CN109784952B - Logistics management and anti-counterfeiting authentication system and method with tracing and tracing functions - Google Patents
Logistics management and anti-counterfeiting authentication system and method with tracing and tracing functions Download PDFInfo
- Publication number
- CN109784952B CN109784952B CN201910098485.5A CN201910098485A CN109784952B CN 109784952 B CN109784952 B CN 109784952B CN 201910098485 A CN201910098485 A CN 201910098485A CN 109784952 B CN109784952 B CN 109784952B
- Authority
- CN
- China
- Prior art keywords
- authentication
- counterfeiting
- authentication code
- management
- article
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000012545 processing Methods 0.000 claims abstract description 8
- 238000007726 management method Methods 0.000 claims description 135
- 230000002427 irreversible effect Effects 0.000 claims description 9
- 239000011248 coating agent Substances 0.000 claims description 4
- 238000000576 coating method Methods 0.000 claims description 4
- 238000004891 communication Methods 0.000 claims description 4
- 238000004806 packaging method and process Methods 0.000 claims description 2
- 235000019504 cigarettes Nutrition 0.000 abstract description 2
- 239000002537 cosmetic Substances 0.000 abstract description 2
- 229940079593 drug Drugs 0.000 abstract description 2
- 239000003814 drug Substances 0.000 abstract description 2
- 239000010985 leather Substances 0.000 abstract description 2
- 101000819473 Xenopus laevis Frizzled-2 Proteins 0.000 description 6
- 101000819475 Xenopus laevis Frizzled-1 Proteins 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 101000885583 Xenopus laevis Frizzled-3 Proteins 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 235000013361 beverage Nutrition 0.000 description 1
- 230000005465 channeling Effects 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a logistics management and anti-counterfeiting authentication system and method with a tracing and tracing function, comprising a data processing unit, and a logistics management authentication module, a retail management authentication module, a plurality of article anti-counterfeiting authentication modules and a final consumption anti-counterfeiting authentication module which are all interacted with the data processing unit; the invention can dynamically grasp the position and state of the articles in circulation in each link of circulation and consumption, and provides extremely important data for the business decision of relevant manufacturers. The logistic management anti-counterfeiting authentication method has low cost and easy realization, and can be widely applied to printed articles such as cigarettes, wine, medicines, cosmetics, leather bags, audio and video and the like. By using the method of the invention, the rights and interests of related parties such as commodity manufacturers, consumers and the like can be effectively protected.
Description
Technical Field
The invention belongs to the technical field of circulation management and article authentication, and particularly relates to a system and a method for logistics management and anti-counterfeiting authentication with a tracking and tracing function.
Background
The counterfeit phenomenon of commodities has long been known, and although various anti-counterfeiting technologies are developed, the counterfeit phenomenon is still not effectively eradicated. On the other hand, the circulation supervision of the commodity is also vulnerable, and the existing measures cannot fundamentally and effectively fight against counterfeit and inferior behaviors.
The computer and communication technology is mature, and the application of the computer technology and the communication technology in the attack and supervision of counterfeit and inferior products is imperative. In particular, the whole circulation process of the goods can be supervised through tracking, tracing management and anti-counterfeiting authentication, the authenticity of the goods can be effectively identified, the counterfeit goods are hit, the counterfeit products are hidden, the effective supervision of the goods is finally realized, and the aim of suppressing the counterfeit products is fulfilled.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide a logistics management and anti-counterfeiting authentication system and method with a tracing and tracing function.
In order to achieve the purpose, the invention is realized by adopting the following technical scheme:
the logistics management and anti-counterfeiting authentication system with the tracing and tracing function comprises a data processing unit, and a logistics management authentication module, a retail management authentication module, a plurality of article anti-counterfeiting authentication modules and a final consumption anti-counterfeiting authentication module which are all interacted with the data processing unit; wherein,
The logistics management authentication module is used for tracking and tracing management of the articles;
The retail management authentication module is used for managing the retail time of the articles;
the article anti-counterfeiting authentication module is used for anti-counterfeiting authentication in the consumption process;
The final consumption anti-counterfeiting authentication module is used for anti-counterfeiting authentication and time recording when the article is finally consumed.
The logistics management and anti-counterfeiting authentication method with the tracing and tracing functions comprises the following steps:
Step 1: randomly generating a logistics management authentication code, a retail management authentication code, more than one article anti-counterfeiting authentication code and a final consumption anti-counterfeiting authentication code for each article; generating a logistics management authentication code for the outer package of each of the plurality of articles;
The commodity circulation management authentication code is used for tracking and tracing management of the commodity, the retail management authentication code is used for management of retail time of the commodity, the commodity anti-counterfeiting authentication code is used for anti-counterfeiting authentication in a consumption process, and the final consumption anti-counterfeiting authentication code is used for anti-counterfeiting authentication and time recording when the commodity is finally consumed; each authentication code is capable of adding ancillary information; the anti-counterfeiting authentication code of the article and the final consumption anti-counterfeiting authentication code are provided with authentication times, and the initial value of the authentication times is 0;
Step 2: the relevant person in the logistics logs in own relevant information to the system while downloading the provided application terminal from the system;
Step 3: the related person in the logistics authenticates the logistics management authentication code on the corresponding package during shipment and delivery; the system stores the related dealer and the authentication time and place information in the auxiliary information of the logistics management authentication code, and feeds back the authentication information of the upper logistics management authentication code when the commodity is delivered;
Step 4: during retail, the retailers take out the retail management authentication codes hidden in the individual packages of the articles for authentication through irreversible operation, and the articles enter a consumption stage; the system stores the time and place information of retailers and articles entering the consumption stage in the auxiliary information of the retail management authentication code, and feeds back the authentication information of all the logistics management authentication codes;
Step 5: in the consumption stage, related consumers except the final consumer can take out a certain article anti-counterfeiting authentication code hidden in the individual package of the article through irreversible operation for authentication; the system stores the consumers and the authentication time and place in the auxiliary information of the anti-counterfeiting authentication code of the article, and feeds back the authentication information of all related logistics management authentication codes, retail management authentication codes and other authenticated anti-counterfeiting authentication codes of the article;
Step 6: when the article is finally consumed, the final consumer takes out the hidden final consumption anti-counterfeiting authentication code through irreversible operation to authenticate; the system stores the time and place information of the final consumption of the article in the auxiliary information of the final consumption anti-counterfeiting authentication code, and feeds back the authentication information of all authentication codes related to the article.
Compared with the prior art, the invention has the following beneficial effects:
The invention can accurately grasp some specific information including information such as sales units and time of the goods in each circulation stage through the authentication of the set logistics management authentication codes at each stage. By authenticating the set retail management authentication code, specific information including seller, time, place, etc. of the article from the circulation stage to the consumption stage can be accurately grasped. The final consumption anti-counterfeiting authentication code can be accurately used for grasping specific information including the time and place of the consumption of the article. The logistic management anti-counterfeiting authentication method of the invention can search the authentication information of other authentication codes through any authentication code related to one article in the system by correlating the logistic management authentication code related to the article, the retail management authentication code, the article anti-counterfeiting authentication code and the final consumption anti-counterfeiting authentication code. When a problem article appears, the link in which the problem appears can be quickly ascertained, so that the comprehensive management of tracking, tracing and anti-counterfeiting of the article can be simultaneously realized. The invention can ensure the accuracy and the anti-counterfeiting strength of the information by hiding and retail managing authentication codes, article anti-counterfeiting authentication codes and final consumption anti-counterfeiting authentication codes.
The invention can dynamically grasp the position and state of the articles in circulation in each link of circulation and consumption, and provides extremely important data for the business decision of relevant manufacturers. The logistic management anti-counterfeiting authentication method has low cost and easy realization, and can be widely applied to printed articles such as cigarettes, wine, medicines, cosmetics, leather bags, audio and video and the like. By using the method of the invention, the rights and interests of related parties such as commodity manufacturers, consumers and the like can be effectively protected.
Drawings
FIG. 1 is a schematic diagram of a logistics information management system of the product of the present invention;
Fig. 2 is a schematic structural diagram of a logistic management information storage block and a product (wine) anti-counterfeiting authentication information block according to the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The invention is described in further detail below with reference to the attached drawing figures:
referring to fig. 1 and 2, the system with the tracing and tracing functions for logistics management and anti-counterfeiting authentication comprises a data processing unit, and a logistics management authentication module, a retail management authentication module, a plurality of article anti-counterfeiting authentication modules and a final consumption anti-counterfeiting authentication module which are all interacted with the data processing unit; the logistics management authentication module is used for tracking and tracing management of the articles; the retail management authentication module is used for managing the retail time of the articles; the article anti-counterfeiting authentication module is used for anti-counterfeiting authentication in the consumption process; the final consumption anti-counterfeiting authentication module is used for anti-counterfeiting authentication and time recording when the article is finally consumed.
The invention also discloses a method for logistics management and anti-counterfeiting authentication with the tracing and tracing function, which comprises the following steps:
Step 1: and randomly generating a logistics management authentication code, a retail management authentication code, more than one article anti-counterfeiting authentication code and a final consumption anti-counterfeiting authentication code for each article. A logistics management authentication code is generated for each of the plurality of outer packages. The logistics management authentication code is used for tracking and tracing management of the articles, the retail management authentication code is used for management of retail time of the articles, the article anti-counterfeiting authentication code is used for anti-counterfeiting authentication in the consumption process, and the final consumption anti-counterfeiting authentication code is used for anti-counterfeiting authentication and time recording when the articles are finally consumed. Each authentication code may add ancillary information. The logistic management authentication code, the retail management authentication code, the article anti-counterfeiting authentication code and the final consumption anti-counterfeiting authentication code are randomly generated and printed or posted at corresponding positions in a hidden mode. The hiding mode can be coating coverage, paper layer coverage, disposable package and the like. The final anti-counterfeiting code should be hidden in a position which can be taken out when the consumer goods are consumed, such as a wine bottle cap. The anti-counterfeiting authentication codes of the article can be any plurality according to the requirement, all authentication codes related to the same article have correlation, and information of other authentication codes can be queried from any one authentication code in the anti-counterfeiting authentication codes. The anti-fake authentication code of the article and the final consumption anti-fake authentication code are provided with authentication times, and the initial value of the authentication times is 0.
Step 2: the relevant person in the logistics, such as each level of dealer, logs in own relevant information to the system while downloading the provided application terminal from the system.
Step 3: the related person in the logistics, such as each level of dealership, authenticates the logistics management authentication code on the corresponding package during shipment and in-shipment. The system stores the information of the related dealer, the authentication time and place and the like as the auxiliary information of the logistics management authentication code, and feeds back the authentication information of the upper logistics management authentication code when the commodity is delivered.
Step 4: during retail, the retailers take out the retail management authentication codes hidden in the individual packages of the articles for authentication through irreversible operation, and the articles enter a consumption stage. The system stores information such as time and place of retailers and articles entering a consumption stage as auxiliary information of the retail management authentication codes, and feeds back authentication information of all the logistics management authentication codes.
Step 5: in the consumption stage, related consumers except the final consumer can take out a certain anti-counterfeiting authentication code hidden in the individual package of the article through irreversible operation to authenticate. The system stores the consumers and the authentication time and place as the auxiliary information of the anti-counterfeiting authentication code of the article, and feeds back the authentication information of all relevant logistics management authentication codes, retail management authentication codes and other authenticated anti-counterfeiting authentication codes of the article.
Step 6: when the article is finally consumed, the final consumer takes out the hidden final consumption anti-counterfeiting authentication code through irreversible operation for authentication. The system stores the information of the time and place of the final consumption of the article and the like as the auxiliary information of the final consumption anti-counterfeiting authentication code, and feeds back the authentication information of all authentication codes related to the article.
Wherein, when any one of the anti-counterfeiting authentication codes and the final consumption anti-counterfeiting authentication code is authenticated, the authentication times are automatically increased by 1. At any time, if the authentication code used for authentication is incorrect, the system will feed back to the authenticator the authentication code is incorrect, taking care of the method of preventing warnings of counterfeit items and how to proceed with further inquiry. When the authentication times of the anti-counterfeiting authentication code of the article and the final consumption anti-counterfeiting authentication code are larger than 1, the system also feeds back the authentication times to the authenticator and reminds the authenticator to pay attention to the authentication related information.
The authentication method is that the obtained authentication code is sent to the logistics management anti-counterfeiting authentication system through a communication network by telephone, mobile phone or network inquiry means. The logistics management anti-counterfeiting authentication system authenticates, saves and feeds back related information to the related authentication codes. In case of a flow-through channel security specification, the logistic anti-counterfeit authentication code may be omitted.
Examples
The embodiments of the present invention will be described below using a physical distribution management anti-counterfeit authentication in the case where a virtual certain brand of wine is in a sound condition in a distribution network as an example. For convenience, it is assumed that the wine 6 bottle is a small box and the 4 small box is a large box.
Step 1: the system randomly generates the following authentication codes: for each big bin, one stream administration authentication code WL for the big bin, 4 stream administration authentication codes WL1, WL2, WL3, WL4,6×4 stream administration authentication codes (WL 11, …, WL 16), … for each bottle, (WL 41, …, WL 46), 6×4 retail administration authentication codes (LS 11, …, LS 16), …, (LS 41, …, LS 46), 6×4 final consumption authentication codes (ZF 11, …, ZF 16), …, (ZF 41, …, ZF 46), 6×4×3 item anti-counterfeit authentication codes (FW 111, …, fw113, …, FW161, …, FW 163), …, (FW 411, …, FW413, …, FW461, …, FW 463) for each bottle are generated. The digits of all the authentication codes can be set according to the needs, and are any one of unpredictable random number digit columns, random number digit and letter mixed columns, numeral letter and character mixed columns, and two-dimensional codes and color three-dimensional codes corresponding to the codes. The anti-fake authentication code of the article and the final consumption anti-fake authentication code are provided with authentication times, and the initial value is 0.
And generating logistics management codes of four small boxes in the large box, randomly selecting X 1~X12 and preserving secretly. According to the 'logistics management code generation algorithm', 15 logistics management codes are obtained
Since there are only 4 small boxes, only the first 4 function values WL 1,1,WL1,2,WL1,3,WL1,4 are selected as the logistics management code: WL1, WL2, WL3, WL4, the remaining 11 WL 15-WL 115 values WL1,5,WL1,6,WL1,7,WL1,8,WL1,9,WL1,10,WL1,11,WL1,12,WL1,13,WL1,14,WL1,15 are kept secret.
Similarly, for the next stage, a stream management code of 6 bottles of wine in each small box WL1 is generated as follows. The system randomly selects another group X 1-X12 and stores the secret, and the system obtains 15 logistics management codes according to a logistics management code generation algorithm:
Because there are 6 bottles of wine in WL1, therefore select first 6 function value WL 11,1,WL11,2,WL11,3,WL11,4,WL11,5,WL11,6 as logistics management code WL11, …, WL16 print on the beverage bottle, the other 9 WL11,7 ~ WL11,15 value WL11,7,WL11,8,WL11,9,WL11,10,WL11,11,WL11,12,WL11,13,WL11,14,WL11,15 secret save.
Similarly, corresponding logistics management codes can be generated for any of the different units of product.
When the unit product (6 bottles of wine in a small box) needs to be checked, the system can collect the logistics management codes on the package and check the logistics management codes through a logistics management code checking algorithm.
When verifying the logistics management codes WL11, …, WL16 on 6 bottles of wine. The system is firstly based on
Has the following components
Then substituting the known WL 11,1,WL11,2,WL11,3,WL11,4,WL11,5,WL11,6 and the stored 9 values WL11,7,WL11,8,WL11,9,WL11,10,WL11,11,WL11,12,WL11,13,WL11,14,WL11,15, of WL11, 7-WL 11,15 to solve the equation to obtain the valueThat is to say X1X4+X2X3,X5X8+X6X7,X9X12+X10X11, replaces the values back to the first three formulas of the formula of the logistics management generation code (2), then can sequentially solve X 1,X2,X3, then brings the values into the other formulas to solve X 4-X12, compares the values with check values stored in the system, if the values are consistent, the logistics management codes WL11, … and WL16 on the 6 bottles of wine are generated legally, otherwise, the last level of tracing is continued.
When the unit product (4 small boxes in a large box) needs to be checked, the system can collect the logistics management codes on the package, such as the logistics management codes WL1, … and WL14 on the 4 small boxes. Likewise, the system is first based on
Has the following components
Then substituting the known WL 1,1,WL1,2,WL1,3,WL1,4 and the stored WL 15-WL 11511 values WL1,5,WL1,6,WL1,7,WL1,8,WL1,9,WL1,10,WL1,11,WL1,12,WL1,13,WL1,14,WL1,15, to obtain the inverse solution equationThat is, X1X4+X2X3,X5X8+X6X7,X9X12+X10X11, replaces the values with the first three formulas of the formula of the logistics management generation code (1), then solves for X 1,X2,X3 in sequence, then brings the values into the other formulas to solve for X 4~X12, compares the values with the check values stored in the system, if the values are consistent, the logistics management codes WL1, … and WL4 on the 4 small boxes are generated legally, otherwise, there is a channeling or counterfeit suspicion.
The retail management authentication code and the article anti-counterfeiting authentication code are hidden in a coating coverage mode, and the final consumption anti-counterfeiting authentication code is arranged in the wine cover.
The association of all authentication codes associated with a bottle of wine is achieved by a combination of tree structure and cyclic chain structure as shown in figure 1. The various authentication codes (logistics management authentication code, retail management authentication code, article anti-counterfeiting authentication code and final consumption anti-counterfeiting authentication code) on each bottle of wine form a chain structure, the chain head is the logistics management authentication code WLij of the wine, the other elements are the retail management authentication code LSij of the wine, the final consumption anti-counterfeiting authentication code ZF ij and the anti-counterfeiting authentication codes (FWij, … and FWij 3). The root of the tree structure is the logistics management authentication code WL of the big box, and the tail end leaves are anti-counterfeiting circulating chain structures. The data of each authentication code is composed of a structure body, the index of which is the authentication code, and the additional information is the data thereof.
In this embodiment, the circulation process is assumed to be: the master vendor ZJS delivers the large box WL to the primary dealer YJS at time T1; the primary dealer YJS receives the large box WL at time T2 and delivers the large box WL to the secondary dealer EJS at time T3; the secondary dealer EJS receives the large box WL at time T4 and delivers the large box WL to the tertiary dealer SJS at time T5; the tertiary dealer SJS receives the large box WL at time T6 and delivers the small box WL2 to the retailer LSS at time T7; retailer LSS receives bin WL2 at time T8 and sells wine WL23 to consumer XFZ1 at time T9. Consumer XFZ1 transfers wine WL23 to consumer XFZ2 after verification of security code FW231 at time T10. Consumer XFZ2 again verifies the security code FW231 at time T11, verifies the security code FW232 again at time T12, and verifies the final consumer security authentication code ZF23 by opening (consuming) the bottle at time T13. The consumer XFZ3 verifies again the final consumer anti-counterfeit authentication code ZF23 at time T14 via transfer.
The location where a product is located throughout a logistics system is referred to as the "management level", the packaging state where a product is located throughout a logistics system is simply referred to as the "item level", and whether the item level is out or in relative to the management level is referred to as the item state. Thus, each logistic process can be abbreviated as (management level, time, item level, item status). The whole process can be described simply as: (ZJS, T1, WL, out) (YJS, T2, WL, in) (YJS, T3, WL, out) (EJS, T4, WL, in) (EJS, T5, WL, out) (SJS, T6, WL, in) (SJS, T7, WL2, out) (LSS, T8, WL2, in) (LSS, T9, LS23, out) (XFZ 1, T10, FW 231) (XFZ 2, T11, FW 231) (XFZ 2, T12, FW 232) (XFZ 2, T13, ZF 23) (XFZ 3, T14, ZF 23).
The logistics information management system of the product is shown in fig. 1.
Step 2: an authentication system and a platform are established, and related information such as names, addresses, contact ways and the like of related persons in the logistics, such as dealers at all levels, are input when the application terminal is downloaded. When each level of dealer uses the application terminal to authenticate the logistics authentication code, the system obtains the relevant information. When the consumer authenticates the anti-counterfeiting authentication code and the final consumption anti-counterfeiting code through code scanning, the authenticated mobile phone number, authentication time and geographic position are obtained.
Step 3: when the total sales vendor ZJS delivers goods to the primary dealer YJS at time T1, the logistics management authentication code WL on the large box is scanned, and the system records the information (ZJS, T1, YJS, out) as data of WL. WL data, i.e. the logistics management authentication code, contains information as (item source, time, item destination, item status).
When the first-level dealer YJS receives WL at time T2, the logistics management authentication code WL on the large box is scanned, and the system records information (YJS, T2, ZJS, in) as data of WL. And the data [ (ZJS, T1, YJS, out) ] existing on WL are fed back to YJS in a text mode.
When the primary dealer YJS delivers WL to the secondary dealer EJS at time T3, the logistics management authentication code WL on the large box is scanned, and the system records information (YJS, T3, EJS, out) as data of WL.
When the secondary dealer EJS receives WL at time T4, the logistics management authentication code WL on the large box is scanned, and the system records information (EJS, T4, YJS in) as data of WL. And the data [ (ZJS, T1, YJS, out), (YJS, T2, ZJS, in), (YJS, T3, EJS, out) ] existing on WL are fed back to EJS in a literal way.
When the secondary dealer EJS delivers goods to the tertiary dealer SJS at time T5, the logistics management authentication code WL on the large box is scanned, and the system records the information (EJS, T5, SJS, out) as data of WL.
When the third-level dealer SJS receives WL at time T6, the logistics management authentication code WL on the large box is scanned, and the system records information (SJS, T6, EJS, in) as data of WL. And the data [ (ZJS, T1, YJS, out), (YJS, T2, ZJS, in), (YJS, T3, EJS, out), (EJS, T4, YJS, in), (EJS, T5, SJS, out) ] existing on the WL are fed back to the SJS in a literal way.
When the tertiary dealer SJS delivers WL2 to the retailer LSS at time T7, the logistics management authentication code WL2 on the small box is scanned, and the system records the information (SJS, T7, LSS, out) as data of WL 2.
When the retailer LSS receives WL2 at time T8, scans the logistics management authentication code WL2 on the small box, the system records the information (LSS, T8, SJS, in) as data for WL2 and feeds back the data [ (ZJS, T1, YJS, out), (YJS, T2, ZJS, in), (YJS, T3, EJS, out), (EJS, T4, YJS, in), (EJS, T5, SJS, out), (SJS, T6, EJS, in), (SJS, T7, LSS, out) ] already on WL2 and its ancestor WL to LSS in a literal manner.
Step 4: the retailer LSS scans the retail management authentication code LS23 on the wine bottle at time T9 retail to consumer XFZ1, and the system records the information (LSS, T9, out) as data for LS 23.
Step 5: when consumer XFZ1 verifies the item anti-counterfeit authentication code FW231 of wine WL23 for the first time at time T10, the system adds 1 to the number of authentications of FW231, records the information (FW 231, T10, D1, 1) as data of FW231, and text the data [ (ZJS, T1, YJS, out), (YJS, T2, ZJS, in), (YJS, T3, EJS, out), (EJS, T4, YJS, in), (EJS, T5, SJS, out), (SJS, T6, EJS, in), (SJS, T7, LSS, out), (LSS, T8, SJS, in) ] on the endless chain of the wine and the data [ (LSS, T9, out), (FW 231, T10, D1, 1) ] on the endless chain of the wine are feedback to consumer xffz 1 in a literal manner, wherein D1 records the detailed information including location information and the number of authentications, 1 represents the number of authentications.
The entry of the product into the consumption phase (i.e. the phase after the consumer has purchased the product) means the start of anti-counterfeit authentication. Therefore, the data (FW 231, T10, D1, 1) of the anti-counterfeit authentication code FW231 has an anti-counterfeit authentication function, and is therefore also called an anti-counterfeit code.
Step 6: when consumer XFZ2 verifies the article anti-counterfeit authentication code FW231 again at time T11, the system adds 1 to the number of authentications of FW231, records the information (FW 231, T11, D2, 2) as data of FW231, and data [ (ZJS, T1, YJS, out), (YJS, T2, ZJS, in), (YJS, T3, EJS, out), (EJS, T4, YJS, in), (EJS, T5, SJS, out), (SJS, T6, EJS, in), (SJS, T7, LSS, out), (LSS, T8, SJS, in) ] on the endless chain of the wine, and data [ (LSS, T9, out) ] on the endless chain of the wine are written back to consumer XFZ2, wherein D2 records the number of authentications of times including the time when the FW231 was verified, in a detailed manner, represented by the number of times 2.
Step 7: when consumer XFZ2 verifies the article anti-counterfeit authentication code FW232 for the first time at time T12, the system adds 1 to the number of authentications of FW232, records the information (FW 232, T12, D3, 1) as data of FW232, and feeds back the data [ (ZJS, T1, YJS, out), (YJS, T2, ZJS, in), (YJS, T3, EJS, out), (EJS, T4, YJS, in), (EJS, T5, SJS, out), (SJS, T6, EJS, in), (SJS, T7, LSS, out), (LSS, T8, SJS, in) ] on the wine's endless chain and the data [ (LSS, T9, out), (FW 231, T10, D1, 1), (FW 231, T11, D2), (FW 232, T12, D3, 1) ] on the wine's endless chain to consumer z2 in a literal manner.
Step 8: when consumer XFZ2 authenticates final consumer anti-counterfeit authentication code ZF23 for the first time at time T13, the system adds 1 to the number of authentications of ZF23, records the information (ZF 23, T13, D4, 1) as ZF23 data, and data on ancestors WL2 and WL of WL23 [ (ZJS, T1, YJS, out), (YJS, T2, ZJS, in), (YJS, T3, EJS, out), (EJS, T4, YJS, in), (EJS, T5, SJS, out), (SJS, T6, EJS, in), (SJS, T7, LSS, out), (LSS, T8, SJS, in) ] and data on the endless chain of the wine [ (LSS, T9, out), (FW 231, T10, D1), (FW 231, T11, D2, 2), (fw232, T12, D3, 1), (ZF 23, T13, D4, 1) ] are fed back to consumer in the manner of written description z2.
Step 9: when consumer XFZ3 authenticates final consumer anti-counterfeit authentication code ZF23 again at time T14, the system adds 1 to the number of authentications of ZF23, records the information (XF 23, T14, D5, 2) as ZF23 data, and data on ancestors WL2 and WL of WL23 [ (ZJS, T1, YJS, out), (YJS, T2, ZJS, in), (YJS, T3, EJS, out), (EJS, T4, YJS, in), (EJS, T5, SJS, out), (SJS, T6, EJS, in), (SJS, T7, LSS, out), (LSS, T8, SJS, in) ] and data on the endless chain of the wine [ (LSS, T9, out), (FW 231, T10, D1), (FW 231, T11, D2), (232, T12, D3, 1), (ZF 23, T13, D4, 1), (ZF 23, T14, D2) ] are fed back to consumers in the manner described above.
When any incorrect authentication code is used for authentication, the system will feed back to the authenticator, such as "I'm company did not produce a product too much related to the authentication code, please notice the counterfeit product. Further consultation with the merchant or with the company's post-sales service may be provided. "information of". If the authentication number M of an article anti-counterfeiting authentication code or a final consumption anti-counterfeiting authentication code is more than 1, the system feeds back an authentication person with the authentication number M, and if the authentication number M is the first authentication after the coating is scraped, the product is likely to be a fake product. Further consulting with the merchant or with the post-sales service of the company. "information of".
In the above description, "feedback to a in the form of text description" means that the relevant information is fed back in a concise and understandable description. For example, the text of the data [ (ZJS, T1, YJS, out), (YJS, T2, ZJS, in), (YJS, T3, EJS, out), (EJS, T4, YJS, in), (EJS, T5, SJS, out), (SJS, T6, EJS, in), (SJS, T7, LSS, out), (LSS, T8, SJS, in), (LSS, T9, out), (FW 231, T10, D1, 1), (FW 231, T11, D2, 2), (FW 232, T12, D3, 1), (ZF 23, T13, D4, 1) ] may be: the bottle of wine is sent to a first-level dealer YJS by a total dealer ZJS at time T1; the primary dealer YJS receives at time T2 and sends to the secondary dealer EJS at time T3; the secondary dealer EJS receives at time T4 and sends to the tertiary dealer SJS at time T5; the tertiary dealer SJS receives at time T6 and sends to the retailer LSS at time T7; retailer LSS receives at time T8 and sells at time T9; the article authentication code FW231 is authenticated for the first time at the time T10 and D1, and is authenticated again at the time T11 and D2; the article anti-counterfeiting authentication code FW232 is authenticated for the first time at a time T12 and a place D3; the final consumption anti-counterfeit authentication code ZF23 is authenticated for the first time at time T13, location D4 (the product has been consumed at the same time location).
In the whole circulation process of the product, the circulation state of each time of the outlet/inlet is stored in the management system by the information of the block. Each block of the logistics management information storage block contains the previous information (HashBlock) of each level and the information of the logistics of the level is completely recorded, and the anti-counterfeiting authentication information of the product (wine) is recorded in the anti-counterfeiting authentication information block of the product (wine) in the consuming link, so that the anti-counterfeiting authentication information is also called an anti-counterfeiting authentication circulation chain (5-10 in the steps) of the product (wine), and the anti-counterfeiting authentication is realized in the patent 'an article anti-counterfeiting method (ZL 201310277672.2) for realizing multiple authentications through the associated anti-counterfeiting cover code'. As shown in fig. 2, each level of information is Hash (previous level of information), and one level is connected to one level to form an information storage chain, for example, block3=hash (Block 2) =hash (Hash (Block 1))= … …. The method is specifically implemented in that the information block=hash in the retail LSS ([ (ZJS, T1, YJS, out), (YJS, T2, ZJS, in), (YJS, T3, EJS, out), (EJS, T4, YJS, in), (EJS, T5, SJS, out) ]) =hash (Hash ([ (ZJS, T1, YJS, out), (YJS, T2, ZJS, in), (YJS, T3, EJS, out) ]) = … ….
This form of Hash chain ensures that the information of each level of information block is complete and non-tamper-evident. The physical distribution management information storage block and the product (wine) anti-counterfeiting authentication information block are structured as shown in figure 2.
The above is only for illustrating the technical idea of the present invention, and the protection scope of the present invention is not limited by this, and any modification made on the basis of the technical scheme according to the technical idea of the present invention falls within the protection scope of the claims of the present invention.
Claims (5)
1. The logistics management and anti-counterfeiting authentication method with the tracing and tracing functions is characterized by comprising the following steps of:
Step 1: randomly generating a logistics management authentication code, a retail management authentication code, more than one article anti-counterfeiting authentication code and a final consumption anti-counterfeiting authentication code for each article; generating a logistics management authentication code for the outer package of each of the plurality of articles;
the authentication code generation method comprises the following steps: randomly select a group of As input values and secret stored as check values, 15 output values are calculated according to the following formula;
Selecting output values equal to the number of the articles according to the different numbers of the articles as authentication codes of the corresponding articles respectively, and storing other output values in a secret manner as a secret key;
the commodity circulation management authentication code is used for tracking and tracing management of the commodity, the retail management authentication code is used for management of retail time of the commodity, the commodity anti-counterfeiting authentication code is used for anti-counterfeiting authentication in a consumption process, and the final consumption anti-counterfeiting authentication code is used for anti-counterfeiting authentication and time recording when the commodity is finally consumed; the logistics management authentication code, the retail management authentication code, the article anti-counterfeiting authentication code and the final consumption anti-counterfeiting code are randomly generated; the anti-counterfeiting authentication codes of the articles can be arbitrarily multiple according to the needs; all the authentication codes related to the same article have correlation, and information of other authentication codes can be queried from any one authentication code in the correlation; each authentication code is capable of adding ancillary information; the anti-counterfeiting authentication code of the article and the final consumption anti-counterfeiting authentication code are provided with authentication times, and the initial value of the authentication times is 0; when any one of the anti-counterfeiting authentication codes and the final consumption anti-counterfeiting authentication code is authenticated, the authentication times are automatically increased by 1;
The logistics management authentication code, the retail management authentication code, the article anti-counterfeiting authentication code and the final consumption anti-counterfeiting authentication code are printed or posted at corresponding positions in a hidden manner;
The authentication method is that the obtained authentication code is sent to the logistic management anti-counterfeiting authentication system through a communication network by telephone, mobile phone or network inquiry means; the logistics management anti-counterfeiting authentication system authenticates, stores and feeds back related information to the related authentication code;
At any time, if the authentication code used for authentication is incorrect, the system will feed back to the authenticator that the authentication code is incorrect, take care of the warning to prevent counterfeit items and how to make further inquiries; when the authentication times of the anti-counterfeiting authentication code of the article and the final consumption anti-counterfeiting authentication code are larger than 1, the system also feeds back the authentication times to the authenticator and reminds the authenticator to pay attention to the authentication related information;
The anti-counterfeiting authentication system specifically comprises the following authentication methods: the authentication code of the corresponding position is combined with the secret key stored by the system secret to calculate a group of solutions by the following formula ,
If the set of solutionsThe authentication code which is checked is true if the authentication code is the same as the check value stored in the system secret, otherwise, the authentication code is false;
Step 2: the relevant person in the logistics logs in own relevant information to the system while downloading the provided application terminal from the system;
Step 3: the related person in the logistics authenticates the logistics management authentication code on the corresponding package during shipment and delivery; the system stores the related dealer and the authentication time and place information in the auxiliary information of the logistics management authentication code, and feeds back the authentication information of the upper logistics management authentication code when the commodity is delivered;
Step 4: during retail, the retailers take out the retail management authentication codes hidden in the individual packages of the articles for authentication through irreversible operation, and the articles enter a consumption stage; the system stores the time and place information of retailers and articles entering the consumption stage in the auxiliary information of the retail management authentication code, and feeds back the authentication information of all the logistics management authentication codes;
Step 5: in the consumption stage, related consumers except the final consumer can take out a certain article anti-counterfeiting authentication code hidden in the individual package of the article through irreversible operation for authentication; the system stores the consumers and the authentication time and place in the auxiliary information of the anti-counterfeiting authentication code of the article, and feeds back the authentication information of all related logistics management authentication codes, retail management authentication codes and other authenticated anti-counterfeiting authentication codes of the article;
Step 6: when the article is finally consumed, the final consumer takes out the hidden final consumption anti-counterfeiting authentication code through irreversible operation to authenticate; the system stores the time and place information of the final consumption of the article in the auxiliary information of the final consumption anti-counterfeiting authentication code, and feeds back the authentication information of all authentication codes related to the article.
2. The method for logistics management and anti-counterfeiting authentication with tracing function according to claim 1, wherein the hiding mode is coating covering, paper layer covering or disposable packaging.
3. The method for logistics management and anti-counterfeiting authentication with a tracing and tracing function according to claim 2, wherein the final consumption anti-counterfeiting code is hidden in a position which can be taken out when a consumer article is consumed.
4. The method for logistics management and anti-counterfeit authentication with trace and trace source according to claim 1, wherein the logistics anti-counterfeit authentication code is omitted if the distribution channel is recognized as a security standard by the system.
5. A system using the method of any one of claims 1-4, comprising a data processing unit, and a logistics management authentication module, a retail management authentication module, a plurality of article anti-counterfeiting authentication modules, and a final consumption anti-counterfeiting authentication module, each of which is interacted with the data processing unit; wherein,
The logistics management authentication module is used for tracking and tracing management of the articles;
The retail management authentication module is used for managing the retail time of the articles;
the article anti-counterfeiting authentication module is used for anti-counterfeiting authentication in the consumption process;
The final consumption anti-counterfeiting authentication module is used for anti-counterfeiting authentication and time recording when the article is finally consumed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910098485.5A CN109784952B (en) | 2019-01-31 | 2019-01-31 | Logistics management and anti-counterfeiting authentication system and method with tracing and tracing functions |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910098485.5A CN109784952B (en) | 2019-01-31 | 2019-01-31 | Logistics management and anti-counterfeiting authentication system and method with tracing and tracing functions |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109784952A CN109784952A (en) | 2019-05-21 |
CN109784952B true CN109784952B (en) | 2024-04-26 |
Family
ID=66503810
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910098485.5A Active CN109784952B (en) | 2019-01-31 | 2019-01-31 | Logistics management and anti-counterfeiting authentication system and method with tracing and tracing functions |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109784952B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050027300A (en) * | 2003-09-15 | 2005-03-21 | 패스트 에큐러트 디벨로프먼츠 리미티드 | Network-based method and system for anti-counterfeiting merchandise authentication |
CN1866320A (en) * | 2004-12-31 | 2006-11-22 | 四川省宜宾五粮液集团有限公司 | Anti-counterfeit packaging method and apparatus |
CN101593329A (en) * | 2008-05-27 | 2009-12-02 | 息志弘 | A kind of antiforge method for commodities |
CN102622633A (en) * | 2012-03-14 | 2012-08-01 | 江苏联博计算机信息产业有限公司 | Multifunctional digital anti-counterfeiting code tag and applications of multifunctional digital anti-counterfeiting code tag |
CN103400270A (en) * | 2013-07-03 | 2013-11-20 | 陕西科技大学 | Article anti-counterfeiting method for realizing multi-time authentication through associated anti-counterfeiting set codes |
CN103500413A (en) * | 2013-10-16 | 2014-01-08 | 许泽人 | Commodity information definition label, system and consumption information authentication method |
CN104408627A (en) * | 2014-10-31 | 2015-03-11 | 许泽人 | Bottled commodity identification, bottle cap, packing case and production technology |
CN105046500A (en) * | 2015-06-12 | 2015-11-11 | 陈焕佳 | Anti-counterfeiting and logistics monitoring method based on commodity track |
CN105894307A (en) * | 2016-04-01 | 2016-08-24 | 杨直玮 | Holographic anti-fake query system and anti-fake technology query application method thereof |
CN106600292A (en) * | 2016-12-08 | 2017-04-26 | 上海尚源信息技术有限公司 | Commodity anti-bugsell management method |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8714442B2 (en) * | 2012-04-19 | 2014-05-06 | Zortag Inc | System for and method of securing articles along a supply chain |
CN105184576A (en) * | 2015-07-17 | 2015-12-23 | 吕锦明 | Electronic anti-fake system and electronic anti-fake method thereof |
US10176481B2 (en) * | 2015-12-21 | 2019-01-08 | Beston Technologies Pty Ltd | Method and apparatus for managing and providing provenance of product using blockchain |
-
2019
- 2019-01-31 CN CN201910098485.5A patent/CN109784952B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050027300A (en) * | 2003-09-15 | 2005-03-21 | 패스트 에큐러트 디벨로프먼츠 리미티드 | Network-based method and system for anti-counterfeiting merchandise authentication |
CN1866320A (en) * | 2004-12-31 | 2006-11-22 | 四川省宜宾五粮液集团有限公司 | Anti-counterfeit packaging method and apparatus |
CN101593329A (en) * | 2008-05-27 | 2009-12-02 | 息志弘 | A kind of antiforge method for commodities |
CN102622633A (en) * | 2012-03-14 | 2012-08-01 | 江苏联博计算机信息产业有限公司 | Multifunctional digital anti-counterfeiting code tag and applications of multifunctional digital anti-counterfeiting code tag |
CN103400270A (en) * | 2013-07-03 | 2013-11-20 | 陕西科技大学 | Article anti-counterfeiting method for realizing multi-time authentication through associated anti-counterfeiting set codes |
CN103500413A (en) * | 2013-10-16 | 2014-01-08 | 许泽人 | Commodity information definition label, system and consumption information authentication method |
CN104408627A (en) * | 2014-10-31 | 2015-03-11 | 许泽人 | Bottled commodity identification, bottle cap, packing case and production technology |
CN105046500A (en) * | 2015-06-12 | 2015-11-11 | 陈焕佳 | Anti-counterfeiting and logistics monitoring method based on commodity track |
CN105894307A (en) * | 2016-04-01 | 2016-08-24 | 杨直玮 | Holographic anti-fake query system and anti-fake technology query application method thereof |
CN106600292A (en) * | 2016-12-08 | 2017-04-26 | 上海尚源信息技术有限公司 | Commodity anti-bugsell management method |
Non-Patent Citations (1)
Title |
---|
孔祥磊 ; .药品防伪追溯平台 树起药品安全屏障.印刷技术.2013,(第22期),全文. * |
Also Published As
Publication number | Publication date |
---|---|
CN109784952A (en) | 2019-05-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109345264B (en) | Wine product traceability anti-counterfeiting system and method based on block chain | |
CN109478305A (en) | Information system for item authentication | |
US9721259B2 (en) | Rules-based selection of counterfeit detection techniques | |
CN109767247A (en) | A kind of distribution commodity traceability system and source tracing method | |
CN107292629A (en) | Anti-counterfeit tracking verification method based on block chain and the device using this method | |
CN105654316A (en) | NFC product anti-counterfeiting traceability system and anti-counterfeiting traceability method thereof | |
CN109598540A (en) | A kind of advertisement accurately method for pushing and advertisement accurately supplying system | |
WO2017101168A1 (en) | Product anti-counterfeiting authentication and product quality tracing method | |
CN104854642A (en) | Method and apparatus for marking manufactured items using physical characteristic | |
CN106709734A (en) | Multiple-two-dimensional code tracing method based on digital identity and system thereof | |
AU2018200467A1 (en) | Method and system for verifying of the authenticity of a consumer product | |
CN103093361A (en) | Commodity double-layer anti-fake method based on technologies of internet of things | |
EA030541B1 (en) | Method and apparatus for marking and accounting manufactured items in a batch | |
CN206422795U (en) | O f chain product information system based on third party's CA system authentications | |
CN103400270A (en) | Article anti-counterfeiting method for realizing multi-time authentication through associated anti-counterfeiting set codes | |
CN111091399A (en) | Block chain-based fidelity traceability method and system for fast-selling goods | |
CN112446450A (en) | Entity article ownership management method and device based on block chain and electronic equipment | |
Bhatnagar et al. | Product traceability using blockchain | |
CN101356538A (en) | Method of authentication of items put into circulation field | |
Shwetha et al. | A comprehensive review of blockchain based solutions in food supply chain management | |
CN103996122A (en) | Merchandise anti-counterfeiting system and method | |
CN202533999U (en) | Two-dimensional code anti-counterfeit system | |
US20140172636A1 (en) | Identification of counterfeit goods | |
CA2339894A1 (en) | Authentication technology of digital barcode & numerical coding system | |
CN109784952B (en) | Logistics management and anti-counterfeiting authentication system and method with tracing and tracing functions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |