CN114723465A - Method, device and storage medium for anti-counterfeiting right confirmation of commodities - Google Patents

Method, device and storage medium for anti-counterfeiting right confirmation of commodities Download PDF

Info

Publication number
CN114723465A
CN114723465A CN202210639799.3A CN202210639799A CN114723465A CN 114723465 A CN114723465 A CN 114723465A CN 202210639799 A CN202210639799 A CN 202210639799A CN 114723465 A CN114723465 A CN 114723465A
Authority
CN
China
Prior art keywords
information
commodity
value
counterfeiting
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210639799.3A
Other languages
Chinese (zh)
Other versions
CN114723465B (en
Inventor
王钦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yichu Tuyin Technology Co ltd
Original Assignee
Shenzhen Yichu Tuyin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yichu Tuyin Technology Co ltd filed Critical Shenzhen Yichu Tuyin Technology Co ltd
Priority to CN202210639799.3A priority Critical patent/CN114723465B/en
Publication of CN114723465A publication Critical patent/CN114723465A/en
Priority to PCT/CN2022/115669 priority patent/WO2023236369A1/en
Application granted granted Critical
Publication of CN114723465B publication Critical patent/CN114723465B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Landscapes

  • Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method, a device and a storage medium for anti-counterfeiting right confirmation of commodities, which comprises the steps of obtaining commodity information; calculating to obtain a value A through function operation; making the value A and the verification entrance information of the commodity into URL format information and writing the URL format information into an NFC chip or converting the URL format information into a two-dimensional code form; verifying and confirming the identity of the owner of the commodity; and binding the value A and the related information of the user terminal, performing function operation again to obtain a value B, and confirming that the binding is successful. Each time of the confirmation right and the solution right is recorded, which is equivalent to recording the operator and the time of each transaction, the record is convenient to query, and the transparency of the transaction is greatly improved. The invention obtains irreversible, unique and non-falsifiable values through function calculation, such as Hash calculation, and links the irreversible, unique and non-falsifiable values from a software layer to the entity NFC chip and then to the commodity, thereby creating a new, safe, low-cost and easy-to-operate commodity anti-counterfeiting and right-confirming method.

Description

Method, device and storage medium for anti-counterfeiting right confirmation of commodities
Technical Field
The invention belongs to the technical field of commodity anti-counterfeiting right confirmation, and particularly relates to a method and a device for commodity anti-counterfeiting right confirmation and a storage medium.
Background
The traditional paper anti-counterfeiting cards and plastic anti-counterfeiting buttons are mostly stuck to commodities or hung on the commodities for explicit display, which affects the appearance. In addition, most of the traditional paper anti-counterfeiting cards and plastic anti-counterfeiting buttons are disposable, easy to imitate and low in safety. When different people dispute or need to confirm the ownership of the commodity, disputes or disputes are often generated because the real user terminal does not confirm or is difficult to confirm the ownership of the commodity. In the conventional method, for example, when the ownership of an electronic product (e.g., a smart watch) disputes or needs to be retrieved by a product manufacturer, a user terminal needs to have an ID, a password, a product serial number, etc. of the logged-in electronic product, or an authority confirming program installed in the electronic product confirms the owner. When the electronic product is newer or the electronic product is reset to factory settings, it is difficult to confirm the owner by the above method, and the owner can be confirmed only by unlocking the electronic product and entering the electronic product operation interface. In addition, the use conditions of the commodities at different stages generally cause that the information of the buyer and the seller is asymmetric when the ownership of the commodities is transferred because of no record or difficult record, thereby increasing the transaction cost.
On the other hand, if ownership of a commodity needs to be confirmed for different ownership persons, complicated operations are often required, for example, new ownership persons are added or reduced in a commodity room, and complicated registration or announcement needs to be performed in an real estate property registration center. Most of the commodities even have no process of confirming different ownership persons, such as high-value cases, watches, jewels and the like.
Disclosure of Invention
The invention aims to provide a method, a device and a storage medium for anti-counterfeiting right confirmation of commodities, which solve the problems that the anti-counterfeiting stickers, plastic anti-counterfeiting buttons and other modes used in the anti-counterfeiting process of the existing products are easy to counterfeit and low in safety, and the problem that the right confirmation of ID, passwords, product serial codes and the like of a login electronic product is required to be possessed by a user terminal when the right of the product is confirmed.
In order to achieve the purpose, the invention adopts the following technical scheme:
in a first aspect, the invention provides a method for anti-counterfeiting right confirmation of commodities, which comprises the steps of preparing anti-counterfeiting codes and confirming right;
the preparation of the anti-counterfeiting code comprises the following steps,
s101, acquiring commodity information;
s102, performing function operation on the commodity information to obtain a value A;
s103, making the value A as an anti-counterfeiting code and the related verification entrance information of the commodity into URL format information; writing the URL format information into an NFC chip and/or converting the URL format information into a two-dimensional code;
the step of determining the right includes the steps of,
s201, receiving authentication request information sent by a user terminal, and sending first authentication information to the user terminal;
s202, receiving first verification information returned by the user terminal, and verifying and authorizing the user identity according to the first verification information;
s203, binding the value A and the user related information, and performing function operation on the binding information to obtain a value B;
and S204, performing associated storage on the commodity information, the value A, the user related information and the value B to form commodity archive information.
According to the technology, the commodity information is subjected to function operation to obtain a value A as an anti-counterfeiting mode of URL format information, in addition, when the commodity is verified through a user terminal, the value B is obtained through function operation again, so that the successful binding operation is confirmed, the commodity is ensured to be authorized, and the problems that the anti-counterfeiting pasting, the plastic anti-counterfeiting buckle and other modes used by the existing product in anti-counterfeiting are easy to counterfeit and low in safety are solved, and the user terminal is required to have ID, password, product serial code and the like for logging in an electronic product in the product authorization, and the authorization is troublesome are solved; in addition, the commodity information, the value A, the user-related information and the value B are stored in an associated mode to form commodity archive information, and the ownership of the commodity can be recorded so as to be convenient for inquiry.
In one possible design, when the ownership of the commodity needs to be transferred, the value A and the related information of the user terminal are subjected to verification and unbinding to obtain unbinding information, wherein the unbinding information comprises unbinding verification information, a current timestamp and commodity information, then the unbinding information is subjected to function operation to obtain a value C, and the value C is added into commodity archive information; and after unbinding, re-performing the step of determining the right. The commodities can be bound again by confirming the right after unbinding, so that the right of the commodities after being transacted again can be identified conveniently.
In one possible design, the method for unbinding the value a and the related information of the user terminal through the verification includes,
receiving request information for unbinding the user terminal, and then sending second verification information to the user;
and receiving second verification information returned by the user terminal, verifying the second verification information, and unbinding the value A corresponding to the commodity and the related information of the user terminal after the verification is passed.
In one possible design, after the right is confirmed, the operation of recording the commodity use information is also carried out, and the method for recording the commodity use information comprises the following steps of acquiring the use condition information of the commodity at different stages of commodity use, and carrying out function operation on the commodity use condition information, the corresponding commodity information and the user related information of the current commodity to obtain a value DiAnd i represents the number of times of acquiring the service condition information of the commodity and takes the value DiAnd performing association storage. By the aid of the technology, the using condition information of the commodity can be recorded, and the opaqueness of second-hand commodity transaction can be reduced by recording the using condition of the commodity; and assist the manufacturer or merchant in knowing the usage of the goods to provide corresponding after-market policies.
In a possible design, in step S203, after the value a is bound with the relevant information of the user terminal, a timestamp is added to the bound information, and then a function operation is performed to obtain a value B.
In a possible design, the related information of the user includes a mobile phone number and/or micro-signal information of the user, and may be self-defined information of the user.
In one possible design, the function operation is a hash algorithm.
In one possible design, in response to a human-computer interaction right dividing operation, the commodity ownership is divided into at least two shares, and each of the divided commodity ownership is bound or unbound.
In one possible design, the protocol information is stored in the commodity archive information in response to the protocol information uploading operation of human-computer interaction; when the agreement information is different user information bound to each commodity, different users corresponding to the different user information perform constraint agreements aiming at the commodity, and the constraint agreements are consensus information achieved aiming at one or more of commodity occupation time, commodity occupation mode, commodity keeping responsibility, commodity keeping obligation and indemnification responsibility.
In a second aspect, the present invention provides an apparatus for securing the authenticity of an article of merchandise against counterfeiting, comprising a memory, a processor and a transceiver connected in sequence, wherein the memory is used for storing a computer program, the transceiver is used for transmitting and receiving messages, and the processor is used for reading the computer program and executing the method for securing the authenticity of the article of merchandise against counterfeiting as described in the first aspect and any one of the possible designs of the first aspect.
Has the advantages that:
1. the invention provides a method for anti-counterfeiting right confirmation of commodities, which is characterized in that commodity information is subjected to function operation to obtain a value A as an anti-counterfeiting mode of URL format information, most of traditional paper anti-counterfeiting cards and plastic anti-counterfeiting buckles are stuck to or hung on commodities for explicit display, the patent can realize anti-counterfeiting through an NFC technology, an NFC chip can be placed in the commodities, the appearance of the commodities is not influenced, and the commodities can be used for a long time and many times, so that the purposes of anti-counterfeiting and right confirmation are achieved; in addition, when the user terminal verifies the commodity, the value B is obtained by performing function operation again, so that the successful binding operation is confirmed, the commodity is ensured to be authorized, and the problems that the anti-counterfeiting paste, the plastic anti-counterfeiting buckle and other modes used by the conventional product during anti-counterfeiting are easy to counterfeit and low in safety are solved, and the problem that the authorization is troublesome because the user terminal needs to have the ID, the password, the product serial code and the like for logging in the electronic product during the authorization of the product is solved; in addition, commodity archive information is formed by performing associated storage on the commodity information, the value A, the user-related information and the value B, and ownership of the commodity can be recorded so as to be convenient for inquiry;
2. when different people dispute or need to confirm the ownership of the commodity, disputes or disputes are often generated because the true user terminal does not confirm or is difficult to confirm the ownership of the commodity; compared with the traditional mode, for example, when a dispute is sent by ownership of a certain intelligent watch or a commodity manufacturer is required to assist in finding, the user terminal is required to have the ID, the password, the product serial code and the like of a login product, or an authority confirming program installed in the intelligent watch confirms the owner; after the smart watch is updated or reset to factory settings, the owner is determined to have great difficulty in the above mode, and the smart watch can be implemented only when the smart watch needs to be unlocked and enters an operation interface of the smart watch; in addition, most commodities cannot install the right-confirming program, so-called login setting is not available, and the owner can be confirmed with great difficulty; the invention binds with the mobile phone number, the micro signal or the self-defined information of the owner through the unique commodity information and the like to perform function operation to generate a function value, thereby realizing the right confirmation; the commodities can be bound again after being unbound, so that the ownership of the commodities after being transacted again can be identified conveniently;
3. the invention provides a method for confirming the anti-counterfeiting right of a commodity, which can also confirm and remove the binding of owner information and the commodity through a mobile phone short message or a WeChat verification code of an owner on the basis of realizing conveniently confirming the right of the commodity through the mobile phone short message or the WeChat receiving and sending verification code, and the like, and the next owner can also conveniently bind the information of the mobile phone number and the like of the owner and the commodity after the ownership of the commodity is required; equivalently, the operator and time of each transaction are recorded, the record cannot be falsified, and is convenient to query, so that the transaction record is prevented from being forged, the transparency of the transaction is improved, and the Eryu mystery in the traditional transaction scene due to asymmetric information is avoided; the above scene is realized, the transaction is ensured to be carried out smoothly, the added cost is extremely low, and the operation is extremely convenient; the patent facilitates the confirmation of the ownership of the commodity and reduces the transaction cost; by acquiring the using condition information of the commodity, the using condition information of the commodity can be recorded, and the opaqueness of second-hand commodity transaction can be reduced by recording the using condition of the commodity; and assisting the manufacturer to know the use condition of the commodity, thereby providing a corresponding after-sale policy;
4. the invention provides a method for confirming the anti-counterfeiting right of commodities, which confirms commodity information by adopting Hash operation and utilizing the mathematical characteristics of the Hash operation, namely uniqueness, irreversibility and irreparability, and simultaneously, once the value A is established and is issued with commodities, the value A means that a producer or a merchant carries a promise on the commodity information by utilizing the mathematical characteristics of the value A, and the obtained value A is different due to the change of any information; the generation of the value A will also increase the trust feeling of the consumer for the product;
5. the method for anti-counterfeiting right confirmation of the commodities can divide commodity rights, different ownership persons can agree on the commodity occupation time, mode, custody responsibility, obligation, indemnification responsibility and the like, and manufacturers or merchants can assist in completing records. Especially when the commodity is not easy to be divided and has high commodity value or different payers and ownership exist, the patent is applied to bring great convenience and derive different transaction modes; the information of different ownership persons and the obligation of the appointed rights are recorded accurately, conveniently and irreparably, the effect of discounting the selling price is achieved through phase change, and the sale of the commodities can be stimulated to a certain degree.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below.
Fig. 1 is a flowchart of a method for authenticating anti-counterfeiting of a commodity according to a first aspect of the present invention.
Detailed Description
The invention is further described with reference to the following figures and specific embodiments. It should be noted that the description of the embodiments is provided to help understanding of the present invention, but the present invention is not limited thereto. It will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of example embodiments of the present invention.
As shown in fig. 1, the method for determining the anti-counterfeiting right of the commodity provided by the first aspect of the present invention includes the steps of preparing an anti-counterfeiting code and determining the right;
the preparation of the anti-counterfeiting code comprises the following steps,
s101, acquiring commodity information; specifically, the commodity information includes one or more items of manufacturer or merchant information, production time, commodity parameters, reservation information, commodity serial numbers, and the like.
S102, performing function operation on the commodity information to obtain a value A; in specific implementation, the value obtained through function operation has the characteristics of irreversibility, uniqueness and non-falsification, which will be exemplified later;
s103, making the value A as an anti-counterfeiting code and the related verification entrance information of the commodity into URL format information; writing the URL format information into an NFC chip and/or converting the URL format information into a two-dimensional code; the URL is a uniform resource locator, a compact representation of the location and access method of a resource available from the internet, and is the address of a standard resource on the internet. Each file on the internet has a unique URL that contains information indicating the location of the file and how the browser should handle it. The URL describes the address of a resource on the world wide web in an abstract form of a string; one URL uniquely identifies one Web resource, and the resource can be obtained through the URL corresponding to the Web resource; writing the URL format information into an NFC chip or converting the URL format information into a two-dimensional code form; the NFC is a safe and rapid communication mode adopted by a plurality of industries, and is developed by combining a wireless interconnection technology on the basis of a non-contact Radio Frequency Identification (RFID) technology, wherein the NFC is a near field communication technology in Chinese name, and the near field in the Chinese name refers to radio waves close to an electromagnetic field; the NFC technology has extremely high security, has performance advantages in short-range communication, and is low in cost.
When the right is confirmed, the user reads the URL format information in the NFC by using the user terminal or scans the URL format information in the two-dimensional code by using the user terminal, and then enters a commodity verification and right confirmation interface by related verification entrance information, and the right confirmation comprises the following steps,
s201, receiving authentication request information sent by a user terminal, and sending first authentication information to the user terminal;
s202, receiving first verification information returned by the user terminal, and verifying and authorizing the user identity according to the first verification information;
s203, binding the value A and the user related information, and performing function operation on the binding information to obtain a value B;
and S204, performing associated storage on the commodity information, the value A, the user related information and the value B to form commodity archive information.
The method is realized based on a cloud server, after a user enters the right confirming interface through a user terminal, the cloud server sends a verification code to the terminal of the mobile phone number by submitting mobile phone number information, the verification code is the first verification information, and the user confirms the right by submitting the verification code. Therefore, the related information of the user comprises the mobile phone number of the user, and if the user uses the micro-signal authorization verification, the related information of the user comprises the mobile phone number information and the micro-signal information of the user. Specifically, the related information of the user may include, but is not limited to, a mobile phone number and/or micro signal information of the user, and other information that can be used for associating with the user is also within the protection scope of the present invention.
In a possible implementation mode, after the right is confirmed, the method further comprises the step of unbinding, wherein the unbinding is carried out as follows,
when the ownership of the commodity needs to be transferred, the value A and the relevant information of the user terminal are subjected to verification and unbinding, unbinding information is obtained, the unbinding information comprises unbinding verification information, a current timestamp and commodity information, then the unbinding information is subjected to function operation to obtain a value C, and the value C is added into commodity archive information; after unbinding, the steps of determining rights can be re-performed if desired.
In specific implementation, the method for unbinding the value A and the related information of the user terminal through verification comprises the following steps,
receiving request information for unbinding the user terminal, and then sending second verification information to the user;
and receiving second verification information returned by the user terminal, verifying the second verification information, and unbinding the value A corresponding to the commodity and the related information of the user terminal after the verification is passed.
In a possible embodiment, the method of recording the commodity use information after the right confirmation is as follows,
at different stages of commodity use, the use condition information of the commodity is obtained, and the commodity use condition information, the corresponding commodity information and the user related information of the current commodity are subjected to function operation to obtain a value DiAnd i represents the number of times of acquiring the service condition information of the commodity and takes the value DiAnd performing association storage.
In particular, by recording the use of the commodity, the opacity of second-hand commodity transactions can be reduced. For example, the commercial product is an automobile, and the invention is used for replacing part of functions of an automobile EDR (event Data recorder) which is equivalent to a black box of the automobile on the automobile, namely, the value D1 is obtained by performing function operation on the use condition and vehicle information, such as a frame number or an engine number, uploading server every 10000 kilometers or 1000 hours of the automobile, and the subsequent D2, D3 and D4 … … are obtained. Therefore, the meter adjusting behavior in the second-hand vehicle transaction process and the uncertainty of the vehicle use condition caused by the large reading difficulty of the EDR data of both transaction parties can be effectively prevented.
In a possible implementation manner, in step S203, after the value a is bound with the information related to the user terminal, a timestamp is further added to the bound information, and then a function operation is performed to obtain a value B.
In a possible embodiment, the function operation is a specific hash algorithm, and certainly, the function operation may also be performed by using an elliptic curve cryptography algorithm, for example;
taking a hash algorithm as a specific example, the hash algorithm (expression: Addr = h (key)) is to map a binary value string with an arbitrary length into a binary value string with a fixed length, the mapping rule is the hash algorithm, and the binary value string obtained after the mapping of the original data is the hash value (for convenience of presentation or expression, binary is generally converted into hexadecimal). It is a one-way cipher system, only encryption process, no decryption process, hash algorithm is a basic technology for information storage and inquiry, generally used for authentication, encryption, indexing, etc. The most commonly used hashing algorithms for encryption are MD5 (MD 5 Message-Digest Algorithm, MD5 Message Digest Algorithm) and SHA (Secure Hash Algorithm, which may be specifically subdivided into SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512). The features that make up the hash algorithm: 1. the original data can not be deduced reversely from the hash value, so the hash algorithm is also called a one-way hash algorithm; 2. the method is very sensitive to input data, only one Bit is modified for original data, and the finally obtained hash values are also quite different; 3. the probability of hash collision (collision) is very small, and the probability of the same hash value is very small for different original data, so that the problem of collision can be solved by a zipper method or an open addressing method.
Specifically, by adopting the SHA-256 calculation method, the manufacturer F of a certain commodity, the production time 20210518, the serial number is GFGDM24HLX2Y, and the commodity parameter X, the commodity information is F-20210518-GFGDM24HLX2Y-X, and the hash value 411c4d248237e0c008a2F7a2efe611614e449458869b42b4876F24acc6ef13ee (hexadecimal, regarded as value a) is obtained by SHA-256 calculation. In the aspect of anti-counterfeiting, if commodity information is subjected to SHA-256 operation to obtain a value A, the value A is displayed outwards, the commodity information cannot be known outside due to the irreversibility of the hash value, the value A is added together with information such as a verification website or a public number of a commodity manufacturer to manufacture a URL format, and the user terminal can conveniently verify the authenticity of the commodity and check the commodity information. Meanwhile, once the value A is established and is published with the commodity, the fact that a manufacturer records commodity information such as manufacturer information, production time, commodity parameters and the like by using the mathematical characteristics of the value A means that the commodity tracing can be achieved, and the obtained value A is different due to the change of any information. The generation of the value of a will also increase the consumer's sense of trust in the product.
By utilizing the irreversibility, uniqueness and non-tamper property of the hash value, the method creates a new, safe and low-cost method for anti-counterfeiting and right-confirming the commodities from a software layer to an entity NFC chip and then to the commodities through virtual and real links; in addition, when the user terminal verifies the commodity, the value B is obtained by performing function operation again, so that the successful binding operation is confirmed, the commodity is ensured to be authorized, and the problems that the anti-counterfeiting paste, the plastic anti-counterfeiting buckle and other modes used by the conventional product during anti-counterfeiting are easy to counterfeit and low in safety are solved, and the problem that the authorization is troublesome because the user terminal needs to have the ID, the password, the product serial code and the like for logging in the electronic product during the authorization of the product is solved;
of course, other hash calculation methods such as SHA-512 can be used to implement the above functions.
In one possible implementation, in response to the right dividing operation of human-computer interaction, the commodity ownership is divided into at least two shares, and each of the divided commodity ownership is bound or unbound.
In a specific example, when ownership of a commodity is divided into n, hash operation is performed on certain commodity information to obtain a value H, n time stamps are added, and n values Rn are obtained by combining the hash operation and encoding. The value Rn can be bound to the same or different information, such as cell phone number, micro signal, ID number or owner defined value, and then bound by adding timestamp to perform Hash operation to obtain n unalterable values SnAnd then confirming the attribution of the n ownership rights, and forming a file by the record of the manufacturer or the merchant. Same SnAfter verification, the ownership can also be unbound to obtain a value CnThereby preparing for transfer of ownership. The calculated values are archived by the manufacturer or merchant records and provided with a verification method.
In one possible implementation mode, in response to the protocol information uploading operation of human-computer interaction, storing the protocol information into commodity archive information; when the agreement information is different user information bound to each commodity, constraint agreement is carried out on the commodity among different users corresponding to the different user information, and the constraint agreement is consensus information achieved by aiming at one or more of commodity occupation time, commodity occupation mode, commodity custody responsibility, commodity custody obligation and indemnification responsibility
The invention relates to a method for determining the ownership division of a commodity, which comprises ownership division, binding and promissory right obligation;
specifically, a certain commodity is produced by M manufacturers, the production time is T, the commodity serial number is 123, and the commodity parameter X is X. Hashing M-T-123-X to obtain a value H, adding N time stamps when ownership of the commodity is divided into N, for example N =6, and combining hashing and coding to obtain 6 values RN。RnThe data can be bound with the same or different information, such as a mobile phone number, a micro signal, an identity card number or an owner self-defined value, and a timestamp is added again to perform hash operation to obtain 6 unchangeable values S1, S2, S3, S4, S5 and S6, and then the ownership of 6 ownership is confirmed. S1, S2, S3, S4, S5 and S6 are sent to corresponding ownership persons. RN、SNThe mobile phone number, the micro signal, the identity card number or the value defined by the owner are recorded by the manufacturer to form a file. The owner can confirm that the owner owns part or all of the corresponding commodities after the owner passes the verification through the S1, S2, S3, S4, S5 and S6 values and the bound mobile phone number, micro signal, identity card number or the value defined by the owner. Of course SNAfter verification, the ownership can also be unbound to obtain a value CNThereby preparing for transfer of ownership. The calculated value can be verified through a verification website, the verification website is manufactured into a URL format, and format information is written into an NFC chip or a two-dimensional code form, wherein the NFC chip or the two-dimensional code can be fixed on a commodity.
In a possible implementation manner, all ownership persons can even hash the information of time, mode, custody responsibility, obligation and the like of the commodity occupied by different ownership persons to obtain a value Y, and the value Y can be written into an NFC chip or uploaded to a manufacturer server through a two-dimensional code or externally issued through a block chain technology.
In a possible implementation manner, after the commodity is bought back by the owner, the owner can determine the number of the divided commodities by the NFC chip or the two-dimensional code reserved by the manufacturer, and the specific number of the divided commodities can also be confirmed by the commodity owner. The number of the divided parts can be preset to be purchased before the purchase. The manufacturer or the merchant assists in completing the information record archiving of the division of the ownership of the goods.
Specifically, the function operation limitation of the method is to convert the display forms of the commodity-related information, owner information, binding information and unbinding information, and store the converted values in association as commodity archive information, and the function operation for realizing the function is within the protection range of the method.
Specifically, the value obtained by the function operation in the method can also be recorded or issued by the blockchain technology, and the user can verify the obtained value by the blockchain technology.
In a second aspect, an apparatus for anti-counterfeit validation of merchandise includes a memory, a processor, and a transceiver connected in sequence, where the memory is used for storing a computer program, the transceiver is used for transmitting and receiving messages, and the processor is used for reading the computer program and executing the method for anti-counterfeit validation of merchandise as described in the first aspect or any one of the possible designs of the first aspect. For example, the Memory may include, but is not limited to, a Random-Access Memory (RAM), a Read-Only Memory (ROM), a Flash Memory (Flash Memory), a First-in First-out (FIFO), a First-in Last-out (FILO), and/or a First-in Last-out (FILO); the processor may not be limited to use with processors of the type X86, the Internet series, or other microprocessors; the transceiver may be, but is not limited to, a wired transceiver, a Wireless Fidelity (WiFi) Wireless transceiver, a bluetooth Wireless transceiver, a General Packet Radio Service (GPRS) Wireless transceiver, and/or a ZigBee protocol (ieee 802.15.4 standard-based low power local area network protocol, ZigBee) Wireless transceiver, and the like. In addition, the device for anti-counterfeiting right confirmation of the commodities can also comprise, but is not limited to, a power supply module, a display screen and other necessary components.
In a third aspect, the present invention provides a storage medium having stored thereon instructions for performing a method of securing against counterfeiting of an article as set forth in the first aspect or any one of the possible designs of the first aspect when the instructions are run on a computer. The computer-readable storage medium refers to a carrier for storing data, and may include, but is not limited to, floppy disks, optical disks, hard disks, flash memories, flash disks and/or Memory sticks (Memory sticks), etc., and the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
Finally, it should be noted that the above-mentioned embodiments are only preferred embodiments of the present invention, and do not limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method for anti-counterfeiting right confirmation of commodities is characterized by comprising the steps of anti-counterfeiting code preparation and right confirmation;
the preparation of the anti-counterfeiting code comprises the following steps,
s101, acquiring commodity information;
s102, performing function operation on the commodity information to obtain a value A;
s103, making the value A as an anti-counterfeiting code and the related verification entrance information of the commodity into URL format information; writing the URL format information into an NFC chip and/or converting the URL format information into a two-dimensional code;
the method of determining the right includes the steps of,
s201, receiving authentication request information sent by a user terminal, and sending first authentication information to the user terminal;
s202, receiving first verification information returned by the user terminal, and verifying and authorizing the user identity according to the first verification information;
s203, binding the value A and the user related information, and performing function operation on the binding information to obtain a value B;
and S204, performing associated storage on the commodity information, the value A, the user related information and the value B to form commodity archive information.
2. The method for anti-counterfeiting right confirmation of the commodities according to claim 1, further comprising unbinding after the right confirmation, wherein the unbinding is performed by the following method,
the value A and the related information of the user terminal are unbound through verification to obtain unbound information, the unbound information comprises unbound verification information, a current timestamp and commodity information, then the unbound information is subjected to function operation to obtain a value C, and the value C is added into the commodity archive information; and after unbinding, if a new user or a scene needing to re-determine the right of the commodity exists, re-performing the right determining step.
3. The method for anti-counterfeiting validation of commodities according to claim 2, wherein the method for unbinding the value A and the information related to the user terminal through verification comprises,
receiving request information for unbinding the user terminal, and then sending second verification information to the user;
and receiving second verification information returned by the user terminal, verifying the second verification information, and unbinding the value A corresponding to the commodity and the related information of the user terminal after the verification is passed.
4. The method for anti-counterfeiting right confirmation of the commodity according to claim 1, further comprising recording commodity use information after the right confirmation, wherein the method for recording the commodity use information comprises the following steps,
at different stages of commodity use, the use condition information of the commodity is obtained, and the commodity use condition information, the corresponding commodity information and the user related information of the current commodity are subjected to function operation to obtain a value DiAnd i represents the number of times of acquiring the service condition information of the commodity and takes the value DiAnd performing association storage.
5. The method for confirming anti-counterfeiting of a commodity according to claim 1, wherein in step S203, after the value a is bound with the related information of the user terminal, a timestamp is added to the bound information, and then a function operation is performed to obtain a value B.
6. The method for securing the authenticity against counterfeiting of a commodity according to claim 1, wherein the information related to the user comprises a mobile phone number and/or micro-signal information of the user.
7. The method for anti-counterfeiting right confirmation of commodities as claimed in claim 1, wherein the function operation is a hash algorithm.
8. The method for anti-counterfeiting right for commodities according to any one of claims 1 to 7, characterized by further comprising the following steps,
in response to the right division operation of human-computer interaction, dividing the commodity ownership into at least two parts, and binding or unbinding each part of the divided commodity ownership;
responding to the uploading operation of the protocol information of the human-computer interaction, and storing the protocol information into the commodity archive information; when the agreement information is different user information bound to each commodity, different users corresponding to the different user information perform constraint agreements aiming at the commodity, and the constraint agreements are consensus information achieved aiming at one or more of commodity occupation time, commodity occupation mode, commodity keeping responsibility, commodity keeping obligation and indemnification responsibility.
9. The device for anti-counterfeiting right confirmation of the commodities is characterized by comprising a memory, a processor and a transceiver which are sequentially connected, wherein the memory is used for storing a computer program, the transceiver is used for receiving and sending messages, and the processor is used for reading the computer program and executing the method for anti-counterfeiting right confirmation of the commodities according to any one of claims 1 to 8.
10. A storage medium having stored thereon instructions for performing the method of tamper-proof authentication of a commodity according to any one of claims 1 to 8 when the instructions are run on a computer.
CN202210639799.3A 2022-06-08 2022-06-08 Method, device and storage medium for anti-counterfeiting right confirmation of commodities Active CN114723465B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210639799.3A CN114723465B (en) 2022-06-08 2022-06-08 Method, device and storage medium for anti-counterfeiting right confirmation of commodities
PCT/CN2022/115669 WO2023236369A1 (en) 2022-06-08 2022-08-30 Commodity anti-counterfeiting and ownership confirmation method and apparatus, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210639799.3A CN114723465B (en) 2022-06-08 2022-06-08 Method, device and storage medium for anti-counterfeiting right confirmation of commodities

Publications (2)

Publication Number Publication Date
CN114723465A true CN114723465A (en) 2022-07-08
CN114723465B CN114723465B (en) 2022-09-09

Family

ID=82232757

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210639799.3A Active CN114723465B (en) 2022-06-08 2022-06-08 Method, device and storage medium for anti-counterfeiting right confirmation of commodities

Country Status (2)

Country Link
CN (1) CN114723465B (en)
WO (1) WO2023236369A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117097507A (en) * 2023-07-05 2023-11-21 成都安易迅科技有限公司 Method for issuing verification short message content and method for sending verification short message
WO2023236369A1 (en) * 2022-06-08 2023-12-14 深圳市易初推因科技有限公司 Commodity anti-counterfeiting and ownership confirmation method and apparatus, and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105809457A (en) * 2016-03-24 2016-07-27 河南李烨包装科技有限公司 System and method for authenticating commodity through coupled double codes
CN108711092A (en) * 2018-05-17 2018-10-26 立旃(上海)科技有限公司 Method and device is weighed really based on block chain
CN109034851A (en) * 2018-09-05 2018-12-18 深圳正品创想科技有限公司 Commodity counterfeit prevention source tracing method and its device, block chain node based on block chain
CN109523280A (en) * 2018-11-23 2019-03-26 浙江工商大学 Method for anti-counterfeit of tracing to the source based on ownership on a kind of block chain
CN112184252A (en) * 2019-06-17 2021-01-05 雲禾(浙江)科技集团有限公司 Commodity anti-counterfeiting tracing method based on block chain technology
CN112348534A (en) * 2020-10-30 2021-02-09 遵义乐亿科技有限公司 Anti-counterfeiting source tracing code method based on block chain technology
CN112651052A (en) * 2020-12-24 2021-04-13 江苏通付盾科技有限公司 Data right confirming method and system based on block chain technology
CN113269565A (en) * 2021-05-11 2021-08-17 重庆邮电大学 Anti-counterfeiting identification method and device for anti-reuse identification code and electronic equipment
WO2021223591A1 (en) * 2020-05-07 2021-11-11 京东数科海益信息科技有限公司 Article information processing method and apparatus, device, and computer readable storage medium
CN114581104A (en) * 2022-03-03 2022-06-03 武汉权信技术有限公司 Anti-counterfeiting and right-confirming method and device based on block chain NFT technology

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114723465B (en) * 2022-06-08 2022-09-09 深圳市易初推因科技有限公司 Method, device and storage medium for anti-counterfeiting right confirmation of commodities

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105809457A (en) * 2016-03-24 2016-07-27 河南李烨包装科技有限公司 System and method for authenticating commodity through coupled double codes
CN108711092A (en) * 2018-05-17 2018-10-26 立旃(上海)科技有限公司 Method and device is weighed really based on block chain
CN109034851A (en) * 2018-09-05 2018-12-18 深圳正品创想科技有限公司 Commodity counterfeit prevention source tracing method and its device, block chain node based on block chain
CN109523280A (en) * 2018-11-23 2019-03-26 浙江工商大学 Method for anti-counterfeit of tracing to the source based on ownership on a kind of block chain
CN112184252A (en) * 2019-06-17 2021-01-05 雲禾(浙江)科技集团有限公司 Commodity anti-counterfeiting tracing method based on block chain technology
WO2021223591A1 (en) * 2020-05-07 2021-11-11 京东数科海益信息科技有限公司 Article information processing method and apparatus, device, and computer readable storage medium
CN112348534A (en) * 2020-10-30 2021-02-09 遵义乐亿科技有限公司 Anti-counterfeiting source tracing code method based on block chain technology
CN112651052A (en) * 2020-12-24 2021-04-13 江苏通付盾科技有限公司 Data right confirming method and system based on block chain technology
CN113269565A (en) * 2021-05-11 2021-08-17 重庆邮电大学 Anti-counterfeiting identification method and device for anti-reuse identification code and electronic equipment
CN114581104A (en) * 2022-03-03 2022-06-03 武汉权信技术有限公司 Anti-counterfeiting and right-confirming method and device based on block chain NFT technology

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023236369A1 (en) * 2022-06-08 2023-12-14 深圳市易初推因科技有限公司 Commodity anti-counterfeiting and ownership confirmation method and apparatus, and storage medium
CN117097507A (en) * 2023-07-05 2023-11-21 成都安易迅科技有限公司 Method for issuing verification short message content and method for sending verification short message

Also Published As

Publication number Publication date
CN114723465B (en) 2022-09-09
WO2023236369A1 (en) 2023-12-14

Similar Documents

Publication Publication Date Title
CN114723465B (en) Method, device and storage medium for anti-counterfeiting right confirmation of commodities
JP6936949B2 (en) Methods and devices to facilitate electronic payments using wearable devices
US11798008B2 (en) Blockchain-based product authentication system
US8099365B2 (en) Extended data collection for multi-merchant purchasing environment for downloadable products
US7548889B2 (en) Payment information security for multi-merchant purchasing environment for downloadable products
US11394547B2 (en) Transaction agents and systems
US8931689B2 (en) Systems and methods for anti-counterfeit authentication through communication networks
US8108309B2 (en) Protecting a manufactured item from counterfeiting
EP3779750A1 (en) User identity content information authentication and verification methods and devices
CN109426868A (en) Life period of equipment distribution ledger
CN102779284B (en) RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like
US20090171847A2 (en) Multi-merchant purchasing environment for downloadable products
US20060167812A1 (en) Communication mechanisms for multi-merchant purchasing environment for downloadable products
CN101009014A (en) Secure anti-counterfeiting method and system thereof
US20060167809A1 (en) Software assistant for multi-merchant purchasing environment for downloadable products
CN115885303A (en) Ownership data management system and method
EP4040720B1 (en) Secure identity card using unclonable functions
US20050222932A1 (en) Electronic commerce method, electronic commerce system, certificate terminal, and principal certification method by agent
CN117426073A (en) Trusted chain of custody for verifiable credentials
CN117240605B (en) Data transaction method, device, equipment and storage medium
WO2012020291A2 (en) System for checking the authenticity of articles
TW202013228A (en) Voucher verification auxiliary device, system and method thereof
KR102346085B1 (en) Method for Trading Ownership of Products
AU2019100668A4 (en) A Method of Providing Secure Ownership of an Object
CN110798321B (en) Article information service method based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant