WO2019170030A1 - 拥有双重标识码的产品及产品追溯防伪验证方法及装置 - Google Patents

拥有双重标识码的产品及产品追溯防伪验证方法及装置 Download PDF

Info

Publication number
WO2019170030A1
WO2019170030A1 PCT/CN2019/076517 CN2019076517W WO2019170030A1 WO 2019170030 A1 WO2019170030 A1 WO 2019170030A1 CN 2019076517 W CN2019076517 W CN 2019076517W WO 2019170030 A1 WO2019170030 A1 WO 2019170030A1
Authority
WO
WIPO (PCT)
Prior art keywords
identification code
product
user
information
matching
Prior art date
Application number
PCT/CN2019/076517
Other languages
English (en)
French (fr)
Inventor
程伟强
梁达光
Original Assignee
北京安讯奔科技有限责任公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京安讯奔科技有限责任公司 filed Critical 北京安讯奔科技有限责任公司
Priority to SG11202008095YA priority Critical patent/SG11202008095YA/en
Priority to US16/976,477 priority patent/US20210004840A1/en
Publication of WO2019170030A1 publication Critical patent/WO2019170030A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/083Constructional details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • G06Q10/0833Tracking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means

Definitions

  • the present application relates to the field of anti-counterfeiting technology, and in particular, to a method and a device for verifying the anti-counterfeiting of products and products having dual identification codes.
  • anti-counterfeiting technology There are various anti-counterfeiting technologies, such as digital anti-counterfeiting technology, texture anti-counterfeiting technology, security line anti-counterfeiting technology, moisture sensitive anti-counterfeiting technology and so on.
  • the existing anti-counterfeiting technology can play an anti-counterfeiting role to a certain extent, but there are still some shortcomings. If the anti-counterfeiting effect is good and it is difficult to be forged, the user is more difficult to query or identify. For example, the RFID electronic tag needs special device identification; if the user's query or recognition difficulty is reduced, the corresponding forgery difficulty is also reduced, and the anti-counterfeiting effect is relatively poor. For example, printing anti-counterfeit digital.
  • One of the technical problems solved by the present application is to provide a product and product traceability anti-counterfeiting verification method and device with dual identification codes, and to achieve the anti-counterfeiting effect on the basis of reducing the difficulty of user inquiry.
  • a product with a dual identification code comprising: a first identification code attached to the product and a second identification code separate from the product.
  • a product traceability anti-counterfeiting verification method including:
  • a product traceability anti-counterfeiting verification apparatus including:
  • a query request receiving unit configured to receive a query request sent by the user by scanning the first identifier code
  • a matching information providing unit configured to provide basic information, a logistics status, and user scan information of the product matching the first identification code to the user;
  • the anti-counterfeiting verification request receiving unit is configured to receive an anti-counterfeiting verification request sent by the user by scanning the second identification code;
  • the anti-counterfeiting verification result providing unit is configured to provide an anti-counterfeiting verification result of the product matching the second identification code to the user.
  • a product traceability anti-counterfeiting verification assistance method including:
  • a product traceability anti-counterfeiting verification auxiliary device including:
  • a first identification code acquiring unit configured to obtain a first identification code on the product by using a user scan
  • Query request generation and sending unit configured to generate and send a query request corresponding to the first identification code
  • a product information receiving and displaying unit configured to receive and display basic information, a logistics status, and user scan information of a product that matches the first identification code in response to the query request;
  • a second identification code acquiring unit configured to obtain a second identification code on the product by using a user scan
  • An anti-counterfeiting verification request generating and transmitting unit configured to generate and send an anti-counterfeiting verification request corresponding to the second identification code
  • the anti-counterfeiting verification result receiving and displaying unit is configured to receive and display an anti-counterfeiting verification result of the product matching the second identification code in response to the anti-counterfeiting verification request.
  • a method for verifying source anti-counterfeiting products includes:
  • the logistics status of the product is set to the state of sale or consumption.
  • a product traceability anti-counterfeiting verification apparatus including:
  • a query request receiving unit configured to receive a query request sent by the user by scanning the first identifier code
  • a matching information providing unit configured to provide basic information, a logistics status, and user scan information of the product matching the first identification code to the user;
  • An anti-counterfeiting verification request receiving unit configured to receive an anti-counterfeiting verification request sent by the user by scanning the first identification code
  • An anti-counterfeiting verification result providing unit configured to provide an anti-counterfeiting verification result of the product matching the first identification code to the user
  • a status update request receiving unit configured to receive a status update request sent by the user by scanning a second identification code separated from the product
  • a product status update unit configured to set a logistics status of the product to a sold or consumed status.
  • a method for assisting product source of anti-counterfeiting verification including:
  • a product traceability anti-counterfeiting verification auxiliary device including:
  • a first identification code acquiring unit configured to obtain a first identification code on the product by using a user scan
  • Query request generation and sending unit configured to generate and send a query request corresponding to the first identification code
  • a product information receiving and displaying unit configured to receive and display basic information, a logistics status, and user scan information of a product that matches the first identification code in response to the query request;
  • An anti-counterfeiting verification request generating and transmitting unit configured to generate and send an anti-counterfeiting verification request corresponding to the first identification code
  • the anti-counterfeiting verification result receiving and displaying unit is configured to receive and display an anti-counterfeiting verification result of the product matching the first identification code in response to the anti-counterfeiting verification request.
  • a second identification code acquiring unit configured to acquire, by using a user scan, a second identification code separated from the product
  • a status update request generation and sending unit configured to generate and send a status update request corresponding to the second identification code
  • a status update request receiving and setting unit for receiving and updating the logistics status of the product to a sold or consumed status in response to the status update request.
  • the dual identification code including the first identification code and the second identification code used in the application because the first identification code and the second identification code match the irregularity or no matching relationship, so that the counterfeiter cannot analyze the product by
  • the first identification code and the second identification code obtain the first identification code and the second identification code of the same batch of the same product, thereby improving the anti-counterfeiting efficiency.
  • the acquisition of the second identification code must be provided by the merchant after purchasing the commodity, which makes the counterfeiter obtain the second identification code after purchasing the genuine product, thereby increasing the cost of fraud.
  • 1a-1b-1c are schematic illustrations of a dual identification code for a product in accordance with one embodiment of the present application.
  • FIG. 2 is a flow chart of a product traceability anti-counterfeiting verification method according to an embodiment of the present application.
  • FIG. 3 is a flow chart of a method for assisting product traceability anti-counterfeiting verification according to an embodiment of the present application.
  • FIG. 4 is a schematic diagram of providing product information results in accordance with one embodiment of the present application.
  • Figure 5 is a schematic illustration of the provision of a product as a genuine result in accordance with one embodiment of the present application.
  • FIG. 6 is a schematic diagram of providing suspicious results for a product in accordance with one embodiment of the present application.
  • Figure 7 is a schematic illustration of the structure of a product traceability anti-counterfeiting verification device in accordance with one embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of a product traceability anti-counterfeiting verification auxiliary device according to an embodiment of the present application.
  • 9 is a flow chart of a method for verifying product source of anti-counterfeiting according to still another embodiment of the present application.
  • FIG. 10 is a flow chart of a method for assisting product traceability anti-counterfeiting verification according to still another embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of a product traceability anti-counterfeiting verification apparatus according to still another embodiment of the present application.
  • FIG. 12 is a schematic structural diagram of a product traceability anti-counterfeiting verification auxiliary device according to still another embodiment of the present application.
  • the method of the present application is implemented on a computer device comprising a user device and a network device.
  • the user equipment includes, but is not limited to, a computer, a smart phone, a PDA, etc.
  • the network device includes but is not limited to a single network server, a server group composed of multiple network servers, or a cloud computing based computer Or a cloud composed of web servers.
  • the computer device can be operated separately to implement the present application, and can also access the network and implement the application through interaction with other computer devices in the network.
  • the network in which the computer device is located includes, but is not limited to, the Internet, a wide area network, a metropolitan area network, a local area network, a VPN network, and the like.
  • the user equipment, the network equipment, the network, and the like are only examples, and other existing or future computer equipment or networks may be applicable to the present application, and should also be included in the scope of the present application. It is included here by reference.
  • 1a-1b are schematic illustrations of a product with a dual identification code in accordance with an embodiment of the present application, the primary feature of which is that the first identification code of the dual identification code is pasted or printed on the product itself.
  • the first identification code of the double identification code is directly exposed to the outside or the inside of the product, and can be directly obtained without causing any damage to the product; the second identification code is separated from the product, and is delivered to the consumer together when the product is sold.
  • 1a and 1b respectively show a first identification code attached to a shoe product tongue and a second identification code separated from the product.
  • FIG. 1c are schematic diagrams of products with dual identification codes according to another embodiment of the present application, and FIG. 1c shows a package with a two-dimensional code, the first identification code is located on the inner surface of the package, and does not affect the package. The appearance can be obtained directly without destroying the bag, as shown in Fig. 1c; the second identification code is located on a separate card surface layer, and is separated from the product where the first identification code is located, as shown in Fig. 1b.
  • the product with double identification code referred to in the present application is not limited to the above two embodiments, as long as the first identification code of the double identification code of the product is printed or pasted on the product and the second The identification code is separated from the product; the first identification code is directly exposed to the surface of the product, and can be directly obtained without causing any damage to the product; the second identification code is separated from the product, and the characteristics that need to be purchased first are obtained. Beyond the scope of protection of this application.
  • the advantage of having the dual identification code product is that if the second identification code is separated from the product in which the first identification code is located, and is provided to the consumer only when the product is sold, An identification code and a second identification code are used to add a security code to the counterfeit product, and the original product must be purchased first to obtain a double identification code, which is high in cost; and, in one embodiment of the present invention, the first identification code and the number are The second identification code is matched, the matching relationship may be random, and there is no rule, and the product that matches the dual identification code is uniquely matched. In addition, it should be noted that the first identification code and the plurality of second identification codes are matched.
  • the sold item provides the second identification code to the consumer, there is no need to provide a specific second identification code, that is, the second identification code provided to the consumer is a plurality of second identifiers matching the product.
  • the double identification code is: any combination of a two-dimensional code, a barcode, a near field communication (NFC) code, and a contactless radio frequency identification (RFID) code; that is, the first identification code or
  • the second identification code may be any one of the foregoing, and the second identification code may be the same as the first identification code, or may be different, and the type between the first identification code and the second identification code of different single products of the same product. It can also be different.
  • the counterfeiter can not obtain the double identification code matched with other similar products by purchasing only the single authenticity of one product and separately parsing the first identification code and the second identification code of the product, and it is very difficult to carry out counterfeiting. Therefore, the product with the double identification code has a high anti-counterfeiting feature.
  • FIG. 2 is a flowchart of a method for verifying source anti-counterfeiting products according to an embodiment of the present application, the method mainly includes the following steps:
  • S310 Receive a query request sent by a user by scanning a first identification code on the product.
  • S320 Provide basic information, a logistics status, and user scan information of the product that matches the first identification code to the user.
  • S330 Receive an anti-counterfeiting verification request sent by the user by scanning a second identification code on the product, where the second identification code is separated from the product.
  • the Y300 step specifically includes the following steps:
  • the plurality of double identification codes are uniquely matched to a specific product.
  • the Y330 step specifically includes the following steps:
  • the first identification code is uniquely matched with the basic information of the specific product
  • Y332 receiving logistics state information of the specific product set by scanning the first identification code, and matching the logistics state information with the first identification code;
  • the dual identification code described in step Y300 is, but not limited to, any combination of a two-dimensional code, a barcode, a near field communication (NFC) code, and a contactless radio frequency identification (RFID) code. That is, the first identification code or the second identification code may be any one of the foregoing, and the second identification code may be the same as or different from the first identification code.
  • Step Y300 is a pre-completed step. When the present application is actually carried out, the process from step S310, that is, the initial step Y300 can be omitted.
  • the standard method for generating the first identification code and the second identification code described in step Y310 refers to a mature technology for generating a two-dimensional code, a barcode, a near field communication (NFC) code, and a non-contact radio frequency identification (RFID) code. It will not be explained in detail here.
  • the second identification code in the present invention is included with the product when the product is shipped.
  • the second identification code is separated from the product, and is provided to the consumer only when the product is sold. If the second identification code is lost due to improper storage or the like, the store needs to be sent to the manufacturer. Apply for a second identification code.
  • the second identification code is separated from the product, it is easy to save during transportation and is easy to be lost, and the second identification code is also available in the product. Printed to the consumer when sold.
  • the second identification code may have been scanned for verification by the consumer who requested the return of the product. At this time, due to the aforementioned verification rule, the consumer who purchases the product again cannot verify the authenticity of the product by the second identification code.
  • the second identification code attached to the consumer when the product is first sold is invalidated, and the store that sells the product requests and prints the second identification code again to the manufacturer. And the second identification code contains information that is sold twice.
  • the store clerk who sells the product submits a second identification code acquisition request through the network, and the manufacturer that produces the product receives and requests according to the obtained request.
  • One of the second identification code groups matched by the first identification code of the product is obtained and delivered to the store, which is printed by the store and delivered to the consumer who purchased the product.
  • the process of obtaining the second identification code from the second identification code group may be regular or irregular.
  • the protection layer when printing the second identification code, providing a protection layer for the second identification code, when the anti-counterfeiting authentication is required, the protection layer must be destroyed to enable the second identification code to be scanned, that is, The second identification code is not directly exposed.
  • the first identifier code and the second identifier code are matched one-to-many in the step Y320 to obtain a double identifier code.
  • the specific manner may be, but not limited to, generating a first identifier code and simultaneously generating a plurality of second identifier codes; Or generating the first identification code set and the second identification code set, randomly matching the elements of the two sets; or matching according to a specific function; or the first identification code and the second identification code set element After the exchange, one-to-one matching is performed. Any irregular matching method should fall within the scope of this application.
  • the second identification code may also be generated when the product is sold, optionally, a generating method is to match the first number of the product according to the store number and time in the request information submitted by the store.
  • the identification code generates a second identification code.
  • step Y331 uniquely matches the first identification code with the basic information of the specific product, wherein the matching of the basic information of the product is completed by the product manufacturer or the designated authorized dealer, and the basic of the product Information includes but is not limited to: product name, product type, product number, product origin, product raw materials, etc.
  • Step Y332 receiving the logistics status information of the specific product set by scanning the first identification code, and matching the logistics status information with the first identification code, where the logistics status information includes but is not limited to: creation time The scan time history of the carrier or dealer, the history of the scan location, the basic information history of the carrier or dealer.
  • the logistics status information is matched to the first identification code of the product by the product manufacturer, the carrier and the distributor by scanning the first identification code of the specific product, and the logistics information is continuously updated during the change of the product logistics. .
  • the creation of the logistics status information can achieve accurate recording and tracking of the logistics status of each product. With the support of this information, the product traceability and product anti-smuggling goods can be well realized, and the product can be judged by verifying the information. True or false.
  • Step Y333 matches the second identification code with the authenticity information of the specific product, wherein the authenticity information includes: information that the product is genuine, and information that the product is suspicious.
  • the information that the product is genuine is that the product manufacturer or the designated authorized dealer matches the second identification code of the product before the product leaves the factory or before the sale; the suspicious information of the product is after the second identification code of the product is scanned for the first time.
  • the second identification code is automatically matched to the second identification code after being scanned multiple times in the second and subsequent cases without authorization.
  • the matching relationship includes: a matching relationship between the first identification code and the second identification code, a matching relationship between the first identification code and the basic information of the product, and the logistics information, and a matching relationship between the second identification code and the authenticity information of the product, The matching of the double identification code with the product is completed.
  • step Y330 is shown in FIG. 2 to include steps Y331-Y333, step Y330 may be accomplished in other ways or include other steps.
  • step Y300 is shown in FIG. 2 to include steps Y310-Y330, step Y300 may be accomplished in other ways or include other steps.
  • data encryption technology is adopted in the steps of generating, transmitting, printing, saving and subsequent querying of the double identification code, so as to ensure that the double identification code is always in a safe state.
  • Step S310 is to receive a query request sent by the user by scanning the first identifier code.
  • the method for scanning the first identifier code includes, but is not limited to, using an existing scanning tool (such as WeChat) of the smart mobile terminal, or using A dedicated APP (application) developed to implement the method of the present application, hereinafter referred to as an anti-counterfeiting verification APP.
  • the solution of the embodiment of the present application can make the user easily and simply query the source of the product without using a special detection tool or mastering a special one.
  • Technical knowledge effectively reducing the difficulty of the query.
  • the query through the anti-counterfeiting verification APP also improves the credibility of the user's product verification information.
  • the method further includes the step J310, recording the number, time, location, and user information of the scan of the first identification code by the user, which are collectively referred to as user scan information, and the user scan information and the location The first identification code is matched.
  • Step S320 is to provide the product basic information, the logistics status information, and the user scan information to the user. Since the first identification code is associated with the basic information of the product, the logistics status information, and the user scan information, after the user scans the first identification code, the basic information of the product associated with the first identification code may be provided to the user. , logistics status information and user scan information.
  • the second identification code is not directly available, but needs to be acquired after the product is purchased, and the new user may not know the existence of the second identification code, and therefore, the user first scans When the identifier sends a query request, the user may return the prompt information for obtaining the anti-counterfeiting verification result by scanning the second identifier.
  • each time the first identification code is scanned the basic information, the logistics information, and the user scan information of the corresponding product may be prompted, and each corresponding query behavior is recorded.
  • Step S330 is to receive an anti-counterfeiting verification request sent by the user by scanning the second identification code for the first time; the scanning method may be the same as that described in step S310.
  • the method further includes a step J320, recording the number, time, location, and user information of the scanning of the second identification code by the user, collectively referred to as user scan information, and the user scan information and the Product matching.
  • Step S340 is to provide an anti-counterfeiting verification result of the product matching the second identification code to the user.
  • the second identification code is scanned for the first time, and the second identification code is a pre-generated second identification code corresponding to the first identification code, providing the user who performs the scanning with the anti-counterfeiting verification that the product is authentic As a result, and setting the logistics status of the product to a sold or consumed state;
  • the second identification code is scanned again, and the user who performs the scanning is not specially authorized, the user who performs the scanning is provided with a suspicious anti-counterfeiting verification result of the product;
  • the second identification code is not a pre-generated second identification code corresponding to the first identification code, providing the user who performs the scanning with the anti-counterfeiting provided by the manufacturer or the designated authorized dealer whose second identification code is not the product Verification code, or suspicious anti-counterfeiting verification results for this product.
  • the second identification code When the second identification code is scanned for the first time, and the second identification code is a pre-generated second identification code corresponding to the first identification code, setting the logistics status of the product to be sold or consumed.
  • the purpose is to provide a verification of the suspicious anti-counterfeiting verification result to the user if the query request sent by the special authorized user by scanning the first identification code is received again.
  • the second identification code is scanned for the first time and the second identification code is a pre-generated second identification code corresponding to the first identification code
  • the anti-counterfeiting verification result of the product is provided to the user.
  • the verification result is suspicious, indicating that the second identification code may have been scanned, and the corresponding product may have been sold or consumed.
  • the second identification code of the product that has been sold or consumed is scanned again. It is likely that the counterfeiter has implemented the counterfeiting behavior using the genuine packaging, and the authenticity of the product can be effectively verified by this method.
  • the user who has not been specifically authorized here includes: the user who implements the second identity code scan again does not implement the first second identity code scan, and the user who implements the second identity code scan does not receive the first second identity code scan user. Or the authorization of the authorized user who performed the last second identification code scan.
  • the basic information of the product and the logistics information may be provided in addition to the relevant content of the authenticity verification result.
  • the embodiment of the present application further provides a product traceability anti-counterfeiting verification assistance method corresponding to the above-mentioned product traceability anti-counterfeiting verification method, and a flowchart of the auxiliary method in FIG. 3, the method mainly includes the following steps:
  • S430 Receive and display basic information, a logistics status, and user scan information of a product that matches the first identification code in response to the query request.
  • S460 Receive and display an anti-counterfeiting verification result of the product matching the second identification code in response to the anti-counterfeiting verification request.
  • the method further includes: prompting the user to scan the second identification code within a preset time.
  • the method further includes:
  • the product is added to the user's purchased list.
  • An operation button is provided, and information of the corresponding product is transmitted to the manufacturer in response to the user's return or repair operation.
  • the store corresponding to the corresponding product can be correspondingly displayed in response to the user's return or repair operation.
  • the method of scanning described in step S410 includes, but is not limited to, using an existing scanning tool (such as WeChat) of the smart mobile terminal, or using a dedicated APP (application) developed for implementing the method of the present application, hereinafter referred to as an anti-counterfeiting verification APP. .
  • the solution of the embodiment of the present application can make the user easily and simply query the source of the product without using a special detection tool or mastering a special one.
  • Technical knowledge effectively reducing the difficulty of the query.
  • the query through the anti-counterfeiting verification APP also improves the credibility of the user's product verification information.
  • a query request corresponding to the first identification code is generated and transmitted in step S420.
  • the scanning tool such as WeChat
  • the dedicated APP application
  • the scanning tool such as WeChat
  • the server or the third party server sends a query request corresponding to the first identification code.
  • Step S430 is to receive and display basic information, a logistics status, and user scan information of a product that matches the first identification code in response to the query request.
  • the merchant server or the third-party server will match the basic information of the product of the first identification code because it stores basic information, logistics status and user scan information of products matching various first identification codes.
  • the logistics status and user scan information are sent to the user.
  • FIG. 4 shows basic information of products received, displayed to the user, logistics status information, and user scan information (the basic information of the provided products, the logistics status information, and the user scan information are displayed in multiple pages).
  • the function of prompting the user to scan the second identification code is: since the embodiment of the present application adopts a dual identification code, the second identification code cannot be directly obtained, but needs to be acquired after purchasing the product, and the new user may not know The existence of the second identification code, therefore, the prompt is to assist the user in completing the anti-counterfeiting verification.
  • Figure 4 also shows the prompt content prompting the user to scan the second identification code to obtain the authenticity verification result of the product. "Respected customers, if you are interested in purchasing the product, please obtain the security label from the merchant to scan the security label to verify the authenticity of the product. ".
  • the basic information, the logistics status information and the user scan information of the product provided to the user may be displayed in the anti-counterfeiting verification APP interface.
  • Step S440 is to obtain a second identification code on the product by user scanning.
  • the scanning method may be the same as the scanning method of step S410.
  • Step S450 is to generate and send an anti-counterfeiting verification request corresponding to the second identification code.
  • an existing scanning tool such as WeChat
  • a dedicated APP application developed for implementing the method of the present application
  • the scanning tool such as WeChat
  • the dedicated APP application
  • the server or the third party server sends an anti-counterfeiting verification request corresponding to the second identification code.
  • Step S460 is to receive and display an anti-counterfeiting verification result of the product matching the second identification code in response to the anti-counterfeiting verification request to the user. Since the merchant server or the third-party server stores the user scan information, the anti-counterfeiting verification result can be sent to the user according to the stored user scan information.
  • the merchant server or the third-party server receives the anti-counterfeiting verification request sent by the user for the first time scanning the second identification code, and the second identification code is a pre-generated second identification code corresponding to the first identification code,
  • the anti-counterfeiting verification result of the product is displayed to the user, and the prompt interface can be as shown in FIG. 5.
  • the role of adding the product to the user's purchased list is to facilitate the user to manage the purchased product, including but not limited to resale, repair, return, and the like.
  • the step of adding the product to the purchased list of the user further includes: displaying a user purchased list; the user purchased list displaying the user purchased Basic information of the product, and providing an optional operation button; displaying first identification code user scan information and second identification code user scan information of the selected product in response to user selection; wherein the first identification code user scans The information and the second identification code user scan information have been described in detail above, and are not described herein; wherein the operation button provided by the user purchased list interface includes a return and maintenance operation button, and corresponding to the user's return or maintenance operation,
  • the information of the product is sent to the manufacturer, and the information of the product includes basic information of the product, logistics status information, and user scan information, and correspondingly corresponding to the store and the distance corresponding to the corresponding product can be displayed in response to the user's
  • the operation button further includes an operation option such as a comment, a lottery, a coupon and/or a red envelope, a product maintenance knowledge, a recommendation match, and a share, and the user can evaluate the product, participate in the lottery event, and receive the user through the operation button.
  • Coupons and/or red envelopes learn about product maintenance, view recommended products that match the product, and share products with friends.
  • the multiple operation options provided by the user in this embodiment enhance the interaction experience of the user, and facilitate the promotion activities of the merchant.
  • the logistics status of the product is set to the sold state, and the purpose is to receive and display the verification of the suspected anti-counterfeiting verification if the second identification code is scanned again and the scanning is not authorized.
  • the corresponding prompt interface can be as shown in FIG.
  • the second identification code is only provided to the user for the anti-counterfeiting verification result that the product is genuine when the first identification code is scanned. If the second identification code is scanned to prompt the verification result to be suspicious, the second identification code may have been After scanning, the corresponding product may have been sold or consumed. The second identification code of the product that has been sold or consumed is scanned again.
  • the user who has not been specially authorized here includes: the user who implements the second identity code scan again does not implement the first second identity code scan user, and the user who implements the second identity code scan again does not receive the first second identity code scan user or Authorization of the authorized user who performed the last second identification code scan.
  • the embodiment of the present application further provides a product traceability anti-counterfeiting verification device 800 corresponding to the above-mentioned product traceability anti-counterfeiting verification method.
  • the device structure is schematic.
  • the device 800 mainly includes the following units:
  • the query request receiving unit 820 is configured to receive a query request sent by the user by scanning the first identifier code
  • the matching information providing unit 830 is configured to provide basic information, a logistics status, and user scan information of the product matching the first identification code to the user;
  • the anti-counterfeiting verification request receiving unit 840 is configured to receive an anti-counterfeiting verification request sent by the user by scanning the second identification code;
  • the anti-counterfeiting verification result providing unit 850 is configured to provide an anti-counterfeiting verification result of the product matching the second identification code to the user.
  • the apparatus 800 further includes: a dual identifier code generating unit 810, configured to pre-generate the dual identifier code that matches a specific product, where the dual identifier code generating unit 810 specifically includes:
  • a second identification code generating unit 811 configured to respectively generate a first identification code and a second identification code according to a standard method
  • the second identification code matching unit 812 is configured to match the first identification code and the second identification code one-to-many to obtain a plurality of double identification codes
  • the product matching unit 813 is configured to uniquely match the dual identification code to a specific product.
  • the product matching unit 813 is configured to:
  • the apparatus 800 further includes: a first identifier code user scan information recording unit 821, configured to record, after receiving a query request sent by the user by scanning the first identifier code, the user scanning the first The number, time, location and user information of the identification code scan are used as the first identification code user scan information, and the first identification code user scan information is matched with the first identification code.
  • a first identifier code user scan information recording unit 821 configured to record, after receiving a query request sent by the user by scanning the first identifier code, the user scanning the first The number, time, location and user information of the identification code scan are used as the first identification code user scan information, and the first identification code user scan information is matched with the first identification code.
  • the apparatus 800 further includes: a second identification code user scan information recording unit 841, configured to record, after receiving the anti-counterfeiting verification request sent by the user by scanning the second identification code, the user scanning the The number, time, location and user information of the second identification code scanning are collectively referred to as second identification code user scanning information, and the second identification code user scanning information is matched with the product.
  • a second identification code user scan information recording unit 841 configured to record, after receiving the anti-counterfeiting verification request sent by the user by scanning the second identification code, the user scanning the The number, time, location and user information of the second identification code scanning are collectively referred to as second identification code user scanning information, and the second identification code user scanning information is matched with the product.
  • the anti-counterfeiting verification result providing unit 850 is configured to:
  • the second identification code is scanned for the first time, and the second identification code is a pre-generated second identification code corresponding to the first identification code, providing the user who performs the scanning with the anti-counterfeiting verification that the product is authentic As a result, and setting the logistics status of the product to a sold or consumed state;
  • the second identification code is scanned again, and the user who performs the scanning is not specially authorized, the user who performs the scanning is provided with a suspicious anti-counterfeiting verification result of the product;
  • the second identification code is not a pre-generated second identification code corresponding to the first identification code, providing the user who performs the scanning with the anti-counterfeiting provided by the manufacturer or the designated authorized dealer whose second identification code is not the product Verification code, or suspicious anti-counterfeiting verification results for this product.
  • the dual identification code is any combination of a two-dimensional code, a barcode, a near field communication (NFC) code, and a contactless radio frequency identification (RFID) code.
  • the embodiment of the present application further provides a product traceability anti-counterfeiting verification auxiliary device 900 corresponding to the above-mentioned product traceability anti-counterfeiting verification device, as shown in FIG. 8 is a schematic structural diagram of the device, and the device mainly includes the following units:
  • the first identification code obtaining unit 910 is configured to obtain a first identification code on the product by using a user scan
  • a query request generation and sending unit 920 configured to generate and send a query request corresponding to the first identification code
  • a product information receiving and displaying unit 930 configured to receive and display basic information, a logistics status, and user scan information of a product that matches the first identification code in response to the query request;
  • a second identification code acquiring unit 940 configured to acquire a second identification code on the product by using a user scan
  • the anti-counterfeiting verification request generation and sending unit 950 is configured to generate and send an anti-counterfeiting verification request corresponding to the second identification code
  • the anti-counterfeiting verification result receiving and displaying unit 960 is configured to receive and display an anti-counterfeiting verification result of the product matching the second identification code in response to the anti-counterfeiting verification request.
  • the device further includes: a prompting unit (not shown), configured to receive and display basic information, a logistics status, and user scan information of the product that matches the first identification code in response to the query request. And prompting the user to scan the second identification code.
  • a prompting unit configured to receive and display basic information, a logistics status, and user scan information of the product that matches the first identification code in response to the query request. And prompting the user to scan the second identification code.
  • the device further comprises a purchased display unit (not shown):
  • the product is added to the user's purchased list and displayed.
  • the device further includes a rework and display unit (not shown):
  • An operation button is provided, and information of the corresponding product is transmitted to the manufacturer in response to the user's return or repair operation.
  • the rework and display unit is further configured to correspondingly display the corresponding store and distance corresponding to the product in response to the user's return or maintenance operation.
  • the operation button further includes an operation option such as a comment, a lottery, a coupon and/or a red envelope, a product maintenance knowledge, a recommendation match, and a share, and the user can evaluate the product, participate in the lottery event, and receive the user through the operation button.
  • Coupons and/or red envelopes learn about product maintenance, view recommended products that match the product, and share products with friends.
  • the multiple operation options provided by the user in this embodiment enhance the interaction experience of the user, and facilitate the promotion activities of the merchant.
  • the dual identification code including the first identification code and the second identification code used in the present application due to the irregularity of the matching manner between the first identification code and the second identification code, It is impossible for the counterfeiter to obtain the first identification code and the second identification code of the entire batch of the same product by parsing the first identification code and the second identification code of one product, thereby improving the anti-counterfeiting efficiency. And the second identification code must be obtained by tearing off the first identification code or destroying the product, which allows the counterfeiter to purchase the genuine product to obtain the second identification code, thereby increasing the cost of fraud.
  • the application also updates the product logistics status by recording the number of times the second identification code is scanned, so that the unauthorized second identification code scan obtains the product suspicious prompt, which basically blocks the counterfeiter from using the genuine packaging to implement the refill manufacturing.
  • the possibility of counterfeit products and successful sales; the recording of unauthorized second identification code scanning behavior can also provide convenience for manufacturers, carriers and dealers to track and combat possible counterfeiting.
  • the unique identification pattern of the dual identification code and product basic information, logistics status information, user scanning information and product authenticity information also provides traceability for product tracking, product anti-smuggling, and guarantees for authenticity based on product logistics information. .
  • the anti-counterfeiting method and device provided by the present application, only the simple operation of scanning the double identification code is needed, and the anti-counterfeiting verification query can be realized. Combining the above characteristics, the product with the double identification code provided by the present application, the anti-counterfeiting method and the device are greatly Improved anti-counterfeiting effect.
  • the first identification code and the second identification code have no matching relationship, and the first identification code uniquely matches the product in which the identification code is located, and further, it is necessary to explain that the first identifier is The code and the second identification code have no matching relationship, and when the sold item provides the second identification code to the consumer, there is no need to provide a specific second identification code, that is, the second identification code provided to the consumer is Any one of the second identification codes; in addition, the double identification code is: any combination of a two-dimensional code, a barcode, a near field communication (NFC) code, and a contactless radio frequency identification (RFID) code; that is, the first identifier
  • the code or the second identification code may be any one of the foregoing, and the second identification code may be the same as the first identification code, or may be different, and the type between the first identification code and the second identification code of different single products of the same product.
  • the type can also be different. Therefore, the counterfeiter can not obtain the double identification code matched with other similar products by purchasing only the single authenticity of one product and separately parsing the first identification code and the second identification code of the product, and it is very difficult to carry out counterfeiting. Therefore, the product with the double identification code has a high anti-counterfeiting feature.
  • FIG. 9 is a flowchart of a product traceability anti-counterfeiting verification method according to an embodiment of the present application, the method mainly includes the following steps:
  • S510 Receive a query request and/or an anti-counterfeiting verification request sent by the user by scanning a first identification code on the product.
  • S530 Receive a status update request sent by the user by scanning the second identification code, where the second identification code is separated from the product.
  • the Y500 step specifically includes the following steps:
  • the first identification code is uniquely matched to a specific product.
  • the Y520 step specifically includes the following steps:
  • the first identification code is uniquely matched with the basic information of the specific product
  • the dual identification code described in step Y500 is, but not limited to, any combination of a two-dimensional code, a barcode, a near field communication (NFC) code, and a contactless radio frequency identification (RFID) code. That is, the first identification code or the second identification code may be any one of the foregoing, and the second identification code may be the same as or different from the first identification code.
  • Step Y500 is a pre-completed step. When the present application is actually carried out, the process from step S510, that is, the initial step Y500 can be omitted.
  • the standard method for generating the first identification code and the second identification code described in step Y510 refers to a mature technology for generating a two-dimensional code, a barcode, a near field communication (NFC) code, and a non-contact radio frequency identification (RFID) code. It will not be explained in detail here.
  • the second identification code in the present invention is included with the product when the product is shipped.
  • the second identification code is separated from the product, and is provided to the consumer only when the product is sold. If the second identification code is lost due to improper storage or the like, the store needs to be sent to the manufacturer. Apply for a second identification code.
  • the second identification code is separated from the product, it is easy to save during transportation and is easy to be lost, and the second identification code is also available in the product. Printed to the consumer when sold.
  • the second identification code may have been scanned for verification by the consumer who requested the return of the product. At this time, due to the aforementioned verification rule, the consumer who purchased the product again cannot update the state of the product by the second identification code.
  • the second identification code attached to the consumer when the product is first sold is invalidated, and the store that sells the product requests and prints the second identification code again to the manufacturer. And the second identification code contains information that is sold twice.
  • the store clerk who sells the product submits a second identification code acquisition request through the network, and the manufacturer that produces the product receives and requests according to the obtained request.
  • One of the second identification code groups matched by the first identification code of the product is obtained and delivered to the store, which is printed by the store and delivered to the consumer who purchased the product.
  • the process of obtaining the second identification code from the second identification code group may be regular or irregular.
  • the protection layer when printing the second identification code, providing a protection layer for the second identification code, when the anti-counterfeiting authentication is required, the protection layer must be destroyed to enable the second identification code to be scanned, that is, The second identification code is not directly exposed.
  • step Y521 uniquely matches the first identification code with the basic information of the specific product, wherein the matching of the basic information of the product is completed by the product manufacturer or the designated authorized dealer, and the basic of the product Information includes but is not limited to: product name, product type, product number, product origin, product raw materials, etc.
  • Step Y522 receiving the logistics status information of the specific product set by scanning the first identification code, and matching the logistics status information with the first identification code, where the logistics status information includes but is not limited to: creation time The scan time history of the carrier or dealer, the history of the scan location, the basic information history of the carrier or dealer.
  • the logistics status information is matched to the first identification code of the product by the product manufacturer, the carrier and the distributor by scanning the first identification code of the specific product, and the logistics information is continuously updated during the change of the product logistics. .
  • the creation of the logistics status information can achieve accurate recording and tracking of the logistics status of each product. With the support of this information, the product traceability and product anti-smuggling goods can be well realized, and the product can be judged by verifying the information. True or false.
  • Step Y523 matches the first identification code with the authenticity information of the specific product, wherein the authenticity information includes: information that the product is genuine, and information that the product is suspicious.
  • the information that the product is genuine is that the product manufacturer or the designated authorized dealer matches the first identification code of the product before the product leaves the factory or before the sale.
  • the matching relationship includes: a matching relationship between the first identification code and the basic information of the product and the logistics information, and a matching relationship between the first identification code and the authenticity information of the product, and the matching between the dual identification code and the product is completed.
  • step Y330 is shown in FIG. 9 to include steps Y521-Y523, step Y520 may be accomplished in other ways or include other steps.
  • step Y500 is shown in FIG. 9 to include steps Y510-Y520, step Y500 may be accomplished in other ways or include other steps.
  • the data encryption technology and the authorization and access management of the system function are adopted in the steps of generating, transmitting, printing, saving and subsequent querying of the double identification code to effectively ensure the double identification.
  • the code is always in a safe state.
  • Step S510 is to receive a query request and/or a security verification request sent by the user by scanning the first identification code.
  • the method for scanning the first identification code includes, but is not limited to, using an existing scanning tool of the smart mobile terminal ( For example, WeChat, or a dedicated APP (application) developed for implementing the method of the present application, hereinafter referred to as an anti-counterfeiting verification APP.
  • the solution of the embodiment of the present application can make the user easily and simply query the source of the product without using a special detection tool or mastering a special one.
  • Technical knowledge effectively reducing the difficulty of the query.
  • the query through the anti-counterfeiting verification APP also improves the credibility of the user's product verification information.
  • the method further includes a step J510, recording the number, time, location, and user information of the scan of the first identification code by the user, which are collectively referred to as user scan information, and the user scan information and the location The first identification code is matched.
  • Step S520 is to provide the product basic information, logistics status information, and user scan information and/or anti-counterfeiting verification results to the user. Since the first identification code is associated with the basic information of the product, the logistics status information, and the user scan information, after the user scans the first identification code, the basic information of the product associated with the first identification code may be provided to the user. , logistics status information and user scan information.
  • the second identification code is not directly available, but needs to be acquired after the product is purchased, and the new user may not know the existence of the second identification code, and therefore, the user first scans When the identifier sends a query request, the user may return a prompt information for updating the consumption status of the product by scanning the second identifier.
  • each time the first identification code is scanned the basic information, the logistics information, and the user scan information of the corresponding product may be prompted, and each corresponding query behavior is recorded.
  • Step S530 is to receive a status update request sent by the user by scanning the second identification code for the first time; the scanning method may be the same as that described in step S510.
  • the method further includes a step J520, recording the number, time, location, and user information of the scan of the second identification code by the user, collectively referred to as user scan information, and the user scan information and the Product matching.
  • Step S540 sets the logistics status of the product to the sold or consumed state.
  • the second identification code is scanned for the first time, and the second identification code is pre-generated, setting the logistics status of the product to a sold or consumed state;
  • the user who performs the scan is provided with the result that the second identification code is unavailable.
  • the logistics status of the product is set to the sold or consumed state, and the purpose is to receive the special
  • the authorized user scans the query request sent by the first identification code to provide a product selling result to the user.
  • the second identification code can change the selling status of the product only when the second identification code is scanned for the first time, and the prompt is unavailable when the second identification code is scanned.
  • the second identification code may have been scanned and the corresponding product may have been sold or consumed.
  • the second identification code of the product that has been sold or consumed is scanned again. It is likely that the counterfeiter has implemented the counterfeiting behavior using the genuine packaging.
  • the user who has not been specifically authorized here includes: the user who implements the second identity code scan again does not implement the first second identity code scan, and the user who implements the second identity code scan does not receive the first second identity code scan user. Or the authorization of the authorized user who performed the last second identification code scan.
  • the scanning time, location and user information of the user who performed the second identification code scanning are recorded, and the information is matched to This product, so that you can query the product information and unauthorized scanning information to know which product is in which place or area may be counterfeited, in order to provide manufacturers, carriers and dealers with a way to track and strike.
  • the embodiment of the present application further provides a product traceability anti-counterfeiting verification assistance method corresponding to the product traceability anti-counterfeiting verification method, and a flowchart of the auxiliary method in FIG. 10, the method mainly includes the following steps:
  • S620 Generate and send a query request and/or an anti-counterfeiting verification request corresponding to the first identifier code.
  • S630 Receive and display basic information, a logistics status, and user scan information of a product that matches the first identification code in response to the query request.
  • S640 Receive and display an anti-counterfeiting verification result of the product matching the first identification code in response to the anti-counterfeiting verification request.
  • S670 Receive and display, in response to the status update request, update a logistics status of the product to a sold or consumed status.
  • the method further includes: prompting the user to scan the second identification code within a preset time.
  • the method further includes:
  • the product is added to the user's purchased list.
  • An operation button is provided, and information of the corresponding product is transmitted to the manufacturer in response to the user's return or repair operation.
  • the store corresponding to the corresponding product can be correspondingly displayed in response to the user's return or repair operation.
  • the method of scanning described in step S610 includes, but is not limited to, using an existing scanning tool (such as WeChat) of the smart mobile terminal, or using a dedicated APP (application) developed for implementing the method of the present application, hereinafter referred to as an anti-counterfeiting verification APP. .
  • the solution of the embodiment of the present application can make the user easily and simply query the source of the product without using a special detection tool or mastering a special one.
  • Technical knowledge effectively reducing the difficulty of the query.
  • the query through the anti-counterfeiting verification APP also improves the credibility of the user's product verification information.
  • step S620 a query request and/or an anti-counterfeiting verification request corresponding to the first identification code is generated and transmitted.
  • an existing scanning tool such as WeChat
  • a dedicated APP application developed for implementing the method of the present application
  • the scanning tool such as WeChat
  • the dedicated APP application
  • the server or the third party server sends a query request corresponding to the first identification code.
  • Step S630 is to receive and display basic information, logistics status, and user scan information of the product matching the first identification code in response to the query request.
  • the merchant server or the third-party server will match the basic information of the product of the first identification code because it stores basic information, logistics status and user scan information of products matching various first identification codes.
  • the logistics status and user scan information are sent to the user.
  • FIG. 4 shows basic information of products received, displayed to the user, logistics status information, and user scan information (the basic information of the provided products, the logistics status information, and the user scan information are displayed in multiple pages).
  • the function of prompting the user to scan the second identification code is: since the embodiment of the present application adopts a dual identification code, the second identification code cannot be directly obtained, but needs to be acquired after purchasing the product, and the new user may not know The existence of the second identification code, therefore, the prompt is to assist the user in completing the anti-counterfeiting verification.
  • FIG. 4 also shows the prompt content prompting the user to scan the first identification code to obtain the authenticity verification result of the product. "Respected customers, if you are interested in purchasing the product, please obtain the label from the merchant to scan the label to complete the product registration."
  • the basic information, the logistics status information, and the user scan information of the product provided to the user may be displayed in the anti-counterfeiting verification APP interface.
  • Step S640 is to receive and display an anti-counterfeiting verification result of the product matching the second identification code in response to the anti-counterfeiting verification request to the user. Since the merchant server or the third-party server stores the user scan information, the anti-counterfeiting verification result can be sent to the user according to the stored user scan information.
  • the merchant server or the third-party server receives the anti-counterfeiting verification request sent by the user to scan the first identification code, and the status of the product is unsold or not consumed, the anti-counterfeiting verification result that the product is genuine is received and displayed.
  • the prompt interface can be as shown in FIG.
  • Step S650 is to obtain a second identification code on the product by user scanning.
  • the scanning method may be the same as the scanning method of step S610.
  • Step S660 is to generate and send a status update request corresponding to the second identification code.
  • an existing scanning tool such as WeChat
  • a dedicated APP application developed for implementing the method of the present application
  • the scanning tool such as WeChat
  • the dedicated APP application
  • the server or the third party server sends a status update request corresponding to the second identification code.
  • the role of adding the product to the user's purchased list is to facilitate the user to manage the purchased product, including but not limited to resale, repair, return, and the like.
  • the step of adding the product to the purchased list of the user further includes: displaying a user purchased list; the user purchased list displaying the user purchased Basic information of the product, and providing an optional operation button; displaying first identification code user scan information and second identification code user scan information of the selected product in response to user selection; wherein the first identification code user scans The information and the second identification code user scan information have been described in detail above, and are not described herein; wherein the operation button provided by the user purchased list interface includes a return and maintenance operation button, and corresponding to the user's return or maintenance operation,
  • the information of the product is sent to the manufacturer, and the information of the product includes basic information of the product, logistics status information, and user scan information, and correspondingly corresponding to the store and the distance corresponding to the corresponding product can be displayed in response to the user's
  • the operation button further includes an operation option such as a comment, a lottery, a coupon and/or a red envelope, a product maintenance knowledge, a recommendation match, and a share, and the user can evaluate the product, participate in the lottery event, and receive the user through the operation button.
  • Coupons and/or red envelopes learn about product maintenance, view recommended products that match the product, and share products with friends.
  • the multiple operation options provided by the user in this embodiment enhance the interaction experience of the user, and facilitate the promotion activities of the merchant.
  • the logistics status of the product is set to the sold state, and the purpose is to receive and display the verification of the suspected anti-counterfeiting verification if the second identification code is scanned again and the scanning is not authorized.
  • the corresponding prompt interface can be as shown in FIG.
  • the second identification code is only provided to the user to update the product status when the first time is scanned. If the second identification code is not available when scanning the second identification code, the second identification code may have been scanned. The corresponding product may have been sold or consumed. The second identification code of the product that has been sold or consumed is scanned again.
  • the user who has not been specially authorized here includes: the user who implements the second identity code scan again does not implement the first second identity code scan user, and the user who implements the second identity code scan again does not receive the first second identity code scan user or Authorization of the authorized user who performed the last second identification code scan.
  • the scanning of the user who performs the first identification code scanning is recorded. Time, location, and user information, and match the information to the product, so that by querying the product information and unauthorized scanning information, it is known which product or region may be counterfeited, so that the manufacturer Carriers and dealers provide access and strikes.
  • the embodiment of the present application further provides a product traceability anti-counterfeiting verification device 1000 corresponding to the above-mentioned product traceability anti-counterfeiting verification method, as shown in FIG. 11 is a schematic structural diagram of the device, and the device 1000 mainly includes the following units:
  • the query request receiving unit 1020 is configured to receive a query request that is sent by the user by scanning the first identifier code
  • the matching information providing unit 1030 is configured to provide basic information, a logistics status, and user scan information of the product matching the first identification code to the user;
  • the anti-counterfeiting verification request receiving unit 1040 is configured to receive an anti-counterfeiting verification request sent by the user by scanning the first identification code;
  • the anti-counterfeiting verification result providing unit 1050 is configured to provide an anti-counterfeiting verification result of the product matching the first identification code to the user.
  • a status update request receiving unit 1060 configured to receive a status update request sent by the user by scanning a second identification code separated from the product
  • the product status update unit 1070 is configured to set the logistics status of the product to a sold or consumed status.
  • the apparatus 1000 further includes: the product matching unit 1010 is configured to:
  • the apparatus 1000 further includes: a first identifier code user scan information recording unit 1011, configured to record, after receiving a query request sent by the user by scanning the first identifier code, the user scanning the first The number, time, location and user information of the identification code scan are used as the first identification code user scan information, and the first identification code user scan information is matched with the first identification code.
  • a first identifier code user scan information recording unit 1011 configured to record, after receiving a query request sent by the user by scanning the first identifier code, the user scanning the first The number, time, location and user information of the identification code scan are used as the first identification code user scan information, and the first identification code user scan information is matched with the first identification code.
  • the apparatus 1000 further includes: a second identifier code user scan information recording unit 1021, configured to record, after receiving a security verification request sent by the user by scanning the second identifier code,
  • the number, time, location and user information of the second identification code scanning are collectively referred to as second identification code user scanning information, and the second identification code user scanning information is matched with the product.
  • the product status update unit 1070 is configured to:
  • the second identification code is scanned for the first time, and the second identification code is pre-generated, setting the logistics status of the product to a sold or consumed state;
  • the user who performs the scan is provided with the result that the second identification code is unavailable.
  • the logistics status of the product is set to the sold or consumed state, and the purpose is to receive the special
  • the authorized user scans the query request sent by the first identification code to provide a product selling result to the user.
  • the second identification code can change the selling status of the product only when the second identification code is scanned for the first time, and the prompt is unavailable when the second identification code is scanned.
  • the second identification code may have been scanned and the corresponding product may have been sold or consumed.
  • the second identification code of the product that has been sold or consumed is scanned again. It is likely that the counterfeiter has implemented the counterfeiting behavior using the genuine packaging.
  • the user who has not been specifically authorized here includes: the user who implements the second identity code scan again does not implement the first second identity code scan, and the user who implements the second identity code scan does not receive the first second identity code scan user. Or the authorization of the authorized user who performed the last second identification code scan.
  • the scanning time, location and user information of the user who performed the second identification code scanning are recorded, and the information is matched to This product, so that you can query the product information and unauthorized scanning information to know which product is in which place or area may be counterfeited, in order to provide manufacturers, carriers and dealers with a way to track and strike.
  • the dual identification code is any combination of a two-dimensional code, a barcode, a near field communication (NFC) code, and a contactless radio frequency identification (RFID) code.
  • the embodiment of the present application further provides a product traceability anti-counterfeiting verification auxiliary device 1100 corresponding to the above-mentioned product traceability anti-counterfeiting verification device.
  • the device structure is schematic, and the device mainly includes the following units:
  • the first identification code acquiring unit 1110 is configured to obtain a first identification code on the product by using a user scan
  • a query request generation and sending unit 1120 configured to generate and send a query request corresponding to the first identification code
  • a product information receiving and displaying unit 1130 configured to receive and display basic information, a logistics status, and user scan information of a product that matches the first identification code in response to the query request;
  • the anti-counterfeiting verification request generation and sending unit 1140 is configured to generate and send an anti-counterfeiting verification request corresponding to the first identification code
  • the anti-counterfeiting verification result receiving and displaying unit 1150 is configured to receive and display an anti-counterfeiting verification result of the product matching the first identification code in response to the anti-counterfeiting verification request.
  • a second identification code obtaining unit 1160 configured to obtain a second identification code on the product by using a user scan
  • a status update request generation and sending unit 1170 configured to generate and send a status update request corresponding to the second identification code
  • a status update request receiving and setting unit 1180 is configured to receive and update the logistics status of the product to a sold or consumed status in response to the status update request.
  • the device further includes: a prompting unit (not shown), configured to receive and display basic information, a logistics status, and user scan information of the product that matches the first identification code in response to the query request. And prompting the user to scan the second identification code.
  • a prompting unit configured to receive and display basic information, a logistics status, and user scan information of the product that matches the first identification code in response to the query request. And prompting the user to scan the second identification code.
  • the device further comprises a purchased display unit (not shown):
  • the product is added to the user's purchased list and displayed.
  • the device further includes a rework and display unit (not shown):
  • An operation button is provided, and information of the corresponding product is transmitted to the manufacturer in response to the user's return or repair operation.
  • the rework and display unit is further configured to correspondingly display the corresponding store and distance corresponding to the product in response to the user's return or maintenance operation.
  • the operation button further includes an operation option such as a comment, a lottery, a coupon and/or a red envelope, a product maintenance knowledge, a recommendation match, and a share, and the user can evaluate the product, participate in the lottery event, and receive the user through the operation button.
  • Coupons and/or red envelopes learn about product maintenance, view recommended products that match the product, and share products with friends.
  • the multiple operation options provided for the user in this embodiment enhance the user's interactive experience and facilitate the promotion activities of the merchant.
  • the dual identification code including the first identification code and the second identification code used in the present application has no matching relationship between the first identification code and the second identification code, so that the counterfeiter cannot analyze the first of a product.
  • the identification code and the second identification code obtain the first identification code and the second identification code of the same batch of the same product, thereby improving the anti-counterfeiting efficiency.
  • the acquisition of the second identification code must be provided to the consumer after the purchase of the product, which allows the counterfeiter to purchase the genuine product to obtain the second identification code, thereby increasing the cost of fraud.
  • the application also updates the product logistics status by recording the number of times the second identification code is scanned, so that the unauthorized second identification code scan obtains the product suspicious prompt, which basically blocks the counterfeiter from using the genuine packaging to implement the refill manufacturing.
  • the possibility of counterfeit products and successful sales; the recording of unauthorized second identification code scanning behavior can also provide convenience for manufacturers, carriers and dealers to track and combat possible counterfeiting.
  • the unique identification pattern of the dual identification code and product basic information, logistics status information, user scanning information and product authenticity information also provides traceability for product tracking, product anti-smuggling, and guarantees for authenticity based on product logistics information. .
  • the anti-counterfeiting method and device provided by the present application, only the simple operation of scanning the double identification code is needed, and the anti-counterfeiting verification query can be realized. Combining the above characteristics, the product with the double identification code provided by the present application, the anti-counterfeiting method and the device are greatly Improved anti-counterfeiting effect.
  • the present application can be implemented in software and/or a combination of software and hardware, for example, using an application specific integrated circuit (ASIC), a general purpose computer, or any other similar hardware device.
  • the software program of the present application can be executed by a processor to implement the steps or functions described above.
  • the software programs (including related data structures) of the present application can be stored in a computer readable recording medium such as a RAM memory, a magnetic or optical drive or a floppy disk and the like.
  • some of the steps or functions of the present application can be implemented in hardware, for example, as a circuit that cooperates with a processor to perform various steps or functions.
  • a portion of the present application can be applied as a computer program product, such as computer program instructions, which, when executed by a computer, can invoke or provide a method and/or technical solution in accordance with the present application.
  • the program instructions for invoking the method of the present application may be stored in a fixed or removable recording medium, and/or transmitted by a data stream in a broadcast or other signal bearing medium, and/or stored in a The working memory of the computer device in which the program instructions are run.
  • an embodiment in accordance with the present application includes a device including a memory for storing computer program instructions and a processor for executing program instructions, wherein when the computer program instructions are executed by the processor, triggering
  • the apparatus operates based on the aforementioned methods and/or technical solutions in accordance with various embodiments of the present application.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Human Resources & Organizations (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

本申请提供了一种带有双重标识码的产品及产品溯源防伪验证方法及装置。所述方法包括:接收用户通过扫描产品上的第一标识码而发送的查询请求;提供匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息给所述用户;接收用户通过扫描产品上的第二标识码而发送的防伪验证请求;提供匹配所述第二标识码的产品的防伪验证结果给所述用户。本申请实现了在降低用户查询难度基础上保证防伪效果。

Description

拥有双重标识码的产品及产品追溯防伪验证方法及装置 技术领域
本申请涉及防伪技术领域,尤其涉及一种拥有双重标识码的产品及产品追溯防伪验证方法及装置。
背景技术
目前,由于各行业诚信缺失,假冒伪劣商品遍及各领域。各企业为保护各自的品牌纷纷采取各种防范性技术措施,即防伪技术。已有的防伪技术有多种,例如,数码防伪技术、纹理防伪技术、安全线防伪技术、湿敏防伪技术等等。该已有的防伪技术都能够在一定程度上起到防伪的作用,但仍然存在一些不足。若防伪效果较好,难于被伪造,则用户查询或识别难度较高,例如,RFID电子标签需要专用设备识别;若用户查询或识别难度降低,则相应的伪造难度也降低,防伪效果相对较差,例如,喷印防伪数码。
因此,需要发明一种新的防伪技术可以在降低用户查询难度基础上保证防伪效果。
发明内容
本申请解决的技术问题之一是,提供一拥有双重标识码的产品及产品溯源防伪验证方法及装置,实现了降低用户查询难度基础上保证防伪效果。
根据本申请一方面的一个实施例,提供了一种带有双重标识码的产品,所述双重标识码包括:附着于产品的第一标识码和与所述产品分离的的第二标识码。
根据本申请另一方面的一个实施例,提供了一种产品溯源防伪验证方法,包括:
接收用户通过扫描产品上的第一标识码而发送的查询请求;
提供匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息给所述用户;
接收用户通过扫描产品上的第二标识码而发送的防伪验证请求;
提供匹配所述第二标识码的产品的防伪验证结果给所述用户。
根据本申请另一方面的一个实施例,提供了一种产品溯源防伪验证装置,包括:
查询请求接收单元,用于接收用户通过扫描所述第一标识码而发送的查询请求;
匹配信息提供单元,用于提供匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息给所述用户;
防伪验证请求接收单元,用于接收用户通过扫描所述第二标识码而发送的防伪验证请求;
防伪验证结果提供单元,用于提供匹配所述第二标识码的产品的防伪验证结果给所述用户。
根据本申请另一方面的一个实施例,提供了一种产品溯源防伪验证辅助方法,包括:
通过用户扫描获取产品上的第一标识码;
生成并发送与所述第一标识码对应的查询请求;
接收并显示响应于所述查询请求的、匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息;
通过用户扫描获取产品上的第二标识码;
生成并发送与所述第二标识码对应的防伪验证请求;
接收并显示响应于所述防伪验证请求的、匹配所述第二标识码的产品的防伪验证结果。
根据本申请另一方面的一个实施例,提供了一种产品溯源防伪验证辅助装置,包括:
第一标识码获取单元,用于通过用户扫描获取产品上的第一标识码;
查询请求生成并发送单元,用于生成并发送与所述第一标识码对应的查询请求;
产品信息接收并显示单元,用于接收并显示响应于所述查询请求的、匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息;
第二标识码获取单元,用于通过用户扫描获取产品上的第二标识码;
防伪验证请求生成并发送单元,用于生成并发送与所述第二标识码对应的防伪验证请求;
防伪验证结果接收并显示单元,用于接收并显示响应于所述防伪验证请求的、匹配所述第二标识码的产品的防伪验证结果。
根据本申请又一方面的一个实施例,提供了一种产品溯源防伪验证方法,包括:
接收用户通过扫描产品上的第一标识码而发送的查询请求和/或防伪验证请求;
提供匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息和/或防伪验证结果给所述用户;其中所述第一标识码附着于所述产品;
接收用户通过扫描第二标识码而发送的状态更新请求;其中,所述第二标识码与所述产品分离;
将所述产品的物流状态设置为已销售或消费状态。
根据本申请又一方面的一个实施例,提供了一种产品溯源防伪验证装置,包括:
查询请求接收单元,用于接收用户通过扫描所述第一标识码而发送的查询请求;
匹配信息提供单元,用于提供匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息给所述用户;
防伪验证请求接收单元,用于接收用户通过扫描所述第一标识码而发送的防伪验证请求;
防伪验证结果提供单元,用于提供匹配所述第一标识码的产品的防 伪验证结果给所述用户;
状态更新请求接收单元,用于接收用户通过扫描与所述产品分离的第二标识码而发送的状态更新请求;
产品状态更新单元,用于将所述产品的物流状态设置为已销售或消费状态。
根据本申请又一方面的一个实施例,提供了一种产品溯源防伪验证辅助方法,包括:
通过用户扫描获取产品上的第一标识码;
生成并发送与所述第一标识码对应的查询请求和/或防伪验证请求;
接收并显示响应于所述查询请求的、匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息;
接收并显示响应于所述防伪验证请求的、匹配所述第一标识码的产品的防伪验证结果;
通过用户扫描获取与所述产品分离的第二标识码;
生成并发送与所述第二标识码对应的状态更新请求;
接收并响应于所述状态更新请求,将所述产品的物流状态更新为已销售或消费状态。
根据本申请又一方面的一个实施例,提供了一种产品溯源防伪验证辅助装置,包括:
第一标识码获取单元,用于通过用户扫描获取产品上的第一标识码;
查询请求生成并发送单元,用于生成并发送与所述第一标识码对应的查询请求;
产品信息接收并显示单元,用于接收并显示响应于所述查询请求的、匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息;
防伪验证请求生成并发送单元,用于生成并发送与所述第一标识码对应的防伪验证请求;
防伪验证结果接收并显示单元,用于接收并显示响应于所述防伪验证请求的、匹配所述第一标识码的产品的防伪验证结果。
第二标识码获取单元,用于通过用户扫描获取与所述产品分离的第二标识码;
状态更新请求生成并发送单元,用于生成并发送与所述第二标识码对应的状态更新请求;
状态更新请求接收并设置单元,用于接收并响应于所述状态更新请求,将所述产品的物流状态更新为已销售或消费状态。
本申请采用的包括第一标识码和第二标识码的双重标识码,因第一标识码与第二标识码匹配方式的无规律性或无匹配关系,使得造假者不可能通过解析一个产品的第一标识码和第二标识码而得到整个批次同类产品的第一标识码和第二标识码,提高了防伪效率。并且第二标识码的获得必须在购买商品后由商家提供,这就使得造假者必须购买正品后才可获得第二标识码,提高了造假成本。
本领域普通技术人员将了解,虽然下面的详细说明将参考图示实施例、附图进行,但本申请并不仅限于这些实施例。而是,本申请的范围是广泛的,且意在仅通过后附的权利要求限定本申请的范围。
附图说明
通过阅读参照以下附图对非限制性实施例所作的详细描述,本申请的其它特征、目的和优点将会变得更明显:
图1a-1b-1c是根据本申请的一个实施例的产品所带双重标识码的示意图。
图2是根据本申请一个实施例的产品溯源防伪验证方法的流程图。
图3是根据本申请的一个实施例的产品溯源防伪验证辅助方法的流程图。
图4是根据本申请一个实施例的提供产品信息结果的示意图。
图5是根据本申请一个实施例的提供产品为正品结果的示意图。
图6是根据本申请一个实施例的提供产品可疑结果的示意图。
图7是根据本申请的一个实施例的产品溯源防伪验证装置的结构示 意图。
图8是根据本申请的一个实施例的产品溯源防伪验证辅助装置的结构示意图。
图9是根据本申请又一个实施例的产品溯源防伪验证方法的流程图。
图10是根据本申请的又一个实施例的产品溯源防伪验证辅助方法的流程图。
图11是根据本申请的又一个实施例的产品溯源防伪验证装置的结构示意图。
图12是根据本申请的又一个实施例的产品溯源防伪验证辅助装置的结构示意图。
本领域普通技术人员将了解,虽然下面的详细说明将参考图示实施例、附图进行,但本申请并不仅限于这些实施例。而是,本申请的范围是广泛的,且意在仅通过后附的权利要求限定本申请的范围。
具体实施方式
在更加详细地讨论示例性实施例之前应当提到的是,一些示例性实施例被描述成作为流程图描绘的处理或方法。虽然流程图将各项操作描述成顺序的处理,但是其中的许多操作可以被并行地、并发地或者同时实施。此外,各项操作的顺序可以被重新安排。当其操作完成时所述处理可以被终止,但是还可以具有未包括在附图中的附加步骤。所述处理可以对应于方法、函数、规程、子例程、子程序等等。
本申请涉及的方法在计算机设备上实施,所述计算机设备包括用户设备与网络设备。其中,所述用户设备包括但不限于电脑、智能手机、PDA等;所述网络设备包括但不限于单个网络服务器、多个网络服务器组成的服务器组或基于云计算(Cloud Computing)的由大量计算机或网络服务器构成的云。其中,所述计算机设备可单独运行来实现本申请,也可接入网络并通过与网络中的其他计算机设备的交互操作来实现本申请。其中,所述计算机设备所处的网络包括但不限于互联网、广域网、 城域网、局域网、VPN网络等。
需要说明的是,所述用户设备、网络设备和网络等仅为举例,其他现有的或今后可能出现的计算机设备或网络如可适用于本申请,也应包含在本申请保护范围以内,并以引用方式包含于此。
后面所讨论的方法(其中一些通过流程图示出)可以通过硬件、软件、固件、中间件、微代码、硬件描述语言或者其任意组合来实施。当用软件、固件、中间件或微代码来实施时,用以实施必要任务的程序代码或代码段可以被存储在机器或计算机可读介质(比如存储介质)中。(一个或多个)处理器可以实施必要的任务。
这里所公开的具体结构和功能细节仅仅是代表性的,并且是用于描述本申请的示例性实施例的目的。但是本申请可以通过许多替换形式来具体实现,并且不应当被解释成仅仅受限于这里所阐述的实施例。
应当理解的是,虽然在这里可能使用了术语“第一”、“第二”等等来描述各个单元,但是这些单元不应当受这些术语限制。使用这些术语仅仅是为了将一个单元与另一个单元进行区分。举例来说,在不背离示例性实施例的范围的情况下,第一单元可以被称为第二单元,并且类似地第二单元可以被称为第一单元。这里所使用的术语“和/或”包括其中一个或更多所列出的相关联项目的任意和所有组合。
应当理解的是,当一个单元被称为“连接”或“耦合”到另一单元时,其可以直接连接或耦合到所述另一单元,或者可以存在中间单元。与此相对,当一个单元被称为“直接连接”或“直接耦合”到另一单元时,则不存在中间单元。应当按照类似的方式来解释被用于描述单元之间的关系的其他词语(例如“处于...之间”相比于“直接处于...之间”,“与...邻近”相比于“与...直接邻近”等等)。
这里所使用的术语仅仅是为了描述具体实施例而不意图限制示例性实施例。除非上下文明确地另有所指,否则这里所使用的单数形式“一个”、“一项”还意图包括复数。还应当理解的是,这里所使用的术语“包括”和/或“包含”规定所陈述的特征、整数、步骤、操作、单元和/或组件的存在, 而不排除存在或添加一个或更多其他特征、整数、步骤、操作、单元、组件和/或其组合。
还应当提到的是,在一些替换实现方式中,所提到的功能/动作可以按照不同于附图中标示的顺序发生。举例来说,取决于所涉及的功能/动作,相继示出的两幅图实际上可以基本上同时执行或者有时可以按照相反的顺序来执行。
下面结合附图对本申请的技术方案作进一步详细描述。
图1a-1b是根据本申请的一个实施例的带有双重标识码的产品的示意图,该产品的双重标识码的主要特征是,该双重标识码的第一标识码粘贴或打印于产品本身。该双重标识码的第一标识码直接暴露于产品外侧或内侧,可直接获得而无需对产品造成任何破坏;第二标识码则与所述产品分离,在所述产品售出时一起交付消费者。图1a和图1b分别展示了附着于鞋产品鞋舌的第一标识码和与所述产品分离的第二标识码。
图1b-1c是根据本申请的另一个实施例的带有双重标识码的产品示意图,图1c展示的是带有二维码的提包,第一标识码位于提包的内表层,不会影响提包的外观,可直接获得而不用破坏提包,如图1c所示;第二标识码位于一单独的卡片表层,和所述第一标识码所在的产品分离,如图1b所示。
应当指出的是,本申请所指的带有双重标识码的产品不限于以上的两个实施例,只要具备:产品的双重标识码的第一标识码被印刷或粘贴在所述产品且第二标识码与所述产品分离;第一标识码直接暴露于产品表层,可直接获得而无需对产品造成任何破坏;第二标识码与所述产品分离,需要先购买正品来获得的特点,均落入本申请的保护范围之内。
带有所述双重标识码产品的好处是,由于第二标识码与所述第一标识码所在的产品分离,且只在所述产品售出时提供给消费者,因此若想通过复制正品第一标识码和第二标识码的方式来给假冒产品添加防伪码,就必须先购买正品来获得双重标识码,假冒成本高;而且,在本发明的一个实施例中,第一标识码和多个第二标识码匹配,匹配关系可以是随 机的而不存在规律,并且唯一匹配该双重标识码所在的产品,另外需要说明的是由于所述第一标识码和多个第二标识码匹配,在售出商品将所述第二标识码提供给消费者时,不需要提供特定第二标识码,即提供给消费者的所述第二标识码是匹配于所述产品的多个第二标识码中的任意一个;另外,所述双重标识码为:二维码、条形码、近场通信(NFC)码、非接触式射频识别(RFID)码的任意组合;即第一标识码或第二标识码均可以为上述任一种,且第二标识码可以与第一标识码相同,也可以不同,同类产品的不同单品第一标识码之间的类型和第二标识码之间类型也可以不同。因此造假者不能通过仅仅购买一款产品的单个正品并分别解析该产品的第一标识码和第二标识码,来获得与其他同类产品所匹配的双重标识码,实施假冒非常困难。因此带有所述双重标识码的产品具有较高的防伪特点。
图2是根据本申请一个实施例的产品溯源防伪验证方法的流程图,该方法主要包括如下步骤:
Y300,预先生成匹配于特定产品的双重标识码;
S310,接收用户通过扫描产品上的第一标识码发送的查询请求;
S320,提供匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息给所述用户;
S330,接收用户通过扫描产品上的第二标识码而发送的防伪验证请求;其中,所述第二标识码与所述产品分离;
S340,判断接收所述查询请求和防伪验证请求之间的时间间隔是否符合预设阈值;
S350,若是,则提供匹配所述第二标识码的产品的防伪验证结果给所述用户。
Y300步骤具体包括如下步骤:
Y310,按照标准方法分别生成第一标识码和第二标识码;
Y320,将第一标识码与多个第二标识码匹配,得到多个双重标识码;
Y330,将所述多个双重标识码唯一匹配于特定产品。
Y330步骤具体包括如下步骤:
Y331,将所述第一标识码与所述特定产品的基本信息唯一匹配;
Y332,接收通过扫描所述第一标识码而设置的所述特定产品的物流状态信息,并将该物流状态信息与所述第一标识码匹配;
Y333,将所述第二标识码与所述特定产品的真伪信息匹配。
为进一步理解本申请,下面对上述各步骤做进一步详细介绍。
步骤Y300中所述的双重标识码为但不限于:二维码、条形码、近场通信(NFC)码、非接触式射频识别(RFID)码的任意组合。即第一标识码或第二标识码均可以为上述任一种,且第二标识码可以与第一标识码相同,也可以不同。步骤Y300是一个预先完成的步骤。在本申请实际实行时,从步骤S310开始,即初始步骤Y300可以被省略。
步骤Y310中所述的生成第一标识码和第二标识码的标准方法指对二维码、条形码、近场通信(NFC)码、非接触式射频识别(RFID)码生成方法的成熟技术,在这里不再详细阐释。
可以理解的是,本发明中的第二标识码在所述产品出厂时随产品附赠。
需要说明的是,所述第二标识码与所述产品分离,只在所述产品售出时提供给消费者,由于保管不当等问题导致所述第二标识码丢失时,需由门店向厂家申请补发第二标识码。
或者考虑到所述第二标识码的运输问题,由于所述第二标识码与所述产品分离,在运输过程中容易不方便保存,容易遗失,所述第二标识码也可在所述产品售出时打印附赠给消费者。
或者在发生退换货时,由于所述第二标识码可能已被申请退换所述产品的消费者扫描验证。此时,由于前述的验证规则,再次购买所述产品的消费者,无法通过所述第二标识码验证所述产品的真伪。
所以在所述产品二次售出时,所述产品对应初次售出时附赠给消费者的第二标识码即作废,由售出所述产品的门店再次向厂家请求并打印第二标识码,并且所述第二标识码含有二次售出的信息。
可选地一种实施方式为:在所述产品售出时,售出所述产品的门店售货员通过网络提交第二标识码获取请求,生产所述产品的厂商根据获取到的请求从与所述产品第一标识码匹配的第二标识码组中获取一个并下发至所述门店,由所述门店打印并交付给购买所述产品的消费者。
其中从所述第二标识码组中获取所述第二标识码的过程可以是有规律的也可以是无规律的,
进一步地,在打印所述第二标识码时,为所述第二标识码提供保护层,在需要进行防伪认证时,必须破坏所述保护层以使所述第二标识码可以被扫描,即所述第二标识码不直接暴露。
步骤Y320中所述的将第一标识码与第二标识码一对多匹配,得到双重标识码;具体方式可以,但不限于是,生成第一标识码同时匹配生成多个第二标识码;或生成第一标识码集合和第二标识码集合后,将两个集合的元素随机匹配;也可以是按照某种特定的函数进行匹配;抑或可以将第一标识码与第二标识码集合元素互换后再进行一一匹配。任何无规律的匹配方式都应落入本申请的保护范围内。正是由于第一标识码与第二标识码匹配方式的无规律性,使得造假者不可能通过解析一个产品的第一标识码和第二标识码而得到整个同类产品的第一标识码和第二标识码,提高了防伪效率。
可选地,所述第二标识码也可在所述产品售出时生成,可选地一种生成办法为根据所述门店提交的请求信息中的门店编号和时间匹配所述产品的第一标识码生成第二标识码。
步骤Y330的具体步骤中,步骤Y331将所述第一标识码与所述特定产品的基本信息唯一匹配,其中,产品基本信息的匹配是由产品生产厂家或指定授权经销商完成的,产品的基本信息包括但不限于:产品名称、产品种类、产品号码、产品产地、产品原材料等等。
步骤Y332接收通过扫描所述第一标识码而设置的所述特定产品的物流状态信息,并将该物流状态信息与所述第一标识码匹配,其中,物流状态信息包括但不限于:创建时间、承运人或经销商的扫描时间历史、 扫描地点历史、承运人或经销商基本信息历史等。该物流状态信息是通过产品生产厂家、承运人及经销商通过扫描特定产品的第一标识码而匹配至该产品的第一标识码上的,该物流信息在该产品物流发生变化过程中不断更新。该物流状态信息的创建可以实现对每个产品的物流状态实现精准记录和追踪,有了这些信息的支持,就可以很好的实现产品溯源和产品防窜货,并通过核实该信息来判断产品真伪。
经过以上两个步骤,就完成了产品信息与第一标识码的匹配。
步骤Y333将所述第二标识码与所述特定产品的真伪信息匹配,其中,真伪信息包括:产品为正品的信息、产品可疑的信息。产品为正品的信息是产品厂家或指定授权经销商在产品出厂前或出售前就匹配至该产品的第二标识码上的;产品可疑的信息是在该产品第二标识码被首次扫描后,该第二标识码在未经授权的情况下被第二次及以后多次扫描后,自动匹配至所述第二标识码的。
上述匹配关系包括:第一标识码与第二标识码的匹配关系、第一标识码与产品的基本信息及物流信息的匹配关系,以及第二标识码与产品的真伪信息的匹配关系,就完成了双重标识码与产品的匹配。
虽然在图2中示出步骤Y330包括步骤Y331-Y333,但步骤Y330也可以通过其它的方式完成或包括其它的步骤。
虽然在图2中示出步骤Y300包括步骤Y310-Y330,但步骤Y300也可以通过其它的方式完成或包括其它的步骤。
需要说明的是,为防止双重标识码被恶意篡改,在该双重标识码生成、传输打印、保存以及后续的查询等环节均采用数据加密技术,以有效保证双重标识码始终处于安全状态。
步骤S310为接收用户通过扫描所述第一标识码发送的查询请求;其中,扫描所述第一标识码的方法包括但不限于:使用智能移动终端已有的扫描工具(如微信),或使用为实施本申请的方法开发的专用APP(应用),以下简称防伪验证APP。
由于用户对安装于智能移动终端中的APP软件的使用及功能能够快 速学习掌握,因此本申请实施例的方案可以令用户轻松简单的查询产品的来源,而不需要使用专用检测工具或掌握专门的技术知识,有效降低了查询难度。另外,通过防伪验证APP来进行查询同时也提高了用户对产品验证信息的可信度。
步骤S310后,还可选地包括步骤J310,记录所述用户扫描所述第一标识码扫描的次数、时间、地点和用户信息等,统称为用户扫描信息,并将所述用户扫描信息与所述第一标识码匹配。
步骤S320是提供所述产品基本信息、物流状态信息和用户扫描信息给所述用户。由于第一标识码是与产品的基本信息、物流状态信息和用户扫描信息相关联,因此,在用户扫描所述第一标识码后,可提供给用户与第一标识码关联的产品的基本信息、物流状态信息和用户扫描信息。
另外,由于本申请实施例采用双重标识码,所述第二标识码不可直接获得,而是需要购买产品后获取,新用户可能不知道第二标识码的存在,因此,在用户通过扫描第一标识码发送查询请求时,可以向用户返回通过扫描所述第二标识码获取防伪验证结果的提示信息。
需要说明的是,在第二标识码被扫描前,每次扫描第一标识码都可以提示相应的产品的基本信息、物流信息以及用户扫描信息,相应的每次的查询行为都会被记录。
步骤S330为接收用户通过首次扫描所述第二标识码发送的防伪验证请求;扫描方法可同步骤S310中所述。
步骤S330后,还可选地包括步骤J320,记录所述用户扫描所述第二标识码扫描的次数、时间、地点和用户信息,统称为用户扫描信息,并将所述用户扫描信息与所述产品匹配。
步骤S340为提供匹配所述第二标识码的产品的防伪验证结果给所述用户。
若所述第二标识码为首次被扫描,且所述第二标识码是预先生成的与第一标识码对应的第二标识码,则向实施该扫描的用户提供该产品为正品的防伪验证结果,并将所述产品的物流状态设置为已销售或消费状态;
若所述第二标识码为再次被扫描,且实施该扫描的用户未经过特殊授权,则向实施该扫描的用户提供该产品可疑的防伪验证结果;
若所述第二标识码不是预先生成的与第一标识码对应的第二标识码,则向实施该扫描的用户提供该第二标识码非所述产品的厂家或指定授权经销商提供的防伪验证码、或该产品可疑的防伪验证结果。
在该第二标识码被首次扫描,且所述第二标识码是预先生成的与第一标识码对应的第二标识码的情况下,将所述产品的物流状态设置为已售出或消费状态,目的在于,若再次接收到未经过特殊授权用户通过扫描所述第一标识码发送的查询请求,则提供验证可疑的防伪验证结果给所述用户。一般情况下,该第二标识码只有首次被扫描且所述第二标识码是预先生成的与第一标识码对应的第二标识码时才提供给用户该产品为正品的防伪验证结果,若扫描该第二标识码时提示验证结果可疑,则说明该第二标识码可能已被扫描过,则对应的产品有可能已被售出或消费。已被售出或消费的产品第二标识码被再次扫描很可能是造假者利用正品包装实施了假冒行为,通过此方式可有效验证产品的真伪。这里未经过特殊授权的用户包括:实施再次第二标识码扫描的用户非实施首次第二标识码扫描的用户,以及实施再次第二标识码扫描的用户未收到实施首次第二标识码扫描用户或实施上一次第二标识码扫描的授权用户的授权。同时应当指出的是,当接收到未授权的通过扫描第二标识码的防伪验证请求时,会记录实施此次第二标识码扫描用户的扫描时间、地点和用户信息,并将该信息匹配至该产品,这样就可以通过查询该产品的信息以及未授权扫描信息获知是哪个产品在哪个地方或区域可能出现了被假冒的情况,以便为厂家、承运人和经销商提供追踪和打击的途径。
可以理解的是,在接收到用户通过扫描所述第二标识码发送的防伪验证请求后,提供真伪验证结果的相关内容外,还可以提供产品的基本信息以及物流信息。
本申请实施例还提供一种与上述产品溯源防伪验证方法对应的一种 产品溯源防伪验证辅助方法,如图3辅助方法的流程图,该方法主要包括以下步骤:
S410,通过用户扫描获取产品上的第一标识码;
S420,生成并发送与所述第一标识码对应的查询请求;
S430,接收并显示响应于所述查询请求的、匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息;
S440,通过用户扫描获取与所述产品分离的第二标识码;
S450,生成并发送与所述第二标识码对应的防伪验证请求;
S460,接收并显示响应于所述防伪验证请求的、匹配所述第二标识码的产品的防伪验证结果。
可选地,所述方法在步骤S430之后,还包括:提示所述用户在预设时间内扫描所述第二标识码。
可选地,若所述防伪验证结果为真,则所述方法还包括:
将所述产品添加到所述用户的已购列表中。
显示用户已购列表;
响应于用户的选择显示所述选择的产品的第一标识码用户扫描信息和第二标识码用户扫描信息;
提供操作按钮,并响应于用户的退换或维修操作将对应产品的信息发送至厂商。
响应于用户的退换或维修操作将对应可处理对应产品的门店及距离对应显示。
以下将具体解释每个步骤的内容。
步骤S410所述的扫描所述的方法包括但不限于:使用智能移动终端已有的扫描工具(如微信),或使用为实施本申请的方法开发的专用APP(应用),以下简称防伪验证APP。
由于用户对安装于智能移动终端中的APP软件的使用及功能能够快速学习掌握,因此本申请实施例的方案可以令用户轻松简单的查询产品的来源,而不需要使用专用检测工具或掌握专门的技术知识,有效降低 了查询难度。另外,通过防伪验证APP来进行查询同时也提高了用户对产品验证信息的可信度。
步骤S420中生成并发送与所述第一标识码对应的查询请求。使用智能移动终端已有的扫描工具(如微信)或使用为实施本申请的方法开发的专用APP(应用)扫描第一标识码后,扫描工具(如微信)或专用APP(应用)就向商家服务器或第三方服务器发送对应于第一标识码的查询请求。
步骤S430为接收并显示响应于所述查询请求的、匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息。商家服务器或第三方服务器接收到查询请求后,由于其存储有匹配各种第一标识码的产品的基本信息、物流状态及用户扫描信息,就将匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息发送给用户。图4示出了接收并向用户显示的产品的基本信息、物流状态信息以及用户扫描信息(提供的产品的基本信息、物流状态信息和用户扫描信息分多个页面展示示意图)。
提示所述用户扫描所述第二标识码的作用是:由于本申请实施例采用双重标识码,所述第二标识码不可直接获得,而是需要购买所述产品后获取,新用户可能不知道第二标识码的存在,因此,该提示是对用户完成防伪验证该提示结果起辅助作用。图4同时示出了提示用户扫描第二标识码获得产品真伪验证结果的提示内容“尊敬的顾客,如果您有意购买该产品,请向商家获取防伪标签,以扫描防伪标签来验证产品真伪”。该提供给用户的产品的基本信息、物流状态信息和用户扫描信息可显示于所述防伪验证APP界面中。
步骤S440为通过用户扫描获取产品上的第二标识码。所述扫描方法可与步骤S410的扫描方法相同。
步骤S450为生成并发送与所述第二标识码对应的防伪验证请求。使用智能移动终端已有的扫描工具(如微信)或使用为实施本申请的方法开发的专用APP(应用)扫描第二标识码后,扫描工具(如微信)或专 用APP(应用)就向商家服务器或第三方服务器发送对应于第二标识码的防伪验证请求。
步骤S460为接收并显示响应于所述防伪验证请求的、匹配所述第二标识码的产品的防伪验证结果给所述用户。由于商家服务器或第三方服务器存储有用户扫描信息,就可以根据存储的用户扫描信息将防伪验证结果发送给用户。
如果商家服务器或第三方服务器接收到用户首次扫描所述第二标识码发送的防伪验证请求,且所述第二标识码是预先生成的与第一标识码对应的第二标识码,因此接收并显示所述产品为正品的防伪验证结果给所述用户,该提示界面可如图5中所示。
将所述产品添加到所述用户的已购列表中的作用是,方便用户管理已购的产品,所述管理操作包括但不限于转卖,维修,退换货等。为方便用户对已购的产品进行管理,将所述产品添加到所述用户的已购列表中的步骤之后还包括:显示用户已购列表;所述用户已购列表显示用户已购的所述产品的基本信息,并提供可选的操作按钮;响应于用户的选择显示所述选择的产品的第一标识码用户扫描信息和第二标识码用户扫描信息;其中所述第一标识码用户扫描信息和第二标识码用户扫描信息在前面已作出详细说明,在此不做赘述;其中用户已购列表界面提供的操作按钮包括退换和维修操作按钮,并且响应于用户的退换或维修操作将对应产品的信息发送至厂商,所述产品的信息包括产品的基本信息、物流状态信息以及用户扫描信息,并且响应于用户的退换或维修操作将对应可处理对应产品的门店及距离对应显示,以方便用户就近选择门店进行相应的处理。
可以理解的是,所述操作按钮还包括评论、抽奖、领取优惠卷和/或红包、产品维护知识、推荐搭配以及分享等操作选项,用户通过操作按钮可以对产品进行评价、参与抽奖活动、领取优惠卷和/或红包、了解产品的维修保养知识、查看推荐的与所述产品搭配的其他商品、向好友分享产品。本实施例中为用户提供的多个操作选项提升了用户的交互体验, 方便了商家进行推广活动。
在该第二标识码被首次扫描后将所述产品的物流状态设置为已销售状态,目的在于,若该第二标识码被再次扫描并且该扫描未授权,则接收并显示验证可疑的防伪验证结果给所述用户,对应的提示界面可如图7中所示。一般情况下,该第二标识码只有首次被扫描时才提供给用户该产品为正品的防伪验证结果,若扫描该第二标识码时提示验证结果可疑,则说明该第二标识码可能已被扫描过,则对应的产品有可能已被售出或消费。已被售出或消费的产品第二标识码被再次扫描很可能是造假者利用正品包装实施了假冒行为,通过此方式可有效验证产品的真伪。这里未经过特殊授权的用户包括:实施再次第二标识码扫描的用户是非实施首次第二标识码扫描用户,以及实施再次第二标识码扫描的用户未收到实施首次第二标识码扫描用户或实施上一次第二标识码扫描的授权用户的授权。同时应当指出的是,当接收到未授权的通过扫描第二标识码的防伪验证请求时,会记录实施此次第二标识码扫描用户的扫描时间、地点和用户信息,并将该信息匹配至该产品,这样就可以通过查询该产品的信息以及未授权扫描信息获知是哪个产品在哪个地方或区域可能出现了被假冒的情况,以便为厂家、承运人和经销商提供追踪和打击的途径。
本申请实施例还提供一种与上述产品溯源防伪验证方法对应的产品溯源防伪验证装置800,如图7中所示为所述装置结构示意图,该装置800主要包括如下单元:
查询请求接收单元820,用于接收用户通过扫描所述第一标识码而发送的查询请求;
匹配信息提供单元830,用于提供匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息给所述用户;
防伪验证请求接收单元840,用于接收用户通过扫描所述第二标识码而发送的防伪验证请求;
防伪验证结果提供单元850,用于提供匹配所述第二标识码的产品的防 伪验证结果给所述用户。
虽然图8中还示出了其它单元,但它们都是可选的,本申请的实施例不依赖于这些单元。
可选地,所述装置800还包括:双重标识码生成单元810,用于预先生成匹配特定产品的所述双重标识码,双重标识码生成单元810具体包括:
明第二标识码生成单元811,用于按照标准方法分别生成第一标识码和第二标识码;
明第二标识码匹配单元812,用于将第一标识码与第二标识码一对多匹配,得到多个双重标识码;
产品匹配单元813,用于将所述双重标识码唯一匹配于特定产品。
可选地,所述产品匹配单元813被配置为:
将所述第一标识码与所述特定产品的基本信息唯一匹配;
接收通过扫描所述第一标识码而设置的所述特定产品的物流状态信息,并将该物流状态信息与所述第一标识码匹配。
将所述第二标识码与所述特定产品的真伪信息匹配。
可选地,所述装置800还包括:第一标识码用户扫描信息记录单元821,用于在接收用户通过扫描所述第一标识码而发送的查询请求后,记录所述用户扫描所述第一标识码扫描的次数、时间、地点和用户信息,作为第一标识码用户扫描信息,并将所述第一标识码用户扫描信息与所述第一标识码匹配。
可选地,所述装置800还包括:第二标识码用户扫描信息记录单元841,用于在接收用户通过扫描所述第二标识码而发送的防伪验证请求后,记录所述用户扫描所述第二标识码扫描的次数、时间、地点和用户信息,统称为第二标识码用户扫描信息,并将所述第二标识码用户扫描信息与所述产品匹配。
可选地,所述防伪验证结果提供单元850用于:
若所述第二标识码为首次被扫描,且所述第二标识码是预先生成的与第一标识码对应的第二标识码,则向实施该扫描的用户提供该产品为正品的防伪验证结果,并将所述产品的物流状态设置为已销售或消费状态;
若所述第二标识码为再次被扫描,且实施该扫描的用户未经过特殊授权, 则向实施该扫描的用户提供该产品可疑的防伪验证结果;
若所述第二标识码不是预先生成的与第一标识码对应的第二标识码,则向实施该扫描的用户提供该第二标识码非所述产品的厂家或指定授权经销商提供的防伪验证码、或该产品可疑的防伪验证结果。
可选地,所述双重标识码为:二维码、条形码、近场通信(NFC)码、非接触式射频识别(RFID)码的任意组合。
本申请实施例还提供一种与上述产品溯源防伪验证装置对应的一种产品溯源防伪验证辅助装置900,如图8中所示为所述装置结构示意图,该装置主要包括如下单元:
第一标识码获取单元910,用于通过用户扫描获取产品上的第一标识码;
查询请求生成并发送单元920,用于生成并发送与所述第一标识码对应的查询请求;
产品信息接收并显示单元930,用于接收并显示响应于所述查询请求的、匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息;
第二标识码获取单元940,用于通过用户扫描获取产品上的第二标识码;
防伪验证请求生成并发送单元950,用于生成并发送与所述第二标识码对应的防伪验证请求;
防伪验证结果接收并显示单元960,用于接收并显示响应于所述防伪验证请求的、匹配所述第二标识码的产品的防伪验证结果。
可选地,所述装置还包括:提示单元(未示),用于在接收并显示响应于所述查询请求的、匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息,提示所述用户扫描所述第二标识码。
可选地,所述装置还包括已购并显示单元(未示):
将所述产品添加到所述用户的已购列表中并显示。
可选地,所述装置还包括返修并显示单元(未示):
显示用户已购列表;
响应于用户的选择显示所述选择的产品的第一标识码用户扫描信息 和第二标识码用户扫描信息;
提供操作按钮,并响应于用户的退换或维修操作将对应产品的信息发送至厂商。
可选地,所述返修并显示单元还用于响应于用户的退换或维修操作将对应可处理对应产品的门店及距离对应显示。
可以理解的是,所述操作按钮还包括评论、抽奖、领取优惠卷和/或红包、产品维护知识、推荐搭配以及分享等操作选项,用户通过操作按钮可以对产品进行评价、参与抽奖活动、领取优惠卷和/或红包、了解产品的维修保养知识、查看推荐的与所述产品搭配的其他商品、向好友分享产品。本实施例中为用户提供的多个操作选项提升了用户的交互体验,方便了商家进行推广活动。
综上所述,在本发明的一实施例中,本申请采用的包括第一标识码和第二标识码的双重标识码,因第一标识码与第二标识码匹配方式的无规律性,使得造假者不可能通过解析一个产品的第一标识码和第二标识码而得到整个批次同类产品的第一标识码和第二标识码,提高了防伪效率。并且第二标识码的获得必须通过撕开第一标识码或对产品进行破坏,这就使得造假者必须购买正品后才可获得第二标识码,提高了造假成本。另外本申请还通过记录扫描第二标识码的次数来更新产品物流状态,使得未授权的再次的第二标识码扫描获得产品可疑提示,这就基本可以阻断造假者利用正品包装实施重新灌注制造假冒产品并成功销售的可能性;对未授权的再次的第二标识码扫描行为的记录也可以为厂家、承运人和经销商提供追踪和打击可能存在的假冒行为提供便利。此外,这种双重标识码与产品基本信息、物流状态信息、用户扫描信息以及产品真伪信息唯一匹配的模式,也为产品追踪溯源,产品防窜货,根据产品物流信息查验真伪提供了保证。本申请提供的防伪方法和装置中,只需要扫描双重标识码的简单操作,就可以实现防伪验证查询,综合上述特点,本申请提供的带有双重标识码的产品,防伪方法和装置,都大大提高了防伪效果。
在本发明的又一个实施例中,第一标识码和第二标识码无匹配关系,并且所述第一标识码唯一匹配该标识码所在的产品,另外需要说明的是由于所述第一标识码和第二标识码无匹配关系,在售出商品将所述第二标识码提供给消费者时,不需要提供特定第二标识码,即提供给消费者的所述第二标识码是多个第二标识码中的任意一个;另外,所述双重标识码为:二维码、条形码、近场通信(NFC)码、非接触式射频识别(RFID)码的任意组合;即第一标识码或第二标识码均可以为上述任一种,且第二标识码可以与第一标识码相同,也可以不同,同类产品的不同单品第一标识码之间的类型和第二标识码之间类型也可以不同。因此造假者不能通过仅仅购买一款产品的单个正品并分别解析该产品的第一标识码和第二标识码,来获得与其他同类产品所匹配的双重标识码,实施假冒非常困难。因此带有所述双重标识码的产品具有较高的防伪特点。
图9是根据本申请一个实施例的产品溯源防伪验证方法的流程图,该方法主要包括如下步骤:
Y500,预先生成匹配于特定产品的双重标识码;
S510,接收用户通过扫描产品上的第一标识码而发送的查询请求和/或防伪验证请求;
S520,提供匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息和/或防伪验证结果给所述用户;其中所述第一标识码附着于所述产品;
S530,接收用户通过扫描第二标识码而发送的状态更新请求;其中,所述第二标识码与所述产品分离;
S540,将所述产品的物流状态设置为已销售或消费状态。
Y500步骤具体包括如下步骤:
Y510,按照标准方法分别生成第一标识码和第二标识码;
Y520,将所述第一标识码唯一匹配于特定产品。
Y520步骤具体包括如下步骤:
Y521,将所述第一标识码与所述特定产品的基本信息唯一匹配;
Y522,接收通过扫描所述第一标识码而设置的所述特定产品的物流状态信息,并将该物流状态信息与所述第一标识码匹配;
Y523,将所述第一标识码与所述特定产品的真伪信息匹配。
为进一步理解本申请,下面对上述各步骤做进一步详细介绍。
步骤Y500中所述的双重标识码为但不限于:二维码、条形码、近场通信(NFC)码、非接触式射频识别(RFID)码的任意组合。即第一标识码或第二标识码均可以为上述任一种,且第二标识码可以与第一标识码相同,也可以不同。步骤Y500是一个预先完成的步骤。在本申请实际实行时,从步骤S510开始,即初始步骤Y500可以被省略。
步骤Y510中所述的生成第一标识码和第二标识码的标准方法指对二维码、条形码、近场通信(NFC)码、非接触式射频识别(RFID)码生成方法的成熟技术,在这里不再详细阐释。
可以理解的是,本发明中的第二标识码在所述产品出厂时随产品附赠。
需要说明的是,所述第二标识码与所述产品分离,只在所述产品售出时提供给消费者,由于保管不当等问题导致所述第二标识码丢失时,需由门店向厂家申请补发第二标识码。
或者考虑到所述第二标识码的运输问题,由于所述第二标识码与所述产品分离,在运输过程中容易不方便保存,容易遗失,所述第二标识码也可在所述产品售出时打印附赠给消费者。
或者在发生退换货时,由于所述第二标识码可能已被申请退换所述产品的消费者扫描验证。此时,由于前述的验证规则,再次购买所述产品的消费者,无法通过所述第二标识码更新所述产品的状态。
所以在所述产品二次售出时,所述产品对应初次售出时附赠给消费者的第二标识码即作废,由售出所述产品的门店再次向厂家请求并打印第二标识码,并且所述第二标识码含有二次售出的信息。
可选地一种实施方式为:在所述产品售出时,售出所述产品的门店售货员通过网络提交第二标识码获取请求,生产所述产品的厂商根据获 取到的请求从与所述产品第一标识码匹配的第二标识码组中获取一个并下发至所述门店,由所述门店打印并交付给购买所述产品的消费者。
其中从所述第二标识码组中获取所述第二标识码的过程可以是有规律的也可以是无规律的,
进一步地,在打印所述第二标识码时,为所述第二标识码提供保护层,在需要进行防伪认证时,必须破坏所述保护层以使所述第二标识码可以被扫描,即所述第二标识码不直接暴露。
步骤Y520的具体步骤中,步骤Y521将所述第一标识码与所述特定产品的基本信息唯一匹配,其中,产品基本信息的匹配是由产品生产厂家或指定授权经销商完成的,产品的基本信息包括但不限于:产品名称、产品种类、产品号码、产品产地、产品原材料等等。
步骤Y522接收通过扫描所述第一标识码而设置的所述特定产品的物流状态信息,并将该物流状态信息与所述第一标识码匹配,其中,物流状态信息包括但不限于:创建时间、承运人或经销商的扫描时间历史、扫描地点历史、承运人或经销商基本信息历史等。该物流状态信息是通过产品生产厂家、承运人及经销商通过扫描特定产品的第一标识码而匹配至该产品的第一标识码上的,该物流信息在该产品物流发生变化过程中不断更新。该物流状态信息的创建可以实现对每个产品的物流状态实现精准记录和追踪,有了这些信息的支持,就可以很好的实现产品溯源和产品防窜货,并通过核实该信息来判断产品真伪。
经过以上两个步骤,就完成了产品信息与第一标识码的匹配。
步骤Y523将所述第一标识码与所述特定产品的真伪信息匹配,其中,真伪信息包括:产品为正品的信息、产品可疑的信息。产品为正品的信息是产品厂家或指定授权经销商在产品出厂前或出售前就匹配至该产品的第一标识码上的。
上述匹配关系包括:第一标识码与产品的基本信息及物流信息的匹配关系,以及第一标识码与产品的真伪信息的匹配关系,就完成了双重标识码与产品的匹配。
虽然在图9中示出步骤Y330包括步骤Y521-Y523,但步骤Y520也可以通过其它的方式完成或包括其它的步骤。
虽然在图9中示出步骤Y500包括步骤Y510-Y520,但步骤Y500也可以通过其它的方式完成或包括其它的步骤。
需要说明的是,为防止双重标识码被恶意篡改,在该双重标识码生成、传输打印、保存以及后续的查询等环节均采用数据加密技术以及系统功能的授权和访问管理,以有效保证双重标识码始终处于安全状态。
步骤S510为接收用户通过扫描所述第一标识码发送的查询请求和/或防伪验证请求;其中,扫描所述第一标识码的方法包括但不限于:使用智能移动终端已有的扫描工具(如微信),或使用为实施本申请的方法开发的专用APP(应用),以下简称防伪验证APP。
由于用户对安装于智能移动终端中的APP软件的使用及功能能够快速学习掌握,因此本申请实施例的方案可以令用户轻松简单的查询产品的来源,而不需要使用专用检测工具或掌握专门的技术知识,有效降低了查询难度。另外,通过防伪验证APP来进行查询同时也提高了用户对产品验证信息的可信度。
步骤S510后,还可选地包括步骤J510,记录所述用户扫描所述第一标识码扫描的次数、时间、地点和用户信息等,统称为用户扫描信息,并将所述用户扫描信息与所述第一标识码匹配。
步骤S520是提供所述产品基本信息、物流状态信息和用户扫描信息和/或防伪验证结果给所述用户。由于第一标识码是与产品的基本信息、物流状态信息和用户扫描信息相关联,因此,在用户扫描所述第一标识码后,可提供给用户与第一标识码关联的产品的基本信息、物流状态信息和用户扫描信息。
另外,由于本申请实施例采用双重标识码,所述第二标识码不可直接获得,而是需要购买产品后获取,新用户可能不知道第二标识码的存在,因此,在用户通过扫描第一标识码发送查询请求时,可以向用户返回通过扫描所述第二标识码更新产品消费状态的提示信息。
需要说明的是,在第二标识码被扫描前,每次扫描第一标识码都可以提示相应的产品的基本信息、物流信息以及用户扫描信息,相应的每次的查询行为都会被记录。
步骤S530为接收用户通过首次扫描所述第二标识码发送的状态更新请求;扫描方法可同步骤S510中所述。
步骤S530后,还可选地包括步骤J520,记录所述用户扫描所述第二标识码扫描的次数、时间、地点和用户信息,统称为用户扫描信息,并将所述用户扫描信息与所述产品匹配。
步骤S540将所述产品的物流状态设置为已销售或消费状态。
若所述第二标识码为首次被扫描,且所述第二标识码是预先生成的,则将所述产品的物流状态设置为已销售或消费状态;
若所述第二标识码为再次被扫描,则向实施该扫描的用户提供该第二标识码不可用的结果。
在该第二标识码被首次扫描,且所述第二标识码是预先生成的情况下,将所述产品的物流状态设置为已售出或消费状态,目的在于,若再次接收到未经过特殊授权用户通过扫描所述第一标识码发送的查询请求,则提供产品的售出结果给所述用户。一般情况下,该第二标识码只有首次被扫描且所述第二标识码是预先生成时才可以更改所述产品的售出状态,若扫描该第二标识码时提示不可用,则说明该第二标识码可能已被扫描过,则对应的产品有可能已被售出或消费。已被售出或消费的产品第二标识码被再次扫描很可能是造假者利用正品包装实施了假冒行为。这里未经过特殊授权的用户包括:实施再次第二标识码扫描的用户非实施首次第二标识码扫描的用户,以及实施再次第二标识码扫描的用户未收到实施首次第二标识码扫描用户或实施上一次第二标识码扫描的授权用户的授权。同时应当指出的是,当接收到未授权的通过扫描第二标识码的状态更新请求时,会记录实施此次第二标识码扫描用户的扫描时间、地点和用户信息,并将该信息匹配至该产品,这样就可以通过查询该产品的信息以及未授权扫描信息获知是哪个产品在哪个地方或区域可能出 现了被假冒的情况,以便为厂家、承运人和经销商提供追踪和打击的途径。
本申请实施例还提供一种与上述产品溯源防伪验证方法对应的一种产品溯源防伪验证辅助方法,如图10辅助方法的流程图,该方法主要包括以下步骤:
S610,通过用户扫描获取产品上的第一标识码;
S620,生成并发送与所述第一标识码对应的查询请求和/或防伪验证请求;
S630,接收并显示响应于所述查询请求的、匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息;
S640,接收并显示响应于所述防伪验证请求的、匹配所述第一标识码的产品的防伪验证结果。
S650,通过用户扫描获取与所述产品分离的第二标识码;
S660,生成并发送与所述第二标识码对应的状态更新请求;
S670,接收并显示响应于所述状态更新请求,将所述产品的物流状态更新为已销售或消费状态。
可选地,所述方法在步骤S630之后,还包括:提示所述用户在预设时间内扫描所述第二标识码。
可选地,若将所述产品的物流状态更新为已销售或消费状态,则所述方法还包括:
将所述产品添加到所述用户的已购列表中。
显示用户已购列表;
响应于用户的选择显示所述选择的产品的第一标识码用户扫描信息和第二标识码用户扫描信息;
提供操作按钮,并响应于用户的退换或维修操作将对应产品的信息发送至厂商。
响应于用户的退换或维修操作将对应可处理对应产品的门店及距离对应显示。
以下将具体解释每个步骤的内容。
步骤S610所述的扫描所述的方法包括但不限于:使用智能移动终端已有的扫描工具(如微信),或使用为实施本申请的方法开发的专用APP(应用),以下简称防伪验证APP。
由于用户对安装于智能移动终端中的APP软件的使用及功能能够快速学习掌握,因此本申请实施例的方案可以令用户轻松简单的查询产品的来源,而不需要使用专用检测工具或掌握专门的技术知识,有效降低了查询难度。另外,通过防伪验证APP来进行查询同时也提高了用户对产品验证信息的可信度。
步骤S620中生成并发送与所述第一标识码对应的查询请求和/或防伪验证请求。使用智能移动终端已有的扫描工具(如微信)或使用为实施本申请的方法开发的专用APP(应用)扫描第一标识码后,扫描工具(如微信)或专用APP(应用)就向商家服务器或第三方服务器发送对应于第一标识码的查询请求。
步骤S630为接收并显示响应于所述查询请求的、匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息。商家服务器或第三方服务器接收到查询请求后,由于其存储有匹配各种第一标识码的产品的基本信息、物流状态及用户扫描信息,就将匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息发送给用户。图4示出了接收并向用户显示的的产品的基本信息、物流状态信息以及用户扫描信息(提供的产品的基本信息、物流状态信息和用户扫描信息分多个页面展示示意图)。
提示所述用户扫描所述第二标识码的作用是:由于本申请实施例采用双重标识码,所述第二标识码不可直接获得,而是需要购买所述产品后获取,新用户可能不知道第二标识码的存在,因此,该提示是对用户完成防伪验证该提示结果起辅助作用。图4同时示出了提示用户扫描第一标识码获得产品真伪验证结果的提示内容“尊敬的顾客,如果您有意购买该产品,请向商家获取标签,以扫描标签来完成产品注册”。该提供给 用户的产品的基本信息、物流状态信息和用户扫描信息可显示于所述防伪验证APP界面中。
步骤S640为接收并显示响应于所述防伪验证请求的、匹配所述第二标识码的产品的防伪验证结果给所述用户。由于商家服务器或第三方服务器存储有用户扫描信息,就可以根据存储的用户扫描信息将防伪验证结果发送给用户。
如果商家服务器或第三方服务器接收到用户扫描所述第一标识码发送的防伪验证请求,且所述产品的状态为未售出或未消费,因此接收并显示所述产品为正品的防伪验证结果给所述用户,该提示界面可如图5中所示。
步骤S650为通过用户扫描获取产品上的第二标识码。所述扫描方法可与步骤S610的扫描方法相同。
步骤S660为生成并发送与所述第二标识码对应的状态更新请求。使用智能移动终端已有的扫描工具(如微信)或使用为实施本申请的方法开发的专用APP(应用)扫描第二标识码后,扫描工具(如微信)或专用APP(应用)就向商家服务器或第三方服务器发送对应于第二标识码的状态更新请求。
将所述产品添加到所述用户的已购列表中的作用是,方便用户管理已购的产品,所述管理操作包括但不限于转卖,维修,退换货等。为方便用户对已购的产品进行管理,将所述产品添加到所述用户的已购列表中的步骤之后还包括:显示用户已购列表;所述用户已购列表显示用户已购的所述产品的基本信息,并提供可选的操作按钮;响应于用户的选择显示所述选择的产品的第一标识码用户扫描信息和第二标识码用户扫描信息;其中所述第一标识码用户扫描信息和第二标识码用户扫描信息在前面已作出详细说明,在此不做赘述;其中用户已购列表界面提供的操作按钮包括退换和维修操作按钮,并且响应于用户的退换或维修操作将对应产品的信息发送至厂商,所述产品的信息包括产品的基本信息、物流状态信息以及用户扫描信息,并且响应于用户的退换或维修操作将 对应可处理对应产品的门店及距离对应显示,以方便用户就近选择门店进行相应的处理。
可以理解的是,所述操作按钮还包括评论、抽奖、领取优惠卷和/或红包、产品维护知识、推荐搭配以及分享等操作选项,用户通过操作按钮可以对产品进行评价、参与抽奖活动、领取优惠卷和/或红包、了解产品的维修保养知识、查看推荐的与所述产品搭配的其他商品、向好友分享产品。本实施例中为用户提供的多个操作选项提升了用户的交互体验,方便了商家进行推广活动。
在该第二标识码被首次扫描后将所述产品的物流状态设置为已销售状态,目的在于,若该第二标识码被再次扫描并且该扫描未授权,则接收并显示验证可疑的防伪验证结果给所述用户,对应的提示界面可如图7中所示。一般情况下,该第二标识码只有首次被扫描时才提供给用户更新产品状态的选项,若扫描该第二标识码时提示不可用,则说明该第二标识码可能已被扫描过,则对应的产品有可能已被售出或消费。已被售出或消费的产品第二标识码被再次扫描很可能是造假者利用正品包装实施了假冒行为,通过此方式可有效验证产品的真伪。这里未经过特殊授权的用户包括:实施再次第二标识码扫描的用户是非实施首次第二标识码扫描用户,以及实施再次第二标识码扫描的用户未收到实施首次第二标识码扫描用户或实施上一次第二标识码扫描的授权用户的授权。同时应当指出的是,在所述产品的物流状态更新为售出后,当接收到未授权的通过扫描第一标识码的防伪验证请求时,会记录实施此次第一标识码扫描用户的扫描时间、地点和用户信息,并将该信息匹配至该产品,这样就可以通过查询该产品的信息以及未授权扫描信息获知是哪个产品在哪个地方或区域可能出现了被假冒的情况,以便为厂家、承运人和经销商提供追踪和打击的途径。
本申请实施例还提供一种与上述产品溯源防伪验证方法对应的产品溯源防伪验证装置1000,如图11中所示为所述装置结构示意图,该装置 1000主要包括如下单元:
查询请求接收单元1020,用于接收用户通过扫描所述第一标识码而发送的查询请求;
匹配信息提供单元1030,用于提供匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息给所述用户;
防伪验证请求接收单元1040,用于接收用户通过扫描所述第一标识码而发送的防伪验证请求;
防伪验证结果提供单元1050,用于提供匹配所述第一标识码的产品的防伪验证结果给所述用户。
状态更新请求接收单元1060,用于接收用户通过扫描与所述产品分离的第二标识码而发送的状态更新请求;
产品状态更新单元1070,用于将所述产品的物流状态设置为已销售或消费状态。
虽然图12中还示出了其它单元,但它们都是可选的,本申请的实施例不依赖于这些单元。
可选地,所述装置1000还包括:产品匹配单元1010被配置为:
将所述第一标识码与所述特定产品的基本信息唯一匹配;
接收通过扫描所述第一标识码而设置的所述特定产品的物流状态信息,并将该物流状态信息与所述第一标识码匹配。
将所述第一标识码与所述特定产品的真伪信息匹配。
可选地,所述装置1000还包括:第一标识码用户扫描信息记录单元1011,用于在接收用户通过扫描所述第一标识码而发送的查询请求后,记录所述用户扫描所述第一标识码扫描的次数、时间、地点和用户信息,作为第一标识码用户扫描信息,并将所述第一标识码用户扫描信息与所述第一标识码匹配。
可选地,所述装置1000还包括:第二标识码用户扫描信息记录单元1021,用于在接收用户通过扫描所述第二标识码而发送的防伪验证请求后,记录所述用户扫描所述第二标识码扫描的次数、时间、地点和用户信息,统称为第二标识码用户扫描信息,并将所述第二标识码用户扫描信息与所述产品匹配。
可选地,所述产品状态更新单元1070用于:
将所述产品的物流状态设置为已销售或消费状态;
若所述第二标识码为首次被扫描,且所述第二标识码是预先生成的,则将所述产品的物流状态设置为已销售或消费状态;
若所述第二标识码为再次被扫描,则向实施该扫描的用户提供该第二标识码不可用的结果。
在该第二标识码被首次扫描,且所述第二标识码是预先生成的情况下,将所述产品的物流状态设置为已售出或消费状态,目的在于,若再次接收到未经过特殊授权用户通过扫描所述第一标识码发送的查询请求,则提供产品的售出结果给所述用户。一般情况下,该第二标识码只有首次被扫描且所述第二标识码是预先生成时才可以更改所述产品的售出状态,若扫描该第二标识码时提示不可用,则说明该第二标识码可能已被扫描过,则对应的产品有可能已被售出或消费。已被售出或消费的产品第二标识码被再次扫描很可能是造假者利用正品包装实施了假冒行为。这里未经过特殊授权的用户包括:实施再次第二标识码扫描的用户非实施首次第二标识码扫描的用户,以及实施再次第二标识码扫描的用户未收到实施首次第二标识码扫描用户或实施上一次第二标识码扫描的授权用户的授权。同时应当指出的是,当接收到未授权的通过扫描第二标识码的状态更新请求时,会记录实施此次第二标识码扫描用户的扫描时间、地点和用户信息,并将该信息匹配至该产品,这样就可以通过查询该产品的信息以及未授权扫描信息获知是哪个产品在哪个地方或区域可能出现了被假冒的情况,以便为厂家、承运人和经销商提供追踪和打击的途径。
可选地,所述双重标识码为:二维码、条形码、近场通信(NFC)码、非接触式射频识别(RFID)码的任意组合。
本申请实施例还提供一种与上述产品溯源防伪验证装置对应的一种产品溯源防伪验证辅助装置1100,如图12中所示为所述装置结构示意图, 该装置主要包括如下单元:
第一标识码获取单元1110,用于通过用户扫描获取产品上的第一标识码;
查询请求生成并发送单元1120,用于生成并发送与所述第一标识码对应的查询请求;
产品信息接收并显示单元1130,用于接收并显示响应于所述查询请求的、匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息;
防伪验证请求生成并发送单元1140,用于生成并发送与所述第一标识码对应的防伪验证请求;
防伪验证结果接收并显示单元1150,用于接收并显示响应于所述防伪验证请求的、匹配所述第一标识码的产品的防伪验证结果。
第二标识码获取单元1160,用于通过用户扫描获取产品上的第二标识码;
状态更新请求生成并发送单元1170,用于生成并发送与所述第二标识码对应的状态更新请求;
状态更新请求接收并设置单元1180,用于接收并响应于所述状态更新请求,将所述产品的物流状态更新为已销售或消费状态。
可选地,所述装置还包括:提示单元(未示),用于在接收并显示响应于所述查询请求的、匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息,提示所述用户扫描所述第二标识码。
可选地,所述装置还包括已购并显示单元(未示):
将所述产品添加到所述用户的已购列表中并显示。
可选地,所述装置还包括返修并显示单元(未示):
显示用户已购列表;
响应于用户的选择显示所述选择的产品的第一标识码用户扫描信息和第二标识码用户扫描信息;
提供操作按钮,并响应于用户的退换或维修操作将对应产品的信息发送至厂商。
可选地,所述返修并显示单元还用于响应于用户的退换或维修操作将对应可处理对应产品的门店及距离对应显示。
可以理解的是,所述操作按钮还包括评论、抽奖、领取优惠卷和/或红包、产品维护知识、推荐搭配以及分享等操作选项,用户通过操作按钮可以对产品进行评价、参与抽奖活动、领取优惠卷和/或红包、了解产品的维修保养知识、查看推荐的与所述产品搭配的其他商品、向好友分享产品。本实施例中为用户提供的多个操作选项提升了用户的交互体验,方便了商家的推广活动。
综上所述,本申请采用的包括第一标识码和第二标识码的双重标识码,因第一标识码与第二标识码无匹配关系,使得造假者不可能通过解析一个产品的第一标识码和第二标识码而得到整个批次同类产品的第一标识码和第二标识码,提高了防伪效率。并且第二标识码的获得必须在购买产品之后有销售方提供给消费者,这就使得造假者必须购买正品后才可获得第二标识码,提高了造假成本。另外本申请还通过记录扫描第二标识码的次数来更新产品物流状态,使得未授权的再次的第二标识码扫描获得产品可疑提示,这就基本可以阻断造假者利用正品包装实施重新灌注制造假冒产品并成功销售的可能性;对未授权的再次的第二标识码扫描行为的记录也可以为厂家、承运人和经销商提供追踪和打击可能存在的假冒行为提供便利。此外,这种双重标识码与产品基本信息、物流状态信息、用户扫描信息以及产品真伪信息唯一匹配的模式,也为产品追踪溯源,产品防窜货,根据产品物流信息查验真伪提供了保证。本申请提供的防伪方法和装置中,只需要扫描双重标识码的简单操作,就可以实现防伪验证查询,综合上述特点,本申请提供的带有双重标识码的产品,防伪方法和装置,都大大提高了防伪效果。
需要注意的是,本申请可在软件和/或软件与硬件的组合体中被实施,例如,可采用专用集成电路(ASIC)、通用目的计算机或任何其他类似硬件设备来实现。在一个实施例中,本申请的软件程序可以通过处理器执行以实现上文所述步骤或功能。同样地,本申请的软件程序(包括相关的数据结构)可以被存储到计算机可读记录介质中,例如,RAM存储器,磁或光驱动器或软磁盘及类似设备。另外,本申请的一些步骤或功能可 采用硬件来实现,例如,作为与处理器配合从而执行各个步骤或功能的电路。
另外,本申请的一部分可被应用为计算机程序产品,例如计算机程序指令,当其被计算机执行时,通过该计算机的操作,可以调用或提供根据本申请的方法和/或技术方案。而调用本申请的方法的程序指令,可能被存储在固定的或可移动的记录介质中,和/或通过广播或其他信号承载媒体中的数据流而被传输,和/或被存储在根据所述程序指令运行的计算机设备的工作存储器中。在此,根据本申请的一个实施例包括一个装置,该装置包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该装置运行基于前述根据本申请的多个实施例的方法和/或技术方案。
对于本领域技术人员而言,显然本申请不限于上述示范性实施例的细节,而且在不背离本申请的精神或基本特征的情况下,能够以其他的具体形式实现本申请。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本申请的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本申请内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。系统权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第一,第二等词语用来表示名称,而并不表示任何特定的顺序。

Claims (40)

  1. 一种拥有双重标识码的产品,其特征在于,所述双重标识码包括:附着于产品的第一标识码和与所述产品分离的的第二标识码。
  2. 根据权利要求1所述的产品,其特征在于,所述双重标识码的第一标识码与多个第二标识码匹配。
  3. 根据权利要求1所述的产品,其特征在于,所述第一标识码和第二标识码匹配相同类型的产品。
  4. 根据权利要求1所述的产品,其特征在于,所述双重标识码的第一标识码与第二标识码无匹配关系。
  5. 根据权利要求1所述的产品,其特征在于,所述第二标识码不与产品或产品类型关联。
  6. 根据权利要求1所述的产品,其特征在于,所述双重标识码为:二维码、条形码、近场通信(NFC)码、非接触式射频识别(RFID)码的任意组合。
  7. 一种如权利要求1所述产品的追溯防伪的验证方法,其中,所述方法包括:
    接收用户通过扫描产品上的第一标识码而发送的查询请求;
    提供匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息给所述用户;其中所述第一标识码附着于所述产品;
    接收用户通过扫描第二标识码而发送的防伪验证请求;其中,所述第二标识码与所述产品分离;
    判断接收所述查询请求和防伪验证请求之间的时间间隔是否符合预设阈值;
    若是,则提供匹配所述第二标识码的产品的防伪验证结果给所述用户。
  8. 根据权利要求7所述的方法,其特征在于,所述方法还包括:预先生成匹配特定产品的所述双重标识码,具体包括:
    按照标准方法分别生成第一标识码与第二标识码;
    将第一标识码与多个第二标识码匹配,得到多个双重标识码;
    将所述多个双重标识码匹配于唯一特定产品。
  9. 根据权利要求7所述的方法,其特征在于,将所述第一标识码唯一匹配于特定产品,具体包括:
    将所述第一标识码与所述特定产品的基本信息唯一匹配;
    接收通过扫描所述第一标识码而设置的所述特定产品的物流状态信息,并将该物流状态信息与所述第一标识码匹配;
    将所述第二标识码与所述特定产品的真伪信息匹配。
  10. 根据权利要求7所述的方法,其特征在于,接收用户通过扫描所述第一标识码而发送的查询请求后,还包括:
    记录所述用户扫描所述第一标识码扫描的次数、时间、地点和用户信息,统称为第一标识码用户扫描信息,并将所述第一标识码用户扫描信息与所述第一标识码匹配。
  11. 根据权利要求7所述的方法,其特征在于,接收用户通过扫描所述第二标识码而发送的防伪验证请求后,还包括:
    记录所述用户扫描所述第二标识码扫描的次数、时间、地点和用户信息,统称为第二标识码用户扫描信息,并将所述第二标识码用户扫描信息与所述产品匹配。
  12. 根据权利要求7所述的方法,其特征在于,提供所述产品的防伪验证结果给所述用户步骤,具体包括:
    若所述第二标识码为首次被扫描,且所述第二标识码是预先生成的与第一标识码对应第二标识码,则向实施该扫描的用户提供该产品为正品的防伪验证结果,并将所述产品的物流状态设置为已销售或消费状态;
    若所述第二标识码为再次被扫描,且实施该扫描的用户未经过特殊授权,则向实施该扫描的用户提供该产品可疑的防伪验证结果;
    若所述第二标识码不是预先生成的与第一标识码对应的第二标识码,则向实施该扫描的用户提供该第二标识码非所述产品的厂家或指定授权经销商提供的防伪验证码、或该产品可疑的防伪验证结果。
  13. 一种如权利要求1所述产品的追溯防伪的验证方法,其中,所 述方法包括:
    接收用户通过扫描产品上的第一标识码而发送的查询请求和/或防伪验证请求;
    提供匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息和/或防伪验证结果给所述用户;其中所述第一标识码附着于所述产品;
    接收用户通过扫描第二标识码而发送的状态更新请求;其中,所述第二标识码与所述产品分离;
    将所述产品的物流状态设置为已销售或消费状态。
  14. 根据权利要求13所述的方法,其特征在于,所述方法还包括将所述第一标识码唯一匹配于特定产品,具体包括:
    将所述第一标识码与所述特定产品的基本信息唯一匹配;
    接收通过扫描所述第一标识码而设置的所述特定产品的物流状态信息,并将该物流状态信息与所述第一标识码匹配;
    将所述第一标识码与所述特定产品的真伪信息匹配。
  15. 根据权利要求13所述的方法,其特征在于,接收用户通过扫描所述第一标识码而发送的查询请求后,还包括:
    记录所述用户扫描所述第一标识码扫描的次数、时间、地点和用户信息,统称为第一标识码用户扫描信息,并将所述第一标识码用户扫描信息与所述第一标识码匹配。
  16. 根据权利要求13所述的方法,其特征在于,将所述产品的状态更新为售出的步骤,具体包括:
    若所述第二标识码为首次被扫描,且所述第二标识码是预先生成的,则将所述产品的物流状态设置为已销售或消费状态;
    若所述第二标识码为再次被扫描,则向实施该扫描的用户提供该第二标识码不可用的结果。
  17. 根据权利要求7或13所述的方法,其特征在于,所述双重标识码为:二维码、条形码、近场通信(NFC)码、非接触式射频识别(RFID) 码的任意组合。
  18. 一种如权利要求1所述产品的追溯防伪验证装置,其特征在于,包括:
    查询请求接收单元,用于接收用户通过扫描所述第一标识码而发送的查询请求;
    匹配信息提供单元,用于提供匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息给所述用户;
    防伪验证请求接收单元,用于接收用户通过扫描与所述产品分离的第二标识码而发送的防伪验证请求;
    判断单元,用于判断接收所述查询请求和防伪验证请求之间的时间间隔是否符合预设阈值;
    防伪验证结果提供单元,用于若是,则提供匹配所述第二标识码的产品的防伪验证结果给所述用户。
  19. 根据权利要求18所述的装置,其特征在于,所述装置还包括:双重标识码生成单元,用于预先生成匹配特定产品的所述双重标识码,双重标识码生成单元具体包括:
    第二标识码生成单元,用于按照标准方法分别生成第一标识码和第二标识码;
    第二标识码匹配单元,用于将第一标识码与第二标识码匹配,得到双重标识码;
    产品匹配单元,用于将所述双重标识码唯一匹配于特定产品。
  20. 根据权利要求18所述的装置,其特征在于,所述产品匹配单元被配置为:
    将所述第一标识码与所述特定产品的基本信息唯一匹配;
    接收通过扫描所述第一标识码而设置的所述特定产品的物流状态信息,并将该物流状态信息与所述第一标识码匹配。
    将所述第二标识码与所述特定产品的真伪信息匹配。
  21. 根据权利要求18所述的装置,其特征在于,所述装置还包括: 第一标识码用户扫描信息记录单元,用于在接收用户通过扫描所述第一标识码而发送的查询请求后,记录所述用户扫描所述第一标识码扫描的次数、时间、地点和用户信息,作为第一标识码用户扫描信息,并将所述第一标识码用户扫描信息与所述第一标识码匹配。
  22. 根据权利要求18所述的装置,其特征在于,所述装置还包括:第二标识码用户扫描信息记录单元,用于在接收用户通过扫描所述第二标识码而发送的防伪验证请求后,记录所述用户扫描所述第二标识码扫描的次数、时间、地点和用户信息,统称为第二标识码用户扫描信息,并将所述第二标识码用户扫描信息与所述产品匹配。
  23. 根据权利要求18所述的装置,其特征在于,所述防伪验证结果提供单元用于:
    若所述第二标识码为首次被扫描,且所述第二标识码是预先生成的与第一标识码对应的第二标识码,则向实施该扫描的用户提供该产品为正品的防伪验证结果,并将所述产品的物流状态设置为已销售或消费状态;
    若所述第二标识码为再次被扫描,且实施该扫描的用户未经过特殊授权,则向实施该扫描的用户提供该产品可疑的防伪验证结果;
    若所述第二标识码不是预先生成的与第一标识码对应的第二标识码,则向实施该扫描的用户提供该第二标识码非所述产品的厂家或指定授权经销商提供的防伪验证码、或该产品可疑的防伪验证结果。
  24. 一种如权利要求1所述产品的追溯防伪验证装置,其特征在于,包括:
    查询请求接收单元,用于接收用户通过扫描所述第一标识码而发送的查询请求;
    匹配信息提供单元,用于提供匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息给所述用户;
    防伪验证请求接收单元,用于接收用户通过扫描所述第一标识码而发送的防伪验证请求;
    防伪验证结果提供单元,用于提供匹配所述第一标识码的产品的防伪验证结果给所述用户;
    状态更新请求接收单元,用于接收用户通过扫描与所述产品分离的第二标识码而发送的状态更新请求;
    产品状态更新单元,用于将所述产品的物流状态设置为已销售或消费状态。
  25. 根据权利要求24所述的装置,其特征在于,所述装置还包括产品匹配单元,被配置为:
    将所述第一标识码与所述特定产品的基本信息唯一匹配;
    接收通过扫描所述第一标识码而设置的所述特定产品的物流状态信息,并将该物流状态信息与所述第一标识码匹配;
    将所述第一标识码与所述特定产品的真伪信息匹配。
  26. 根据权利要求24所述的装置,其特征在于,所述装置还包括:第一标识码用户扫描信息记录单元,用于在接收用户通过扫描所述第一标识码而发送的查询请求后,记录所述用户扫描所述第一标识码扫描的次数、时间、地点和用户信息,作为第一标识码用户扫描信息,并将所述第一标识码用户扫描信息与所述第一标识码匹配。
  27. 根据权利要求24所述的装置,其特征在于,所述产品状态更新单元用于:
    若所述第二标识码为首次被扫描,且所述第二标识码是预先生成的,则将所述产品的物流状态设置为已销售或消费状态;
    若所述第二标识码为再次被扫描,则向实施该扫描的用户提供该第二标识码不可用的结果。
  28. 根据权利要求18或24所述的装置,其特征在于,所述双重标识码为:二维码、条形码、近场通信(NFC)码、非接触式射频识别(RFID)码的任意组合。
  29. 一种如权利要求1所述产品的追溯防伪验证辅助方法,其特征在于,包括
    通过用户扫描获取产品上的第一标识码;
    生成并发送与所述第一标识码对应的查询请求;
    接收并显示响应于所述第一标识码查询请求的、匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息;
    通过用户扫描获取与所述产品分离的第二标识码;
    生成并发送与所述第二标识码对应的防伪验证请求;
    接收并显示响应于所述防伪验证请求的、匹配所述第二标识码的产品的防伪验证结果。
  30. 一种产品追溯防伪验证辅助方法,其特征在于,包括:
    通过用户扫描获取产品上的第一标识码;
    生成并发送与所述第一标识码对应的查询请求和/或防伪验证请求;
    接收并显示响应于所述查询请求的、匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息;
    接收并显示响应于所述防伪验证请求的、匹配所述第一标识码的产品的防伪验证结果;
    通过用户扫描获取与所述产品分离的第二标识码;
    生成并发送与所述第二标识码对应的状态更新请求;
    接收并响应于所述状态更新请求,将所述产品的物流状态更新为已销售或消费状态。
  31. 根据权利要求29或30所述的方法,其特征在于,所述方法在接收并显示响应于所述查询请求的、匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息后,还包括:
    提示所述用户在预设时间内扫描所述第二标识码。
  32. 根据权利要求31所述的方法,其特征在于,若所述防伪验证结果为真,则所述方法还包括:
    将所述产品添加到所述用户的已购列表中。
  33. 根据权利要求31所述的方法,其特征在于,将所述产品添加到所述用户的已购列表中的步骤之后还包括:
    显示用户已购列表;
    响应于用户的选择显示所述选择的产品的第一标识码用户扫描信息和第二标识码用户扫描信息;
    提供操作按钮,并响应于用户的退换或维修操作将对应产品的信息发送至厂商。
  34. 根据权利要求33所述的方法,其特征在于,响应于用户的退换或维修操作将对应可处理对应产品的门店及距离对应显示。
  35. 一种如权利要求1所述产品的追溯防伪验证辅助装置,其特征在于,包括
    第一标识码获取单元,用于通过用户扫描获取产品上的第一标识码;
    查询请求生成并发送单元,用于生成并发送与所述第一标识码对应的查询请求;
    产品信息接收并显示单元,用于接收并显示响应于所述查询请求的、匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息;
    第二标识码获取单元,用于通过用户扫描获取与所述产品分离的第二标识码;
    防伪验证请求生成并发送单元,用于生成并发送与所述第二标识码对应的防伪验证请求;
    防伪验证结果接收并显示单元,用于接收并显示响应于所述防伪验证请求的、匹配所述第二标识码的产品的防伪验证结果。
  36. 一种如权利要求1所述产品的追溯防伪验证辅助装置,其特征在于,包括:
    第一标识码获取单元,用于通过用户扫描获取产品上的第一标识码;
    查询请求生成并发送单元,用于生成并发送与所述第一标识码对应的查询请求;
    产品信息接收并显示单元,用于接收并显示响应于所述查询请求的、匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息;
    防伪验证请求生成并发送单元,用于生成并发送与所述第一标识码 对应的防伪验证请求;
    防伪验证结果接收并显示单元,用于接收并显示响应于所述防伪验证请求的、匹配所述第一标识码的产品的防伪验证结果;
    第二标识码获取单元,用于通过用户扫描获取与所述产品分离的第二标识码;
    状态更新请求生成并发送单元,用于生成并发送与所述第二标识码对应的状态更新请求;
    状态更新请求接收并设置单元,用于接收并响应于所述状态更新请求,将所述产品的物流状态更新为已销售或消费状态。
  37. 根据权利要求35所述的装置,其特征在于,所述装置还包括:提示单元,用于在接收并显示响应于所述查询请求的、匹配所述第一标识码的产品的基本信息、物流状态及用户扫描信息之后,提示所述用户在预设时间内扫描所述第二标识码。
  38. 根据权利要求35所述的装置,其特征在于,所述装置还包括已购并显示单元:
    将所述产品添加到所述用户的已购列表中并显示。
  39. 根据权利要求38所述的装置,其特征在于,所述装置还包括返修并显示单元还包括:
    显示用户已购列表;
    响应于用户的选择显示所述选择的产品的第一标识码用户扫描信息和第二标识码用户扫描信息;
    提供操作按钮,并响应于用户的退换或维修操作将对应产品的信息发送至厂商。
  40. 根据权利要求39所述的装置,其特征在于,所述返修并显示单元还用于响应于用户的退换或维修操作将对应可处理对应产品的门店及距离对应显示。
PCT/CN2019/076517 2018-03-07 2019-02-28 拥有双重标识码的产品及产品追溯防伪验证方法及装置 WO2019170030A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
SG11202008095YA SG11202008095YA (en) 2018-03-07 2019-02-28 Product having dual layer identification codes, product traceability and anti-counterfeit authentication method and apparatus
US16/976,477 US20210004840A1 (en) 2018-03-07 2019-02-28 Product having dual layer identification codes, product traceability and anti-counterfeit authentication method and apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810187665.6 2018-03-07
CN201810187665.6A CN108573384B (zh) 2018-03-07 2018-03-07 拥有双重标识码的产品及产品追溯防伪验证方法及装置

Publications (1)

Publication Number Publication Date
WO2019170030A1 true WO2019170030A1 (zh) 2019-09-12

Family

ID=63576760

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/076517 WO2019170030A1 (zh) 2018-03-07 2019-02-28 拥有双重标识码的产品及产品追溯防伪验证方法及装置

Country Status (4)

Country Link
US (1) US20210004840A1 (zh)
CN (1) CN108573384B (zh)
SG (1) SG11202008095YA (zh)
WO (1) WO2019170030A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111708955A (zh) * 2020-06-10 2020-09-25 武汉钢铁有限公司 一种基于二维码的钢铁产品防伪验证系统

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108573384B (zh) * 2018-03-07 2022-05-06 北京安讯奔科技有限责任公司 拥有双重标识码的产品及产品追溯防伪验证方法及装置
CN110070366A (zh) * 2019-03-11 2019-07-30 王娅雯 一种密码防伪标识物的验证方法
CN110033060B (zh) * 2019-03-25 2021-12-31 广东鑫兴科技有限公司 用于产品的溯源防伪方法、装置、存储介质及服务器
CN112801677A (zh) * 2021-02-06 2021-05-14 深圳市新时空智能系统有限公司 基于电子标签的防伪溯源方法
CN114095501B (zh) * 2021-11-18 2024-02-27 艾斯芸防伪科技(福建)有限公司 跨区域高可用防伪数据查询方法、系统、设备及介质
CN114943544B (zh) * 2022-05-19 2024-04-23 南京数睿数据科技有限公司 验证信息发送方法、装置、电子设备和计算机可读介质
CN114943546B (zh) * 2022-05-25 2024-04-09 南京数睿数据科技有限公司 物品防伪检测方法、装置、电子设备和计算机可读介质
CN115760150B (zh) * 2022-10-26 2023-07-14 北京路创蓝图科技有限责任公司 一种基于区块链的多源空间数据产业链溯源系统
CN115860037B (zh) * 2023-02-24 2023-06-06 中国(上海)宝玉石交易中心有限公司 宝玉石的防伪方法、防伪系统及防伪组件
CN116934360A (zh) * 2023-09-19 2023-10-24 北京鑫创数字科技股份有限公司 一种产品防伪方法、装置、存储介质及电子设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203134260U (zh) * 2013-02-04 2013-08-14 山东泰宝防伪技术产品有限公司 防伪物流一体化全息定位吊牌
CN204229753U (zh) * 2014-08-21 2015-03-25 石狮市创意纸塑制品有限公司 一种防伪二维码吊牌
CN105931059A (zh) * 2016-04-14 2016-09-07 北京安讯奔科技有限责任公司 带有双层防伪码的产品及产品溯源防伪验证方法及装置
CN106022802A (zh) * 2016-05-18 2016-10-12 北京安讯奔科技有限责任公司 一种赠送模式下的产品防伪验证方法和装置
CN108573384A (zh) * 2018-03-07 2018-09-25 北京安讯奔科技有限责任公司 拥有双重标识码的产品及产品追溯防伪验证方法及装置

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7401036B2 (en) * 2000-03-27 2008-07-15 Vande Pol Mark E Free-market environmental management system having insured certification to a process standard
CN101556599A (zh) * 2009-03-27 2009-10-14 珠海木木电子科技有限公司 二维码和密钥相耦合的物品防伪系统
CN101551810A (zh) * 2009-05-19 2009-10-07 唐明理 一种香烟防伪方法
TW201234294A (en) * 2011-07-22 2012-08-16 Yue Jie Technology Co Ltd Product counterfeit-proof system
US20140095398A1 (en) * 2012-10-02 2014-04-03 Robert Y. Lin Double ID Anti-Counterfeit Method and System
CN105046505A (zh) * 2015-07-08 2015-11-11 佛山市云查信息科技有限公司 一种产品防伪方法及其防伪系统
CN105184576A (zh) * 2015-07-17 2015-12-23 吕锦明 电子防伪系统及其电子防伪方法
CN105427117A (zh) * 2015-12-18 2016-03-23 沈阳圆梦科技有限公司 一种基于电子数据保全技术的农产品通用溯源防伪系统及方法
ES2794406T3 (es) * 2016-12-21 2020-11-18 Merck Patent Gmbh Marca de seguridad compuesta basada en puf para antifalsificación

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203134260U (zh) * 2013-02-04 2013-08-14 山东泰宝防伪技术产品有限公司 防伪物流一体化全息定位吊牌
CN204229753U (zh) * 2014-08-21 2015-03-25 石狮市创意纸塑制品有限公司 一种防伪二维码吊牌
CN105931059A (zh) * 2016-04-14 2016-09-07 北京安讯奔科技有限责任公司 带有双层防伪码的产品及产品溯源防伪验证方法及装置
CN106022802A (zh) * 2016-05-18 2016-10-12 北京安讯奔科技有限责任公司 一种赠送模式下的产品防伪验证方法和装置
CN108573384A (zh) * 2018-03-07 2018-09-25 北京安讯奔科技有限责任公司 拥有双重标识码的产品及产品追溯防伪验证方法及装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111708955A (zh) * 2020-06-10 2020-09-25 武汉钢铁有限公司 一种基于二维码的钢铁产品防伪验证系统

Also Published As

Publication number Publication date
US20210004840A1 (en) 2021-01-07
CN108573384B (zh) 2022-05-06
SG11202008095YA (en) 2020-09-29
CN108573384A (zh) 2018-09-25

Similar Documents

Publication Publication Date Title
WO2019170030A1 (zh) 拥有双重标识码的产品及产品追溯防伪验证方法及装置
US10032173B2 (en) Electronic anti-counterfeiting system and electronic anti-counterfeiting method thereof
US10210527B2 (en) Open registry for identity of things including social record feature
US10152720B2 (en) Authentication tags and systems for golf clubs
US20170206532A1 (en) System and method for streamlined registration and management of products over a communication network related thereto
CN114119039A (zh) 带有双层防伪码的产品及产品溯源防伪验证方法及装置
WO2021159097A1 (en) Authentication of products
US20160358158A1 (en) Open registry for identity of things including item location feature
US20150235235A1 (en) System for Authenticating Items
US8413885B2 (en) Internet community based counterfeit and grey market combating method
CN105894304B (zh) 一种产品防伪方法
US20140095398A1 (en) Double ID Anti-Counterfeit Method and System
JP2016512675A (ja) 安全な取引システム及び方法
CN108604261B (zh) 用于防止未经授权产品在在线站点上销售的方法和系统
CN104361503A (zh) 基于二维码的线下商品销量信息收集方法
WO2018068466A1 (zh) 一种查验商品真伪的方法和系统
KR101249828B1 (ko) 진품확인 서비스 시스템
JP2014048927A (ja) 正規品販売情報管理システム、正規品販売情報管理装置、正規品販売情報管理方法およびコンピュータプログラム
CN108985431B (zh) 一种防伪标签及其检测鉴定注册商标的商品真品的方法
JP2019095829A (ja) 情報システム及びサーバシステム
JP2009184754A (ja) 商品真偽判定システム、商品真偽判定プログラム及び記録媒体
TWM520693U (zh) 防偽管理系統
JP2001354310A (ja) 真正商品の識別方法とこれを実施した偽造商品流通防止システム
CN104835048A (zh) 一种销售行为合规性验证方法及实现所述方法的系统
WO2016058027A1 (en) Method and system for preventing sale and return of fraudulent goods and fraudulent return of goods

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19763870

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19763870

Country of ref document: EP

Kind code of ref document: A1