CN115131037A - Method and device for detecting commodity fleeing goods - Google Patents

Method and device for detecting commodity fleeing goods Download PDF

Info

Publication number
CN115131037A
CN115131037A CN202210768767.3A CN202210768767A CN115131037A CN 115131037 A CN115131037 A CN 115131037A CN 202210768767 A CN202210768767 A CN 202210768767A CN 115131037 A CN115131037 A CN 115131037A
Authority
CN
China
Prior art keywords
commodity
code scanning
information
code
goods
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210768767.3A
Other languages
Chinese (zh)
Inventor
康暖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ant Blockchain Technology Shanghai Co Ltd
Original Assignee
Ant Blockchain Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ant Blockchain Technology Shanghai Co Ltd filed Critical Ant Blockchain Technology Shanghai Co Ltd
Priority to CN202210768767.3A priority Critical patent/CN115131037A/en
Publication of CN115131037A publication Critical patent/CN115131037A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10544Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
    • G06K7/10821Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Landscapes

  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • Electromagnetism (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the specification provides a method and a device for detecting commodity channel conflict. In the method, at each commodity distribution point flowing through in the commodity distribution process, scanning codes of commodities to generate code scanning information, wherein the commodity distribution points comprise brand merchants and sales terminals, the commodities correspond to unique identification information, and the code scanning information comprises the identification information and the commodity distribution point information for executing code scanning operation; linking the code scanning information generated at each commodity distribution point to a block chain; and commodity channel conflict detection is carried out aiming at the operation area and/or the operation channel to which the commodity belongs according to the code scanning information corresponding to the commodity recorded on the block chain.

