CN116739230A - Product authentication method, device and medium - Google Patents

Product authentication method, device and medium Download PDF

Info

Publication number
CN116739230A
CN116739230A CN202310456949.1A CN202310456949A CN116739230A CN 116739230 A CN116739230 A CN 116739230A CN 202310456949 A CN202310456949 A CN 202310456949A CN 116739230 A CN116739230 A CN 116739230A
Authority
CN
China
Prior art keywords
product
authentication
authenticated
auditing
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310456949.1A
Other languages
Chinese (zh)
Inventor
谭慧
肖雪
商广勇
马岩堂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Yunzhou Shandong Industrial Internet Co Ltd
Original Assignee
Inspur Yunzhou Shandong Industrial Internet Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Yunzhou Shandong Industrial Internet Co Ltd filed Critical Inspur Yunzhou Shandong Industrial Internet Co Ltd
Priority to CN202310456949.1A priority Critical patent/CN116739230A/en
Publication of CN116739230A publication Critical patent/CN116739230A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06315Needs-based resource requirements planning or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0633Workflow analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Operations Research (AREA)
  • General Business, Economics & Management (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a product authentication method, device and medium, belongs to the technical field of product authentication processes, and is used for solving the technical problem that the limitation capability on low-quality products is limited because the conventional product authentication platform cannot integrate multiparty data when carrying out product authentication. The method comprises the following steps: the first auditing node performs primary auditing on enterprise information corresponding to the product to be authenticated, and after the first auditing node passes, the second auditing node performs secondary auditing on production information in the enterprise information; after the enterprise information auditing is passed, the product authentication node carries out on-line auditing on the product information of the product to be authenticated according to the product authentication standard; after the on-line verification is passed, the product authentication node performs on-line detection on the product to be authenticated, and determines that the product to be authenticated passes the primary authentication according to the result of the on-line detection; the product authentication node receives the traceability information corresponding to the product to be authenticated, and audits the traceability information, and authentication of the product to be authenticated is completed after the audits pass.

Description

Product authentication method, device and medium
Technical Field
The present application relates to the field of product authentication technologies, and in particular, to a product authentication method, device, and medium.
Background
With the continuous promotion of economic development and e-commerce technology, local special products with high quality and price are purchased by more and more people, but the core competitiveness and autonomous innovation capability of production enterprises of the special products are not strong, and the market monster influence of 'bad coin expelling good coin' is frequently encountered.
In order to minimize the influence of market strangeness on enterprises, a product authentication technology is provided, the circulation of low-quality products is limited by authenticating the products produced by the enterprises, the development of high-quality products is greatly promoted, but the current product authentication platform has single data considered when authenticating the products and cannot integrate multiparty data, so that the limitation capability of the current product authentication platform/technology on the low-quality products is limited.
Disclosure of Invention
The embodiment of the application provides a product authentication method, equipment and medium, which are used for solving the following technical problems: the existing product authentication platform cannot integrate multiparty data when performing product authentication, so that the limitation capability on low-quality products is limited.
The embodiment of the application adopts the following technical scheme:
in a first aspect, an embodiment of the present application provides a product authentication method, applied to a product authentication platform, where the method includes: the method comprises the steps that a first auditing node carries out primary auditing on enterprise information corresponding to a product to be authenticated, and after the enterprise information passes, a second auditing node carries out secondary auditing on production information in the enterprise information; after the enterprise information auditing is passed, the product authentication node carries out on-line auditing on the product information of the product to be authenticated according to a product authentication standard; after the on-line verification is passed, the product authentication node performs on-line detection on the product to be authenticated, and determines that the product to be authenticated passes primary authentication according to the result of the on-line detection; and the product authentication node is used for butting the traceability information corresponding to the product to be authenticated, checking the traceability information, and completing the authentication of the product to be authenticated after the checking is passed.
In one or more embodiments of the present disclosure, a first auditing node performs a first audit on enterprise information corresponding to a product to be authenticated, including: the first auditing node performs primary auditing on the recorded information in the enterprise information; and after the verification is passed, the second verification node carries out secondary verification on the production information of the enterprise based on the product authentication application of the enterprise.
In one or more embodiments of the present disclosure, before the on-line auditing of the product information of the product to be authenticated according to the product authentication criteria, the method further includes: the product authentication node determines the product to be authenticated according to the product authentication application; acquiring a plurality of authentication standards corresponding to the product to be authenticated on a preset website; the product authentication criteria are determined among the plurality of authentication criteria.
In one or more embodiments of the present disclosure, the on-line auditing method for the product information of the product to be authenticated specifically includes: and the product authentication node carries out online auditing on the product production information, the enterprise detection information, the enterprise production standard and the enterprise production qualification corresponding to the product to be authenticated.
In one or more embodiments of the present disclosure, the product authentication node performs an offline detection on the product to be authenticated, and specifically includes: the product authentication node randomly extracts the product to be authenticated; performing inspection on the randomly extracted product to be authenticated to obtain an off-line detection report corresponding to the product to be authenticated; and comparing the offline detection report with the product authentication standard, and determining that the product to be authenticated passes primary authentication when the offline detection report meets the product authentication standard.
In one or more embodiments of the present disclosure, after the randomly extracted product to be authenticated is submitted for inspection, the method further includes: the first check node monitors off-line inspection of the product to be authenticated, and monitors a comparison process of the off-line inspection report and the product authentication standard; a supervisory report is generated.
In one or more embodiments of the present disclosure, after the auditing of the traceability information, the method further includes: the authentication final auditing node audits the traceability information and audits the supervision report at the same time; and after the verification is passed, the product to be authenticated is disclosed.
In one or more embodiments of the present disclosure, after the product to be authenticated is disclosed, the method further includes: the product authentication node issues a product code for the product to be authenticated, and an authentication certificate corresponding to the product to be authenticated, traceability information corresponding to the product to be authenticated and enterprise information corresponding to the product to be authenticated are written in the product code.
In a second aspect, an embodiment of the present application further provides a product authentication device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a product authentication method as described above.
In a third aspect, embodiments of the present application also provide a non-volatile computer storage medium having stored thereon computer-executable instructions configured to perform a product authentication method as described above.
The product authentication method, the device and the medium provided by the embodiment of the application have the following beneficial effects: through enterprise information auditing nodes, the product authentication node and the authentication final auditing node fuse multiparty data corresponding to the product to be authenticated, the authentication flow of the product is strictly standardized, the circulation of low-quality products is limited, and the development of high-quality products can be effectively promoted.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings may be obtained according to the drawings without inventive effort to those skilled in the art. In the drawings:
FIG. 1 is a flow chart of a product authentication method according to an embodiment of the present application;
FIG. 2 is a flowchart of another product authentication method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a product authentication device according to an embodiment of the present application.
Detailed Description
In order to make the technical solution of the present application better understood by those skilled in the art, the technical solution of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present application.
The embodiment of the application provides a product authentication method, which is characterized in that a plurality of nodes on a product authentication platform are used for fusing multiparty data, so that the product authentication flow is standardized, and the circulation of low-quality products is effectively limited.
The product authentication method in the embodiment of the application is described in detail below by means of the accompanying drawings.
Fig. 1 is a flowchart of a product authentication method according to an embodiment of the present application. As shown in fig. 1, the product authentication method in the embodiment of the present application at least includes the following execution steps:
and step 101, auditing the enterprise information corresponding to the product to be authenticated by the auditing node.
The product authentication method in the embodiment of the application is applied to a product authentication platform, wherein the platform is provided with a plurality of nodes, and comprises an audit node for auditing enterprise information, when an enterprise wants to authenticate the product, the enterprise needs to log in and register on the platform, then upload own enterprise information, and after the enterprise information is audited, the enterprise can continue the subsequent flow of product authentication.
In one or more possible implementation manners of the embodiment of the application, the enterprise information is audited, mainly by auditing the record information of the enterprise through a first audit node, and then auditing the related production information of the product to be authenticated of the enterprise through a second audit node. The enterprise information is mainly information such as qualification of the auditing enterprise for producing the product to be authenticated.
And 102, the product authentication node performs on-line auditing and off-line detection on the product to be authenticated according to the product authentication standard.
After the enterprise information is checked, the enterprise can select the product to be authenticated according to the product produced by the enterprise, and submit an application to the product authentication platform, and then the product authentication node obtains the product to be authenticated which the enterprise wants to authenticate according to the application, and obtains the product standard/product authentication standard on a preset website according to the product to be authenticated, so that the authentication standard used for the product to be authenticated can be selected according to the product standard/product authentication standard.
Further, the product authentication node performs on-line auditing on the product to be authenticated according to the selected product authentication standard, wherein the on-line auditing refers to auditing product information of the product to be authenticated, and judging whether the product information is qualified or not and whether the product authentication standard is met or not. In one example of the present application, the product information to be audited includes at least: product production information, enterprise detection information, enterprise production standards, enterprise production qualification and the like.
Further, after the on-line verification of the product to be authenticated passes, the on-line detection is continuously performed on the product to be authenticated, specifically, the product authentication node randomly extracts part of the product in the product to be authenticated at the enterprise, and performs the on-line detection on the part of the product to be authenticated to obtain an on-line detection report of the product to be authenticated, wherein the detection is mainly based on the detection of the product quality. And then comparing the offline detection report of the product with the product authentication standard, and determining whether the product to be authenticated passes the primary authentication according to the comparison result.
In one or more possible implementation manners of the embodiment of the present application, the first audit node/the second audit node may perform supervision/supervision during the offline detection process of the product to be authenticated, and generate a supervision report to maintain the detection fairness of the product to be authenticated.
Step 103, the product authentication node receives the tracing information corresponding to the authenticated product.
After the product to be authenticated passes the primary authentication, the product authentication node is in butt joint with the traceability information of the product to be authenticated, and the butt joint can be realized through directly butt joint with a blockchain recording the traceability information.
The trace information is recorded on the block chain, so that the trace information can be guaranteed to be non-tamper-proof.
And 104, after the verification of the traceability information by the verification final-verification node, finishing the verification process of the product to be verified.
After the product authentication node is used for interfacing the traceability information of the product, an authentication final-audit node on the authentication platform can audit the traceability information, and the audit traceability information is mainly used for auditing whether the data in the production and circulation processes of the product meet the requirements or standards, and after the final audit is passed, the authentication process of the product to be authenticated is completed.
In one or more possible implementation manners of the embodiment of the application, after the authentication final-check node authenticates the traceability information, that is, after the authentication process of the product to be authenticated is completed, the product to be authenticated is disclosed, after the public period is finished, a product code is issued for the node passing the authentication, and then, a consumer can acquire the traceability information of the product to be authenticated, the authentication certificate, the information of a production enterprise and other data by scanning the product code, so that the consumer can acquire the product data conveniently, the development and circulation of the high-quality product are promoted, and the development of the low-quality product is limited.
In order to explain the product authentication method in the implementation of the application in more detail, the embodiment of the application is also described in the following supplementary way.
Fig. 2 is a flowchart of another product authentication method provided in the embodiment of the present application, and as shown in fig. 2, the product authentication process in the embodiment of the present application may further include the following execution procedure:
1) Standard creation and auditing: the standard development promotion will establish group standards through the authentication platform, submit the examination committee for examination, and after the examination passes, the standards are established, the current state is that the enterprise applies for authentication, and the promotion will select authentication standards for the authenticated products in the standards of the current state.
2) Enterprise information record and audit: enterprises can enter a login/registration page of the enterprise service platform through portal websites by knowing authentication standards through the portal platform, and enter the platform after logging in/registering. And submitting the record information of the enterprise/product. The authentication alliance carries out auditing on the recorded information through the authentication supervision platform.
3) Authentication application and audit: the enterprise may select one or more products to submit authentication applications based on the authenticated product categories. After the information is submitted, the examination commission receives the information, the information of enterprises and products can be checked through the platform, and the conditions of the enterprises can be studied offline according to actual services. And finally, performing auditing operation through the platform and filling auditing comments, if the auditing operation is refused, failing to authenticate things, and if the auditing operation is passed, entering a standard setting link by the task.
4) And (3) an authentication standard setting step: the link requires standard development promotion to set authentication standards for authentication products, select from the group standards in the current state, and enter an authentication organization assignment link after maintenance and submission.
5) Authentication mechanism assignment link: the authentication alliance receives backlog, assigns an authentication mechanism for the authentication task, recommends and selects the authentication mechanism according to the authentication field through the platform, the authentication mechanism can select whether to receive the task according to the actual conditions of the authentication alliance, such as self, products and the like, if not, the authentication mechanism needs to be reassigned by the alliance, and if so, the task enters a link of on-line initial examination of the authentication mechanism.
6) On-line initial review link of certification authority: the certification authority reviews the information of the business/product on-line, including basic information, honor qualification, business standards, inspection reports, and so forth. On-line operation auditing, if the authentication fails, the state change authentication is refuted, if the authentication passes, an off-line auditing link is entered (after the authentication passes, an off-line authentication plan file needs to be uploaded).
7) Initial review link under certification authority line: the certification authority checks enterprise and product information offline, samples and sends out operations such as examining, judging whether the product meets standard requirements by comparing detection reports and certification standards, and processes auditing operations through a platform, if auditing is overruled, certification tasks fail, and state change certification is overruled, if the auditing is overruled, information such as auditing results, detection reports, certification material uploading, production scale registration and the like need to be maintained. After the task is submitted, the task enters a traceability mode docking link.
And the authentication alliance can assign a supervisor to monitor the authentication condition offline in the authentication link, and upload an authentication supervision report through the platform.
8) And (3) a source tracing mode butt joint link: enterprises need to maintain product traceability information based on product codes, and the method supports the use of product codes or the interfacing of existing traceability platform support platform interfaces of the enterprises. The actual scene of the related preparation work of the enterprise can start to be prepared when the authentication application is checked, when the task flow goes to the link, operators are required to confirm the related preparation, and the platform is used for maintaining the docking mode, if the enterprise does not make the docking preparation, the authentication fails to be rejected, and if the maintenance is finished, the authentication task enters an authentication final check link.
9) And (3) authentication final review link: the link review principal checks the information such as the materials uploaded by the authentication, the tracing butt joint mode, the authentication supervision report and the like through the platform to determine whether the authentication work meets the requirements, if the authentication work is refused, the authentication institution is required to authenticate again and upload the necessary information, and the authentication is directly carried out to the authentication final review link after the authentication is submitted. If the product passes through, the product enters the publicity period.
10 A product public auditing link): the product is shown in the portal, and the examination commission can operate the rejection at any time according to the actual complaint advice and other conditions, so that the authentication fails. If the product passes the public period, the examination commission carries out public examination, and the digital certificate is issued after the product passes the post-authentication.
11 A certificate issuing link): in this link, the certification status is "certificate valid". The enterprise can apply for the product code based on the product, the platform calculates the automatic check code according to the production scale and the weight unit of the product, the enterprise is based on operations such as code tracing information, code marketing and the like, and after the code is pasted, a consumer scans the code to check the product, the enterprise information and the like.
12 A certification review link): the date of issuing the certificate starts to be the middle-term examination time, the enterprise can apply for authentication review in advance, the primary-examination authentication mechanism carries out review, and the review result is submitted and then is directly subjected to examination principal final examination. If authentication fails, the certificate is invalid.
13 Certificate expiration): after the two-year validity period of the certificate expires, the enterprise can initiate an authentication application again and walk the authentication process again.
In addition, the embodiment of the application also provides a product authentication device, and the structure of the product authentication device is shown in fig. 3.
Fig. 3 is a schematic structural diagram of a product authentication device according to an embodiment of the present application. As shown in fig. 3, the product authentication device 300 in the embodiment of the present application specifically includes: at least one processor 301; and a memory 303 communicatively coupled (via bus 302) to the at least one processor 301; wherein the memory 303 stores instructions executable by the at least one processor 301 to enable the at least one processor 301 to perform a product authentication method as described above.
In one or more possible implementation manners of the embodiment of the present application, the processor 301 is configured to perform a first audit on enterprise information corresponding to a product to be authenticated by using a first audit node, and perform a second audit on production information in the enterprise information after the first audit node passes through the first audit node; after the enterprise information auditing is passed, the product authentication node carries out on-line auditing on the product information of the product to be authenticated according to a product authentication standard; after the on-line verification is passed, the product authentication node performs on-line detection on the product to be authenticated, and determines that the product to be authenticated passes primary authentication according to the result of the on-line detection; and the product authentication node is used for butting the traceability information corresponding to the product to be authenticated, checking the traceability information, and completing the authentication of the product to be authenticated after the checking is passed.
In addition, embodiments of the present application provide a non-volatile computer storage medium having stored thereon computer-executable instructions configured to perform a product authentication method as described above.
In one or more possible implementation manners of the embodiment of the present application, the foregoing computer executable instruction is configured to execute, where a first audit node performs a first audit on enterprise information corresponding to a product to be authenticated, and after the first audit node passes, a second audit node performs a second audit on production information in the enterprise information; after the enterprise information auditing is passed, the product authentication node carries out on-line auditing on the product information of the product to be authenticated according to a product authentication standard; after the on-line verification is passed, the product authentication node performs on-line detection on the product to be authenticated, and determines that the product to be authenticated passes primary authentication according to the result of the on-line detection; and the product authentication node is used for butting the traceability information corresponding to the product to be authenticated, checking the traceability information, and completing the authentication of the product to be authenticated after the checking is passed.
The embodiments of the present application are described in a progressive manner, and the same and similar parts of the embodiments are all referred to each other, and each embodiment is mainly described in the differences from the other embodiments. In particular, for apparatus, non-volatile computer storage medium embodiments, the description is relatively simple, as it is substantially similar to method embodiments, with reference to the section of the method embodiments being relevant.
The foregoing describes certain embodiments of the present application. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and changes may be made to the embodiments of the application by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the embodiments of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method of product authentication, for use with a product authentication platform, the method comprising:
the method comprises the steps that a first auditing node carries out primary auditing on enterprise information corresponding to a product to be authenticated, and after the enterprise information passes, a second auditing node carries out secondary auditing on production information in the enterprise information;
after the enterprise information auditing is passed, the product authentication node carries out on-line auditing on the product information of the product to be authenticated according to a product authentication standard;
after the on-line verification is passed, the product authentication node performs on-line detection on the product to be authenticated, and determines that the product to be authenticated passes primary authentication according to the result of the on-line detection;
and the product authentication node is used for butting the traceability information corresponding to the product to be authenticated, checking the traceability information, and completing the authentication of the product to be authenticated after the checking is passed.
2. The method for authenticating a product according to claim 1, wherein the first auditing node performs a first auditing on enterprise information corresponding to the product to be authenticated, specifically comprising:
the first auditing node performs primary auditing on the recorded information in the enterprise information;
and after the verification is passed, the second verification node carries out secondary verification on the production information of the enterprise based on the product authentication application of the enterprise.
3. A product authentication method according to claim 2, characterized in that before on-line auditing the product information of the product to be authenticated according to product authentication criteria, the method further comprises:
the product authentication node determines the product to be authenticated according to the product authentication application;
acquiring a plurality of authentication standards corresponding to the product to be authenticated on a preset website;
the product authentication criteria are determined among the plurality of authentication criteria.
4. The method for authenticating a product according to claim 1, wherein the on-line auditing of the product information of the product to be authenticated specifically comprises:
and the product authentication node carries out online auditing on the product production information, the enterprise detection information, the enterprise production standard and the enterprise production qualification corresponding to the product to be authenticated.
5. The method for authenticating a product according to claim 4, wherein the product authentication node performs an offline detection on the product to be authenticated, specifically comprising:
the product authentication node randomly extracts the product to be authenticated;
performing inspection on the randomly extracted product to be authenticated to obtain an off-line detection report corresponding to the product to be authenticated;
and comparing the offline detection report with the product authentication standard, and determining that the product to be authenticated passes primary authentication when the offline detection report meets the product authentication standard.
6. The method for authenticating a product according to claim 5, wherein after the randomly extracted product to be authenticated is subjected to inspection, the method further comprises:
the first check node monitors off-line inspection of the product to be authenticated, and monitors a comparison process of the off-line inspection report and the product authentication standard;
a supervisory report is generated.
7. The product authentication method as claimed in claim 6, wherein after the audit of the traceability information, the method further comprises:
the authentication final auditing node audits the traceability information and audits the supervision report at the same time;
and after the verification is passed, the product to be authenticated is disclosed.
8. The method of claim 7, wherein after the product to be authenticated is disclosed, the method further comprises:
the product authentication node issues a product code for the product to be authenticated, and an authentication certificate corresponding to the product to be authenticated, traceability information corresponding to the product to be authenticated and enterprise information corresponding to the product to be authenticated are written in the product code.
9. A product authentication device, the device comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a product authentication method according to any one of claims 1-8.
10. A non-transitory computer storage medium having stored thereon computer executable instructions, characterized in that the computer executable instructions are arranged to perform a product authentication method according to any of claims 1-8.
CN202310456949.1A 2023-04-21 2023-04-21 Product authentication method, device and medium Pending CN116739230A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310456949.1A CN116739230A (en) 2023-04-21 2023-04-21 Product authentication method, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310456949.1A CN116739230A (en) 2023-04-21 2023-04-21 Product authentication method, device and medium

Publications (1)

Publication Number Publication Date
CN116739230A true CN116739230A (en) 2023-09-12

Family

ID=87905174

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310456949.1A Pending CN116739230A (en) 2023-04-21 2023-04-21 Product authentication method, device and medium

Country Status (1)

Country Link
CN (1) CN116739230A (en)

Similar Documents

Publication Publication Date Title
US20170220972A1 (en) Evaluation system and method
US20150378722A1 (en) Enhanced compliance verification system
US20100312615A1 (en) Multi-Vendor Registration and Rewards System
JP6722309B2 (en) Verification method and apparatus for performing annotation processing work using verification annotation processing work
JP2002312518A (en) System for managing non-comforming component of airplane and method for the same
CN109544341B (en) Digital detection method and device based on block chain
CN111966426A (en) API (application program interface) docking method, system, equipment and storage medium
CN111444051A (en) Complete machine production testing method and system for product
CN106815725A (en) A kind of transaction verification method and device
CN111459800A (en) Method, device, equipment and medium for verifying availability of service system
CN116703299A (en) Informationized platform for intelligent purchasing
CN113706091B (en) Intelligent remote auditing method, device, system, computer equipment and storage medium
CN116739230A (en) Product authentication method, device and medium
KR101915534B1 (en) Equipment and materials quality inspection control system and control method thereof
CN111967746A (en) Quality collaborative management system
CN101989255B (en) System and method for automatically generating authentication test report of online authentication test
Tufail et al. A case study analyzing the impact of software process adoption on software quality
CN112330288A (en) Intelligent enterprise verification and marketing system and verification and marketing method thereof
CN106033391A (en) Method and device for fixing bug and changing control based on FOG data
Singh et al. Processes required for certification of an engineering equipment
JP2020095493A (en) Facility inspection support program, facility inspection support method, and facility inspection support system
CN113128980A (en) Software outsourcing order auditing method and system
TWI709096B (en) Equipment repair management method and system
CN117951208A (en) Data annotation platform, method, terminal and system for artificial intelligent service construction
JP6946530B2 (en) Methods and equipment to provide verification crowdsourcing work based on production work

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination