CN103077467B - A kind of method and system verifying authenticity of products - Google Patents
A kind of method and system verifying authenticity of products Download PDFInfo
- Publication number
- CN103077467B CN103077467B CN201310034533.7A CN201310034533A CN103077467B CN 103077467 B CN103077467 B CN 103077467B CN 201310034533 A CN201310034533 A CN 201310034533A CN 103077467 B CN103077467 B CN 103077467B
- Authority
- CN
- China
- Prior art keywords
- code
- source
- product
- security code
- trace
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention discloses a kind of method verifying authenticity of products, has and arrange uniquely trace to the source code and unique security code on the surface be verified product, described in trace to the source code and described security code has unique incidence relation and one-to-one relationship;In the process, the first mobile scanning terminal is verified trace to the source code and the security code of product surface, and trace to the source described in transmission code and security code are to the webserver;The described webserver according to described in trace to the source code and security code judge to be verified whether product is true, if, trace to the source described in arranging code and the security code mandate to the first mobile terminal, information and the product information that judged result is "true" is sent to described first mobile terminal, otherwise, sending judged result to described first mobile terminal is the information of "false".Invention additionally discloses a kind of system verifying authenticity of products.Such scheme by the mandate to the first mobile terminal, can improve the reliability of authenticity of products checking.
Description
Technical field
The present invention relates to authenticity of products calibration technology, particularly relate to be able to verify that the method and system of authenticity of products.
Background technology
Check authenticity of products, i.e. a product false proof, extremely important for safeguarding the normal order of the market economy, therefore,
Try to achieve a method that can effectively verify authenticity of products, be the target of people's long-sought.Traditional much verifies product
The technology of the true and false is difficult to this target.Such as laser color-changing anti-counterfeit, hologram pattern is false proof, temperature discoloring is false proof, special
Plant the technology such as version antiforge, owing to anti-counterfeiting technology randomness is poor, do not possess uniqueness, and, these technology use
Means due to technology content relatively low, be easily cracked and grasp, or easily being replicated by fake producer so that through so
Anti-counterfeiting technology process product, it is difficult to find its true and false of effective method validation.
Later, there is Crinis Carbonisatus to understand cipher anti-fake method, i.e. higher for production technical difficulty, or spy can only be used
Different directions or tendencies method or employing any special measures could identify the label of its effectiveness, with technical difficulty or the identification spy of this forming label
Different means auxiliary checking authenticity of products.For example with advanced laser antifalsification technology converted products password, form digital code anti-false
Label, texture anti-fake label etc., or the anti-counterfeiting technology converted products password such as safety line.But, these technology only increase
Add and manufactured label or identify the difficulty of label, still can not effectively verify the true and false of product.
Further, there is the method that Crinis Carbonisatus understands checking authenticity of products based on communication network.With based on computer network dark
As a example by code anti-counterfeiting method, the method blocks the anti-forge cipher of product with opaque barrier bed so that when barrier bed is intact,
Anti-forge cipher can not visually obtain, thus forms false proof private mark.When checking uses the authenticity of products of private mark mark, it is necessary to
Destroy private mark barrier bed, i.e. after scraping barrier bed off, utilize anti-forge cipher inquiry computer network (other example to be adopted
With mobile communications network, or fixed telephone network etc.) data base, it is achieved the authenticity verification of this product.But, when described secretly
The barrier bed of code is destroyed, after making anti-forge cipher become plain code, it is possible to utilize this plain code to replicate out a large amount of private mark, institute
The product of this private mark useful mark, the no matter true and false, can be obtained by computer network inquiry, thus verify that product is
Very.Visible, this method is also difficult to stop fake, and is difficult to effectively verify the true and false of product.It addition, at product stream
In logical link, the barrier bed of private mark can not be destroyed, so when final consumer finds fake products, substantial amounts of
Fake products is come into the market in a large number by complicated intermediate links.
Visible, there are problems and cause antifalse effect poor in existing anti-counterfeiting technology, and authenticity of products is difficult to effectively be verified,
Therefore, a kind of effective, quick and easily operated anti-counterfeiting technology it is badly in need of to meet people to false proof demand.
Summary of the invention
The purpose of the embodiment of the present invention, is to provide a kind of method and system that can effectively verify authenticity of products, to provide
A kind of effective, convenient and easily operated anti-counterfeiting technology meets people to false proof demand.
The method of the checking authenticity of products that the embodiment of the present invention provides, has on the surface be verified product and arranges uniquely
Trace to the source code and unique security code, described in trace to the source code and described security code has unique incidence relation and one-to-one relationship;
In the process:
First mobile scanning terminal is verified trace to the source code and the security code of product surface;
Described first mobile terminal traces to the source code and security code to the webserver described in sending;
The described webserver according to described in trace to the source code and security code judge to be verified whether product is true, if it is, arrange
Described trace to the source code and the security code mandate to the first mobile terminal, sending judged result to described first mobile terminal is "true"
Information and product information, otherwise, to described first mobile terminal send judged result be the information of "false".
Wherein, the webserver judges to be verified whether product is true as steps described below:
Same product record in code and security code whether correspondence database of tracing to the source described in judgement, if the most corresponding, confirms quilt
Checking product is "false", otherwise, confirms that being verified product is "true".
In second preferred embodiment of the method, wherein, trace to the source described in judge code and security code whether correspondence database
In same product record step before, also comprise the steps:
Judging whether described security code meets characterization rules, if do not met, confirming that being verified product is "false", is arranged
Described code of tracing to the source is invalid, otherwise, continues executing with same product in code and security code whether correspondence database of tracing to the source described in judgement
The step of product record.
In the 3rd preferred embodiment of the method, wherein, judging whether described security code meets the step of characterization rules
And code and security code whether correspondence database of tracing to the source described in judging also includes following between the step of same product record
Step:
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be tested
Card product is "false", otherwise, continues executing with same product in code and security code whether correspondence database of tracing to the source described in judgement
The step of product record;
Or, also comprised the steps: before judging the step whether described security code meets characterization rules
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be tested
Card product is "false", otherwise, continues executing with the step judging whether described security code meets characterization rules.
In the 4th preferred embodiment of the method, if described in the trace to the source Q-character of code and described security code do not meet setting
Condition, then, arrange described in trace to the source code and security code invalid.
In the 5th preferred embodiment of the method, if described in the trace to the source Q-character of code and described security code meet bar be set
Part, then, it is judged that the terminal of described first mobile terminal whether first scan security code or authorization terminal, if it is not, really
Recognize that to be verified product be "false", otherwise, continue executing with in code and security code whether correspondence database of tracing to the source described in judgement with
The step of one product record, or, continue executing with the step judging whether described security code meets characterization rules.
In the 6th preferred embodiment of the method, also include:
First mobile terminal sends the authorized application for the second mobile terminal to the webserver;
The described webserver judges that described first mobile terminal is traced to the source the mandate of code and security code described in having obtained,
Code and the security code mandate to the second mobile terminal if it is, trace to the source described in arranging, otherwise, to described first mobile terminal
Send refusal and the information of mandate is set.
In the 7th preferred embodiment of the method, whether the webserver judges to be verified product as steps described below and is
True:
Whether code of tracing to the source described in judgement meets characterization rules, if it does not, confirm that product is false, otherwise,
Product record in code of tracing to the source described in judgement whether correspondence database, if it does not, confirm that product is false, otherwise,
Judge whether described security code meets characterization rules, if it does not, confirm that product is false, otherwise,
Judge the product record in described security code whether correspondence database, if it does not, confirm that product is false, otherwise,
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be tested
Card product is "false", otherwise, confirms that being verified product is "true";Or, it is judged that described first mobile terminal is the most first
The terminal of secondary scanning security code or authorization terminal, if it is not, confirm that being verified product is "false", otherwise, confirm quilt
Checking product is "true".
The system of the checking authenticity of products that the embodiment of the present invention provides, including the webserver, the first mobile terminal and mark
Device is set, wherein:
Described mark arranges device, arranges uniquely trace to the source code and unique security code on the surface be verified product, described
Trace to the source code and described security code has unique incidence relation and one-to-one relationship;
Described first mobile terminal includes scanning processor, is verified trace to the source code and the security code of product surface for scanning,
And trace to the source described in sending code and security code are to the webserver;
The described webserver, including Database Unit, the first judging unit and the first granted unit, wherein,
Described Database Unit, is verified product information, and trace to the source code and the security code of correspondence for storage;
Described first judging unit, for according to described in trace to the source code and security code judge to be verified the true and false of product, and,
The true and false information being verified product is sent to described mobile terminal, and, it is true time being verified product, to described first
Granted unit sends trigger message
Described first granted unit, for according to the trigger message of described first judging unit, arrange described in trace to the source code and anti-
The pseudo-code mandate to the first mobile terminal.
In another preferred system embodiment, described first mobile terminal also includes authorized application unit, for net
Network server sends the authorized application for the second mobile terminal;And, the described webserver also includes the second judgement list
Unit and the second granted unit, wherein:
Described second judging unit, for after the authorized application receiving described first mobile terminal, it is judged that described first moves
Dynamic terminal is traced to the source the mandate of code and security code described in having obtained, if it is, indicate described second granted unit to arrange
Described trace to the source code and the security code mandate to the second mobile terminal, otherwise, sending refusal to described first mobile terminal is the
Two mobile terminals arrange the information of mandate.
The embodiment provided according to the present invention, owing to the described webserver is in code and the security code judgement of tracing to the source described in basis
Be verified product be whether very after, arrange described in trace to the source code and the security code mandate to the first mobile terminal, as such, it is possible to
Effectively control to trace to the source described in being operable to the quantity of the first mobile terminal of code and security code relevant information, can lead to further
Cross the rank to the first mobile terminal to control, improve the reliability of authenticity of products checking.
The embodiment of the present invention additionally provides the technological means of other products authenticity verification, and these technological means are combined, it is possible to from
The true and false of all angles checking product, blocks the leak of fake products.Technique effect that these technological means are brought and analysis,
Further illustrate in this paper detailed description of the invention part.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
In technology description, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is used only for
Embodiments of the invention are described, owing to figure containing the information of the embodiment of the present invention, for those of ordinary skill in the art
From the point of view of, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these drawings and Examples.
Fig. 1 is the exemplary system figure using the embodiment of the present invention;
Fig. 2 is the method for the invention embodiment 1 flow chart;
Fig. 3 is the method for the invention embodiment 1 part steps flow chart;
Fig. 4 is system embodiment 1 block diagram of the present invention;
Fig. 5 is system embodiment 2 block diagram of the present invention.
Detailed description of the invention
Understandable for enabling the objects, features and advantages of the embodiment of the present invention to become apparent from, real with concrete below in conjunction with the accompanying drawings
The present invention is further detailed explanation to execute mode.
It it is the example using embodiment of the present invention system with reference first to Fig. 1, Fig. 1.According to the instruction of Fig. 1, this is
System includes three parts being connected to each other, and the server zone 1 connected by the Internet is connected with each other by mobile Internet
Mobile terminal group 2, and end 3 is set for be verified that product arranges identifying code.Wherein, arrange end 3 to be generally populated
At product producer or distributor, in order to be one and produced or identifying code will be set product sold, because of
This, after the embodiment of the present invention is widely used, the quantity arranging end 3 should have a lot.Shifting in mobile terminal group 2
Dynamic terminal also has a lot, such as mobile terminal 21,22, and these mobile terminals are typically distributed at distributor and consumer's hands
In, so could facilitate the true and false at products in circulation link checking product.The information spinner that authenticity of products checking uses or produces
Server zone 1 to be stored in, has some information also can store in the terminal.Along with the use of the embodiment of the present invention is advised
Mould is different, and the webserver 11,12 in server zone 1 can be one, it is also possible to is distributed across different location
Multiple, they completely by quantity of information, function, possessory difference and different.Such as, first network server 11 is made
For product information server, be used for storing product information record, this record with trace to the source code and security code the most corresponding;First
The webserver 12 is as product anti-fake server, for storing the anti-counterfeiting information record of product.But, in the present invention
Embodiment in, the webserver 11,12 in server zone 1 is the same webserver, these difference not shadow
Ring use or the enforcement of the embodiment of the present invention.The embodiment of the method for the invention is applied, with regard to structure in Fig. 1 example system
Become a set of and be verified as main purpose with product false proof, and a set of false proof the tracing to the source providing product to trace to the source information searching function has been
System.
According to the instruction of the method for the invention embodiment 1 described in Fig. 2, first certain product producer or distributor
The identifying codes that end 3 arranges product are set.Specifically, on the surface being verified product, it is, will sell
Or on the product surface produced, identifying code is set.Described identifying code includes that the code of tracing to the source with uniqueness is with unique
The security code of property.It is further preferred to be also that each product generates different identity ID, this ID also has uniqueness, with side
The most visually check.The uniqueness of identifying code, it is possible to avoid to carry out false proof for single product in existing anti-counterfeiting technology,
Reduction can copy the probability of code and/or security code of tracing to the source by batch duplicating.Therefore, in the enforcement of the method for the invention
In example, it is verified product for each, the most unduplicated code and the security code of tracing to the source of its identifying code all correspondences so that test
Can be verified by uniqueness during card, determine the true and false of product.In actual application, generate unique for being verified product
The mode of security code can have multiple, and this does not repeats.
Described code of tracing to the source is plain code, i.e. described in code of tracing to the source initially visually the most visible.In content, it leads to commonly used digital or letter representation;
Can also encryption, on the digital content of tracing to the source after encryption still with numeral or letter representation, in view of algorithms for encryption and decryption
The most ripe, this does not repeats.In form, with visually can not the one-dimensional or Quick Response Code of Direct Recognition representing.Wherein, at this
The Quick Response Code using digital content of tracing to the source to generate in example represents.
In this example, described security code is by the private mark after the covering of opaque frangible coating.By covering of opaque frangible coating
Lid, carries out secrecy processing to security code, and the security code making setting is the most not visible, that is, make security code covering
Cover after opaque coating thereon is destroyed the most visible, it is therefore an objective to the false proof effect of associating of trace to the source described in raising code and security code
Really.Described trace to the source code and security code can be arranged on and be verified product surface Anywhere, in this example, described in trace to the source code
It is provided above in opaque frangible coating.So, scrape opaque coating off, when utilizing end of scan to carry out authentication,
Can focus on simultaneously and scan trace to the source code and security code, two codes are verified simultaneously.Physically, due to described
Code of tracing to the source is printed on a kind of special frangible antifalsification label (i.e. opaque coating), makes fake producer be difficult to batch duplicating.
In other example, described in trace to the source code and security code is arranged on the diverse location of product surface, it is real that this does not affect the present invention
Execute the enforcement of example.
Trace to the source code described in it addition, and security code can be directly arranged at and be verified on product external packaging surface, or be arranged at by
On the surface of checking product itself, or it is arranged at and is verified in the data that product is subsidiary, such as description etc., as long as can be
It is verified product end to find, as set-up mode, position is set, the embodiment of the present invention such as form is set this is not done
Limit, for example, it is possible to directly arrange or arranged by label.
In this example, described in trace to the source code and described security code has unique incidence relation and a relation one to one, wherein,
Described " incidence relation " refers to that concrete code of tracing to the source security code the most concrete with is related, described " one a pair
Should be related to " refer to that this contact has uniqueness, in this manner it is possible to utilize unique incidence relation and therebetween
The uniqueness that one corresponding relation is implemented being verified product is verified or combines false proof.
Specifically, code of tracing to the source described in includes following information: uniqueness encodes, product condition code.Wherein, this example specifies
Trace to the source code rear 6 for product condition code.Described security code also includes that uniqueness encodes, the uniqueness coding difference of the two,
But but ensure inherent relatedness by a kind of special create-rule.This special create-rule embodies institute in this example
Trace to the source code and the unique incidence relation of security code stated, to those skilled in the art, it is easy to it is this special to realize
Rule.Trace to the source code described in no matter and what form described security code uses arrange or show, need to have unique between them
Incidence relation and one-to-one relationship.
In this example, code of tracing to the source is all by specific coding rule combination producing, in coding rule, all numbers with security code
Position is by specific logic rule, and random number and basic number are also deposited.As: middle a few bit digital use random digit, other
Bit digital is derived by these random digits.Finally, the numeral that coding rule is generated by code of tracing to the source adds the preceding paragraph URL
The Quick Response Code of link generation standard, and the bar code of the combination producing standard of the numeral that coding rule is generated by security code.
Above-mentioned Quick Response Code of tracing to the source also has following particular utility, is carried out, by other common Quick Response Code scanning software, code of tracing to the source
Scanning, it is possible to get one section of query link, networking can get the corresponding of server end return after opening this link
Product is traced to the source information.
The surface be verified product has uniquely trace to the source code and unique security code have been set, verified at anti-fake product
Time, according to Fig. 2, in step S201, the first mobile scanning terminal is arranged on and is verified the special false proof of product surface and traces back
Code of tracing to the source on the label of source.Then scrape or destroy opaque frangible coating off in step S202, make security code completely visual,
Again with security code described in the first mobile scanning terminal.Or, in being embodied as, step S201 and step S202 are permissible
Being combined into a step, i.e. after scraping opaque frangible coating off, the first mobile terminal is to tracing to the source code and being exposed to outward
Security code is scanned simultaneously.
In step S203, described first mobile terminal send described in trace to the source code and security code to the webserver.
In step S204, the described webserver according to described in trace to the source code and security code judge to be verified whether product is true,
Code and the security code mandate to the first mobile terminal if it is, trace to the source described in arranging in step S205, and at rapid S206
Information and the product information that judged result is "true" is sent, otherwise, at rapid S207 to institute to described first mobile terminal
Stating the first mobile terminal and sending judged result is the information of "false".Finally terminate in step S208.
Step S205 is traced to the source code and the security code mandate to the first mobile terminal described in arranging, it is simply that code of tracing to the source described in foundation
With security code and the corresponding relation of the first mobile terminal so that it is become follow-up can use described in trace to the source code and security code inquiry
The legal terminal of information.Can also be further that it is arranged based on described code of tracing to the source according to other condition of this mobile terminal
With the information operating authority of security code, such as, safeguard trace to the source described in data base code and the authority of security code relevant information.
Such as, if this first mobile terminal is the mobile terminal of manufacturer, can be its arrange increase, delete and inquire about described
Trace to the source code and the authority of security code relevant information;If this first mobile terminal is the mobile terminal of consumption, can be that it sets
Put trace to the source described in inquiry code and the authority of security code relevant information, preferential inquiry times is even set, etc..At one
In specific embodiment, by pre-registering, and the mandate of the other mobile terminal of system administrator level, arrange for the
Trace to the source code and the authority of security code relevant information described in one mobile terminal operation.
In another embodiment, arrange in step S205 described in trace to the source code and the security code mandate to the first mobile terminal
Before, also trace to the source described in judgement code and the quantity of the most authorized first mobile terminal of security code, when this quantity exceedes rule
Fixed numerical value, such as 5, the most no longer for this first mobile terminal arrange described in trace to the source the mandate of code and security code, the most just
Mandate to it is set.In this way, trace to the source described in controlling to be operable to code and the first of security code relevant information
The quantity of mobile terminal, makes authenticity of products verify more reliability.In an embodiment improved, in step S205,
Also judge the rank of this first mobile terminal, to determine whether in this rank, described in trace to the source code and security code the most authorized
The quantity of the first mobile terminal whether exceed the numerical value of regulation, if not less than, arrange described in trace to the source code and security code pair
The mandate of the first mobile terminal, otherwise refusal arranges mandate.In view of the Authorized operation relating to rank and quantity easily realizes,
This repeats no more.
In step S204, the webserver judges to be verified whether product is true as steps described below, with reference to Fig. 3:
According to Fig. 3, first open product information database in step S301, then search, in step S302, code of tracing to the source right
The record answered, then searches, in step S303, the record that security code is corresponding, then in code of tracing to the source described in the judgement of step S304
Same product record in the corresponding record record corresponding with described security code whether data base, if it is, in step
S305 determines that product is true, then goes to step S205;Otherwise, determine that product is false in step S306, then go to step
S207.Wherein it is determined that product for really operate can have multiple, such as, arrange trace to the source code and security code be really indicate,
Code is traced to the source and security code recorded in " true code " data base by described, etc..In like manner, determine that the operation that product is false can
Multiple to have, such as, arrange and trace to the source code and security code is false mark, traces to the source code and security code recorded " false by described
Code " in data base, etc..
In other embodiments based on embodiment 1, it is also possible in step S205, arrange described in code of tracing to the source invalid, and
In step S207, arrange described in trace to the source code and security code invalid, be so advantageously implemented more useful function.Also
Other useful function more, such as, " prize drawing " function can be realized.Specifically can increase by one in step S206
Sub-step, by first scan or the information of the mobile terminal of legal scanning, as mobile number or SIM number etc. are sent to one
The individual webserver, according to the management record of the described webserver, when this record meets condition, such as this mobile terminal
First scan is traced to the source code or security code, i.e. may participate in prize drawing, mobile terminal feeds back some and rewards, and such as mobile terminal fills
Value, the so beneficially verifier of authenticity of products scan described security code in time, with code of tracing to the source described in the most invalid, stop
Product is palmed off.
Equally, after step S207 determines that being verified product is vacation, the information that product is "false", Yi Jixian can be shown
Show that security code is invalid, it is also possible to the result data sending product are moved to the webserver specified and/or other appointment
Dynamic terminals etc., carry out fake products report.Etc..
In the second embodiment based on embodiment 1, if described in trace to the source code and security code does not has in correspondence database same
Individual product record, illustrates that the product being verified is false, but, this vacation is that product information does not has input database, or
Trace to the source code or security code is that vacation is the most uncertain?Therefore, in this example, also to judge whether described security code meets characterization rules,
If do not met, at least explanation code of tracing to the source corresponding to security code is wrong, therefore, arrange described in code of tracing to the source invalid.
Concrete scheme is: the step of same product record in code and security code whether correspondence database of tracing to the source described in judging
Before Zhou, also comprise the steps:
Judging whether described security code meets characterization rules, if do not met, confirming that being verified product is "false", is arranged
Described code of tracing to the source is invalid, otherwise, continues executing with same product in code and security code whether correspondence database of tracing to the source described in judgement
The step of product record.
Characterization rules described here, can be the coding rule of code and security code of tracing to the source, as it was previously stated, in coding standard,
All numerical digits press specific logic rule, and random number and regular number are also deposited.As: middle a few bit digital use random digit,
Other bit digital is derived by these random digits, if the composition of described security code does not meets above-mentioned regulation, and no matter institute
Stating whether code of tracing to the source meets rule, it is all invalid.It addition, described characterization rules can also be other encryption rule,
Such as, trace to the source code and/or the security code of coding standard will be met, be formed after rerunning with other any AES
Trace to the source code and/or the security code of encryption, therefore, characterization rules is exactly described AES.In view of those skilled in the art
The most easily realizing described characterization rules, this repeats no more.
Further, if security code has been scanned identifying, the most now security code and corresponding code of tracing to the source will be by automatic nothings
Effect, later if it find that have and again trace to the source code and behavior that security code is identified to same, then explanation this group very possible
Tracing to the source code and security code is being forged the most, corresponding commodity are very likely false.System will point out user to be somebody's turn to do
Group is traced to the source code and the most identified mistake of security code, the information such as beware of imitations.So, the difficulty of fraud will be greatly increased and become
This, improve the reliability of authenticity of products checking.
In further embodiment 3 based on embodiment 2, judging whether described security code meets characterization rules
Step and code and security code whether correspondence database of tracing to the source described in judging also include between the step of same product record
Following step:
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be tested
Card product is "false", otherwise, continues executing with same product in code and security code whether correspondence database of tracing to the source described in judgement
The step of product record;
Or, also comprised the steps: before judging the step whether described security code meets characterization rules
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be tested
Card product is "false", otherwise, continues executing with the step judging whether described security code meets characterization rules.
In embodiment 3, if described in the trace to the source Q-character of code and described security code do not meet the condition of setting, can be direct
Trace to the source described in arranging code and security code invalid.
In further embodiment 4 based on embodiment 3, if described in trace to the source code and the Q-character of described security code
Meet the condition of setting, then, it is judged that the terminal of described first mobile terminal whether first scan security code or authorization terminal, as
Fruit the most not, confirms that to be verified product be "false", otherwise, continue executing with trace to the source described in judgement code and security code the most corresponding
The step of same product record in data base, or, continue executing with and judge whether described security code meets characterization rules
Step.
In whether the Q-character of code and described security code of tracing to the source described in judging meets the embodiment of the condition of setting, described in trace to the source
Code and security code also include the Q-character with unique association relation, by the unique association relation between Q-character,
It also is able to judge to be verified the true and false of product.Whether the Q-character of code and described security code of tracing to the source described in judging described in this example accords with
Conjunction arranges condition, is substantially whether the content judging described Q-character has unique incidence relation.In this example, described
Unique association relation refer to described in the trace to the source Q-character of code and described security code equal.
It may be noted that this incidence relation is different in various embodiments, but its content is for art technology
The most easily realize really for personnel.Such as, in an other embodiment, trace to the source code and security code all
Represent by numeral, but after code of tracing to the source, 5 bit digital are plus a specific numerical value, such as equal to after security code 5 after adding 1
The numerical value of position, this explanation, described in trace to the source code " numerical value " and unique corresponding relation that security code " numerical value " has, permissible
It is used for verifying the uniqueness of product.Trace to the source described in it can thus be seen that code and described security code Q-character particular association close
System can be randomly provided, and " equal " is simplest incidence relation.So it is very beneficial for the unique of different batches product
Property or fake certification, as long as increasing explanation or the instruction of described particular kind of relationship in code of tracing to the source, it is possible to described by judging
Trace to the source the Q-character of code and whether the Q-character of described security code meets this relation, learn the true and false being verified product, from
And increase the reliability of product false proof further, also can increase to illegal product and manufacture the difficulty of legal mark.
In different examples, as required, the described webserver can also be following arbitrarily to the first mobile terminal transmission
The data of combination: true and false mark and the described product condition code that is verified, and/or code of tracing to the source, security code, and/or scanning figure
Sheet and/time, place (such as the GPS elements of a fix) data, etc..Utilize above-mentioned information, it is possible to test from different perspectives
The true and false of card product, and trace fake products.
In above-described embodiment, if described in trace to the source code and/or security code viewable numbers and/or character plain code is expressed, it is possible to
With with bar code, the private mark such as Quick Response Code or password is expressed.
In order to improve the reliability of authenticity of products checking further, in another embodiment, though described in trace to the source code and institute
The coding characteristic stating security code meets ad hoc rule, also to judge described first mobile terminal whether first scan security code
Terminal or the terminal of the authorization terminal by first scan security code, if it is not, confirm that being verified product is "false",
Otherwise, confirm that being verified product is "true".
In the actual application of above-described embodiment, owing to Antiforge inquiry is required for carrying out at the links of products in circulation, because of
This, can not limit and perform the mobile terminal that inquiry operates, so that authenticity of products verification operation has convenience, meanwhile,
Limit the mobile terminal performing inquiry operation again, it is to avoid the randomness of authenticity of products verification operation, thus it is true to increase product
The reliability of pseudo-checking.Traditional method uses the means of registered mobile terminal in the webserver to realize above-mentioned requirements, but
It is the mobile terminal the most still limiting and performing inquiry operation, and the raising to authenticity of products verification operation convenience is non-
The most limited, and it is difficult to control to legitimacy and the invalid mobile terminal data of constantly accumulation of mobile terminal.Such as: circulation
Link performs the mobile terminal of inquiry and the quantity of mobile terminal is all uncertain, no matter mobile terminal immediately register or
Pre-register, all can cause the spreading unchecked of random and invalid mobile terminal data of authenticity of products verification operation.
Following step is used to solve this problem in one embodiment of the invention:
First, the first mobile terminal sends the authorized application for the second mobile terminal to the webserver, and described network takes
Business device is according to this application, it is judged that described first mobile terminal obtained described in trace to the source the mandate of code and security code, as
Fruit is, arrange described in trace to the source code and the security code mandate to the second mobile terminal, otherwise, send out to described first mobile terminal
Send refusal that the information of mandate is set.
In another example, the webserver also judge described in trace to the source the quantity of mobile terminal of code and security code mandate,
Decide whether the mandate to the second mobile terminal.It addition, the webserver can also judge the mandate of the first mobile terminal
Number of times, the quantity of the second mobile terminal authorized when its application exceedes the quantity pre-set, such as 5, illustrate this first
The number of times that mobile terminal can authorize has been used up, no longer to the second current mobile terminal mandate, or, delete the earliest
Authorization terminal data after, then to the second current mobile terminal mandate.Etc..
In the above example, the first mobile terminal is the legal terminal that can pre-set, and it is typically manufacturer or sells
The mobile terminal of business, it is also possible to be the terminal of first scan security code, or the mobile terminal by first scan security code
The mobile terminal authorized, the quantity of these mobile terminals is the most limited, and can be by its rank, and decision can give
Mandate number of times, with this improve authenticity of products checking reliability.Consumer arbitrary for intermediate links mobile terminal comes
Say, it is possible to obtain the mobile terminal quantity authorized the most limited, and targetedly, therefore, it is possible to preferably solve existing method
In, the technical problem that the random and invalid mobile terminal data of authenticity of products verification operation spreads unchecked.
In superincumbent all examples, if it is determined that it is false for being verified product, can take various operation, example as required
As sent the information that report " is palmed off ", reality can also realize more operate, such as, set up " blacklist " number
According to storehouse.In like manner, if it is determined that it is true for being verified product, can take various operation, such as " advertisement putting " as required,
Etc..
To be whether that genuine method has multiple for judging to be verified product to it may be noted that the webserver, and every kind of method is all
Combining according to a definite sequence of one or more judgment rules such that it is able to obtain multiple higher checking authenticity of products can
By property.
Such as, in an embodiment of the method, the webserver judges to be verified whether product is true as steps described below:
Whether code of tracing to the source described in judgement meets characterization rules, if it does not, confirm that product is false, otherwise,
Code of tracing to the source described in judgement is the most effective, if it does not, confirm that product is false, otherwise,
Product record in code of tracing to the source described in judgement whether correspondence database, if it does not, confirm that product is false, otherwise,
Judge whether described security code meets characterization rules, if it does not, confirm that product is false, otherwise,
Trace to the source described in judgement code and security code combines the combination record in whether correspondence database, if it does not, confirm that product is
Vacation, otherwise,
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be tested
Card product is "false", otherwise, confirms that being verified product is "true".
In another embodiment of the method, the webserver judges to be verified whether product is true as steps described below:
Whether code of tracing to the source described in judgement meets characterization rules, if it does not, confirm that product is false, otherwise,
Product record in code of tracing to the source described in judgement whether correspondence database, if it does not, confirm that product is false, otherwise,
Judge whether described security code meets characterization rules, if it does not, confirm that product is false, otherwise,
Judge the product record in described security code whether correspondence database, if it does not, confirm that product is false, otherwise,
Judge terminal or the authorization terminal of described first mobile terminal whether first scan security code, if it is not, confirm quilt
Checking product is "false", otherwise, confirms that being verified product is "true".
In the 3rd embodiment of the method, the webserver judges to be verified whether product is true as steps described below:
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be tested
Card product is "false", otherwise,
Judge terminal or the authorization terminal of described first mobile terminal whether first scan security code, if it is not, confirm quilt
Checking product is "false", otherwise, confirms that being verified product is "true".
In the 4th embodiment of the method, the webserver judges to be verified whether product is true as steps described below:
Whether code of tracing to the source described in judgement meets characterization rules, if it does not, confirm that product is false, otherwise,
Product record in code of tracing to the source described in judgement whether correspondence database, if it does not, confirm that product is false, otherwise,
Judge whether described security code meets characterization rules, if it does not, confirm that product is false, otherwise,
Judge the product record in described security code whether correspondence database, if it does not, confirm that product is false, otherwise,
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be tested
Card product is "false", otherwise,
Judge terminal or the authorization terminal of described first mobile terminal whether first scan security code, if it is not, confirm quilt
Checking product is "false", otherwise, confirms that being verified product is "true".
Also having the combination of other more means, in view of with reference to above-described embodiment, those skilled in the art are fully able to enough realities
Existing, this repeats no more.
It is verified in the technical scheme of authenticity of products in above-mentioned judgement, it is possible to what raising authenticity of products was verified from different perspectives can
By property.Such as, do not meet characterization rules iff described code of tracing to the source, due to code personation of only tracing to the source, then can determine whether this
It it is rudimentary product personation;If code symbol of tracing to the source described in closes characterization rules, but does not has the record of correspondence in data base, says
Bright this traces to the source code or the code of tracing to the source that personation is cancelled, or known code system of tracing to the source makes rule, is therefore the product personation of upgrading;
If code symbol of tracing to the source described in normally and has corresponding record in data base, however it remains the possibility of personation, now, further
Whether met by security code and whether rule and data base exist security code close corresponding record with code character of tracing to the source, then can
Enough reliabilities improving personation identification further.And, it is judged that described first mobile terminal whether first scan security code
Terminal or authorization terminal, it is possible to further from the possible situation of different poly-angle recognition products personation, improve checking product true
Pseudo-reliability.
Fig. 4 is system embodiment 1 block diagram of the present invention.The system of checking authenticity of products shown in Fig. 4, takes including network
Business device M13, the first mobile terminal M12 and mark arrange device M11, wherein:
Described mark arranges device M11, arranges the code and the most false proof of uniquely tracing to the source on the surface being verified product M14
Code, described in trace to the source code and described security code has unique incidence relation and one-to-one relationship;
Described first mobile terminal M12 includes scanning processor M123, video-stream processor M122 and control or instruction scanning
Processor M123, the operation processor M121 of video-stream processor M122.Under the control of operation processor M121, aobvious
Show processor M122 for showing authenticity of products information and product information, and scanning processor M123, be used for scanning quilt
Trace to the source code and the security code of checking product surface, and by operation processor M121 and other unit, such as signal
Transmitter unit (is not drawn in figure), and trace to the source described in transmission code and security code are to the webserver;
Described webserver M13, including task allocation unit M131 and accept its instruction data operating units
M132 and the Database Unit M133 being connected with data operating units M132, and allocation unit M131 that receives an assignment refers to
The the first judging unit M134 made and the first granted unit M135 being connected with the first judging unit M134, wherein,
Described Database Unit M133, is verified product information, and trace to the source code and the security code of correspondence for storage.
Described task allocation unit M131, is received by the signal receiving unit (not drawing in figure) of webserver M13
Trace to the source code and the security code sent to described first mobile terminal M12, instructs described first judging unit M134 according to institute
Stating trace to the source code and security code and judge to be verified the true and false of product, concrete judgement operation, by data operating units M132
Trace to the source code described in utilization and the security code inquiry information that obtains of Database Unit M133 completes.When described first judging unit
When M134 obtains judged result information, by the signal transmitter unit (not drawing in figure) of webserver M13, to institute
State the first mobile terminal M12 and send the true and false information being verified product, and, it is true time being verified product, to institute
State the first granted unit and send trigger message.Described first granted unit M135, judges single according to described first received
The trigger message of unit M134, arrange described in trace to the source code and the security code mandate to the first mobile terminal M12.
Other ins and outs of native system embodiment 1 are with reference to the inventive method embodiment part.
Fig. 5 is system embodiment 2 block diagram of the present invention.
System shown in Figure 5 embodiment is based on system shown in Figure 4 embodiment, and concrete difference is: described first moves end
End M12 also includes an authorized application unit M124, authorized application unit M124 being connected with operation processor M121
For sending the authorized application for the second mobile terminal (not drawing in figure) to webserver M13.Described network
Server M13 also include receiving an assignment the instruction of allocation unit M131 the second judging unit M136 and with second judge single
The second granted unit M137 that unit M134 connects, wherein:
Described second judging unit M136, after the authorized application receiving described first mobile terminal M12, it is judged that described
First mobile terminal M12 has obtained the mandate of trace to the source described in present scan code and security code, if it is, refer to
Show that described second granted unit M137 traces to the source code and the security code mandate to the second mobile terminal described in arranging, otherwise, logical
Cross the signal transmitter unit (not drawing in figure) of webserver M13, send refusal to described first mobile terminal M12
It is the second mobile terminal information that mandate is set.
Other ins and outs of native system embodiment 2 are with reference to the inventive method embodiment part.
In this article, term " includes ", " comprising " or its other variant any are intended to comprising of nonexcludability,
So that include that the process of a series of key element, method, article or equipment not only include those key elements, but also include
Other key element being not expressly set out, or also include want intrinsic for this process, method, article or equipment
Element.In the case of there is no more restriction, statement " including ... " key element limited, it is not excluded that including
The process of described key element, method, article or equipment there is also other identical element.
One of ordinary skill in the art will appreciate that all or part of step realizing in above-described embodiment method is to lead to
Program of crossing completes to instruct relevant hardware, and described program can be stored in an embodied on computer readable and preserve in medium.
Described preservation medium, such as: ROM/RAM, magnetic disc, CD etc..
Above the present invention is described in detail, applies specific case herein and principle and the embodiment of the present invention are entered
Having gone elaboration, the explanation of above example is only intended to help to understand method and the core concept thereof of the present invention;Meanwhile, right
In persons skilled in the art, according to the thought of the present invention, the most all can change
Part.In sum, this specification content should not be construed as limitation of the present invention.
Claims (7)
1. the method verifying authenticity of products, it is characterised in that have on the surface be verified product and arrange uniquely
Trace to the source code and unique security code, described in trace to the source code and described security code has unique incidence relation and one-to-one relationship, institute
State and trace to the source code and security code is all by specific coding rule combination producing, and described in trace to the source the numeral that coding rule generated by code
Add the preceding paragraph URL and connect the Quick Response Code of generation standard;In the process:
First mobile scanning terminal is verified trace to the source code and the security code of product surface;
Described first mobile terminal traces to the source code and security code to the webserver described in sending;
The described webserver according to described in trace to the source code and security code judge to be verified whether product is true, if it is, arrange institute
Stating trace to the source code and the security code mandate to the first mobile terminal, sending judged result to described first mobile terminal is "true"
Information and product information, otherwise, sending judged result to described first mobile terminal is the information of "false";
Wherein, the described webserver judges to be verified whether product is true as steps described below:
Same product record in code and security code whether correspondence database of tracing to the source described in judgement, if the most corresponding, confirms to be tested
Card product is "false", otherwise, confirms that being verified product is "true";
Further, in code and security code whether correspondence database of tracing to the source described in judging before the step of same product record, also wrap
Include following step:
Judging whether described security code meets characterization rules, if do not met, confirming that being verified product is "false", arranges institute
State code of tracing to the source invalid, otherwise, continue executing with same product note in code and security code whether correspondence database of tracing to the source described in judgement
The step of record.
Method the most according to claim 1, it is characterised in that judging whether described security code meets characterization rules
Step and code and security code whether correspondence database of tracing to the source described in judging in same product record step between also include
Following step:
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be verified
Product is "false", otherwise, continues executing with same product note in code and security code whether correspondence database of tracing to the source described in judgement
The step of record;
Or, also comprised the steps: before judging the step whether described security code meets characterization rules
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be verified
Product is "false", otherwise, continues executing with the step judging whether described security code meets characterization rules.
Method the most according to claim 2, it is characterised in that: trace to the source described in if code and the feature of described security code
Position do not meet the condition of setting, then, and arrange described in trace to the source code and security code invalid.
Method the most according to claim 3, it is characterised in that trace to the source described in if code and the feature of described security code
Position meets the condition of setting, then, it is judged that the terminal of described first mobile terminal whether first scan security code or authorization terminal, as
Fruit not, confirms that being verified product is "false", otherwise, continues executing with trace to the source described in judgement code and the most corresponding number of security code
According to the step of product record same in storehouse, or, continue executing with the step judging whether described security code meets characterization rules.
Method the most according to claim 4, it is characterised in that also include:
First mobile terminal sends the authorized application for the second mobile terminal to the webserver;
The described webserver judges that described first mobile terminal is traced to the source the mandate of code and security code described in having obtained, as
Fruit is, arrange described in trace to the source code and the security code mandate to the second mobile terminal, otherwise, send to described first mobile terminal
Refusal arranges the information of mandate.
Method the most according to claim 5, it is characterised in that: the webserver judges to be verified as steps described below
Whether product is true:
Whether code of tracing to the source described in judgement meets characterization rules, if it does not, confirm that product is false, otherwise,
Product record in code of tracing to the source described in judgement whether correspondence database, if it does not, confirm that product is false, otherwise,
Judge whether described security code meets characterization rules, if it does not, confirm that product is false, otherwise,
Judge the product record in described security code whether correspondence database, if it does not, confirm that product is false, otherwise,
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be verified
Product is "false", otherwise, confirms that being verified product is "true";Or, it is judged that described first mobile terminal is swept first
Retouch terminal or the authorization terminal of security code, if it is not, confirm that being verified product is "false", otherwise, confirm to be verified product
Product are "true".
7. verifying a system for authenticity of products, arrange device including the webserver, the first mobile terminal and mark, it is special
Levy and be:
Described mark arranges device, arranges uniquely trace to the source code and unique security code on the surface be verified product, described in trace back
Source code and described security code have unique incidence relation and one-to-one relationship;Described trace to the source code and security code is all by specific volume
Code rule combination producing, and described in the numeral that coding rule generated by code of tracing to the source add the preceding paragraph URL and connect the two of generation standard
Dimension code;
Described first mobile terminal includes scanning processor, is verified trace to the source code and the security code of product surface for scanning, with
And trace to the source described in sending code and security code are to the webserver;
The described webserver, including Database Unit, the first judging unit and the first granted unit, wherein,
Described Database Unit, is verified product information, and trace to the source code and the security code of correspondence for storage;
Described first judging unit, for according to described in trace to the source code and security code judge to be verified the true and false of product, and, to
Described mobile terminal sends the true and false information being verified product, and, it is true time being verified product, authorizes to described first
Unit sends trigger message
Described first granted unit, for according to the trigger message of described first judging unit, arrange described in trace to the source code and false proof
The code mandate to the first mobile terminal;
Wherein, described first mobile terminal also includes authorized application unit, moves for second for sending to the webserver
The authorized application of terminal;And, the described webserver also includes the second judging unit and the second granted unit, wherein:
Described second judging unit, for after the authorized application receiving described first mobile terminal, it is judged that described first moves
Terminal is traced to the source the mandate of code and security code described in having obtained, if it is, it is described to indicate described second granted unit to arrange
Tracing to the source code and the security code mandate to the second mobile terminal, otherwise, sending refusal to described first mobile terminal is second to move
Terminal arranges the information of mandate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310034533.7A CN103077467B (en) | 2013-01-30 | 2013-01-30 | A kind of method and system verifying authenticity of products |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310034533.7A CN103077467B (en) | 2013-01-30 | 2013-01-30 | A kind of method and system verifying authenticity of products |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103077467A CN103077467A (en) | 2013-05-01 |
CN103077467B true CN103077467B (en) | 2016-06-29 |
Family
ID=48153987
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310034533.7A Expired - Fee Related CN103077467B (en) | 2013-01-30 | 2013-01-30 | A kind of method and system verifying authenticity of products |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103077467B (en) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103426092A (en) * | 2013-08-02 | 2013-12-04 | 北京科技大学 | Two-dimensional code verification method for food safety |
CN104574090B (en) * | 2013-10-09 | 2018-08-17 | 无锡中科方德软件有限公司 | A kind of combination is traced to the source the method for anti-counterfeit of code and accidental enciphering password |
WO2015161496A1 (en) * | 2014-04-25 | 2015-10-29 | 康家铭 | Commodity anti-counterfeiting verification system |
CN105321076A (en) * | 2014-06-03 | 2016-02-10 | 江南大学 | Variable and long-term anti-counterfeiting marking method and system for circulation commodities |
CN104331728B (en) * | 2014-10-24 | 2017-04-19 | 安徽农业大学 | Two-dimensional code generation method and application thereof |
CN104715382A (en) * | 2015-03-23 | 2015-06-17 | 北京金和软件股份有限公司 | Product anti-fake method |
CN104835046B (en) * | 2015-04-20 | 2018-03-16 | 信码互通(北京)科技有限公司 | A kind of data false distinguishing method for two-dimension code safe verification |
CN105046501A (en) * | 2015-06-26 | 2015-11-11 | 河南省烟草公司商丘市公司 | Cigarette authenticity electronic identification method and device |
CN106778993A (en) * | 2016-11-23 | 2017-05-31 | 广州市人民印刷厂股份有限公司 | A kind of generation method of antifalsification label, verification method and its device |
CN207182792U (en) * | 2017-03-06 | 2018-04-03 | 郑州新华方数字信息有限公司 | A kind of Anti-fake digital device |
CN106875566A (en) * | 2017-03-21 | 2017-06-20 | 厦门巍然信息科技有限公司 | A kind of intelligent automatic meal taking cabinet and its management system |
CN111311268A (en) * | 2018-11-26 | 2020-06-19 | 深圳市节点加科技有限责任公司 | Commodity anti-counterfeiting code generation and verification method, system and computer readable storage medium |
CN109872167A (en) * | 2019-02-22 | 2019-06-11 | 李国岐 | A kind of antiforge method for commodities and anti-counterfeiting system |
CN111401919A (en) * | 2020-02-17 | 2020-07-10 | 北京环网瑞通软件有限责任公司 | Time division multipurpose anti-counterfeiting tracing code and using method |
CN112418885A (en) * | 2020-11-18 | 2021-02-26 | 上海中商网络股份有限公司 | Label generation method, product tracing method and related device |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102385710A (en) * | 2011-08-15 | 2012-03-21 | 王志刚 | Method and system for verifying fact or fiction |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201716765U (en) * | 2010-07-24 | 2011-01-19 | 包宋德 | Wine counterfeiting tracing system based on two-dimensional bar codes |
CN101944187B (en) * | 2010-09-07 | 2014-04-02 | 龚湘明 | Two-dimensional micro code and processing method and device thereof |
CN102622693A (en) * | 2012-02-11 | 2012-08-01 | 海南亚元防伪技术研究所 | Video tag system |
-
2013
- 2013-01-30 CN CN201310034533.7A patent/CN103077467B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102385710A (en) * | 2011-08-15 | 2012-03-21 | 王志刚 | Method and system for verifying fact or fiction |
Also Published As
Publication number | Publication date |
---|---|
CN103077467A (en) | 2013-05-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103077467B (en) | A kind of method and system verifying authenticity of products | |
CN103093365B (en) | The method and system of checking authenticity of products | |
CN109523683B (en) | Anonymous electronic voting method based on block chain technology | |
CN106452721A (en) | Method and system for instruction identification of intelligent device based on identification public key | |
CN104156862A (en) | Wechat-platform-based two-dimensional code anti-fake and anti-channel conflict inquiry system and method | |
CN104620225B (en) | Method and system for server security checking | |
CN107169776A (en) | Product certification method for anti-counterfeit based on block chain technology | |
CN112165382B (en) | Software authorization method and device, authorization server side and terminal equipment | |
CN104951943A (en) | Anti-counterfeiting method based on random plain and secret code association examination | |
CN104392260A (en) | Two-dimensional code anti-counterfeiting method based on additional information | |
CN105046504A (en) | Multiple key checking, inspection and forgery prevention source forming method and forgery prevention label | |
CN106548352A (en) | A kind of commodity counterfeit prevention traceability system and its implementation | |
CN104424579B (en) | Anti-counterfeiting tracing management system | |
CN104574090A (en) | Anti-fake method combining tracing code with random encryption password | |
CN109360008B (en) | Product anti-counterfeiting authentication updating method and system | |
CN109522988B (en) | Method and system for updating product anti-counterfeiting electronic label information | |
CN102496113A (en) | Method and system for realizing commodity authentication service | |
CN105260900A (en) | Product unique identification anti-counterfeiting method and device | |
CN113570387A (en) | Artwork tracing method based on block chain and electronic equipment | |
CN104836817A (en) | Architecture and method for ensuring network information safety | |
CN206961165U (en) | A kind of NFC Antiforge systems | |
CN117709979A (en) | Textile traceability system and method based on blockchain | |
CN111027990A (en) | Product anti-counterfeiting method and system based on material mark block chain | |
CN116561822A (en) | Product anti-counterfeiting method, component and system | |
CN114444130A (en) | Electronic certificate mutual trust and mutual authentication platform based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
DD01 | Delivery of document by public notice |
Addressee: Wang Zhigang Document name: Notification of Passing Examination on Formalities |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160629 Termination date: 20210130 |
|
CF01 | Termination of patent right due to non-payment of annual fee |