CN115760151A - Management method and system of jewelry tracing information - Google Patents

Management method and system of jewelry tracing information Download PDF

Info

Publication number
CN115760151A
CN115760151A CN202211360601.4A CN202211360601A CN115760151A CN 115760151 A CN115760151 A CN 115760151A CN 202211360601 A CN202211360601 A CN 202211360601A CN 115760151 A CN115760151 A CN 115760151A
Authority
CN
China
Prior art keywords
information
tracing
data
entity
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211360601.4A
Other languages
Chinese (zh)
Inventor
陈昱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Shanghai Baoyushi Trading Center Co ltd
Original Assignee
China Shanghai Baoyushi Trading Center Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Shanghai Baoyushi Trading Center Co ltd filed Critical China Shanghai Baoyushi Trading Center Co ltd
Priority to CN202211360601.4A priority Critical patent/CN115760151A/en
Publication of CN115760151A publication Critical patent/CN115760151A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a management method and a system of jewelry tracing information, wherein the method comprises the steps of carrying out qualification audit on participants of gem and jade trade, and allowing the qualified participants who are audited to enter the tracing information of gem and jade; auditing the tracing information of the gems and jades input by all qualified participants in all nodes of the gem and jade transaction, and recording the tracing information meeting the requirements in a tracing system of the gems and jades; and according to the inventory condition of the entity documents, matching each piece of tracing information recorded in the tracing system with the entity documents respectively, and performing anti-counterfeiting verification on the matching. The system comprises a qualification management subsystem, a data management subsystem and a distribution supervision subsystem. According to the technical scheme, the source supervision of the participant who inputs the tracing information can be carried out, the tracing information is audited to ensure the authenticity of the information, the entity document is scientifically managed and strictly anti-counterfeit, and the information supervision and safety guarantee of the tracing information is realized in multiple aspects and multiple dimensions.

Description

Management method and system of jewelry tracing information
Technical Field
The invention relates to the technical field of jewelry information management, in particular to a management method and a management system of jewelry tracing information.
Background
In the jewelry transaction and the material right circulation process, the information tracing of the gemstones and the operation of the buyer and the seller are necessary procedures. However, in the current jewelry market, there are two problems:
first, there are few professional tracing products that satisfy the characteristics of the gem and jade industry. Products needing information tracing in various trading markets are various, but products such as gemstones and jade which have unique industrial characteristics such as small size, high value and difficult supervision and industrial pain points, particularly naked stone products, due to the small size, the gemstones and jade cannot be printed or pasted with labels on medicines or instruments like the information tracing of medical products. Moreover, when the jewelry transaction is carried out, buyers and sellers need to frequently identify the gems and jades, so that the information tracing of the gems and jades cannot be traced like wine or food, and the marking package is used for completely closed supervision.
Secondly, the precious and jade tracing products running in the precious and jade industry pay attention to all technical means to solve the authenticity problem of tracing information when each node is input, the tracing information carrier circulation problem and how to perfect a service closed loop. However, the problem is that if the enterprise entering the traceability information has authenticity problems or other qualification problems, the credibility of the traceability information entered by the enterprise is questionable. At present, most tracing products use a block chain technology to improve the credibility of the products, but the core of the block chain is to solve the problems that information cannot be tampered and decentralized, if the information provided by an enterprise is wrong, the block chain technology has no effect, and if the inputted information cannot be verified and supervised in multiple ways in the tracing information input stage, the credibility of the information cannot be solved.
In addition, at present, besides an information carrier, most traceable products are provided with issued entity documents as a propagation carrier, but most traceable products do not have a systematic inventory management and verification scheme, so that the problems of missed issuing, mistaken issuing or exhausted inventory and incapability of issuing the entity documents are easily caused in the issuing stage; meanwhile, the problem of entity document counterfeiting of the current traceable products is very serious, and how to prevent counterfeiting through an informatization means and strict supervision requirements is a problem which cannot be ignored due to the fact that counterfeiting of certificates is often prohibited due to the phenomenon of replete certificates.
Disclosure of Invention
The invention aims to overcome the defects in the prior art and provide a management method and a management system for jewelry tracing information, aiming at the problem that the tracing information of gemstones and jades in the prior art cannot ensure the reliability.
In order to realize the purpose, the invention is realized by the following technical scheme:
in a first aspect, the present invention provides a method for managing jewelry traceability information, the method comprising:
qualification examination is carried out on participants of the gem and jade trade, and the tracing information of the gem and jade is input through the qualified participants who are allowed to be examined;
auditing the tracing information of the gemstones and jades input by the qualified participants in each node of the gemstones and jades transaction, and recording the tracing information meeting the requirements in a tracing system of the gemstones and jades;
and according to the inventory condition of the entity documents, matching each piece of tracing information recorded in the tracing system with the entity documents respectively, and performing anti-counterfeiting verification on the matching.
In a preferred embodiment of the present application, in performing qualification review on participants of a gem and jade trade and allowing the qualified participants who are approved to enter the tracing information of gem and jade, the method specifically includes:
collecting the legal person information of the participating party, and verifying the authenticity of the legal person information to obtain a verification result;
acquiring administrative information and industry information of the participants aiming at the legal information with the real verification result, and evaluating the administrative information and the industry information to obtain an evaluation result;
and authenticating the participant with the evaluation result of being qualified as a qualified participant, and giving the qualified participant the authority of inputting the tracing information of the gemstones and jades.
In a preferred embodiment of the present application, the acquiring of the corporate information of the participating party and the verifying of the authenticity of the corporate information to obtain the verification result specifically includes:
collecting the corporate information of the participating party, and extracting portrait data and identity data in the corporate information;
comparing the portrait data and the identity data with the portrait information and the identity information of the participants stored in an enterprise information database through face recognition to obtain a portrait comparison result and an identity comparison result;
and when the portrait comparison result and the identity comparison result are matched, obtaining a verification result of the authenticity of the legal information as true.
In a preferred embodiment of the present application, for the legal information whose verification result is true, acquiring administrative information and industry information of the participating party, and evaluating the administrative information and the industry information to obtain an evaluation result specifically includes:
collecting administrative information and industry information of the participants;
summarizing the administrative information and the industry information according to a plurality of preset assessment dimensions to obtain summarized information under each assessment dimension;
and scoring the summarized information according to a preset scoring rule under each assessment dimension to obtain an assessment result for judging whether the participant is qualified.
In a preferred embodiment of the present application, in each node of a gem and jade transaction, each of the trace back information of the gem and jade entered by the qualified participants is audited, and the trace back information meeting the requirements is recorded in a trace back system of the gem and jade, which specifically includes:
obtaining the tracing information of the gemstones and jades input by the qualified participants;
performing data source audit, data format audit, data acquisition audit and data supplement audit on the tracing information to obtain a data audit result;
and recording the tracing information of which the data auditing result meets the preset requirement in a tracing system of the gem and jade.
In a preferred embodiment of the present application, the data source audit, the data format audit, the data acquisition audit and the data supplement audit are performed on the tracing information to obtain a data audit result, which specifically includes:
comparing the subject input with the tracing information with qualified participants with input authority, and auditing the data source input with the tracing information to obtain a source auditing result;
comparing a preset standard format with the format of the recorded tracing information, and checking the data format of the tracing information to obtain a format checking result;
comparing the acquired tracing information with the input tracing information, and auditing the data acquisition process of the tracing information to obtain an acquisition and audit result;
traversing each content in the tracing information, and checking whether each content data of the tracing information is complete or not to obtain a supplementary checking result;
and summarizing the source audit result, the format audit result, the acquisition audit result and the supplement audit result to obtain a data audit result.
In a preferred embodiment of the present application, in matching each piece of traceability information recorded in the traceability system with an entity document respectively according to an inventory condition of the entity document, and performing anti-counterfeit verification on the matching, the method specifically includes:
checking the inventory condition of the entity document by carrying out inventory management on the entity document;
when the inventory condition is good, counting the quantity of the tracing information recorded in the system, and calling out an equivalent entity document;
matching the tracing information with the entity documents one by one through a preset matching rule, storing the tracing information into the corresponding entity documents, and informing qualified participants who input the tracing information;
and respectively carrying out anti-counterfeiting encryption on the tracing information and the physical information of the entity document, and carrying out anti-counterfeiting verification on the entity document and the corresponding tracing information when the entity document is distributed.
In a preferred embodiment of the present application, in the case of checking the inventory of the entity documents through the inventory management of the entity documents, the method specifically includes:
checking the number of blank entity documents without stored information in real time, and verifying and canceling the entity documents with stored information in real time;
comparing the quantity of the blank entity documents with a preset lowest value, wherein when the quantity is greater than the preset lowest value, the inventory condition of the entity documents is good, and when the quantity is less than the preset lowest value, the inventory condition of the entity documents is tension;
and when the inventory condition is tension, sending a notice for replenishing the inventory.
In a preferred embodiment of the present application, after checking the inventory condition of the entity document by performing inventory management on the entity document, the method further includes:
unbinding the tracing information in the entity document with the stored information and the corresponding entity document through the preset matching rule, so that the entity document is changed into a blank entity document;
and bringing the blank entity documents into stock, and checking the stock condition.
In a second aspect, the invention provides a management system for jewelry tracing information, which comprises a qualification management subsystem, a data management subsystem and a distribution supervision subsystem;
the qualification management subsystem is used for performing qualification audit on participants of the gem and jade trade and allowing the approved qualified participants to enter the tracing information of the gem and jade;
the data management subsystem is used for auditing the tracing information of the gems and jades input by the qualified participants in each node of the gem and jade transaction, and recording the tracing information meeting the requirements in a tracing system of the gems and jades;
and the distribution supervision subsystem is used for respectively matching each piece of tracing information recorded in the tracing system with the entity documents according to the inventory condition of the entity documents and carrying out anti-counterfeiting verification on the matching.
In a preferred embodiment of the present application, the qualification management subsystem is specifically configured to:
collecting the corporate information of the participating party, and verifying the authenticity of the corporate information to obtain a verification result;
acquiring administrative information and industry information of the participants aiming at the legal information with the real verification result, and evaluating the administrative information and the industry information to obtain an evaluation result;
and authenticating the participant with the qualified evaluation result as a qualified participant, and giving the qualified participant the authority to enter the tracing information of the gemstones and jades.
In a preferred embodiment of the present application, when the qualification management subsystem collects the corporate information of the participating party and extracts portrait data and identity data in the corporate information, the qualification management subsystem is specifically configured to:
collecting the corporate information of the participating party, and extracting portrait data and identity data in the corporate information;
comparing the portrait data and the identity data with the portrait information and the identity information of the participants stored in an enterprise information database through face recognition to obtain a portrait comparison result and an identity comparison result;
and when the portrait comparison result and the identity comparison result are matched, obtaining a verification result of the authenticity of the legal information as true.
In a preferred embodiment of the present application, when the qualification management subsystem collects administrative information and industry information of the participating party for the information of the legal person whose verification result is true, and evaluates the administrative information and the industry information to obtain an evaluation result, the qualification management subsystem is specifically configured to:
collecting administrative information and industrial information of the participants;
summarizing the administrative information and the industry information according to a plurality of preset assessment dimensions to obtain summarized information under each assessment dimension;
and scoring the summarized information according to a preset scoring rule under each assessment dimension to obtain an assessment result for judging whether the participant is qualified.
In a preferred embodiment of the present application, the data management subsystem is specifically configured to:
obtaining the tracing information of the gems and jades input by the qualified participants;
performing data source audit, data format audit, data acquisition audit and data supplement audit on the tracing information to obtain a data audit result;
and recording the tracing information of which the data auditing result meets the preset requirement in a tracing system of the gem and jade.
In a preferred embodiment of the present application, when the data management subsystem performs data source audit, data format audit, data acquisition audit and data supplement audit on the trace back information to obtain a data audit result, the data management subsystem is specifically configured to:
comparing the subject input with the tracing information with qualified participants with input authority, and auditing the data source input with the tracing information to obtain a source auditing result;
comparing a preset standard format with the format of the recorded tracing information, and checking the data format of the tracing information to obtain a format checking result;
comparing the acquired tracing information with the input tracing information, and auditing the data acquisition process of the tracing information to obtain an acquisition and audit result;
traversing each content in the tracing information, and checking whether each content data of the tracing information is complete or not to obtain a supplementary checking result;
and summarizing the source audit result, the format audit result, the acquisition audit result and the supplement audit result to obtain a data audit result.
In a preferred embodiment of the present application, the distribution supervision subsystem is specifically configured to:
checking the inventory condition of the entity document by carrying out inventory management on the entity document;
when the inventory condition is good, counting the quantity of the tracing information recorded in the system, and calling out an equal amount of entity documents;
matching the tracing information with the entity documents one by one through a preset matching rule, storing the tracing information into the corresponding entity documents, and informing qualified participants who input the tracing information;
and respectively carrying out anti-counterfeiting encryption on the tracing information and the physical information of the entity document, and carrying out anti-counterfeiting verification on the entity document and the corresponding tracing information when the entity document is distributed.
In a preferred embodiment of the present application, when the distribution supervision subsystem performs inventory management on an entity document and checks an inventory condition of the entity document, the distribution supervision subsystem is specifically configured to:
checking the number of blank entity documents without stored information in real time, and verifying and canceling the entity documents with stored information in real time;
comparing the quantity of the blank entity documents with a preset lowest value, wherein when the quantity is greater than the preset lowest value, the inventory condition of the entity documents is good, and when the quantity is less than the preset lowest value, the inventory condition of the entity documents is tension;
and when the inventory condition is tension, sending a notice for replenishing the inventory.
In a preferred embodiment of the present application, after the distribution supervision subsystem checks the inventory condition of the entity documents by performing inventory management on the entity documents, the distribution supervision subsystem is further configured to:
unbinding the tracing information in the entity document with the stored information and the corresponding entity document through the preset matching rule, so that the entity document is changed into a blank entity document;
and bringing the blank entity documents into stock, and checking the stock condition.
In a third aspect, the present invention provides a computer-readable storage medium having stored therein a computer program which, when run on a computer, causes the computer to execute the jewelry traceability information management method according to the first aspect.
In a fourth aspect, the present invention provides a computer program product comprising a computer program which, when run on a computer, causes the computer to perform the method for managing jewelry retrospective information of the first aspect.
The management method and the system for the jewelry tracing information disclosed by the invention can be used for monitoring the source of a participant who inputs the tracing information, auditing the tracing information to ensure the authenticity of the information, carrying out scientific management and strict anti-counterfeiting on an entity document, and realizing the information monitoring and safety guarantee of the tracing information in multiple aspects and multiple dimensions.
Drawings
The invention is described with the aid of the following figures:
fig. 1 is a flowchart of a jewelry traceability information management method according to embodiment 1 of the present invention;
fig. 2 is another flowchart of a jewelry traceability information management method according to embodiment 1 of the present invention;
fig. 3 is another flowchart of a jewelry traceability information management method according to embodiment 1 of the present invention;
fig. 4 is another flowchart of a jewelry traceability information management method according to embodiment 1 of the present invention;
fig. 5 is another flowchart of a jewelry traceability information management method according to embodiment 1 of the present invention;
fig. 6 is another flowchart of a jewelry traceability information management method according to embodiment 1 of the present invention;
fig. 7 is another flowchart of a jewelry traceability information management method according to embodiment 1 of the present invention;
fig. 8 is another flowchart of a jewelry traceability information management method according to embodiment 1 of the present invention;
fig. 9 is another flowchart of a jewelry traceability information management method according to embodiment 1 of the present invention;
fig. 10 is a schematic view of a jewelry traceability information management system according to example 2 of the present invention.
Detailed Description
For better understanding of the technical solutions of the present application, the following detailed descriptions of the embodiments of the present application are provided with reference to the accompanying drawings.
It should be understood that the embodiments described are only a few embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The invention provides a management method and a management system for jewelry tracing information, which can solve the problems of source management and execution operation supervision of the tracing information of gemstones and provide a credible tracing information management tool for gemstones and jade for supervision departments and other enterprises in the industry. The management method and the management system provided by the invention are characterized in that strict qualification audit can be carried out from the source of the tracing information, namely, an information provider, and the problem of counterfeiting of the tracing information can be fundamentally avoided. Meanwhile, the management method and the management system provided by the invention can strictly supervise important operation steps and processes in the links of tracing the tracing information of the gem and jade, including the aspects of recording the tracing information, storing, matching and anti-counterfeiting of entity documents and the like, solve the pain points of industries with small volume, high value and difficult supervision of the gem and jade, and realize the aims of credible source, traceable destination and searchable quality. The method provides a standard, efficient, intelligent and feasible solution for the construction and management of a tracing supervision system of the tracing information of the gemstones and jades.
Example 1
The embodiment 1 of the invention discloses a management method of jewelry tracing information, which is used for monitoring the authenticity of the tracing information of gemstones and jades in the recording process and the safety of the main body, the content and the behavior of execution operation, and ensuring that the tracing information of the gemstones and jades has a complete integrity system and transaction safety.
Referring to fig. 1, the method of the present embodiment 1 includes:
step100: qualification audit is carried out on participants of gem and jade trade, and the tracing information of gem and jade is allowed to be input through the qualified participants of audit.
The participators are usually enterprises, and because the participators are main bodies for mastering the tracing information of a certain node or certain nodes in the gem and jade trading process, when the tracing information of the gem and jade is input by the participator direction tracing system, the tracing information is easily stolen or intercepted by lawless persons through various conventional means or high-tech means to influence the trading safety, or the identity information is wrongly input by some careless and careless persons to cause the tracing information of the gem and jade to be flawed to cause the trading obstacle. Therefore, before the participants and the tracing system interactively input the tracing information, qualification examination needs to be carried out on the participants, and the participants who input the tracing information of the gems and jades are ensured to be the main subjects of a certain node participating in the gem and jade transaction. Because the participants are usually enterprises, the qualification examination of the participants mainly includes the examination of enterprise administrative information, the examination of enterprise industry information and the examination of corporate qualification information, and the participants need to input the enterprise administrative information, the enterprise industry information and the corporate qualification information into a management system, and the management system performs comprehensive management and examination. The participants who are qualified and checked can be authenticated as qualified participants, so that the tracing information of the gem and jade can be input. By carrying out all-round qualification management and supervision on the source of the tracing information, namely an information provider, namely a participant, the tracing information is ensured not to be falsified when being input, the supervision range is enabled to be more advanced, and the credibility of the data source is ensured.
Step200: and auditing the tracing information of the gems and jades input by all qualified participants in all nodes of the gem and jade transaction, and recording the tracing information meeting the requirements in a tracing system of the gems and jades.
Wherein, the tracing information of the gem and jade at the current node is required to be input into the tracing system by the qualified participant at each node of the gem and jade transaction. When the Step100 verifies the subject of the input tracing information, namely the qualification of the participant, the tracing information of the input tracing system also needs to be verified. Due to the characteristics of small size, high value, high professional degree, difficulty in distinguishing true and false and the like of the gemstones and jades, the person who participates in the entering of the tracing information does not necessarily have complete and professional knowledge of the gemstones and jades, and therefore the situation that careless and careless persons mistake the tracing information of the gemstones and jades still exists in the entering stage. And still cannot exclude the identity of a lawbreaker from entering false or tuned-in traceability information into a traceability system. Therefore, the tracing information of the gems and jades is audited, the transaction safety and the data credibility are further ensured, and the establishment of an integrity system of the gems and jades transaction is facilitated. When the data of the tracing information is audited, a data source, a data standard, a data acquisition process and a data supplement audit process need to be supervised, the fact that the input source of the tracing information is safe, the input format is standard, the process of system data acquisition is compliant and the acquired data is comprehensive is ensured, and the tracing information generated at each node of the gem and jade transaction is ensured to have authenticity and accord with the supervision standard by carrying out multi-party data comparison and supervision on the tracing information.
Step300: and according to the inventory condition of the entity documents, matching each piece of tracing information recorded in the tracing system with the entity documents respectively, and performing anti-counterfeiting verification on the matching.
During the gem and jade transaction, documents are usually used as entity documents to store and record the tracing information. The documents used may be entity documents that may actually be distributed to the respective objects. Therefore, scientific management is carried out on the issuance of the entity documents, and the issuance efficiency can be improved. And the entity document is used as the entity document, and anti-counterfeiting authentication is required to be established between the entity document and the tracing information, so that the tracing information acquired by the object taking the entity document is safe, credible and traceable. Therefore, the inventory management and the verification of the entity documents, the intelligent matching between the entity documents and the tracing information, the data acquisition and the anti-counterfeiting verification of the entity documents are carried out, the method is used for strictly monitoring the non-replicability and inventory management of the entity document stored in the tracing information of the gemstones and jades, and is also convenient for issuing the entity document to qualified participants in the circulation link. The matching and anti-counterfeiting mechanism between the tracing information of the gemstones and the entity documents can improve the anti-counterfeiting capability of the entity documents. Meanwhile, the method can ensure that the two parties of the transaction can directly check the gems and jades on the premise of ensuring that the binding relationship exists between the commodity entity of the gems and jades and the entity document of the tracing information.
By adopting the management method of the embodiment 1, in the gem and jade trading process, the participant who inputs the tracing information is subjected to main qualification audit, the input tracing information is subjected to authenticity audit, an intelligent matching and anti-counterfeiting mechanism is established between the entity document for storing the tracing information and the tracing information, and in the process from the source of the tracing information to the end point of the tracing information, the tracing information is subjected to safety guarantee and authenticity guarantee at each link, so that the trade safety of the gem and jade trading market and the establishment of an information integrity system are guaranteed, and the supervision of a supervision department is facilitated.
Referring to fig. 2, in the method of this embodiment 1, step100 specifically includes:
step110: and collecting the information of the legal person of the participating party, and verifying the authenticity of the information of the legal person to obtain a verification result.
Step120: and acquiring administrative information and industry information of the participants aiming at the legal information with a true verification result, and evaluating the administrative information and the industry information to obtain an evaluation result.
Step130: and (4) authenticating the participant with the qualified evaluation result as the qualified participant, and giving the qualified participant the authority to enter the tracing information of the gemstones and jades.
Since the participating parties are typically businesses, the key to discerning the business' qualifications and whether they actually exist is to vet the corporate qualifications. Therefore, step110 is executed to check the information of the legal person of the participating party, so that the information of the legal person is ensured to be a real person and indeed a legal person of the participating party, and other legal problems and integrity problems do not exist. If the verified result of the legal information is that the legal information is false, the participant is determined as an unqualified participant and is not allowed to enter the traceability information into the traceability system. If the verification result checked by the information of the legal person is true, the enterprise qualification of the participant is not good.
Step120 is performed to evaluate the participants to determine whether they qualify as participants in a gem and jade transaction. This is because the enterprise has thousands of subjects without problems in terms of qualification, and not every subject has enough ability, qualification and expertise to participate in gem transaction, for example, vendors selling food obviously do not have the ability of gem transaction. Therefore, the administrative information and the industry information of the participants need to be comprehensively examined, the administrative information refers to the management architecture, the business scope, the administrative management capability, the cash flow, the condition of the assets and the like in the enterprise, and the industry information refers to the industry dynamic and development condition related to the business scope of the enterprise, the industry status of the participants in the industry, the market share and the like. Since the administrative information and the industrial information have many contents and a wide range, the administrative information and the industrial information need to be evaluated from multiple dimensions, such as the information of the industry and the business, the information of the corporate enterprise, the information of the customs clearance, the information of the internal transaction of the platform, the evaluation report of the third party, the information of the follow-up visit of the enterprise, and the like. For the qualified standard, the management system is preset with certain requirements, only the evaluation result of the participants meeting the requirements is qualified, and the evaluation result of the participants not meeting the requirements is unqualified.
And finally, executing Step130, and authenticating the participant with the qualified evaluation result as the qualified participant, wherein the qualified participant has the authority of accessing the tracing system to upload the tracing information of the gem and jade after the qualified participant is authenticated.
Through the auditing, authentication and permission issuing of the participants at steps 110 to 130, only qualified participants have the qualification of entering the tracing information. Certainly, the management system still occasionally re-approves the enterprise qualification of the authorized qualified participants who have issued the authority, so as to ensure that the authorized qualified participants are always in a safe, reliable and qualified state, and once the authorized participants are found to have the unqualified and illegal enterprise information change, the management system cancels the qualification thereof through re-approval, so that the authorized participants become unqualified participants and lose the qualification of inputting the tracing information.
Referring to fig. 3, in the method of this embodiment 1, step110 specifically includes:
step111: and collecting the corporate information of the participating parties, and extracting portrait data and identity data in the corporate information.
Step112: and comparing the portrait data and the identity data with the portrait information and the identity information of the participants stored in the enterprise information database through face recognition to obtain a portrait comparison result and an identity comparison result.
Step113: and when the portrait comparison result and the identity comparison result are matched, obtaining the authenticity verification result of the legal information as true.
In steps 111 to 113, a face recognition technology is adopted, and authenticity verification is performed on the corporate information by comparing whether the acquired portrait data and identity data are consistent with the portrait information and identity information in the enterprise information database. If the participant is a truly present and legally trusted principal, the results of the verification of his legal information are usually true. If a participant has some legal or credit flaws, the result of the verification of their corporate information is usually false. Only the legal information with the true verification result is considered to be the qualified legal of the participating party.
Referring to fig. 4, in the method of this embodiment 1, step120 specifically includes:
step121: administrative information and industry information of the participants are collected.
Step122: and summarizing the administrative information and the industry information according to a plurality of preset assessment dimensions to obtain summarized information under each assessment dimension.
Step123: and scoring the summarized information according to a preset scoring rule under each evaluation dimension to obtain an evaluation result for judging whether the participant is qualified.
In steps 121 to 123, when the administrative information and the industrial information of the participants are evaluated through each dimension, a preset evaluation method may be adopted to score the participants, for example, a percentile system may be adopted, each score obtained by the participants is weighted to obtain a total score, and a score line is set, if the score line is reached or exceeded, the qualification of the participants is qualified, and if the score line is fallen below, the qualification of the participants is unqualified, so that the evaluation result of the participants is obtained.
Referring to fig. 5, in the method of this embodiment 1, step200 specifically includes:
step210: and obtaining the tracing information of the gems and jades input by the qualified participants.
Step220: and performing data source audit, data format audit, data acquisition audit and data supplement audit on the tracing information to obtain a data audit result.
Step230: and recording the tracing information of which the data auditing result meets the preset requirement in a tracing system of the gem and jade.
After all processes of Step100 are executed, qualification auditing is completed for participants, and after the qualified participants meeting the requirements are given the authority of inputting the tracing information, steps 210-230 are required to be executed to audit the authenticity and the safety of the tracing information. Firstly, step210 is executed to carry out data acquisition on the tracing information of the gem and jade input by the qualified participant, and in the data acquisition process, the tracing information can be copied from the tracing system to the management system, or the tracing information can be directly copied to the management system while the tracing information is input by the qualified participant.
And then, step220 is executed to carry out all-around auditing on the tracing information. And checking the data source through checking whether the acquired tracing information originates from the input of qualified participants or not by the checking management system, checking the data format through whether the input format of the tracing information accords with the preset standard format or not, checking the data acquisition through whether the tracing information accords with the acquisition process specification in the acquisition process and whether the acquired tracing information is consistent with the input tracing information or not, and performing data supplement checking through whether key contents are omitted in the tracing information or not. And obtaining a data auditing result by comparing and verifying the tracing information in multiple aspects.
And finally, step230 is executed, the data auditing result is compared with the preset requirement, the data auditing result meeting the preset requirement shows that the tracing information is real, credible and safe, and the data auditing result not meeting the preset requirement shows that the tracing information has flaws in authenticity and safety and needs to be recorded again. The preset requirement refers to a customs clearance requirement which needs to be met when the gemstones and jades pass customs.
The entered tracing information is examined in multiple aspects through Step 210-Step 230, the tracing information with the flaw can be checked in time and the entered main body is informed to enter again, and the authenticity and the safety of the tracing information can be ensured from multiple dimensions for the tracing information meeting the requirements, so that the authenticity, the standard type and the available state of the acquired tracing information can be verified and supervised, and only the tracing information meeting the requirements can be automatically recorded in the tracing system of the gem and jade.
Referring to fig. 6, in the method of this embodiment 1, step220 specifically includes:
step221: and comparing the main body of the input tracing information with the qualified participants with the input authority to audit the data source of the input tracing information and obtain a source audit result.
Step222: and comparing the preset standard format with the format of the recorded tracing information, and checking the data format of the tracing information to obtain a format checking result.
Step223: and comparing the acquired tracing information with the input tracing information, and auditing the data acquisition process of the tracing information to obtain an acquisition and audit result.
Step224: and traversing each content in the tracing information, and checking whether each content data of the tracing information is complete or not to obtain a supplementary checking result.
Step225: and summarizing the source audit result, the format audit result, the acquisition audit result and the supplement audit result to obtain a data audit result.
The execution of steps 221 to 224 does not need to be executed in sequence, and can be executed synchronously as long as the source audit result, the format audit result, the acquisition audit result and the supplement audit result can be obtained, and the sequence of the four steps is not important. And finally, by executing Step225, the four results of the source audit result, the format audit result, the acquisition audit result and the supplement audit result can be subjected to quantitative processing, and the data audit result is comprehensively obtained through weighting or other data processing modes.
Referring to fig. 7, in the method of this embodiment 1, step300 specifically includes:
step310: and checking the inventory condition of the entity documents by carrying out inventory management on the entity documents.
Step320: and when the inventory condition is good, counting the quantity of the retroactive information recorded in the system and calling out an equivalent entity document.
Step330: and matching the tracing information with the entity documents one by one through a preset matching rule, storing the tracing information into the corresponding entity documents, and informing qualified participants entering the tracing information.
Step340: and respectively carrying out anti-counterfeiting encryption on the tracing information and the physical information of the entity document, and carrying out anti-counterfeiting verification on the entity document and the corresponding tracing information when the entity document is distributed.
After all the processes of Step200 are executed and the authenticity and safety of the tracing information are checked, the tracing information of a single gem and jade is stored in a single entity document, and the source and the destination of the tracing information are calculated to form closed-loop supervision. The entity documents storing the tracing information of each gem and jade are usually presented in the form of documents, the entity documents with the entities are offline information carriers capable of realizing online and offline linkage anti-counterfeiting with the online tracing information, and the entity documents are convenient for the gem and jade trade site to distribute.
First, step310 is executed, and it is known how many entity documents are blank entity documents without stored information in the stock and how many entity documents with stored information are, so that there are enough entity documents when storing the newly entered trace information.
And when the inventory condition of the entity documents is good, executing Step320, so that each newly-entered tracing information can be stored by a corresponding entity document, and the safety of each tracing information can be guaranteed.
Then Step330 is executed to match each piece of trace back information in the trace back system to a blank entity document respectively, and the matching is not random matching but needs to follow a certain logic. The management system is preset with preset matching rules, and newly-entered tracing information can be automatically bound with the entity document through the type of the commodity, the enterprise to which the commodity belongs, the entered enterprise and the like. After the binding of the tracing information and the entity document is finished, the information can be pushed to the participant and the management system, and the matched information is informed to the participant and a person using the management system, so that the on-site issuing of the entity document is facilitated. The user can inquire the binding condition of the tracing information of the gem and jade and the entity document through the interface of the tracing system.
And finally, step340 is executed, anti-counterfeiting encryption operation is carried out on the tracing information and the physical information of the entity document, so that the final anti-counterfeiting authentication is completed, the anti-counterfeiting capability of the gems and jades in the transaction process is effectively improved, and the phenomenon that the gems and jades are inferior and false is true is avoided.
Through stock management, intelligent matching, data acquisition and anti-counterfeiting verification of the entity documents at Step310 to Step340, the stock management, the intelligent matching and the anti-counterfeiting authentication of the entity documents and the tracing information are realized before the entity documents are distributed, so that the entity documents distributed to qualified participants of gem and jade trading can be ensured to uniquely and definitely correspond to the gem and jade of a trading target, the trusts of both trading parties on the authenticity and the safety of the gem and jade are improved, the appearance of counterfeit products, fake goods and counterfeit products is avoided, and the establishment of an honest system of a gem and jade trading market is facilitated.
Referring to fig. 8, in the method of this embodiment 1, step310 specifically includes:
step311: and checking the number of blank entity documents without stored information in real time, and verifying and canceling the entity documents with stored information in real time.
Step312: and comparing the quantity of the blank entity documents with a preset lowest value, wherein when the quantity is greater than the preset lowest value, the inventory condition of the entity documents is good, and when the quantity is less than the preset lowest value, the inventory condition of the entity documents is tense. When the inventory condition is good, step312 is repeatedly executed.
Step313: when the stock condition is in tension, a notice of replenishing the stock is sent.
Through executing Step 311-Step 313, the inventory condition of the entity documents can be known in real time, the inventory increase, decrease and verification can be conveniently carried out in real time, and when the inventory of the entity documents is near to be exhausted, managers can be automatically informed to replenish the inventory in time, so that the anti-counterfeiting matching requirement that sufficient entity documents meet the newly-added tracing information is ensured all the time.
Referring to fig. 9, in the method of this embodiment 1, after Step310, the method further includes:
step350: and the tracing information in the entity document with the stored information and the corresponding entity document are unbound through a preset matching rule, so that the entity document is changed into a blank entity document.
Step360: and (5) bringing the blank entity documents into the stock, and checking the stock condition.
No sequence exists between Step350 and Step360 and between Step320 and Step340, and the sequences are respectively independent processes. Through the execution of Step350 and Step360, aiming at the loss of the entity document, the damage of the entity document or the fact that the entity document is not needed any more, the entity document is changed back to the blank entity document and brought into the stock by unbinding the tracing information and the entity document, if the maintenance is needed, a maintenance worker is called, and if the loss is needed, the operation is carried out according to the loss reporting flow.
Example 2
The embodiment 2 of the invention discloses a management system 10 for jewelry tracing information, which is used for monitoring the authenticity of the tracing information of gemstones and jade in the process of entering the tracing system 20 and the safety of the main body, the content and the behavior of the execution operation, and ensuring that the tracing information of gemstones and jade has a complete integrity system and transaction safety.
Referring to fig. 10, the system of this embodiment 2 includes a qualification management subsystem 11, a data management subsystem 12 and a distribution supervision subsystem 13, which are respectively connected to the tracing system 20 and transmit and receive data to and from each other.
Specifically, the qualification management subsystem 11 is used for performing qualification audit on participants of the gem and jade trade, and allowing the qualified participants who are audited to enter the tracing information of the gem and jade.
The participants are usually enterprises, and because the participants are the main bodies for mastering the tracing information of a certain node or certain nodes in the gem and jade trading process, when the tracing information of the gem and jade is input by the participant direction tracing system 20, the tracing information is easily stolen or intercepted by lawless persons through various conventional means or high-tech means to influence the trading safety, or identity information is wrongly input by some careless and careless people to cause the tracing information of the gem and jade to be flawed to cause the trading obstacle. Therefore, before the participants and the tracing system 20 interactively input the tracing information, the qualification management subsystem 11 needs to perform qualification verification on the participants, so as to ensure that the participants who input the tracing information of the gems and jades are the main subjects of a certain node participating in the gem and jade transaction. Since the participants are usually enterprises, the qualification management subsystem 11 mainly includes the examination of enterprise administrative information, the examination of enterprise industry information, and the examination of corporate qualification information, and the participants need to enter the enterprise administrative information, the enterprise industry information, and the corporate qualification information into the management system 10, and the qualification management subsystem 11 performs comprehensive management and examination. The participants who are qualified and checked can be authenticated as qualified participants, so that the tracing information of the gem and jade can be input. The qualification management subsystem 11 carries out comprehensive qualification management and supervision on the source of the tracing information, namely an information provider, namely a participant, so that the tracing information is not falsified during recording, the supervision range is advanced, and the credibility of the data source is ensured.
The data management subsystem 12 is used for auditing the tracing information of the gems and jades recorded by all qualified participants in all nodes of the gem and jade transaction, and recording the tracing information meeting the requirements in the tracing system 20 of the gems and jades.
Wherein, the tracing information of the gem and jade at the current node must be input into the tracing system 20 at each node of the gem and jade trade by the qualified participant. When the qualification management subsystem 11 verifies the qualification of the subject entering the tracing information, i.e. the participant, the data management subsystem 12 also needs to verify the tracing information entered into the tracing system 20. Due to the characteristics of small size, high value, high professional degree, difficulty in distinguishing true and false and the like of the gem and jade, a person who participates in the entry of the trace back information does not necessarily have complete and professional knowledge of the gem and jade, so that the situation that careless and careless persons mistakenly input the trace back information of the gem and jade still exists in the entry stage. And still cannot preclude the identity of a rogue participant from entering into the traceability system 20 false or otherwise compromised traceability information. Therefore, the data management subsystem 12 audits the tracing information of the gemstones and jades, further ensures the transaction safety and the data credibility, and is beneficial to establishing an integrity system of the gemstones and jades transaction. When data auditing of the tracing information is carried out, the data management subsystem 12 needs to supervise a data source, a data standard, a data acquisition process and a data supplement auditing process, so that the recording source of the tracing information is safe, the recording format is standard, the data acquisition process of the system is compliant, the acquired data is comprehensive, and the data management subsystem 12 ensures that the tracing information generated at each node of the gem and jade transaction has authenticity and accords with the supervision standard by carrying out multi-party data comparison and supervision on the tracing information.
The distribution supervision subsystem 13 is configured to match each piece of traceability information recorded in the traceability system 20 with the entity document according to the inventory condition of the entity document, and perform anti-counterfeit verification on the matching.
During the gem and jade transaction, documents are usually used as entity documents to store and record the tracing information. The documents used may be entity documents that may actually be distributed to the respective objects. Therefore, the distribution supervision subsystem 13 scientifically manages the distribution of the entity documents, and the distribution efficiency can be improved. And the entity document is used as the entity document, and anti-counterfeiting authentication is required to be established between the entity document and the tracing information, so that the tracing information acquired by the object taking the entity document is safe, credible and traceable. Therefore, the distribution supervision subsystem 13 performs inventory management and verification on the entity documents, intelligent matching between the entity documents and the tracing information, data acquisition and anti-counterfeiting verification of the entity documents, is used for strictly supervising the non-replicability and inventory management of the entity documents stored in the tracing information of the jades, and is also convenient for issuing the entity documents to qualified participants in the circulation link. The matching and anti-counterfeiting mechanism of the distribution supervision subsystem 13 between the tracing information of the gemstones and the entity documents can improve the anti-counterfeiting capability of the entity documents. Meanwhile, the method can ensure that the two parties of the transaction can directly check the gems and jades on the premise of ensuring that the binding relationship exists between the commodity entity of the gems and jades and the entity document of the tracing information.
In the system of this embodiment 2, the qualification management subsystem 11 is specifically configured to: collecting the legal person information of the participating party, and verifying the authenticity of the legal person information to obtain a verification result; acquiring administrative information and industry information of the participants aiming at the legal information with a true verification result, and evaluating the administrative information and the industry information to obtain an evaluation result; and (4) authenticating the participant with the qualified evaluation result as the qualified participant, and giving the qualified participant the authority to enter the tracing information of the gemstones and jades.
Since the participating parties are typically businesses, the key to discerning the business' qualifications and whether they actually exist is to vet the corporate qualifications. Therefore, the qualification management subsystem 11 first checks the information of the legal person of the participating party, and ensures that the information of the legal person is the true person and indeed the legal person of the participating party, and other legal problems and integrity problems do not exist. If the verified result of the corporate information audit is that the corporate information is false, then this participant is considered as a non-qualified participant and is not allowed to enter the traceability information into the traceability system 20. If the verified result of the legal information is true, the enterprise qualification of the participant is not good.
The qualification management subsystem 11 then evaluates the participants to determine whether they qualify as participants in a gem and jade transaction. This is because the enterprise has thousands of entities with no problem in terms of qualification, and not every entity has enough ability, qualification and expertise to participate in gem and jade transactions, for example, the vendor selling food obviously does not have the ability of gem and jade transactions. Therefore, the qualification management subsystem 11 needs to comprehensively review administrative information and industry information of the participants, where the administrative information refers to management architecture, business scope, administrative management capability, cash flow, and asset liability conditions inside the enterprise, and the industry information refers to industry dynamics, development conditions, industry status of the participants in the industry, market share, and the like related to the enterprise operation scope. Since the administrative information and the industrial information relate to a large number of contents and a wide range, the qualification management subsystem 11 needs to evaluate the administrative information and the industrial information from multiple dimensions, such as the information of the industrial and commercial companies, the information of the corporate legal personnel, the information of the customs clearance, the information of the internal transaction of the platform, the evaluation report of the third party, and the information of the follow-up visits of the enterprises. For the qualified standard, a certain requirement is preset in the qualification management subsystem 11, and only the evaluation result of the party meeting the requirement is qualified, and the evaluation result of the party not meeting the requirement is unqualified.
And finally, the qualification management subsystem 11 authenticates the participant with the qualified evaluation result as the qualified participant, and the qualified participant has the authority of accessing the tracing information uploaded by the tracing system 20 to the gem and jade after the qualified participant is authenticated.
Through the auditing, authentication and permission issuing of the qualification management subsystem 11 to the participants, only qualified participants have the qualification of inputting the tracing information. Certainly, the qualification management subsystem 11 still occasionally re-approves the qualification of the enterprise for the qualified parties that have issued the authority and are authenticated, so as to ensure that the qualified parties are always in a safe, reliable and qualified state, and once the qualified parties are found to have unqualified and illegal changes of enterprise information, the qualification management subsystem 11 cancels the qualification by re-approval, so that the qualified parties become unqualified parties and lose the qualification of entering the tracing information.
In the system of this embodiment 2, when the qualification management subsystem 11 collects the corporate information of the participating parties and extracts portrait data and identity data in the corporate information, it is specifically configured to: collecting the corporate information of the participating party, and extracting portrait data and identity data in the corporate information; comparing the portrait data and the identity data with the portrait information and the identity information of the participants stored in the enterprise information database through face recognition to obtain a portrait comparison result and an identity comparison result; and when the portrait comparison result and the identity comparison result are matched, obtaining the authenticity verification result of the legal information as true.
The qualification management subsystem 11 adopts a face recognition technology, and verifies the authenticity of the corporate information by comparing whether the acquired portrait data and identity data are consistent with the portrait information and identity information in the enterprise information database. If the participant is a truly present and legally trusted principal, the results of the verification of his legal information are usually true. If a participant has some legal or credit flaws, the result of the verification of their corporate information is usually false. Only the legal information with the true verification result is considered to be the qualified legal of the participating party.
In the system of this embodiment 2, in the qualification management subsystem 11, for the legal information whose verification result is true, collecting administrative information and industry information of participants, evaluating the administrative information and the industry information, and specifically: collecting administrative information and industry information of participants; respectively summarizing the administrative information and the industry information according to a plurality of preset assessment dimensions to obtain summarized information under each assessment dimension; and scoring the summarized information according to a preset scoring rule under each evaluation dimension to obtain an evaluation result for judging whether the participant is qualified.
When the qualification management subsystem 11 evaluates the administrative information and the industry information of the participants through each dimension, the participants may be scored by a preset evaluation method, for example, a percentage system may be adopted, each score obtained by the participants is weighted to obtain a total score, a score line is set, if the score line is reached or exceeded, the qualification of the participants is qualified, and if the score line is fallen below, the qualification of the participants is unqualified, so that the evaluation result of the participants is obtained.
In the system of this embodiment 2, the data management subsystem 12 is specifically configured to: obtaining the tracing information of the gems and jades input by qualified participants; performing data source audit, data format audit, data acquisition audit and data supplement audit on the tracing information to obtain a data audit result; and recording the tracing information of which the data auditing result meets the preset requirement in the tracing system 20 of the gem and jade.
After the qualification management subsystem 11 completes qualification verification on the participants and gives the qualified participants meeting the requirements the authority of inputting the tracing information, the data management subsystem 12 is required to verify the authenticity and the safety of the tracing information. Firstly, the data management subsystem 12 collects the trace back information of the gem and jade input by the qualified participants, and in the data collection process, the data management subsystem 12 can copy the trace back information from the trace back system 20 to the management system 10, or directly copy the trace back information to the data management subsystem 12 while the qualified participants input the trace back information.
The data management subsystem 12 then performs an all-around audit of the trace back information. The data source is audited by checking whether the retroactive information acquired by the checking management system 10 originates from the input of qualified participants, the data format is audited by checking whether the input format of the retroactive information meets the preset standard format, the data is acquired and audited by checking whether the retroactive information meets the acquisition process specification in the acquisition process and whether the acquired retroactive information is consistent with the input retroactive information, and the data is supplemented and audited by checking whether key contents are missed in the retroactive information. The data management subsystem 12 obtains a data auditing result by performing multi-aspect comparison and verification on the tracing information.
And finally, the data management subsystem 12 compares the data auditing result with the preset requirement, the data auditing result meeting the preset requirement indicates that the tracing information is real, credible and safe, and the data auditing result not meeting the preset requirement indicates that the tracing information has flaws in authenticity and safety and needs to be recorded again. The preset requirement refers to a customs clearance requirement which needs to be met when the gemstones and jades pass customs.
The entered tracing information is audited in multiple aspects through the data management subsystem 12, the tracing information with the flaw can be checked out in time, the entered main body is informed to enter again, the authenticity and the safety of the tracing information can be ensured from multiple dimensions for the tracing information meeting the requirements, therefore, the verification and the supervision of the authenticity, the standard type and the available state of the acquired tracing information are realized, and only the tracing information meeting the requirements can be automatically recorded into the tracing system 20 of the gem and jade.
In the system of this embodiment 2, when the data management subsystem 12 performs data source audit, data format audit, data acquisition audit, and data supplement audit on the trace back information to obtain a data audit result, the system is specifically configured to: comparing the main body of the input tracing information with the qualified participants with the input authority to audit the data source of the input tracing information and obtain a source audit result; comparing the preset standard format with the format of the input tracing information, and checking the data format of the tracing information to obtain a format checking result; comparing the acquired tracing information with the input tracing information, and auditing the data acquisition process of the tracing information to obtain an acquired auditing result; traversing each content in the tracing information, and checking whether each content data of the tracing information is complete or not to obtain a supplementary checking result; and summarizing the source audit result, the format audit result, the acquisition audit result and the supplement audit result to obtain a data audit result.
The data management subsystem 12 can synchronously perform data source audit, data format audit, data acquisition audit and data supplement audit, as long as the source audit result, the format audit result, the acquisition audit result and the supplement audit result can be obtained, and the order of the audit is not important. Finally, the data management subsystem 12 can perform quantitative processing on the four results of the source audit result, the format audit result, the acquisition audit result and the supplement audit result, and comprehensively obtain the data audit result through weighting or other data processing modes.
In the system of this embodiment 2, the distribution supervision subsystem 13 is specifically configured to: checking the inventory condition of the entity documents by carrying out inventory management on the entity documents; when the inventory condition is good, counting the quantity of the tracing information recorded in the system and calling out an equivalent entity document; matching the tracing information with the entity documents one by one through a preset matching rule, storing the tracing information into the corresponding entity documents, and informing qualified participants of inputting the tracing information; and respectively carrying out anti-counterfeiting encryption on the tracing information and the physical information of the entity document, and carrying out anti-counterfeiting verification on the entity document and the corresponding tracing information when the entity document is distributed.
After the data management subsystem 12 completes the verification of the authenticity and the safety of the tracing information, the distribution and supervision subsystem 13 is required to store the tracing information of a single gem and jade on a single entity document, and then the closed-loop supervision of the source and the destination of the tracing information is completed. The entity documents storing the tracing information of each gem and jade are usually presented in the form of documents, the entity documents with the entities are information carriers which can realize online and offline linkage anti-counterfeiting and offline with the online tracing information, and the entity documents are convenient for the gem and jade trade site to distribute.
First, the distribution monitoring subsystem 13 knows how many entity documents are blank entity documents without stored information and how many entity documents with stored information in the stock, so that a sufficient number of entity documents can be provided when storing the newly entered trace information.
When the inventory condition of the entity documents is good, the distribution supervision subsystem 13 enables each newly-entered tracing information to have a corresponding entity document to be stored, so that the safety of each tracing information can be guaranteed.
The distribution supervision subsystem 13 then matches each piece of traceability information in the traceability system 20 to a blank entity document, and such matching is not random matching but needs to follow a certain logic. Preset matching rules are preset in the distribution supervision subsystem 13, for example, the newly entered tracing information can be automatically bound with the entity document through the type of the commodity, the enterprise to which the commodity belongs, the entered enterprise, and the like. After the binding of the traceability information and the entity document is completed, the information can be pushed to the participant and the management system 10, and the matching completion information is informed to the participant and the person using the management system 10, so that the on-site issuing of the entity document is facilitated.
And finally, the distribution supervision subsystem 13 performs anti-counterfeiting encryption operation on the tracing information and the physical information of the entity document, thereby finishing the final anti-counterfeiting authentication, effectively improving the anti-counterfeiting capacity of the gem and jade in the transaction process, and avoiding the phenomena of being good in order and being fake in nature.
Through the inventory management, intelligent matching, data acquisition and anti-counterfeiting verification of the distribution and supervision subsystem 13 on the entity documents, before the entity documents are distributed, the inventory management, the intelligent matching and the anti-counterfeiting authentication of the entity documents and the tracing information are realized, so that the entity documents of qualified participants who distribute the precious jade trade can be ensured to uniquely and definitely correspond to the precious jade of the trade mark, the trust of authenticity and safety of the two parties of the trade on the precious jade is improved, the appearance of counterfeit products, fake products and fake products is avoided, and the establishment of an integrity system of the precious jade trade market is facilitated.
In the system of this embodiment 2, when the distribution monitoring subsystem 13 performs inventory management on the entity documents and checks the inventory condition of the entity documents, the system is specifically configured to: checking the number of blank entity documents without stored information in real time, and verifying and canceling the entity documents with stored information in real time; comparing the number of the blank entity documents with a preset lowest value, wherein when the number is greater than the preset lowest value, the inventory condition of the entity documents is good, and when the number is less than the preset lowest value, the inventory condition of the entity documents is tense; when the stock condition is in tension, a notice of replenishing the stock is sent.
The distribution supervision subsystem 13 can know the inventory condition of the entity documents in real time, so that inventory increase, decrease and verification can be conveniently carried out in real time, and when the inventory of the entity documents is close to being exhausted, managers can be automatically informed of timely replenishing the inventory, so that the anti-counterfeiting matching requirement that sufficient entity documents meet the newly added tracing information is ensured all the time.
In the system of this embodiment 2, after the distribution supervision subsystem 13 performs inventory management on the entity documents and checks the inventory condition of the entity documents, it is further configured to: unbinding the tracing information in the entity document with stored information and the corresponding entity document through a preset matching rule, so that the entity document is changed into a blank entity document; and (5) bringing the blank entity documents into the stock, and checking the stock condition.
By adopting the distribution and supervision subsystem 13, when the entity documents are lost, damaged or no longer needed, the tracing information and the entity documents are unbound, so that the entity documents are changed back to blank entity documents and brought into the stock, if maintenance is needed, maintenance personnel are called, and if the entity documents are required to be lost, operation is carried out according to a loss report process.
Example 3
Embodiment 3 of the present invention discloses a computer-readable storage medium in which a computer program is stored, which, when running on a computer, causes the computer to execute the jewelry traceability information management method disclosed in embodiment 1.
Example 4
Embodiment 4 of the present invention discloses a computer program product, which includes a computer program that, when running on a computer, causes the computer to execute the jewelry traceability information management method disclosed in embodiment 1.
The management method and the system for the jewelry tracing information disclosed by the invention can be used for monitoring the source of a participant who inputs the tracing information, auditing the tracing information to ensure the authenticity of the information, carrying out scientific management and strict anti-counterfeiting on an entity document, and realizing the information monitoring and safety guarantee of the tracing information in multiple aspects and multiple dimensions.
It should be understood that the above description of specific embodiments of the present invention is only for the purpose of illustrating the technical lines and features of the present invention, and is intended to enable those skilled in the art to understand the contents of the present invention and to implement the present invention, but the present invention is not limited to the above specific embodiments. It is intended that all such changes and modifications as fall within the scope of the appended claims be embraced therein.

Claims (18)

1. A management method of jewelry tracing information, characterized in that the method comprises:
qualification auditing is carried out on participants of gem and jade trade, and the tracing information of gem and jade is allowed to be input by the qualified participants through auditing;
auditing the tracing information of the gemstones and jades input by the qualified participants in each node of the gem and jade transaction, and recording the tracing information meeting the requirements in a tracing system of the gemstones and jades;
according to the inventory condition of the entity documents, matching each piece of tracing information recorded in the tracing system with the entity documents respectively, and performing anti-counterfeiting verification on the matching;
according to the inventory condition of the entity documents, the method specifically comprises the following steps of respectively matching each piece of tracing information recorded in the tracing system with the entity documents, and performing anti-counterfeiting verification on the matching:
checking the inventory condition of the entity document by carrying out inventory management on the entity document;
when the inventory condition is good, counting the quantity of the tracing information recorded in the system, and calling out an equivalent entity document;
matching the tracing information with the entity documents one by one through a preset matching rule, storing the tracing information into the corresponding entity documents, and informing qualified participants who input the tracing information;
respectively carrying out anti-counterfeiting encryption on the tracing information and the physical information of the entity document, and carrying out anti-counterfeiting verification on the entity document and the corresponding tracing information when the entity document is distributed;
wherein the content of the first and second substances, the entity document is an offline information carrier which can realize online and offline linkage anti-counterfeiting with the tracing information online.
2. The method according to claim 1, wherein in performing qualification review on participants in the gem and jade transaction and allowing the qualified participants who have passed the review to enter the traceability information of the gem and jade, the method specifically comprises:
collecting the legal person information of the participating party, and verifying the authenticity of the legal person information to obtain a verification result;
acquiring administrative information and industry information of the participants aiming at the legal information with the real verification result, and evaluating the administrative information and the industry information to obtain an evaluation result;
and authenticating the participant with the qualified evaluation result as a qualified participant, and giving the qualified participant the authority to enter the tracing information of the gemstones and jades.
3. The method according to claim 2, wherein the step of acquiring the corporate information of the participating party and verifying the authenticity of the corporate information to obtain a verification result specifically comprises:
collecting the corporate information of the participating party, and extracting portrait data and identity data in the corporate information; comparing the portrait data and the identity data with the portrait information and the identity information of the participants stored in an enterprise information database through face recognition to obtain a portrait comparison result and an identity comparison result;
and when the portrait comparison result and the identity comparison result are matched, obtaining a verification result of the authenticity of the legal information as true.
4. The method according to claim 2, wherein acquiring administrative information and industry information of the participating party for the legal information whose verification result is true, and evaluating the administrative information and the industry information to obtain an evaluation result specifically includes:
collecting administrative information and industrial information of the participants;
summarizing the administrative information and the industry information according to a plurality of preset assessment dimensions to obtain summarized information under each assessment dimension;
and scoring the summarized information according to a preset scoring rule under each assessment dimension to obtain an assessment result for judging whether the participant is qualified.
5. The method according to claim 1, wherein in each node of a gem and jade transaction, the traceability information of the gem and jade entered by each qualified participant is audited, and the traceability information meeting the requirements is recorded in a traceability system of the gem and jade, and specifically comprises:
obtaining the tracing information of the gems and jades input by the qualified participants;
performing data source audit, data format audit, data acquisition audit and data supplement audit on the tracing information to obtain a data audit result;
and recording the tracing information of which the data auditing result meets the preset requirement in a tracing system of the gem and jade.
6. The method according to claim 5, wherein the data source audit, the data format audit, the data acquisition audit and the data supplement audit are performed on the tracing information to obtain a data audit result, and the method specifically comprises the following steps:
comparing the subject input with the tracing information with qualified participants with input authority, and auditing the data source input with the tracing information to obtain a source auditing result;
comparing a preset standard format with the format of the recorded tracing information, and checking the data format of the tracing information to obtain a format checking result;
comparing the acquired tracing information with the input tracing information, and auditing the data acquisition process of the tracing information to obtain an acquisition and audit result;
traversing each content in the tracing information, and checking whether each content data of the tracing information is complete or not to obtain a supplementary checking result;
and summarizing the source auditing result, the format auditing result, the acquisition auditing result and the supplement auditing result to obtain a data auditing result.
7. The method according to claim 1, wherein in checking the inventory of the entity documents by performing inventory management on the entity documents, the method specifically comprises:
checking the number of blank entity documents without stored information in real time, and verifying and canceling the entity documents with stored information in real time;
comparing the quantity of the blank entity documents with a preset lowest value, wherein when the quantity is greater than the preset lowest value, the inventory condition of the entity documents is good, and when the quantity is less than the preset lowest value, the inventory condition of the entity documents is tension;
and when the inventory condition is tension, sending a notice for replenishing the inventory.
8. The method of claim 1, further comprising, after checking the entity document for inventory by performing inventory management on the entity document:
unbinding the tracing information in the entity document with the stored information and the corresponding entity document through the preset matching rule, so that the entity document is changed into a blank entity document;
and bringing the blank entity documents into stock, and checking the stock condition.
9. A management system for jewelry tracing information is characterized by comprising a qualification management subsystem, a data management subsystem and a distribution supervision subsystem;
the qualification management subsystem is used for performing qualification audit on participants of the gem and jade trade and allowing the approved qualified participants to enter the tracing information of the gem and jade;
the data management subsystem is used for auditing the tracing information of the gemstones and jades input by all qualified participants in all nodes of the gem and jade trade, and recording the tracing information meeting the requirements in a tracing system of the gemstones and jades;
the distribution supervision subsystem is used for respectively matching each piece of tracing information recorded in the tracing system with the entity document according to the inventory condition of the entity document and carrying out anti-counterfeiting verification on the matching;
the distribution supervision subsystem is specifically configured to:
checking the inventory condition of the entity document by carrying out inventory management on the entity document;
when the inventory condition is good, counting the quantity of the tracing information recorded in the system, and calling out an equivalent entity document; matching the tracing information with the entity documents one by one through a preset matching rule, storing the tracing information into the corresponding entity documents, and informing qualified participants who input the tracing information;
respectively carrying out anti-counterfeiting encryption on the tracing information and the physical information of the entity document, and carrying out anti-counterfeiting verification on the entity document and the corresponding tracing information when the entity document is distributed;
the entity document is an offline information carrier which can realize online and offline linkage anti-counterfeiting with the tracing information online.
10. The system of claim 9, wherein the qualification management subsystem is specifically configured to:
collecting the legal person information of the participating party, and verifying the authenticity of the legal person information to obtain a verification result;
acquiring administrative information and industry information of the participants aiming at the legal information with the real verification result, and evaluating the administrative information and the industry information to obtain an evaluation result;
and authenticating the participant with the qualified evaluation result as a qualified participant, and giving the qualified participant the authority to enter the tracing information of the gemstones and jades.
11. The system according to claim 10, wherein when the qualification management subsystem collects the corporate information of the participating parties and extracts portrait data and identity data in the corporate information, the qualification management subsystem is specifically configured to:
collecting the corporate information of the participating party, and extracting portrait data and identity data in the corporate information;
comparing the portrait data and the identity data with the portrait information and the identity information of the participants stored in an enterprise information database through face recognition to obtain a portrait comparison result and an identity comparison result;
and when the portrait comparison result and the identity comparison result are matched, obtaining a verification result of the authenticity of the legal person information as true.
12. The system according to claim 10, wherein when the qualification management subsystem collects administrative information and industry information of the participating party for the information of the legal person whose verification result is true, and evaluates the administrative information and the industry information to obtain an evaluation result, the qualification management subsystem is specifically configured to:
collecting administrative information and industrial information of the participants;
summarizing the administrative information and the industry information according to a plurality of preset assessment dimensions to obtain summarized information under each assessment dimension;
and scoring the summarized information according to a preset scoring rule under each assessment dimension to obtain an assessment result for judging whether the participant is qualified.
13. The system of claim 9, wherein the data management subsystem is specifically configured to:
obtaining the tracing information of the gems and jades input by the qualified participants;
performing data source audit, data format audit, data acquisition audit and data supplement audit on the tracing information to obtain a data audit result;
and recording the tracing information of which the data auditing result meets the preset requirement in a tracing system of the gem and jade.
14. The system of claim 13, wherein when the data management subsystem performs data source audit, data format audit, data acquisition audit and data supplement audit on the trace-back information to obtain a data audit result, the system is specifically configured to:
comparing the subject input with the tracing information with qualified participants with input authority, and auditing the data source input with the tracing information to obtain a source auditing result;
comparing a preset standard format with the format of the recorded tracing information, and checking the data format of the tracing information to obtain a format checking result;
comparing the acquired tracing information with the input tracing information, and auditing the data acquisition process of the tracing information to obtain an acquisition and audit result;
traversing each content in the tracing information, and checking whether each content data of the tracing information is complete or not to obtain a supplementary checking result;
and summarizing the source audit result, the format audit result, the acquisition audit result and the supplement audit result to obtain a data audit result.
15. The system according to claim 9, wherein when the distribution supervision subsystem performs inventory management on the entity documents and checks the inventory condition of the entity documents, the system is specifically configured to:
checking the number of blank entity documents without stored information in real time, and verifying and canceling the entity documents with stored information in real time;
comparing the quantity of the blank entity documents with a preset lowest value, wherein when the quantity is greater than the preset lowest value, the inventory condition of the entity documents is good, and when the quantity is less than the preset lowest value, the inventory condition of the entity documents is tension;
and when the inventory condition is tension, sending a notice for replenishing the inventory.
16. The system of claim 9, wherein after the distribution supervision subsystem checks the entity documents for inventory conditions by performing inventory management on the entity documents, the system is further configured to:
unbinding the tracing information in the entity document with the stored information and the corresponding entity document through the preset matching rule, so that the entity document is changed into a blank entity document;
and bringing the blank entity documents into stock, and checking the stock condition.
17. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which when run on a computer, causes the computer to execute the jewelry tracing information management method according to any one of claims 1 to 8.
18. A computer program product, characterized in that it comprises a computer program which, when run on a computer, causes the computer to execute the method for managing jewelry traceability information according to any one of claims 1 to 8.
CN202211360601.4A 2022-11-02 2022-11-02 Management method and system of jewelry tracing information Pending CN115760151A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211360601.4A CN115760151A (en) 2022-11-02 2022-11-02 Management method and system of jewelry tracing information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211360601.4A CN115760151A (en) 2022-11-02 2022-11-02 Management method and system of jewelry tracing information

Publications (1)

Publication Number Publication Date
CN115760151A true CN115760151A (en) 2023-03-07

Family

ID=85355257

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211360601.4A Pending CN115760151A (en) 2022-11-02 2022-11-02 Management method and system of jewelry tracing information

Country Status (1)

Country Link
CN (1) CN115760151A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116823294A (en) * 2023-08-29 2023-09-29 中国(上海)宝玉石交易中心有限公司 Method and device for supervising traceability information of precious stones and jades

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116823294A (en) * 2023-08-29 2023-09-29 中国(上海)宝玉石交易中心有限公司 Method and device for supervising traceability information of precious stones and jades
CN116823294B (en) * 2023-08-29 2023-11-17 中国(上海)宝玉石交易中心有限公司 Method and device for supervising traceability information of precious stones and jades

Similar Documents

Publication Publication Date Title
US11720888B2 (en) Decentralized title transfer and validation of assets
Bonyuet Overview and impact of blockchain on auditing
Gatteschi et al. To blockchain or not to blockchain: That is the question
CN108737361B (en) Data verification method based on block chain
Nzuva Smart contracts implementation, applications, benefits, and limitations
WO2016155607A1 (en) Commodity identity monitoring and anti-counterfeiting method
CN109564668A (en) Electronics mortgage manager and monitoring
US20230135256A1 (en) Apparatus for proportional calculation regarding non-fungible tokens
KR102069002B1 (en) History management method, apparatus and program for preventing fake using blockchain
CN109767228A (en) A kind of energy transaction in assets system based on block chain
CN112632186A (en) Block chain consensus method, computer equipment and block chain system
CN113674090A (en) Block chain-based dynamic mortgage supervision method, system, equipment and storage medium
CN115760151A (en) Management method and system of jewelry tracing information
Xu et al. How can a blockchain-based anti-money laundering system improve customer due diligence process?
CN113034275B (en) Management system and method based on block chain network and terminal equipment
CN113989040A (en) Asset securitization management method and device
Bhatnagar et al. Product traceability using blockchain
CN112561529A (en) Financial product sale system and method based on block chain
WO2021150693A1 (en) System and method for distributed on-line transactions utilizing a clearinghouse
Kamali Blockchain’s potential to combat procurement frauds
CN115564591A (en) Financing product determination method and related equipment
Yu et al. A preliminary study of the impact of blockchain technology on the application level of insurance industry
CN113674098A (en) Non-standard warehouse receipt pledge financing method, device and equipment based on block chain
CN114331105A (en) Electronic draft processing system, method, electronic device and storage medium
CN113850597A (en) Block chain-based warehouse sheet pledge logistics financing method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination