WO2023236369A1 - Commodity anti-counterfeiting and ownership confirmation method and apparatus, and storage medium - Google Patents

Commodity anti-counterfeiting and ownership confirmation method and apparatus, and storage medium Download PDF

Info

Publication number
WO2023236369A1
WO2023236369A1 PCT/CN2022/115669 CN2022115669W WO2023236369A1 WO 2023236369 A1 WO2023236369 A1 WO 2023236369A1 CN 2022115669 W CN2022115669 W CN 2022115669W WO 2023236369 A1 WO2023236369 A1 WO 2023236369A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
product
value
counterfeiting
rights
Prior art date
Application number
PCT/CN2022/115669
Other languages
French (fr)
Chinese (zh)
Inventor
王钦
Original Assignee
深圳市易初推因科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市易初推因科技有限公司 filed Critical 深圳市易初推因科技有限公司
Publication of WO2023236369A1 publication Critical patent/WO2023236369A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Definitions

  • the invention belongs to the technical field of commodity anti-counterfeiting and confirmation, and specifically relates to a method, device and storage medium for commodity anti-counterfeiting and confirmation.
  • the program confirms the owner.
  • the electronic product is newer or has been reset to factory settings, it will be more difficult to confirm the owner through the above method, and it needs to be unlocked and entered into the electronic product operation interface to implement it.
  • most products do not have a login ID or are not installed. It will also be difficult to confirm the procedure and confirm the owner.
  • the use of goods at different stages is generally unrecorded or difficult to record, resulting in information asymmetry between buyers and sellers when the ownership of goods is transferred, which increases transaction costs.
  • the invention provides a method, a device and a storage medium for anti-counterfeiting and confirming the rights of commodities, which solves the problems of easy counterfeiting and low safety in anti-counterfeiting stickers, plastic anti-counterfeiting buckles and other methods used in anti-counterfeiting of existing products, as well as the problem of product rights verification.
  • the user terminal is required to have the ID, password, product serial code and other troublesome rights confirmation issues to log in to the electronic product.
  • the present invention provides a method for anti-counterfeiting and confirming the rights of goods, including preparation of anti-counterfeiting codes and confirmation of rights;
  • the preparation of the anti-counterfeiting code includes the following steps:
  • the confirmation of rights includes the following steps:
  • the product information is subjected to a function operation to obtain the value A as an anti-counterfeiting method for the URL format information.
  • the function operation is performed again to obtain the value B, thereby confirming the successful binding operation, so that The product rights are confirmed, which solves the problems of easy counterfeiting and low security of anti-counterfeiting stickers, plastic anti-counterfeiting buckles and other methods used in anti-counterfeiting of existing products.
  • the user terminal needs to have the ID and password to log in to the electronic product. , product serial codes, etc., which is a troublesome issue in confirming ownership; in addition, by associating and storing the product information, value A, user-related information and value B to form product file information, the ownership of the product can be recorded for easy query.
  • it also includes, when the ownership of the commodity needs to be transferred, unbinding the value A and the relevant information of the user terminal through verification to obtain unbinding information, where the unbinding information includes unbinding verification information, the current timestamp and the product information, and then perform a function operation on the unbundling information to obtain the value C, and add the value C to the product file information; after unbundling, re-perform the step of confirming the rights. After unbundling, the rights and binding of the goods can be re-confirmed to facilitate the identification of ownership after the goods are traded again.
  • the method of unbinding the value A from the relevant information of the user terminal through verification includes:
  • the product usage information is also recorded.
  • the method of recording the product usage information is as follows. At different stages of product use, the usage information of the product is obtained, and the product usage information is mapped to the corresponding The product information and the user-related information of the current product are subjected to function operations to obtain the value Di, i represents the number of times the usage information of the product is obtained, and the value Di is stored in association.
  • the usage information of goods can be recorded.
  • the opacity of second-hand goods transactions can be reduced; it can also assist manufacturers or merchants to know the usage of goods, thereby providing corresponding after-sales policies.
  • step S203 after the value A is bound to the relevant information of the user terminal, a timestamp is added to the bound information, and then a function operation is performed to obtain the value B.
  • the user-related information includes the user's mobile phone number and/or WeChat ID information, and of course it can also be user-defined information.
  • the function operation is a hash algorithm.
  • the commodity ownership in response to the rights division operation of human-computer interaction, is divided into at least two parts, and each divided commodity ownership is bound or unbound.
  • the protocol information in response to the human-computer interaction protocol information upload operation, the protocol information is stored in the product file information; when the protocol information is different user information bound to each product, the different user information corresponds to Constraint agreements between different users on commodities.
  • the constraint agreement is consensus information on one or more of the time of possession of the commodities, the manner of possession of the commodities, the responsibility for the custody of the commodities, the obligation for the custody of the commodities and the liability for compensation.
  • the present invention provides a device for anti-counterfeiting and authenticating goods, including a memory, a processor and a transceiver connected in sequence, wherein the memory is used to store computer programs, the transceiver is used to send and receive messages, and the The processor is configured to read the computer program and execute the method for anti-counterfeiting and confirming the rights of commodities as described in the first aspect and any one of the possible designs of the first aspect.
  • the present invention provides a method for anti-counterfeiting and confirming the rights of goods.
  • the value A obtained by functional calculation of the product information is used as the anti-counterfeiting method of URL format information.
  • Traditional paper anti-counterfeiting stickers and plastic anti-counterfeiting buckles are mostly affixed to the goods or hung on them. Explicitly displayed on the product, this patent can be used to prevent counterfeiting through NFC technology.
  • the NFC chip can be placed inside the product without affecting the appearance of the product, and can be used for a long time and multiple times to achieve the purpose of anti-counterfeiting and confirmation of rights; in addition, through the user terminal, When verifying the product, the value B is obtained by performing the function operation again, thereby confirming the successful binding operation, so that the product is confirmed, and the existing products are easily counterfeited through anti-counterfeiting stickers, plastic anti-counterfeiting buckles, etc. , the problem of low security, and the user terminal needs to have the ID, password, product serial code, etc.
  • the present invention provides a method for anti-counterfeiting and confirming the ownership of goods.
  • disputes often arise because the real user terminal fails to confirm the rights to the goods or it is difficult to confirm the rights. or dispute; this method innovates a method of confirming rights.
  • the user terminal is required to have the ID, password, product serial code, etc. to log in to the product.
  • a confirmation program is installed in the smart watch to confirm the owner; when the smart watch is newer or has been reset to factory settings, it will be more difficult to confirm the owner through the above method, and it needs to be unlocked and entered into the smart watch operation interface to implement;
  • most products cannot be installed with a confirmation program, and there is no so-called login setting, making it difficult to confirm the owner; the present invention uses unique product information to communicate with the owner's mobile phone number, WeChat ID or customized Information and other bindings perform functional operations to generate function values, thereby realizing the confirmation of rights; by unbundling, the goods can be re-confirmed and bound to facilitate the identification of ownership after the goods are traded again;
  • the invention provides a method for anti-counterfeiting and confirming the rights of goods. On the basis of conveniently confirming the rights of goods by sending and receiving verification codes through mobile phone text messages or WeChat, it can also be confirmed through the owner's mobile phone text messages or WeChat verification codes. Unbind the owner's information from the product. After acquiring ownership of the product, the next owner can also conveniently bind his/her mobile phone number and other information to the product; this is equivalent to recording the operator and time of each transaction.
  • this patent facilitates the confirmation of commodity ownership and reduces transaction costs; by obtaining the usage information of the commodity, the usage information of the commodity can be recorded, and by recording the usage of the commodity, the opacity of second-hand commodity transactions can be reduced ; And assist manufacturers to understand the usage of products and provide corresponding after-sales policies;
  • the invention provides a method for anti-counterfeiting and confirming the rights of goods.
  • hash operation the mathematical properties of hash operation are used to confirm the product information, that is, it is unique, irreversible, and cannot be tampered with.
  • the manufacturer or merchant uses the mathematical properties of value A to endorse the product information. Because any information changes, the obtained A value will vary widely; the generation of A value will also increase the number of consumers. a sense of trust in the product;
  • the invention provides a method for anti-counterfeiting and confirming the rights of goods, which can divide the rights of goods, and different owners can agree on the possession time, manner, custody responsibilities and obligations, compensation liability, etc. of the goods.
  • the manufacturer or The merchant can assist in completing the records. Especially when the goods are not easy to separate, the value of the goods is high, or there are different investors or owners, using this patent will bring great convenience and lead to different transaction models; the information of different owners and the agreed rights and obligations are accurate and convenient , records cannot be tampered with, and has the effect of discounting the price in disguise, which can stimulate the sales of goods to a certain extent.
  • Figure 1 is a flow chart of a method for anti-counterfeiting and confirming the rights of goods provided in the first aspect of the present invention.
  • the method for anti-counterfeiting and confirming the rights of commodities provided by the first aspect of the present invention includes preparation of anti-counterfeiting codes and confirmation of rights;
  • the preparation of the anti-counterfeiting code includes the following steps:
  • product information includes one or more of manufacturer or merchant information, production time, product parameters, reserved information, product serial number, etc.
  • a locator is a concise representation of the location and access method of a resource available on the Internet. It is the address of a standard resource on the Internet. Every file on the Internet has a unique URL, which contains information indicating the location of the file and what the browser should do with it.
  • URL describes the address of a resource on the World Wide Web in the abstract form of a string; a URL uniquely identifies a Web resource, and the resource can be obtained through the corresponding URL; and writes the URL format information to the NFC chip or converts it In the form of a QR code;
  • the Chinese full name of NFC is near field communication technology.
  • the "near field” in the Chinese name refers to radio waves near the electromagnetic field. It is based on non-contact radio frequency identification (RFID) technology, combined with wireless interaction.
  • RFID radio frequency identification
  • the user uses the user terminal to read the URL format information in the NFC or scans the URL format information in the QR code through the user terminal, and then enters the product verification and rights confirmation interface through the relevant verification entrance information.
  • Confirmation of rights includes the following steps:
  • the value A can be used as verification information for entering the authorization interface, and therefore has an anti-counterfeiting function.
  • the method is implemented based on the cloud server. After the user enters the authorization interface through the user terminal, Submit the mobile phone number information, and the cloud server sends a verification code to the terminal of the mobile phone number.
  • the verification code is the first verification information.
  • the user confirms the authority by submitting the verification code. Therefore, the user's relevant information includes the user's mobile phone number. If the user uses WeChat authorization verification, the user's relevant information includes the mobile phone number information and the user's WeChat ID information.
  • the user-related information may include but is not limited to the user's mobile phone number and/or WeChat ID information. Other information that can be used to associate the user should also be within the scope of the present invention.
  • unbundling is also included.
  • the unbundling method is as follows:
  • the unbinding information includes the unbinding verification information, the current timestamp and the product information, and then The unbundling information is subjected to a function operation to obtain a value C, and the value C is added to the product file information; after unbundling, the step of confirming the rights can be re-carried out if necessary.
  • the method of unbinding the value A and the relevant information of the user terminal through verification includes:
  • the method of recording product usage information is as follows:
  • the opacity of second-hand goods transactions can be reduced.
  • the product is a car
  • the present invention is used in the car to use the car EDR (Event Data Recorder) to replace part of the function of the car's black box, that is, every time the car travels 10,000 kilometers or every 1,000 hours of use, the usage situation is compared with Vehicle information, such as frame number or engine number, is uploaded to the server for function operation to obtain the value D1, and later D2, D3, D4...
  • Vehicle information such as frame number or engine number
  • step S203 after binding the value A with the relevant information of the user terminal, a timestamp is added to the bound information, and then a function operation is performed to obtain the value B. .
  • the function operates a specific hash algorithm, and of course, the function operation can also be performed using an elliptic curve cryptographic algorithm, etc.;
  • the hash algorithm maps a binary value string of any length into a fixed-length binary value string.
  • the rule of this mapping is the hash algorithm.
  • the binary value string obtained after mapping the original data is the hash value (for convenience of display or expression, binary is generally converted to hexadecimal). It is a one-way cryptosystem with only encryption process and no decryption process.
  • the hash algorithm is a basic technology used for information storage and query. It is generally used for authentication, authentication, encryption, indexing, etc.
  • the hash algorithms most commonly used for encryption are MD5 (MD5Message-Digest Algorithm, MD5 message digest algorithm) and SHA (Secure Hash Algorithm, secure hash algorithm, which can be specifically subdivided into SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512).
  • MD5 MD5Message-Digest Algorithm
  • SHA Secure Hash Algorithm, secure hash algorithm, which can be specifically subdivided into SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512).
  • the characteristics of a hash algorithm 1. The original data cannot be deduced from the hash value in reverse, so the hash algorithm is also called a one-way hash algorithm; 2. It is very sensitive to the input data, and only one bit of the original data is modified. The obtained hash values are also very different; 3. The probability of hash collision is very small. For different original data, the probability of the same hash value is very
  • a certain product is manufactured by manufacturer F, the production time is 20210518, the serial number is GFGDM24HLX2Y, and the product parameter is Greek value: 411c4d248237e0c008a2f7a2efe611614e449458869b42b4876f24acc6ef13ee (hexadecimal, regarded as value A).
  • the product information is processed through SHA-256 to obtain the value A, the value is displayed to the outside world. Due to the irreversibility of the hash value, the outside world cannot know the product information. Add the value A together with the verification website of the product manufacturer.
  • hash calculation methods such as SHA-512 can also be used to achieve the above functions.
  • the commodity ownership in response to a rights division operation of human-computer interaction, is divided into at least two parts, and each divided commodity ownership is bound or unbound.
  • n values Rn are obtained by combining the hashing operation and encoding.
  • the value Rn can be bound to the same or different information, such as mobile phone number, WeChat ID, ID number or a value customized by the owner and then added with a timestamp for hash operation binding to obtain n unchangeable values Sn, and then Confirm the ownership of n shares and record them in files by the manufacturer or merchant.
  • Sn is verified, the ownership can also be unbound to obtain the value Cn, thereby preparing for the transfer of ownership.
  • the above calculated values are documented and verified by the manufacturer or merchant.
  • the protocol information in response to the human-computer interaction protocol information upload operation, is stored in the product file information; when the protocol information is different user information bound to each product, the different user information corresponds to A binding agreement for goods between different users.
  • the binding agreement is consensus information reached on one or more of the time of possession of the goods, the way of possession of the goods, the responsibility for the custody of the goods, the obligation for the custody of the goods and the liability for compensation.
  • the division and confirmation of commodity ownership described in the present invention includes ownership division, binding, and agreement on rights and obligations;
  • a product is produced by manufacturer M, the production time is T, the product serial number is 123, and the product parameters are X.
  • Rn can be bound to the same or different information, such as mobile phone number, WeChat ID, ID number or the value customized by the owner, plus a timestamp for hash operation binding to obtain 6 unchangeable values S1, S2, S3, S4, S5, S6, and then confirm the ownership of the 6 shares.
  • S1, S2, S3, S4, S5, S6 will be sent to the corresponding owner.
  • RN, SN, mobile phone number, WeChat ID, ID number or values customized by the owner are all recorded by the manufacturer to form a file.
  • the owner can confirm that he or she owns part or all of the corresponding goods after passing the verification of the S1, S2, S3, S4, S5, and S6 values and the bound mobile phone number, WeChat ID, ID number, or owner-defined value.
  • the ownership can also be unbound to obtain the value CN, thus preparing for the transfer of ownership.
  • the above calculated values can be verified through the verification URL, which is made into URL format, and the format information is written into the form of NFC chip or QR code, where the NFC chip or QR code can be fixed on the product.
  • all owners can even hash the time, manner, custody responsibilities and obligations of the goods when different owners have them to obtain the value Y.
  • the value Y can be written into the NFC chip or passed through two
  • the QR code is uploaded to the manufacturer's server or released externally through blockchain technology.
  • the owner can determine the number of divided parts of the goods through the NFC chip or QR code reserved by the manufacturer.
  • the specific number of divided parts of the goods can also be determined by Product owner confirmation. You can also pre-set the number of splits before purchasing. Records and archives of information in which the manufacturer or merchant assists in the division of ownership of goods.
  • the function operation limit described in this method is to convert the display form of the product-related information, owner information, binding information, and unbinding information, and associate the converted values as product file information for associated storage, as long as it is Functional operations that implement the above functions should be within the scope of protection of this method.
  • the value obtained by the function operation described in this method can also be recorded or released through blockchain technology, and the user can verify the obtained value through blockchain technology.
  • a device for anti-counterfeiting and authenticating goods includes a memory, a processor and a transceiver connected in sequence, wherein the memory is used to store computer programs, the transceiver is used to send and receive messages, and the processor is used to read Get the computer program and execute the method for anti-counterfeiting and confirming the rights of goods as described in the first aspect or any possible design of the first aspect.
  • the memory may include, but is not limited to, random access memory (Random-Access Memory, RAM), read-only memory (Read-Only Memory, ROM), flash memory (Flash Memory), first-in first-out memory (First Input First Output, FIFO) and/or First Input Last Output, FILO, etc.;
  • the processor may not be limited to X86, Internet series processors or other microprocessors;
  • the transceiver can be, but is not limited to, a wired transceiver, a Wireless Fidelity (WiFi) wireless transceiver, a Bluetooth wireless transceiver, a General Packet Radio Service (GPRS) wireless transceiver and/or a ZigBee protocol ( Low-power LAN protocol based on IEEE802.15.4 standard, ZigBee) wireless transceiver, etc.
  • the device for anti-counterfeiting and authenticating goods may also include, but is not limited to, a power module, a display screen and
  • the present invention provides a storage medium with instructions stored on the storage medium.
  • the invention executes the first aspect or any one of the possible designs in the first aspect.
  • the computer-readable storage medium refers to a carrier for storing data, which may, but is not limited to, include floppy disks, optical disks, hard disks, flash memory, USB flash drives and/or memory sticks, etc.
  • the computer may be a general-purpose computer, a special-purpose computer, etc. Computer, computer network, or other programmable device.

Landscapes

  • Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

A commodity anti-counterfeiting and ownership confirmation method and apparatus, and a storage medium. The method comprises: acquiring commodity information; performing function operation to obtain a value A; making the value A and verification entry information of the commodity into URL format information, and writing the URL format information into an NFC chip or converting same into a QR code form; performing owner identity verification and ownership confirmation on the commodity; binding the value A to user terminal related information, and performing function operation again to obtain a value B; and confirming that binding is successful. Every ownership confirmation and ownership cancellation are recorded, that is, an operator and time of each transaction are record, thereby facilitating performing record query, and greatly improving the transparency of transactions. An irreversible, unique and tamper-proof value is obtained by performing function operation, such as Hash operation; and by means of virtual-real linking from a software level to a physical NFC chip and then to a commodity, a new, secure, low-cost and easy-to-operate commodity anti-counterfeiting and ownership confirmation method is created.

Description

一种对商品防伪确权的方法、装置及存储介质A method, device and storage medium for preventing counterfeiting of goods 技术领域Technical field
本发明属于商品防伪确权技术领域,具体涉及一种对商品防伪确权的方法、装置及存储介质。The invention belongs to the technical field of commodity anti-counterfeiting and confirmation, and specifically relates to a method, device and storage medium for commodity anti-counterfeiting and confirmation.
背景技术Background technique
传统纸质防伪帖、塑料防伪扣多为贴在商品或挂在商品上显性展示,影响外观。另外,传统纸质防伪帖、塑料防伪扣多为一次性使用、易仿造、安全性低。当不同人对商品所有权有争议或需要对商品所有权认定时,往往由于真正用户终端没有对商品确权或难以确权,导致产生争议或纠纷。传统方式,比如某电子产品(智能手表等)所有权发生争议时或需要产品厂商协助找回时,需要用户终端拥有登录电子产品的ID、密码、产品序列码等,或者电子产品内安装的确权程序确认所有者。当电子产品较新或被重置出厂设置的电子产品,通过上述方式确认所有者会有较大难度,且需要解锁进入电子产品操作界面才能实施,另外,大部分商品没有设置登录ID或没有安装确认程序,确认所有者亦会有较大难度。另外,商品的不同阶段使用情况一般会因为没有记录或难于记录造成商品所有权转移时造成买卖双方信息不对称,提高了交易成本。Traditional paper anti-counterfeiting stickers and plastic anti-counterfeiting buckles are mostly affixed to or hung on goods for explicit display, affecting their appearance. In addition, traditional paper anti-counterfeiting stickers and plastic anti-counterfeiting buckles are mostly single-use, easy to counterfeit, and have low safety. When different people have disputes over the ownership of goods or need to confirm the ownership of goods, disputes or disputes often arise because the real user terminal fails to confirm the rights to the goods or it is difficult to confirm the rights. Traditional methods, such as when there is a dispute over the ownership of an electronic product (smart watch, etc.) or when the product manufacturer needs to assist in retrieval, the user terminal is required to have the ID, password, product serial code, etc. to log in to the electronic product, or to confirm the installation rights in the electronic product. The program confirms the owner. When the electronic product is newer or has been reset to factory settings, it will be more difficult to confirm the owner through the above method, and it needs to be unlocked and entered into the electronic product operation interface to implement it. In addition, most products do not have a login ID or are not installed. It will also be difficult to confirm the procedure and confirm the owner. In addition, the use of goods at different stages is generally unrecorded or difficult to record, resulting in information asymmetry between buyers and sellers when the ownership of goods is transferred, which increases transaction costs.
另一方面,商品所有权如有需要对不同所有权人进行确认的时候,往往需要繁琐的操作,如商品房新增或减少所有权人,需要去不动产产权登记中心进行复杂的登记或公告。绝大部分的商品甚至都没有对不同所有权人确认的过程,比如高价值的箱包、手表、珠宝等。On the other hand, when commodity ownership needs to be confirmed by different owners, cumbersome operations are often required. For example, if a commercial house adds or reduces an owner, it is necessary to go to the real estate property rights registration center for complex registration or announcement. Most of the goods do not even have the process of confirming different ownerships, such as high-value bags, watches, jewelry, etc.
发明内容Contents of the invention
本发明提供一种对商品防伪确权的方法、装置及存储介质,解决现有产品在进行防伪时使用的防伪贴、塑料防伪扣等方式存在易仿造、安全性低的问题以及产品在确权时需要用户终端拥有登录电子产品的ID、密码、产品序列码等确权麻烦的问题。The invention provides a method, a device and a storage medium for anti-counterfeiting and confirming the rights of commodities, which solves the problems of easy counterfeiting and low safety in anti-counterfeiting stickers, plastic anti-counterfeiting buckles and other methods used in anti-counterfeiting of existing products, as well as the problem of product rights verification. The user terminal is required to have the ID, password, product serial code and other troublesome rights confirmation issues to log in to the electronic product.
为了实现上述目的,本发明采用以下技术方案:In order to achieve the above objects, the present invention adopts the following technical solutions:
在第一方面,本发明提供一种对商品防伪确权的方法,包括防伪码制备和确权;In a first aspect, the present invention provides a method for anti-counterfeiting and confirming the rights of goods, including preparation of anti-counterfeiting codes and confirmation of rights;
所述防伪码制备包括以下步骤,The preparation of the anti-counterfeiting code includes the following steps:
S101、获取商品信息;S101. Obtain product information;
S102、将所述商品信息经过函数运算得到值A;S102. Perform function operation on the product information to obtain value A;
S103、将所述值A作为防伪码连同所述商品的相关验证入口信息制作成URL格式信息;并将所述URL格式信息写入NFC芯片中和/或转换为二维码;S103. Use the value A as an anti-counterfeiting code together with the relevant verification entry information of the product to produce URL format information; write the URL format information into the NFC chip and/or convert it into a QR code;
所述确权包括以下步骤,The confirmation of rights includes the following steps:
S201、接收用户终端发送的验证请求信息,向用户终端发送第一验证信息;S201. Receive the verification request information sent by the user terminal, and send the first verification information to the user terminal;
S202、接收用户终端返回的第一验证信息,根据第一验证信息,进行用户身份核验和确权;S202. Receive the first verification information returned by the user terminal, and perform user identity verification and rights confirmation based on the first verification information;
S203、将所述值A与用户相关信息进行绑定,并将绑定信息进行函数运算得到值B;S203. Bind the value A with the user-related information, and perform a function operation on the binding information to obtain the value B;
S204、将所述商品信息、值A、用户相关信息和值B进行关联存储,形成商品档案信息。S204. Associate and store the product information, value A, user-related information and value B to form product file information.
根据上述技术,将商品信息经过函数运算得到值A作为URL格式信息的防伪方式,另外,通过用户终端在验证其商品时,通过再次进行函数运算得到值B,从而确认绑定成功的操作,使得商品得到确权,实现解决现有产品在进行防伪时使用的防伪贴、塑料防伪扣等方式存在易仿造、安全性低的问题以及产品在确权时需要用户终端拥有登录电子产品的ID、密码、产品序列码等,确权麻烦的问题;另外,通过将所述商品信息、值A、用户相关信息和值B进行关联存储,形成商品档案信息,可以记录商品的权属,以便查询。According to the above technology, the product information is subjected to a function operation to obtain the value A as an anti-counterfeiting method for the URL format information. In addition, when the user terminal verifies the product, the function operation is performed again to obtain the value B, thereby confirming the successful binding operation, so that The product rights are confirmed, which solves the problems of easy counterfeiting and low security of anti-counterfeiting stickers, plastic anti-counterfeiting buckles and other methods used in anti-counterfeiting of existing products. When confirming the product rights, the user terminal needs to have the ID and password to log in to the electronic product. , product serial codes, etc., which is a troublesome issue in confirming ownership; in addition, by associating and storing the product information, value A, user-related information and value B to form product file information, the ownership of the product can be recorded for easy query.
在一种可能的设计中,还包括,当商品所有权需要发生转移时,将所述值A与用户终端的相关信息通过验证解除绑定,获取解绑信息,所述解绑信息包括解绑核验信息、当前时间戳和商品信息,然后将所述解绑信息进行函数运算得到值C,并将值C加入商品档案信息中;解绑后,重新进行所述确权的步骤。通过解绑后可以对商品进行重新确权绑定,方便商品再次交易后的权属认定。In one possible design, it also includes, when the ownership of the commodity needs to be transferred, unbinding the value A and the relevant information of the user terminal through verification to obtain unbinding information, where the unbinding information includes unbinding verification information, the current timestamp and the product information, and then perform a function operation on the unbundling information to obtain the value C, and add the value C to the product file information; after unbundling, re-perform the step of confirming the rights. After unbundling, the rights and binding of the goods can be re-confirmed to facilitate the identification of ownership after the goods are traded again.
在一种可能的设计中,将所述值A与用户终端的相关信息通过验证解除绑定的方法包括,In one possible design, the method of unbinding the value A from the relevant information of the user terminal through verification includes:
接收用户终端解除绑定的请求信息,然后向用户发送第二验证信息;Receive the request information for unbinding from the user terminal, and then send the second verification information to the user;
接收用户终端返回的第二验证信息,并对第二验证信息进行核验,审核通过后,将商品对应的值A与用户终端的相关信息进行解除绑定。Receive the second verification information returned by the user terminal, verify the second verification information, and after passing the verification, unbind the value A corresponding to the product from the relevant information of the user terminal.
在一种可能的设计中,在确权之后还进行记录商品使用信息操作,记录商品使用信息的方法如下,在商品使用的不同阶段,获取商品的使用情况信息,并将商品使用情况信息、对应的商品信息以及当前商品的用户相关信息进行函数运算得到值Di,i代表获取商品的使用情况信息次数,并将所述值Di进行关联存储。通过上述技术,可以记录商品的使用情况信息,通过记录商品使用情况,可以减少了二手商品交易的不透明性;以及协助生产商或商家知晓商品使用情况,从而提供对应的售后政策。In one possible design, after the rights are confirmed, the product usage information is also recorded. The method of recording the product usage information is as follows. At different stages of product use, the usage information of the product is obtained, and the product usage information is mapped to the corresponding The product information and the user-related information of the current product are subjected to function operations to obtain the value Di, i represents the number of times the usage information of the product is obtained, and the value Di is stored in association. Through the above technology, the usage information of goods can be recorded. By recording the usage of goods, the opacity of second-hand goods transactions can be reduced; it can also assist manufacturers or merchants to know the usage of goods, thereby providing corresponding after-sales policies.
在一种可能的设计中,在步骤S203中,将所述值A与用户终端的相关信息进行绑定后,还将绑定后的信息加上时间戳,然后再进行函数运算得到值B。In one possible design, in step S203, after the value A is bound to the relevant information of the user terminal, a timestamp is added to the bound information, and then a function operation is performed to obtain the value B.
在一种可能的设计中,所述用户的相关信息包括用户的手机号和/或微信号信息,当然也可以是用户自定义的信息。In one possible design, the user-related information includes the user's mobile phone number and/or WeChat ID information, and of course it can also be user-defined information.
在一种可能的设计中,所述函数运算是哈希算法算法。In one possible design, the function operation is a hash algorithm.
在一种可能的设计中,响应于人机交互的权利划分操作,将商品所有权分割成至少两份,并对分割后的每份商品所有权进行绑定或解绑。In one possible design, in response to the rights division operation of human-computer interaction, the commodity ownership is divided into at least two parts, and each divided commodity ownership is bound or unbound.
在一种可能的设计中,响应于人机交互的协议信息上传操作,将协议信息存储至商品档案信息中;所述协议信息是每份商品绑定的不同用户信息时,不同用户信息对应的不同用户间针对商品进行的约束协议,所述约束协议是针对商品占有时间、商品占有方式、商品保管责任、商品保管义务和赔偿责任中的一项或多项所达成的共识信息。In one possible design, in response to the human-computer interaction protocol information upload operation, the protocol information is stored in the product file information; when the protocol information is different user information bound to each product, the different user information corresponds to Constraint agreements between different users on commodities. The constraint agreement is consensus information on one or more of the time of possession of the commodities, the manner of possession of the commodities, the responsibility for the custody of the commodities, the obligation for the custody of the commodities and the liability for compensation.
在第二方面,本发明提供了对商品防伪确权的装置,包括依次相连的存储器、处理器和收发器,其中,所述存储器用于存储计算机程序,所述收发器用于收发消息,所述处理器用于读取所述计算机程序,执行如第一方面以及第一方面中任意一项可能的设计中所述对商品防伪确权的方法。In a second aspect, the present invention provides a device for anti-counterfeiting and authenticating goods, including a memory, a processor and a transceiver connected in sequence, wherein the memory is used to store computer programs, the transceiver is used to send and receive messages, and the The processor is configured to read the computer program and execute the method for anti-counterfeiting and confirming the rights of commodities as described in the first aspect and any one of the possible designs of the first aspect.
有益效果:Beneficial effects:
1、本发明提供的一种对商品防伪确权的方法,将商品信息经过函数运算得到值A作为URL 格式信息的防伪方式,传统纸质防伪帖、塑料防伪扣多为贴在商品或挂在商品上显性展示,本专利可以通过NFC技术防伪,可将NFC芯片至于商品内部,不影响商品外观,又能长时间、多次使用,达到防伪、确权的目的;另外,通过用户终端在验证其商品时,通过再次进行函数运算得到值B,从而确认绑定成功的操作,使得商品得到确权,实现解决现有产品在进行防伪时使用的防伪贴、塑料防伪扣等方式存在易仿造、安全性低的问题以及产品在确权时需要用户终端拥有登录电子产品的ID、密码、产品序列码等,确权麻烦的问题;另外,通过将所述商品信息、值A、用户相关信息和值B进行关联存储,形成商品档案信息,可以记录商品的权属,以便查询;1. The present invention provides a method for anti-counterfeiting and confirming the rights of goods. The value A obtained by functional calculation of the product information is used as the anti-counterfeiting method of URL format information. Traditional paper anti-counterfeiting stickers and plastic anti-counterfeiting buckles are mostly affixed to the goods or hung on them. Explicitly displayed on the product, this patent can be used to prevent counterfeiting through NFC technology. The NFC chip can be placed inside the product without affecting the appearance of the product, and can be used for a long time and multiple times to achieve the purpose of anti-counterfeiting and confirmation of rights; in addition, through the user terminal, When verifying the product, the value B is obtained by performing the function operation again, thereby confirming the successful binding operation, so that the product is confirmed, and the existing products are easily counterfeited through anti-counterfeiting stickers, plastic anti-counterfeiting buckles, etc. , the problem of low security, and the user terminal needs to have the ID, password, product serial code, etc. to log in to the electronic product when confirming the rights of the product, and the troublesome problem of confirming rights; in addition, by combining the product information, value A, and user-related information It is stored in association with value B to form product file information, which can record the ownership of the product for easy query;
2、本发明提供的一种对商品防伪确权的方法,当不同人对商品所有权有争议或需要对商品所有权认定时,往往由于真正用户终端没有对商品确权或难以确权,导致产生争议或纠纷;本方法创新了一种确权方式,相较传统方式,比如某智能手表所有权发送争议时或需要商品厂商协助找回时,需要用户终端拥有登录产品的ID、密码、产品序列码等,或者智能手表内安装的确权程序确认所有者;当智能手表较新或被重置出厂设置后,通过上述方式确认所有者会有较大难度,且需要解锁进入智能手表操作界面才能实施;另外,大多数的商品无法安装确权程序,也没有所谓的登录设置,确认所有者亦会有较大难度;本发明通过唯一的商品信息等与所有者的手机号、微信号或自定义的信息等绑定进行函数运算产生函数值,从而实现确权;通过解绑后可以对商品进行重新确权绑定,方便商品再次交易后的权属认定;2. The present invention provides a method for anti-counterfeiting and confirming the ownership of goods. When different people dispute the ownership of the goods or need to confirm the ownership of the goods, disputes often arise because the real user terminal fails to confirm the rights to the goods or it is difficult to confirm the rights. or dispute; this method innovates a method of confirming rights. Compared with the traditional method, for example, when the ownership of a smart watch is disputed or the product manufacturer needs to assist in retrieval, the user terminal is required to have the ID, password, product serial code, etc. to log in to the product. , or a confirmation program is installed in the smart watch to confirm the owner; when the smart watch is newer or has been reset to factory settings, it will be more difficult to confirm the owner through the above method, and it needs to be unlocked and entered into the smart watch operation interface to implement; In addition, most products cannot be installed with a confirmation program, and there is no so-called login setting, making it difficult to confirm the owner; the present invention uses unique product information to communicate with the owner's mobile phone number, WeChat ID or customized Information and other bindings perform functional operations to generate function values, thereby realizing the confirmation of rights; by unbundling, the goods can be re-confirmed and bound to facilitate the identification of ownership after the goods are traded again;
3、本发明提供的一种对商品防伪确权的方法,在通过手机短信或微信收发验证码等实现便利地对商品确权的基础上,亦能通过所有者的手机短信或微信验证码确认解除所有者信息与商品的绑定,在需要该商品所有权后,下一位所有者亦能将自身手机号等信息与商品便利的绑定;相当于记载了每一次的交易的操作者、时间,该记录不可篡改、查询方便,从而避免伪造交易记录,提高交易的透明度,避免因信息不对称,在传统交易场景下的尔虞我诈;而实现上述场景,确保交易的顺利进行,增加的成本极低、操作极为便利;本专利方便了商品所有权的确认,降低了交易成本;通过获取商品的使用情况信息,可以记录商品的使用情况信息,通过记录商品使用情况,可以减少了二手商品交易的不透明性;以及协助生产商知晓商品使用情况,从而提供对应的售后政策;3. The invention provides a method for anti-counterfeiting and confirming the rights of goods. On the basis of conveniently confirming the rights of goods by sending and receiving verification codes through mobile phone text messages or WeChat, it can also be confirmed through the owner's mobile phone text messages or WeChat verification codes. Unbind the owner's information from the product. After acquiring ownership of the product, the next owner can also conveniently bind his/her mobile phone number and other information to the product; this is equivalent to recording the operator and time of each transaction. , the record cannot be tampered with and is easy to query, thereby avoiding forgery of transaction records, improving the transparency of transactions, and avoiding intrigues in traditional transaction scenarios due to information asymmetry; and realizing the above scenarios ensures the smooth progress of transactions with extremely low added costs , the operation is extremely convenient; this patent facilitates the confirmation of commodity ownership and reduces transaction costs; by obtaining the usage information of the commodity, the usage information of the commodity can be recorded, and by recording the usage of the commodity, the opacity of second-hand commodity transactions can be reduced ; And assist manufacturers to understand the usage of products and provide corresponding after-sales policies;
4、本发明提供的一种对商品防伪确权的方法,通过采用哈希运算,利用哈希运算的数学特性,即唯一、不可逆、不可篡改对商品信息进行了确认,同时A值一旦确立并和商品一同对外发布,意味着生产商或商家利用值A的数学特性背书,对商品信息的一种承诺,因为任何信息的改动,得到的A值将千差万别;A值的产生也将增加消费者对产品的信任感;4. The invention provides a method for anti-counterfeiting and confirming the rights of goods. By using hash operation, the mathematical properties of hash operation are used to confirm the product information, that is, it is unique, irreversible, and cannot be tampered with. At the same time, once the A value is established and Releasing it together with the product means that the manufacturer or merchant uses the mathematical properties of value A to endorse the product information. Because any information changes, the obtained A value will vary widely; the generation of A value will also increase the number of consumers. a sense of trust in the product;
5、本发明提供的一种对商品防伪确权的方法,可以对商品权利进行划分,并且不同所有权人可以约定商品的占有时间、方式、保管责任和义务、赔偿责任等进行约定,生产商或商家可协助完成记录。尤其在商品不易分割,商品价值又较高或存在不同出资人、所有权人时,运用本专利,将带来极大的便利及衍生不同的交易模式;不同所有权人信息及约定权利义务准确、便利、不可篡改地记录,变相的起到了售价打折的效果,在一定程度能刺激商品的销售。5. The invention provides a method for anti-counterfeiting and confirming the rights of goods, which can divide the rights of goods, and different owners can agree on the possession time, manner, custody responsibilities and obligations, compensation liability, etc. of the goods. The manufacturer or The merchant can assist in completing the records. Especially when the goods are not easy to separate, the value of the goods is high, or there are different investors or owners, using this patent will bring great convenience and lead to different transaction models; the information of different owners and the agreed rights and obligations are accurate and convenient , records cannot be tampered with, and has the effect of discounting the price in disguise, which can stimulate the sales of goods to a certain extent.
附图说明Description of drawings
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍。In order to more clearly explain the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to describe the embodiments or the prior art will be briefly introduced below.
图1为本发明第一方面中提供的一种对商品防伪确权的方法流程图。Figure 1 is a flow chart of a method for anti-counterfeiting and confirming the rights of goods provided in the first aspect of the present invention.
具体实施方式Detailed ways
下面结合附图及具体实施例来对本发明作进一步阐述。在此需要说明的是,对于这些实施例方式的说明虽然是用于帮助理解本发明,但并不构成对本发明的限定。应当理解,尽管本文可能使用术语第一、第二等等来描述各种单元,但是这些单元不应当受到这些术语的限制。这些术语仅用于区分一个单元和另一个单元。例如可以将第一单元称作第二单元,并且类似地可以将第二单元称作第一单元,同时不脱离本发明的示例实施例的范围。The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments. It should be noted here that although the description of these embodiments is used to help understand the present invention, it does not constitute a limitation of the present invention. It should be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one unit from another. For example, a first unit may be referred to as a second unit, and similarly a second unit may be referred to as a first unit, without departing from the scope of example embodiments of the invention.
如图1所示,本发明第一方面提供的所述对商品防伪确权的方法,包括防伪码制备和确权;As shown in Figure 1, the method for anti-counterfeiting and confirming the rights of commodities provided by the first aspect of the present invention includes preparation of anti-counterfeiting codes and confirmation of rights;
所述防伪码制备包括以下步骤,The preparation of the anti-counterfeiting code includes the following steps:
S101、获取商品信息;具体的,商品信息包括生产商或商家信息、生产时间、商品参数、预留信息、商品序列号等中的一项或多项。S101. Obtain product information; specifically, product information includes one or more of manufacturer or merchant information, production time, product parameters, reserved information, product serial number, etc.
S102、将所述商品信息经过函数运算得到值A;具体实施时,经函数运算得到的值具有不 可逆性、唯一性、不可篡改的特征,后文将举例说明;S102. Perform function operation on the product information to obtain value A; during specific implementation, the value obtained through function operation has the characteristics of irreversibility, uniqueness, and non-tampering, which will be explained with examples below;
S103、将所述值A作为防伪码连同所述商品的相关验证入口信息制作成URL格式信息;并将所述URL格式信息写入NFC芯片中和/或转换为二维码;URL是统一资源定位符,对可以从互联网上得到的资源的位置和访问方法的一种简洁的表示,是互联网上标准资源的地址。互联网上的每个文件都有一个唯一的URL,它包含的信息指出文件的位置以及浏览器应该怎么处理它。URL以字符串的抽象形式来描述一个资源在万维网上的地址;一个URL唯一标识一个Web资源,通过与之对应的URL即可获得该资源;并将所述URL格式信息写入NFC芯片或转换成二维码形式;NFC的中文全称为近场通信技术,中文名称中的“近场”是指临近电磁场的无线电波,是在非接触式射频识别(RFID)技术的基础上,结合无线互连技术研发而成,是一种被众多业态采用的安全快捷的通信方式;NFC技术具有极高的安全性,在短距离通信中具有性能优势,且成本较低。S103. Use the value A as an anti-counterfeiting code together with the relevant verification entry information of the product to produce URL format information; write the URL format information into the NFC chip and/or convert it into a QR code; the URL is a unified resource A locator is a concise representation of the location and access method of a resource available on the Internet. It is the address of a standard resource on the Internet. Every file on the Internet has a unique URL, which contains information indicating the location of the file and what the browser should do with it. URL describes the address of a resource on the World Wide Web in the abstract form of a string; a URL uniquely identifies a Web resource, and the resource can be obtained through the corresponding URL; and writes the URL format information to the NFC chip or converts it In the form of a QR code; the Chinese full name of NFC is near field communication technology. The "near field" in the Chinese name refers to radio waves near the electromagnetic field. It is based on non-contact radio frequency identification (RFID) technology, combined with wireless interaction. Developed by NFC technology, it is a safe and fast communication method used by many businesses; NFC technology has extremely high security, performance advantages in short-distance communication, and low cost.
所述确权时,用户通过使用用户终端读取NFC中的URL格式信息或通过用户终端扫描所述二维码中的URL格式信息,再通过相关验证入口信息进入到商品验证以及确权界面,确权包括以下步骤,When confirming the rights, the user uses the user terminal to read the URL format information in the NFC or scans the URL format information in the QR code through the user terminal, and then enters the product verification and rights confirmation interface through the relevant verification entrance information. Confirmation of rights includes the following steps:
S201、接收用户终端发送的验证请求信息,向用户终端发送第一验证信息;S201. Receive the verification request information sent by the user terminal, and send the first verification information to the user terminal;
S202、接收用户终端返回的第一验证信息,根据第一验证信息,进行用户身份核验和确权;S202. Receive the first verification information returned by the user terminal, and perform user identity verification and rights confirmation based on the first verification information;
S203、将所述值A与用户相关信息进行绑定,并将绑定信息进行函数运算得到值B;S203. Bind the value A with the user-related information, and perform a function operation on the binding information to obtain the value B;
S204、将所述商品信息、值A、用户相关信息和值B进行关联存储,形成商品档案信息。S204. Associate and store the product information, value A, user-related information and value B to form product file information.
因为URL格式信息带有值A,因此值A可以作为进入确权界面的验证信息,因此具有防伪功能,具体实施时,所述方法基于云服务器实现,用户通过用户终端进入确权界面后,通过提交手机号信息,云服务器给所述手机号的终端发送验证码,该验证码即为所述的第一验证信息,用户通过提交所述验证码进行确权。由此用户的相关信息包括用户的手机号,如用户使用微信授权验证,则用户相关信息中有手机号信息以及用户的微信号信息。具体的,所述用户的相关信息可以包括但不限定是用户的手机号和/或微信号信息,其他能够用于关联用户的信息也应在本发明的保护范围内。Because the URL format information carries the value A, the value A can be used as verification information for entering the authorization interface, and therefore has an anti-counterfeiting function. During specific implementation, the method is implemented based on the cloud server. After the user enters the authorization interface through the user terminal, Submit the mobile phone number information, and the cloud server sends a verification code to the terminal of the mobile phone number. The verification code is the first verification information. The user confirms the authority by submitting the verification code. Therefore, the user's relevant information includes the user's mobile phone number. If the user uses WeChat authorization verification, the user's relevant information includes the mobile phone number information and the user's WeChat ID information. Specifically, the user-related information may include but is not limited to the user's mobile phone number and/or WeChat ID information. Other information that can be used to associate the user should also be within the scope of the present invention.
在一种可能的实施方式中,在确权后,还包括解绑,所述解绑的方法如下,In a possible implementation, after the rights are confirmed, unbundling is also included. The unbundling method is as follows:
当商品所有权需要发生转移时,将所述值A与用户终端的相关信息通过验证解除绑定,获取解绑信息,所述解绑信息包括解绑核验信息、当前时间戳和商品信息,然后将所述解绑信息进行函数运算得到值C,并将值C加入商品档案信息中;解绑后,如有需要可重新进行所述确权的步骤。When the ownership of the product needs to be transferred, unbind the value A and the relevant information of the user terminal through verification to obtain the unbinding information. The unbinding information includes the unbinding verification information, the current timestamp and the product information, and then The unbundling information is subjected to a function operation to obtain a value C, and the value C is added to the product file information; after unbundling, the step of confirming the rights can be re-carried out if necessary.
具体实施时,将所述值A与用户终端的相关信息通过验证解除绑定的方法包括,During specific implementation, the method of unbinding the value A and the relevant information of the user terminal through verification includes:
接收用户终端解除绑定的请求信息,然后向用户发送第二验证信息;Receive the request information for unbinding from the user terminal, and then send the second verification information to the user;
接收用户终端返回的第二验证信息,并对第二验证信息进行核验,审核通过后,将商品对应的值A与用户终端的相关信息进行解除绑定。Receive the second verification information returned by the user terminal, verify the second verification information, and after passing the verification, unbind the value A corresponding to the product from the relevant information of the user terminal.
在一种可能的实施方式中,确权之后还包括记录商品使用信息,记录商品使用信息的方法如下,In a possible implementation, after confirming the rights, it also includes recording product usage information. The method of recording product usage information is as follows:
在商品使用的不同阶段,获取商品的使用情况信息,并将商品使用情况信息、对应的商品信息以及当前商品的用户相关信息进行函数运算得到值Di,i代表获取商品的使用情况信息次数,并将所述值Di进行关联存储。At different stages of product use, obtain the usage information of the product, and perform function operations on the product usage information, corresponding product information, and user-related information of the current product to obtain the value Di, i represents the number of times the usage information of the product is obtained, and The value Di is stored in association.
具体的,通过记录商品使用情况,可以减少了二手商品交易的不透明性。例如,所述商品是汽车,本发明用于汽车上用于汽车EDR(Event Data Recorder)相当于汽车的黑匣子的部分功能替代,即汽车每行驶10000公里或每使用1000小时,将该使用情况与车辆信息,例如车架号或发动机号上传服务器进行函数运算得到值D1,以及以后的D2、D3、D4……。由此可有效防止二手车交易过程中的调表行为,以及EDR数据读取难度大而造成的交易双方对车辆使用情况的不确定。Specifically, by recording the use of goods, the opacity of second-hand goods transactions can be reduced. For example, the product is a car, and the present invention is used in the car to use the car EDR (Event Data Recorder) to replace part of the function of the car's black box, that is, every time the car travels 10,000 kilometers or every 1,000 hours of use, the usage situation is compared with Vehicle information, such as frame number or engine number, is uploaded to the server for function operation to obtain the value D1, and later D2, D3, D4... This can effectively prevent meter adjustments during second-hand car transactions, as well as the difficulty in reading EDR data, which causes uncertainty between the parties to the transaction about vehicle usage.
在一种可能的实施方式中,在步骤S203中,将所述值A与用户终端的相关信息进行绑定后,还将绑定后的信息加上时间戳,然后再进行函数运算得到值B。In a possible implementation, in step S203, after binding the value A with the relevant information of the user terminal, a timestamp is added to the bound information, and then a function operation is performed to obtain the value B. .
在一种可能的实施方式中,函数运算具体哈希算法,当然也可以采用如椭圆曲线密码算法等进行函数运算;In a possible implementation, the function operates a specific hash algorithm, and of course, the function operation can also be performed using an elliptic curve cryptographic algorithm, etc.;
采用哈希算法作为具体示例,所述哈希算法(表达式:Addr=H(key)),是将任意长度的二进制值串映射为固定长度的二进制值串,这个映射的规则就是哈希算法,而通过原始数据映射之后得到的二进制值串就是哈希值(为方便展示或表达,一般将二进制转为十六进制)。它是一种单向密码体制,只有加密过程,没有解密过程、哈希算法是信息存储和查询所用的一项基本技术,一般用于鉴权、认证、加密、索引等。最常用于加密的哈希算法是MD5(MD5Message-Digest Algorithm,MD5消息摘要算法)和SHA(Secure Hash Algorithm,安全散列算法,可具体细分为SHA-1、SHA-224、SHA-256、SHA-384,和SHA-512)。构成哈希算法的特征:1、从哈希值不能反向推导出原始数据,所以哈希算法也叫单向哈希算法;2、对输入数据非常敏感,原始数据只修改了一个Bit,最后得到的哈希值也大不相同;3、散列冲突(collision)的概率很小,对于不同的原始数据,哈希值相同的概率非常小,通过拉链法或开放定址法可解决冲突的问题。Taking the hash algorithm as a specific example, the hash algorithm (expression: Addr=H(key)) maps a binary value string of any length into a fixed-length binary value string. The rule of this mapping is the hash algorithm. , and the binary value string obtained after mapping the original data is the hash value (for convenience of display or expression, binary is generally converted to hexadecimal). It is a one-way cryptosystem with only encryption process and no decryption process. The hash algorithm is a basic technology used for information storage and query. It is generally used for authentication, authentication, encryption, indexing, etc. The hash algorithms most commonly used for encryption are MD5 (MD5Message-Digest Algorithm, MD5 message digest algorithm) and SHA (Secure Hash Algorithm, secure hash algorithm, which can be specifically subdivided into SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512). The characteristics of a hash algorithm: 1. The original data cannot be deduced from the hash value in reverse, so the hash algorithm is also called a one-way hash algorithm; 2. It is very sensitive to the input data, and only one bit of the original data is modified. The obtained hash values are also very different; 3. The probability of hash collision is very small. For different original data, the probability of the same hash value is very small. The problem of conflict can be solved through the zipper method or the open addressing method. .
具体的,采用所述SHA-256计算方式,某商品的生产厂商F,生产时间20210518,序列号是GFGDM24HLX2Y,商品参数X,则商品信息为F-20210518-GFGDM24HLX2Y-X经过SHA-256计算得到哈希值:411c4d248237e0c008a2f7a2efe611614e449458869b42b4876f24acc6ef13ee(十六进制,看作值A)。在防伪方面,如果将商品信息经过SHA-256运算,得到值A,将该值对外展示,由于哈希值的不可逆性,外界无法知晓商品信息,加上值A连同该商品生产商的验证网址或公众号等信息制作成URL格式,用户终端可方便的对商品进行真伪验证并查看商品信息。同时A值一旦确立并和商品一同对外发布,意味着生产商利用值A的数学特性对商品信息如产商信息、生产时间、商品参数等的一种记录,可以达到商品溯源,因为任何信息的改动,得到的A值将千差万别。A值的产生也将增加消费者对产品的信任感。Specifically, using the SHA-256 calculation method, a certain product is manufactured by manufacturer F, the production time is 20210518, the serial number is GFGDM24HLX2Y, and the product parameter is Greek value: 411c4d248237e0c008a2f7a2efe611614e449458869b42b4876f24acc6ef13ee (hexadecimal, regarded as value A). In terms of anti-counterfeiting, if the product information is processed through SHA-256 to obtain the value A, the value is displayed to the outside world. Due to the irreversibility of the hash value, the outside world cannot know the product information. Add the value A together with the verification website of the product manufacturer. Or public account and other information are made into URL format, and the user terminal can easily verify the authenticity of the product and view the product information. At the same time, once the A value is established and released together with the product, it means that the manufacturer uses the mathematical characteristics of the value A to record product information such as manufacturer information, production time, product parameters, etc., which can achieve product traceability, because any information can be traced If you change it, the A value obtained will vary widely. The generation of A value will also increase consumers' trust in the product.
利用哈希值的不可逆性、唯一性、不可篡改性,从软件层面到实体NFC芯片再到商品,虚实链接,开创了一种新的、安全的、低成本的对商品防伪、确权的方法;另外,通过用户终端在验证其商品时,通过再次进行函数运算得到值B,从而确认绑定成功的操作,使得商品得到确权,实现解决现有产品在进行防伪时使用的防伪贴、塑料防伪扣等方式存在易仿造、安全性低的问题以及产品在确权时需要用户终端拥有登录电子产品的ID、密码、产品序列码等,确权麻烦的问题;Utilizing the irreversibility, uniqueness, and non-tamperability of hash values, from the software level to the physical NFC chip to the product, virtual and real links create a new, safe, and low-cost method for anti-counterfeiting and verification of product rights. ; In addition, when the user terminal verifies the product, the value B is obtained by performing the function operation again, thereby confirming the successful binding operation, so that the product can be confirmed, and the anti-counterfeiting stickers and plastics used in existing products for anti-counterfeiting can be solved. Anti-counterfeiting buckles and other methods have problems such as easy counterfeiting and low security. When confirming product rights, the user terminal needs to have the ID, password, product serial code, etc. to log in to the electronic product, making it troublesome to confirm rights;
当然,采用其他的哈希计算方式如SHA-512也可实现上述功能。Of course, other hash calculation methods such as SHA-512 can also be used to achieve the above functions.
在一种可能的实施方式中,响应于人机交互的权利划分操作,将商品所有权分割成至少两份,并对分割后的每份商品所有权进行绑定或解绑。In one possible implementation, in response to a rights division operation of human-computer interaction, the commodity ownership is divided into at least two parts, and each divided commodity ownership is bound or unbound.
具体示例,当商品所有权被划分成n份时,某商品信息进行哈希运算得到值H,加上n份时间戳,结合哈希运算和编码得到n个值Rn。值Rn可与相同或不同的信息绑定,如手机号、微信号、身份证号或所有权人自定义的值再次加上时间戳进行哈希运算绑定得到n份不可更改的值Sn,进而确认n份所有权的归属,并由生产商或商家记录形成档案。同样Sn经过验证后也可对所有权进行解绑得到值Cn,从而为转移所有权做准备。上述计算值由生产商或商家记录存档并提供验证方法。For a specific example, when the product ownership is divided into n parts, a certain product information is hashed to obtain the value H, plus n timestamps are added, and n values Rn are obtained by combining the hashing operation and encoding. The value Rn can be bound to the same or different information, such as mobile phone number, WeChat ID, ID number or a value customized by the owner and then added with a timestamp for hash operation binding to obtain n unchangeable values Sn, and then Confirm the ownership of n shares and record them in files by the manufacturer or merchant. Similarly, after Sn is verified, the ownership can also be unbound to obtain the value Cn, thereby preparing for the transfer of ownership. The above calculated values are documented and verified by the manufacturer or merchant.
在一种可能的实施方式中,响应于人机交互的协议信息上传操作,将协议信息存储至商品档案信息中;所述协议信息是每份商品绑定的不同用户信息时,不同用户信息对应的不同用户间针对商品进行的约束协议,所述约束协议是针对商品占有时间、商品占有方式、商品保管责任、商品保管义务和赔偿责任中的一项或多项所达成的共识信息In a possible implementation, in response to the human-computer interaction protocol information upload operation, the protocol information is stored in the product file information; when the protocol information is different user information bound to each product, the different user information corresponds to A binding agreement for goods between different users. The binding agreement is consensus information reached on one or more of the time of possession of the goods, the way of possession of the goods, the responsibility for the custody of the goods, the obligation for the custody of the goods and the liability for compensation.
本发明所述对商品所有权分割确权,包括所有权分割、绑定、约定权利义务;The division and confirmation of commodity ownership described in the present invention includes ownership division, binding, and agreement on rights and obligations;
具体的,某商品由M生产商生产,生产时间为T,商品序列号为123,商品参数X。将M-T-123-X进行哈希运算得到值H,当商品所有权被划分成N份时,加上N份时间戳,例如N=6,结合哈希运算和编码得到6个值RN。Rn可与相同或不同的信息绑定,如手机号、微信号、身份证号或所有权人自定义的值再次加上时间戳进行哈希运算绑定得到6份不可更改的值S1、S2、S3、S4、S5、S6,进而确认6份所有权的归属。S1、S2、S3、S4、S5、S6将发送给对应的所有权人。RN、SN、手机号、微信号、身份证号或所有权人自定义的值等均由生产商记录形成档案。所有权人通过S1、S2、S3、S4、S5、S6值与绑定的手机号、微信号、身份证号或所有权人自定义的值验证通过后即可确认拥有对应商品的部分或全部所有权。当然SN经过验证后也可对所有权进行解绑得到值CN,从而为转移所有权做准备。上述计算值可以通过验证网址进行验证,验证网址制作成URL格式,并将该格式信息写入NFC芯片或二维码形式,其中NFC芯片或二维码可以固定在商品上。Specifically, a product is produced by manufacturer M, the production time is T, the product serial number is 123, and the product parameters are X. Perform a hash operation on M-T-123-X to obtain the value H. When the commodity ownership is divided into N parts, add N timestamps, for example, N=6, and combine the hash operation and encoding to obtain 6 values RN. Rn can be bound to the same or different information, such as mobile phone number, WeChat ID, ID number or the value customized by the owner, plus a timestamp for hash operation binding to obtain 6 unchangeable values S1, S2, S3, S4, S5, S6, and then confirm the ownership of the 6 shares. S1, S2, S3, S4, S5, S6 will be sent to the corresponding owner. RN, SN, mobile phone number, WeChat ID, ID number or values customized by the owner are all recorded by the manufacturer to form a file. The owner can confirm that he or she owns part or all of the corresponding goods after passing the verification of the S1, S2, S3, S4, S5, and S6 values and the bound mobile phone number, WeChat ID, ID number, or owner-defined value. Of course, after the SN is verified, the ownership can also be unbound to obtain the value CN, thus preparing for the transfer of ownership. The above calculated values can be verified through the verification URL, which is made into URL format, and the format information is written into the form of NFC chip or QR code, where the NFC chip or QR code can be fixed on the product.
在一种可能的实施方式中,所有的所有权人甚至可以将商品在不同所有权人占有的时间、 方式、保管责任和义务等信息哈希运算得到值Y,值Y可以写入NFC芯片或通过二维码上传生产商服务器或通过区块链技术对外发布。In a possible implementation, all owners can even hash the time, manner, custody responsibilities and obligations of the goods when different owners have them to obtain the value Y. The value Y can be written into the NFC chip or passed through two The QR code is uploaded to the manufacturer's server or released externally through blockchain technology.
在一种可能的实施方式中,商品被所有者买回后,所有者可通过生产商预留的NFC芯片或二维码对自行商品分割份数进行确定,商品被分隔的具体份数也可由商品所有者确认。也可在买之前自行预设分割份数在购买。生产商或商家协助完成对商品所有权的分割的信息记录存档。In a possible implementation, after the goods are bought back by the owner, the owner can determine the number of divided parts of the goods through the NFC chip or QR code reserved by the manufacturer. The specific number of divided parts of the goods can also be determined by Product owner confirmation. You can also pre-set the number of splits before purchasing. Records and archives of information in which the manufacturer or merchant assists in the division of ownership of goods.
具体的,本方法所述的函数运算限定是转换所述商品相关信息以及所有者信息、绑定信息、解绑信息的展现形式,并将转换后的值作为商品档案信息进行关联存储,只要是实现所述功能的函数运算均应在本方法的保护范围内。Specifically, the function operation limit described in this method is to convert the display form of the product-related information, owner information, binding information, and unbinding information, and associate the converted values as product file information for associated storage, as long as it is Functional operations that implement the above functions should be within the scope of protection of this method.
具体的,本方法所述的函数运算得到的值,也可通过区块链技术记录或发布,用户可以通过区块链技术验证得到的值。Specifically, the value obtained by the function operation described in this method can also be recorded or released through blockchain technology, and the user can verify the obtained value through blockchain technology.
在第二方面,对商品防伪确权的装置,包括依次相连的存储器、处理器和收发器,其中,所述存储器用于存储计算机程序,所述收发器用于收发消息,所述处理器用于读取所述计算机程序,执行如第一方面或第一方面中任意一项可能的设计中所述的对商品防伪确权的方法。具体举例的,所述存储器可以但不限于包括随机存取存储器(Random-Access Memory,RAM)、只读存储器(Read-Only Memory,ROM)、闪存(Flash Memory)、先进先出存储器(First Input First Output,FIFO)和/或先进后出存储器(First Input Last Output,FILO)等等;所述处理器可以不限于采用型号为X86、Internet系列的处理器的或其他微处理器;所述收发器可以但不限于为有线收发、无线保真(Wireless Fidelity,WiFi)无线收发器、蓝牙无线收发器、通用分组无线服务技术(General Packet Radio Service,GPRS)无线收发器和/或紫蜂协议(基于IEEE802.15.4标准的低功耗局域网协议,ZigBee)无线收发器等。此外,所述对商品防伪确权的装置还可以但不限于包括有电源模块、显示屏和其它必要的部件。In the second aspect, a device for anti-counterfeiting and authenticating goods includes a memory, a processor and a transceiver connected in sequence, wherein the memory is used to store computer programs, the transceiver is used to send and receive messages, and the processor is used to read Get the computer program and execute the method for anti-counterfeiting and confirming the rights of goods as described in the first aspect or any possible design of the first aspect. For specific examples, the memory may include, but is not limited to, random access memory (Random-Access Memory, RAM), read-only memory (Read-Only Memory, ROM), flash memory (Flash Memory), first-in first-out memory (First Input First Output, FIFO) and/or First Input Last Output, FILO, etc.; the processor may not be limited to X86, Internet series processors or other microprocessors; the transceiver The transceiver can be, but is not limited to, a wired transceiver, a Wireless Fidelity (WiFi) wireless transceiver, a Bluetooth wireless transceiver, a General Packet Radio Service (GPRS) wireless transceiver and/or a ZigBee protocol ( Low-power LAN protocol based on IEEE802.15.4 standard, ZigBee) wireless transceiver, etc. In addition, the device for anti-counterfeiting and authenticating goods may also include, but is not limited to, a power module, a display screen and other necessary components.
在第三方面,本发明提供了一种存储介质,所述存储介质上存储有指令,当所述指令在计算机上运行时,执行如第一方面或第一方面中任意一项可能的设计中所述的对商品防伪确权的方法。其中,所述计算机可读存储介质是指存储数据的载体,可以但不限于包括软盘、光盘、硬盘、闪存、优盘和/或记忆棒(Memory Stick)等,所述计算机可以是通用计算机、专用计算 机、计算机网络、或者其他可编程装置。In a third aspect, the present invention provides a storage medium with instructions stored on the storage medium. When the instructions are run on a computer, the invention executes the first aspect or any one of the possible designs in the first aspect. The method of preventing counterfeiting and confirming the rights of goods. Wherein, the computer-readable storage medium refers to a carrier for storing data, which may, but is not limited to, include floppy disks, optical disks, hard disks, flash memory, USB flash drives and/or memory sticks, etc. The computer may be a general-purpose computer, a special-purpose computer, etc. Computer, computer network, or other programmable device.
最后应说明的是,以上所述仅为本发明的优选实施例而已,并不用于限制本发明的保护范围。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。Finally, it should be noted that the above descriptions are only preferred embodiments of the present invention and are not intended to limit the scope of the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and principles of the present invention shall be included in the protection scope of the present invention.

Claims (8)

  1. 一种对商品防伪确权的方法,其特征在于,包括防伪码制备和确权;A method for anti-counterfeiting and confirming the rights of commodities, which is characterized by including preparation of anti-counterfeiting codes and confirmation of rights;
    所述防伪码制备包括以下步骤,The preparation of the anti-counterfeiting code includes the following steps:
    S101、获取商品信息;S101. Obtain product information;
    S102、将所述商品信息经过函数运算得到值A;S102. Perform function operation on the product information to obtain value A;
    S103、将所述值A作为防伪码连同所述商品的相关验证入口信息制作成URL格式信息;并将所述URL格式信息写入NFC芯片中和/或转换为二维码;S103. Use the value A as an anti-counterfeiting code together with the relevant verification entry information of the product to produce URL format information; write the URL format information into the NFC chip and/or convert it into a QR code;
    所述确权的方法包括以下步骤,The method of confirming rights includes the following steps:
    S201、接收用户终端发送的验证请求信息,向用户终端发送第一验证信息;S201. Receive the verification request information sent by the user terminal, and send the first verification information to the user terminal;
    S202、接收用户终端返回的第一验证信息,根据第一验证信息,进行用户身份核验和确权;S202. Receive the first verification information returned by the user terminal, and perform user identity verification and rights confirmation based on the first verification information;
    S203、将所述值A与用户相关信息进行绑定,并将绑定信息进行函数运算得到值B;S203. Bind the value A with the user-related information, and perform a function operation on the binding information to obtain the value B;
    S204、将所述商品信息、值A、用户相关信息和值B进行关联存储,形成商品档案信息;S204. Associate and store the product information, value A, user-related information and value B to form product file information;
    在所述确权之后还包括解绑,所述解绑的方法如下,After the confirmation, unbundling is also included. The unbundling method is as follows:
    将所述值A与用户终端的相关信息通过验证解除绑定,获取解绑信息,所述解绑信息包括解绑核验信息、当前时间戳和商品信息,然后将所述解绑信息进行函数运算得到值C,并将值C加入商品档案信息中;解绑后,如有新的使用者或有需要进行商品重新确权的场景,则重新进行所述确权的步骤;Unbind the value A and the relevant information of the user terminal through verification to obtain unbinding information, which includes unbinding verification information, current timestamp and product information, and then perform function operations on the unbinding information Obtain the value C and add the value C to the product file information; after unbundling, if there is a new user or there is a scenario where the product rights need to be re-confirmed, the steps of re-confirming the rights will be re-carried out;
    所述确权之后还包括记录商品使用信息,记录商品使用信息的方法如下,After confirming the rights, it also includes recording product usage information. The method of recording product usage information is as follows:
    在商品使用的不同阶段,获取商品的使用情况信息,并将商品使用情况信息、对应的商品信息以及当前商品的用户相关信息进行函数运算得到值Di,i代表获取商品的使用情况信息次数,并将所述值Di进行关联存储。At different stages of product use, obtain the usage information of the product, and perform function operations on the product usage information, corresponding product information, and user-related information of the current product to obtain the value Di, i represents the number of times the usage information of the product is obtained, and The value Di is stored in association.
  2. 根据权利要求1所述的对商品防伪确权的方法,其特征在于,将所述值A与用户终端的相关信息通过验证解除绑定的方法包括,The method for anti-counterfeiting and confirming the rights of goods according to claim 1, characterized in that the method of unbinding the value A and the relevant information of the user terminal through verification includes:
    接收用户终端解除绑定的请求信息,然后向用户发送第二验证信息;Receive the request information for unbinding from the user terminal, and then send the second verification information to the user;
    接收用户终端返回的第二验证信息,并对第二验证信息进行核验,核验通过后,将商品对应的值A与用户终端的相关信息进行解除绑定。Receive the second verification information returned by the user terminal, and verify the second verification information. After passing the verification, unbind the value A corresponding to the product from the relevant information of the user terminal.
  3. 根据权利要求1所述的对商品防伪确权的方法,其特征在于,在步骤S203中,将所述值A与用户终端的相关信息进行绑定后,还将绑定后的信息加上时间戳,然后再进行函数运算得到值B。The method for preventing counterfeiting of goods according to claim 1, characterized in that, in step S203, after binding the value A with the relevant information of the user terminal, time is also added to the bound information. Stamp, and then perform function operation to obtain value B.
  4. 根据权利要求1所述的对商品防伪确权的方法,其特征在于,所述用户的相关信息包括用户的手机号和/或微信号信息。The method for anti-counterfeiting and confirming the rights of goods according to claim 1, characterized in that the user's relevant information includes the user's mobile phone number and/or WeChat ID information.
  5. 根据权利要求1所述的对商品防伪确权的方法,其特征在于,所述函数运算是哈希算法。The method for anti-counterfeiting and confirming the rights of commodities according to claim 1, characterized in that the function operation is a hash algorithm.
  6. 根据权利要求1~5任意一项所述的对商品防伪确权的方法,其特征在于,还包括以下步骤,The method for anti-counterfeiting and confirming the rights of goods according to any one of claims 1 to 5, characterized in that it also includes the following steps:
    响应于人机交互的权利划分操作,将商品所有权分割成至少两份,并对分割后的每份商品所有权进行绑定或解绑;In response to the rights division operation of human-computer interaction, the commodity ownership is divided into at least two parts, and each divided commodity ownership is bound or unbound;
    响应于人机交互的协议信息上传操作,将协议信息存储至商品档案信息中;所述协议信息是每份商品绑定的不同用户信息时,不同用户信息对应的不同用户间针对商品进行的约束协议,所述约束协议是针对商品占有时间、商品占有方式、商品保管责任、商品保管义务和赔偿责任中的一项或多项所达成的共识信息。In response to the protocol information upload operation of human-computer interaction, the protocol information is stored in the product file information; when the protocol information is different user information bound to each product, the constraints on the product between different users corresponding to the different user information Agreement, the binding agreement is consensus information reached on one or more of the time of possession of the goods, the way of possession of the goods, the responsibility for the custody of the goods, the obligation for the custody of the goods and the liability for compensation.
  7. 对商品防伪确权的装置,其特征在于,包括依次相连的存储器、处理器和收发器,其中,所述存储器用于存储计算机程序,所述收发器用于收发消息,所述处理器用于读取所述计算机程序,执行如权利要求1~5任意一项所述的对商品防伪确权的方法。The device for anti-counterfeiting and confirming the rights of commodities is characterized in that it includes a memory, a processor and a transceiver connected in sequence, wherein the memory is used to store computer programs, the transceiver is used to send and receive messages, and the processor is used to read The computer program executes the method for anti-counterfeiting and confirming the rights of goods as described in any one of claims 1 to 5.
  8. 一种存储介质,其特征在于,所述存储介质上存储有指令,当所述指令在计算机上运行时,执行如权利要求1~5任意一项所述的对商品防伪确权的方法。A storage medium, characterized in that instructions are stored on the storage medium, and when the instructions are run on a computer, the method for preventing counterfeiting and confirming the rights of commodities according to any one of claims 1 to 5 is executed.
PCT/CN2022/115669 2022-06-08 2022-08-30 Commodity anti-counterfeiting and ownership confirmation method and apparatus, and storage medium WO2023236369A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210639799.3 2022-06-08
CN202210639799.3A CN114723465B (en) 2022-06-08 2022-06-08 Method, device and storage medium for anti-counterfeiting right confirmation of commodities

Publications (1)

Publication Number Publication Date
WO2023236369A1 true WO2023236369A1 (en) 2023-12-14

Family

ID=82232757

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/115669 WO2023236369A1 (en) 2022-06-08 2022-08-30 Commodity anti-counterfeiting and ownership confirmation method and apparatus, and storage medium

Country Status (2)

Country Link
CN (1) CN114723465B (en)
WO (1) WO2023236369A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114723465B (en) * 2022-06-08 2022-09-09 深圳市易初推因科技有限公司 Method, device and storage medium for anti-counterfeiting right confirmation of commodities
CN117097507A (en) * 2023-07-05 2023-11-21 成都安易迅科技有限公司 Method for issuing verification short message content and method for sending verification short message

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108711092A (en) * 2018-05-17 2018-10-26 立旃(上海)科技有限公司 Method and device is weighed really based on block chain
CN113269565A (en) * 2021-05-11 2021-08-17 重庆邮电大学 Anti-counterfeiting identification method and device for anti-reuse identification code and electronic equipment
WO2021223591A1 (en) * 2020-05-07 2021-11-11 京东数科海益信息科技有限公司 Article information processing method and apparatus, device, and computer readable storage medium
CN114581104A (en) * 2022-03-03 2022-06-03 武汉权信技术有限公司 Anti-counterfeiting and right-confirming method and device based on block chain NFT technology
CN114723465A (en) * 2022-06-08 2022-07-08 深圳市易初推因科技有限公司 Method, device and storage medium for anti-counterfeiting right confirmation of commodities

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105809457A (en) * 2016-03-24 2016-07-27 河南李烨包装科技有限公司 System and method for authenticating commodity through coupled double codes
CN109034851B (en) * 2018-09-05 2022-03-08 深圳正品创想科技有限公司 Commodity anti-counterfeiting tracing method and device based on block chain and block chain link points
CN109523280A (en) * 2018-11-23 2019-03-26 浙江工商大学 Method for anti-counterfeit of tracing to the source based on ownership on a kind of block chain
CN112184252A (en) * 2019-06-17 2021-01-05 雲禾(浙江)科技集团有限公司 Commodity anti-counterfeiting tracing method based on block chain technology
CN112348534A (en) * 2020-10-30 2021-02-09 遵义乐亿科技有限公司 Anti-counterfeiting source tracing code method based on block chain technology
CN112651052A (en) * 2020-12-24 2021-04-13 江苏通付盾科技有限公司 Data right confirming method and system based on block chain technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108711092A (en) * 2018-05-17 2018-10-26 立旃(上海)科技有限公司 Method and device is weighed really based on block chain
WO2021223591A1 (en) * 2020-05-07 2021-11-11 京东数科海益信息科技有限公司 Article information processing method and apparatus, device, and computer readable storage medium
CN113269565A (en) * 2021-05-11 2021-08-17 重庆邮电大学 Anti-counterfeiting identification method and device for anti-reuse identification code and electronic equipment
CN114581104A (en) * 2022-03-03 2022-06-03 武汉权信技术有限公司 Anti-counterfeiting and right-confirming method and device based on block chain NFT technology
CN114723465A (en) * 2022-06-08 2022-07-08 深圳市易初推因科技有限公司 Method, device and storage medium for anti-counterfeiting right confirmation of commodities

Also Published As

Publication number Publication date
CN114723465A (en) 2022-07-08
CN114723465B (en) 2022-09-09

Similar Documents

Publication Publication Date Title
WO2023236369A1 (en) Commodity anti-counterfeiting and ownership confirmation method and apparatus, and storage medium
CN102609846B (en) Anti-false verification method and system based on communication network
AU2021245103A1 (en) A computer implemented method for processing a financial transaction and a system therefor
CN102779284B (en) RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like
EP3779750A1 (en) User identity content information authentication and verification methods and devices
US11307775B2 (en) Distributed storage of custom clearance data
CN111989707B (en) Managing user rights for blockchain-based customs clearance services
CN110958319B (en) Method and device for managing infringement and evidence-based block chain
US11356270B2 (en) Blockchain-based smart contract pools
US11418511B2 (en) User management of blockchain-based custom clearance service platform
JP2016512675A (en) Secure trading system and method
JP5260795B2 (en) Product distribution management method via the Internet
US11372695B2 (en) Blockchain-based import custom clearance data processing
CN110599107B (en) Logistics data processing method and device based on block chain
TW200945211A (en) RFID tag, operating method of RFID tag, and operating method between RFID tag and RFID reader
WO2023005309A1 (en) Blockchain-based product information processing method, and computer-readable storage medium
US11449911B2 (en) Blockchain-based document registration for custom clearance
WO2020108105A1 (en) Method and apparatus for recording and querying bill installment event, and electronic device
CN117240605B (en) Data transaction method, device, equipment and storage medium
CN110189143B (en) Block chain-based marketing label authenticity verification method and system
JP6037425B2 (en) Electronic receipt issuing system
TWI765158B (en) Certification Management System
JP7327208B2 (en) Data recording device, data recording method, data recording program, system, method and program
US20220405770A1 (en) System and methods for verifying merchandise authenticity
JP5592140B2 (en) Purchase certification apparatus, computer program for purchase certification, and purchase certification method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22945503

Country of ref document: EP

Kind code of ref document: A1