WO2016101760A1 - Procédé et système anti-contrefaçon - Google Patents

Procédé et système anti-contrefaçon Download PDF

Info

Publication number
WO2016101760A1
WO2016101760A1 PCT/CN2015/095610 CN2015095610W WO2016101760A1 WO 2016101760 A1 WO2016101760 A1 WO 2016101760A1 CN 2015095610 W CN2015095610 W CN 2015095610W WO 2016101760 A1 WO2016101760 A1 WO 2016101760A1
Authority
WO
WIPO (PCT)
Prior art keywords
security code
code
verification
intelligent terminal
mobile intelligent
Prior art date
Application number
PCT/CN2015/095610
Other languages
English (en)
Chinese (zh)
Inventor
张世龙
唐雅娜
Original Assignee
张世龙
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 张世龙 filed Critical 张世龙
Publication of WO2016101760A1 publication Critical patent/WO2016101760A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations

Definitions

  • the present invention relates to the field of product safety technologies, and more particularly to an anti-counterfeiting method and system.
  • Anti-counterfeiting technology has developed to the present day. There are numerous anti-counterfeiting methods, technologies and products. The main anti-counterfeiting products include three categories: visual judgment, consultation judgment, equipment judgment:
  • the identification content and method of the anti-counterfeiting product adopting this technology are simple, it is easy to imitate and fail to achieve the anti-counterfeiting effect; if the identification content and method are too cumbersome, it requires a certain recognition experience, which is not conducive to popularization and use. At the same time, the technology is inaccurate and not rigorous because it is only visually determined by the naked eye.
  • the anti-counterfeiting product adopting the technology does not limit the number of queries, the query code can be easily copied, and the anti-counterfeiting effect is poor; if the query mode is limited to one code at a time, there is a shortage that cannot be verified before purchase and can only be verified once.
  • the technology only feedbacks the correctness of the query code itself, or can only inform the number of times of the query, whether the authenticity judgment usually makes the buyer judge by itself, the query result is difficult to convince the public, and there is a crack, a bribe to acquire the digital to imitate. Possibly, not rigorous and credible.
  • device judgment that is, using a special device to identify the authenticity
  • the authenticity information is displayed on the dedicated device.
  • a special device such as holographic magnetic card, magnetic ink, smart credit card, barcode, QR code, metal barcode, IC card, RFID card, laser card, biochemistry, nuclear dual card, electronic identification, nuclear track technology.
  • the special equipment itself or the data is sent to the network server for encryption, decryption and inspection.
  • the inspection process is transparent to the user, and the operation is simple and convenient.
  • the product can be inspected multiple times before and after the sale, and has certain practicability and anti-counterfeiting ability.
  • Some of the anti-counterfeit products' electronic anti-counterfeiting labels also have a built-in random code generator or serial number generator, which realizes each verification, and the verification end/server generates a new random code or serial number for the product identification; some anti-counterfeiting products also provide labels. Independent authentication or two-way authentication with dedicated identification devices; some anti-counterfeiting products are also based on PKI/CA mode, encrypting product information, verification code, serial number/serial number, implementing multi-level encryption and decryption, digital signature, and so on.
  • the existing anti-counterfeiting methods and technologies are still mainly based on prevention, which increases the cost of counterfeiting and copying from the technical point of view, increases the complexity of counterfeiting and imitation, thereby reducing the possibility of counterfeiting and imitation, and continuously updating anti-counterfeiting means. And the process, resulting in rising costs, but can not predict / warn the anti-counterfeiting cycle of the current anti-counterfeiting means (from investment to imitation), resulting in the same product market, a variety of anti-counterfeiting means coexist, ordinary users are more confused.
  • the production cost of the anti-counterfeiting system must be very low, the inspection method is simple and easy, and it can be checked multiple times before the purchase, and there is an independent corroboration inspection method to identify the false verification situation, which has the suspected imitation product inspection. Audit and early warning functions.
  • the present invention provides a method for anti-forgery traceability based on a mobile intelligent terminal with low cost and simple inspection.
  • the invention also provides an anti-counterfeiting traceability system based on mobile intelligent terminal with low cost and simple inspection.
  • An anti-forgery traceability method based on a mobile intelligent terminal comprising:
  • the mobile intelligent terminal reads the security code and sends the security code and the identification number corresponding to the mobile intelligent terminal to the anti-counterfeiting verification server;
  • the anti-counterfeiting verification server determines whether the received anti-counterfeit code is legal. If it is legal, step S3 is performed; otherwise, the anti-counterfeit code is illegal;
  • the anti-counterfeiting verification server determines, by the received terminal identification number, whether the terminal is the current owner of the security code, and if yes, returns information that the product is verified as authentic, otherwise returns information that the terminal does not have the security code checking authority.
  • the identification number corresponding to the mobile intelligent terminal is one of a mobile phone number, an IMSI, or an ID number of another distinguishable identification terminal.
  • the security code is randomly generated, and the randomly generated security code and the corresponding product code and product status are stored in the anti-counterfeiting verification server.
  • the security code is directly or encrypted to generate a two-dimensional code label or written into the radio frequency electronic tag to form an anti-counterfeit label, and the anti-counterfeit label is physically associated with the corresponding product one-to-one.
  • the mobile intelligent terminal identification number pre-assigned to the initial ownership of the product is bound to the security code corresponding to the product in the anti-counterfeiting verification server.
  • the mobile intelligent terminal A which is currently owned by the security code, reads the security code and sends the terminal identification number, the security code, and the identification number of the mobile intelligent terminal B that is pre-changed to the new owner to the security verification server. Apply for a change;
  • the security verification server verifies that the current security code of the security code and the security code is legal, the change authorization verification code C is generated, and the change authorization verification code C is sent to the mobile intelligent terminal B;
  • the mobile intelligent terminal B performs a change authorization verification operation, and sends its terminal identification number and change authorization verification code C to the anti-counterfeiting verification server;
  • the anti-counterfeiting verification server verifies the legality of the change authorization verification code C, the current owner of the security code is changed to the terminal B, and the ownership of the security code is invalidated by the terminal A, and the corresponding product status is modified.
  • step S3 after the anti-counterfeiting verification server determines that the mobile intelligent terminal is not the current owner of the security code, the following steps are performed:
  • the anti-counterfeiting verification server determines whether the terminal is the trial right of the security code, and if yes, performs step S5, otherwise returns information that the terminal does not have the security code checking authority;
  • the anti-counterfeiting verification server determines whether the number of trial verification times of the terminal is greater than a threshold. If yes, the number of trial verifications is reduced by 1 and the information that the product verification is genuine is returned, otherwise the information that the trial verification number has been used is returned.
  • the mobile intelligent terminal with the security code trial right is obtained by performing the trial recommendation operation by the current ownership mobile intelligent terminal of the security code, specifically:
  • the security code A current security mobile terminal A reads the security code and sends its terminal identification number, security code and the identification number of the mobile intelligent terminal B pre-recommended as the trial right to the anti-counterfeiting verification server to apply for trial recommendation;
  • the security verification server verifies that the current security code of the security code and the security code is legal, the trial authorization verification code D is generated, and the trial authorization verification code D is sent to the mobile intelligent terminal B;
  • the mobile intelligent terminal B performs a trial authorization verification operation, and sends the terminal identification number and the trial authorization verification code D to the anti-counterfeiting verification server;
  • the attribute data of the terminal for storing the security code trial right is newly added: the identification number of the terminal B, the trial number of trials, and the trial attribute.
  • the method further includes that the data flow in the anti-counterfeiting verification server is backed up to the monitoring and early warning source database, and the anti-counterfeiting inspection and traceability information in all states of the product can be verified by monitoring the early warning source database.
  • An anti-counterfeiting traceability system based on a mobile intelligent terminal comprising a mobile intelligent terminal and an anti-counterfeiting verification server:
  • the mobile intelligent terminal includes:
  • a security code reading module for reading a security code
  • the anti-counterfeiting code interaction module is configured to send the security code and the terminal identification number corresponding to the mobile intelligent terminal to the anti-counterfeiting verification server and receive the return information;
  • the anti-counterfeiting verification server includes:
  • transceiver module configured to receive a security code and a terminal identification number sent by the security code interaction module
  • the security code verification module is configured to determine whether the received security code is legal, and if yes, notify the verification authority verification module, otherwise notify the sending module;
  • the verification authority verification module is configured to determine, by the received terminal identification number, whether the terminal is the current owner or the trial right of the security code, and notify the sending module of the verification result;
  • the sending module is configured to send, according to the verification result of the security code verification module and the verification authority verification module, information that the “security code is illegal”, or “product verification is genuine” information, or “the terminal does not have the security code inspection authority” Information, or "trial verification has run out” information to the interactive module of the mobile smart terminal.
  • the anti-counterfeiting verification server further includes a security code information storage module, configured to store the security code and the product code and product status corresponding to the security code, wherein the security code is generated in a random manner.
  • the anti-counterfeiting verification server further includes a monitoring and early warning source module for supporting the anti-counterfeiting inspection and tracing information in all states of the inquiring product.
  • the invention is based on a mobile intelligent terminal, and the mobile intelligent terminal has a high penetration rate, and the real consumer can easily intervene in the anti-counterfeiting system, and the process of anti-counterfeiting query can be improved, the cost is low, and the verification is simple.
  • the invention establishes the product security code inspection permission tree and the product full state inspection process information chain, binds the security code to the inspection mobile intelligent terminal, and allows the product to perform multiple authenticity inspections before and after the sale, and at the same time, by binding
  • the mobile intelligent terminal ensures the credibility and uniqueness of the product security code verification process.
  • the invention changes the effective inspection of the mobile intelligent terminal by changing the ownership of the product, and can specifically limit the number of inspections, and the number of inspections of the mobile intelligent terminal and the number of inspections can be set according to the change of product ownership, the number of inspections and the product.
  • the status update will also be recorded in the anti-counterfeiting verification server, which makes the sales of counterfeit security code products limited, the ratio of counterfeit revenue to counterfeit cost is very low; and when the genuine product enters the sales link, it can automatically enter the early warning process because the system
  • the mobile intelligent terminal identification number (such as the mobile phone number) associated with the original counterfeit inspection is stored, which facilitates the fraudulent forensics, increases the risk factor of counterfeiting, and effectively suppresses and combats counterfeiting behavior.
  • the invention also provides a monitoring and early warning source database to realize the traceability query function of the circulation inspection information of the anti-counterfeit label (product), which is an independent auxiliary certification process, and effectively prevents the false verification of the forged inspection result of the mobile intelligent terminal.
  • the invention constructs an effective systemic anti-counterfeiting system, and the counterfeiter can only copy all the systems, and it is possible to A large amount of counterfeiting of goods greatly increases the cost of counterfeiting and reduces the possibility of counterfeiting.
  • FIG. 1 is a specific flowchart of a method for anti-forgery traceability based on a mobile intelligent terminal according to the present invention.
  • FIG. 2 is a schematic diagram of a process for changing a product owner in an anti-counterfeiting traceability method based on a mobile intelligent terminal according to the present invention.
  • FIG. 3 is a schematic diagram of a flow of a recommended trial and check user in an anti-counterfeiting traceability method based on a mobile intelligent terminal according to the present invention.
  • FIG. 4 is a schematic diagram of a system architecture based on a specific embodiment of an anti-forgery traceability method based on a mobile intelligent terminal.
  • FIG. 5 is a schematic diagram of a security tree verification authority tree constructed in a specific embodiment of an anti-forgery traceability method based on a mobile intelligent terminal according to the present invention.
  • FIG. 6 is a flowchart of the method for obtaining traceability information based on the anti-forgery traceability method of the mobile intelligent terminal according to the present invention.
  • first and second are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implied number of technical features indicated.
  • first, second features may include one or more of the features, either explicitly or implicitly.
  • a plurality means two or more unless otherwise stated.
  • mounting and “connecting” are to be understood broadly, and may be, for example, a fixed connection, a detachable connection, or an integral, unless otherwise explicitly stated and defined.
  • Ground connection it can be a mechanical connection or an electrical connection; it can be directly connected, or it can be indirectly connected through an intermediate medium, and it can be said that the internal connection of the two elements.
  • the specific meaning of the above terms in the present invention can be understood in the specific circumstances by those skilled in the art.
  • FIG. 1 is a flowchart of a method for anti-forgery traceability based on a mobile intelligent terminal according to the present invention.
  • the specific steps of the anti-forgery traceability method based on the mobile intelligent terminal in this embodiment include:
  • the mobile intelligent terminal reads the security code and sends the security code and the identification number corresponding to the mobile intelligent terminal to the anti-counterfeiting verification server;
  • the anti-counterfeiting verification server determines whether the received anti-counterfeit code is legal. If it is legal, step S103 is performed; otherwise, the anti-counterfeit code is illegal;
  • the anti-counterfeiting verification server determines, by the received terminal identification number, whether the terminal is the current owner of the security code, and if so, returns the information that the product verification is authentic, otherwise step S104 is performed;
  • the anti-counterfeiting verification server determines whether the terminal is the trial right of the security code, and if yes, performs step S105; otherwise, returns information that the terminal does not have the security code checking authority;
  • the anti-counterfeiting verification server determines whether the number of trial verification times of the terminal is greater than a threshold. If yes, the number of trial verifications is reduced by 1 and the information that the product verification is genuine is returned, otherwise the information that the trial verification number has been used is returned.
  • the identification number corresponding to the mobile intelligent terminal is one of a mobile phone number, an IMSI, or an ID number of another distinguishable identification terminal.
  • the anti-counterfeiting code is generated in a random manner, and corresponds to the product one-to-one and has uniqueness.
  • the randomly generated security code and the corresponding product code and product status are stored in the anti-counterfeiting verification server.
  • the anti-counterfeit code information base is built in the anti-counterfeiting verification server to store the anti-counterfeit code related information, and the product code corresponding to the anti-counterfeit code is written into the anti-counterfeit code information base to realize the logical association between the anti-counterfeit code and the product, and the product status is set to “inventory”. ".
  • the specific anti-pseudo code information library storage time can construct the data structure body according to a custom way, for example, the following data structure body can be constructed to store:
  • the security code is randomly generated, it is directly or encrypted to generate a QR code label or written into the RF electronic label to form an anti-counterfeit label.
  • the anti-counterfeit label When the anti-counterfeit label is applied, it can be fixed to the opening of the product or its outer packaging by means of pasting or the like, and is physically associated with the product; when the product or the outer package is opened, the anti-counterfeit label will be damaged and the anti-counterfeiting code cannot be read and fails.
  • the security code of the current ownership of the security code is combined with the security code of the security code. Only the bound mobile intelligent terminal can perform the security code check to ensure the validity of the check. Moreover, in addition to the current ownership terminal, the mobile intelligent terminal through its recommended trial can also check the authenticity of the security code, and expand the range of the identifiable mobile intelligent terminal in a recommended manner, and at the same time, the nature of the bound mobile intelligent terminal (owner, trial) The right to limit the number of inspections, under the premise of ensuring the legality of the inspection, set a further obstacle for the verification of the pseudo-security code.
  • the initial setting method of the current owner of the security code is as follows:
  • the mobile intelligent terminal identification number pre-assigned to the initial ownership of the product is bound to the security code corresponding to the product in the anti-counterfeiting verification server, and the product status is set to “sale”;
  • the current owner of the security code changes with the state of the product, and the specific modification manner is as follows:
  • the mobile intelligent terminal A with the current ownership of the security code reads the security code and then displays its terminal identifier.
  • the number, the security code, and the identification number of the mobile intelligent terminal B pre-changed to the new owner are sent to the anti-counterfeiting verification server, and the application is changed;
  • the change authorization verification code C is generated, and the change authorization verification code C is sent to the mobile intelligent terminal B in the form of a short message or the like; the mobile intelligent terminal B performs the change authorization verification operation. Sending its terminal identification number and change authorization verification code C to the anti-counterfeiting verification server;
  • the anti-counterfeiting verification server verifies the legality of the change authorization verification code C, the current owner of the security code is changed to the terminal B, and the ownership of the security code is invalidated by the terminal A, and the corresponding product status is modified.
  • the mobile intelligent terminal with the security code trial right is obtained by performing the trial recommendation operation by the current ownership mobile intelligent terminal of the security code, specifically:
  • the security code A current security mobile terminal A reads the security code and sends its terminal identification number, security code and the identification number of the mobile intelligent terminal B pre-recommended as the trial right to the anti-counterfeiting verification server to apply for trial recommendation;
  • the security verification server verifies that the current security code and the security code are legal, the trial authorization verification code D is generated, and the trial authorization verification code D is sent to the mobile intelligent terminal B in the form of a short message or the like;
  • the mobile intelligent terminal B performs a trial authorization verification operation, and sends the terminal identification number and the trial authorization verification code D to the anti-counterfeiting verification server;
  • the attribute data of the terminal for storing the security code trial right is newly added: the identification number of the terminal B, the trial number of trials, and the trial attribute.
  • the method of the present invention further includes that the data flow in the anti-counterfeiting verification server is backed up to the monitoring and early warning source database, and the anti-counterfeiting inspection and traceability information in all states of the product can be inquired through the monitoring and early warning source database.
  • the specific traceability information query method is shown in Figure 6.
  • the anti-counterfeiting verification server 201 the mobile phone 202 as the mobile intelligent terminal, the reader/writer 203 with the anti-counterfeit tag reading function on the mobile phone 202, the product 204, and the connection monitoring and early warning are included.
  • Security code generation randomly generate a unique security code, and build a security code information base in the anti-counterfeiting verification server.
  • the data structure body of the security code information base is: [security code, product code, product status]; the security code is generated directly or after encryption.
  • the anti-counterfeit label is formed in the QR code tag or written into the radio frequency electronic tag.
  • the anti-counterfeit label is fixed to the opening of the product or its outer packaging by means of pasting or the like, and is physically associated with the product; when the product or the outer package is opened, the anti-counterfeit label will be damaged, and the security code cannot be read and fails; the security code is randomly generated. After that, the product code is matched with the security code, and the product code is written into the security code information table corresponding to the security code information base. The security code is now logically associated with the product, and the product status is set to "inventory".
  • this example presets multiple states of the product, including “inventory”, “sales”, “purchase”, “gifts” and so on.
  • the product salesperson certified mobile phone information database is built in the anti-counterfeiting verification server.
  • the data structure body is: [salesperson mobile phone number, sales shop number, salesperson number, authentication time, valid status], and the [effective status] initial value is "valid" When a salesperson leaves the company, modify the [valid status] value to "invalid".
  • the product status of the anti-counterfeiting verification server is changed to “sales”.
  • the security code is built in the anti-counterfeiting verification server to verify the authentication tree, and the security code and the authentication tree have a one-to-one correspondence.
  • the data structure of the authentication tree node is: [node type, allowing the mobile phone number to be checked, allowing the number of checks, child pointer], wherein the [node type] values are "product sales", “product purchase”, “product gift”, “trial” "Verification”; [Allow check mobile phone number] can have one or more mobile phone numbers in the root node, multiple mobile phone numbers are separated by commas, and can only be valid salesperson authentication mobile phone number; the remaining descendant nodes are only Can have a mobile phone number, the mobile phone number in each node in the tree is allowed to repeat; [Allow check times] takes a value of 0 (indicating that verification is not allowed), 1 (indicating that authentication is allowed), and -1 (indicating no verification limit) The node whose node type is "product sales” can only be the root node, and the node whose node type is "product purchase” can only be the child node of the root node, and the node of this type can only have at most one in the authentication tree; A node
  • the current owner of the security code corresponds to the product status.
  • the number of times the current owner of the security code is checked is not limited, but the number of times of the current owner of the non-security code is usually set to 1 time. Moreover, it is necessary to obtain legal inspection authority by means of a recommended trial.
  • the root node type of the authentication tree is set to "product sales", the number of inspections is allowed to be -1, and the mobile phone number is allowed to be verified as one or more valid sales personnel. No. Also change the product status to "Sales" status. Complete the logical binding of the security code to the salesperson's certified mobile phone number.
  • the security code authorization checks that the product is in the sales state when the authentication tree is initially constructed. At this time, the current owner of the security code is the salesperson. At this time, the initial state of the product is the sales status, and the security code authorization is automatically built in the authentication tree. The binding relationship between the salesperson's mobile phone number and the security code. When the product status changes, the security code authorization check certificate tree will form a child node to update the data corresponding to the security code verification authentication.
  • the corresponding APP software can be installed in the smart phone for querying.
  • the APP software when verifying the authenticity verification of the anti-counterfeit label (product), the APP software is run in the smart phone, and the security code in the anti-counterfeit label is directly or indirectly read through the built-in camera or the external (external) reader.
  • the APP software submits the read security code information, its own mobile phone number and other information to the anti-counterfeiting verification server; the anti-counterfeiting verification server performs the security code according to the verification rule.
  • the verification process is specified by an example verification rule:
  • Rule 1 The security code is valid and valid: the verified security code must be legal and the verified mobile phone number must be the “Allow check mobile phone number” in the authentication tree node of the security code, and the allowed check number of the node is 1 Or -1.
  • Rule 2 If the security code status is "sales" status, the check mobile phone number appears in the root node of the security code authorization check authentication tree, and the node check count is -1, the mobile phone is allowed to verify the authenticity and return the genuine information. After the inspection, the number of inspections of the node is not changed, and the number of times the mobile phone number is checked for the security code is accumulated.
  • Rule 3 If the security code status is "sales" status, one or more authenticated salesperson mobile phones in the root node of the authentication tree are authenticated in the security code, and one or more other user mobile phones may be recommended in the APP for trial verification.
  • the security code authorization check authentication tree a new child node is created under the node (ie, the root node), the name of the child node is “trial verification”, the number of inspections is 1, and the mobile phone number is checked for the recommended mobile phone number. .
  • This recommendation process can be operated as shown in the flow shown in Figure 3.
  • Rule 4 If the security code status is "sales" status, the check mobile phone number appears in the non-root node of the security code authorization verification tree, and the node check number is 1, the mobile phone is allowed to check and return genuine information, and contains additional information. : "Sales status, only trial verification once, there is no limit to the number of verifications after purchase.” After the inspection, the number of times of checking the node is changed to 0, and the number of times the mobile phone number is checked for the security code is accumulated.
  • Rule 5 If the security code status is "sales" status, the one or more certified salesperson mobile phones in the root node of the authentication tree are authenticated in the security code, and the security code status is modified by the APP when the product is sold. State, in the security code authorization check authentication tree, change the number of inspections of the node (ie, the root node) to 0, create a child node under the node where it is located, and set the name of the child node to "product purchase", check The number of times is -1, and the mobile phone number is checked as the purchaser's mobile phone number.
  • Rule 6 If the security code status is "Purchasing" status, check the mobile phone number to display the security code to verify that the node name of the authentication tree is "Product Purchase” and the number of node check times is "-1", then the mobile phone is allowed to verify the authenticity and Return genuine information. After the inspection, the number of inspections of the node is not changed, and the number of times the mobile phone number is checked for the security code is accumulated. At the same time, one or more other user mobile phones may be recommended in the APP for verification. In the security code authorization verification tree, a child node is newly created under the node where the child node is located, and the node name of the child node is “trial verification”, and the number of inspections is 1. Check the mobile phone number as the recommended mobile phone number.
  • Rule 7 If the security code status is "Purchasing" status, check the mobile phone number, the security code is authorized to check that the non-root node name of the authentication tree is "trial verification", and the node check frequency is 1, the mobile phone is allowed to check and return genuine information. And with additional information: "The product has been sold, the status of the sale, can only be verified once, if you need more than one time, you need to recommend multiple times, or the number of verifications after the gift is unlimited", the return information can also include sales Traceable information such as store, time of sale, purchaser, etc. After the inspection, the number of times of checking the node is changed to 0, and the number of times the mobile phone number is checked for the security code is accumulated.
  • Rule 8 If the security code status is "Purchasing" status, check the mobile phone number, the security code is authorized to check the node name of the authentication tree is "product purchase", the number of node check times is -1, and the product is modified by the APP when the product is transferred to other users.
  • the security code status in the authentication server is in the "gift” state.
  • the security code authorization check authentication tree the number of times of checking the node is changed to 0, and a child node is created under the node where the node is located, and the name of the child node is set to "Product gift", the number of inspections is -1, check the mobile phone number as the recipient's mobile phone number.
  • Rule 9 If the security code status is "gift” status, check the mobile phone number, the security code is authorized to check the authentication tree's node name is "product gift", the node check number is -1, the mobile phone is allowed to check and return the genuine information.
  • the return information includes traceable information such as the store, time of sale, purchaser, and gift time.
  • one or more other user mobile phones may be recommended in the APP for verification.
  • a child node is newly created under the node where the child node is located, and the node name of the child node is “trial verification”, and the number of inspections is 1. Check the mobile phone number as the recommended mobile phone number.
  • Rule 10 If the security code status is "Gift” status, check the mobile phone number, the security code is authorized to check the authentication tree's node name is "product gift", and the node check number -1 mobile phone, you can transfer the product to other mobile phones through the APP again.
  • the user in the authentication code authentication verification tree, changes the number of inspections of the node where it is located to 0, creates a child node under the node where the node is located, and sets the name of the child node as "product gift", and the number of inspections is -1. Check the mobile phone number as the recipient's mobile phone number. There is no limit to the number of product offers.
  • R11-1 When the security code is invalid, return "The security code is illegal. Please go to the regular store to purchase";
  • R11-2 The security code is legal and the status is “sales” status, then it returns “in the sales of the product, only the authorized salesperson mobile phone and the user mobile phone of the recommended trial can perform the authenticity verification”;
  • R11-3 If the security code is legal and the status is “Purchasing” status, then “Product has been sold, only the purchaser's mobile phone and its recommended mobile phone can be verified by authenticity”;
  • R11-4 If the security code is legal and the status is “Gift” status, then “Product has been sold and given, and only the recipient's mobile phone and its recommended mobile phone can be authenticated.”
  • Rule 12 The mobile phone user in each node of the security code authorization verification tree can query the circulation traceability information of the anti-counterfeit label (product) by submitting the security code, the mobile phone number and the verification code received by the mobile phone on the official WEB website.
  • the chronological order includes product traceability information such as product sales, purchase, gift, inspection, etc., and each time the mobile phone is checked (partial mobile phone number masking process), which is an independent auxiliary verification process for preventing false after APP fraud. verification.
  • R13-1 When the security code is illegal
  • R13-2 When the certified salesperson's mobile phone checks the legal anti-counterfeiting code of the "sales status" in the case of a loop, if the inspection process is anti-counterfeiting code 1-> anti-counterfeiting code 2-> anti-counterfeiting code 1, it indicates that there is product sales. The situation of self-sales.
  • R13-3 Bind one or more certified salesperson mobile phone numbers to establish a security code to authorize the authentication tree.
  • security code authorization checks that the authentication tree already exists, it indicates that there is a possibility that the fake product has been sold before the genuine product.
  • R13-4 The anti-counterfeit code is legal, and when the number of times of checking the anti-counterfeit code of a certain mobile phone number in the node of the security code authentication and authentication tree exceeds the threshold, it indicates that the anti-pseudo code is duplicated.
  • R13-5 The anti-counterfeiting code is legal, and there is no possibility that the number of times of checking the security code exceeds the threshold when a certain mobile phone number in the node of the security code authorization authentication tree exceeds the threshold.
  • FIG. 5 A schematic diagram of the security code authorization verification tree and its node structure constructed based on the above verification rules is shown in FIG. 5.
  • multiple states of product sales, purchase, gift, etc. are constructed, and the product status, the mobile phone number of the current owner of the security code, and the security code can be changed according to the data interaction of the mobile intelligent terminal and the anti-counterfeiting verification server in different states.
  • the present invention also provides an anti-forgery traceability system based on a mobile intelligent terminal.
  • the mobile intelligent terminal and the anti-counterfeiting verification server are specifically included:
  • the mobile intelligent terminal includes:
  • a security code reading module for reading a security code
  • the anti-counterfeiting code interaction module is configured to send the security code and the mobile phone number corresponding to the mobile intelligent terminal to the anti-counterfeiting verification server and receive the return information;
  • the anti-counterfeiting verification server includes:
  • the transceiver module is configured to receive the security code and the mobile phone number sent by the security code interaction module;
  • the security code verification module is configured to determine whether the received security code is legal, and if yes, notify the verification authority verification module, otherwise notify the sending module;
  • the verification authority verification module is configured to determine, by the received mobile phone number, whether the terminal is the current owner or the trial right of the security code, and notify the sending module of the verification result;
  • the sending module is configured to send, according to the verification result of the security code verification module and the verification authority verification module, information that the “security code is illegal”, or “product verification is genuine” information, or “the terminal does not have the security code inspection authority” Information, or "trial verification has run out” information to the interactive module of the mobile smart terminal.
  • the anti-counterfeiting verification server further includes a security code information storage module, configured to store the security code and the product code and product status corresponding to the security code, wherein the security code is generated in a random manner.
  • the anti-counterfeiting code is generated in a random manner, and corresponds to the product one-to-one and has uniqueness.
  • the randomly generated security code and corresponding product code and product status are stored in the security code information storage module of the anti-counterfeiting verification server.
  • the anti-counterfeit code information base is constructed in the anti-counterfeiting verification server to store the anti-counterfeit code related information, and the product code corresponding to the anti-counterfeit code is written into the anti-counterfeit code information base to realize the logical association between the anti-counterfeit code and the product, and the initial state of the product is set to “ in stock”.
  • the specific anti-pseudo code information library storage time can construct the data structure body according to a custom way, for example, the following data structure body can be constructed to store:
  • the security code is randomly generated, it is directly or encrypted to generate a QR code label or written into the RF electronic label to form an anti-counterfeit label.
  • the anti-counterfeit label When the anti-counterfeit label is applied, it can be fixed to the opening of the product or its outer packaging by means of pasting or the like, and is physically associated with the product; when the product or the outer package is opened, the anti-counterfeit label will be damaged and the anti-counterfeiting code cannot be read and fails.
  • the security code and the current ownership of the security code are bound to the mobile phone, and only the bound mobile phone can perform the security code check to ensure the validity of the verification.
  • the mobile phone recommended by the trial can also check the authenticity of the security code, and expand the range of the identifiable mobile intelligent terminal by the recommended method, and at the same time pass the bound mobile intelligent terminal property (owner, trial right)
  • further obstacles are set for the verification of the pseudo-security code.
  • the anti-counterfeiting verification server further includes an anti-forgery code authorization verification authentication tree construction module, configured to set related information of the current owner of the security code, wherein the initial setting manner of the current owner of the security code is as follows:
  • the security code authorization verification tree construction module binds the mobile phone number pre-assigned to the initial ownership of the product to the security code corresponding to the product, and sets the product status to “sale”;
  • the current owner of the security code changes with the state of the product, and the specific change is as follows:
  • the security code current ownership moves the security code reading module of the intelligent terminal A to read the security code
  • the security code interaction module sends the mobile phone number, the security code, and the mobile phone number of the mobile intelligent terminal B pre-changed to the new owner to the transceiver module of the security verification server;
  • the change authorization verification code C is generated and the change authorization verification code C is sent to the mobile intelligent terminal B in the form of a short message or the like.
  • Security code interaction module
  • the mobile intelligent terminal is further provided with an operation execution module, configured to perform a change authorization verification operation, and send the mobile phone number of the new owner B of the security code and the change authorization verification code C to the transceiver module of the anti-counterfeiting verification server;
  • the security verification server After the security verification server verifies the legality of the change authorization verification code C, its setting change module is used to change the security code to the new one.
  • the right owner is terminal B, changing the ownership of terminal A to the security code is invalid, and modifying the corresponding product status.
  • the security code recommendation trial user obtains the recommended trial operation through the mobile intelligent terminal corresponding to the current owner of the security code, specifically:
  • the security code reading module of the mobile intelligent terminal A corresponding to the current owner of the security code reads the security code
  • the anti-counterfeiting code interaction module sends the mobile phone number, the security code and the security code recommendation user B's mobile phone number to the transceiver module of the anti-counterfeiting verification server;
  • the trial authorization verification code D is generated and the trial authorization verification code D is sent to the mobile intelligent terminal in the form of short message communication.
  • the operation execution module of the mobile intelligent terminal performs a recommended trial authorization verification operation, and sends the mobile phone number of the security code recommendation user B and the trial authorization verification code D to the transceiver module of the security verification server;
  • the anti-counterfeiting verification server verifies the legality of the authorization verification code D
  • its setting change module stores the security data to recommend the attribute data of the trial user: the security code recommends the trial user B mobile phone number, the number of inspections, and the recommended trial attribute.
  • the system of the present invention further includes a monitoring and early warning source database, and the data flow in the anti-counterfeiting verification server is backed up to the monitoring and early warning source database, and the anti-counterfeiting inspection and traceability information in all states of the product is verified by the monitoring and early warning database.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

La présente invention se rapporte au domaine technique de la sécurité des produits et concerne, en particulier, un procédé et un système anti-contrefaçon. Le procédé comprend les étapes suivantes : S1 : un terminal mobile intelligent lit un code anti-contrefaçon et envoie à un serveur de vérification anti-contrefaçon le code anti-contrefaçon et un numéro d'identification correspondant au terminal mobile intelligent ; S2 : le serveur de vérification anti-contrefaçon détermine si un code anti-contrefaçon reçu est valide, et, si c'est le cas, exécute ensuite l'Étape S3, et, dans le cas contraire, renvoie ensuite des informations indiquant que le code anti-contrefaçon est invalide ; S3 : le serveur de vérification anti-contrefaçon détermine, par l'intermédiaire d'un numéro d'identification de terminal reçu, si le terminal est un propriétaire actuel du code anti-contrefaçon ou un utilisateur d'essai ayant un comptage vérifiable du code anti-contrefaçon, et, si tel est le cas, renvoie ensuite des informations indiquant qu'un produit est authentique, et, dans le cas contraire, renvoie ensuite des informations selon lesquelles le terminal ne dispose pas d'autorisation anti-contrefaçon. Étant donné que des modes de réalisation de la présente invention reposent sur un terminal de téléphonie mobile très populaire, un utilisateur peut facilement exploiter un système anti-contrefaçon, et compléter un processus d'interrogation anti-contrefaçon, ce qui permet d'obtenir une vérification simple et à faible coût.
PCT/CN2015/095610 2014-12-25 2015-11-26 Procédé et système anti-contrefaçon WO2016101760A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410819097.9 2014-12-25
CN201410819097.9A CN104463606B (zh) 2014-12-25 2014-12-25 一种基于移动智能终端的防伪溯源方法及系统

Publications (1)

Publication Number Publication Date
WO2016101760A1 true WO2016101760A1 (fr) 2016-06-30

Family

ID=52909598

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/095610 WO2016101760A1 (fr) 2014-12-25 2015-11-26 Procédé et système anti-contrefaçon

Country Status (2)

Country Link
CN (1) CN104463606B (fr)
WO (1) WO2016101760A1 (fr)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109102302A (zh) * 2018-03-20 2018-12-28 黎凯还 一种基于互联网技术的分布式验证防伪方法
CN109298843A (zh) * 2018-11-29 2019-02-01 珠海趣印科技有限公司 一种打印系统
CN109635551A (zh) * 2018-12-18 2019-04-16 有份儿智慧科技股份有限公司 通过数字智能终端对信息数据进行防伪溯源鉴真的方法
CN110210871A (zh) * 2019-02-15 2019-09-06 浙江萨宝信息科技有限公司 一种收银设备的防伪装置及其方法
CN112001630A (zh) * 2020-08-24 2020-11-27 中国建材检验认证集团股份有限公司 一种产品质量监控方法及装置
CN112381553A (zh) * 2020-11-20 2021-02-19 王永攀 一种产品防伪的方法
CN112686074A (zh) * 2020-12-29 2021-04-20 永发(河南)模塑科技发展有限公司 一种可查验箱内物品信息的智能包装箱及其查验方法
CN113159690A (zh) * 2021-05-08 2021-07-23 包头市畅行交通信息科技有限公司 基于物联网对跨境商品进行防伪溯源的方法及系统
CN113239067A (zh) * 2021-04-30 2021-08-10 国网河北省电力有限公司沧州供电分公司 一种确权证书的防伪方法
CN113516482A (zh) * 2020-08-28 2021-10-19 王东升 新型防伪密码及防伪方法
CN113673999A (zh) * 2020-05-01 2021-11-19 福州英流信息科技有限公司 一种物品溯源防伪识别认证系统及方法
CN113693297A (zh) * 2021-09-28 2021-11-26 深圳市吉迩科技有限公司 气溶胶产生装置防伪方法及气溶胶产生装置
CN114363897A (zh) * 2021-11-02 2022-04-15 四川天邑康和通信股份有限公司 一种pon终端设备二维码识别查询真伪方法和系统
CN112001630B (zh) * 2020-08-24 2024-05-31 中国建材检验认证集团股份有限公司 一种产品质量监控方法及装置

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104463606B (zh) * 2014-12-25 2017-09-05 张世龙 一种基于移动智能终端的防伪溯源方法及系统
CN105654316A (zh) * 2016-01-04 2016-06-08 河海大学 一种nfc产品防伪溯源系统及其防伪溯源方法
CN107665436A (zh) * 2016-07-29 2018-02-06 吴茂全 物品的防伪验证装置及方法
CN106600296B (zh) * 2016-12-16 2021-01-15 北京慧眼智行科技有限公司 一种基于总量控制的防伪溯源方法和系统
CN106651404B (zh) * 2016-12-30 2021-02-02 王清萍 一种物品防伪分析方法及物品防伪分析系统
CN106997540A (zh) * 2017-03-22 2017-08-01 北京向芯力科技有限公司 一种基于双重认证机制的商品防伪溯源系统及方法
CN108763939A (zh) * 2018-05-02 2018-11-06 开源物联网(广州)有限公司 防伪码的加密方法及加密系统
CN110310130B (zh) * 2019-06-19 2022-12-06 张学忠 一种防伪方法及系统
CN110472710B (zh) * 2019-07-31 2022-04-19 安徽连营电子科技有限公司 基于内部植入rfid智能芯片的宣纸防伪溯源系统
CN110533128B (zh) * 2019-08-21 2023-08-04 上海唯链信息科技有限公司 一种基于加密的防伪溯源数据处理方法、装置、系统及介质
CN110517053A (zh) * 2019-09-02 2019-11-29 武汉长利新材料科技有限公司 一种产品转让防伪溯源方法及系统
CN110675171A (zh) * 2019-09-29 2020-01-10 匿名科技(重庆)集团有限公司 一种基于区块链的防伪溯源方法
CN111460341A (zh) * 2020-04-01 2020-07-28 北京德豹科技有限公司 一种双重防伪校验的方法
CN111708955A (zh) * 2020-06-10 2020-09-25 武汉钢铁有限公司 一种基于二维码的钢铁产品防伪验证系统
CN111898165B (zh) * 2020-07-09 2023-07-07 宁波浙大联科科技有限公司 Pdm系统中技术参数变更溯源方法及系统
CN112669536A (zh) * 2020-12-16 2021-04-16 建信金融科技有限责任公司 一种共享物品的管理方法、管理系统、管理设备及介质
CN113435917A (zh) * 2021-08-24 2021-09-24 深圳市将维可变数据赋码技术有限公司 一种基于区块链的防伪溯源方法及系统
CN114826621A (zh) * 2022-06-27 2022-07-29 中化现代农业有限公司 种子溯源方法、装置、电子设备和存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101458806A (zh) * 2009-01-09 2009-06-17 黄建湘 手机电子券的防伪验证方法与系统
CN102376031A (zh) * 2011-05-27 2012-03-14 徐良雨 使用芯片识别物品的防伪追踪系统
CN102411750A (zh) * 2011-11-09 2012-04-11 浙江腾昌信息科技有限公司 数码双重防伪验证系统及方法
CN104463606A (zh) * 2014-12-25 2015-03-25 张世龙 一种基于移动智能终端的防伪溯源方法及系统

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102289767A (zh) * 2011-08-19 2011-12-21 段红双 一种商品防伪方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101458806A (zh) * 2009-01-09 2009-06-17 黄建湘 手机电子券的防伪验证方法与系统
CN102376031A (zh) * 2011-05-27 2012-03-14 徐良雨 使用芯片识别物品的防伪追踪系统
CN102411750A (zh) * 2011-11-09 2012-04-11 浙江腾昌信息科技有限公司 数码双重防伪验证系统及方法
CN104463606A (zh) * 2014-12-25 2015-03-25 张世龙 一种基于移动智能终端的防伪溯源方法及系统

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109102302A (zh) * 2018-03-20 2018-12-28 黎凯还 一种基于互联网技术的分布式验证防伪方法
CN109298843A (zh) * 2018-11-29 2019-02-01 珠海趣印科技有限公司 一种打印系统
CN109635551A (zh) * 2018-12-18 2019-04-16 有份儿智慧科技股份有限公司 通过数字智能终端对信息数据进行防伪溯源鉴真的方法
CN110210871A (zh) * 2019-02-15 2019-09-06 浙江萨宝信息科技有限公司 一种收银设备的防伪装置及其方法
CN113673999A (zh) * 2020-05-01 2021-11-19 福州英流信息科技有限公司 一种物品溯源防伪识别认证系统及方法
CN112001630B (zh) * 2020-08-24 2024-05-31 中国建材检验认证集团股份有限公司 一种产品质量监控方法及装置
CN112001630A (zh) * 2020-08-24 2020-11-27 中国建材检验认证集团股份有限公司 一种产品质量监控方法及装置
CN113516482A (zh) * 2020-08-28 2021-10-19 王东升 新型防伪密码及防伪方法
CN113516482B (zh) * 2020-08-28 2024-04-05 王东升 一种防伪密码及防伪方法
CN112381553A (zh) * 2020-11-20 2021-02-19 王永攀 一种产品防伪的方法
CN112381553B (zh) * 2020-11-20 2024-05-28 王永攀 一种产品防伪的方法
CN112686074A (zh) * 2020-12-29 2021-04-20 永发(河南)模塑科技发展有限公司 一种可查验箱内物品信息的智能包装箱及其查验方法
CN112686074B (zh) * 2020-12-29 2023-06-16 永发(河南)模塑科技发展有限公司 一种可查验箱内物品信息的智能包装箱及其查验方法
CN113239067A (zh) * 2021-04-30 2021-08-10 国网河北省电力有限公司沧州供电分公司 一种确权证书的防伪方法
CN113239067B (zh) * 2021-04-30 2023-07-18 国网河北省电力有限公司沧州供电分公司 一种确权证书的防伪方法
CN113159690A (zh) * 2021-05-08 2021-07-23 包头市畅行交通信息科技有限公司 基于物联网对跨境商品进行防伪溯源的方法及系统
CN113693297A (zh) * 2021-09-28 2021-11-26 深圳市吉迩科技有限公司 气溶胶产生装置防伪方法及气溶胶产生装置
CN114363897A (zh) * 2021-11-02 2022-04-15 四川天邑康和通信股份有限公司 一种pon终端设备二维码识别查询真伪方法和系统

Also Published As

Publication number Publication date
CN104463606B (zh) 2017-09-05
CN104463606A (zh) 2015-03-25

Similar Documents

Publication Publication Date Title
WO2016101760A1 (fr) Procédé et système anti-contrefaçon
CN109146024B (zh) 基于区块链的艺术品防伪电子标签系统与方法
EP2002382B1 (fr) Procédé et dispositif d'obtention d'informations d'article à l'aide d'étiquettes rfid
CN102663592B (zh) 基于二维码的物品身份双码标识方法
WO2007107068A1 (fr) Procédé et appareil anti-fraude se basant sur une étiquette électronique cpk
CN109345264A (zh) 一种基于区块链的酒类产品溯源防伪系统和方法
US20160098730A1 (en) System and Method for Block-Chain Verification of Goods
JP2004252621A (ja) 偽造品の市場流通を防止する製品認証システム
WO2013063872A1 (fr) Procédé anti-contrefaçon basé sur un code-barres en deux dimensions, étiquette et procédé de fabrication d'étiquette
CN110310130B (zh) 一种防伪方法及系统
CN109949058A (zh) 产品防伪方法、装置、电子设备及可读取存储介质
CN104217241A (zh) 一种电子防伪标签及实现方法
US11521156B2 (en) Trustable product delivery with RFID and smart chip
CN102663590A (zh) 基于限制认证次数的商品防伪认证系统及方法
CN113450092A (zh) 一种基于区块链网络的物品安全高效交易方法、系统及存储介质
CN114169476A (zh) 基于安全芯片的量子防伪溯源方法及系统
TW202234271A (zh) 使用微型轉發器的裝置、系統和方法
CN109472620A (zh) 一种基于区块链的防伪与积分系统
CN201336107Y (zh) 一种内外码式产品认证标签
CN102082815A (zh) 基于终端的分步防伪验证和身份鉴权的系统及其方法
KR101166172B1 (ko) 입체형 태그
TWI716897B (zh) Rfid電子標籤之動態防偽加密方法及電子標籤
TWI419064B (zh) 商品防偽系統
HU226286B1 (hu) Jogjegyrendszer termékek jogosítottságának megjelölésére és ellenõrzésére, és eljárás adott termék forgalomba hozatali jogosítottságának feltüntetésére
CN1664833A (zh) 商品电子身份证、机具及由其组成的防伪系统和防伪方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15871829

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15871829

Country of ref document: EP

Kind code of ref document: A1