying the commodity to a preset alarm device so that the alarm device prompts the commodity to be true; if the commodity is not false, a second message for identifying the commodity is fed back to the preset alarm equipment, so that the alarm equipment prompts that the commodity is false.
It should be understood that the IOT module adopts LPWAN (Low-Power Wide-Area Network) technology, such as NB-IOT (Narrow Band Internet of Things) or eMTC (ENHANCE MACHINE TYPE Communication) or mMTC (MASSIVE MACHINE TYPE Communication), so that Communication with the authentication platform can be directly realized, and the IOT module has the advantages of Low Power consumption, low transmission Power consumption, wide coverage range and the like. In the implementation process, the IOT module is fixed in the commodity (such as in the commodity through an integrated molding technology, such as in the glass, ceramic, metal, plastic and other things), so that the active reporting of the authentication platform can be realized, and the active anti-counterfeiting is realized. Meanwhile, as the IOT chip technology is more complex, the hardware encryption engine is built in, and the more complex the chip is, the higher the cracking difficulty is, so that the identification information is less prone to cracking, and compared with the anti-counterfeiting technology adopting the two-dimensional code and RFID or NFC, the anti-counterfeiting information has higher security and more reliable anti-counterfeiting performance.
Further, the unique ID is a physical ID of the IOT module physically cured within the IOT chip during production.
The physical ID is a unique ID serial number that the chip manufacturer physically cures within the IOT chip at the time of manufacturing the chip when the commodity manufacturer customizes the IOT chip to the IOT chip manufacturer. It is just like the CPUID or serial number of the computer CPU, and can only be read, and all software can not be changed. Therefore, when the physical ID of the IOT module is used as the unique ID for anti-counterfeiting, the unique ID can be ensured to be not modified, and the reliability of anti-counterfeiting verification is improved.
Further, because the IOT module is fixed in the commodity by adopting an integrated molding technology, the possibility of cracking is limited by the tightness of the structure, a physical interface is not provided, and virtual HOOK is no longer practical; meanwhile, the embedded software in the module adopts an encryption storage technology.
Further, the IOT module is in communication connection with all authentication platforms, and adopts a strong encryption technology: the IOT chip contains a hardware encryption engine, and all communication processes employ a software strong encryption technique.
Further, the alarm device includes a client that is pre-associated with the unique ID.
In the actual application process, the contact way of the user can be recorded when the user purchases the commodity. The contact information can be used as a client identifier of the user to be associated with the unique ID of the IOT module in the purchased commodity. And the authentication platform can send the authentication result to the client of the commodity purchasing user through the corresponding contact way, so that the user can know the authenticity verification result conveniently.
Further, the alarm device comprises the IOT module and an alarm lamp connected with the IOT module; the authentication platform feeds back the first message or the second message to the IOT module; the IOT module is further used for controlling the warning lamp to display according to a preset first display mode when the first message is received; and when the second message is received, controlling the warning lamp to display according to a preset second display mode.
In the practical application process, the purchasing party of the commodity can not be the using party of the commodity, and meanwhile, the conditions of changing the contact mode and the like of the user exist, so in the embodiment of the application, the commodity is effectively reminded of the commodity authenticity condition of the commodity user by arranging the warning lamp connected with the IOT module in the commodity.
Further, a two-dimensional code or an RFID tag or an NFC tag is arranged on the commodity; the two-dimensional code or the RFID tag or the NFC tag can be read by a client so that the client can acquire second identification information and transmit the second identification information to the identification platform; the authentication platform is also used for judging the authenticity of the commodity according to the second authentication information when receiving the second authentication information transmitted by the client, and feeding back an authentication result to the client.
In the implementation process, the two-dimensional code, the RFID tag or the NFC tag is arranged on the commodity, so that a user can perform preliminary authenticity verification through the two-dimensional code, the RFID tag or the NFC tag.
Further, a local wireless connection module is integrated in the IOT module; the local wireless connection module is used for being connected with the client; the association relation between the second identification information and the unique ID is prestored in the identification platform; the authentication platform is further used for determining a unique ID corresponding to the second authentication information when receiving the second authentication information transmitted by the client, and transmitting a connection state acquisition instruction to the IOT module corresponding to the unique ID; the IOT module is further used for feeding back the connection state with the client to the authentication platform according to the connection state acquisition instruction; the authentication platform is used for judging whether the commodity is true or false according to the second authentication information when the local wireless connection module of the IOT module is connected with the client; and when the local wireless connection module of the IOT module is not connected with the client, feeding back the object code separation to the client.
In the implementation process, when the user performs authenticity verification by adopting the two-dimension code or the RFID tag or the NFC tag, whether the legal IOT module corresponding to the two-dimension code or the RFID tag or the NFC tag used by the user is on site or not can be determined through the connection state of the IOT module and the user client, so that the situation that the user is cheated when buying due to the fact that the imitated two-dimension code or the imitated RFID tag or the imitated NFC tag or the real two-dimension code or the imitated RFID tag or the imitated NFC tag is attached to a counterfeit commodity can be effectively avoided.
Further, the anti-counterfeiting system further comprises: the monitoring sensor is arranged at the opening position of the commodity and is in communication connection with the IOT module and used for sending trigger information to the IOT module when the commodity is opened so as to trigger the IOT module.
In the implementation process, the monitoring sensor is arranged at the opening position of the commodity, so that the authenticity verification can be automatically carried out when the commodity is opened for the first time, thereby preventing the fake making means similar to 'fake bottled fake wine' from occurring and improving the anti-counterfeiting reliability of the anti-counterfeiting system.
Further, the IOT module is integrally formed with the commodity.
In the implementation process, the IOT module and the commodity are integrally formed, so that the irrepartability of the IOT module and the commodity can be effectively ensured, and the counterfeiting behavior by removing the label on the genuine product is effectively prevented.
Further, the IOT module is further configured to send traceability information to the authentication platform according to a preset sending rule; the identification platform is also used for associating the tracing information with the commodity so as to facilitate tracing.
In the implementation process, the IOT module can send the tracing information to the authentication platform, so that the authentication platform can record the tracing information and the commodity in association, and a user can trace the tracing of the commodity through the authentication platform.
Further, the tracing information includes: positioning information of the IOT module, and the unique ID.
It should be understood that the IOT chip itself supports the positioning function, so that the identification platform can record the moving track of the commodity by reporting positioning information and reporting unique ID, thereby facilitating tracing the commodity.
The embodiment of the application also provides a tracing system, which comprises: the IOT module and the management platform; the IOT module is fixed in the commodity, and the traceability information is sent to the management platform according to a preset sending rule; and the management platform is in communication connection with the IOT module and is used for recording the tracing information and the commodity association when the tracing information is received so as to trace the source.
Further, the tracing information includes: positioning information of the IOT module and a unique ID of the IOT module; the unique ID is a physical ID in the IOT chip which is physically solidified during the production of the IOT module.
The embodiment of the application also provides an anti-counterfeiting commodity, which comprises: a housing for the commodity; the IOT module is fixed in the shell; the IOT module is used for sending first identification information containing unique ID to the identification platform when triggered so as to enable the identification platform to identify the authenticity of the commodity; the unique ID is an unalterable unique identification that is cured within the IOT chip.
Above-mentioned anti-fake commodity can realize initiatively anti-fake through the IOT module, compare in traditional user scans the passive anti-fake mode of two-dimensional code or user reading RFID or NFC label information, in the anti-fake process of IOT module, need not access user terminal, consequently can reduce the risk of intermediate level attack, improve anti-fake verification process's reliability. Meanwhile, as the IOT module technology is more complex, and the chip is more complex in general, the cracking difficulty is higher, so that the identification information of the chip is less likely to be cracked, and compared with the anti-counterfeiting commodity adopting the two-dimensional code or RFID or NFC anti-counterfeiting technology, the anti-counterfeiting commodity provided by the embodiment of the application has higher anti-counterfeiting information security and more reliable anti-counterfeiting performance.
Further, the unique ID is a physical ID within the IOT chip that is physically cured during production of the IOT module.
Further, the IOT module is an IOT module of any version from 2G to 6G.
Further, the anti-counterfeiting commodity further comprises: the warning lamp is arranged outside the shell and connected with the IOT module, so that the warning lamp is displayed in different display modes under the control of the IOT module.
Further, the anti-counterfeiting commodity further comprises: the monitoring sensor is arranged at the opening position of the commodity and is in communication connection with the IOT module and used for sending trigger information to the IOT module when the commodity is opened so as to trigger the IOT module.
Further, the IOT module is further configured to send tracing information to the authentication platform according to a preset sending rule, so that the authentication platform can record the tracing information and the commodity in association with each other, thereby facilitating tracing.
The embodiment of the application also provides an anti-counterfeiting method which is applied to the identification platform and comprises the following steps: receiving first identification information transmitted by an IOT module fixed in the commodity; the first identification information contains an unalterable unique ID cured within the IOT chip; judging whether the unique ID which is not marked exists in a preset IOT module ID database; if the commodity identification information exists, marking the unique ID, and feeding back a first message for identifying the commodity as true to preset alarm equipment; if the commodity is not found, a second message for identifying the commodity as false is fed back to the preset alarm equipment.
In the anti-counterfeiting method, anti-counterfeiting identification is performed based on the IOT module, identification information is directly sent by the IOT module, and compared with a traditional passive anti-counterfeiting mode that a user scans a two-dimensional code or reads RFID or NFC label information, the IOT module does not need to be accessed into a user terminal in the anti-counterfeiting process, so that the risk of middle-layer attack can be reduced, and the reliability of the anti-counterfeiting verification process is improved. Meanwhile, as the IOT module technology is more complex, and the chip is generally more complex, the cracking difficulty is higher, so that the unique ID solidified in the IOT chip is less prone to being cracked, and compared with the two-dimensional code or RFID or NFC anti-counterfeiting technology, the anti-counterfeiting information security is higher, and the anti-counterfeiting performance is more reliable.
Further, the method further comprises: receiving second identification information transmitted by the client; the second identification information is read from a two-dimensional code or an RFID tag or an NFC tag arranged on the commodity by the client; judging the authenticity of the commodity according to the second identification information, and feeding back an identification result to the client.
In the anti-counterfeiting method, a user can perform preliminary authenticity verification through the two-dimensional code or the RFID tag or the NFC tag.
Further, the association relation between the second identification information and the unique ID is pre-stored in the identification platform; before determining the authenticity of the commodity according to the second authentication information, the method further comprises: determining a unique ID corresponding to the second authentication information; sending a connection state acquisition instruction to the IOT module corresponding to the unique ID; receiving connection state information fed back by the IOT module corresponding to the unique ID; and determining the connection state information to be that the IOT module is connected with the client.
Further, the method further comprises: and when the connection state information is that the IOT module is not connected with the client, feeding back the object code separation to the client.
In the anti-counterfeiting method, when the user performs authenticity verification by adopting the two-dimensional code or the RFID tag or the NFC tag, whether the legal IOT module corresponding to the two-dimensional code or the RFID tag or the NFC tag used by the user is on site or not can be determined through the connection state of the IOT module and the user client. Therefore, the authenticity verification corresponding to the two-dimensional code or the RFID label or the NFC label is carried out only when the two-dimensional code or the RFID label or the NFC label and the corresponding IOT module are at the same position (namely, the condition of object code separation does not occur), and the risk of the user is prompted when the two-dimensional code or the RFID label or the NFC label and the corresponding IOT module are not at the same position (namely, the condition of object code separation occurs). Therefore, the situation that a user is cheated when buying due to the fact that the imitated two-dimensional code or the RFID label or the NFC label is attached to the counterfeit commodity or the real two-dimensional code or the RFID label or the NFC label is effectively avoided.
Further, the association relation between the second identification information and the unique ID is pre-stored in the identification platform; judging the authenticity of the commodity according to the second identification information, and feeding back an identification result to the client, wherein the method comprises the following steps: determining a unique ID corresponding to the second authentication information; searching the unique ID in a preset IOT module ID database; judging whether the unique ID is marked in the IOT module ID database; if yes, sending a preset warning message to the client; if not, sending a message that the commodity is true to the client, and not marking the unique ID.
In the anti-counterfeiting method, whether the IOT module in the corresponding commodity is used or not can be determined by judging whether the unique ID is marked in the IOT module ID database, so that the authenticity of the commodity is determined.
The embodiment of the application also provides an anti-counterfeiting device which is applied to the authentication platform and comprises: the device comprises a receiving module, a judging module and a processing module; the receiving module is used for receiving first identification information transmitted by the IOT module fixed in the commodity; the first identification information contains an unalterable unique ID cured within the IOT chip; the judging module is used for judging whether the unique ID which is not marked exists in a preset IOT module ID database; the processing module is used for marking the unique ID if the unique ID exists and feeding back a first message for identifying the commodity as true to preset alarm equipment; if the commodity is not found, a second message for identifying the commodity as false is fed back to the preset alarm equipment.
The embodiment of the application also provides an authentication platform, which comprises: comprises a processor, a memory and a communication bus; the communication bus is used for realizing connection communication among the data interface, the processor and the memory; the processor is configured to execute one or more programs stored in the memory to implement any of the anti-counterfeiting methods described above.
The embodiment of the application also provides a readable storage medium, which stores one or more programs, and the one or more programs can be executed by one or more processors to realize any anti-counterfeiting method.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and should not be considered as limiting the scope, and other related drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of an anti-counterfeiting system according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a monitoring sensor in an open position according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a basic structure of an anti-counterfeit article, for example, a bottled article according to an embodiment of the present application;
FIG. 4 is a schematic diagram of an alarm device according to an embodiment of the present application;
FIG. 5 is a schematic flow chart of an anti-counterfeiting method according to an embodiment of the present application;
fig. 6 is a schematic flow chart of anti-counterfeit inquiry of a client according to an embodiment of the present application;
FIG. 7 is a schematic structural diagram of an anti-counterfeiting device according to an embodiment of the present application;
Fig. 8 is a schematic structural diagram of an authentication platform according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings in the embodiments of the present application.
Embodiment one:
Because the traditional anti-counterfeiting mode has the problems of unsafety and easy cracking, the embodiment of the application provides an anti-counterfeiting scheme based on the IOT module.
Referring to fig. 1, fig. 1 is a schematic diagram of an anti-counterfeiting system according to an embodiment of the present application, including: IOT modules and authentication platforms.
In the embodiment of the application, a LPWANIOT chip is arranged in the IOT module, and the LPWANIOT chip refers to an IOT chip for realizing communication based on LPWAN.
It should be noted that GPRS (GENERAL PACKET Radio Service ), NB-IOT (Narrow Band Internet of Things, cellular-based narrowband internet of things), eMTC (ultra large connectivity internet of things), mMTC (mass machine type communication, IOT version in 5G wide area wireless technology), aerospace internet (IOT version in 6G wide area wireless technology, currently specific international standard has not been formed), correspond to different versions of LPWAN IOT chips in 2G to 6G wide area wireless technology, respectively, wherein NB-IOT is currently the most widely used LPWAN IOT chip, which has advantages of small size, high technical maturity, low power consumption, etc. Thus, an NB-IOT chip is described as an example basis in an embodiment of the present application. However, it should be understood that the solution of the embodiment of the present application is applicable to LPWAN IOT chips of various versions.
In the embodiment of the application, the IOT module is fixed in the commodity, and when triggered, the NB-IOT chip in the IOT module can send first identification information containing the unique ID to the identification platform through LPWAN.
It should be noted that in the embodiment of the present application, each NB-IOT chip is associated with a unique ID that is cured within the NB-IOT chip so that it can be read by the NB-IOT chip.
To ensure the reliability of the inventive solution, the unique ID of each NB-IOT chip should be unalterable.
Illustratively, in embodiments of the present application, the physical ID (also referred to as physical silicon ID) of the NB-IOT chip may be employed. The physical ID of the NB-IOT chip refers to a unique ID serial number physically cured in the NB-IOT chip when the NB-IOT chip is manufactured by the manufacturer of the NB-IOT chip. It is different from the conventional EPROM (Erasable Programmable Read-Only Memory) read-Only writing mode, in which the written code can be read Only and not changed, but can be erased and rewritten by ultraviolet, etc. While the physical ID, like the CPUID number or serial number of the computer CPU, can only be read by CPU instructions, all software cannot be altered. It should be understood that each version of IOT chip has a physical ID.
It should also be noted that the unique IDs corresponding to all NB-IOT chips employed may be recorded in the authentication platform, so as to facilitate the authentication platform to authenticate the merchandise.
The authentication platform can be in communication connection with the NB-IOT chip, and judges whether the untagged unique ID exists locally or not when receiving first authentication information containing the unique ID transmitted by the NB-IOT chip.
If the commodity identification information exists, the identification platform can mark the unique ID and feed back a first message for identifying the commodity as true to preset alarm equipment so that the alarm equipment prompts the commodity to be true; if the commodity is not found, the authentication platform can feed back a second message for identifying the commodity as false to the preset alarm equipment so that the alarm equipment prompts the commodity to be false.
That is, in the embodiment of the present application, the authentication platform may determine whether the commodity is genuine or genuine based on whether the unique ID transmitted from the IOT module is marked.
It should be understood that, in the embodiment of the present application, the first message and the second message fed back by the authentication platform are not information that absolutely reflects the authenticity of the commodity. In fact, whether the unique ID is marked or not actually reflects whether the IOT module has been used. Typically, an IOT module has been used, if the user is not the current user and the commodity is a new one that has not been used, then the commodity is highly probable to be false, otherwise the high probability is true. Therefore, in the embodiment of the present application, the true or false of the commodity identified by the first message and the second message essentially identifies a probability that the commodity is true or false, and essentially identifies whether the IOT module has been used.
In the practical application process, in order to prevent the situation that the fake product is sold by using the real commodity package, such as 'real bottled fake wine', the IOT module can be automatically triggered when the commodity is used for the first time. Thus, if the illegal vendor sells the fake product by using the real commodity package, the authentication platform feeds back a second message when the IOT module is triggered again, thereby realizing an effective anti-counterfeiting function.
In order to automatically trigger the IOT module when the commodity is first used, as shown in fig. 2, a monitoring sensor may be disposed at the opening position of the commodity, so as to monitor whether the commodity is opened or not through the monitoring sensor. Meanwhile, the monitoring sensor can be in communication connection with the IOT module, so that when the commodity is started, trigger information is sent to the IOT module to trigger an NB-IOT chip of the IOT module.
For example, in bottled goods such as drinks, monitoring sensors may be provided at the body and cap of the bottle.
For example, in a case (can) for housing a commodity such as a medicine or a milk powder, a monitoring sensor may be provided at a case (can) lid of the case (can).
For example, all industrial products with sealing mechanism, such as safe, door lock, etc., have the same principle as above; the workpiece products such as gears, bearings, cutters and the like are not actively protected, the authenticity of the workpiece products cannot be distinguished by naked eyes of users, the IOT module can be bound on the workpiece, a physical button is arranged, a client communicates with the IOT module, and the client can send second identification information (the second identification information can contain information which is stored in the identification platform in advance and can be used for identification, such as unique ID of the IOT module and the like, and can also be the rest of the contained information); and simultaneously activating an IOT chip bound in the IOT module on the workpiece, automatically reporting the first authentication information, and completing double verification, so that the authentication platform can judge the authenticity of the commodity based on the first authentication information and the second authentication information, and feeding back the authenticity and traceability information of the commodity to the client. The goods without sealed package can be packaged again by uniformly adopting the sealed tank (box) technology, and a monitoring sensor is arranged at the opening position of the tank (box) body and used for starting the anti-counterfeiting traceability system to inquire when the goods are opened for the first time.
In the embodiment of the application, the monitoring sensor can be realized by adopting devices such as a correlation sensor, an infrared sensor and the like.
In the practical application process, there are often cases where goods are purchased for delivery. At this time, the person triggering the IOT module may not be the purchaser, who actually uses the commodity. There is often a need for purchasers to know the authenticity of the purchased goods at the time of purchase. Therefore, in a feasible implementation manner of the embodiment of the present application, a two-dimensional code, an RFID tag or an NFC tag may be disposed on the commodity, so that a user may read second identification information carried in the two-dimensional code, the RFID tag or the NFC tag through a client, and then the client may send the second identification information to the identification platform, so that the identification platform may determine whether the commodity is genuine or genuine based on the second identification information, and feedback an identification result to the client.
It should be understood that, considering the problem of easy tampering and poor anti-counterfeiting property of the two-dimensional code anti-counterfeiting technology or the RFID or NFC anti-counterfeiting technology, in this possible embodiment, a local wireless connection module supporting WiFi, BT (bluetooth), loRa (Long Range Radio), sigFox, sub 1G and the like may be extended in the IOT module, and a user may be required to establish connection with the IOT module when the user reads the two-dimensional code or the second authentication information carried in the RFID tag or the NFC tag through the client to perform the authentication of the commodity. Therefore, whether the IOT module of the same commodity is separated from the two-dimensional code or the RFID tag or the NFC tag (namely, object code separation) on the same commodity is determined based on whether the client establishes connection with the IOT module. And when the object code separation condition does not exist, the authentication platform adopts the second authentication information transmitted by the client to carry out the authenticity authentication. Therefore, the situation that a user is cheated when buying due to the fact that the imitated two-dimensional code or the RFID label or the NFC label or the real two-dimensional code or the RFID label or the NFC label is attached to the counterfeit commodity is effectively avoided.
The local wireless refers to a general term of non-wide area wireless network technologies such as RFID, NFC, BT (bluetooth), wiFi, or LoRa (Long Range Radio), sigFox, sub 1G, and the like. In the embodiment of the present application, the wireless technology that cannot complete the wide area transmission may be considered as local wireless.
It should be noted that in this possible implementation manner, the association relationship between the second identification information and the unique ID of the IOT chip in the commodity may be pre-stored in the identification platform, so that the identification platform is convenient to determine the two-dimensional code or the RFID tag or the IOT module corresponding to the NFC tag read by the user.
For example, when the two-dimensional code or the RFID tag or the NFC tag and the IOT module are set on the commodity, the association relationship between the second identification information carried in the two-dimensional code or the RFID tag or the NFC tag on the same commodity and the unique ID of the IOT chip can be stored in a system in an associated manner.
Specifically, when the authentication platform receives the second authentication information transmitted by the client, the authentication platform can determine the unique ID corresponding to the second authentication information according to the stored association relationship, and then send a connection state acquisition instruction to the IOT module corresponding to the unique ID.
And after receiving the connection state acquisition instruction, the IOT module feeds back the connection state with the client to the authentication platform according to the connection state acquisition instruction.
When the connection state fed back by the IOT module is that the local wireless connection module of the IOT module is connected with the client, the authentication platform can judge whether the commodity is true or false according to the second authentication information; otherwise, feedback of the separation of the object codes to the client side is carried out, and the risk that the identified commodity is a counterfeit commodity exists.
In one possible example of the present possible embodiment, the authenticity of the commodity may be determined according to whether the unique ID corresponding to the second authentication information has been marked (i.e., whether the IOT module in the commodity has been used) based on the association relationship between the second authentication information and the unique ID.
Specifically, the authentication platform may first determine the unique ID corresponding to the second authentication information, and then find the unique ID in the preset IOT module ID database, and determine whether the unique ID is marked in the IOT module ID database. If yes, a preset warning message can be sent to the client to warn the user that the commodity is likely to be a counterfeit commodity; if not, a message that the commodity is true can be sent to the client, and in order to ensure the verification reliability when the IOT module is triggered, the unique ID is not marked at this time.
In another possible example of the present possible implementation manner, the second authentication information may directly contain the unique ID of the corresponding IOT chip, so that the authentication platform may directly find the unique ID in the preset IOT module ID database based on the unique ID in the second authentication information, and determine whether the unique ID is marked in the IOT module ID database. If the commodity is marked, a preset warning message can be sent to the client to warn the user that the commodity is likely to be a counterfeit commodity; if not, a message that the commodity is true can be sent to the client, and in order to ensure the reliability of verification when the IOT module is triggered, the unique ID is not marked at this time.
In the embodiment of the application, in order to facilitate the feedback of the authentication result of the authentication platform to the user, when the user purchases the commodity, the contact way of the user can be recorded, and the contact way can be used as the client identification of the user to be associated with the unique ID of the IOT chip in the purchased commodity. Or when the user purchases, the user can log in an APP (application program) account of the product, and the authentication platform can correlate the user account with the unique ID of the IOT chip in the commodity purchased by the user by scanning the two-dimensional code on the commodity.
At this time, the client of the user can be used as an alarm device, and after the authentication platform authenticates according to the first authentication information transmitted by the IOT module, the first message or the second message can be pushed to the client of the user according to the associated user contact way or the account of the user, so as to realize feedback of the authentication result.
However, it should be noted that, as described above, in practical applications, there are situations in which the purchasing party of the commodity may not be the commodity user, and there are situations in which the user changes the contact manner, the user logs out of the account, and so on. Therefore, in order to ensure that the commodity user can effectively acquire the authenticity information of the commodity, in the embodiment of the application, a warning lamp connected with the NB-IOT chip can be arranged on the commodity. After the authentication platform finishes authentication according to the first authentication information transmitted by the IOT module, the authentication platform can send the first message or the second message to the IOT module. The NB-IOT chip of the IOT module can control the warning lamp to display according to a preset first display mode when receiving the first message, and control the warning lamp to display according to a preset second display mode when receiving the second message, so that the effect of prompting the authenticity of the commodity of the user is achieved through different display modes of the warning lamp.
In the embodiment of the application, the warning mode of the warning lamp can be preset, and a user can be informed of which mode indicates that the commodity is true and which mode indicates that the commodity is false through modes such as a description. For example, the NB-IOT chip may control the warning light to emit green light when receiving the first message and control the warning light to emit flashing red light when receiving the second message.
It should be further noted that, in the embodiment of the present application, besides the alert function may be implemented through alert devices such as a vibrator (capable of prompting through different vibration frequencies or vibration intensities), a speaker (capable of performing intelligent voice prompt), and the like. The implementation manner is consistent with that of the warning lamp, and is not repeated here.
In the embodiment of the application, the IOT module can be deeply bound with the commodity (for example, the IOT module is embedded into the commodity shell through a seamless embedding technology, so that the IOT module and the commodity are integrally formed), and therefore, the irremovable property of the IOT module and the commodity is ensured, and the counterfeiting behavior in a mode of removing the label on the genuine product can be effectively prevented, and compared with the traditional two-dimensional code anti-counterfeiting or RFID or NFC label anti-counterfeiting technology, the reliability is higher. Because the IOT module is deeply bound to the commodity and has no physical interface, any intermediate attack (such as VT HOOK CPUID) is not possible. Meanwhile, the embedded IOT module is a special real-time operating system, and data and programs can be stored in an encrypted mode, so that the IOT module cannot be cracked on the premise that the physical structure of the commodity is not damaged.
It should be noted that in the embodiment of the present application, the IOT module may be triggered by setting a monitoring sensor at the open position of the commodity, or may be triggered by other means.
For example, a trigger switch may be connected to the IOT module, and the user may implement triggering of the IOT module through the trigger switch. It should be understood that the monitoring sensor set at the opening position of the commodity can be considered as a trigger switch, and besides, the trigger switch can be implemented by other structures, for example, by setting a trigger button beside the IOT module.
The triggering of the IOT module may be implemented by a client of the user, for example, the user may scan a two-dimensional code, and the triggering of the IOT module may be implemented by accessing a background server (e.g., an authentication platform); or the IOT module can be accessed through a Bluetooth or WiFi near field communication module, and triggering of the IOT module is realized.
In the embodiment of the application, the communication between the IOT module and the authentication platform can be encrypted so as to improve the security of data transmission. The IOT chip is provided with a hardware encryption engine, and can be assisted with a complex software encryption algorithm, so that data sent to the authentication platform by the IOT module can be strongly encrypted, the security of the whole anti-counterfeiting process is improved, and the security of the communication process is higher than the level of a U shield for banks.
In addition, in the embodiment of the application, a sending rule can be preset, so that the IOT module automatically sends the tracing information to a preset management platform, and the management platform can correlate the tracing information with the commodity to facilitate tracing.
For example, the interval duration (timing or random duration, determined by the manufacturer of the commodity) may be preset, so that the IOT module automatically sends the traceability information to the management platform according to the interval duration.
It should be appreciated that IOT chips themselves typically support positioning functions. Therefore, in the embodiment of the application, the positioning information containing the IOT module in the traceability information can be set, so that the traceability can conveniently obtain the moving track of the commodity, the commodity position can be conveniently positioned, and the commodity is prevented from being lost. In order to facilitate the realization of the association record of the traceability information and the commodity, the traceability information can also contain the unique ID of the IOT chip. So that the merchandise may be identified by a unique ID.
It should be noted that if the power supply is allowed (for example, the object volume is relatively large, and a power supply can be set), the three-mode integrated positioning module of BDS (BeiDou Navigation SATELLITE SYSTEM, china Beidou satellite navigation system)/GPS (Global Positioning System )/GLONAS (GLOBAL NAVIGATION SATELLITE SYSTEM, global satellite navigation system) can be integrated in the IOT module for positioning enhancement, so that real-time tracking of commodities is facilitated.
In addition, in the embodiment of the application, because the information storage space of the LPWAN IOT chip is far larger than that of a small chip such as RFID, NFC, BT, various information (such as commodity numbers, manufacturer information, production serial numbers and the like) of industrial process manufacturing and commercial circulation can be stored in the IOT chip as tracing information, so that tracing inquiry is facilitated.
It should be noted that, in the embodiment of the present application, the management platform and the authentication platform may be the same platform.
When the management platform and the authentication platform can be the same platform, the IOT module can set a first identifier for performing anti-counterfeit authentication by the characterization in the first authentication information when sending the first authentication information to the authentication platform, and can set a second identifier for reporting the characterization by the tracing information when sending the tracing information to the authentication platform, so that the authentication platform can perform corresponding operation.
In the embodiment of the application, the authentication platform can be realized by adopting a cloud platform, and the processing performance of the authentication platform is improved by processing the data on the cloud platform. Of course, the authentication platform in the embodiment of the present application may also be implemented by using a conventional background server.
It should be understood that the IOT module and the management platform may independently form a traceability system, which may be implemented independently of the anti-counterfeit system, and only implement the traceability function. The structural implementation process is as above and will not be described in detail herein.
It should be noted that in the embodiment of the present application, an anti-counterfeit commodity is further provided, as shown in fig. 3, where the anti-counterfeit commodity may have a housing, and an IOT module may be fixed in the housing.
It should be understood that in the foregoing anti-counterfeiting system, all the components that can be disposed on the commodity can be disposed on the casing of the anti-counterfeiting commodity provided in this embodiment, so that the anti-counterfeiting commodity has an anti-counterfeiting function. The specific anti-counterfeiting process can be referred to the description of the anti-counterfeiting process in the anti-counterfeiting system, and is not repeated here.
For example, referring to fig. 4, a warning device such as a warning lamp may be further disposed on the housing, and the warning device may be exposed and connected to the IOT module, so as to facilitate corresponding reminding according to the control logic of the IOT module.
Also for example, referring to fig. 2, a monitoring sensor may be further disposed at the opening position of the commodity, where the monitoring sensor is in communication with the IOT module, so that when the commodity is opened, trigger information is sent to the IOT module to trigger the IOT module.
Still further exemplary, the IOT module is further configured to send the tracing information to the authentication platform according to a preset sending rule, so that the authentication platform can record the tracing information in association with the commodity, thereby facilitating tracing.
It should be understood that the foregoing examples of the commodity are only some of the possible examples mentioned in the embodiments of the present application, and it should not be understood that the structure of the anti-counterfeit commodity in the embodiments of the present application may only adopt the above-described structure. For example, the casing of the anti-counterfeiting commodity can be provided with a two-dimensional code, an RFID label, an NFC label or other structures.
It should be understood that in the practical application process, there may be a case where the commodity is used after a long period of storage. At this time, the IOT module may be depleted due to an excessive time. Therefore, in the embodiment of the application, the charging feed point of the IOT module can be exposed outside the commodity, thereby facilitating the reactivation of the power supply of the IOT module by the user. It should be understood that, because the power consumption of the IOT module is low, the IOT module can be activated effectively after the user is powered briefly; the mobile phone can also be activated immediately by USB power supply of the mobile phone.
In the scheme provided by the embodiment of the application, the IOT module can directly realize communication with the authentication platform through LPWAN technology, and has the advantages of low power requirement, low transmission power consumption, wide coverage range and the like. In the implementation process, the IOT module is fixed in the commodity, so that the active reporting of the authentication platform can be realized, and the active anti-counterfeiting is realized, compared with the traditional passive anti-counterfeiting mode that a user scans a two-dimensional code or reads RFID or NFC label information, the IOT module does not need to be accessed into a user terminal in the anti-counterfeiting process, and therefore the risk of middle layer attack can be reduced, and the reliability of the anti-counterfeiting verification process is improved. Meanwhile, as the IOT module technology is more complex, and the more complex the chip is, the higher the cracking difficulty is, so that the first identification information of the IOT module is less easy to crack. Compared with the two-dimensional code or RFID or NFC anti-counterfeiting technology, the anti-counterfeiting information has higher security and more reliable anti-counterfeiting performance.
In addition, the unique ID for anti-counterfeiting authentication can be the physical ID of the IOT chip, and the physical ID of the IOT chip is not rewritable and not changeable, so that the anti-counterfeiting reliability of the scheme of the application can be further improved.
Embodiment two:
The present embodiment provides an anti-counterfeiting method that can be matched with the authentication platform in the anti-counterfeiting system in the first embodiment, as shown in fig. 5, including:
S501: and receiving first identification information transmitted by the IOT module fixed in the commodity.
It should be appreciated that the IOT module in the commodity, upon triggering, sends the first authentication information to the authentication platform.
It should also be understood that the IOT module may be integrally integrated into the housing of the commodity, and the first authentication information transmitted from the IOT module includes the unique ID of the IOT chip.
In the embodiment of the application, the unique ID of the IOT module can adopt the physical ID of the IOT chip.
In the embodiment of the application, the monitoring sensor can be arranged at the opening position of the shell and is in communication connection with the IOT module. Therefore, when a user opens the commodity, the monitoring sensor can automatically trigger the IOT module, so that the IOT module sends first identification information to the identification platform.
S502: in a preset IOT module ID database, judging whether the unique ID which is not marked exists. If so, go to step S503; otherwise, go to step S505.
S503: the unique ID is marked.
S504: and feeding back a first message for identifying the commodity as true to a preset alarm device.
S505: and feeding back a second message for identifying the commodity as false to the preset alarm equipment.
It should be noted that, a two-dimensional code, an RFID tag or an NFC tag is provided in the commodity, a user may initially detect authenticity of the commodity through the client, and the authentication process may be shown in fig. 6, including:
S601: and the client reads the two-dimensional code or the RFID chip or the NFC chip on the commodity to obtain second identification information.
S602: the client side uploads the second authentication information to the authentication platform.
S603: the authentication platform judges the authenticity of the commodity according to the second authentication information.
S604: and feeding back the authentication result to the client.
It should be noted that, in a feasible implementation manner of the embodiment of the present application, a user may be required to connect an IOT module in a commodity with a client, and meanwhile, an association relationship between second authentication information and a unique ID is pre-stored in the authentication platform, so as to determine whether an object code separation condition exists based on the unique ID corresponding to the second authentication information. And in the absence of code separation, authentication is performed in the manner described above.
That is, the authentication platform may determine the unique ID corresponding to the second authentication information before determining the authenticity of the commodity according to the second authentication information, and send the connection status acquisition instruction to the IOT module corresponding to the unique ID. And the authentication platform receives the connection status information fed back by the IOT module corresponding to the unique ID, and when the connection status information indicates that the IOT module is connected to the client, the steps S603 and S604 are executed. If the connection state information is that the IOT module is not connected with the client, the client can be fed back with the separation of the object codes, and the user is prompted to risk counterfeit goods.
In a possible implementation manner of the embodiment of the present application, the authentication of the authenticity of the commodity may be implemented based on the unique ID corresponding to the second authentication information.
The authentication platform may determine the unique ID corresponding to the second authentication information, and further find the unique ID in a preset IOT module ID database, and determine whether the unique ID is marked in the IOT module ID database. If yes, sending a preset warning message to the client; if not, a message that the commodity is true is sent to the client, and the unique ID is not marked.
It should be noted that the process of implementing the anti-counterfeiting function by the anti-counterfeiting system in the first embodiment can be adopted in the anti-counterfeiting method provided by the embodiment of the present application, and will not be described herein.
It should be noted that, in order to ensure the security of the data transmission process, a complex software encryption algorithm may be used to encrypt the data in the interaction process. The IOT chip is provided with a hardware encryption engine, and can be assisted by a complex software encryption algorithm, so that the first authentication information is subjected to strong encryption and then transmitted to the authentication platform, and the security of the anti-counterfeiting process is improved.
In addition, based on the same application conception, the embodiment of the application also provides an anti-counterfeiting device. Referring to fig. 7, fig. 7 shows a security device 100 corresponding to the aforementioned security method. It should be appreciated that the specific functions of the anti-counterfeiting device 100 may be found in the above description, and detailed descriptions are omitted herein as appropriate to avoid repetition. The security device 100 includes at least one software functional module that can be stored in memory in the form of software or firmware or cured in the operating system of the security device 100. Specifically:
referring to fig. 7, the anti-counterfeiting device 100 includes: a receiving module 101, a judging module 102 and a processing module 103. Wherein:
The receiving module 101 is configured to receive first authentication information sent from an IOT module fixed in a commodity; the first identification information contains an unalterable unique ID cured in the IOT chip;
a judging module 102, configured to judge whether an untagged unique ID exists in a preset IOT module ID database;
The processing module 103 is configured to mark a unique ID if the unique ID exists, and feed back a first message identifying that the commodity is true to a preset alarm device; if the commodity is not found, a second message for identifying the commodity as false is fed back to the preset alarm equipment.
In the embodiment of the application, the unique ID is the physical ID of the IOT chip which is physically solidified in the IOT chip during production.
In the embodiment of the present application, the receiving module 101 is further configured to receive second authentication information sent by the client; the second identification information is read from a two-dimensional code or an RFID chip or an NFC chip arranged on the commodity by the client; the judging module 102 is further configured to judge whether the commodity is genuine or not according to the second authentication information; the processing module 103 is further configured to feed back the authentication result to the client.
In a possible implementation manner of the embodiment of the present application, the association relationship between the second authentication information and the unique ID is pre-stored in the authentication platform. The processing module 103 is further configured to determine a unique ID corresponding to the second authentication information before the judging module 102 judges the authenticity of the commodity according to the second authentication information, and send a connection status acquisition instruction to the IOT module corresponding to the unique ID. The receiving module 101 is further configured to receive connection status information fed back by the IOT module corresponding to the unique ID. The judging module 102 is further configured to determine that the connection status information is that the IOT module is connected to the client.
In the above possible implementation manner, the processing module 103 is further configured to feed back the object code separation to the client when the connection status information is that the IOT module is not connected to the client.
In the above possible implementation manner, the judging module 102 is specifically configured to determine the unique ID corresponding to the second authentication information; searching a unique ID in a preset IOT module ID database; it is determined whether the unique ID has been marked in the IOT module ID database. The processing module 103 is specifically configured to send a preset alert message to the client when the client has been marked, and send a message to the client that the commodity is true when the client has not been marked, and not mark the unique ID.
It should be understood that, for simplicity of description, some of the foregoing descriptions of the method introduction are not repeated here.
This embodiment also provides an authentication platform, see fig. 8, comprising a processor 801, a memory 802 and a communication bus 803. Wherein:
The communication bus 803 is used to enable connected communication between the processor 801 and the memory 802.
The processor 801 is configured to execute one or more programs stored in the memory 802 to implement the anti-counterfeiting method described above.
It will be appreciated that the configuration shown in fig. 8 is merely illustrative, and that the authentication platform may also include more or fewer components than those shown in fig. 8, or may have a different configuration than that shown in fig. 8, for example, may also have data input/output interfaces and the like. Further, the authentication platform in fig. 8 may be an electronic device such as a server.
The present embodiment also provides a readable storage medium, such as a floppy disk, an optical disk, a hard disk, a flash memory, a usb disk, an SD (Secure Digital Memory Card, secure digital Card) Card, an MMC (Multimedia Card) Card, or the like, in which one or more programs implementing the above steps are stored, and the one or more programs may be executed by one or more processors to implement the above anti-counterfeit method. And will not be described in detail herein.
Embodiment III:
in this embodiment, the scheme of the present application will be described by taking an anti-counterfeiting system applied to alcoholic beverages as an example.
When a merchant produces white wine, an NB-IOT chip is configured for each bottle of wine, a wine manufacturer customizes a batch of NB-IOT chips with unique physical ID numbers to the NB-IOT chip manufacturer, and the physical ID numbers of the batch of NB-IOT chips are imported into an ID database of the authentication cloud (namely an authentication platform) by software. Meanwhile, all information of industrial process manufacturing and commercial circulation is used as basic traceability information to be written into the NB-IOT chip for storage, and the NB-IOT chip is set to automatically feed back the traceability information to the authentication cloud at intervals of preset time. The tracing information comprises the basic tracing information and the current position information.
The NB-IOT chip is seamlessly embedded into the wine bottle through an integrated molding technology, and a monitoring sensor is arranged at the opening position of the wine bottle and is in communication connection with the NB-IOT chip.
Meanwhile, a warning lamp is arranged beside the NB-IOT chip and connected with the NB-IOT chip, and different displays are controlled by the NB-IOT chip.
Meanwhile, a two-dimensional code is attached to each wine bottle, and second identification information is recorded in the two-dimensional code.
And recording the unique ID of each NB-IOT chip in the authentication cloud, and recording the corresponding relation between the second authentication information and the unique ID.
When selling goods, the user can scan the two-dimensional code through the client and send the second authentication information to the authentication cloud. Meanwhile, the client can be connected with the NB-IOT chip in the commodity, so that connection is established with the NB-IOT chip.
The authentication cloud can search and obtain a corresponding unique ID according to the second authentication information, and send a connection state acquisition instruction to the NB-IOT chip corresponding to the unique ID, so that connection state information reported by the NB-IOT chip is acquired.
In the embodiment of the application, the NB-IOT chip can also report the position information of the NB-IOT chip, so that the authentication cloud is convenient for tracking the commodity position.
Considering that the user is buying goods, there may be many similar goods. Therefore, the unique ID of each NB-IOT chip and the name of the local wireless module of the NB-IOT chip can be recorded in the authentication cloud in advance, so that when second authentication information transmitted by a user is received, the name of the corresponding local wireless module of the NB-IOT chip is found out according to the second authentication information and returned to the client side, and the client side can be connected.
When the received connection state information is that the NB-IOT chip is connected with the client, the authentication cloud can detect whether the unique ID is marked, when the unique ID is marked, the authentication cloud feeds back a false commodity message to the client, and when the unique ID is not marked, the authentication cloud feeds back a true commodity message to the client. And when the received connection state information of the authentication cloud is that the NB-IOT chip is not connected with the client, the authentication cloud can feed back the separation of the object codes to the client, and the risk that the commodity is a counterfeit commodity is prompted.
After a user purchases goods, when the wine bottle is opened for the first time, the monitoring sensor senses that the wine bottle is opened, trigger information is sent to the NB-IOT chip, and the NB-IOT chip sends first identification information carrying the unique ID to the authentication cloud.
The authentication cloud determines whether the unique ID exists in a preset ID database. If the unique ID exists, marking the unique ID, and feeding back a first message to the NB-IOT chip, wherein the NB-IOT chip controls the warning lamp to emit green light; if the alarm lamp does not exist, the second message is fed back to the NB-IOT chip, and the NB-IOT chip controls the alarm lamp to emit flashing red light.
It should be noted that in the embodiment of the present application, the authentication process triggered by the NB-IOT chip is the final authentication, and has the highest authentication efficacy.
In addition, after the commodity leaves the factory, the NB-IOT chip automatically feeds back basic traceability information, current position information and physical ID numbers of the NB-IOT chip to the authentication cloud every preset time. And the authentication cloud determines the corresponding commodity according to the basic traceability information, and correspondingly records the current position information and the basic traceability information of the commodity.
The user can check the basic tracing information, the historical moving track and the like of the corresponding commodity by logging in the authentication cloud, so that tracing and commodity positioning are realized.
By adopting the scheme provided by the embodiment of the application, the first identification information is not easy to crack, and unless the NB-IOT chip is completely reversed, a fake bottle is possibly manufactured, the fake cost is very high, and the cracking difficulty coefficient is high. And because the physical ID number of the NB-IOT chip cannot be modified, the only possibility is that the NB-IOT chip manufacturer clones the ID number to reproduce the NB-IOT chip, but the NB-IOT chip is required to be matched with the NB-IOT chip manufacturer under high legal risks and commercial risks, and the NB-IOT chip is basically impossible in practical application.
Meanwhile, the NB-IOT chip and the shell are integrally formed, equipment cannot be accessed from the middle, and middle layer attack cannot be performed. Wireless over-the-air attacks require extremely specialized institutions and advanced hacking specialists and are not necessarily capable of 100% hacking. And by-channel attack, corresponding physical conditions and a system-level comprehensive encryption means are needed, so that the air cracking is difficult. Therefore, the scheme of the application has high safety.
Meanwhile, the physical characteristics of the commodity shell (generally ceramic, silicon wafer, crystal and metal shell) are determined, and the commodity shell can be seen at a glance after being damaged. By using the physical property and the LPWAN assisted wide area wireless autonomous emission technology, circulation articles in daily life can be protected in a great range. All built-in objects with sealing technology can be protected by the NB-IOT chip in the embodiment of the application, and the technology of the embodiment of the application has rich application scenes, and can be widely applied to various scenes of folk life such as intelligent door locks (such as safes), water and gas meters, industrial meters, intelligent watches, commercial circulation (such as commodities with box structures), environmental protection, water conservancy, agriculture and forestry, chemical medicine, food and medicine, traffic and the like.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. The above-described apparatus embodiments are merely illustrative, for example, the division of the units is merely a logical function division, and there may be other manners of division in actual implementation, and for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed.
Further, the units described as separate units may or may not be physically separate, and units displayed as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
Furthermore, functional modules in various embodiments of the present application may be integrated together to form a single portion, or each module may exist alone, or two or more modules may be integrated to form a single portion.
In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
Herein, a plurality refers to two or more.
The above description is only an example of the present application and is not intended to limit the scope of the present application, and various modifications and variations will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (20)

1. An anti-counterfeiting system, comprising: IOT module and authentication platform;
The IOT module is fixed in the commodity and sends first identification information containing unique ID to the identification platform when triggered; the unique ID is an unalterable unique identifier solidified in the IOT module;
The authentication platform is in communication connection with the IOT module and is used for judging whether the unique ID which is not marked exists locally or not when receiving first authentication information which is transmitted by the IOT module and contains the unique ID; if the commodity is true, marking the unique ID, and feeding back a first message for identifying the commodity to a preset alarm device so that the alarm device prompts the commodity to be true; if the commodity is not false, feeding back a second message for identifying the commodity to preset alarm equipment so that the alarm equipment prompts that the commodity is false;
The anti-counterfeiting system further comprises:
The monitoring sensor is arranged at the opening position of the commodity and is in communication connection with the IOT module, and is used for sending trigger information to the IOT module when the commodity is opened so as to trigger the IOT module;
the alarm device comprises a client which is pre-associated with the unique ID;
a local wireless connection module is integrated in the IOT module; the local wireless connection module is used for being connected with the client; the association relation between the second identification information and the unique ID is prestored in the identification platform;
the authentication platform is further used for determining a unique ID corresponding to the second authentication information when receiving the second authentication information transmitted by the client, and transmitting a connection state acquisition instruction to the IOT module corresponding to the unique ID;
the IOT module is further used for feeding back the connection state with the client to the authentication platform according to the connection state acquisition instruction;
The authentication platform is used for judging whether the commodity is true or false according to the second authentication information when the local wireless connection module of the IOT module is connected with the client; and when the local wireless connection module of the IOT module is not connected with the client, feeding back the object code separation to the client.
2. The anti-counterfeiting system according to claim 1, wherein the unique ID is a physical ID within an IOT chip of the IOT module that is physically cured at the time of production in the IOT module.
3. The anti-counterfeiting system according to claim 1, wherein the alarm device comprises the IOT module and an alarm lamp connected to the IOT module;
the authentication platform feeds back the first message or the second message to the IOT module;
The IOT module is further used for controlling the warning lamp to display according to a preset first display mode when the first message is received; and when the second message is received, controlling the warning lamp to display according to a preset second display mode.
4. The anti-counterfeiting system according to claim 1, wherein the commodity is provided with a two-dimensional code or an RFID tag or an NFC tag;
The two-dimensional code or the RFID tag or the NFC tag can be read by a client so that the client can acquire second identification information and transmit the second identification information to the identification platform;
the authentication platform is also used for judging the authenticity of the commodity according to the second authentication information when receiving the second authentication information transmitted by the client, and feeding back an authentication result to the client.
5. The anti-counterfeiting system according to any one of claims 1 to 4, wherein the IOT module is integrally formed with the commodity.
6. The anti-counterfeiting system according to any one of claims 1 to 4, wherein the IOT module is further configured to send traceability information to the authentication platform according to a preset sending rule;
The identification platform is also used for associating the tracing information with the commodity so as to facilitate tracing.
7. The anti-counterfeiting system according to claim 6, wherein the traceability information comprises: positioning information of the IOT module, and the unique ID.
8. A traceability system, comprising: IOT module and management platform;
the IOT module is fixed in the commodity and is used for sending the traceability information to the management platform according to a preset sending rule;
the management platform is in communication connection with the IOT module and is used for recording the tracing information and the commodity in association when the tracing information is received so as to trace the source;
The traceability system further comprises:
The monitoring sensor is arranged at the opening position of the commodity and is in communication connection with the IOT module and used for sending trigger information to the IOT module when the commodity is opened so as to trigger the IOT module.
9. The tracing system of claim 8, wherein said tracing information comprises: positioning information of the IOT module and a unique ID of the IOT module;
The unique ID is a physical ID in an IOT chip of the IOT module, which is physically solidified during production of the IOT module.
10. An anti-counterfeiting article, comprising:
A housing for the commodity;
The IOT module is fixed in the shell; the IOT module is used for sending first identification information containing unique ID to the identification platform when triggered so as to enable the identification platform to identify the authenticity of the commodity;
The unique ID is an unalterable unique identifier solidified in an IOT chip of the IOT module;
The anti-counterfeiting commodity further comprises:
The monitoring sensor is arranged at the opening position of the commodity and is in communication connection with the IOT module, and is used for sending trigger information to the IOT module when the commodity is opened so as to trigger the IOT module;
The authentication platform is in communication connection with the IOT module and is used for judging whether the unique ID which is not marked exists locally or not when receiving first authentication information which is transmitted by the IOT module and contains the unique ID; if the commodity is true, marking the unique ID, and feeding back a first message for identifying the commodity to a preset alarm device so that the alarm device prompts the commodity to be true; if the commodity is not false, feeding back a second message for identifying the commodity to preset alarm equipment so that the alarm equipment prompts that the commodity is false;
the alarm device comprises a client which is pre-associated with the unique ID;
a local wireless connection module is integrated in the IOT module; the local wireless connection module is used for being connected with the client; the association relation between the second identification information and the unique ID is prestored in the identification platform;
the authentication platform is further used for determining a unique ID corresponding to the second authentication information when receiving the second authentication information transmitted by the client, and transmitting a connection state acquisition instruction to the IOT module corresponding to the unique ID;
the IOT module is further used for feeding back the connection state with the client to the authentication platform according to the connection state acquisition instruction;
The authentication platform is used for judging whether the commodity is true or false according to the second authentication information when the local wireless connection module of the IOT module is connected with the client; and when the local wireless connection module of the IOT module is not connected with the client, feeding back the object code separation to the client.
11. The anti-counterfeit article of claim 10, wherein said unique ID is a physical ID within said IOT chip that is physically cured upon production of said IOT module.
12. The anti-counterfeit article of claim 10, wherein said IOT module is a module built from IOT chips of any of versions 2G to 6G.
13. The anti-counterfeit article of any one of claims 10-12, wherein said anti-counterfeit article further comprises:
the warning lamp is arranged outside the shell and connected with the IOT module, so that the warning lamp is displayed in different display modes under the control of the IOT module.
14. The anti-counterfeiting article according to any one of claims 10 to 12, wherein the IOT module is further configured to send traceability information to the authentication platform according to a preset sending rule, so that the authentication platform can record the traceability information in association with the article, thereby facilitating traceability.
15. An anti-counterfeiting method, applied to an authentication platform, comprising:
Receiving first identification information transmitted by an IOT module fixed in the commodity; the first identification information contains an unalterable unique ID solidified in an IOT chip of the IOT module, and a monitoring sensor which is arranged at the opening position of the commodity shell and is in communication connection with the IOT module triggers the IOT module to send when a user opens the commodity;
Judging whether the unique ID which is not marked exists in a preset IOT module ID database;
if the commodity identification information exists, marking the unique ID, and feeding back a first message for identifying the commodity as true to preset alarm equipment;
If the commodity is not found, feeding back a second message for identifying the commodity as false to preset alarm equipment;
the method further comprises the steps of:
Receiving second identification information transmitted by the client; the second identification information is read from a two-dimensional code or an RFID tag or an NFC tag arranged on the commodity by the client;
Judging the authenticity of the commodity according to the second identification information, and feeding back an identification result to the client;
The association relation between the second identification information and the unique ID is prestored in the identification platform;
before determining the authenticity of the commodity according to the second authentication information, the method further comprises:
Determining a unique ID corresponding to the second authentication information;
Sending a connection state acquisition instruction to the IOT module corresponding to the unique ID;
receiving connection state information fed back by the IOT module corresponding to the unique ID;
and determining the connection state information to be that the IOT module is connected with the client.
16. The anti-counterfeiting method according to claim 15, wherein the method further comprises:
and when the connection state information is that the IOT module is not connected with the client, feeding back the object code separation to the client.
17. The anti-counterfeiting method according to claim 15, wherein the association relationship between the second authentication information and the unique ID is pre-stored in the authentication platform;
Judging the authenticity of the commodity according to the second identification information, and feeding back an identification result to the client, wherein the method comprises the following steps:
Determining a unique ID corresponding to the second authentication information;
searching the unique ID in a preset IOT module ID database;
Judging whether the unique ID is marked in the IOT module ID database;
If yes, sending a preset warning message to the client;
if not, sending a message that the commodity is true to the client, and not marking the unique ID.
18. An anti-counterfeiting device for use in an authentication platform, comprising: the device comprises a receiving module, a judging module and a processing module;
The receiving module is used for receiving first identification information transmitted by the IOT module fixed in the commodity; the first identification information contains an unalterable unique ID solidified in an IOT chip of the IOT module, and a monitoring sensor which is arranged at the opening position of the commodity shell and is in communication connection with the IOT module triggers the IOT module to send when a user opens the commodity;
the judging module is used for judging whether the unique ID which is not marked exists in a preset IOT module ID database;
the processing module is used for marking the unique ID if the unique ID exists and feeding back a first message for identifying the commodity as true to preset alarm equipment; if the commodity is not found, feeding back a second message for identifying the commodity as false to preset alarm equipment;
The receiving module is also used for receiving second identification information transmitted by the client; the second identification information is read from a two-dimensional code or an RFID tag or an NFC tag arranged on the commodity by the client; judging the authenticity of the commodity according to the second identification information, and feeding back an identification result to the client;
The association relation between the second identification information and the unique ID is prestored in the identification platform;
The processing module is further configured to determine a unique ID corresponding to the second authentication information before the judging module judges the authenticity of the commodity according to the second authentication information; sending a connection state acquisition instruction to the IOT module corresponding to the unique ID; receiving connection state information fed back by the IOT module corresponding to the unique ID; and determining the connection state information to be that the IOT module is connected with the client.
19. An authentication platform, comprising a processor, a memory and a communication bus;
the communication bus is used for realizing connection communication between the processor and the memory;
The processor is configured to execute one or more programs stored in the memory to implement the anti-counterfeiting method according to any one of claims 15 to 17.
20. A readable storage medium storing one or more programs executable by one or more processors to implement the anti-counterfeiting method according to any one of claims 15 to 17.
CN202010428993.8A 2020-05-19 2020-05-19 Anti-counterfeiting tracing and positioning system, commodity, method, device, platform and medium Active CN111582890B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010428993.8A CN111582890B (en) 2020-05-19 2020-05-19 Anti-counterfeiting tracing and positioning system, commodity, method, device, platform and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010428993.8A CN111582890B (en) 2020-05-19 2020-05-19 Anti-counterfeiting tracing and positioning system, commodity, method, device, platform and medium

Publications (2)

Publication Number Publication Date
CN111582890A CN111582890A (en) 2020-08-25
CN111582890B true CN111582890B (en) 2024-05-10

Family

ID=72110989

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010428993.8A Active CN111582890B (en) 2020-05-19 2020-05-19 Anti-counterfeiting tracing and positioning system, commodity, method, device, platform and medium

Country Status (1)

Country Link
CN (1) CN111582890B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156762A (en) * 2014-09-02 2014-11-19 云南中科物联网科技有限公司 Cigarette fake preventing and source tracing method and system based on Internet of Things
CN109769015A (en) * 2018-12-21 2019-05-17 深圳市广和通无线股份有限公司 Anti-fake component, system, method and computer readable storage medium
CN110033286A (en) * 2019-04-09 2019-07-19 安谋科技(中国)有限公司 Product false proof verification method, device, readable medium, system and equipment
KR102025912B1 (en) * 2018-10-22 2019-09-26 (주)아이투맥스 Code and detector to recognize code and detecting method using the same
CN110533433A (en) * 2019-08-22 2019-12-03 润建股份有限公司 A kind of method for anti-counterfeit and false proof device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156762A (en) * 2014-09-02 2014-11-19 云南中科物联网科技有限公司 Cigarette fake preventing and source tracing method and system based on Internet of Things
KR102025912B1 (en) * 2018-10-22 2019-09-26 (주)아이투맥스 Code and detector to recognize code and detecting method using the same
CN109769015A (en) * 2018-12-21 2019-05-17 深圳市广和通无线股份有限公司 Anti-fake component, system, method and computer readable storage medium
CN110033286A (en) * 2019-04-09 2019-07-19 安谋科技(中国)有限公司 Product false proof verification method, device, readable medium, system and equipment
CN110533433A (en) * 2019-08-22 2019-12-03 润建股份有限公司 A kind of method for anti-counterfeit and false proof device

Also Published As

Publication number Publication date
CN111582890A (en) 2020-08-25

Similar Documents

Publication Publication Date Title
US20200364817A1 (en) Machine type communication system or device for recording supply chain information on a distributed ledger in a peer to peer network
US11281875B2 (en) Authentication systems and methods
US10032173B2 (en) Electronic anti-counterfeiting system and electronic anti-counterfeiting method thereof
US10204347B2 (en) Authenticity control system
US20170032382A1 (en) System and Method for Product Authentication
US20180108024A1 (en) Open registry for provenance and tracking of goods in the supply chain
US20180032759A1 (en) Open registry for human identification
US20180019872A1 (en) Open registry for internet of things including sealed materials
CN102930441B (en) Based on the Wine anti-counterfeit system of RFID and RFID label tag and rfid interrogator authentication method
US20140014714A1 (en) Product authentication and registration
WO2018075403A1 (en) Open registry for provenance and tracking of goods in the supply chain
CN113129029A (en) Wine anti-counterfeiting traceability system based on block chain and RFID
CN104217344B (en) Tag marker and commodity track of the whole process RFID label tag system
US20120179517A1 (en) Product authentication devices and associated methods
CN202383750U (en) Near field communication (NFC) mobile phone and radio frequency identification (RFID) combination type anti-counterfeiting system
WO2018067974A1 (en) Open registry for human identification
CN102208043A (en) Wine anti-counterfeiting identification method based on electronic tag and product information association processing
CN113947414A (en) Commodity traceability anti-counterfeiting system based on NFC and block chain
CN107161515A (en) A kind of bottle cap anti-fake method based on technology of Internet of things and the anti-fake bottle lid using this method
US20120179614A1 (en) Systems and methods for product authentication
CN106335704A (en) Intelligent packaging box supporting online payment and realization method for intelligent packaging box
CN206961156U (en) The retrospect of jewelry identity monitors material evidence integrally false proof external member
CN111582890B (en) Anti-counterfeiting tracing and positioning system, commodity, method, device, platform and medium
US20130282601A1 (en) Counterfeit products detection methods and system
US20220391884A1 (en) Method and System for Transferring a Product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant