CN112541773A - Anti-counterfeiting method and client system - Google Patents

Anti-counterfeiting method and client system Download PDF

Info

Publication number
CN112541773A
CN112541773A CN202011447647.0A CN202011447647A CN112541773A CN 112541773 A CN112541773 A CN 112541773A CN 202011447647 A CN202011447647 A CN 202011447647A CN 112541773 A CN112541773 A CN 112541773A
Authority
CN
China
Prior art keywords
information
product
unique identifier
authentication
authentication information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011447647.0A
Other languages
Chinese (zh)
Inventor
曹洁
李晨辰
李聪聪
王子威
韩小军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Refinepay Technology Co ltd
Original Assignee
Refinepay Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Refinepay Technology Co ltd filed Critical Refinepay Technology Co ltd
Priority to CN202011447647.0A priority Critical patent/CN112541773A/en
Publication of CN112541773A publication Critical patent/CN112541773A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Abstract

The application discloses an anti-counterfeiting method and a client system, which are used for receiving a unique identifier of a product and corresponding authentication information, and reading information carried on a first information carrying medium by electronic equipment to acquire and send the unique identifier and the authentication information. And sending first prompt information under the condition that the authentication information passes the authentication, wherein the first prompt information comprises the time when the authentication information corresponding to the unique identifier is authenticated for the first time. Because the first prompt information comprises the time when the authentication information corresponding to the unique identifier is authenticated for the first time, and the unique identifier and the authentication information are acquired and sent by the electronic equipment reading the information carried on the first information carrying medium, the authentication information can not be authenticated before the product is not used, and therefore, whether the first information carrying medium is counterfeit or not and the authenticity of the product can be effectively sensed based on the first prompt information.

Description

Anti-counterfeiting method and client system
Technical Field
The application relates to the technical field of anti-counterfeiting, in particular to an anti-counterfeiting method and a client system.
Background
At present, in order to prove the production process of a product and the authenticity of the product to a user, a manufacturer attaches a product label (such as a two-dimensional code, a bar code and the like) to the product, loads necessary product information into the product label, and can scan the code through a mobile phone, inquire the product information of the product and inquire the authenticity of the product.
However, the use of product labels such as two-dimensional codes and bar codes also causes some security problems, for example, a lawless person may duplicate and recycle the product labels on the discarded product packages to re-attach the product labels to counterfeit packages, thereby leading to a large amount of counterfeit products coming into the market. At present, a buyer is unaware of the counterfeit and utilization condition of a product label, so that a plurality of counterfeit and shoddy products become true goods with proper names and languages, and the benefits of the buyer and a legal merchant are greatly infringed.
Disclosure of Invention
The application provides an anti-counterfeiting method and a client system, and aims to assist buyers in perceiving the truth of products and product labels and prevent the product labels from being counterfeited and utilized.
In order to achieve the above object, the present application provides the following technical solutions:
an anti-counterfeiting method is applied to a server and comprises the following steps:
receiving a unique identifier of a product and corresponding authentication information, wherein the unique identifier and the authentication information are acquired and sent by reading information carried on a first information carrying medium by electronic equipment; the first information bearing medium is arranged at a preset position of the product, and the preset position is invisible before the product is used for the first time; or, the first information bearing medium cannot externally send the unique identifier and the authentication information before the product is used for the first time;
and sending first prompt information under the condition that the authentication information passes the authentication, wherein the first prompt information comprises the time when the authentication information corresponding to the unique identifier is authenticated for the first time.
Optionally, the first prompt message further includes:
prompt information indicating that the product is true, and at least one of state information, production information and circulation information of the product.
Optionally, the method further includes:
and sending prompt information indicating that the product is false under the condition that the authentication information fails.
Optionally, the method further includes:
receiving a unique identifier of the product, wherein the unique identifier is obtained by reading information carried on a second information carrying medium by electronic equipment and is sent; the second information bearing medium can send the unique identification visually or externally before the product is used for the first time;
sending a second prompt message under the condition that the first prompt message is not sent, wherein the second prompt message comprises a prompt message indicating that the product is not used;
and under the condition that the first prompt message is sent, sending the first prompt message again.
Optionally, the second prompt message further includes:
at least one item of state information, production information and circulation information of the product.
Optionally, in a case that the authentication information passes the authentication, sending a first prompt message includes:
if the unique identifier is received within a preset time range before the unique identifier and the authentication information are received, sending first prompt information under the condition that the authentication information passes;
the method further comprises the following steps:
and if other identifiers are received within a preset time range before the unique identifier and the authentication information are received, sending prompt information indicating that the identifiers are not matched.
A client system, comprising:
a first information bearing medium;
the first information bearing medium bears the unique identification and the authentication information of the product;
the first information bearing medium is arranged at a preset position of the product, and the preset position is invisible before the product is used for the first time; or, the first information bearing medium cannot externally send the unique identifier and the authentication information before the product is used for the first time.
Optionally, the method further includes:
and the second information bearing medium is used for visually or externally sending the unique identifier before the product is used for the first time.
Optionally, the method further includes: the client device is used for realizing the anti-counterfeiting method.
An anti-counterfeiting device comprising: a processor, a memory, and a bus; the processor and the memory are connected through the bus;
the memory is used for storing a program, and the processor is used for executing the program, wherein the anti-counterfeiting method is executed when the program is executed.
A computer-readable storage medium comprising a stored program, wherein the program performs the anti-counterfeiting method.
According to the technical scheme, the unique identification and the corresponding authentication information of the product are received, and the unique identification and the authentication information are acquired and sent by the electronic equipment reading the information carried on the first information carrying medium. The first information bearing medium is arranged at a preset position of the product, the preset position is invisible before the product is used for the first time, or the first information bearing medium cannot send unique identification and authentication information to the outside before the product is used for the first time. And sending first prompt information under the condition that the authentication information passes the authentication, wherein the first prompt information comprises the time when the authentication information corresponding to the unique identifier is authenticated for the first time. Because the first prompt message includes the time when the authentication information corresponding to the unique identifier is authenticated for the first time, and the unique identifier and the authentication information are acquired and sent by the electronic device reading the information carried on the first information carrying medium, the authentication information is not authenticated before the product is not used, therefore, based on the first prompt message, whether the first information carrying medium is counterfeit or not can be effectively sensed (in general, if the first information carrying medium is counterfeit, the time when the authentication information corresponding to the unique identifier indicated by the first prompt message is authenticated for the first time is not consistent with the time when the user reads the information carried on the first information carrying medium by the electronic device for the first time), and the authenticity of the product.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic diagram of a product structure provided in an embodiment of the present application;
fig. 2 is a schematic diagram of an anti-counterfeiting method according to an embodiment of the present disclosure;
FIG. 3 is a schematic diagram of another anti-counterfeiting method provided in an embodiment of the present application;
FIG. 4 is a schematic diagram of another product configuration provided by embodiments of the present application;
FIG. 5 is a schematic diagram of another anti-counterfeiting method provided in an embodiment of the present application;
FIG. 6a is a schematic view of another anti-counterfeit method according to an embodiment of the present disclosure;
FIG. 6b is a schematic diagram of another anti-counterfeit method according to an embodiment of the present disclosure;
FIG. 7 is a schematic view of another anti-counterfeiting method provided in an embodiment of the present application;
fig. 8 is a schematic structural diagram of a client system according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a schematic diagram of a product structure according to an embodiment of the present disclosure.
Specifically, a preset first information bearing medium is arranged at a preset position of a product, and the preset position is invisible before the product is used for the first time, or the first information bearing medium cannot send a unique identifier and authentication information to the outside before the product is used for the first time. In embodiments of the present application, the first information bearing medium includes, but is not limited to, a two-dimensional code (including the two-dimensional code itself and an object bearing the two-dimensional code, such as the inner surface of the package in fig. 1), a barcode (including the barcode itself and the object bearing the barcode), or a radio frequency tag.
It should be noted that, if the first information-bearing medium is a two-dimensional code or a barcode, the preset position includes, but is not limited to, inside the product package (for example, a barcode paper in the package box can be found only by opening the package box of the mobile phone), or inside the product (for example, a two-dimensional code on the inner side of the bottle cap can be found only by opening the bottle cap of the wine bottle). If the first information bearing medium is a radio frequency tag, based on the characteristics of the radio frequency tag (that is, the data sent by the radio frequency tag can be read when the radio frequency device is within the preset range of the radio frequency tag), the radio frequency tag cannot send the unique identifier and the authentication information to the outside before the product is used for the first time (for example, after the power supply of the toy needs to be turned on, the radio frequency tag on the toy can be triggered to send the unique identifier and the authentication information to the outside).
The embodiment of the application correspondingly provides an anti-counterfeiting method for a product provided with a first information bearing medium, and specifically, the anti-counterfeiting method can be executed by a server and is used for assisting a buyer to sense the authenticity of a product label (namely the first information bearing medium) and the product and preventing the first information bearing medium from being counterfeited and utilized.
It should be noted that the anti-counterfeiting method provided by the embodiment of the present application is applied to an anti-counterfeiting system, and specifically, can be deployed and executed by a server.
As shown in fig. 2, a schematic diagram of an anti-counterfeiting method provided in an embodiment of the present application includes the following steps:
s201: and receiving the unique identification of the product and the corresponding authentication information.
The unique identification and the authentication information are acquired and sent by the electronic equipment reading the information carried on the first information carrying medium. In this implementation, the electronic device includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, or a radio frequency device. If the first information bearing medium is a two-dimensional code or a bar code, the user can scan the two-dimensional code or the bar code through a camera device arranged on the mobile phone or the tablet computer to obtain the unique identifier and the corresponding authentication information, trigger the mobile phone or the tablet computer, and send the unique identifier and the authentication information to the server through the network.
S202: and sending the first prompt message when the authentication information passes the authentication.
The first prompt information comprises time when the authentication information corresponding to the unique identifier is authenticated for the first time, prompt information indicating that the product is true, and at least one of state information, production information and circulation information of the product. In this embodiment, the time when the authentication information is first authenticated includes but is not limited to: the time at which the product is first used, or the product is first opened.
It should be noted that the product status information is used to indicate that the product is within the shelf life. Production information for a product includes, but is not limited to: the product name, the manufacturer name, the production date, the shelf life duration, the effective date, the production batch number, the remark and other information of the product. The product circulation information is used to indicate the details of the relay manager of the product (for example, a certain tea leaf is selected from xx county of the production place, processed and packaged via wh county, and finally sold in hk county).
To sum up, because the first prompt information includes the time when the authentication information corresponding to the unique identifier is first authenticated, and the unique identifier and the authentication information are acquired and sent by the electronic device reading the information carried on the first information carrying medium, the authentication information is not authenticated before the product is not used, therefore, based on the first prompt information, whether the first information carrying medium is counterfeit or not can be effectively sensed (in general, if the first information carrying medium is counterfeit, the time when the authentication information corresponding to the unique identifier indicated by the first prompt information is first authenticated is not consistent with the time when the user first reads the information carried on the first information carrying medium by the electronic device), and the authenticity of the product.
It should be noted that the first information bearing medium is manufactured in advance by a manufacturer of a product, and a manufacturing process of the first information bearing medium is a process of encapsulating a unique identifier of the product and corresponding authentication information in the first information bearing medium.
As shown in fig. 3, a schematic diagram of another anti-counterfeiting method provided in the embodiment of the present application includes the following steps:
s301: a key pair is generated in advance.
Wherein the key pair comprises a public key and a corresponding private key. Specific implementation procedures for generating the key pair include, but are not limited to: and sending a key pair generation instruction to a preset encryption machine, and triggering the encryption machine to generate the key pair.
S302: and acquiring the state information, the production information and the circulation information of the product, and setting the unique identifier of the product.
Wherein the unique identification of the product can be set by the technician according to the actual situation, for example, the unique identification of xx product is set as "xx 0001".
S303: and signing the unique identifier of the product by using the private key to obtain authentication information.
The specific implementation process of signing the unique identifier of the product by using the private key includes, but is not limited to: and sending a signature instruction to a preset encryption machine, and triggering the encryption machine to sign the unique product identifier by using a private key.
S304: and storing the public key, the unique identification of the product, and the corresponding relation among the state information, the production information and the circulation information of the product to the local.
S305: and carrying out two-dimensional code coding on the corresponding relation between the unique identification of the product and the authentication information to obtain the two-dimensional code.
It should be noted that, in the embodiment, the two-dimensional code is taken as the first information-bearing medium for example, for this reason, if the first information-bearing medium is of another type, the adopted encoding manner may be changed, and the specific implementation principle of the encoding is common knowledge familiar to those skilled in the art, and is not described herein again.
S306: and deploying the two-dimension code into a product.
The two-dimensional code is deployed in a product, and the two-dimensional code is essentially arranged at a preset position of the product, and the preset position is invisible before the product is used for the first time.
S307: and receiving the information carried by the two-dimensional code under the condition that the buyer reads the two-dimensional code of the product by using the electronic equipment.
The information carried by the two-dimensional code comprises a unique identifier of the product and corresponding authentication information.
S308: and searching the public key corresponding to the unique identifier of the product indicated by the two-dimensional code according to the locally pre-stored public key, the unique identifier of the product and the corresponding relationship among the state information, the production information and the circulation information of the product.
S309: and authenticating the authentication information indicated by the two-dimensional code by using the public key, and judging whether the authentication information passes the authentication.
If the authentication information passes the authentication, S310 is executed, otherwise S311 is executed.
It should be noted that, the specific implementation process of authenticating the authentication information includes, but is not limited to: and sending a signature verification instruction to the encryption machine, and triggering the encryption machine to verify and authenticate the authentication information by using the public key.
S310: and sending the first prompt message.
Wherein, the first prompt message includes but is not limited to: the time when the authentication information is authenticated for the first time, prompt information indicating that the product is true, and state information, production information and circulation information of the product.
S311: and sending a prompt message that the product is false.
In summary, a public key and a corresponding private key are generated in advance, and the private key is used to sign the unique identifier of the product, so as to obtain the authentication information. And storing the public key, the unique identification of the product, and the corresponding relation among the state information, the production information and the circulation information of the product to the local. And carrying out two-dimensional code coding on the corresponding relation between the unique identifier of the product and the authentication information to obtain a two-dimensional code, thereby realizing the manufacture of the first information bearing medium. Under the condition that a buyer reads the two-dimensional code of the product by using the electronic equipment, the information carried by the two-dimensional code is acquired, the public key corresponding to the unique identifier of the product indicated by the two-dimensional code is searched according to the locally pre-stored public key, the unique identifier of the product and the corresponding relation among the state information, the production information and the circulation information of the product, and the authentication information indicated by the two-dimensional code is authenticated by using the public key. If the authentication information passes the authentication, prompting the time when the authentication information is authenticated for the first time and the product is a genuine product, and if the authentication information does not pass the authentication, prompting the product to be a counterfeit product. And then, the public key is used for authenticating the authentication information carried by the first information carrying medium, and the time for authenticating the authentication information for the first time is prompted under the condition that the authentication information passes the authentication. Therefore, the buyer can effectively sense the authenticity of the first information bearing medium and the product, thereby preventing the first information bearing medium from being counterfeited and utilized.
Fig. 4 is a schematic diagram of another product structure provided in the embodiments of the present application.
Specifically, the first information bearing medium is arranged at a preset position of the product, and the preset position is invisible before the product is used for the first time, or the first information bearing medium cannot send the unique identifier and the authentication information to the outside before the product is used for the first time. In addition, a second information bearing medium is also arranged on the product, the second information bearing medium bears the unique identifier of the product, and the second information bearing medium is visible before the product is used for the first time (for example, the second information bearing medium is arranged on the outer surface of a product package), or the unique identifier can be sent to the outside (namely, the second information bearing medium is a radio frequency tag). In this embodiment, the first information bearing medium and the second information bearing medium may be the same type of medium, such as a two-dimensional code, a barcode, or a radio frequency tag.
The embodiment of the present application provides an anti-counterfeiting method for a product provided with a first information bearing medium and a second information bearing medium, which can be executed by a server, and is used to assist a buyer in sensing authenticity of a product label (i.e., the first information bearing medium and the second information bearing medium) and the product, and to prevent the first information bearing medium and the second information bearing medium from being counterfeited.
As shown in fig. 5, a schematic diagram of another anti-counterfeiting method provided in the embodiment of the present application includes the following steps:
s501: a unique identification of a product is received.
And the unique identifier is obtained by reading the information carried on the second information carrying medium by the electronic equipment and is sent.
S502: and sending the second prompt message.
Wherein the second prompt message comprises prompt message indicating that the product is not used, and at least one of state information, production information and circulation information of the product.
S503: and receiving the unique identification of the product and the corresponding authentication information.
The unique identification and the authentication information are acquired and sent by the electronic equipment reading the information carried on the first information carrying medium.
S504: and sending the first prompt message when the authentication information passes the authentication.
The first prompt information comprises time when the authentication information corresponding to the unique identifier is authenticated for the first time, prompt information indicating that the product is true, and at least one of state information, production information and circulation information of the product.
In summary, the first prompt information includes the time when the authentication information corresponding to the unique identifier is authenticated for the first time, and the unique identifier and the authentication information are acquired and sent by the electronic device reading the information carried on the first information carrying medium, and the authentication information is not authenticated before the product is not used, so that whether the first information carrying medium and the second information carrying medium are counterfeit or not and whether the product is true or false can be effectively sensed based on the first prompt information. In addition, based on the second prompt information, the buyer can acquire the information of the product without using the product and learn whether the product is used, so that the user is prevented from purchasing counterfeit products.
It is emphasized that, in the above embodiment, if the unique identifier of the product is also received after the execution of S504, the first prompt message is sent again without sending the second prompt message. Therefore, after the product is used (i.e. the information carried by the first information carrying medium is read), the buyer can read the second information carrying medium by using the electronic device before the product is not purchased, and if the first prompt information is received, the buyer can judge that the second information carrying medium is counterfeit, and the product is counterfeit, thereby avoiding purchasing.
It should be noted that, the first information bearing medium and the second information bearing medium are both manufactured by a manufacturer of a product in advance, in the manufacturing process of the first information bearing medium, a process of encapsulating the unique identifier of the product and the corresponding authentication information in the first information bearing medium, and in the manufacturing process of the second information bearing medium, a process of encapsulating the unique identifier of the product in the second information bearing medium. Therefore, the embodiment of the present application takes the two-dimensional code as an example, and the description is given to the manufacturing process of the first information bearing medium and the second information bearing medium, and the process of performing the anti-counterfeiting through the two-dimensional code.
As shown in fig. 6a and fig. 6b, another schematic diagram of an anti-counterfeiting method provided in the embodiment of the present application includes the following steps:
s601: a key pair is generated in advance.
Wherein the key pair comprises a public key and a corresponding private key.
S602: and acquiring production information and circulation information of the product, and setting a unique identifier of the product.
S603: and signing the unique identifier of the product by using the private key to obtain authentication information.
S604: and storing the public key, the unique identification of the product, and the corresponding relation among the state information, the production information and the circulation information of the product to the local.
S605: and carrying out two-dimensional code coding on the unique identifier of the product to obtain a clear code.
Where the plain code is a concrete representation of the second information bearing medium.
S606: and carrying out two-dimensional code coding on the corresponding relation between the unique identification of the product and the authentication information to obtain the secret code.
The combination code is a concrete representation mode of the first information bearing medium.
S607: the clear code and the secret code are deployed into the product.
S608: in case the purchaser reads the clear code of the product using the electronic device, the information carried by the clear code is received.
Wherein the information carried by the plain code comprises a unique identification of the product.
S609: and searching the state information, the production information and the circulation information of the product corresponding to the unique identifier of the product indicated by the plain code according to the locally pre-stored public key, the unique identifier of the product and the corresponding relation among the state information, the production information and the circulation information of the product.
S610: and sending the second prompt message.
Wherein the second prompt message comprises prompt message indicating that the product is not used, and state information, production information and circulation information of the product.
S611: in case the purchaser reads the code of the product using the electronic device, the information carried by the code is received.
The information carried by the password comprises the unique identification of the product and the corresponding authentication information.
S612: and searching the public key corresponding to the unique identifier of the product indicated by the password according to the locally pre-stored public key, the unique identifier of the product and the corresponding relationship among the state information, the production information and the circulation information of the product.
S613: and authenticating the authentication information indicated by the cipher by using the public key, and judging whether the authentication information passes the authentication.
If the authentication information passes the authentication, S614 is executed, otherwise S615 is executed.
S614: and sending the first prompt message.
The first prompt message comprises time when the authentication message is authenticated for the first time, prompt messages indicating that the product is true, and state information, production information and circulation information of the product.
S615: and sending a prompt message that the product is false.
In summary, a public key and a corresponding private key are generated in advance, and the private key is used to sign the unique identifier of the product, so as to obtain the authentication information. And storing the public key, the unique identification of the product, and the corresponding relation among the state information, the production information and the circulation information of the product to the local. And carrying out two-dimensional code coding on the unique identifier of the product to obtain a clear code, thereby realizing the manufacture of the second information bearing medium. And carrying out two-dimensional code coding on the corresponding relation between the unique identifier of the product and the authentication information to obtain a password, thereby realizing the manufacture of the first information bearing medium. Under the condition that a buyer reads the two-dimensional code of the product by using the electronic equipment, the information carried by the two-dimensional code is acquired, the public key corresponding to the unique identifier of the product indicated by the two-dimensional code is searched according to the locally pre-stored public key, the unique identifier of the product and the corresponding relation among the state information, the production information and the circulation information of the product, and the authentication information indicated by the two-dimensional code is authenticated by using the public key. If the authentication information passes the authentication, prompting the time when the authentication information is authenticated for the first time and the product is a genuine product, and if the authentication information does not pass the authentication, prompting the product to be a counterfeit product. And then, the public key is used for authenticating the authentication information carried by the first information carrying medium, and the time for authenticating the authentication information for the first time is prompted under the condition that the authentication information passes the authentication. Therefore, the buyer can effectively sense the authenticity of the first information bearing medium and the product, thereby preventing the first information bearing medium from being counterfeited and utilized. In addition, based on the second prompt information, the buyer can acquire the information of the product without using the product and learn whether the product is used, so that the user is prevented from purchasing counterfeit products.
It is emphasized that, in the above embodiment, if the unique identifier of the product is also received after the execution of S614, the first prompt message is sent again without sending the second prompt message. Therefore, after the product is used (i.e. the information carried by the first information carrying medium is read), the buyer can read the second information carrying medium by using the electronic device before the product is not purchased, and if the first prompt information is received, the buyer can judge that the second information carrying medium is counterfeit, and the product is counterfeit, thereby avoiding purchasing.
The embodiment of the present application provides another anti-counterfeiting method for a product provided with a first information bearing medium and a second information bearing medium, which can be executed by a server, and is used to assist a buyer in sensing authenticity of a product label (i.e., the first information bearing medium and the second information bearing medium) and the product, and to prevent the first information bearing medium and the second information bearing medium from being counterfeited.
As shown in fig. 7, a schematic diagram of another anti-counterfeiting method provided in the embodiment of the present application includes the following steps:
s701: and receiving the unique identification of the product and the corresponding authentication information.
The unique identification and the authentication information are acquired and sent by the electronic equipment reading the information carried on the first information carrying medium.
S702: and if the unique identifier is received within a preset time range before the unique identifier and the authentication information are received, transmitting first prompt information under the condition that the authentication information passes.
The first prompt information comprises time when the authentication information corresponding to the unique identifier is authenticated for the first time, prompt information indicating that the product is true, and at least one of state information, production information and circulation information of the product.
It should be noted that the unique identifier is obtained by reading the information carried on the second information carrying medium by the electronic device and sending the information.
S703: and if other identifiers are received within a preset time range before the unique identifier and the authentication information are received, sending prompt information indicating that the identifiers are not matched.
Specifically, the anti-counterfeiting method is exemplified by taking tea purchased by a buyer as an application scene:
wherein, tea bottle packaging surface is provided with the second information bearing medium (being plain code), and tea bottle lid inboard is provided with the first information bearing medium (being secret code), and buyer purchases two bottles of tealeaves (supposing to be tealeaves A and tealeaves B).
1. And under the condition that the buyer reads the plain code of the tea A in advance by using the mobile phone, acquiring the unique identifier of the tea A.
2. And searching the state information, the production information and the circulation information of the tea corresponding to the unique identifier of the tea A according to the locally pre-stored public key, the unique identifier of the tea and the corresponding relationship among the state information, the production information and the circulation information of the tea.
3. And sending the second prompt message to the mobile phone. Wherein the second prompt message comprises prompt message indicating that the tea A is not used and at least one of state information, production information and circulation information of the tea A.
4. If the buyer then reads the password of tea B using the mobile phone, a prompt is sent to the mobile phone indicating that the identifiers do not match (e.g., "this password does not match, the verification fails or is invalid").
5. And if the buyer reads the password of the tea A by using the mobile phone, acquiring the unique identifier of the tea A and the corresponding authentication information.
6. And searching the public key corresponding to the unique identifier of the tea A according to the locally pre-stored public key, the unique identifier of the tea, and the corresponding relationship among the state information, the production information and the circulation information of the tea.
7. And authenticating the authentication information of the tea A by using the public key, and judging whether the authentication information of the tea A passes or not.
8. And if the authentication information of the tea leaves A passes, sending first prompt information to the mobile phone. The first prompt information comprises time when the authentication information of the tea A is authenticated for the first time, prompt information indicating that the tea A is true, and at least one of state information, production information and circulation information of the tea A.
If the time when the authentication information of tea leaf a is first authenticated (for example, tea leaf "a is first opened in 20/12/2020 at 18: 30 authentication), does not match the time when the purchaser reads the password of tea leaf a using the mobile phone, it is determined that the password and the plain code of tea leaf a are counterfeit and used, and tea leaf a is a counterfeit.
9. And if the authentication information of the tea A does not pass, sending a prompt message that the tea A is false to the mobile phone.
In summary, only when the buyer reads the information carried on the second information carrying medium by using the electronic device to obtain and send the unique identifier of the product, the buyer then reads the information carried on the first information carrying medium by using the electronic device to obtain and send the unique identifier of the product and the corresponding authentication information, and the authentication information can be authenticated, so as to distinguish the authenticity of the first information carrying medium and the product. That is to say, the first information bearing medium and the second information bearing medium are used in a paired manner, and in practical application, a buyer needs to read the second information bearing medium by using the electronic device in advance and then read the first information bearing medium, so as to sense the authenticity of the first information bearing medium and the product. Therefore, the cost for pirates to counterfeit and utilize the first information bearing medium and the second information bearing medium is greatly increased, thereby restricting the development of counterfeit products.
Corresponding to the anti-counterfeiting method provided by the embodiment of the application, the embodiment of the application also provides a client system.
As shown in fig. 8, a schematic structural diagram of a client system provided in the embodiment of the present application includes:
a first information bearing medium 100, a second information bearing medium 200, and a client device 300.
Wherein the first information bearing medium 100 bears a unique identification of the product and authentication information.
The first information bearing medium 100 is disposed at a preset position of the product, the preset position being invisible until the product is used for the first time, or the first information bearing medium 100 cannot externally transmit unique identification and authentication information until the product is used for the first time.
The second information bearing medium 200 bears a unique identifier of the product, and the second information bearing medium 200 visually or externally transmits the unique identifier before the product is used for the first time.
A client device 300 for: and receiving the unique identifier of the product and the corresponding authentication information, and sending first prompt information under the condition that the authentication information passes, wherein the first prompt information comprises the time when the authentication information corresponding to the unique identifier is authenticated for the first time.
The client device 300, further configured to: and sending prompt information indicating that the product is false under the condition that the authentication information fails.
The client device 300, further configured to: and receiving the unique identifier of the product, sending second prompt information under the condition that the first prompt information is not sent, wherein the second prompt information comprises prompt information indicating that the product is not used, and sending the first prompt information again under the condition that the first prompt information is sent.
The client device 300 is specifically configured to: if the unique identifier is received within a preset time range before the unique identifier and the authentication information are received, first prompt information is sent under the condition that the authentication information passes the authentication, and if other identifiers are received within a preset time range before the unique identifier and the authentication information are received, prompt information indicating that the identifiers are not matched is sent.
In summary, the first prompt information includes the time when the authentication information corresponding to the unique identifier is authenticated for the first time, and the unique identifier and the authentication information are acquired and sent by the electronic device reading the information carried on the first information carrying medium, and the authentication information is not authenticated before the product is not used, so that whether the first information carrying medium is counterfeit or not and whether the product is true or false can be effectively sensed based on the first prompt information.
The present application also provides a computer-readable storage medium comprising a stored program, wherein the program performs the anti-counterfeiting method provided by the present application.
The application also provides an anti-counterfeiting device, including: a processor, a memory, and a bus. The processor is connected with the memory through a bus, the memory is used for storing programs, and the processor is used for running the programs, wherein the anti-counterfeiting method provided by the application is executed when the programs are run, and the anti-counterfeiting method comprises the following steps:
receiving a unique identifier of a product and corresponding authentication information, wherein the unique identifier and the authentication information are acquired and sent by reading information carried on a first information carrying medium by electronic equipment; the first information bearing medium is arranged at a preset position of the product, and the preset position is invisible before the product is used for the first time; or, the first information bearing medium cannot externally send the unique identifier and the authentication information before the product is used for the first time;
and sending first prompt information under the condition that the authentication information passes the authentication, wherein the first prompt information comprises the time when the authentication information corresponding to the unique identifier is authenticated for the first time.
Optionally, the first prompt message further includes:
prompt information indicating that the product is true, and at least one of state information, production information and circulation information of the product.
Optionally, the method further includes:
and sending prompt information indicating that the product is false under the condition that the authentication information fails.
Optionally, the method further includes:
receiving a unique identifier of the product, wherein the unique identifier is obtained by reading information carried on a second information carrying medium by electronic equipment and is sent; the second information bearing medium can send the unique identification visually or externally before the product is used for the first time;
sending a second prompt message under the condition that the first prompt message is not sent, wherein the second prompt message comprises a prompt message indicating that the product is not used;
and under the condition that the first prompt message is sent, sending the first prompt message again.
Optionally, the second prompt message further includes:
at least one item of state information, production information and circulation information of the product.
Optionally, in a case that the authentication information passes the authentication, sending a first prompt message includes:
if the unique identifier is received within a preset time range before the unique identifier and the authentication information are received, sending first prompt information under the condition that the authentication information passes;
the method further comprises the following steps:
and if other identifiers are received within a preset time range before the unique identifier and the authentication information are received, sending prompt information indicating that the identifiers are not matched.
The functions described in the method of the embodiment of the present application, if implemented in the form of software functional units and sold or used as independent products, may be stored in a storage medium readable by a computing device. Based on such understanding, part of the contribution to the prior art of the embodiments of the present application or part of the technical solution may be embodied in the form of a software product stored in a storage medium and including several instructions for causing a computing device (which may be a personal computer, a server, a mobile computing device or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (11)

1. An anti-counterfeiting method is applied to a server, and is characterized by comprising the following steps:
receiving a unique identifier of a product and corresponding authentication information, wherein the unique identifier and the authentication information are acquired and sent by reading information carried on a first information carrying medium by electronic equipment; the first information bearing medium is arranged at a preset position of the product, and the preset position is invisible before the product is used for the first time; or, the first information bearing medium cannot externally send the unique identifier and the authentication information before the product is used for the first time;
and sending first prompt information under the condition that the authentication information passes the authentication, wherein the first prompt information comprises the time when the authentication information corresponding to the unique identifier is authenticated for the first time.
2. The method of claim 1, wherein the first prompt further comprises:
prompt information indicating that the product is true, and at least one of state information, production information and circulation information of the product.
3. The method of claim 1, further comprising:
and sending prompt information indicating that the product is false under the condition that the authentication information fails.
4. The method of claim 1, further comprising:
receiving a unique identifier of the product, wherein the unique identifier is obtained by reading information carried on a second information carrying medium by electronic equipment and is sent; the second information bearing medium can send the unique identification visually or externally before the product is used for the first time;
sending a second prompt message under the condition that the first prompt message is not sent, wherein the second prompt message comprises a prompt message indicating that the product is not used;
and under the condition that the first prompt message is sent, sending the first prompt message again.
5. The method of claim 4, wherein the second prompting message further comprises:
at least one item of state information, production information and circulation information of the product.
6. The method according to claim 1 or 4, wherein, in the case that the authentication information passes the authentication, sending a first prompt message comprises:
if the unique identifier is received within a preset time range before the unique identifier and the authentication information are received, sending first prompt information under the condition that the authentication information passes;
the method further comprises the following steps:
and if other identifiers are received within a preset time range before the unique identifier and the authentication information are received, sending prompt information indicating that the identifiers are not matched.
7. A client system, comprising:
a first information bearing medium;
the first information bearing medium bears the unique identification and the authentication information of the product;
the first information bearing medium is arranged at a preset position of the product, and the preset position is invisible before the product is used for the first time; or, the first information bearing medium cannot externally send the unique identifier and the authentication information before the product is used for the first time.
8. The client system of claim 7, further comprising:
and the second information bearing medium is used for visually or externally sending the unique identifier before the product is used for the first time.
9. The client system of claim 7, further comprising: client device for implementing the anti-counterfeiting method according to claims 1 to 6.
10. A security device, comprising: a processor, a memory, and a bus; the processor and the memory are connected through the bus;
the memory is used for storing a program, and the processor is used for executing the program, wherein the program executes the anti-counterfeiting method according to any one of claims 1 to 6 when running.
11. A computer-readable storage medium, comprising a stored program, wherein the program performs the anti-counterfeiting method according to any one of claims 1 to 6.
CN202011447647.0A 2020-12-09 2020-12-09 Anti-counterfeiting method and client system Pending CN112541773A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011447647.0A CN112541773A (en) 2020-12-09 2020-12-09 Anti-counterfeiting method and client system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011447647.0A CN112541773A (en) 2020-12-09 2020-12-09 Anti-counterfeiting method and client system

Publications (1)

Publication Number Publication Date
CN112541773A true CN112541773A (en) 2021-03-23

Family

ID=75018343

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011447647.0A Pending CN112541773A (en) 2020-12-09 2020-12-09 Anti-counterfeiting method and client system

Country Status (1)

Country Link
CN (1) CN112541773A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103136682A (en) * 2013-03-19 2013-06-05 王兆卿 System using cover type label to achieve counterfeiting and method
CN104281954A (en) * 2014-04-30 2015-01-14 上海高研明鉴信息技术有限公司 Anti-counterfeiting method for product
CN104881787A (en) * 2015-05-13 2015-09-02 景视佳传媒科技(北京)有限公司 Method, system and device for two-dimension code authenticity
CN105260892A (en) * 2015-09-10 2016-01-20 上海乔马电子科技有限公司 Anti-counterfeiting verification and sales information obtaining method and anti-counterfeiting verification and sales information obtaining system
CN105761087A (en) * 2016-02-03 2016-07-13 上海皆普信息科技有限公司 Packaging product two-dimensional matching verification anti-fake method and system
CN110033060A (en) * 2019-03-25 2019-07-19 广东鑫兴科技有限公司 Method for anti-counterfeit of tracing to the source, device, storage medium and server for product
CN110503437A (en) * 2018-05-16 2019-11-26 喜地霁石文化传媒(北京)有限公司 Based on the article anti-counterfeit method more identified and its system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103136682A (en) * 2013-03-19 2013-06-05 王兆卿 System using cover type label to achieve counterfeiting and method
CN104281954A (en) * 2014-04-30 2015-01-14 上海高研明鉴信息技术有限公司 Anti-counterfeiting method for product
CN104881787A (en) * 2015-05-13 2015-09-02 景视佳传媒科技(北京)有限公司 Method, system and device for two-dimension code authenticity
CN105260892A (en) * 2015-09-10 2016-01-20 上海乔马电子科技有限公司 Anti-counterfeiting verification and sales information obtaining method and anti-counterfeiting verification and sales information obtaining system
CN105761087A (en) * 2016-02-03 2016-07-13 上海皆普信息科技有限公司 Packaging product two-dimensional matching verification anti-fake method and system
CN110503437A (en) * 2018-05-16 2019-11-26 喜地霁石文化传媒(北京)有限公司 Based on the article anti-counterfeit method more identified and its system
CN110033060A (en) * 2019-03-25 2019-07-19 广东鑫兴科技有限公司 Method for anti-counterfeit of tracing to the source, device, storage medium and server for product

Similar Documents

Publication Publication Date Title
US20180108024A1 (en) Open registry for provenance and tracking of goods in the supply chain
JP5739876B2 (en) Unique identifiers, methods for providing unique identifiers, and use of unique identifiers
JP5149909B2 (en) Data access control with RFID devices
US8842831B2 (en) Authentication of an RFID tag using an asymmetric cryptography method
US20180019872A1 (en) Open registry for internet of things including sealed materials
US20190347888A1 (en) Document authentication system
US20180032759A1 (en) Open registry for human identification
CN108573296B (en) Anti-counterfeiting device, anti-counterfeiting system and anti-counterfeiting method
WO2018075403A1 (en) Open registry for provenance and tracking of goods in the supply chain
WO2013121356A2 (en) Near field communication (nfc) based counterfeit product identification system
CN104794626B (en) A kind of method for anti-counterfeit and device based on hardware information
WO2017116303A1 (en) Secure dual-mode anti-counterfeit product authentication methodology and system
US10695681B2 (en) System for unlocking game play data on near field communications system for unlocking game play data on near field communications (NFC) chips to allow for game play on an electronic computing device that uses the game play data
CN101755414A (en) Method and system for verifying the authenticity of a product, and reading device
WO2018067974A1 (en) Open registry for human identification
CN104036399A (en) True and false identification method based bar code scanning and dynamic password
CN105761091A (en) Red packet code two-stage two-dimensional code security coding method
CN109360008B (en) Product anti-counterfeiting authentication updating method and system
CN107161515A (en) A kind of bottle cap anti-fake method based on technology of Internet of things and the anti-fake bottle lid using this method
CN108082723A (en) A kind of anti-fake bottle lid and its method of work based on CPU crypto chips
KR101527582B1 (en) System for verifying product genuineness using double security key and method thereof
CN111311268A (en) Commodity anti-counterfeiting code generation and verification method, system and computer readable storage medium
CN110570204A (en) anti-fake method and system for packed article
WO2018064329A1 (en) Open registry for internet of things including sealed materials
US9672505B2 (en) Method for verifying the authenticity of a terminal, corresponding device and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination