GB2585107A - Method, device, terminal apparatus and storage medium for product authentication - Google Patents

Method, device, terminal apparatus and storage medium for product authentication Download PDF

Info

Publication number
GB2585107A
GB2585107A GB1916806.1A GB201916806A GB2585107A GB 2585107 A GB2585107 A GB 2585107A GB 201916806 A GB201916806 A GB 201916806A GB 2585107 A GB2585107 A GB 2585107A
Authority
GB
United Kingdom
Prior art keywords
product
password
verification information
verification
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1916806.1A
Other versions
GB201916806D0 (en
Inventor
Cheung Christopher Chuang Tze
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chinapps Ltd
Original Assignee
Chinapps Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chinapps Ltd filed Critical Chinapps Ltd
Publication of GB201916806D0 publication Critical patent/GB201916806D0/en
Publication of GB2585107A publication Critical patent/GB2585107A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10544Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
    • G06K7/10821Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
    • G06K7/10861Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices sensing of data fields affixed to objects or articles, e.g. coded labels
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Abstract

Product authentication including determining whether a product is fake or counterfeit or genuine. The method comprises: scanning, by a terminal, a verification label of the product to obtain a product password and verification information therefrom; obtaining a password input by a user from a user interface of the terminal; comparing the product password with the password supplied by the user; and displaying the verification information if the passwords match. The user may obtain the password from a merchant. The verification information, which is embodied as a letter, character, picture, code etc, acts to indicate successful verification of the product and may be converted to plaintext for display. In an embodiment the verification label also contains a serial number of the product, which when scanned by the terminal is sent to a data center to receive from the data center a corresponding password and verification information. The password retrieved from the data center may be compared to that scanned from the label and the verification information from the label may released through a successful comparison and visually compared by the user with the verification information from the data center to further authenticate the product if both verification information items match.

Description

Intellectual Property Office Application No. GII1916806.1 RTM Date:18 b1ay2020 The following terms are registered trade marks and should be read as such wherever they occur in this document: Buetooth Facebook WeChat WhatsApp (Visa) Paywave iPhone Android Intellectual Property Office is an operating name of the Patent Office www.gov.uk /ipo METHOD, DEVICE, TERMINAL APPARATUS AND STORAGE MEDIUM FOR PRODUCT AUTHENTICATION
TECHNICAL FIELD
[0001] The invention relates to the field of communication technology, in particular to a method, an apparatus, a terminal device and a storage medium for product authentication.
BACKGROUND
[0002] With the development of the Internet, more and more products are being sold on e-commerce platforms. However, it has always been an intractable problem to anti-counterfeit products sold on e-commerce platforms. At present, the common anti-counterfeiting technologies on the market are probably the following two ways: [0003] 1. Put laser labels, QR code labels, etc. on the products. However, this anti-counterfeiting technology is difficult to counterfeit because the label material is easily copied or forged.
[0004] 2. Using RFID (Radio Frequency Identification) for production, distribution and anti-counterfeiting management, it can play a certain role in production management and circulation management. However, since RFID reading and writing devices are only suitable for closed systems of manufacturers and distributors, users cannot participate and cannot recognize the authenticity of some products.
[0005] Therefore, for the products to be sold, the existing anti-counterfeiting methods cannot achieve the true anti-counterfeiting. The anti-counterfeiting cost is too low, and the label is easy to copy, it cannot effectively inhibit the product fraud in the circulation.
SUMMARY
[0006] It is an object of the present invention to provide a method, an apparatus, a terminal device and a storage medium for product authentication to solve one or more of the technical problems set forth above in the prior art [0007] In a first aspect, embodiments of the present invention provide a method for product authentication, being performed by a terminal device, the method comprising: scanning a verification label of the product to obtain product password and verification information; the verification label includes the product password and the verification information of the product; displaying an interface of the terminal device for inputting data; obtaining a password input by a user from the interface; comparing the product password with the password obtained from the interface; if the password obtained from the interface is consistent with the product password, displaying the verification information of the product; the verification information is configured to verify the identity of the product.
[0008] In some embodiments, the displaying the verification information for the product comprises: converting the verification information of the product into plaintext information; displaying the plaintext information.
[0009] In some embodiments, the verification label further comprises a serial number of the product, the method further comprises: logging in to a data center that stores information about the product; sending the serial number to the data center; receiving a password and verification information corresponding to the serial number returned by the data center; wherein the password corresponding to the serial number is configured to input into the interface, and the verification information corresponding to the serial number is configured to compare with the displayed verification information to verify the identity of the product.
[0010] In some embodiments, the logging in comprises: logging in the data center that stores information about the product through an independent third-party transport tool.
[0011] In some embodiments, the verification information comprises at least one of a number, a letter, a character, and a picture.
[0012] In some embodiments, the material of the verification label is fragile.
[0013] In some embodiments, the verification label is printed on a material that is color or color cross material.
[0014] In a second aspect, embodiments of the present invention provide an apparatus for product authentication, applied to a terminal device, the apparatus comprising: a scanning module, configured to scan a verification label of the product to obtain product password and verification information; the verification label includes the product password and the verification information of the product; an interface module, configured to display an interface of the terminal device; a password obtaining module, configured to obtain a password input by a user from the interface; a password comparison module, configured to compare the product password with the password obtained from the interface; and a verification information display module, configured to display the verification information of the product if the password obtained from the interface is consistent with the product password; the verification information is configured to verify the identity of the product.
[0015] In some embodiments, the verification information display module comprises: an information conversion unit, configured to convert the verification information of the product into plaintext information; a display unit, configured to display the plaintext information.
[0016] In some embodiments, the verification label further comprises a serial number of the product, the apparatus further comprises: a login module, configured to log in to a data center that stores information of the product; a sending module, configured to send the serial number to the data center; a receiving module, configured to receive a password and verification information corresponding to the serial number returned by the data center, where the password corresponding to the serial number is configured to input into the interface, and the verification information corresponding to the serial number is configured to compare with the displayed the verification information to verify the identity of the product.
[0017] In a third aspect, embodiments of the present invention provides a design, where a structure for product authentication includes a processor and a memory; where the memory is configured to store a program for product authentication in the first aspect executed by a device for product authentication. The device for product authentication may also include a communication interface, configured in communication between the device for product authentication and other devices or communication networks.
[0018] In a fourth aspect, embodiments of the present invention further provides a computer readable and non-transitory storage medium, configured to computer software instructions used by an apparatus for product authentication, including a program involved in a method for performing product authentication in the first aspect above.
[0019] Any one of the above technical solutions has the following advantages or beneficial effects: [0020] According to the solution provided by the embodiment of the present invention, the user can participate in the process of identifying the authenticity of the product, and can play the effect of product anti-counterfeiting, and effectively inhibit the fraudulent behavior of the product in the circulation link.
[0021] The above summary is only for the purpose of illustration and is not intended to be limiting. In addition to the illustrative aspects, embodiments and features described above, further aspects, embodiments and features of the present invention will be readily apparent by reference to the drawings and detailed description below.
BRIEF DESCRIPTION OF THE DRAWINGS
[0022] In the drawings, the same reference numerals are used to refer to the same or similar parts or elements unless otherwise stated. The drawings are not necessarily to scale. It is to be understood that the appended drawings are merely illustrative of the embodiments of the invention, and are not intended to limit the scope of the invention.
[0023] FIG. lis a schematic flow chart showing an embodiment of a method for product authentication provided by the present invention.
[0024] FIG.2 is a schematic diagram showing some embodiments of a terminal device provided by the present invention.
[0025] FIG.3 is a schematic flow chart of another embodiment of a method for product authentication provided by the present invention.
[0026] FIG.4 to FIG.6 are schematic diagrams showing an application example of a method for product authentication provided by the present invention.
[0027] FIG. 7A to FIG.7C are schematic structural diagram showing an embodiment of an apparatus for product authentication provided by the present invention.
[0028] FIG. 8 is a schematic diagram showing an embodiment of a terminal device provided by the present invention.
DETAILED DESCRIPTION OF THE INVENTION
[0029] In the following, only certain exemplary embodiments are briefly described. As one skilled in the art can recognize that the described embodiments may be modified in various different ways, without departing from the spirit and scope of the invention. Accordingly, the drawings and the description are to be regarded as illustrative rather than limiting.
[0030] Referring to FIG. 1, an embodiment of the present invention provides a method for product authentication, which can be applied to a terminal device. The terminal device may be the type as shown in FIG. 2. For example, smart phones, Bluetooth card readers, multi-function card readers with encryption keyboards, multi-function card readers with an encryption keyboard and a receipt function. The terminal device provided in FIG. 2 is only for example, and it may also be other forms or other types of terminal devices. The method for product authentication provided by the embodiment of the present invention may include steps S100 to S500, as follows: [0031] S100, scanning a verification label of the product to obtain a product password and verification. The verification label may include the product password, verification information, serial number, and the like of the product. This information can be stored inside the label, for example in the form of an NFC label. When the label is scanned, the terminal device can obtain this information from it. In addition, the label may directly display the production time, location, manufacturer and other information of the product. Similarly, the information in the label can also include information such as the production time, location, manufacturer and other information of the product. This information is also obtained after the terminal device scans the verification label. In this embodiment, the products may include various types of products sold in a mall or in a network platform, such as skin care products, electrical appliances, luggage, electronic products, and the like.
[0032] In some embodiments, the material of the verification label is fragile. The verification label can be affixed to a location that the user often touches. For example, for a skin care product with a lid, a verification label can be placed at the junction of the lid and the bottle. If the user opens the lid to start using the product, the verification label will be torn open, and since the material of the verification label is fragile, the tearing is damaged, and the label can be prevented from being fraudulently used. Alternatively, it can be affixed to other suitable places in the product or package. The label can also be configured with a web address. When the product is scanned, it is logged into the website or server corresponding to the website to obtain the password, verification information, serial number, etc. of the product. And it will improve the security.
[0033] 5200, displaying an interface of the terminal device for inputting data. The interface can prompt the user to enter a password. When the interface is displayed, the prompt message can also be broadcast in voice at the same time.
[0034] S300, obtaining a password input by a user from the interface.
[0035] In some embodiments, after the terminal device scans the verification label, the display of the terminal device may display an interface to prompt the user of the product to input a corresponding password. Users can obtain a password and verification information in advance. Users can get the corresponding password for this product from the merchant or merchant platform or the server provided by the merchant.
[0036] In this embodiment, the password is encrypted in the verification label by means of encryption, and is only acquired when the set terminal device scans it.
[0037] S400, comparing the product password and the password obtained from the interface.
[0038] S500, displaying the verification information of the product if the password obtained from the interface is consistent with the product password; the verification information is configured to verify the identity of the product.
[0039] In this embodiment, the verification information may include at least one of a number, a letter, a character, and a picture. For example, a digital code of 3 to 4 digits, or a two-dimensional code, a barcode, or the like can be used.
[0040] In addition, the user obtains the verification information of the product in advance while obtaining the password of the product in advance.
[0041] If the displayed verification information is in the form of a two-dimensional code, the user can scan the two-dimensional code on the mobile phone and then display the verification information of the two-dimensional code. At this time, the displayed verification information may be a data code, a picture, a number, a character, or other symbols. In this way, the user can quickly know whether the verification information is consistent with the verification information acquired in advance.
[0042] In some embodiments, if the password of the interface does not match the password of the product, the user may be prompted to enter the password again. It may be in the form of voice or text. In addition, you can set the limit for entering a password. For example, if the password is entered three times and three times inconsistent with the product's password, it can be assumed that the product is not a product that is authorized by the manufacturer or is not authorized to be circulated in the formal market. That is, it may be a fake or counterfeit.
[0043] In some embodiments, in the foregoing step S500, displaying the verification information may further comprises: converting the verification information into plaintext information, and displaying the plaintext information.
[0044] For example, the verification information is in the format of a two-dimensional code. Users cannot directly judge the authenticity of this product by the two-dimensional code. At this point, the verification information needs to be converted into plaintext information. For another example, the verification information is in a cipher text format, and since the user compares the verification information with the pre-acquired verification information, the verification information needs to be converted into the plaintext information.
[0045] Therefore, with the present embodiment, the fraudulent behavior of the product in the production and distribution process can be further avoided.
[0046] In some embodiments, the verification label can also include a serial number of the product. embodiments of the present invention can enter the data center in advance through the terminal device, and obtain the password and the verification information of the product according to the serial number provided by the label. In some embodiments, while the user scans the label, the interface of the terminal device can display the serial number of the product and the website of the data center. Users can log in to the corresponding data center through the current terminal device or other terminal device. After logging in to the data center, the user enters the serial number to obtain the password and verification information corresponding to the serial number. Specifically, referring to FIG. 3, the method in this embodiment may further include steps 5610 to S630, as follows: [0047] S610, logging in a data center that stores information about the product.
[0048] In some embodiments, a manufacturer or seller, such as an e-commerce platform, generates a unique serial number for a batch of merchandise in the anti-counterfeiting system and stores it in the data center. When making a product label, log in to the anti-counterfeiting system and read the product information in the data center, including the unique serial number of the product. Secondly, the label writing device is used to write the unique serial number and anti-counterfeiting authentication information of the product into the NFC label according to the EMV specification card-making process. The anti-counterfeiting authentication information includes the password and the verification information as above. At the same time, the NFC label has built-in UID information that is unique in the world and cannot be modified and cannot be copied. This information can be used to ensure the authenticity of the NFC chip. Then, the HD information of the NFC label and the serial number and the anti-counterfeiting authentication information of the product are stored in the data center. It is also possible to record the built-in UID of the NFC label and the step of writing the serial number to a log and store it in the data center.
[0049] In some embodiments, the mobile phone, card reader, etc. can be used to log in.
[0050] In some embodiments, the data center that storing the information of the product is logged through an independent third-party transport tool. For example, third-party transport 20 tools may include Facebook, SMS, Wechat, Whatsapp, and the like.
[0051] S620, sending the serial number to the data center.
[0052] In some embodiments, the serial number is sent to the data center via a third-party transport tool. After receiving the serial number of the product, the data center can find the password and verification information of the product corresponding to the serial number. Then, the data center can send the queried password and verification information to the terminal device through a third-party transmission tool.
[0053] S630, receiving a password and verification information corresponding to the serial number returned by the data center; wherein the password corresponding to the serial number is configured to input into the interface, and the verification information corresponding to the serial number is configured to compare with the displayed verification information to verify the identity of the product..
[0054] In some embodiments, the verification label may be noncopyable. The information recorded in the verification label is printed on special paper and can produce a digital, data or QR code that cannot be copied. The surface of this special paper can emit colors or crossed colors.
[0055] An application example of a method for product authentication will be described below with reference to FIGS. 4 to 6, as follows: [0056] The system of this application example is mainly composed of the following parts: NEC security label, data center, card reader and mobile APP.
[0057] 1. NFC security label: The NFC security label is a label based on the EMV specification and has a CPU chip. Each chip has a globally unique chip serial number (ULD) and cannot be copied. The content of the chip is protected by a key, and its content is accessible only through the key authentication system of the chip. The anti-counterfeit label is affixed to the seal of the product packaging and is destroyed after being torn. It cannot be transferred from one product to another.
[0058] When the product is out of the warehouse, the operator logs in to the background of the PC and connects to the NFC reader to write the relevant information of the product and the anti-counterfeiting authentication information into the NFC security label.
[0059] 2. Data Center: configured to store a variety of information of products. When the authenticity of the product is queried through the mobile APP or NFC reader, the product information in the NFC security label can be read. And obtain information about the product from the data center, and compare the information read from the NFC security label with the information obtained from the data center; [0060] 3. Card reader and mobile APP: As a channel connecting the data center and the NFC security label, it can provide users with a new anti-counterfeiting query experience. Open the NFC anti-counterfeiting query APP on the mobile phone and connect to the network. And bring the label verification device closer to the product labeled with the NFC security label. Then enter the verification code to verify the authenticity of the product immediately. Moreover, you can also find information such as the origin, time of shipment, and logistics of the product.
[0061] The system operation process of this application example is as follows: [0062] (I) Production of the NFC labels: [0063] (i) The e-commerce platform generates a unique serial number of a batch of goods in the anti-counterfeiting system and stores it in the data center.
[0064] (ii) When the verification label is created, the producer logs into the anti-counterfeiting system and reads the product information in the data center, including the unique serial number of the product.
[0065] (iii) Using the label writing device to write the unique serial number and anti-counterfeiting authentication information of the product into the NFC label according to the EMV specification card-making process; at the same time, the NFC label has built-in UID information that is globally unique and cannot be modified and cannot be copied, and the information can be utilized.to guarantee the authenticity of the NFC chip.
[0066] (iv) Storing the UID information of the NFC label together with the product serial number and anti-counterfeiting authentication information in the data center.
[0067] (v) Recording the built-in UID of the NFC label and the step of writing the serial number to the log and store it in the data center.
[0068] (2) Label the appropriate place in the product or packaging, as shown in Figure 4 10 below.
[0069] Features: [0070] (i) The label cannot be torn off after it has been attached to the product. [0071] (ii) When the label is torn, the label is destroyed.
[0072] (iii) The production process of the label is generally operated by the supplier of the 15 product.
[0073] (iv) The label is similar to turning the product into an anti-counterfeit bank card (the product and the chip are integrated, so there is no way to exchange the goods, and the label becomes the product card); [0074] (v) The product card requires a password and verification information.
[0075] (vi) Upgrading to a more secure network verification method based on existing technology development.
[0076] (3) Password and verification information [0077] (i) Password: The security level is the same or above the security level of the password of the existing bank card.
[0078] (ii) The CVV (Card Verification Value) format of the authentication information is as follows (CVV: Security Code).
[0079] a. 3-4 digits.
[0080] b. Verifying the verification information displayed by the QR code. [0081] c. Displaying readable information of other validation information.
[0082] d. b and c will produce data, images or other verifiable figures, numbers, words or other symbols.
[0083] (4) Encrypted transmission of password and verification information [0084] (i) The server or device is configured to store the password and authentication information, and the corresponding password and verification information is sent to the consignee through an independent third party transmission.
[0085] (ii) This transmission process encrypts the transmitted information in a 3DES or more secure manner and performs point-to-point full encryption of the encrypted information.
[0086] (iii) If it is safe and controllable, we can also choose not to encrypt.
[0087] (iv) The transmission third party can be Facebook, SMS, Wechat, Whatsapp, etc. [0088] (5) Equipment for reading cards [0089] The card reader device has at least an NFC module and can be equipped with Bluetooth, a screen or a keyboard, etc. At the same time, the card reading device has one of the following characteristics: [0090] (i) PCI (Payment Card Industry) certified or above security certification, or any authentication that is more secure than PCI certification; [0091] (ii) the device can read the card number and card information of the card from the air or against the card; [0092] (iii) The technology of reading card by the device is the technology of using the PAY WAVE or other card organization for the security card reading (including the security level selected under the actual situation); [0093] (iv) The device type can be as shown in Figure 2 below.
[0094] (6) Two-factor authentication [0095] The recipient verifies that the sender has not been tampered with or replaced during the delivery process. Therefore, in order to provide users with a more convenient experience, we have designed a variety of verification methods: [0096] (i) Connection verification method, as shown in Figure 5: [0097] a. The recipient receives the password and verification information in advance through a secure transmission third party (eg, a telecommunications company or SMS); [0098] b. The receiver connects to the network through a secure card reading device and reads the information of the verification label of the product card through the network. Then, enter the password received in advance to the card reading device. If the password is correct, the digital information is returned, and the digital information is configured to verify the number or a simple verification code.
[0099] c. The recipient's card reading device converts the digital information into a plain text that can be directly verified, including figures, numbers, symbols, and the like.
[00100] d. The receiver compares the verification information received in advance with the converted digital information to determine whether the two are the same.
[00101] e. The verification information is very simple. The digital information generated by the card reader or the plaintext converted by the digital information is compared with the verification information, and it is obvious whether the two are consistent.
[00102] (ii) The method of non-connection verification, as shown in Figure 6: [00103] a. The user turns on the power of the card reader and the screen begins to display.
[00104] b. The user uses the card reader to scan the product's verification label or to place the card reader close to the product's verification label.
[00105] c. Entering your password on the screen.
[00106] d. If the entered password is incorrect more than three times, the system will automatically freeze the verification of the product and notify the recipient.
[00107] e. If the entered password is correct, the device can display the encrypted digital verification information on the screen.
[00108] f The user reads the digital verification information, compares the pre-received verification information with the read digital verification information, and determines the authenticity of the product.
[00109] Referring to FIG. 7A to 7C, an embodiment of the present invention further provides an apparatus for product authentication, comprising: [00110] a scanning module 100, configured to scan a verification label of the product to obtain a product password and verification; the verification label includes the product password and verification information of the product; [00111] an interface module 200, configured to display an interface of the terminal device; [00112] a password obtaining module 300, configured to obtain a password input by a user from the interface; [00113] a password comparison module 400, configured to compare the product password with the password obtained from the interface; and [00114] a verification information display module 500, configured to display the verification information of the product if the password obtained from the interface is consistent with the product password; the verification information is configured to verify the identity of the product.
[00115] In some embodiments, the verification information display module 500 comprises: [00116] an information conversion unit 510, configured to convert the verification information of the product into plaintext information; [00117] a display unit 520, configured to display the plaintext information.
[00118] In some embodiments, the label further comprises a serial number of the product, the apparatus further comprises: [00119] a login module 610, configured to log in to a data center that stores information of the product; [00120] a sending module 620, configured to send the serial number to the data center; [00121] a receiving module 630, configured to receive a password and verification information corresponding to the serial number returned by the data center, where the password corresponding to the serial number is configured to input into the interface, and the verification information corresponding to the serial number is configured to compare with the displayed the verification information to verify the identity of the product.
[00122] In some embodiments, the login module 610 is also configured to log in the data center that stores information about the product through an independent third-party transport tool.
[00123] In some embodiments, the verification information comprises at least one of a number, a letter, a character, and a picture.
[00124] In some embodiments, the material of the verification label is fragile.
[00125] In some embodiments, the verification label is printed on a material that is color or color cross material.
[00126] Embodiments of the present invention provides a design, where a structure for product authentication includes a processor and a memory; where the memory is configured to store a program for product authentication in the first aspect executed by a device for product authentication. The device for product authentication may also include a communication interface, configured in communication between the device for product authentication and other devices or communication networks.
[00127] Embodiments of the present invention further provides a computer readable and non-transitory storage medium, configured to computer software instructions used by an apparatus for product authentication, including a program involved in a method for performing product authentication in the first aspect above.
[00128] The functions of the device may be implemented by hardware or by corresponding software implemented by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
[00129] In one possible design, the structure of the product authentication includes a processor and a memory, the device for product authentication performing the program of product authentication in the above first aspect, the processor being configured to be used for The program stored in the memory is executed. The device for authenticating the product may also include a communication interface, the device for product authentication communicating with other devices or communication networks.
[00130] The device also includes: [00131] The communication interface 23 is used for communication between the processor 22 and an external device.
[00132] The memory 21 may include a high speed RAM memory and may also include a non-volatile memory such as at least one disk memory.
[00133] If the memory 21, the processor 22, and the communication interface 23 are independently implemented, the memory 21, the processor 22, and the communication interface 23 can be connected to each other through a bus and complete communication with each other. The bus may be an Industrial Standard Architecture (ISA) bus, a Peripheral Component (PCI) bus, or an Extended Industry Standard Component (EISA) bus. The bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in Figure 8, but it does not mean that there is only one bus or one type of bus.
[00134] Optionally, in a specific implementation, if the memory 21, the processor 22, and the communication interface 23 are integrated on one chip, the memory 21, the processor 22, and the communication interface 23 can complete communication with each other through the internal interface.
[00135] In the description of the present specification, the description with reference to the terms "one embodiment", "some embodiments", "example", "specific example", or "some examples" and the like means a specific feature described in connection with the embodiment or example. A structure, material or feature is included in at least one embodiment or example of the invention. Furthermore, the particular features, structures, materials, or characteristics described may be combined in a suitable manner in any one or more embodiments or examples. In addition, various embodiments or examples described in the specification, as well as features of various embodiments or examples, may be combined and combined.
[00136] Moreover, the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, features defining ''first" and "second" may include at least one of the features, either explicitly or implicitly. In the description of the present invention, the meaning of "a plurality" is two or more unless specifically and specifically defined otherwise.
[00137] Any process or method description in the flowcharts or otherwise described herein may be understood to represent a module, segment or portion of code that includes one or more executable instructions for implementing the steps of a particular logical function or process.
And the scope of the preferred embodiments of the invention includes additional implementations, in which the functions may be performed in a substantially simultaneous manner or in an opposite order depending on the functions involved, in the order shown or discussed. It will be understood by those skilled in the art to which the embodiments of the present invention pertain.
[00138] The logic and/or steps represented in the flowchart or otherwise described herein, for example, may be considered as an ordered list of executable instructions for implementing logical functions, and may be embodied in any computer readable medium, Used in conjunction with, or in conjunction with, an instruction execution system, apparatus, or device (eg, a computer-based system, a system including a processor, or other system that can fetch instructions and execute instructions from an instruction execution system, apparatus, or device) Or use with equipment. For the purposes of this specification, a "computer-readable medium" can be any apparatus that can contain, store, communicate, propagate, or transport a program for use in an instruction execution system, apparatus, or device, or in conjunction with such an instruction execution system, apparatus, or device.
[00139] The computer readable medium of the embodiments of the present invention may be a computer readable signal medium or a computer readable storage medium or any combination of the two. More specific examples of computer readable storage media, at least (non-exhaustive list) include the following: electrical connections (electronic devices) having one or more wires, portable computer disk cartridges (magnetic devices), random access memory (RAM) ), read only memory (ROM), erasable editable read only memory (EPROM or flash memory), fiber optic devices, and portable read only memory (CDROM). In addition, the computer readable storage medium may even be a paper or other suitable medium on which the program may be printed, as it may be optically scanned, for example by paper or other medium, followed by editing, interpretation or, if appropriate, in other suitable manners. Processing is performed to obtain the program electronically and then stored in computer memory.
[00140] In an embodiment of the invention, a computer readable signal medium may comprise a data signal propagating in a baseband or as part of a carrier, carrying computer readable program code. Such propagated data signals can take a variety of forms including, but not limited to, electromagnetic signals, optical signals, or any suitable combination of the foregoing. The computer readable signal medium can also be any computer readable medium other than a computer readable storage medium, which can transmit, propagate, or transport a program for use in or in connection with an instruction execution system, an input method, or a device. . Program code embodied on a computer readable medium can be transmitted by any suitable medium, including but not limited to wireless, wire, optical cable, radio frequency (RF), and the like, or any suitable combination of the foregoing.
[00141] It should be understood that portions of the invention may be implemented in hardware, software, firmware or a combination thereof In the above-described embodiments, multiple steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, it can be implemented by any one or combination of the following techniques well known in the art: having logic gates for implementing logic functions on data signals. Discrete logic circuits, application specific integrated circuits with suitable combinational logic gates, programmable gate arrays (PGAs), field programmable gate arrays (FPGAs), etc. [00142] A person skilled in the art can understand that all or part of the steps carried by the method of the above embodiment can be completed by a program to instruct related hardware, and the program can be stored in a computer readable storage medium including one or a combination of the steps of the method embodiments.
[00143] In addition, each functional unit in each embodiment of the present invention may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module. The above integrated modules can be implemented in the form of hardware or in the form of software functional modules. An integrated module, if implemented in the form of a software functional module and sold or used as a standalone product, may also be stored in a computer readable storage medium. The storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
[00144] The above is only the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and various changes or substitutions can be easily conceived by those skilled in the art within the technical scope of the present disclosure. These should be covered by the scope of the present invention. Therefore, the scope of protection of the present invention should be determined by the scope of the claims.

Claims (12)

  1. CLAIMS1. A method for product authentication, being performed by a terminal device, the method comprising: scanning a verification label of the product to obtain a product password and verification information; the information in the verification label includes the product password and the verification information; displaying an interface of the terminal device for inputting data; obtaining a password input by a user from the interface; comparing the product password with the password obtained from the interface; displaying the verification information if the password obtained from the interface is consistent with the product password; the verification information is configured to verify the identity of the product.
  2. 2. The method according to claim 1, wherein the displaying the verification information comprises: converting the verification information into plaintext information; displaying the plaintext information.
  3. 3. The method according to claim 1, wherein the verification label further comprises a serial number of the product, the method further comprises: logging in to a data center that stores information about the product; sending the serial number to the data center; receiving a password and verification information corresponding to the serial number returned by the data center; wherein the password corresponding to the serial number is configured to input into the interface, and the verification information corresponding to the serial number is configured to compare with the displayed verification information to verify the identity of the product.
  4. 4. The method according to claim 3, wherein the logging in comprises: logging in the data center that stores information about the product through an independent third-party transport tool.
  5. 5. The method according to any one of claims I to 4, wherein the verification information comprises at least one of a number, a letter, a character, and a picture.
  6. 6. The method according to any one of claims 1 to 4, wherein the material of the verification label is fragile.
  7. 7. The method according to any one of claims 1 to 4, wherein the verification label is printed on a material that is color or color cross material.
  8. 8. An apparatus for product authentication, applied to a terminal device, the apparatus comprising: a scanning module, configured to scan a verification label of the product to obtain a product password and verification information; the verification label includes the product password and the verification information; an interface module, configured to display an interface of the terminal device for inputting data; a password obtaining module, configured to obtain a password input by a user from the interface; a password comparison module, configured to compare the product password with the password obtained from the interface; and a verification information display module, configured to display the verification information if the password obtained from the interface is consistent with the product password; the verification information is configured to verify the identity of the product.
  9. 9. The apparatus according to claim 8, wherein the verification information display module comprises: an information conversion unit, configured to convert the verification information of the product into plaintext information; a display unit, configured to display the plaintext information.
  10. 10. The apparatus according to claim 8, wherein the label further comprises a serial number of the product, the apparatus further comprises: a login module, configured to log in to a data center that stores information of the product; a sending module, configured to send the serial number to the data center; a receiving module, configured to receive a password and verification information corresponding to the serial number returned by the data center, where the password corresponding to the serial number is configured to input into the interface, and the verification information corresponding to the serial number is configured to compare with the displayed the verification information to verify the identity of the product.
  11. 11. A terminal device for performing product authentication, wherein the terminal device comprises: one or more processors; a storage device, configured to store one or more programs; the one or more processors are caused to perform the method of any one of claims 1-7 when the one or more programs are executed by the one or more processors.
  12. 12. A computer readable and non-transitory storage medium storing a computer program, wherein the program implements the method of any of claims 1-7 when executed by a processor.
GB1916806.1A 2019-06-27 2019-11-19 Method, device, terminal apparatus and storage medium for product authentication Withdrawn GB2585107A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
HK19125975 2019-06-27

Publications (2)

Publication Number Publication Date
GB201916806D0 GB201916806D0 (en) 2020-01-01
GB2585107A true GB2585107A (en) 2020-12-30

Family

ID=69063263

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1916806.1A Withdrawn GB2585107A (en) 2019-06-27 2019-11-19 Method, device, terminal apparatus and storage medium for product authentication

Country Status (1)

Country Link
GB (1) GB2585107A (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117315298B (en) * 2023-11-27 2024-03-19 欧科华创自动化(深圳)有限公司 RFID tag-based identification method and device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101833728A (en) * 2010-04-19 2010-09-15 杨家水 Commodity anti-counterfeiting method
WO2014035336A1 (en) * 2012-09-03 2014-03-06 Quick Check Inc. Genuine goods verification system and method
WO2015160505A1 (en) * 2014-04-14 2015-10-22 Jenda Tag Llc System and method for product authentication
WO2018068466A1 (en) * 2016-10-10 2018-04-19 东莞市天眼网络科技有限公司 Method and system for verifying merchandise authenticity
CN108334919A (en) * 2018-04-16 2018-07-27 南京中印防伪科技有限公司 A kind of product false proof verification method and its system based on Quick Response Code
CN109345268A (en) * 2018-09-21 2019-02-15 联桥网云信息科技(长沙)有限公司 Two-dimensional code anti-counterfeiting label, label register method and label identification method based on NFC

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101833728A (en) * 2010-04-19 2010-09-15 杨家水 Commodity anti-counterfeiting method
WO2014035336A1 (en) * 2012-09-03 2014-03-06 Quick Check Inc. Genuine goods verification system and method
WO2015160505A1 (en) * 2014-04-14 2015-10-22 Jenda Tag Llc System and method for product authentication
WO2018068466A1 (en) * 2016-10-10 2018-04-19 东莞市天眼网络科技有限公司 Method and system for verifying merchandise authenticity
CN108334919A (en) * 2018-04-16 2018-07-27 南京中印防伪科技有限公司 A kind of product false proof verification method and its system based on Quick Response Code
CN109345268A (en) * 2018-09-21 2019-02-15 联桥网云信息科技(长沙)有限公司 Two-dimensional code anti-counterfeiting label, label register method and label identification method based on NFC

Also Published As

Publication number Publication date
GB201916806D0 (en) 2020-01-01

Similar Documents

Publication Publication Date Title
US10177816B2 (en) Devices and methods for identification, authentication and signing purposes
CN104281954B (en) Antifake method for products
US10640273B2 (en) Authentication of packaged products
EP3017580B1 (en) Signatures for near field communications
CN101339597B (en) Method, system and equipment for upgrading read-write machine firmware
MX2013002598A (en) Hub and spokes pin verification.
CN102831529A (en) Radio frequency based commodity information identification method and system
US11636276B2 (en) Augmented reality information display and interaction via NFC based authentication
US11676152B2 (en) Application-based point of sale system in mobile operating systems
Roland Security issues in mobile NFC devices
US11907932B2 (en) Augmented reality card activation experience
US20150264044A1 (en) Electronic signature token, system and method
WO2022108886A1 (en) End-to end product authentication technique
Crowe et al. Mobile Phone Technology:“Smarter” Than We Thought
GB2585107A (en) Method, device, terminal apparatus and storage medium for product authentication
KR20220118294A (en) Authentication for provisioning third-party digital wallets
CN102236862A (en) System and method for identifying authenticity of general commodities
KR20040092670A (en) A method for certifying a rfid tag with security function
Mattsson Security and Infrastructure for Mobile Phone Payments using Near Field Communication
CN106815697A (en) A kind of item tracing method for anti-counterfeit, service platform, user terminal and system
KR20120022694A (en) Method for changing information of rfid

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)