US9270668B2 - Method and apparatus for verifying anti-counterfeiting information - Google Patents
Method and apparatus for verifying anti-counterfeiting information Download PDFInfo
- Publication number
- US9270668B2 US9270668B2 US14/092,750 US201314092750A US9270668B2 US 9270668 B2 US9270668 B2 US 9270668B2 US 201314092750 A US201314092750 A US 201314092750A US 9270668 B2 US9270668 B2 US 9270668B2
- Authority
- US
- United States
- Prior art keywords
- information
- verification information
- verification
- encrypted address
- address information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H04W4/008—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/35—Network arrangements, protocols or services for addressing or naming involving non-standard use of addresses for implementing network functionalities, e.g. coding subscription information within the address or functional addressing, i.e. assigning an address to a function
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0492—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
Definitions
- the present invention relates to the field of anti-counterfeiting and particularly to a method and apparatus for verifying anti-counterfeiting information.
- Embodiments of the invention provide a method and apparatus for verifying anti-counterfeiting information so as to improve an anti-counterfeiting effect, to extend the scope of population to which anti-counterfeiting effect is applicable and to guarantee the stability of anti-counterfeiting means.
- An embodiment of the invention provides a method for verifying anti-counterfeiting information, the method including:
- An embodiment of the invention provides another method for verifying anti-counterfeiting information, the method including:
- An embodiment of the invention provides an apparatus for verifying anti-counterfeiting information, the apparatus including:
- an encrypted address information processing unit configured to obtain and parse encrypted address information of an object
- a network connecting unit configured to connect to a network address corresponding to the parsed encrypted address information
- a verification information sending unit configured to determine that the encrypted address information is valid upon successful connection and send verification information of the object to the network address corresponding to the encrypted address information
- a feedback receiving unit configured to receive feedback information about whether the verification information is valid.
- An embodiment of the invention provides another apparatus for verifying anti-counterfeiting information, the apparatus including:
- a network connection receiving unit configured to receive a request from a terminal for connection to a specific network address
- a network connection processing unit configured to set up a connection of the terminal to the specific network address upon determining that the specific network address or encrypted address information corresponding to the specific network address is valid;
- a verification information receiving unit configured to receive verification information sent from the terminal to the specific network address
- a feedback sending unit configured to send feedback information about whether the verification information is valid to the terminal.
- a terminal obtains and parses encrypted address information of an object; the terminal connects to a network address corresponding to the parsed encrypted address information; the terminal determines that the encrypted address information is valid upon successful connection and sends verification information of the object to the network address corresponding to the encrypted address information; and the terminal receives feedback information about whether the verification information is valid.
- the encrypted address information and the verification information are designed on the object so that the terminal parses the encrypted address information and connects to the network address for verification, and there is a strict correspondence relationship between the respective anti-counterfeiting elements, that is, different encrypted address information can only be parsed for a network address corresponding thereto, and each different network address can only have verification information corresponding thereto verified there, thereby improving an anti-counterfeiting effect; and also the terminal is easy for the user to obtain without any additionally purchased device, thus extending the scope of population to which anti-counterfeiting is applicable; and moreover the method can be embodied at the user side in the form of a client which is updated primarily in software, thereby also ensuring the stability of the technical.
- FIG. 1 is a schematic flow chart of a method for verifying anti-counterfeiting information according to an embodiment of the invention
- FIG. 2 is a schematic flow chart of another method for verifying anti-counterfeiting information according to an embodiment of the invention
- FIG. 3 is a schematic flow chart of another method for verifying anti-counterfeiting information according to an embodiment of the invention.
- FIG. 4 is a schematic flow chart of another method for verifying anti-counterfeiting information according to an embodiment of the invention.
- FIG. 5 is a schematic flow chart of another method for verifying anti-counterfeiting information according to an embodiment of the invention.
- FIG. 6 is a schematic flow chart of another method for verifying anti-counterfeiting information according to an embodiment of the invention.
- FIG. 7 is a schematic flow chart of another method for verifying anti-counterfeiting information according to an embodiment of the invention.
- FIG. 8 is a schematic flow chart of another method for verifying anti-counterfeiting information according to an embodiment of the invention.
- FIG. 9 is a schematic flow chart of a method for verifying anti-counterfeiting information according to an embodiment of the invention.
- FIG. 10 is a schematic diagram of a verification page according to an embodiment of the invention.
- FIG. 11 is a schematic diagram of a superficial string of digits passing verification according to an embodiment of the invention.
- FIG. 12 is a schematic diagram of an underlying string of digits passing verification according to an embodiment of the invention.
- FIG. 13 is a schematic structural diagram of an apparatus for verifying anti-counterfeiting information according to an embodiment of the invention.
- FIG. 14 is a schematic structural diagram of another apparatus for verifying anti-counterfeiting information according to an embodiment of the invention.
- FIG. 15 is a schematic structural diagram of another apparatus for verifying anti-counterfeiting information according to an embodiment of the invention.
- FIG. 16 is a schematic structural diagram of another apparatus for verifying anti-counterfeiting information according to an embodiment of the invention.
- FIG. 17 is a schematic structural diagram of another apparatus for verifying anti-counterfeiting information according to an embodiment of the invention.
- Embodiments of the invention provide a method and apparatus for verifying anti-counterfeiting information so as to improve an anti-counterfeiting effect, to lower an anti-counterfeiting cost, to extend the scope of population to which anti-counterfeiting effect is applicable and to guarantee the stability of anti-counterfeiting means.
- a method for verifying anti-counterfeiting information includes the following steps.
- a terminal obtains and parses encrypted address information of an object.
- the terminal connects to a network address corresponding to the parsed encrypted address information.
- the terminal determines that the encrypted address information is valid upon successful connection and sends verification information of the object to the network address corresponding to the encrypted address information.
- the terminal receives feedback information about whether the verification information is valid.
- the encrypted address information is in the form of a two-dimension code, an RFID, Near Field Communication (NFC) or other technical forms; and all of technical forms which can include network address information and can be parsed will be employable with the invention.
- NFC Near Field Communication
- the verification information is in the form of including but not limited to one or combination of digitals, letters, symbols, graphics, etc.
- the terminal Upon connection to the network address corresponding to the encrypted address information, the terminal sends to the address the verification information which can be obtained directly from the object.
- the sent verification information is the same as or has a preset correspondence relationship with contents as seen directly in the object about the verification information, for example, the verification information is indicated in the object as a123456, and then the sent verification information is also a123456; in another example, the verification information is indicated in the object as the sum of 3 and 5, and the sent verification information is the sum of 3 and 5, i.e., 8; and in still another example, the verification information of the object is an animal pattern, and the sent verification information is a Chinese animal name corresponding to the animal pattern.
- the encrypted address information of the object parsed by the terminal can be correctly parsed only by the specified terminal according to the invention so as to ensure an anti-counterfeiting effect.
- first encrypted address information, second encrypted address information, third encrypted address information, first verification information, second verification information and third verification information can be combined in a scheme.
- first encrypted address information, second encrypted address information, third encrypted address information, first verification information, second verification information and third verification information can be combined in a scheme.
- the encrypted address information includes first encrypted address information
- the verification information includes first verification information
- the anti-counterfeiting verification includes the following steps.
- a terminal obtains and parses first encrypted address information of an object.
- the terminal connects to a network address corresponding to the parsed first encrypted address information.
- the terminal determines that the first encrypted address information is valid upon successful connection and sends first verification information of the object to the network address corresponding to the first encrypted address information.
- the terminal receives feedback information about whether the first verification information is valid.
- the anti-counterfeiting verification following S 101 to S 104 further includes the following steps.
- the terminal obtains and parses second encrypted address information of the object.
- the terminal connects to a network address corresponding to the parsed second encrypted address information.
- the terminal determines that the second encrypted address information is valid upon successful connection and sends the first verification information of the object to the network address corresponding to the second encrypted address information.
- the terminal receives again feedback information about whether the first verification information is valid.
- the second encrypted address information is difficult to obtain as compared with the first encrypted address information, for example, the second encrypted address information needs to be obtained by altering an original structure of the object.
- the anti-counterfeiting verification following S 101 to S 108 further includes the following steps.
- the terminal obtains and parses the second encrypted address information of the object.
- the terminal connects to the network address corresponding to the parsed second encrypted address information.
- the terminal determines that the second encrypted address information is valid upon successful connection and sends second verification information of the object to the network address corresponding to the second encrypted address information.
- the terminal receives feedback information about whether the second verification information is valid.
- the following steps also have the same verification effect: S 101 to S 104 and S 109 and S 112 .
- the second verification information is difficult to obtain as compared with the first verification information, for example, the second verification information needs to be obtained by altering an original structure of the object.
- the verification following S 101 to S 104 further includes the following steps.
- the terminal obtains and parses again the first encrypted address information of the object.
- the terminal connects again to the network address corresponding to the parsed first encrypted address information.
- the terminal determines again that the first encrypted address information is valid upon successful connection and sends second verification information of the object to the network address corresponding to the first encrypted address information.
- the terminal receives feedback information about whether the second verification information is valid.
- a terminal obtains and parses first encrypted address information of an object.
- the terminal connects to a network address corresponding to the parsed first encrypted address information.
- the terminal determines that the first encrypted address information is valid upon successful connection and then obtains and parses second encrypted address information of the object.
- the terminal connects to a network address corresponding to the parsed second encrypted address information.
- the terminal determines that the second encrypted address information is valid upon successful connection.
- the corresponding feedback information includes one or more of the following information: the name of the object corresponding to the verification information, the type of the verification information, a historical record of verification times of the verification information, an invalidation alert corresponding to the verification information, the remaining number of times that the verification information is to be verified, the accumulated number of times that the verification information has been verified, a domain where the terminal sending the verification information resides, and the model of the terminal sending the verification information.
- a user can inquire of a database of objects corresponding to the verification information, by the corresponding feedback information that the verification information is valid, to further determine whether the product is a fake.
- the historical record of verification times of the verification information is compared with a historical record of verification times in the database of objects corresponding to the verification information to determine whether the product is a fake.
- the database of objects here refers to a database corresponding to a public network address specified by a producer of the object, for example a database in an official website, which guarantees accuracy and irreproducibility of anti-counterfeiting data, where the authenticity of the object is determined when the user determines that the feedback information is consistent with the contents in the official website.
- a method for verifying anti-counterfeiting information includes the following steps.
- S 301 is to receive a request from a terminal for connection to a specific network address.
- S 302 is to set up a connection of the terminal to the specific network address upon determining that the specific network address or encrypted address information corresponding to the specific network address is valid.
- S 303 is to receive verification information sent from the terminal to the specific network address.
- S 304 is to send feedback information about whether the verification information is valid to the terminal.
- the received verification information shall be the same as or has a preset correspondence relationship with information stored in the specific network address.
- a123456 is stored in the specific network address, and the terminal shall also send a123456; and in another example, after the terminal sets up a connection to the specific network address, a plurality of stored verification options are presented at the specific network address, and a user selects one of the options at the specific network address according to indicated contents of verification information carried by the object itself and sends the option as the verification information to the network address through the terminal.
- the user is alerted to successful verification of the encrypted address information and instructed to enter corresponding verification information between S 302 and S 303 .
- the method further includes: determining the type of the encrypted address information; and determining that encrypted address information, corresponding to the encrypted address information, below the encrypted address information is invalidated upon determining that the encrypted address information is not the lowest encrypted address information. For example, first encrypted address information easy to obtain from the surface of the object is invalidated after second encrypted address information is obtained from the inside of the object and verified.
- the method further includes: decrementing by one the remaining number of times that the encrypted address information, which is not the lowest, is to be verified; and determining that the encrypted address information, which is not the lowest, is invalidated upon determining that the remaining number of times that the encrypted address information is to be verified is zero.
- the invalidated encrypted address information is stored into a recycle database.
- the invalidated encrypted address information will be protected strictly from being recycled.
- the method further includes: determining that verification information, corresponding to the verification information, below the verification information is invalidated upon determining that the verification information is not the lowest verification information.
- the method further includes: decrementing by one the remaining number of times that the verification information, which is not the lowest, is to be verified; and determining that the verification information, which is not the lowest, is invalidated upon determining that the remaining number of times that the verification information is to be verified is zero.
- the method further includes: sending to the terminal an inquiry message about whether to determine the highest verification information and the highest encrypted address information of the object directly to be invalidated upon determining that the verification information is the highest verification information and the encrypted address information is the highest encrypted address information; and if there is a positive feedback from the terminal, then determining that the highest verification information and the highest encrypted address information are invalidated.
- the terminal is inquired of about whether the object has been used upon determining that the second verification information and the second encrypted address information have been used, and if there is a positive feedback from the terminal, then it is indicated that the second verification information and the second encrypted address information of the object are of no more value to anti-counterfeiting and thus determined to be invalidated.
- the inquiry mechanism will be triggered only if it is determined that the highest verification information and the highest encrypted address information (e.g., fourth verification information and third encrypted address information) are used when there are more than two pieces of verification information or encrypted address information.
- the invalidated verification information is stored into a recycle database.
- determination by the server that the verification information is valid refers to determination by the server that the verification information is the same as or corresponding to information in the network address at which the verification information is received, where the verification information has not been invalidated.
- the server has no entry record of the corresponding higher second verification information when the received verification information is the first verification information, and the number of times of being entered is below a preset number of times when the verification information is the second verification information.
- the corresponding feedback information includes one or more of the following parameters: the name of the object corresponding to the verification information, the type of the verification information, a historical record of verification times of the verification information, an invalidation alert corresponding to the verification information, the remaining number of times that the verification information is to be verified, the accumulated number of times that the verification information has been verified, a domain where the terminal sending the verification information resides, and the model of the terminal sending the verification information.
- the feedback information that the verification information is valid is sent to a database of objects corresponding to the verification information when it is determined that the verification information is valid.
- a synchronizing mechanism set up with the database of objects the user can log onto a specified website and inquire of the database of objects to retrieve feedback information for check to thereby further guarantee the authenticity of the data.
- an anti-counterfeiting verification function can be performed in client software or a customized terminal.
- the terminal is a mobile phone with a photographing function, in which the client software according to the invention is installed, and the verification information in use is a string of digits, and the encrypted address information in use is a two-dimension code which can be implemented at a low cost, where it is determined that anti-counterfeiting verification is passed when the string of digits provided from the object is the same as the string of digits in the network address corresponding to the two-dimension code; and the first encrypted address information, the second encrypted address information, the first verification information and the second verification information according to the invention are more particularly referred to as a superficial two-dimension code, an underlying two-dimension code, a superficial verification string of digits and an underlying verification string of digits respectively in the particular embodiment dependent upon an application scenario.
- the steps S 301 to S 304 are performed at a network-side device which can be a cloud encryption server. Referring to
- a user installs a dedicated mobile phone client which is application software installed on a mobile phone to take a picture of and identify a two-dimension code, where identified valid verification data (e.g., an address uniquely corresponding to the two-dimension code) is uploaded automatically to a cloud encryption server.
- identified valid verification data e.g., an address uniquely corresponding to the two-dimension code
- the user takes a picture of a superficial two-dimension code of a commodity.
- the superficial two-dimension code is affixed on the outside of the product and observable directly and capable of being photographing and identified by the dedicated mobile phone client, where each two-dimension code corresponds to a unique encrypted network address and records anti-counterfeiting verification information of the two-dimension code.
- the client decrypts the superficial two-dimension code.
- the superficial two-dimension code is decrypted successfully but there is no entry to a correct verification page or it is indicated that the superficial two-dimension code has been invalidated, then it can be substantially determined that the commodity is a fake, where the verification page is for a mobile phone to enter a “Superficial/Underlying Verification String of Digits” for verification after accessing a unique network address corresponding to the two-dimension code over a network after the dedicated mobile phone client identifies the two-dimension code.
- the superficial verification string of digits is printed on the outside of the product (at the seal, etc.) to be entered for verification as instructed after the dedicated mobile phone client identifies the superficial/underlying two-dimension code.
- the user logs onto the official database of the commodity for comparison with the historical record of verification times available in the official database, and if there is a displayed match with the time indicated by the user, then it is determined that first anti-counterfeiting verification is valid, and the flow proceeds to S 406 .
- An underlying two-dimension code is obscured by a scratchable coating, a removable sheet of paper or otherwise and capable of being photographed by the mobile phone client.
- the user is ready to purchase the commodity, removes/scratches an anti-counterfeiting label to expose the underlying two-dimension code, takes a picture of the underlying two-dimension code using the dedicated mobile phone client, and then enters the correct superficial verification string of digits, and the client indicates that it is valid but the superficial two-dimension code is invalidated and displays the verification time and the source information about the commodity corresponding to the underlying two-dimension code.
- the user accesses the official network and enters the superficial verification string of digits again for comparison, and then the historical record of several recent verification times is displayed, and it is indicated that the superficial two-dimension code is invalidated, and if there is a displayed match with the time indicated by the user, then it is determined that second anti-counterfeiting verification is valid.
- An underlying verification string of digits is located inside of the product (on the inside of a bottle cover, on the inside of a package, etc.) to be entered for verification as instructed after the dedicated mobile phone client identifies the superficial/underlying two-dimension code.
- the user purchases the commodity and then opens the package and sees the underlying verification string of digits, and takes a picture of the underlying two-dimension code using the dedicated mobile phone client.
- the correct underlying verification string of digits is entered and indicated to be valid while the superficial verification string of digits is indicated to be invalidated, and the verification time and the source information of the commodity are displayed as illustrated in FIG. 12 .
- the user accesses the official network and enters the underlying verification string of digits again for comparison, and then the historical record of several recent verification times is displayed, and it is indicated that both the superficial two-dimension code and the superficial verification string of digits are invalidated, and if there is a displayed match with the time indicated by the user, then it is determined that third anti-counterfeiting verification is valid.
- anti-counterfeiting information corresponding to the alcohol commodity in the foregoing verification steps is distributed as follows: a superficial two-dimension code affixed on a package box of the commodity, an underlying two-dimension code visible after the superficial two-dimension code is uncovered, a superficial verification string of digits on the outside of a bottle cover of the commodity, and an underlying verification string of digits visible on the inside of the removed bottle cover.
- an apparatus for verifying anti-counterfeiting information includes:
- an encrypted address information processing unit 51 configured to obtain and parse encrypted address information of an object
- a network connecting unit 52 configured to connect to a network address corresponding to the parsed encrypted address information
- a verification information sending unit 53 configured to determine that the encrypted address information is valid upon successful connection and send verification information of the object to the network address corresponding to the encrypted address information
- a feedback receiving unit 54 configured to receive feedback information about whether the verification information is valid.
- the encrypted address information includes first encrypted address information
- the verification information includes first verification information
- the encrypted address information processing unit 51 is further configured to obtain and parse the second encrypted address information of the object;
- the network connecting unit 52 is further configured to connect to a network address corresponding to the parsed second encrypted address information;
- the verification information sending unit 53 is further configured to determine that the second encrypted address information is valid upon successful connection and send the first verification information of the object to the network address corresponding to the second encrypted address information;
- the feedback receiving unit 54 is further configured to receive again feedback information about whether the first verification information is valid.
- the encrypted address information processing unit 51 is further configured to obtain and parse second encrypted address information of the object;
- the network connecting unit 52 is further configured to connect to a network address corresponding to the parsed second encrypted address information;
- the verification information sending unit 53 is further configured to determine that the second encrypted address information is valid upon successful connection and send the second verification information of the object to the network address corresponding to the second encrypted address information;
- the feedback receiving unit 54 is further configured to receive feedback information about whether the second verification information is valid.
- the encrypted address information processing unit 51 is further configured to obtain and parse again the first encrypted address information of the object;
- the network connecting unit 52 is further configured to connect again to the network address corresponding to the parsed first encrypted address information;
- the verification information sending unit 53 is further configured to determine again that the first encrypted address information is valid upon successful connection and send the second verification information of the object to the network address corresponding to the first encrypted address information;
- the feedback receiving unit 54 is further configured to receive feedback information about whether the second verification information is valid.
- the corresponding feedback information includes one or more of the following information: the name of the object corresponding to the verification information, the type of the verification information, a historical record of verification times of the verification information, an invalidation alert corresponding to the verification information, the remaining number of times that the verification information is to be verified, the accumulated number of times that the verification information has been verified, a domain where a terminal sending the verification information resides, and the model of the terminal sending the verification information.
- an apparatus for verifying anti-counterfeiting information includes:
- a network connection receiving unit 61 configured to receive a request from a terminal for connection to a specific network address
- a network connection processing unit 62 configured to set up a connection of the terminal to the specific network address upon determining that the specific network address or encrypted address information corresponding to the specific network address is valid;
- a verification information receiving unit 63 configured to receive verification information sent from the terminal to the specific network address
- a feedback sending unit 64 configured to send feedback information about whether the verification information is valid to the terminal.
- the apparatus further includes:
- an invalidation determining unit 65 configured to determine the type of the encrypted address information corresponding to the specific network address upon determining that the specific network address or the encrypted address information is valid;
- the invalidation determining unit 65 is further configured:
- the apparatus further includes:
- an invalidation recycling unit 66 configured to store the invalidated encrypted address information into a recycle database.
- the invalidation determining unit 65 is further configured to determine that verification information, corresponding to the verification information, below the verification information is invalidated upon determining that the verification information is not the lowest verification information.
- the invalidation determining unit 65 is further configured:
- the invalidation determining unit 65 is further configured:
- the invalidation recycling unit 66 is further configured to store the invalidated verification information into the recycle database.
- the corresponding feedback information includes one or more of the following information:
- the name of the object corresponding to the verification information the type of the verification information, a historical record of verification times of the verification information, an invalidation alert corresponding to the verification information, the remaining number of times that the verification information is to be verified, the accumulated number of times that the verification information has been verified, a domain where the terminal sending the verification information resides, and the model of the terminal sending the verification information.
- the apparatus further includes:
- a data synchronizing unit 67 configured to send the feedback information that the verification information is valid to a database of objects corresponding to the verification information when it is determined that the verification information is valid.
- the embodiments of the invention provide a method and apparatus for verifying anti-counterfeiting information so as to improve an anti-counterfeiting effect, to lower an anti-counterfeiting cost, to extend the scope of population to which anti-counterfeiting effect is applicable and to guarantee the stability of anti-counterfeiting means.
- the embodiments of the invention can be embodied as a method, a system or a computer program product. Therefore the invention can be embodied in the form of an all-hardware embodiment, an all-software embodiment or an embodiment of software and hardware in combination. Furthermore the invention can be embodied in the form of a computer program product embodied in one or more computer useable storage mediums (including but not limited to a disk memory, an optical memory, etc.) in which computer useable program codes are contained.
- These computer program instructions can also be stored into a computer readable memory capable of directing the computer or the other programmable data processing device to operate in a specific manner so that the instructions stored in the computer readable memory create an article of manufacture including instruction means which perform the functions specified in the flow(s) of the flow chart and/or the block(s) of the block diagram.
- These computer program instructions can also be loaded onto the computer or the other programmable data processing device so that a series of operational steps are performed on the computer or the other programmable data processing device to create a computer implemented process so that the instructions executed on the computer or the other programmable data processing device provide steps for performing the functions specified in the flow(s) of the flow chart and/or the block(s) of the block diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (20)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210575554 | 2012-12-26 | ||
CN201210575554.5 | 2012-12-26 | ||
CN201210575554.5A CN103903146A (en) | 2012-12-26 | 2012-12-26 | Anti-counterfeiting information verification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
US20140181509A1 US20140181509A1 (en) | 2014-06-26 |
US9270668B2 true US9270668B2 (en) | 2016-02-23 |
Family
ID=50976123
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/092,750 Expired - Fee Related US9270668B2 (en) | 2012-12-26 | 2013-11-27 | Method and apparatus for verifying anti-counterfeiting information |
Country Status (2)
Country | Link |
---|---|
US (1) | US9270668B2 (en) |
CN (1) | CN103903146A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105490809A (en) * | 2014-09-17 | 2016-04-13 | 腾讯科技(深圳)有限公司 | Information acquisition method, device, terminal and server |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9575560B2 (en) | 2014-06-03 | 2017-02-21 | Google Inc. | Radar-based gesture-recognition through a wearable device |
US9426130B2 (en) | 2014-07-21 | 2016-08-23 | Xiaomi Inc. | Methods, devices and systems for anti-counterfeiting authentication |
CN104158659B (en) * | 2014-07-21 | 2015-11-11 | 小米科技有限责任公司 | Anti-counterfeit authentication method, device and system |
US9811164B2 (en) * | 2014-08-07 | 2017-11-07 | Google Inc. | Radar-based gesture sensing and data transmission |
US9778749B2 (en) | 2014-08-22 | 2017-10-03 | Google Inc. | Occluded gesture recognition |
US11169988B2 (en) | 2014-08-22 | 2021-11-09 | Google Llc | Radar recognition-aided search |
US9600080B2 (en) | 2014-10-02 | 2017-03-21 | Google Inc. | Non-line-of-sight radar-based gesture recognition |
CN104601735A (en) * | 2015-03-04 | 2015-05-06 | 张月妹 | Cloud system mobile terminal management method and system |
US10016162B1 (en) | 2015-03-23 | 2018-07-10 | Google Llc | In-ear health monitoring |
JP6427279B2 (en) | 2015-04-30 | 2018-11-21 | グーグル エルエルシー | RF based fine motion tracking for gesture tracking and recognition |
US10088908B1 (en) | 2015-05-27 | 2018-10-02 | Google Llc | Gesture detection and interactions |
US10817065B1 (en) | 2015-10-06 | 2020-10-27 | Google Llc | Gesture recognition using multiple antenna |
US10492302B2 (en) | 2016-05-03 | 2019-11-26 | Google Llc | Connecting an electronic component to an interactive textile |
CN107086995A (en) * | 2017-04-01 | 2017-08-22 | 管建智 | Antifalsification label, antiforge method for commodities, terminal, platform and system |
CN109063492B (en) * | 2018-07-05 | 2020-11-13 | 北京小米智能科技有限公司 | Information processing method and device |
US11277265B2 (en) | 2020-07-17 | 2022-03-15 | The Government of the United States of America, as represented by the Secretary of Homeland Security | Verified base image in photo gallery |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050108044A1 (en) * | 2003-11-05 | 2005-05-19 | Koster Karl H. | Systems and methods for detecting counterfeit pharmaceutical drugs at the point of retail sale |
US7730176B1 (en) * | 2004-05-12 | 2010-06-01 | Baytsp.Com, Inc. | Identification and tracking of digital content distributors on wide area networks |
US8359271B2 (en) * | 2005-03-16 | 2013-01-22 | Dt Labs, Llc | Apparatus for customer authentication of an item |
CN202939903U (en) * | 2012-02-11 | 2013-05-15 | 海南亚元防伪技术研究所 | Automatic identification system used for cell phone and based on IoT texture anti-fake technique |
WO2014029196A1 (en) * | 2012-08-23 | 2014-02-27 | Wu Songhua | Recognition method and system based on dimensional barcode anti-counterfeiting |
US20140095398A1 (en) * | 2012-10-02 | 2014-04-03 | Robert Y. Lin | Double ID Anti-Counterfeit Method and System |
CN103745364A (en) * | 2014-01-06 | 2014-04-23 | 王小凡 | Scan code differential scanning-based anti-fake method and scan code differential scanning method |
CN104240095A (en) * | 2014-08-21 | 2014-12-24 | 厦门纳网科技有限公司 | Two-dimensional code anti-fake method and system based on domain name |
CN104240093A (en) * | 2014-05-23 | 2014-12-24 | 成都鹰瑞科技有限公司 | Two-dimension code anti-counterfeiting method |
-
2012
- 2012-12-26 CN CN201210575554.5A patent/CN103903146A/en active Pending
-
2013
- 2013-11-27 US US14/092,750 patent/US9270668B2/en not_active Expired - Fee Related
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050108044A1 (en) * | 2003-11-05 | 2005-05-19 | Koster Karl H. | Systems and methods for detecting counterfeit pharmaceutical drugs at the point of retail sale |
US7730176B1 (en) * | 2004-05-12 | 2010-06-01 | Baytsp.Com, Inc. | Identification and tracking of digital content distributors on wide area networks |
US8359271B2 (en) * | 2005-03-16 | 2013-01-22 | Dt Labs, Llc | Apparatus for customer authentication of an item |
CN202939903U (en) * | 2012-02-11 | 2013-05-15 | 海南亚元防伪技术研究所 | Automatic identification system used for cell phone and based on IoT texture anti-fake technique |
WO2014029196A1 (en) * | 2012-08-23 | 2014-02-27 | Wu Songhua | Recognition method and system based on dimensional barcode anti-counterfeiting |
US20140095398A1 (en) * | 2012-10-02 | 2014-04-03 | Robert Y. Lin | Double ID Anti-Counterfeit Method and System |
CN103745364A (en) * | 2014-01-06 | 2014-04-23 | 王小凡 | Scan code differential scanning-based anti-fake method and scan code differential scanning method |
CN104240093A (en) * | 2014-05-23 | 2014-12-24 | 成都鹰瑞科技有限公司 | Two-dimension code anti-counterfeiting method |
CN104240095A (en) * | 2014-08-21 | 2014-12-24 | 厦门纳网科技有限公司 | Two-dimensional code anti-fake method and system based on domain name |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105490809A (en) * | 2014-09-17 | 2016-04-13 | 腾讯科技(深圳)有限公司 | Information acquisition method, device, terminal and server |
CN105490809B (en) * | 2014-09-17 | 2020-11-06 | 腾讯科技(深圳)有限公司 | Information acquisition method and device, terminal and server |
Also Published As
Publication number | Publication date |
---|---|
US20140181509A1 (en) | 2014-06-26 |
CN103903146A (en) | 2014-07-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9270668B2 (en) | Method and apparatus for verifying anti-counterfeiting information | |
US11429921B2 (en) | Tracking shipments with a local and remote blockchain | |
US9449294B2 (en) | Method and apparatus for managing user devices and contents by using quick response codes | |
US20180121933A1 (en) | Inspection system and inspection method for commodity uniqueness confirmation | |
US20210004840A1 (en) | Product having dual layer identification codes, product traceability and anti-counterfeit authentication method and apparatus | |
US20140014714A1 (en) | Product authentication and registration | |
US20170193525A1 (en) | System and Method for Detecting Counterfeit Products | |
CN102855574A (en) | Method and system for identifying commodity information based on NFC (Near Field Communication) | |
RU2007137063A (en) | METHOD FOR RECEIVING RADIO FREQUENCY IDENTIFICATION FOR USE WITH ENTERPRISE RESOURCE PLANNING SYSTEMS | |
US20140101063A1 (en) | Counterfeit detection | |
CN103136678A (en) | Identification method and device of intelligent terminal, processing method and device of identification information and identification system | |
US20180082310A1 (en) | Identification of regions including unauthorized products | |
CN113627958A (en) | NFC anti-counterfeiting tracing method and server | |
RU2015153297A (en) | METHOD AND SYSTEM FOR CERTIFICATION OF PRODUCT AUTHENTICITY | |
KR100512064B1 (en) | contactless type communication tag and portable tag reader for verifying a genuine article | |
CN202870900U (en) | NFC (Near Field Communication)-based commodity information identification system | |
US20140158754A1 (en) | Item authenticity | |
KR100524176B1 (en) | Mobile phone capable of reading genuine article verifying information stored in a RF-tag and method for administrating service management executable in a computer communicating with the same phone | |
US9275258B2 (en) | Verifying system and a method thereof | |
KR20130108022A (en) | System for discriminating a counterfeit and method thereof | |
CN114140133B (en) | Method for processing tracing data | |
CN106355415B (en) | Processing method and device for commodity traceability identification | |
KR20150101007A (en) | Payment System which coupon is automatically applied, user terminal, payment terminal and device for providing coupon | |
CN113095844A (en) | Anti-counterfeiting method and device, storage medium and terminal | |
CN109087050B (en) | Exit list generation method and related product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: PEKING UNIVERSITY FOUNDER GROUP CO., LTD., CHINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LIU, TAO;REEL/FRAME:031689/0096 Effective date: 20131127 Owner name: FOUNDER MOBILE MEDIA TECHNOLOGY (BEIJING) CO., LTD Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LIU, TAO;REEL/FRAME:031689/0096 Effective date: 20131127 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20200223 |