Description

Method and device for detecting commodity fleeing goods
Technical Field
The embodiment of the specification relates to the technical field of block chains, in particular to a method and a device for detecting commodity channel conflict.
Background
In the process from production to arrival at the hands of the consumer, the commodities need to pass through various commodity distribution points such as brands, various distributors and sales terminals, and are finally traded to the consumer by the sales terminal. The distribution points of the commodities through which the commodities flow constitute a distribution path of the commodities. There may be multiple distribution paths for each type of item to serve different regions, different groups of people, etc. For example, the distribution routes corresponding to different commodities belonging to the same type may be different, and for example, if the region where a certain type of commodity is supplied includes the south china region and the north china region, some commodities belonging to the type are supplied in the south china region, and some commodities are supplied in the north china region.
The different distribution paths of the same type of goods can have differences in price, quantity of goods and the like, and the goods on each distribution path can only be distributed and circulated through the distribution path, otherwise, the goods are in conflict. The goods fleeing can cause the goods market to be in a disorderly price and seriously lose the benefits of brand merchants. Therefore, how to detect the commodity fleeing goods in the commodity distribution process is a problem to be solved urgently.
Disclosure of Invention
In view of the above, the embodiments of the present specification provide a method and an apparatus for detecting a commodity fleeing good. Through the technical scheme provided by the embodiment of the specification, the distribution process of the commodities can be tracked to determine the distribution path of the commodities, and commodity channel conflict detection is carried out according to the distribution path so as to avoid commodity channel conflict. In addition, the block chain technology is introduced, and the reliability of commodity channel conflict detection is enhanced.
According to an aspect of the embodiments of the present specification, there is provided a method for detecting a commodity fleeing good, including: scanning the code of the commodity at each commodity distribution point flowing through in the commodity distribution process to generate code scanning information, wherein the commodity distribution point comprises a brand merchant and a sales terminal, the commodity corresponds to unique identification information, and the code scanning information comprises the identification information and the commodity distribution point information for executing code scanning operation; linking the code scanning information generated at each commodity distribution point to a block chain; and carrying out commodity channel conflict detection aiming at the operation area and/or the operation channel to which the commodity belongs according to the code scanning information corresponding to the commodity recorded on the block chain.
According to another aspect of embodiments herein, there is also provided a method for detecting a commodity fleeing good, performed by a server, the method including: receiving code scanning information generated by code scanning of goods from each commodity distribution point through which the goods flow in a distribution process, the commodity distribution point through which the goods flow including a brand merchant and a sales terminal, the goods corresponding to unique identification information, each code scanning information including the identification information and commodity distribution point information on which a code scanning operation is performed; linking each code scanning information corresponding to the commodity to a block chain; and carrying out commodity channel conflict detection aiming at the operation area and/or the operation channel to which the commodity belongs according to the code scanning information corresponding to the commodity recorded on the block chain.
According to another aspect of the embodiments of the present specification, there is also provided a method for detecting a commodity fleeing goods, performed by a sales terminal, the method including: receiving goods from an upstream dealer; and scanning the warehoused commodities to generate code scanning information so as to link the code scanning information to the block chain, and detecting commodity fleeing of a business area and/or a business channel to which the commodities belong according to the code scanning information corresponding to the commodities recorded on the block chain, wherein the code scanning information comprises unique identification information and sales terminal information corresponding to the commodities.
According to another aspect of embodiments herein, there is also provided a method for detecting a tampering of an article, performed by a dealer, the method comprising: warehousing goods received from an upstream goods distribution point; and scanning the code of the commodity to be delivered out of the warehouse to generate code scanning information so as to link the code scanning information to the block chain, and detecting commodity fleeing goods aiming at the operation area and/or the operation channel to which the commodity belongs according to the code scanning information corresponding to the commodity recorded on the block chain, wherein the code scanning information comprises unique identification information and dealer information corresponding to the commodity.
According to another aspect of the embodiments of the present specification, there is also provided an apparatus for detecting a commodity fleeing goods, applied to a server, the apparatus including: an information receiving unit that receives code scanning information generated by code scanning of a commodity from each commodity distribution point through which the commodity flows in a distribution process, the commodity distribution point through which the commodity flows including a brand merchant and a sales terminal, the commodity corresponding to unique identification information, each code scanning information including the identification information and commodity distribution point information on which a code scanning operation is performed; a chaining unit configured to chain each code scanning information corresponding to the commodity to a block chain; and the goods fleeing detection unit is used for detecting the goods fleeing of the business area and/or the business channel to which the goods belong according to the code scanning information corresponding to the goods recorded on the block chain.
According to another aspect of the embodiments of the present specification, there is also provided an apparatus for detecting a commodity fleeing goods, applied to a sales terminal, the apparatus including: an article receiving unit that receives an article from an upstream dealer; and the first code scanning unit is used for scanning the codes of the warehoused commodities to generate code scanning information so as to enable the code scanning information to be linked to the block chain, and commodity fleeing detection aiming at a business area and/or a business channel to which the commodities belong is carried out according to the code scanning information corresponding to the commodities recorded on the block chain, wherein the code scanning information comprises unique identification information corresponding to the commodities and sales terminal information.
According to another aspect of the embodiments of the present specification, there is also provided an apparatus for detecting a tampering of an article, applied to a dealer, the apparatus including: a commodity warehousing unit warehousing commodities received from an upstream commodity distribution point; and the second code scanning unit is used for scanning the codes of the commodities to be taken out of the warehouse so as to generate code scanning information, so that the code scanning information is linked to the block chain, and commodity fleeing detection aiming at the operation area and/or the operation channel to which the commodities belong is carried out according to the code scanning information corresponding to the commodities recorded on the block chain, wherein the code scanning information comprises unique identification information and dealer information corresponding to the commodities.
According to another aspect of embodiments herein, there is also provided an electronic device, including: at least one processor, a memory coupled to the at least one processor, and a computer program stored on the memory, the at least one processor executing the computer program to implement a method for detecting a tampering of a merchandise as described in any above.
According to another aspect of embodiments herein, there is also provided a computer-readable storage medium storing a computer program which, when executed by a processor, implements the method for detecting a tampering of an article of merchandise as described above.
According to another aspect of embodiments of the present specification, there is also provided a computer program product comprising a computer program which, when executed by a processor, implements the method for detecting a commercial product fleeing good as set forth above.
Drawings
A further understanding of the nature and advantages of the contents of the embodiments of the present specification may be realized by reference to the following drawings. In the drawings, similar components or features may have the same reference numerals.
FIG. 1 illustrates a schematic diagram of an example environment, according to embodiments of the present description.
Fig. 2 illustrates an example architectural diagram of a blockchain network in accordance with an embodiment of this specification.
Fig. 3 shows a flowchart of an example of a method for detecting a commercial product channel conflict according to an embodiment of the present disclosure.
Fig. 4 shows a schematic diagram of one example of a consensus process according to embodiments of the present specification.
Fig. 5 is a diagram illustrating an example of formats of a pre-preparation message, a preparation message, and an acknowledgement message in a consensus process according to an embodiment of the present specification.
Fig. 6 is a flowchart illustrating another example of a method for detecting a commercial product channel conflict according to an embodiment of the present disclosure.
Fig. 7 is a flowchart illustrating another example of a method for detecting a commercial product channel conflict according to an embodiment of the present disclosure.
Fig. 8 is a flowchart illustrating another example of a method for detecting a commercial product channel conflict according to an embodiment of the present disclosure.
Fig. 9 is a block diagram illustrating an example of an apparatus for detecting a tampering of a commodity according to an embodiment of the present disclosure.
Fig. 10 is a block diagram of another example of an apparatus for detecting a tampering of a merchandise item according to an embodiment of the present disclosure.
Fig. 11 is a block diagram of another example of an apparatus for detecting a tampering of a merchandise item according to an embodiment of the present disclosure.
Fig. 12 is a block diagram illustrating an electronic device for implementing a method for detecting a product fleeing goods according to an embodiment of the present disclosure.
Detailed Description
The subject matter described herein will be discussed with reference to example embodiments. It should be understood that these embodiments are discussed only to enable those skilled in the art to better understand and thereby implement the subject matter described herein, and are not intended to limit the scope, applicability, or examples set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the scope of the embodiments of the disclosure. Various examples may omit, substitute, or add various procedures or components as needed. In addition, features described with respect to some examples may also be combined in other examples.
As used herein, the term "include" and its variants mean open-ended terms in the sense of "including, but not limited to. The term "based on" means "based at least in part on". The terms "one embodiment" and "an embodiment" mean "at least one embodiment". The term "another embodiment" means "at least one other embodiment". The terms "first," "second," and the like may refer to different or the same object. Other definitions, whether explicit or implicit, may be included below. Unless the context clearly dictates otherwise, the definition of a term is consistent throughout the specification.
The block chain is a distributed shared account book and a database, and has the characteristics of decentralization, no tampering, trace retention, backtracking, openness and transparency and the like. The data on the block chain is stored in the form of data blocks, and the data blocks are connected in time sequence to form a chain data structure. Each block in the chain of blocks is linked to the previous block by an included cryptographic hash, and each block further includes a timestamp, a cryptographic hash, and one or more transactions. The individual transactions in the block form a Merkle tree by hashing. In a Merkle tree, the lowest leaf node contains the underlying data, each intermediate node is a hash of its child node, the root node is a hash of its child node, representing the root of the Merkle tree, and the root node of the Merkle tree stores hash values representing all the data in the Merkle tree. When verifying whether a hash value is a transaction stored in the Merkle tree, quick verification can be performed by determining whether the hash value is consistent with the structure of the Merkle tree.
A blockchain network is a decentralized point-to-point network consisting of multiple computing nodes for managing, updating, and maintaining one or more blockchain structures. The types of blockchain networks may include public blockchain networks, private blockchain networks, and alliance blockchain networks, depending on the degree of openness of the nodes in the blockchain network.
The public blockchain network is a public network of participating entities, thousands of entities can cooperate in the public blockchain network, each entity operates at least one node in the public blockchain network, and accordingly, the consensus process in the public blockchain network is also completed by each node. In the consensus process, a node participating in the consensus signs a block to indicate that the node acknowledges the consensus for the block, and then the block that completed the consensus is added to the block chain of the block chain network. In addition, the public blockchain network supports public transactions, and the public transactions are shared among all nodes in the public blockchain network and are stored in the global blockchain after being identified by all the nodes. A global blockchain refers to a blockchain that is replicated across all nodes. Consensus in a blockchain network is supported by a consensus mechanism, which is an algorithm for blockchain transactions to achieve distributed consensus, which may include: proof of work (POW), proof of rights (POS), and proof of authority (POA).
The private block chain network only aims at a specific entity, and the read-write permission of each node in the private block chain network is strictly controlled. In addition, the threshold for joining the private blockchain network is high, and it needs to be allowed to join the private blockchain network to become one of the nodes, based on which, the private blockchain network is also commonly referred to as an allowed network, which limits who is allowed to participate in the network and the participation level in the network, for example, some nodes may participate in the uplink process of all transactions, and some nodes may only participate in the uplink process of a designated part of transactions. Various types of access control mechanisms may be used in private blockchain networks, such as voting of adding new entities by existing participants, regulatory agency control permissions, and the like.
The participating entities in the federated blockchain network are also private and may be considered private networks of participating entities. A federated blockchain network may be composed of several entities, each of which operates at least one node in the federated blockchain network. The consensus process in the federated coalition blockchain network is performed by authorized nodes, which may be all or part of the nodes in the federated coalition blockchain network, each authorized node signing a block to be uplinked to indicate a consensus acknowledgement for that block, which is then added to the blockchain.
FIG. 1 illustrates a schematic diagram of an example environment 100, according to embodiments of the present description. As shown in fig. 1, the example environment 100 allows entities to participate in a blockchain network 102. The blockchain network 102 may be, for example, a public, private, or alliance chain blockchain network. The example environment 100 may include computing devices 104, 106, 108, 110, 112 and a network 114. In one embodiment, the Network 114 may include a Local Area Network (LAN), a Wide Area Network (WAN), the Internet, or a combination thereof, and is connected to websites, user devices (e.g., computing devices), and backend systems. In an embodiment, the computing devices 104, 106, 108, 110, 112 may access the network 114 through wired and/or wireless communication.
In some cases, the computing devices 106, 108 may be nodes of a cloud computing system (not shown), or each computing device 106, 108 may be a separate cloud computing system, including multiple computers interconnected by a network and operating as a distributed processing system.
In an embodiment, the computing devices 104-108 may run any suitable computing system that enables them to act as nodes in the blockchain network 102. For example, the computing devices 104-108 may include, but are not limited to, servers, desktop computers, laptops, tablet computing devices, and smartphones. In an embodiment, the computing devices 104-108 can be affiliated with a related entity and used to implement a corresponding service, which can be used to manage transactions between an entity or entities, for example.
In one embodiment, the computing devices 104-108 respectively store a blockchain ledger corresponding to the blockchain network 102. The computing device 104 may be (or include) a web server for providing browser functionality that may provide visualization information related to the blockchain network 102 based on the network 114. In some cases, the computing device 104 may not participate in the blockchain verification, but rather monitor the blockchain network 102 to determine when other nodes (e.g., which may include the computing device 106 and 108) agree, and generate a corresponding blockchain visualization user interface accordingly.
In an embodiment, computing devices 110 and 112 may be client devices connected to blockchain network 102. For example, computing device 110 may be a terminal device at a medical facility platform and computing device 112 may be a terminal device at an advertising administration platform. Computing devices 110 and 112 may include, but are not limited to, servers, desktop computers, laptops, tablet computing devices, and smartphones.
In an embodiment, computing device 104 may receive a request initiated by a client device (e.g., computing device 110 or computing device 112) for a blockchain visualization user interface. In some cases, the nodes of the blockchain network 102 may also act as client devices, such as a user of the computing device 108 may send the request to the computing device 104 using a browser running on the computing device 108.
In response to the request, the computing device 104 may generate a blockchain visualization user interface (e.g., a web page) based on the stored blockchain ledger and send the generated blockchain visualization user interface to the requesting client device. If blockchain network 102 is a private type or a federated type blockchain network, the request for the blockchain visual user interface may include user authorization information, which may be verified by computing device 104 before generating and sending the blockchain visual user interface to the requesting client device, and the corresponding blockchain visual user interface returned after verification.
The blockchain visualization user interface may be displayed on the client device (e.g., as may be displayed in user interface 116 shown in fig. 1). When the blockchain ledger is updated, the display content of the user interface 116 may be updated accordingly. Further, user interaction with user interface 116 may result in requests to other user interfaces, such as a search results page that displays a block list, block details, transaction list, transaction details, account list, account details, contract list, contract details, or results of a user conducting a search of the block chain network, and so forth.
Fig. 2 illustrates an example architectural diagram of a blockchain network in accordance with an embodiment of this specification.
As shown in fig. 2, where server 220 is, or forms part of, a blockchain network 214, branders 221, distributors 223, and sales terminals 225 may serve as distribution points for goods, each using a client device communicatively coupled to server 220. The server 220 shown in fig. 2 is connected to one brand name provider 221, one distributor 223 and one sales terminal 225 as an example, the commodity distribution process of one commodity shown in fig. 2 is performed among one brand name provider 221, one distributor 223 and one sales terminal 225 as an example, and the server 220 may be further connected to a plurality of other brand names provider 221, a plurality of distributors 223 and a plurality of sales terminals 225 in a communication manner.
The brand dealer 221, the distributor 223, and the sales terminal 225 are each communicatively connected to the server 220 via a client device, and perform operations such as code scanning, data uploading, and the like via the client device. During the distribution process of the goods among the brander 221, the distributor 223 and the sales terminal 225, the generated code scanning information is collected by the server 220, and the server 220, which is a blockchain node in the blockchain network 214 or a component thereof, can uplink the collected code scanning information to the blockchain 216 for storage, so that the stored code scanning information can be prevented from being deleted or tampered.
In another example, server 220 is communicatively connected to a blockchain link point in a blockchain network. In this example, the server 220 sends the collected code scanning information to the block link node of the communication connection, and then the block link node packs and links the code scanning information to the block chain for storage.
FIG. 3 shows a flow chart of one example 300 of a method for detecting a commercial product tampering according to embodiments herein.
As shown in fig. 3, at 310, at each of the commodity distribution points flowed through during the commodity distribution process, the commodity may be scanned to generate code-scanned information.
The distribution process of the commodity is a process of transferring the commodity from a producer to a consumer, and in this specification embodiment, the distribution process of the commodity may be a process of transferring from a brand provider to a consumer. During distribution, the items may flow through various distribution points, each of which sends the items to downstream distribution points according to a predetermined supply chain of items until reaching the consumer.
The distribution points of the commodities flowed through in the commodity distribution process may include branders and sales terminals. The brander may be used to provide the goods so that the goods to be distributed may be issued by the brander. The sale terminal is the tail end of the commodity distribution process and is the final port for the commodity to reach the consumer to complete the transaction, and the commodity is traded to the consumer by the sale terminal. The sales terminals may include shops, monopoly, retail stores, and merchants and the like.
In the embodiment of the present specification, each commodity may correspond to unique identification information, identification information corresponding to different commodities may be different, and the commodity may be uniquely determined according to the identification information. In addition, each article may correspond to an identification code, which may include any one of a two-dimensional code, a one-dimensional code, and the like. The identification code of the commodity may include identification information corresponding to the commodity, a URL of the commodity, and the like, where the URL of the commodity is used to display information such as a production place, ingredients, and a commodity image of the commodity. The identification code of the article may be provided on the article to move along with the article, for example, the identification code of the article may be printed on a label sheet of the article. In one example, the identification code of the item may be encrypted, and the identification code may further include a random number for decrypting the encrypted identification code when scanned by the client device.
At each item distribution point, the code scanning operation may be performed on the identification code of the item using the respective owned client device to generate corresponding code scanning information. The code scanning information may include identification information of the goods and distribution point information of the goods performing the code scanning operation. For example, if the brand merchant performs a code scanning operation, the generated code scanning information includes the identification information of the commodity and the brand merchant information; and the sales terminal executes code scanning operation, and the generated code scanning information comprises the identification information of the commodity and the sales terminal information.
In one example, the distribution points for the items may also include distributors, with upstream distribution points of the distributors being brands or other distributors and downstream distribution points being sales terminals or other distributors. The distributors in the distribution of the goods may include one or more, for example, when a plurality of distributors are included, one or more of them may be distributors that are downstream of the brander, the other distributors are distributors, the upstream distribution point of the distributor is the distributor, the downstream may be connected to the sales terminal, and the other distributors may be connected.
In this example, as the item flows through various dealers, the item may be scanned at the dealers to generate code-scanned information. The code scanning information generated at this time may include identification information of the article and dealer information.
In one example, as the goods flow through the dealers, at the dealers, warehousing processing may be performed on the goods received from the upstream goods distribution points, and the warehoused goods may or may not be scanned. For example, the dealer may perform a key-in library operation on the warehoused goods, the key-in library operation being used for indicating that the dealer has received the goods, and the received goods may be added to the local inventory.
Further, at each dealer, when the article is taken out of stock, the taken-out article can be scanned, the article can be associated with a downstream article distribution point by the code scanning operation, and dealer code scanning information is generated. The downstream distribution point for the goods may comprise a downstream distributor or sales terminal, wherein the downstream distributor may comprise a distributor, i.e., a distributor downstream of the current distributor through which the goods flow.
The dealer code scanning information is code scanning information generated by the dealer through a code scanning operation, and the dealer code scanning information may include, in addition to identification information of the item and dealer information for performing the code scanning operation, associated information of the item and a downstream item distribution point, and the associated information may be used to determine a next item distribution point through which the item needs to flow after the current dealer, for example, the associated information may include a corresponding relationship between the item and the downstream item distribution point.
In this example, at each dealer, by associating the commodity taken out of stock with a downstream commodity distribution point, the responsibility of the dealer in distributing the commodity is clarified, thereby achieving strong control over the commodity distribution process. For example, the position of a sales terminal downstream of a distributor is inconsistent with a business area to which an article distributed by the distributor belongs, the association generated by the distributor when distributing the article is the association of the article and the downstream sales terminal, and the association can be used for determining that the distributor has an illegal act of article fleeing.
In one example, as the goods flow through the point-of-sale terminal, at the point-of-sale terminal, the warehoused goods may be scanned to generate point-of-sale terminal code scanning information. The code scanning information of the sales terminal is code scanning information generated by the sales terminal through code scanning operation, and the code scanning information of the sales terminal can also comprise code scanning position information of code scanning operation executed by the sales terminal besides identification information of commodities and the sales terminal information executing the code scanning operation. The code scanning position information can indicate the real-time position of the code scanning operation executed on the commodity by the sales terminal, and in addition, the code scanning position information can also indicate the position of the commodity of the code scanning operation executed by the sales terminal.
In this example, by code scanning position information included in code scanning information of a sales terminal on a block chain, a position where a commodity flows through the sales terminal can be determined, and when the position indicated by the code scanning position information is within a sales area to which the commodity belongs, it can be determined that the commodity does not have a channel conflict; when the position indicated by the code scanning position information is not in the sales area to which the commodity belongs, it can be determined that the commodity has a channel conflict.
In one example, the outbound good may be scanned at the brand merchant as the good is issued by the brand merchant. Through the code scanning operation, the commodities can be associated with downstream dealers, and brand dealer code scanning information is generated. The downstream dealer is adjacent to the brand dealer in the distribution path of the goods, i.e., the downstream dealer can directly receive the goods from the brand dealer. The brand name and merchant code scanning information is code scanning information generated by a brand name and merchant through code scanning operation, and can also comprise association information of the commodity and a downstream dealer in addition to identification information of the commodity and brand name and merchant information for executing code scanning operation.
The association information of the commodity and the downstream distributor can be used for characterizing the distribution path of the commodity from the brander to the distributor, and the business area and the business channel to which the commodity belongs can be further determined according to the distribution path characterized by the association relation. That is, the business area of the downstream dealer can be determined as the business area of the product, and the business channel of the downstream dealer can be determined as the business channel of the product. For example, if the business area for which the downstream dealer is responsible is north China and is also the dealer of the e-commerce channel, it can be determined that the business area to which the product sent by the brand dealer to the dealer belongs is north China and the business channel to which the product belongs is the e-commerce channel.
In addition, after the associated information is contained in the brand name code scanning information and linked to the blockchain storage, the associated information cannot be tampered, so that the distribution path of the goods from the brand name to the distributor is credible. When commodity fleeing goods detection is carried out according to the related information recorded on the block chain, the credibility of the commodity fleeing goods detection can be further improved.
In one example, at a dealer and/or a sales terminal, it may be detected whether the scanned identification code is reproduced when a code scanning operation is performed. The identification code may be generated from identification information of the corresponding article, the identification code may be already configured on the article before distribution of the article, and the configuration manner of the identification code may include at least one of attachment of the identification code on an article body, attachment of the identification code on a label of the article, attachment of the identification code on a package of the article, and the like.
The identification code may be generated by the brand, or may be generated by a third party authorized by the brand, such as a manufacturer authorized by the brand, a blockchain operator authorized by the brand, or the like. The identification code of the commodity is a legal code, and the code obtained by copying the legal identification code is a pirate code.
One way of copying the identification code is to photograph the identification code of the goods with a camera to generate an image with the identification code, which may display the identification code, thereby causing illegal scanning of the identification code when scanning the identification code presented in the image. The identification code is rendered in the image as a result of the copying of the identification code, the image at this time acting as a carrier for displaying the identification code, unlike the identification code itself. Because the characteristics that different carriers appear in the camera of sweeping the code when carrying out the operation of sweeping the code can be different, on this basis, can detect whether the identification code that scans duplicates according to characteristics such as moire, light.
When the identification code is determined not to be duplicated, that is, when the scanned identification code is determined to be a genuine code, it may be determined that the identification code matches the current product, so that the code scanning information generated by this code scanning operation may be linked to the block chain. When the identification code is determined to be copied, the identification code can be determined not to be matched with the current commodity, and the possibility that the commodity corresponding to the identification code is packaged exists, so that the possibility that the commodity is channel conflict exists.
In this example, the identification code duplication detection may be performed at each dealer and each sales terminal each time the code scanning operation is performed, so as to process the detected product corresponding to the duplication identification code in real time, and avoid continuous circulation of the product corresponding to the duplication identification code. Further, the identification code duplication detection may be performed only at each sales terminal, or may be performed only at each dealer.
In one example, at a dealer and/or a sales terminal, when a code scanning operation is performed, it may be detected whether a tag of an article is counterfeit. The tag of the goods may be generated by the brand, and may also be generated by a third party authorized by the brand, such as an authorized manufacturer of the brand, an authorized blockchain operator of the brand, and so on.
The genuine label of the goods may be a specially processed label so as to be distinguished from the counterfeit label. For example, the micro-texture of the label is anti-counterfeit processed by anti-counterfeit technology, in one example, the label can be printed by ink printing technology, and different ink diffusion patterns can be formed due to different diffusion of ink on different materials. Thus, the ink spreading pattern can be determined according to the material used for the positive label, and the ink spreading pattern can be determined as a standardized ink spreading pattern for comparison. When the ink spreading pattern formed on the detected label matches the standardized ink spreading pattern, it may be determined that the label is a genuine label; when the ink spreading pattern formed on the detected label does not match the standardized ink spreading pattern, it can be determined that the label is a counterfeit label.
Upon determining that the tag is not counterfeit, it may be determined that the tag matches the current item, and the code scan information may be linked to the block chain. When the label is determined to be counterfeit, the label can be determined not to match the current commodity, and the possibility of commodity fleeing exists.
In this example, label forgery detection may be performed each time a code scanning operation is performed at each dealer and each sales terminal, so as to process the detected product corresponding to the forged label in real time, and prevent the product corresponding to the forged label from continuing circulation. Further, the tag forgery detection may also be performed only at each sales terminal, or may be performed only at each dealer.
It should be noted that, at the dealer and/or the sales terminal, the identification code duplication detection and the label forgery detection may be performed at the same time, and only the identification code duplication detection or the label forgery detection may be performed. When a commodity distribution point executes code scanning operation, the identification code copying detection and the label counterfeiting detection are executed at the same time, and the code scanning information can be linked only under the condition that the identification code is determined not to be copied and the label is determined not to be counterfeited; the code scanning information cannot be linked up as long as it is determined that the identification code is a duplicate or that the tag is counterfeit.
Returning to fig. 3, at 320, the code-scanning information generated at each commodity distribution point may be linked to a blockchain.
At each commodity distribution point, after code scanning information is generated, the client device can send the generated code scanning information to the server based on the communication connection between the client device performing the code scanning operation and the server. The server may link the code-scanning information received from the distribution point of goods.
In the uplink process, the block chain can be packed into blocks together, then the blocks are linked to the block chain, each block chain link point in the block chain network can be used as a common identification node to perform common identification processing on the blocks to be linked, and after the common identification is achieved, the blocks are recorded on the block chain.
Fig. 4 illustrates a schematic diagram of one example 400 of a consensus process in accordance with embodiments of the present specification. In the example of fig. 4, the accounting node (i.e., the master node) is R0, referred to hereinafter as the master node in this example. The determined consensus nodes (i.e., backup nodes) participating in consensus may include R1, R2, and R3, referred to hereinafter as backup nodes in this example. It should be noted that the consensus process shown in fig. 4, which includes 4 network nodes R0, R1, R2, and R3, is for illustrative purposes only, and the consensus process may include any suitable number of network nodes.
The master node R0 performs a consensus process with all consensus nodes participating in the consensus in the blockchain network, for example, the master node R0 performs a consensus process with the backup nodes R1, R2, and R3.
In the present disclosure, the consensus process may be implemented using PoW (workload proof algorithm), PoS (equity proof algorithm), PBFT (practical byzantine fault-tolerant algorithm), and the like. The following description will be made by taking the PBFT consensus process as an example.
As shown in fig. 4, the procedure of the PBFT consensus process includes: a Pre-preparation phase (Pre-preparation) 410, a preparation phase (preparation) 420, and a validation phase (Commit) 430.
Specifically, at 410, the master node R0 packages the transaction data to be recorded into the blockchain into a message m, then generates a Pre-prepare message Pre-prepare, and sends (e.g., broadcasts) the Pre-prepare message Pre-prepare to the backup nodes R1, R2, and R3 within a given time interval. The Pre-prepare message Pre-prepare indicates that master node R0 is initiating the consensus process.
In the embodiment of the present specification, as shown in fig. 5, the format of the Pre-preparation message Pre-preparation may be: < PRE-PREPARE, epoch, seq, D (m), signature-p >, m, j >. Here, "PRE-PREPARE" indicates a protocol identifier of the preliminary preparation message, "epoch" indicates an age in which R0 is the master node, "seq" indicates a proposed number of proposals to be agreed upon, "d (m)" indicates a digest of the request message set, "signature-p" indicates a signature of R0, "m" indicates specific contents of the request message (i.e., specific contents of each piece of authentication information in the block), and "j" indicates a node identifier of R0. Here, d (m) is obtained by performing a hash calculation on each authentication information set in the block.
In the preparation stage 420, for each backup node (R1, R2, or R3), after receiving the Pre-preparation message Pre-preparation and detecting that the Pre-preparation message Pre-preparation is legitimate, the Pre-preparation message Pre-preparation may be stored in a local log, and a preparation message preparation for responding to the Pre-preparation message Pre-preparation may be generated and then broadcast to other nodes. The Prepare message Prepare indicates that the backup node has received the Pre-Prepare message Pre-Prepare from the primary node and is sending a reply in response to the Pre-Prepare message Pre-Prepare.
Accordingly, each backup node also receives preparation messages Prepare sent by other backup nodes. Taking backup node R1 as an example, after receiving the Prepare message Pre-Prepare sent by master node R0, backup node R1 broadcasts the generated Prepare message Pre-Prepare to master node R0, backup nodes R2, and R3. Accordingly, backup node R1 also receives Prepare message Prepare sent by primary node R0, backup nodes R2 and R3.
In this illustrative embodiment, the Prepare message Prepare broadcast by the backup node may be used to indicate the consensus commitment made by the backup node during the Prepare phase 420.
In this embodiment, as shown in fig. 5, the format of the preparation message Prepare may be: < PREPARE, epoch, seq, D (m), i, signature-i >. Here, "PREPARE" represents a protocol identifier of the preparation message PREPARE, "i" represents a node identifier of a node that transmits the preparation message PREPARE, and "signature-i" represents a signature of the node that transmits the preparation message PREPARE. The meaning of "epoch", "seq", and "d (m)" in the preparation message Prepare is the same as that of "epoch", "seq", and "d (m)" in the above-described preparation message Pre-Prepare.
In the validation phase 430, when a network node receives a sufficient number of Prepare messages Prepare from other network nodes, the network node determines that consensus has been achieved. For example, if the primary node R0 or backup nodes R1, R2, or R3 receive qurum (e.g., 2f +1, where f represents the number of failed network nodes) Prepare messages Prepare, it is determined that consensus is achieved between the network nodes. The primary node R0 or the backup node R1, R2 or R3 will then broadcast an acknowledgement message Commit to the other nodes.
In this embodiment, as shown in fig. 5, the format of the acknowledgment message Commit may be: < COMMIT, epoch, seq, D (m), p, signature-p >. Wherein "COMMIT" represents a protocol identification of the acknowledgment message COMMIT, "p" represents a node identification of a node that transmits the acknowledgment message COMMIT, and "signature-p" represents a signature of the node that transmits the acknowledgment message COMMIT. The meaning of "epoch", "seq" and "d (m)" in the acknowledgment message Commit is the same as that of "epoch", "seq" and "d (m)" in the aforementioned Pre-preparation message Pre-preparation.
In this illustrative embodiment, a node sends a confirmation message Commit and stores the confirmation message Commit in a local log to represent consensus commitments made by the node during the confirmation phase 430.
Returning to fig. 3, at 330, commodity fleeing goods detection for the business area and/or the business channel to which the commodity belongs may be performed according to each code scanning information corresponding to the commodity recorded on the block chain.
In this specification, all code scanning information of a commodity may be acquired from a block chain through identification information of the commodity. For example, the commodity distribution points flowing through a commodity distribution process include a brand merchant and a sales terminal, and then code scanning information of the brand merchant for the commodity and code scanning information of the sales terminal for the commodity can be acquired from the blockchain.
The commodity channel conflict comprises a business region channel conflict and a business channel conflict, the business region channel conflict is that commodities are not distributed and/or sold in the affiliated business region, and the business channel conflict commodities are not distributed and/or sold in the affiliated business channel.
The business region to which the commodity belongs is used for limiting the region in which the commodity is distributed and/or sold, and each commodity can be distributed and sold only in the business region to which the commodity belongs. If the commodity is distributed and/or sold in an area outside the business area, the commodity can be determined to have a channel conflict in the business area.
The business channel to which each commodity belongs may define a business channel through which the commodity is distributed and sold, the business channel may include a conventional channel, an e-commerce channel, a group purchase channel, etc., and the business channel to which each commodity belongs may include at least one channel. Each commodity can be distributed and sold only in the affiliated business channel. If the commodity is distributed and/or sold through other business channels except the business channel, the commodity can be determined to have the business channel conflict.
In one example, the business area and/or business channel to which each commodity belongs may be predetermined by a brand, and the business area and/or business channel to which the commodity belongs may be determined from the brand. In one example, when a brand name scans a product, information of a predetermined business region and/or business channel to which the product belongs may be added to the generated code-scanning information, and then linked. Therefore, the business region and/or business channel to which the commodity belongs can be determined according to the code scanning information recorded on the brand name provider on the block chain.
In another example, when a brand name scans a code of an ex-warehouse commodity, the commodity can be associated with a downstream dealer, and a business area and/or a business channel to which the commodity belongs can be determined through the association relationship with the downstream dealer, that is, the business area of the associated downstream dealer is the business area to which the commodity belongs, and the channel in charge of the associated downstream dealer is the business channel to which the commodity belongs.
In this example, at the brand owner, the association information of the goods with the downstream dealer may be added to the generated code scanning information, so that the business area and/or business channel to which the goods belong may be determined according to the code scanning information at the brand owner recorded on the blockchain.
In the embodiment of the specification, the actual selling area and the actual operation channel of the commodity can be determined according to the code scanning information recorded on the block chain at the selling terminal. Specifically, the area where the sales terminal is located may be determined as an actual sales area of the commodity, and the sales channel of the sales terminal may be determined as an actual operation channel of the commodity. For example, when the sales terminal is a store located in north china, it may be determined that the actual sales area of the goods flowing through the sales terminal is north china; when the operation channel of the sales terminal is an e-commerce channel, it may be determined that the actual operation channel of the goods flowing through the sales terminal is the e-commerce channel.
For commodity fleeing detection in the operation area, the operation area to which the commodity belongs can be compared with the actual operation area of the commodity to determine whether the commodity has the fleeing. Specifically, when the operation area to which the commodity belongs is consistent with the actual operation area of the commodity, it can be determined that the commodity has no channel conflict; when the operation area to which the commodity belongs is not consistent with the actual operation area of the commodity, the commodity can be determined to have the channel conflict.
Aiming at commodity channel conflict detection, the operation channel to which the commodity belongs can be compared with the actual operation channel of the commodity to determine whether the commodity has conflict. Specifically, when the operation channel to which the commodity belongs is consistent with the actual operation channel of the commodity, it can be determined that the commodity has no channel conflict; when the operation channel to which the commodity belongs is inconsistent with the actual operation channel of the commodity, the commodity can be determined to have the channel conflict.
In one example, when the commodity is detected to have the channel conflict, the feedback can be made to the brand provider in real time so as to prompt the brand provider to check the distribution process of the commodity and further determine the commodity distribution point of the commodity channel conflict. And carrying out early warning on commodity distribution points with goods fleeing behaviors, and executing punishment measures such as reduction of marketing profit sharing and the like.
In an example, in a case that the commodity distribution point further includes a distributor and the code scanning information generated at the distributor is also linked, each code scanning information corresponding to the commodity may be acquired from the block chain, and includes code scanning information respectively generated by the brand distributor, the distributor and the sales terminal, and each code scanning information may further include a time point for performing a code scanning operation, so that when the code scanning information of the commodity is summarized, a generation sequence of each code scanning information may be determined according to the time point in the code scanning information, where the sequence is an execution sequence of the commodity scanning by each commodity distribution point, that is, an actual distribution path of the commodity.
For example, the time point in the code-scanning information generated by the brand dealer is earlier than the time point in the code-scanning information generated by the dealer, and the time point in the code-scanning information generated by the dealer is earlier than the time point in the code-scanning information generated by the sales terminal, so that it can be determined that the actual distribution route of the product is: brand → distributor → sales terminal.
After the actual distribution route is determined, commodity fleeing detection can be performed according to the actual distribution route and aiming at the business area and/or business channel to which the commodity belongs. Specifically, the business area and/or business channel to which the goods belong is determined according to the preset of the brand provider or according to the association relationship between the goods associated with the brand provider and the downstream distributor. The actual sale area and/or the actual operation channel of the commodity at the sale terminal can be determined according to the code scanning information generated by the sale terminal. In addition, the actual sale area and/or the actual operation channel of the goods at the dealer can be determined according to the code scanning information generated by the dealer. The actual sales area and/or actual business channel for each dealer and the sales terminal are compared with the business area and/or business channel to which the commodity belongs, respectively, to determine whether the commodity fleeing exists at each dealer and the sales terminal. Through carrying out commodity scurrying detection to each other commodity distribution point except brand merchant, when there is the problem of commodity scurrying, can determine the commodity distribution point of first scurrying in the actual distribution route of commodity. A distribution point for the first channel conflict may be given a more stringent penalty than a distribution point for subsequent channel conflict, e.g., deduct more marketing credits, etc.
For example, in the actual distribution route of the brand → distributor → the sales terminal, the business area to which the commodity belongs is the north china area, the actual sales area of the commodity at the distributor can be determined to be the south china area according to the code scanning information of the distributor, the actual sales area of the commodity at the sales terminal can be determined to be the south china area according to the code scanning information of the sales terminal, so that the commodity can be determined to have a channel conflict, and the first channel conflict commodity distribution point in the actual distribution route of the commodity is the distributor.
In one example of the embodiment of the present specification, in a case where the sales terminal does not scan the code for the article, the code scanning information generated at the sales terminal is not recorded on the block chain, and the code scanning information generated at the dealer is not recorded. After the goods are traded to the consumer through the sales terminal, the goods can be scanned at the consumer to generate the code scanning information of the consumer. The code scanning information of the consumer can comprise identification information of the scanned goods and position information of the consumer, and the position represented by the position information is a real-time position when the code is scanned by the consumer.
After the customer code scanning information is obtained, the customer code scanning information may be linked to the blockchain for storage. In this example, the customer may perform a code scanning operation using the client device, and the client device may send the customer code scanning information to the server after generating the customer code scanning information, and the server may uplink the customer code scanning information.
In this example, the commodity fleeing goods detection can be performed according to the code scanning information of the consumers recorded on the block chain and the business area to which the commodity belongs. Specifically, whether the position represented by the position information in the code scanning information of the consumer is in the commercial area to which the commodity belongs is judged, and when the position represented by the position information is in the commercial area to which the commodity belongs, it can be determined that the commodity has no channel conflict. When the position represented by the position information is not in the commercial region to which the commodity belongs, the possibility of commodity channel conflict can be determined, and the detection result can be fed back to the brand trader, so that the brand trader can further detect commodity channel conflict.
Fig. 6 shows a flow chart of another example 600 of a method for detecting a commercial product tampering according to an embodiment of the present description. The commodity fleeing goods detection method shown in fig. 6 may be performed by a server.
As shown in fig. 6, code scanning information generated by scanning a code for an item is received from each item distribution point at 610.
The commodity flows through each commodity distribution point in the distribution process, the commodity distribution points flowing through the commodity comprise brand merchants and sales terminals, the commodity corresponds to unique identification information, and each code scanning information comprises the identification information and the commodity distribution point information for executing code scanning operation.
In one example, the distribution points for the items through which the items flow may also include a dealer at which the items may be scanned to generate code-scanned information.
At 620, each code scanning information corresponding to the goods is linked to the block chain.
At 630, commodity fleeing goods detection aiming at the business area and/or the business channel to which the commodity belongs is carried out according to the code scanning information corresponding to the commodity recorded on the block chain.
In one example, the code scanning information corresponding to the commodity acquired from the blockchain may be aggregated to determine an actual distribution path of the commodity; and detecting commodity channel conflict aiming at the business region and/or the business channel to which the commodity belongs according to the actual distribution path.
In one example, in the case that the sales terminal does not scan the code of the commodity, consumer code scanning information generated by scanning the code of the commodity can be received from the consumer, the consumer code scanning information is linked to the blockchain, and commodity fleeing detection is performed according to the consumer code scanning information recorded on the blockchain and the business area to which the commodity belongs.
FIG. 7 shows a flow diagram of another example 700 of a method for detecting a tampering of a merchandise item in accordance with an embodiment of the present description. The commodity fleeing goods detection method illustrated in fig. 7 may be performed by a sales terminal.
As shown in FIG. 7, at 710, merchandise is received from an upstream dealer.
At 720, the warehoused commodities are scanned to generate code scanning information, so that the code scanning information is linked to the block chain, and commodity fleeing detection aiming at the operation area and/or the operation channel to which the commodities belong is carried out according to the code scanning information corresponding to the commodities recorded on the block chain. The code scanning information comprises unique identification information and sales terminal information corresponding to the commodity.
In one example, when the goods flow through the sales terminal, the goods in storage are scanned at the sales terminal to generate the sales terminal code scanning information, and the sales terminal code scanning information may further include code scanning position information.
In one example, when a code scanning operation is performed, whether a scanned identification code is copied or not is detected, and the identification code is generated by identification information; and linking the code scanning information to the block chain when the identification code is determined not to be copied.
In one example, when a code scanning operation is performed, whether a label of a commodity is forged is detected; and when the label is determined not to be forged, the code scanning information is linked to the block chain.
Fig. 8 shows a flow diagram of another example 800 of a method for detecting a commercial product tampering according to embodiments herein. The commodity fleeing goods detection method illustrated in fig. 8 may be performed by a dealer.
As shown in fig. 8, at 810, the goods received from the upstream distribution point of the goods are warehoused.
At 820, the goods to be delivered from the warehouse are scanned to generate code scanning information, so that the code scanning information is linked to the block chain, and goods fleeing detection aiming at the operation area and/or the operation channel to which the goods belong is carried out according to the code scanning information corresponding to the goods recorded on the block chain. The code scanning information comprises unique identification information and dealer information corresponding to the commodities.
In one example, as the item flows through the distributor, at the distributor, the ex-warehouse item is scanned to associate the item with a downstream item distribution point, including a downstream distributor or a downstream sales terminal, and distributor scanned information is generated, the distributor scanned information also including information associating the item with the downstream item distribution point.
In one example, when a code scanning operation is performed, whether a scanned identification code is copied or not is detected, and the identification code is generated by identification information; and linking the code scanning information to the block chain when the identification code is determined not to be duplicated.
In one example, when a code scanning operation is performed, whether a label of a commodity is forged is detected; and when the label is determined not to be forged, the code scanning information is linked to the block chain.
Fig. 9 is a block diagram showing an example of an apparatus for detecting a commodity tampering (hereinafter, simply referred to as a first commodity tampering detecting apparatus 900) according to an embodiment of the present specification. The first merchandise channel conflict detection apparatus 900 may be applied to a server.
As shown in fig. 9, the first merchandise channel conflict detection apparatus 900 includes an information receiving unit 910, an uplink unit 920 and a channel conflict detection unit 930.
The information receiving unit 910 may be configured to receive code scanning information generated by scanning a code of an item from each item distribution point. The commodity flows through each commodity distribution point in the distribution process, the commodity distribution points flowing through the commodity comprise brand merchants and sales terminals, the commodity corresponds to unique identification information, and each code scanning information comprises the identification information and the commodity distribution point information for executing code scanning operation.
The uplink unit 920 may be configured to uplink the code scanning information corresponding to the goods to the block chain.
The goods fleeing detection unit 930 may be configured to perform the goods fleeing detection for the business area and/or the business channel to which the goods belong according to the code scanning information corresponding to the goods recorded on the block chain.
In one example, the first merchandise channel detection device 900 may further include a code scanning information gathering unit, which may be configured to: the code scanning information corresponding to the commodities acquired from the blockchain can be summarized to determine the actual distribution path of the commodities. The fleeting goods detection unit 930 may be further configured to: and carrying out commodity channel conflict detection aiming at the business region and/or business channel to which the commodity belongs according to the actual distribution path.
In one example, in a case where the sales terminal does not scan a code for the goods, the information receiving unit 910 may be further configured to: consumer code scanning information generated by scanning a code for an item may be received from a consumer. The uplink unit 920 may also be configured to: the customer code scanning information is linked to the block chain. The fleeting goods detection unit 930 may be further configured to: and carrying out commodity channel conflict detection according to the code scanning information of the consumer recorded on the block chain and the operation area to which the commodity belongs.
Fig. 10 is a block diagram illustrating another example of an apparatus for detecting a product tampering (hereinafter, referred to as a second product tampering detecting apparatus 1000) according to an embodiment of the present disclosure. The second commodity fleeing goods detection device 1000 may be applied to a sales terminal.
As shown in fig. 10, the second commodity fleeing goods detection device 1000 includes: an article receiving unit 1010 and a first scan code unit 1020.
The article receiving unit 1010 may be configured to receive an article from an upstream dealer.
The first code scanning unit 1020 may be configured to scan a code of a warehoused commodity to generate code scanning information, so that the code scanning information is linked to a block chain, and commodity fleeing detection is performed for a business area and/or a business channel to which the commodity belongs according to each piece of code scanning information corresponding to the commodity recorded on the block chain, where the code scanning information includes unique identification information and sales terminal information corresponding to the commodity.
In one example, the first scanning unit 1020 may be further configured to: when the commodity flows through the sales terminal, the sales terminal scans the code of the warehoused commodity to generate the code scanning information of the sales terminal, and the code scanning information of the sales terminal can also comprise code scanning position information.
In one example, the second merchandise fleeing detection device 1000 may further include: an identification code duplication detection unit, which may be configured to: detecting whether the scanned identification code is copied or not when the code scanning operation is executed, wherein the identification code is generated by identification information; and linking the code scanning information to the block chain when the identification code is determined not to be duplicated.
In one example, the second merchandise fleeing detection device 1000 may further include: a tag forgery detection unit that can be configured to: when code scanning operation is executed, whether a label of a commodity is forged or not is detected; and when the label is determined not to be forged, the code scanning information is linked to the block chain.
Fig. 11 is a block diagram illustrating another example of an apparatus for detecting a product tampering (hereinafter, referred to as a third product tampering detecting apparatus 1100) according to an embodiment of the present disclosure. The third merchandise fleeing detection device 1100 may be applied to a dealer.
As shown in fig. 11, the third product fleeing detection device 1100 includes: a goods warehousing unit 1110 and a second code scanning unit 1120.
The goods warehousing unit 1110 may be configured to warehouse goods received from an upstream goods distribution point.
The second code scanning unit 1120 may be configured to scan codes of the commodities to be delivered from the warehouse, so as to generate code scanning information, link the code scanning information to the block chain, and perform commodity fleeing detection for a business area and/or a business channel to which the commodities belong according to each code scanning information corresponding to the commodities recorded on the block chain, where the code scanning information includes unique identification information and dealer information corresponding to the commodities.
In one example, the second code scanning unit 1120 may be further configured to: when the goods flow through the dealer, at the dealer, the goods out of the warehouse are scanned to associate the goods with a downstream goods distribution point, and dealer scanned code information is generated, wherein the downstream goods distribution point comprises a downstream dealer or a downstream sales terminal, and the dealer scanned code information also comprises the association information of the goods with the downstream goods distribution point.
In one example, the third merchandise fleeing detection device 1100 may further include an identification code duplication detection unit, which may be configured to: when code scanning operation is executed, whether the scanned identification code is copied or not is detected, and the identification code is generated by identification information; and linking the code scanning information to the block chain when the identification code is determined not to be duplicated.
In one example, the third merchandise drunkenness detection apparatus 1100 may further include a tag forgery detection unit, which may be configured to: detecting whether a label of a commodity is forged or not when code scanning operation is executed; and when the label is determined not to be forged, the code scanning information is linked to the block chain.
Embodiments of a method and apparatus for detecting a commercial product channel conflict according to embodiments of the present disclosure are described above with reference to fig. 1 to 11.
The device for detecting the commodity channel conflict in the embodiments of the present specification may be implemented by hardware, or may be implemented by software, or a combination of hardware and software. The software implementation is taken as an example, and is formed by reading corresponding computer program instructions in the storage into the memory for operation through the processor of the device where the software implementation is located as a logical means. In the embodiments of the present specification, the device for detecting the commodity fleeing goods may be implemented by using an electronic device, for example.
Fig. 12 is a block diagram of an electronic device 1200 for implementing a method for detecting a product fleeing goods according to an embodiment of the present disclosure.
As shown in fig. 12, the electronic device 1200 may include at least one processor 1210, a memory (e.g., non-volatile storage) 1220, a memory 1230, and a communication interface 1240, and the at least one processor 1210, the memory 1220, the memory 1230, and the communication interface 1240 are connected together via a bus 1250. The at least one processor 1210 executes at least one computer-readable instruction (i.e., the elements described above as being implemented in software) stored or encoded in memory.
In one embodiment, computer-executable instructions are stored in the memory that, when executed, cause the at least one processor 1210 to: receiving code scanning information generated by scanning a code of a commodity from each commodity distribution point, wherein the commodity flows through each commodity distribution point in a distribution process, the commodity distribution point through which the commodity flows comprises a brand merchant and a sales terminal, the commodity corresponds to unique identification information, and each code scanning information comprises the identification information and the commodity distribution point information for executing the code scanning operation; linking each code scanning information corresponding to the commodity to a block chain; and commodity channel conflict detection is carried out aiming at the operation area and/or the operation channel to which the commodity belongs according to the code scanning information corresponding to the commodity recorded on the block chain.
In another embodiment, computer-executable instructions are stored in the memory that, when executed, cause the at least one processor 1210 to: receiving goods from an upstream dealer; and scanning the warehoused commodities to generate code scanning information so that the code scanning information is linked to the block chain, and commodity channel conflict detection aiming at the operation area and/or the operation channel to which the commodities belong is performed according to the code scanning information corresponding to the commodities recorded on the block chain, wherein the code scanning information comprises unique identification information corresponding to the commodities and sale terminal information.
In another embodiment, computer-executable instructions are stored in the memory that, when executed, cause the at least one processor 1210 to: warehousing commodities received from an upstream commodity distribution point; and scanning the code of the commodity to be delivered out of the warehouse to generate code scanning information so as to link the code scanning information to the block chain, and detecting commodity channel conflict aiming at the operation area and/or the operation channel to which the commodity belongs according to the code scanning information corresponding to the commodity recorded on the block chain, wherein the code scanning information comprises unique identification information and dealer information corresponding to the commodity.
It should be appreciated that the computer-executable instructions stored in the memory, when executed, cause the at least one processor 1210 to perform the various operations and functions described above in connection with fig. 1-11 in the various embodiments of the present description.
According to one embodiment, a program product, such as a machine-readable medium, is provided. A machine-readable medium may have instructions (i.e., elements described above as being implemented in software) that, when executed by a machine, cause the machine to perform various operations and functions described above in connection with fig. 1-11 in the various embodiments of the present specification.
Specifically, a system or apparatus may be provided which is provided with a readable storage medium on which software program code implementing the functions of any of the above embodiments is stored, and causes a computer or processor of the system or apparatus to read out and execute instructions stored in the readable storage medium.
In this case, the program code itself read from the readable medium can realize the functions of any of the above-described embodiments, and thus the machine-readable code and the readable storage medium storing the machine-readable code form part of the present invention.
Computer program code required for the operation of various portions of the present specification may be written in any one or more programming languages, including an object oriented programming language such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C + +, C #, VB, NET, Python, and the like, a conventional programming language such as C, Visual Basic 2003, Perl, COBOL2002, PHP, and ABAP, a dynamic programming language such as Python, Ruby, and Groovy, or other programming languages. The program code may execute on the user's computer, or on the user's computer as a stand-alone software package, or partially on the user's computer and partially on a remote computer, or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
Examples of the readable storage medium include floppy disks, hard disks, magneto-optical disks, optical disks (e.g., CD-ROMs, CD-R, CD-RWs, DVD-ROMs, DVD-RAMs, DVD-RWs), magnetic tapes, nonvolatile memory cards, and ROMs. Alternatively, the program code may be downloaded from a server computer or from the cloud via a communications network.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
Not all steps and elements in the above flows and system structure diagrams are necessary, and some steps or elements may be omitted according to actual needs. The execution order of the steps is not fixed, and can be determined as required. The apparatus structures described in the foregoing embodiments may be physical structures or logical structures, that is, some units may be implemented by the same physical entity, or some units may be implemented by multiple physical entities separately, or some units may be implemented by some components in multiple independent devices together.
The term "exemplary" used throughout this specification means "serving as an example, instance, or illustration," and does not mean "preferred" or "advantageous" over other embodiments. The detailed description includes specific details for the purpose of providing an understanding of the described technology. However, the techniques may be practiced without these specific details. In some instances, well-known structures and devices are shown in block diagram form in order to avoid obscuring the concepts of the described embodiments.
Although the embodiments of the present disclosure have been described in detail with reference to the accompanying drawings, the embodiments of the present disclosure are not limited to the specific details of the embodiments, and various simple modifications may be made to the technical solutions of the embodiments of the present disclosure within the technical spirit of the embodiments of the present disclosure, and all of them fall within the scope of the embodiments of the present disclosure.
The previous description of the specification is provided to enable any person skilled in the art to make or use the specification. Various modifications to the disclosure will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other variations without departing from the scope of the disclosure. Thus, the description is not intended to be limited to the examples and designs described herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (18)

1. A method for detecting a tampering with a merchandise, comprising:
scanning the code of each commodity distribution point flowing through in the commodity distribution process to generate code scanning information, wherein each commodity distribution point comprises a brand merchant and a sales terminal, each commodity corresponds to unique identification information, and the code scanning information comprises the identification information and the commodity distribution point information for executing code scanning operation;
linking the code scanning information generated at each commodity distribution point to a block chain; and
and carrying out commodity channel conflict detection aiming at the operation area and/or the operation channel to which the commodity belongs according to the code scanning information corresponding to the commodity recorded on the block chain.
2. The method of claim 1, wherein the merchandise distribution point further comprises a dealer, the method further comprising:
scanning the goods at the dealer to generate code scanning information as the goods flow through the dealer.
3. The method of claim 2, further comprising:
collecting the code scanning information corresponding to the commodity acquired from the block chain to determine the actual distribution path of the commodity; and
the commodity fleeing goods detection aiming at the business area and/or the business channel to which the commodity belongs according to the code scanning information corresponding to the commodity recorded on the block chain comprises the following steps:
and carrying out commodity channel conflict detection aiming at the business region and/or the business channel to which the commodity belongs according to the actual distribution path.
4. The method of claim 2, wherein scanning the item at the dealer to generate code-scanning information as the item flows through the dealer comprises:
while the goods flow through the dealer, scanning the goods out of stock at the dealer to associate the goods with a downstream distribution point of the goods including a downstream dealer or a downstream sales terminal, and generating dealer scanned-code information including association information of the goods with the downstream distribution point of the goods.
5. The method of any one of claims 1-4, wherein scanning the item at each of the commodity distribution points through which the item flows during distribution to generate code-scanned information comprises:
when the commodity flows through the sales terminal, scanning the code of the warehoused commodity at the sales terminal to generate sales terminal code scanning information, wherein the sales terminal code scanning information further comprises code scanning position information.
6. The method of any one of claims 1-4, wherein scanning the item at each of the commodity distribution points through which the item flows during distribution to generate code-scanned information comprises:
scanning, at the brand dealer, the merchandise ex-warehouse when the merchandise is issued by the brand dealer to associate the merchandise with the downstream dealer, and generating brand dealer scanned-code information, wherein the brand dealer scanned-code information further includes association information of the merchandise with the dealer.
7. The method of claim 2, further comprising:
detecting, at the dealer and/or the sales terminal, whether the scanned identification code is copied when a code scanning operation is performed, the identification code being generated from the identification information; and
and when the identification code is determined not to be copied, linking the code scanning information to the block chain.
8. The method of claim 2, further comprising:
detecting, at the dealer and/or the sales terminal, whether a label of the article is counterfeit while performing a code scanning operation; and
upon determining that the tag is not counterfeit, the code scanning information is uplinked to the blockchain.
9. The method of claim 1, wherein in the event that the merchandise is not code scanned by the point of sale terminal, the method further comprises:
at a consumer, scanning the goods to generate consumer code scanning information, wherein the consumer code scanning information comprises the identification information and the location information of the consumer;
uplink the customer code scanning information to the blockchain; and
and carrying out commodity channel conflict detection according to the consumer code scanning information recorded on the block chain and the business area to which the commodity belongs.
10. A method for detecting a tampering with a merchandise, performed by a server, the method comprising:
receiving code scanning information generated by code scanning of goods from each commodity distribution point through which the goods flow in a distribution process, the commodity distribution point through which the goods flow including a brand merchant and a sales terminal, the goods corresponding to unique identification information, each code scanning information including the identification information and commodity distribution point information on which a code scanning operation is performed;
linking each code scanning information corresponding to the commodity to a block chain; and
and carrying out commodity channel conflict detection aiming at the operation area and/or the operation channel to which the commodity belongs according to the code scanning information corresponding to the commodity recorded on the block chain.
11. A method for detecting a tampering with a merchandise, performed by a point of sale terminal, the method comprising:
receiving an item from an upstream dealer; and
scanning the warehoused commodities to generate code scanning information so as to link the code scanning information to the block chain, carrying out commodity fleeing detection aiming at the operation area and/or the operation channel to which the commodities belong according to the code scanning information corresponding to the commodities recorded on the block chain,
and the code scanning information comprises unique identification information and sales terminal information corresponding to the commodity.
12. A method for detecting a tampering with an item, performed by a dealer, the method comprising:
warehousing goods received from an upstream goods distribution point; and
scanning the code of the commodity to be delivered out of the warehouse to generate code scanning information so as to link the code scanning information to the block chain, carrying out commodity fleeing detection aiming at the operation area and/or the operation channel to which the commodity belongs according to the code scanning information corresponding to the commodity recorded on the block chain,
the code scanning information comprises unique identification information and dealer information corresponding to the commodities.
13. An apparatus for detecting commodity channel conflict, which is applied to a server, the apparatus comprises:
an information receiving unit that receives code scanning information generated by code scanning of a commodity from each commodity distribution point through which the commodity flows in a distribution process, the commodity distribution point through which the commodity flows including a brand merchant and a sales terminal, the commodity corresponding to unique identification information, each code scanning information including the identification information and commodity distribution point information on which a code scanning operation is performed;
a chaining unit configured to chain each code scanning information corresponding to the commodity to a block chain; and
and the goods fleeing detection unit is used for detecting the goods fleeing of the operation area and/or the operation channel to which the goods belong according to the code scanning information corresponding to the goods recorded on the block chain.
14. A device for detecting commodity channel conflict, which is applied to a sales terminal, and comprises:
an article receiving unit that receives an article from an upstream dealer; and
a first code scanning unit for scanning the warehoused commodities to generate code scanning information so as to chain the code scanning information to the block chain, and carrying out commodity channel conflict detection aiming at the operation area and/or the operation channel to which the commodities belong according to each code scanning information corresponding to the commodities recorded on the block chain,
and the code scanning information comprises unique identification information and sales terminal information corresponding to the commodity.
15. An apparatus for detecting a tampering of an article, applied to a dealer, the apparatus comprising:
a commodity warehousing unit warehousing commodities received from an upstream commodity distribution point; and
a second code scanning unit, which scans codes of the commodities to be delivered from the warehouse to generate code scanning information, so that the code scanning information is linked to the block chain, and commodity fleeing goods detection aiming at the operation area and/or the operation channel to which the commodities belong is carried out according to each code scanning information corresponding to the commodities recorded on the block chain,
the code scanning information comprises unique identification information and dealer information corresponding to the commodities.
16. An electronic device, comprising: at least one processor, a memory coupled with the at least one processor, and a computer program stored on the memory, the at least one processor executing the computer program to implement the method of any of claims 10-12.
17. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 10-12.
18. A computer program product comprising a computer program which, when executed by a processor, implements the method of any one of claims 10-12.
CN202210768767.3A 2022-06-30 2022-06-30 Method and device for detecting commodity fleeing goods Pending CN115131037A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210768767.3A CN115131037A (en) 2022-06-30 2022-06-30 Method and device for detecting commodity fleeing goods

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210768767.3A CN115131037A (en) 2022-06-30 2022-06-30 Method and device for detecting commodity fleeing goods

Publications (1)

Publication Number Publication Date
CN115131037A true CN115131037A (en) 2022-09-30

Family

ID=83380999

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210768767.3A Pending CN115131037A (en) 2022-06-30 2022-06-30 Method and device for detecting commodity fleeing goods

Country Status (1)

Country Link
CN (1) CN115131037A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116703430A (en) * 2023-08-09 2023-09-05 山东未来网络研究院(紫金山实验室工业互联网创新应用基地) Commodity channeling early warning method and system based on identification analysis

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116703430A (en) * 2023-08-09 2023-09-05 山东未来网络研究院(紫金山实验室工业互联网创新应用基地) Commodity channeling early warning method and system based on identification analysis
CN116703430B (en) * 2023-08-09 2024-02-06 山东未来网络研究院(紫金山实验室工业互联网创新应用基地) Commodity channeling early warning method and system based on identification analysis

Similar Documents

Publication Publication Date Title
EP4165855B1 (en) Systems and methods for building blockchains for verifying assets for smart contracts
CN109544160B (en) Transaction authenticity verification method and system based on block chain and intelligent contract
US20220311599A1 (en) Digital Ledger For Unique Item IDs With Ownership
CN108764877B (en) Digital asset right-confirming trading method based on block chain technology
Ha et al. DeM-CoD: novel access-control-based cash on delivery mechanism for decentralized marketplace
CN105096134A (en) Security scheme for authenticating digital entities and aggregate object origins
JP2016512675A (en) Secure trading system and method
EP3987427A1 (en) Distributed data records
CN111383020B (en) Block chain-based article anti-counterfeiting management method, device, equipment and storage medium
US11516001B2 (en) Method and system for generalized provenance solution for blockchain supply chain applications
CN109508973A (en) Price control method, apparatus and block catenary system based on block chain
CN106663272A (en) Electronic transaction certificate management system
CN111339550A (en) Comment information credibility method based on block chain technology
Chitre et al. Monitoring counterfeit drugs using counterchain
CN115131037A (en) Method and device for detecting commodity fleeing goods
CN110417917A (en) Method, system, computer equipment and medium for bill circulation
CN110349322B (en) Invoice data verification method, device and equipment
WO2023092235A1 (en) System and method for encapsulating trust mechanisms into non-fungible tokens
RU2322692C1 (en) Method for identification and accounting of movement of marked objects and informational system for realization of the method
CN115099863A (en) Block chain-based method and device for commodity rebate
WO2013120511A1 (en) System for providing additional information about an on sale product, in particular for preventing fraud practices
Kuehn A new business model in the fine arts realm based on NFT certificates and pearl codes
CN114531260A (en) Information processing method based on alliance chain system and related equipment
Raut et al. Fake Product Restriction using BlockChain
CN115330413A (en) Block chain-based legal version code generation method and legal version code generation device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination