CN117455506A - Jewelry management method and system based on RFID technology - Google Patents

Jewelry management method and system based on RFID technology Download PDF

Info

Publication number
CN117455506A
CN117455506A CN202311468621.8A CN202311468621A CN117455506A CN 117455506 A CN117455506 A CN 117455506A CN 202311468621 A CN202311468621 A CN 202311468621A CN 117455506 A CN117455506 A CN 117455506A
Authority
CN
China
Prior art keywords
product
information
jewelry
authentication
attribute
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311468621.8A
Other languages
Chinese (zh)
Inventor
陈奖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhonggui Data Technology Shenzhen Co ltd
Original Assignee
Zhonggui Data Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhonggui Data Technology Shenzhen Co ltd filed Critical Zhonggui Data Technology Shenzhen Co ltd
Priority to CN202311468621.8A priority Critical patent/CN117455506A/en
Publication of CN117455506A publication Critical patent/CN117455506A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/01Customer relationship services
    • G06Q30/015Providing customer assistance, e.g. assisting a customer within a business location or via helpdesk
    • G06Q30/016After-sales
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • General Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a jewelry management method and a jewelry management system based on an RFID technology, which relate to the technical field of wireless communication of the Internet of things, and the method comprises the following steps: generating an attribute RFID tag for each jewelry product based on the attribute information of the plurality of jewelry products; generating a plurality of anti-counterfeiting ciphertext based on the anti-counterfeiting information of the jewelry products and writing the anti-counterfeiting ciphertext into the attribute RFID tags of the corresponding jewelry products; updating state information of a plurality of jewelry products in a product database through product agency information provided by a store terminal; receiving product inquiry information sent by a user, and performing anti-counterfeiting authentication on a target product; encrypting the transaction record information into a transaction ciphertext, transmitting the transaction ciphertext to the target store terminal, and granting the target store terminal modification permission to the attribute RFID tag of the target product. The invention improves the after-sale management efficiency of jewelry products while ensuring the privacy security of transactions.

Description

Jewelry management method and system based on RFID technology
Technical Field
The invention relates to the technical field of wireless communication of the Internet of things, in particular to a jewelry management method and system based on an RFID technology.
Background
Due to the characteristics of the jewelry product itself, most of jewelry sales are off-line sales. The traditional jewelry off-line sales has the problems of high labor cost and low product management efficiency. Along with the development of RFID technology, the RFID technology is gradually applied to all large retail stores, and related information of products can be conveniently recorded through RFID tags, so that the management efficiency of the store on jewelry products is greatly improved. Because of the valuability of jewelry products, the current trade management and after-sales management of jewelry products still rely on manpower, and how to apply RFID technology to the management of trade information, so that the after-sales management efficiency of jewelry products is improved while the security of trade privacy is ensured, is a problem to be solved urgently.
Disclosure of Invention
Aiming at the problems, the invention provides a jewelry management method and a jewelry management system based on an RFID technology, which are used for managing transaction information of jewelry products based on the RFID technology, so that the security of transaction privacy is ensured, and meanwhile, the after-sales management efficiency of the jewelry products is improved.
As one aspect of the present application, there is provided a jewelry management method based on RFID technology, comprising:
extracting attribute information of a plurality of jewelry products provided by a factory from a product database, and generating an attribute RFID label for each jewelry product based on the attribute information of the plurality of jewelry products;
extracting anti-counterfeiting information of a plurality of jewelry products provided by a factory from a product database, generating a plurality of anti-counterfeiting ciphertexts based on the anti-counterfeiting information of the plurality of jewelry products and writing the anti-counterfeiting ciphertexts into an attribute RFID label of the corresponding jewelry product, wherein the anti-counterfeiting information of each jewelry product is encrypted based on a target secret key to generate a plurality of anti-counterfeiting ciphertexts, and each anti-counterfeiting ciphertext is written into the attribute RFID label of the corresponding jewelry product;
receiving product agency information provided by a store terminal, and updating state information of a plurality of jewelry products in a product database through the product agency information;
receiving product inquiry information sent by a user, and performing anti-counterfeiting authentication on a target product based on the product inquiry information and a product database;
responding to the anti-counterfeiting authentication of the target product, if the anti-counterfeiting authentication passes through the anti-counterfeiting authentication, and if transaction feedback information sent by the target store terminal and an identity binding request sent by a user are received, extracting transaction record information from the transaction feedback information and the identity binding request, writing the transaction record information into a product database, encrypting the transaction record information into a transaction ciphertext, sending the transaction ciphertext to the target store terminal, and granting the target store terminal a modification authority to the attribute RFID tag of the target product.
Further, performing anti-counterfeiting authentication on the target product based on the product query information and the product database, including:
extracting a target store identifier, attribute information of a target product and an authentication ciphertext from the product query information;
and matching the attribute information of the target product with a plurality of jewelry products corresponding to the target store identification in the product database, decrypting the authentication ciphertext through the target secret key if the matching is successful, and matching the decrypted authentication ciphertext with the anti-counterfeiting information of the jewelry products successfully matched in the product database, wherein if the matching is successful, the anti-counterfeiting authentication of the target product is indicated to pass.
Further, the method further comprises the step of after-sales management of the target product based on the transaction ciphertext;
if an after-sale request sent by a user is received, extracting product information and identity information from the after-sale request;
and receiving the attribute RFID tag data of the target product read by the store terminal, performing product authentication and identity authentication on the after-sales request based on the attribute RFID tag data of the target product, responding to the pass of the product authentication and the identity authentication of the after-sales request, passing the after-sales request of the user and sending after-sales authentication feedback information to the store terminal.
Further, performing product authentication and identity authentication on the after-sales request based on the attribute RFID tag data of the target product includes:
decrypting the transaction ciphertext in the attribute RFID tag data of the target product through the target secret key, and extracting identity authentication information and product authentication information from the decrypted transaction ciphertext;
matching the product information in the after-sales request with the product authentication information, and if the matching is successful, indicating that the product authentication of the after-sales request is passed;
and matching the identity information in the after-sales request with the identity authentication information, and if the matching is successful, indicating that the identity authentication of the after-sales request passes.
Further, a target key is generated based on the DES algorithm.
As another aspect of the present application, there is provided a jewelry management system based on RFID technology, comprising:
the information recording module is used for recording attribute information and anti-counterfeiting information of a plurality of jewelry products provided by a manufacturer through a product database;
a tag generation module for generating an attribute RFID tag for each jewelry product based on attribute information of a plurality of jewelry products;
the label management module is used for editing and managing the RFID labels of the generated attribute of each jewelry product;
the first interaction module is used for carrying out information interaction with the store terminal;
the second interaction module is used for carrying out information interaction with the user;
the anti-counterfeiting authentication module is used for performing anti-counterfeiting authentication on the jewelry product;
and the after-sale management module is used for carrying out after-sale management on the jewelry products.
Further, for the after-sales management module, further comprising:
and the information authentication unit is used for carrying out product authentication and identity authentication on the after-sale request.
The beneficial effects of the invention are as follows:
according to the invention, the attribute information and the transaction information of the jewelry product are recorded through the RFID technology, the attribute information and the transaction information are encrypted, the product anti-counterfeiting authentication is carried out based on the attribute RFID tag data in the product sales process, the product user identity double authentication is carried out based on the attribute RFID tag data and the information recorded in the product database in the after-sales processing process, the security of the user privacy information related in the jewelry product transaction process is ensured, the anti-counterfeiting authentication of the product is realized, the after-sales processing of the jewelry product by retail stores is facilitated, and the management efficiency of the jewelry product is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to the structures shown in these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of an exemplary jewelry management method based on RFID technology of the present invention.
Fig. 2 is a schematic diagram of an exemplary jewelry management system based on RFID technology according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, some embodiments of the present application will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application. However, those of ordinary skill in the art will understand that in the various embodiments of the present application, numerous technical details have been set forth in order to provide a better understanding of the present application. However, the technical solutions claimed in the present application can be implemented without these technical details and with various changes and modifications based on the following embodiments.
Fig. 1 is a schematic flow chart of an exemplary jewelry management method based on an RFID technology according to the present invention, referring to fig. 1, an embodiment of the present invention provides an jewelry management method based on an RFID technology, which is applied to an jewelry management system based on an RFID technology, and specifically includes:
s10, extracting attribute information of a plurality of jewelry products provided by a factory from a product database, and generating attribute RFID labels for each jewelry product based on the attribute information of the plurality of jewelry products;
specifically, the attribute information of the jewelry products is used for representing characteristic information of the jewelry itself, and can be name information, product identification information, brand information, material information, cutting grade information and the like of the jewelry products, the attribute information can be set by a manufacturer of the jewelry, or can be provided to the manufacturer after professional detection by a professional institution, the attribute information of all the jewelry products can be stored through a product database, an attribute RFID label of each jewelry product is generated after the attribute information of a plurality of jewelry products is acquired by the jewelry management system, the attribute label is used for recording the attribute information of the jewelry products, and in the product selling process, relevant information in the attribute RFID labels can be read through an RFID reader, so that users can conveniently know basic information of various jewelry products in a store.
S20, extracting anti-counterfeiting information of a plurality of jewelry products provided by a factory from a product database, generating a plurality of anti-counterfeiting ciphertexts based on the anti-counterfeiting information of the jewelry products, and writing the anti-counterfeiting ciphertexts into attribute RFID tags of the corresponding jewelry products;
in particular, since the jewelry products are valuable, it is very important to perform anti-counterfeiting management on the jewelry products in order to guarantee rights of manufacturers, agents, consumers, etc., the manufacturers can pre-determine anti-counterfeiting information of each jewelry product, and in particular, can be anti-counterfeiting identification numbers for uniquely representing each jewelry product, and the jewelry management system stores the anti-counterfeiting information of a plurality of jewelry products through a product database.
In order to perform anti-counterfeiting authentication on jewelry products in subsequent sales and avoid leakage or tampering of anti-counterfeiting information, the anti-counterfeiting information of each jewelry product is encrypted through a target secret key to generate anti-counterfeiting ciphertext corresponding to each jewelry product, and each anti-counterfeiting ciphertext is written into an attribute RFID tag of the corresponding jewelry product, wherein the target secret key is specifically generated based on a symmetric encryption algorithm, such as a DES algorithm, and the symmetric encryption algorithm is a technical means well known to those skilled in the art and is not repeated herein.
S30, receiving product agency information provided by a store terminal, and updating state information of a plurality of jewelry products in a product database through the product agency information;
specifically, the store terminal is specifically configured to indicate each large retail store selling jewelry products, the product proxy information is specifically basic information of the retail store, such as store names, addresses, personnel information, and the like, and related information of a plurality of jewelry products sold by each store, and update state information of the plurality of jewelry products in the product database based on the product proxy information, so that a manufacturer can conveniently know distribution information of each jewelry product, for example, can intuitively know a state of any jewelry product, and has been issued to the store for sale or is in a state to be distributed.
S40, receiving product inquiry information sent by a user, and performing anti-counterfeiting authentication on a target product based on the product inquiry information and a product database;
specifically, for each large retail store, in the process that a user browses each jewelry product in the store, the user can send product inquiry information through own intelligent equipment or send product inquiry information through store terminal equipment in the retail store.
S50, responding to the passing of anti-counterfeiting authentication of the target product, if transaction feedback information sent by the target store terminal and an identity binding request sent by a user are received, extracting transaction record information from the transaction feedback information and the identity binding request, writing the transaction record information into a product database, encrypting the transaction record information into a transaction ciphertext, sending the transaction ciphertext to the target store terminal, and granting the target store terminal a modification authority of the attribute RFID tag of the target product.
Specifically, before purchasing the jewelry product, the user can perform anti-counterfeiting inquiry on the jewelry product with purchase intention in advance, after purchasing the jewelry product, the user can perform identity binding on the identity information of the user and the purchased jewelry product, namely the target product, in order to facilitate management of the jewelry product after purchasing the jewelry product, the jewelry management system generates transaction record information corresponding to the transaction based on the received transaction feedback information and the identity binding request, the transaction record information can be related information related to transaction processes including transaction time, transaction place, transaction amount, buyer identity information, product attribute information and the like, the transaction record information is written into a product database without limitation, the transaction record information is encrypted into a transaction ciphertext through a target secret key and then sent to a target store terminal, and meanwhile, the target store terminal is used for writing the received transaction ciphertext into the attribute RFID tag of the jewelry product for the transaction, so that information support is conveniently provided for the subsequent possible after-sales requirement of the user.
In an alternative embodiment, for the transaction ciphertext in step S50, the jewelry management system performs after-sales management on the target product based on the transaction ciphertext, specifically comprising:
if an after-sale request sent by a user is received, extracting product information and identity information from the after-sale request;
specifically, after a user purchases a target product, if there is an after-sales demand, a corresponding after-sales request is sent out, and the user can send out the after-sales request through an intelligent device carried by the user or through an intelligent device in a retail store, and after receiving the after-sales request sent by the user, the jewelry management system extracts product information and identity information included in the after-sales request, wherein the product information is specific information of a product needing after-sales treatment, and the identity information is specific information used for representing the identity of the user.
Receiving attribute RFID tag data of a target product read by a store terminal, and performing product authentication and identity authentication on after-sale requests based on the attribute RFID tag data of the target product;
specifically, in the process that the user applies for after-sales, the store terminal sends the attribute RFID tag data read from the after-sales request object provided by the user, namely the target product, to the jewelry management system, and the jewelry management system performs product authentication and identity authentication on the after-sales request through the received attribute RFID tag data of the target product and the product information and the identity information recorded in the after-sales request.
And responding to the pass of both the product authentication and the identity authentication of the after-sales request, and sending after-sales authentication feedback information to the store terminal through the after-sales request of the user.
Specifically, after receiving the authentication feedback information, the store terminal can provide relevant after-sales service for the user if the product authentication and the identity authentication of the after-sales request are passed.
According to the jewelry management method based on the RFID technology, the attribute information and the transaction information of jewelry products are recorded through the RFID technology, the attribute information and the transaction information are encrypted, product anti-counterfeiting authentication is carried out based on the attribute RFID label data in the product selling process, product user identity dual authentication is carried out based on the attribute RFID label data and information recorded in the product database in the after-sales processing process, security of user privacy information related to the jewelry product in the transaction process is guaranteed, meanwhile, anti-counterfeiting authentication of the products is achieved, after-sales processing of jewelry products by retail stores is facilitated, and the management efficiency of the jewelry products is improved.
In an alternative embodiment, for step S40, anti-counterfeit authentication is performed on the target product based on the product query information and the product database, specifically including:
extracting a target store identifier, attribute information of a target product and an authentication ciphertext from the product query information;
matching the attribute information of the target product with a plurality of jewelry products corresponding to the target store identification in the product database;
specifically, the product database records the related data of a plurality of jewelry products, the related information of the target products, such as attribute information, corresponding authentication ciphertext and the like, can be queried from the product database through the target store identifier, and the basic authentication is carried out on the target products through the information;
if the matching is successful, the authentication ciphertext is decrypted through the target secret key, and the decrypted authentication ciphertext is matched with the anti-counterfeiting information of the jewelry product successfully matched in the product database, so that the purpose of anti-counterfeiting authentication on the target product is achieved, the false product purchased by a user is avoided, if the matching is successful, the anti-counterfeiting authentication on the target product is indicated to pass, and in the process, the encryption and decryption of the authentication ciphertext are operated by the jewelry management system, so that good security guarantee is provided for the user to purchase the jewelry product.
In an alternative embodiment, the product authentication and the identity authentication of the after-sales request based on the attribute RFID tag data of the target product specifically include the following contents:
decrypting the transaction ciphertext in the attribute RFID tag data of the target product through the target secret key, and extracting identity authentication information and product authentication information from the decrypted transaction ciphertext;
the identity authentication information is specifically related identity information for uniquely representing a user who purchases the target product, for example, information such as an identity identification number and a mobile phone number for uniquely representing the identity of the user, and the product authentication information is specifically related information for uniquely representing the target product, for example, attribute information of the target product, and data such as anti-counterfeit ciphertext.
Matching the product information in the after-sales request with the product authentication information, and if the matching is successful, indicating that the product authentication of the after-sales request is passed;
specifically, if the product information in the after-sale request is matched with the product authentication information obtained after decrypting the transaction ciphertext in the attribute RFID tag data of the target product, the product authentication information indicates that the target product after-sale application meets the after-sale application object and the product authentication of the after-sale request is passed.
And matching the identity information in the after-sales request with the identity authentication information, and if the matching is successful, indicating that the identity authentication of the after-sales request passes.
Specifically, if the identity information in the after-sale request is matched with the identity authentication information obtained after decrypting the transaction ciphertext in the attribute RFID tag data of the target product, the identity of the user is indicated to meet the requirement of the after-sale application on the identity of the applicant, so that good after-sale guarantee is provided for both the seller and the consumer.
Fig. 2 is a schematic structural diagram of an exemplary jewelry management system based on RFID technology according to the present invention, referring to fig. 2, in an embodiment of the present invention, there is provided a jewelry management system based on RFID technology, which specifically includes:
the information recording module is used for recording attribute information and anti-counterfeiting information of a plurality of jewelry products provided by a manufacturer through a product database;
a tag generation module for generating an attribute RFID tag for each jewelry product based on attribute information of a plurality of jewelry products;
the label management module is used for editing and managing the RFID labels of the generated attribute of each jewelry product;
the method comprises the steps that editing management is carried out on each jewelry product generation attribute RFID label, including operations such as adding, deleting and replacing, for example, a plurality of anti-fake ciphertext is generated based on anti-fake information of a plurality of jewelry products and written into the attribute RFID label of the corresponding jewelry product;
the first interaction module is used for performing information interaction with the store terminal, for example, receiving product agency information provided by the store terminal;
the second interaction module is used for carrying out information interaction with the user, for example, receiving product inquiry information sent by the user;
the anti-counterfeiting authentication module is used for performing anti-counterfeiting authentication on the jewelry product, for example, performing anti-counterfeiting authentication on the target product based on product inquiry information and a product database;
the after-sale management module is used for after-sale management of jewelry products;
wherein after-market management of the jewelry product comprises:
if an after-sale request sent by a user is received, extracting product information and identity information from the after-sale request;
and receiving the attribute RFID tag data of the target product read by the store terminal, performing product authentication and identity authentication on the after-sales request based on the attribute RFID tag data of the target product, responding to the pass of the product authentication and the identity authentication of the after-sales request, passing the after-sales request of the user and sending after-sales authentication feedback information to the store terminal.
The after-sales management module further comprises an information authentication unit, wherein the information authentication unit is used for carrying out product authentication and identity authentication on the after-sales request, and specifically, the information authentication unit is used for carrying out product authentication and identity authentication on the after-sales request based on the attribute RFID tag data of the target product.
It will be understood that modifications and variations will be apparent to those skilled in the art from the foregoing description, and it is intended that all such modifications and variations be included within the scope of the following claims. Parts of the specification not described in detail belong to the prior art known to those skilled in the art.

Claims (7)

1. A method of jewelry management based on RFID technology, comprising:
extracting attribute information of a plurality of jewelry products provided by a factory from a product database, and generating an attribute RFID label for each jewelry product based on the attribute information of the plurality of jewelry products;
extracting anti-counterfeiting information of a plurality of jewelry products provided by a factory from a product database, generating a plurality of anti-counterfeiting ciphertexts based on the anti-counterfeiting information of the plurality of jewelry products and writing the anti-counterfeiting ciphertexts into an attribute RFID label of the corresponding jewelry product, wherein the anti-counterfeiting information of each jewelry product is encrypted based on a target secret key to generate a plurality of anti-counterfeiting ciphertexts, and each anti-counterfeiting ciphertext is written into the attribute RFID label of the corresponding jewelry product;
receiving product agency information provided by a store terminal, and updating state information of a plurality of jewelry products in a product database through the product agency information;
receiving product inquiry information sent by a user, and performing anti-counterfeiting authentication on a target product based on the product inquiry information and a product database;
responding to the anti-counterfeiting authentication of the target product, if the anti-counterfeiting authentication passes through the anti-counterfeiting authentication, and if transaction feedback information sent by the target store terminal and an identity binding request sent by a user are received, extracting transaction record information from the transaction feedback information and the identity binding request, writing the transaction record information into a product database, encrypting the transaction record information into a transaction ciphertext, sending the transaction ciphertext to the target store terminal, and granting the target store terminal a modification authority to the attribute RFID tag of the target product.
2. The method of claim 1, wherein authenticating the target product for anti-counterfeiting based on the product query information and the product database, comprises:
extracting a target store identifier, attribute information of a target product and an authentication ciphertext from the product query information; and matching the attribute information of the target product with a plurality of jewelry products corresponding to the target store identification in the product database, decrypting the authentication ciphertext through the target secret key if the matching is successful, and matching the decrypted authentication ciphertext with the anti-counterfeiting information of the jewelry products successfully matched in the product database, wherein if the matching is successful, the anti-counterfeiting authentication of the target product is indicated to pass.
3. The method of claim 1, further comprising, based on the transaction ciphertext, performing after-market management of the target product;
if an after-sale request sent by a user is received, extracting product information and identity information from the after-sale request; and receiving the attribute RFID tag data of the target product read by the store terminal, performing product authentication and identity authentication on the after-sales request based on the attribute RFID tag data of the target product, responding to the pass of the product authentication and the identity authentication of the after-sales request, passing the after-sales request of the user and sending after-sales authentication feedback information to the store terminal.
4. The method of claim 3, wherein authenticating the after-market request for product authentication and identity based on the attribute RFID tag data of the target product comprises:
decrypting the transaction ciphertext in the attribute RFID tag data of the target product through the target secret key, and extracting identity authentication information and product authentication information from the decrypted transaction ciphertext;
matching the product information in the after-sales request with the product authentication information, and if the matching is successful, indicating that the product authentication of the after-sales request is passed;
and matching the identity information in the after-sales request with the identity authentication information, and if the matching is successful, indicating that the identity authentication of the after-sales request passes.
5. The method of claim 1 wherein the target key is generated based on a DES algorithm.
6. A jewelry management system based on RFID technology, comprising:
the information recording module is used for recording attribute information and anti-counterfeiting information of a plurality of jewelry products provided by a manufacturer through a product database;
a tag generation module for generating an attribute RFID tag for each jewelry product based on attribute information of a plurality of jewelry products;
the label management module is used for editing and managing the RFID labels of the generated attribute of each jewelry product;
the first interaction module is used for carrying out information interaction with the store terminal;
the second interaction module is used for carrying out information interaction with the user;
the anti-counterfeiting authentication module is used for performing anti-counterfeiting authentication on the jewelry product;
and the after-sale management module is used for carrying out after-sale management on the jewelry products.
7. The system of claim 6, wherein for the after-market management module, further comprising:
and the information authentication unit is used for carrying out product authentication and identity authentication on the after-sale request.
CN202311468621.8A 2023-11-07 2023-11-07 Jewelry management method and system based on RFID technology Pending CN117455506A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311468621.8A CN117455506A (en) 2023-11-07 2023-11-07 Jewelry management method and system based on RFID technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311468621.8A CN117455506A (en) 2023-11-07 2023-11-07 Jewelry management method and system based on RFID technology

Publications (1)

Publication Number Publication Date
CN117455506A true CN117455506A (en) 2024-01-26

Family

ID=89594509

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311468621.8A Pending CN117455506A (en) 2023-11-07 2023-11-07 Jewelry management method and system based on RFID technology

Country Status (1)

Country Link
CN (1) CN117455506A (en)

Similar Documents

Publication Publication Date Title
US20170206532A1 (en) System and method for streamlined registration and management of products over a communication network related thereto
US8931689B2 (en) Systems and methods for anti-counterfeit authentication through communication networks
JP4682187B2 (en) Authentication system, information providing method, and information providing system
CN102831529B (en) A kind of commodity information identification method based on radio frequency and system
KR101812638B1 (en) Module, service server, system and method for authenticating genuine goods using secure element
CN111147432B (en) KYC data sharing system with confidentiality and method thereof
CN102930307A (en) Anti-counterfeiting authentication method for famous wine
CN108965228B (en) Dispute relief system with KYC data mark of multiple keys and method thereof
US20200344046A1 (en) Product Tracking System and Method
WO2018018175A1 (en) Authentication device and method for article
JP4797026B2 (en) Authentication method, authentication system, tag device, information reference client, and authentication server
KR100512064B1 (en) contactless type communication tag and portable tag reader for verifying a genuine article
CN101140649A (en) Method and system for realizing electric commerce by mobile phones integrating RFID chip mobile phones
KR100524176B1 (en) Mobile phone capable of reading genuine article verifying information stored in a RF-tag and method for administrating service management executable in a computer communicating with the same phone
US20170200154A1 (en) Method for protecting the resale of an object provided with an nfc tag
EP2668606A2 (en) System for checking the authenticity of articles
KR20130108022A (en) System for discriminating a counterfeit and method thereof
CN117455506A (en) Jewelry management method and system based on RFID technology
CN113204784B (en) Express delivery distribution system and method based on single-side information hiding
CN115186301A (en) Information processing method, information processing device, computer equipment and computer readable storage medium
CN112926972B (en) Information processing method based on block chain, block chain system and terminal
CN110798321B (en) Article information service method based on block chain
CN111131227B (en) Data processing method and device
JP4955470B2 (en) Cryptographic ID handling method and CRM system
JP5177053B2 (en) Service providing system, server, gateway, user device, and service providing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination