Nothing Special   »   [go: up one dir, main page]

CN103077467B - A kind of method and system verifying authenticity of products - Google Patents

A kind of method and system verifying authenticity of products Download PDF

Info

Publication number
CN103077467B
CN103077467B CN201310034533.7A CN201310034533A CN103077467B CN 103077467 B CN103077467 B CN 103077467B CN 201310034533 A CN201310034533 A CN 201310034533A CN 103077467 B CN103077467 B CN 103077467B
Authority
CN
China
Prior art keywords
code
source
product
security code
trace
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310034533.7A
Other languages
Chinese (zh)
Other versions
CN103077467A (en
Inventor
王志刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201310034533.7A priority Critical patent/CN103077467B/en
Publication of CN103077467A publication Critical patent/CN103077467A/en
Application granted granted Critical
Publication of CN103077467B publication Critical patent/CN103077467B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention discloses a kind of method verifying authenticity of products, has and arrange uniquely trace to the source code and unique security code on the surface be verified product, described in trace to the source code and described security code has unique incidence relation and one-to-one relationship;In the process, the first mobile scanning terminal is verified trace to the source code and the security code of product surface, and trace to the source described in transmission code and security code are to the webserver;The described webserver according to described in trace to the source code and security code judge to be verified whether product is true, if, trace to the source described in arranging code and the security code mandate to the first mobile terminal, information and the product information that judged result is "true" is sent to described first mobile terminal, otherwise, sending judged result to described first mobile terminal is the information of "false".Invention additionally discloses a kind of system verifying authenticity of products.Such scheme by the mandate to the first mobile terminal, can improve the reliability of authenticity of products checking.

Description

A kind of method and system verifying authenticity of products
Technical field
The present invention relates to authenticity of products calibration technology, particularly relate to be able to verify that the method and system of authenticity of products.
Background technology
Check authenticity of products, i.e. a product false proof, extremely important for safeguarding the normal order of the market economy, therefore, Try to achieve a method that can effectively verify authenticity of products, be the target of people's long-sought.Traditional much verifies product The technology of the true and false is difficult to this target.Such as laser color-changing anti-counterfeit, hologram pattern is false proof, temperature discoloring is false proof, special Plant the technology such as version antiforge, owing to anti-counterfeiting technology randomness is poor, do not possess uniqueness, and, these technology use Means due to technology content relatively low, be easily cracked and grasp, or easily being replicated by fake producer so that through so Anti-counterfeiting technology process product, it is difficult to find its true and false of effective method validation.
Later, there is Crinis Carbonisatus to understand cipher anti-fake method, i.e. higher for production technical difficulty, or spy can only be used Different directions or tendencies method or employing any special measures could identify the label of its effectiveness, with technical difficulty or the identification spy of this forming label Different means auxiliary checking authenticity of products.For example with advanced laser antifalsification technology converted products password, form digital code anti-false Label, texture anti-fake label etc., or the anti-counterfeiting technology converted products password such as safety line.But, these technology only increase Add and manufactured label or identify the difficulty of label, still can not effectively verify the true and false of product.
Further, there is the method that Crinis Carbonisatus understands checking authenticity of products based on communication network.With based on computer network dark As a example by code anti-counterfeiting method, the method blocks the anti-forge cipher of product with opaque barrier bed so that when barrier bed is intact, Anti-forge cipher can not visually obtain, thus forms false proof private mark.When checking uses the authenticity of products of private mark mark, it is necessary to Destroy private mark barrier bed, i.e. after scraping barrier bed off, utilize anti-forge cipher inquiry computer network (other example to be adopted With mobile communications network, or fixed telephone network etc.) data base, it is achieved the authenticity verification of this product.But, when described secretly The barrier bed of code is destroyed, after making anti-forge cipher become plain code, it is possible to utilize this plain code to replicate out a large amount of private mark, institute The product of this private mark useful mark, the no matter true and false, can be obtained by computer network inquiry, thus verify that product is Very.Visible, this method is also difficult to stop fake, and is difficult to effectively verify the true and false of product.It addition, at product stream In logical link, the barrier bed of private mark can not be destroyed, so when final consumer finds fake products, substantial amounts of Fake products is come into the market in a large number by complicated intermediate links.
Visible, there are problems and cause antifalse effect poor in existing anti-counterfeiting technology, and authenticity of products is difficult to effectively be verified, Therefore, a kind of effective, quick and easily operated anti-counterfeiting technology it is badly in need of to meet people to false proof demand.
Summary of the invention
The purpose of the embodiment of the present invention, is to provide a kind of method and system that can effectively verify authenticity of products, to provide A kind of effective, convenient and easily operated anti-counterfeiting technology meets people to false proof demand.
The method of the checking authenticity of products that the embodiment of the present invention provides, has on the surface be verified product and arranges uniquely Trace to the source code and unique security code, described in trace to the source code and described security code has unique incidence relation and one-to-one relationship; In the process:
First mobile scanning terminal is verified trace to the source code and the security code of product surface;
Described first mobile terminal traces to the source code and security code to the webserver described in sending;
The described webserver according to described in trace to the source code and security code judge to be verified whether product is true, if it is, arrange Described trace to the source code and the security code mandate to the first mobile terminal, sending judged result to described first mobile terminal is "true" Information and product information, otherwise, to described first mobile terminal send judged result be the information of "false".
Wherein, the webserver judges to be verified whether product is true as steps described below:
Same product record in code and security code whether correspondence database of tracing to the source described in judgement, if the most corresponding, confirms quilt Checking product is "false", otherwise, confirms that being verified product is "true".
In second preferred embodiment of the method, wherein, trace to the source described in judge code and security code whether correspondence database In same product record step before, also comprise the steps:
Judging whether described security code meets characterization rules, if do not met, confirming that being verified product is "false", is arranged Described code of tracing to the source is invalid, otherwise, continues executing with same product in code and security code whether correspondence database of tracing to the source described in judgement The step of product record.
In the 3rd preferred embodiment of the method, wherein, judging whether described security code meets the step of characterization rules And code and security code whether correspondence database of tracing to the source described in judging also includes following between the step of same product record Step:
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be tested Card product is "false", otherwise, continues executing with same product in code and security code whether correspondence database of tracing to the source described in judgement The step of product record;
Or, also comprised the steps: before judging the step whether described security code meets characterization rules
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be tested Card product is "false", otherwise, continues executing with the step judging whether described security code meets characterization rules.
In the 4th preferred embodiment of the method, if described in the trace to the source Q-character of code and described security code do not meet setting Condition, then, arrange described in trace to the source code and security code invalid.
In the 5th preferred embodiment of the method, if described in the trace to the source Q-character of code and described security code meet bar be set Part, then, it is judged that the terminal of described first mobile terminal whether first scan security code or authorization terminal, if it is not, really Recognize that to be verified product be "false", otherwise, continue executing with in code and security code whether correspondence database of tracing to the source described in judgement with The step of one product record, or, continue executing with the step judging whether described security code meets characterization rules.
In the 6th preferred embodiment of the method, also include:
First mobile terminal sends the authorized application for the second mobile terminal to the webserver;
The described webserver judges that described first mobile terminal is traced to the source the mandate of code and security code described in having obtained, Code and the security code mandate to the second mobile terminal if it is, trace to the source described in arranging, otherwise, to described first mobile terminal Send refusal and the information of mandate is set.
In the 7th preferred embodiment of the method, whether the webserver judges to be verified product as steps described below and is True:
Whether code of tracing to the source described in judgement meets characterization rules, if it does not, confirm that product is false, otherwise,
Product record in code of tracing to the source described in judgement whether correspondence database, if it does not, confirm that product is false, otherwise,
Judge whether described security code meets characterization rules, if it does not, confirm that product is false, otherwise,
Judge the product record in described security code whether correspondence database, if it does not, confirm that product is false, otherwise,
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be tested Card product is "false", otherwise, confirms that being verified product is "true";Or, it is judged that described first mobile terminal is the most first The terminal of secondary scanning security code or authorization terminal, if it is not, confirm that being verified product is "false", otherwise, confirm quilt Checking product is "true".
The system of the checking authenticity of products that the embodiment of the present invention provides, including the webserver, the first mobile terminal and mark Device is set, wherein:
Described mark arranges device, arranges uniquely trace to the source code and unique security code on the surface be verified product, described Trace to the source code and described security code has unique incidence relation and one-to-one relationship;
Described first mobile terminal includes scanning processor, is verified trace to the source code and the security code of product surface for scanning, And trace to the source described in sending code and security code are to the webserver;
The described webserver, including Database Unit, the first judging unit and the first granted unit, wherein,
Described Database Unit, is verified product information, and trace to the source code and the security code of correspondence for storage;
Described first judging unit, for according to described in trace to the source code and security code judge to be verified the true and false of product, and, The true and false information being verified product is sent to described mobile terminal, and, it is true time being verified product, to described first Granted unit sends trigger message
Described first granted unit, for according to the trigger message of described first judging unit, arrange described in trace to the source code and anti- The pseudo-code mandate to the first mobile terminal.
In another preferred system embodiment, described first mobile terminal also includes authorized application unit, for net Network server sends the authorized application for the second mobile terminal;And, the described webserver also includes the second judgement list Unit and the second granted unit, wherein:
Described second judging unit, for after the authorized application receiving described first mobile terminal, it is judged that described first moves Dynamic terminal is traced to the source the mandate of code and security code described in having obtained, if it is, indicate described second granted unit to arrange Described trace to the source code and the security code mandate to the second mobile terminal, otherwise, sending refusal to described first mobile terminal is the Two mobile terminals arrange the information of mandate.
The embodiment provided according to the present invention, owing to the described webserver is in code and the security code judgement of tracing to the source described in basis Be verified product be whether very after, arrange described in trace to the source code and the security code mandate to the first mobile terminal, as such, it is possible to Effectively control to trace to the source described in being operable to the quantity of the first mobile terminal of code and security code relevant information, can lead to further Cross the rank to the first mobile terminal to control, improve the reliability of authenticity of products checking.
The embodiment of the present invention additionally provides the technological means of other products authenticity verification, and these technological means are combined, it is possible to from The true and false of all angles checking product, blocks the leak of fake products.Technique effect that these technological means are brought and analysis, Further illustrate in this paper detailed description of the invention part.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing In technology description, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is used only for Embodiments of the invention are described, owing to figure containing the information of the embodiment of the present invention, for those of ordinary skill in the art From the point of view of, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these drawings and Examples.
Fig. 1 is the exemplary system figure using the embodiment of the present invention;
Fig. 2 is the method for the invention embodiment 1 flow chart;
Fig. 3 is the method for the invention embodiment 1 part steps flow chart;
Fig. 4 is system embodiment 1 block diagram of the present invention;
Fig. 5 is system embodiment 2 block diagram of the present invention.
Detailed description of the invention
Understandable for enabling the objects, features and advantages of the embodiment of the present invention to become apparent from, real with concrete below in conjunction with the accompanying drawings The present invention is further detailed explanation to execute mode.
It it is the example using embodiment of the present invention system with reference first to Fig. 1, Fig. 1.According to the instruction of Fig. 1, this is System includes three parts being connected to each other, and the server zone 1 connected by the Internet is connected with each other by mobile Internet Mobile terminal group 2, and end 3 is set for be verified that product arranges identifying code.Wherein, arrange end 3 to be generally populated At product producer or distributor, in order to be one and produced or identifying code will be set product sold, because of This, after the embodiment of the present invention is widely used, the quantity arranging end 3 should have a lot.Shifting in mobile terminal group 2 Dynamic terminal also has a lot, such as mobile terminal 21,22, and these mobile terminals are typically distributed at distributor and consumer's hands In, so could facilitate the true and false at products in circulation link checking product.The information spinner that authenticity of products checking uses or produces Server zone 1 to be stored in, has some information also can store in the terminal.Along with the use of the embodiment of the present invention is advised Mould is different, and the webserver 11,12 in server zone 1 can be one, it is also possible to is distributed across different location Multiple, they completely by quantity of information, function, possessory difference and different.Such as, first network server 11 is made For product information server, be used for storing product information record, this record with trace to the source code and security code the most corresponding;First The webserver 12 is as product anti-fake server, for storing the anti-counterfeiting information record of product.But, in the present invention Embodiment in, the webserver 11,12 in server zone 1 is the same webserver, these difference not shadow Ring use or the enforcement of the embodiment of the present invention.The embodiment of the method for the invention is applied, with regard to structure in Fig. 1 example system Become a set of and be verified as main purpose with product false proof, and a set of false proof the tracing to the source providing product to trace to the source information searching function has been System.
According to the instruction of the method for the invention embodiment 1 described in Fig. 2, first certain product producer or distributor The identifying codes that end 3 arranges product are set.Specifically, on the surface being verified product, it is, will sell Or on the product surface produced, identifying code is set.Described identifying code includes that the code of tracing to the source with uniqueness is with unique The security code of property.It is further preferred to be also that each product generates different identity ID, this ID also has uniqueness, with side The most visually check.The uniqueness of identifying code, it is possible to avoid to carry out false proof for single product in existing anti-counterfeiting technology, Reduction can copy the probability of code and/or security code of tracing to the source by batch duplicating.Therefore, in the enforcement of the method for the invention In example, it is verified product for each, the most unduplicated code and the security code of tracing to the source of its identifying code all correspondences so that test Can be verified by uniqueness during card, determine the true and false of product.In actual application, generate unique for being verified product The mode of security code can have multiple, and this does not repeats.
Described code of tracing to the source is plain code, i.e. described in code of tracing to the source initially visually the most visible.In content, it leads to commonly used digital or letter representation; Can also encryption, on the digital content of tracing to the source after encryption still with numeral or letter representation, in view of algorithms for encryption and decryption The most ripe, this does not repeats.In form, with visually can not the one-dimensional or Quick Response Code of Direct Recognition representing.Wherein, at this The Quick Response Code using digital content of tracing to the source to generate in example represents.
In this example, described security code is by the private mark after the covering of opaque frangible coating.By covering of opaque frangible coating Lid, carries out secrecy processing to security code, and the security code making setting is the most not visible, that is, make security code covering Cover after opaque coating thereon is destroyed the most visible, it is therefore an objective to the false proof effect of associating of trace to the source described in raising code and security code Really.Described trace to the source code and security code can be arranged on and be verified product surface Anywhere, in this example, described in trace to the source code It is provided above in opaque frangible coating.So, scrape opaque coating off, when utilizing end of scan to carry out authentication, Can focus on simultaneously and scan trace to the source code and security code, two codes are verified simultaneously.Physically, due to described Code of tracing to the source is printed on a kind of special frangible antifalsification label (i.e. opaque coating), makes fake producer be difficult to batch duplicating. In other example, described in trace to the source code and security code is arranged on the diverse location of product surface, it is real that this does not affect the present invention Execute the enforcement of example.
Trace to the source code described in it addition, and security code can be directly arranged at and be verified on product external packaging surface, or be arranged at by On the surface of checking product itself, or it is arranged at and is verified in the data that product is subsidiary, such as description etc., as long as can be It is verified product end to find, as set-up mode, position is set, the embodiment of the present invention such as form is set this is not done Limit, for example, it is possible to directly arrange or arranged by label.
In this example, described in trace to the source code and described security code has unique incidence relation and a relation one to one, wherein, Described " incidence relation " refers to that concrete code of tracing to the source security code the most concrete with is related, described " one a pair Should be related to " refer to that this contact has uniqueness, in this manner it is possible to utilize unique incidence relation and therebetween The uniqueness that one corresponding relation is implemented being verified product is verified or combines false proof.
Specifically, code of tracing to the source described in includes following information: uniqueness encodes, product condition code.Wherein, this example specifies Trace to the source code rear 6 for product condition code.Described security code also includes that uniqueness encodes, the uniqueness coding difference of the two, But but ensure inherent relatedness by a kind of special create-rule.This special create-rule embodies institute in this example Trace to the source code and the unique incidence relation of security code stated, to those skilled in the art, it is easy to it is this special to realize Rule.Trace to the source code described in no matter and what form described security code uses arrange or show, need to have unique between them Incidence relation and one-to-one relationship.
In this example, code of tracing to the source is all by specific coding rule combination producing, in coding rule, all numbers with security code Position is by specific logic rule, and random number and basic number are also deposited.As: middle a few bit digital use random digit, other Bit digital is derived by these random digits.Finally, the numeral that coding rule is generated by code of tracing to the source adds the preceding paragraph URL The Quick Response Code of link generation standard, and the bar code of the combination producing standard of the numeral that coding rule is generated by security code.
Above-mentioned Quick Response Code of tracing to the source also has following particular utility, is carried out, by other common Quick Response Code scanning software, code of tracing to the source Scanning, it is possible to get one section of query link, networking can get the corresponding of server end return after opening this link Product is traced to the source information.
The surface be verified product has uniquely trace to the source code and unique security code have been set, verified at anti-fake product Time, according to Fig. 2, in step S201, the first mobile scanning terminal is arranged on and is verified the special false proof of product surface and traces back Code of tracing to the source on the label of source.Then scrape or destroy opaque frangible coating off in step S202, make security code completely visual, Again with security code described in the first mobile scanning terminal.Or, in being embodied as, step S201 and step S202 are permissible Being combined into a step, i.e. after scraping opaque frangible coating off, the first mobile terminal is to tracing to the source code and being exposed to outward Security code is scanned simultaneously.
In step S203, described first mobile terminal send described in trace to the source code and security code to the webserver.
In step S204, the described webserver according to described in trace to the source code and security code judge to be verified whether product is true, Code and the security code mandate to the first mobile terminal if it is, trace to the source described in arranging in step S205, and at rapid S206 Information and the product information that judged result is "true" is sent, otherwise, at rapid S207 to institute to described first mobile terminal Stating the first mobile terminal and sending judged result is the information of "false".Finally terminate in step S208.
Step S205 is traced to the source code and the security code mandate to the first mobile terminal described in arranging, it is simply that code of tracing to the source described in foundation With security code and the corresponding relation of the first mobile terminal so that it is become follow-up can use described in trace to the source code and security code inquiry The legal terminal of information.Can also be further that it is arranged based on described code of tracing to the source according to other condition of this mobile terminal With the information operating authority of security code, such as, safeguard trace to the source described in data base code and the authority of security code relevant information. Such as, if this first mobile terminal is the mobile terminal of manufacturer, can be its arrange increase, delete and inquire about described Trace to the source code and the authority of security code relevant information;If this first mobile terminal is the mobile terminal of consumption, can be that it sets Put trace to the source described in inquiry code and the authority of security code relevant information, preferential inquiry times is even set, etc..At one In specific embodiment, by pre-registering, and the mandate of the other mobile terminal of system administrator level, arrange for the Trace to the source code and the authority of security code relevant information described in one mobile terminal operation.
In another embodiment, arrange in step S205 described in trace to the source code and the security code mandate to the first mobile terminal Before, also trace to the source described in judgement code and the quantity of the most authorized first mobile terminal of security code, when this quantity exceedes rule Fixed numerical value, such as 5, the most no longer for this first mobile terminal arrange described in trace to the source the mandate of code and security code, the most just Mandate to it is set.In this way, trace to the source described in controlling to be operable to code and the first of security code relevant information The quantity of mobile terminal, makes authenticity of products verify more reliability.In an embodiment improved, in step S205, Also judge the rank of this first mobile terminal, to determine whether in this rank, described in trace to the source code and security code the most authorized The quantity of the first mobile terminal whether exceed the numerical value of regulation, if not less than, arrange described in trace to the source code and security code pair The mandate of the first mobile terminal, otherwise refusal arranges mandate.In view of the Authorized operation relating to rank and quantity easily realizes, This repeats no more.
In step S204, the webserver judges to be verified whether product is true as steps described below, with reference to Fig. 3:
According to Fig. 3, first open product information database in step S301, then search, in step S302, code of tracing to the source right The record answered, then searches, in step S303, the record that security code is corresponding, then in code of tracing to the source described in the judgement of step S304 Same product record in the corresponding record record corresponding with described security code whether data base, if it is, in step S305 determines that product is true, then goes to step S205;Otherwise, determine that product is false in step S306, then go to step S207.Wherein it is determined that product for really operate can have multiple, such as, arrange trace to the source code and security code be really indicate, Code is traced to the source and security code recorded in " true code " data base by described, etc..In like manner, determine that the operation that product is false can Multiple to have, such as, arrange and trace to the source code and security code is false mark, traces to the source code and security code recorded " false by described Code " in data base, etc..
In other embodiments based on embodiment 1, it is also possible in step S205, arrange described in code of tracing to the source invalid, and In step S207, arrange described in trace to the source code and security code invalid, be so advantageously implemented more useful function.Also Other useful function more, such as, " prize drawing " function can be realized.Specifically can increase by one in step S206 Sub-step, by first scan or the information of the mobile terminal of legal scanning, as mobile number or SIM number etc. are sent to one The individual webserver, according to the management record of the described webserver, when this record meets condition, such as this mobile terminal First scan is traced to the source code or security code, i.e. may participate in prize drawing, mobile terminal feeds back some and rewards, and such as mobile terminal fills Value, the so beneficially verifier of authenticity of products scan described security code in time, with code of tracing to the source described in the most invalid, stop Product is palmed off.
Equally, after step S207 determines that being verified product is vacation, the information that product is "false", Yi Jixian can be shown Show that security code is invalid, it is also possible to the result data sending product are moved to the webserver specified and/or other appointment Dynamic terminals etc., carry out fake products report.Etc..
In the second embodiment based on embodiment 1, if described in trace to the source code and security code does not has in correspondence database same Individual product record, illustrates that the product being verified is false, but, this vacation is that product information does not has input database, or Trace to the source code or security code is that vacation is the most uncertain?Therefore, in this example, also to judge whether described security code meets characterization rules, If do not met, at least explanation code of tracing to the source corresponding to security code is wrong, therefore, arrange described in code of tracing to the source invalid.
Concrete scheme is: the step of same product record in code and security code whether correspondence database of tracing to the source described in judging Before Zhou, also comprise the steps:
Judging whether described security code meets characterization rules, if do not met, confirming that being verified product is "false", is arranged Described code of tracing to the source is invalid, otherwise, continues executing with same product in code and security code whether correspondence database of tracing to the source described in judgement The step of product record.
Characterization rules described here, can be the coding rule of code and security code of tracing to the source, as it was previously stated, in coding standard, All numerical digits press specific logic rule, and random number and regular number are also deposited.As: middle a few bit digital use random digit, Other bit digital is derived by these random digits, if the composition of described security code does not meets above-mentioned regulation, and no matter institute Stating whether code of tracing to the source meets rule, it is all invalid.It addition, described characterization rules can also be other encryption rule, Such as, trace to the source code and/or the security code of coding standard will be met, be formed after rerunning with other any AES Trace to the source code and/or the security code of encryption, therefore, characterization rules is exactly described AES.In view of those skilled in the art The most easily realizing described characterization rules, this repeats no more.
Further, if security code has been scanned identifying, the most now security code and corresponding code of tracing to the source will be by automatic nothings Effect, later if it find that have and again trace to the source code and behavior that security code is identified to same, then explanation this group very possible Tracing to the source code and security code is being forged the most, corresponding commodity are very likely false.System will point out user to be somebody's turn to do Group is traced to the source code and the most identified mistake of security code, the information such as beware of imitations.So, the difficulty of fraud will be greatly increased and become This, improve the reliability of authenticity of products checking.
In further embodiment 3 based on embodiment 2, judging whether described security code meets characterization rules Step and code and security code whether correspondence database of tracing to the source described in judging also include between the step of same product record Following step:
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be tested Card product is "false", otherwise, continues executing with same product in code and security code whether correspondence database of tracing to the source described in judgement The step of product record;
Or, also comprised the steps: before judging the step whether described security code meets characterization rules
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be tested Card product is "false", otherwise, continues executing with the step judging whether described security code meets characterization rules.
In embodiment 3, if described in the trace to the source Q-character of code and described security code do not meet the condition of setting, can be direct Trace to the source described in arranging code and security code invalid.
In further embodiment 4 based on embodiment 3, if described in trace to the source code and the Q-character of described security code Meet the condition of setting, then, it is judged that the terminal of described first mobile terminal whether first scan security code or authorization terminal, as Fruit the most not, confirms that to be verified product be "false", otherwise, continue executing with trace to the source described in judgement code and security code the most corresponding The step of same product record in data base, or, continue executing with and judge whether described security code meets characterization rules Step.
In whether the Q-character of code and described security code of tracing to the source described in judging meets the embodiment of the condition of setting, described in trace to the source Code and security code also include the Q-character with unique association relation, by the unique association relation between Q-character, It also is able to judge to be verified the true and false of product.Whether the Q-character of code and described security code of tracing to the source described in judging described in this example accords with Conjunction arranges condition, is substantially whether the content judging described Q-character has unique incidence relation.In this example, described Unique association relation refer to described in the trace to the source Q-character of code and described security code equal.
It may be noted that this incidence relation is different in various embodiments, but its content is for art technology The most easily realize really for personnel.Such as, in an other embodiment, trace to the source code and security code all Represent by numeral, but after code of tracing to the source, 5 bit digital are plus a specific numerical value, such as equal to after security code 5 after adding 1 The numerical value of position, this explanation, described in trace to the source code " numerical value " and unique corresponding relation that security code " numerical value " has, permissible It is used for verifying the uniqueness of product.Trace to the source described in it can thus be seen that code and described security code Q-character particular association close System can be randomly provided, and " equal " is simplest incidence relation.So it is very beneficial for the unique of different batches product Property or fake certification, as long as increasing explanation or the instruction of described particular kind of relationship in code of tracing to the source, it is possible to described by judging Trace to the source the Q-character of code and whether the Q-character of described security code meets this relation, learn the true and false being verified product, from And increase the reliability of product false proof further, also can increase to illegal product and manufacture the difficulty of legal mark.
In different examples, as required, the described webserver can also be following arbitrarily to the first mobile terminal transmission The data of combination: true and false mark and the described product condition code that is verified, and/or code of tracing to the source, security code, and/or scanning figure Sheet and/time, place (such as the GPS elements of a fix) data, etc..Utilize above-mentioned information, it is possible to test from different perspectives The true and false of card product, and trace fake products.
In above-described embodiment, if described in trace to the source code and/or security code viewable numbers and/or character plain code is expressed, it is possible to With with bar code, the private mark such as Quick Response Code or password is expressed.
In order to improve the reliability of authenticity of products checking further, in another embodiment, though described in trace to the source code and institute The coding characteristic stating security code meets ad hoc rule, also to judge described first mobile terminal whether first scan security code Terminal or the terminal of the authorization terminal by first scan security code, if it is not, confirm that being verified product is "false", Otherwise, confirm that being verified product is "true".
In the actual application of above-described embodiment, owing to Antiforge inquiry is required for carrying out at the links of products in circulation, because of This, can not limit and perform the mobile terminal that inquiry operates, so that authenticity of products verification operation has convenience, meanwhile, Limit the mobile terminal performing inquiry operation again, it is to avoid the randomness of authenticity of products verification operation, thus it is true to increase product The reliability of pseudo-checking.Traditional method uses the means of registered mobile terminal in the webserver to realize above-mentioned requirements, but It is the mobile terminal the most still limiting and performing inquiry operation, and the raising to authenticity of products verification operation convenience is non- The most limited, and it is difficult to control to legitimacy and the invalid mobile terminal data of constantly accumulation of mobile terminal.Such as: circulation Link performs the mobile terminal of inquiry and the quantity of mobile terminal is all uncertain, no matter mobile terminal immediately register or Pre-register, all can cause the spreading unchecked of random and invalid mobile terminal data of authenticity of products verification operation.
Following step is used to solve this problem in one embodiment of the invention:
First, the first mobile terminal sends the authorized application for the second mobile terminal to the webserver, and described network takes Business device is according to this application, it is judged that described first mobile terminal obtained described in trace to the source the mandate of code and security code, as Fruit is, arrange described in trace to the source code and the security code mandate to the second mobile terminal, otherwise, send out to described first mobile terminal Send refusal that the information of mandate is set.
In another example, the webserver also judge described in trace to the source the quantity of mobile terminal of code and security code mandate, Decide whether the mandate to the second mobile terminal.It addition, the webserver can also judge the mandate of the first mobile terminal Number of times, the quantity of the second mobile terminal authorized when its application exceedes the quantity pre-set, such as 5, illustrate this first The number of times that mobile terminal can authorize has been used up, no longer to the second current mobile terminal mandate, or, delete the earliest Authorization terminal data after, then to the second current mobile terminal mandate.Etc..
In the above example, the first mobile terminal is the legal terminal that can pre-set, and it is typically manufacturer or sells The mobile terminal of business, it is also possible to be the terminal of first scan security code, or the mobile terminal by first scan security code The mobile terminal authorized, the quantity of these mobile terminals is the most limited, and can be by its rank, and decision can give Mandate number of times, with this improve authenticity of products checking reliability.Consumer arbitrary for intermediate links mobile terminal comes Say, it is possible to obtain the mobile terminal quantity authorized the most limited, and targetedly, therefore, it is possible to preferably solve existing method In, the technical problem that the random and invalid mobile terminal data of authenticity of products verification operation spreads unchecked.
In superincumbent all examples, if it is determined that it is false for being verified product, can take various operation, example as required As sent the information that report " is palmed off ", reality can also realize more operate, such as, set up " blacklist " number According to storehouse.In like manner, if it is determined that it is true for being verified product, can take various operation, such as " advertisement putting " as required, Etc..
To be whether that genuine method has multiple for judging to be verified product to it may be noted that the webserver, and every kind of method is all Combining according to a definite sequence of one or more judgment rules such that it is able to obtain multiple higher checking authenticity of products can By property.
Such as, in an embodiment of the method, the webserver judges to be verified whether product is true as steps described below:
Whether code of tracing to the source described in judgement meets characterization rules, if it does not, confirm that product is false, otherwise,
Code of tracing to the source described in judgement is the most effective, if it does not, confirm that product is false, otherwise,
Product record in code of tracing to the source described in judgement whether correspondence database, if it does not, confirm that product is false, otherwise,
Judge whether described security code meets characterization rules, if it does not, confirm that product is false, otherwise,
Trace to the source described in judgement code and security code combines the combination record in whether correspondence database, if it does not, confirm that product is Vacation, otherwise,
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be tested Card product is "false", otherwise, confirms that being verified product is "true".
In another embodiment of the method, the webserver judges to be verified whether product is true as steps described below:
Whether code of tracing to the source described in judgement meets characterization rules, if it does not, confirm that product is false, otherwise,
Product record in code of tracing to the source described in judgement whether correspondence database, if it does not, confirm that product is false, otherwise,
Judge whether described security code meets characterization rules, if it does not, confirm that product is false, otherwise,
Judge the product record in described security code whether correspondence database, if it does not, confirm that product is false, otherwise,
Judge terminal or the authorization terminal of described first mobile terminal whether first scan security code, if it is not, confirm quilt Checking product is "false", otherwise, confirms that being verified product is "true".
In the 3rd embodiment of the method, the webserver judges to be verified whether product is true as steps described below:
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be tested Card product is "false", otherwise,
Judge terminal or the authorization terminal of described first mobile terminal whether first scan security code, if it is not, confirm quilt Checking product is "false", otherwise, confirms that being verified product is "true".
In the 4th embodiment of the method, the webserver judges to be verified whether product is true as steps described below:
Whether code of tracing to the source described in judgement meets characterization rules, if it does not, confirm that product is false, otherwise,
Product record in code of tracing to the source described in judgement whether correspondence database, if it does not, confirm that product is false, otherwise,
Judge whether described security code meets characterization rules, if it does not, confirm that product is false, otherwise,
Judge the product record in described security code whether correspondence database, if it does not, confirm that product is false, otherwise,
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be tested Card product is "false", otherwise,
Judge terminal or the authorization terminal of described first mobile terminal whether first scan security code, if it is not, confirm quilt Checking product is "false", otherwise, confirms that being verified product is "true".
Also having the combination of other more means, in view of with reference to above-described embodiment, those skilled in the art are fully able to enough realities Existing, this repeats no more.
It is verified in the technical scheme of authenticity of products in above-mentioned judgement, it is possible to what raising authenticity of products was verified from different perspectives can By property.Such as, do not meet characterization rules iff described code of tracing to the source, due to code personation of only tracing to the source, then can determine whether this It it is rudimentary product personation;If code symbol of tracing to the source described in closes characterization rules, but does not has the record of correspondence in data base, says Bright this traces to the source code or the code of tracing to the source that personation is cancelled, or known code system of tracing to the source makes rule, is therefore the product personation of upgrading; If code symbol of tracing to the source described in normally and has corresponding record in data base, however it remains the possibility of personation, now, further Whether met by security code and whether rule and data base exist security code close corresponding record with code character of tracing to the source, then can Enough reliabilities improving personation identification further.And, it is judged that described first mobile terminal whether first scan security code Terminal or authorization terminal, it is possible to further from the possible situation of different poly-angle recognition products personation, improve checking product true Pseudo-reliability.
Fig. 4 is system embodiment 1 block diagram of the present invention.The system of checking authenticity of products shown in Fig. 4, takes including network Business device M13, the first mobile terminal M12 and mark arrange device M11, wherein:
Described mark arranges device M11, arranges the code and the most false proof of uniquely tracing to the source on the surface being verified product M14 Code, described in trace to the source code and described security code has unique incidence relation and one-to-one relationship;
Described first mobile terminal M12 includes scanning processor M123, video-stream processor M122 and control or instruction scanning Processor M123, the operation processor M121 of video-stream processor M122.Under the control of operation processor M121, aobvious Show processor M122 for showing authenticity of products information and product information, and scanning processor M123, be used for scanning quilt Trace to the source code and the security code of checking product surface, and by operation processor M121 and other unit, such as signal Transmitter unit (is not drawn in figure), and trace to the source described in transmission code and security code are to the webserver;
Described webserver M13, including task allocation unit M131 and accept its instruction data operating units M132 and the Database Unit M133 being connected with data operating units M132, and allocation unit M131 that receives an assignment refers to The the first judging unit M134 made and the first granted unit M135 being connected with the first judging unit M134, wherein,
Described Database Unit M133, is verified product information, and trace to the source code and the security code of correspondence for storage.
Described task allocation unit M131, is received by the signal receiving unit (not drawing in figure) of webserver M13 Trace to the source code and the security code sent to described first mobile terminal M12, instructs described first judging unit M134 according to institute Stating trace to the source code and security code and judge to be verified the true and false of product, concrete judgement operation, by data operating units M132 Trace to the source code described in utilization and the security code inquiry information that obtains of Database Unit M133 completes.When described first judging unit When M134 obtains judged result information, by the signal transmitter unit (not drawing in figure) of webserver M13, to institute State the first mobile terminal M12 and send the true and false information being verified product, and, it is true time being verified product, to institute State the first granted unit and send trigger message.Described first granted unit M135, judges single according to described first received The trigger message of unit M134, arrange described in trace to the source code and the security code mandate to the first mobile terminal M12.
Other ins and outs of native system embodiment 1 are with reference to the inventive method embodiment part.
Fig. 5 is system embodiment 2 block diagram of the present invention.
System shown in Figure 5 embodiment is based on system shown in Figure 4 embodiment, and concrete difference is: described first moves end End M12 also includes an authorized application unit M124, authorized application unit M124 being connected with operation processor M121 For sending the authorized application for the second mobile terminal (not drawing in figure) to webserver M13.Described network Server M13 also include receiving an assignment the instruction of allocation unit M131 the second judging unit M136 and with second judge single The second granted unit M137 that unit M134 connects, wherein:
Described second judging unit M136, after the authorized application receiving described first mobile terminal M12, it is judged that described First mobile terminal M12 has obtained the mandate of trace to the source described in present scan code and security code, if it is, refer to Show that described second granted unit M137 traces to the source code and the security code mandate to the second mobile terminal described in arranging, otherwise, logical Cross the signal transmitter unit (not drawing in figure) of webserver M13, send refusal to described first mobile terminal M12 It is the second mobile terminal information that mandate is set.
Other ins and outs of native system embodiment 2 are with reference to the inventive method embodiment part.
In this article, term " includes ", " comprising " or its other variant any are intended to comprising of nonexcludability, So that include that the process of a series of key element, method, article or equipment not only include those key elements, but also include Other key element being not expressly set out, or also include want intrinsic for this process, method, article or equipment Element.In the case of there is no more restriction, statement " including ... " key element limited, it is not excluded that including The process of described key element, method, article or equipment there is also other identical element.
One of ordinary skill in the art will appreciate that all or part of step realizing in above-described embodiment method is to lead to Program of crossing completes to instruct relevant hardware, and described program can be stored in an embodied on computer readable and preserve in medium. Described preservation medium, such as: ROM/RAM, magnetic disc, CD etc..
Above the present invention is described in detail, applies specific case herein and principle and the embodiment of the present invention are entered Having gone elaboration, the explanation of above example is only intended to help to understand method and the core concept thereof of the present invention;Meanwhile, right In persons skilled in the art, according to the thought of the present invention, the most all can change Part.In sum, this specification content should not be construed as limitation of the present invention.

Claims (7)

1. the method verifying authenticity of products, it is characterised in that have on the surface be verified product and arrange uniquely Trace to the source code and unique security code, described in trace to the source code and described security code has unique incidence relation and one-to-one relationship, institute State and trace to the source code and security code is all by specific coding rule combination producing, and described in trace to the source the numeral that coding rule generated by code Add the preceding paragraph URL and connect the Quick Response Code of generation standard;In the process:
First mobile scanning terminal is verified trace to the source code and the security code of product surface;
Described first mobile terminal traces to the source code and security code to the webserver described in sending;
The described webserver according to described in trace to the source code and security code judge to be verified whether product is true, if it is, arrange institute Stating trace to the source code and the security code mandate to the first mobile terminal, sending judged result to described first mobile terminal is "true" Information and product information, otherwise, sending judged result to described first mobile terminal is the information of "false";
Wherein, the described webserver judges to be verified whether product is true as steps described below:
Same product record in code and security code whether correspondence database of tracing to the source described in judgement, if the most corresponding, confirms to be tested Card product is "false", otherwise, confirms that being verified product is "true";
Further, in code and security code whether correspondence database of tracing to the source described in judging before the step of same product record, also wrap Include following step:
Judging whether described security code meets characterization rules, if do not met, confirming that being verified product is "false", arranges institute State code of tracing to the source invalid, otherwise, continue executing with same product note in code and security code whether correspondence database of tracing to the source described in judgement The step of record.
Method the most according to claim 1, it is characterised in that judging whether described security code meets characterization rules Step and code and security code whether correspondence database of tracing to the source described in judging in same product record step between also include Following step:
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be verified Product is "false", otherwise, continues executing with same product note in code and security code whether correspondence database of tracing to the source described in judgement The step of record;
Or, also comprised the steps: before judging the step whether described security code meets characterization rules
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be verified Product is "false", otherwise, continues executing with the step judging whether described security code meets characterization rules.
Method the most according to claim 2, it is characterised in that: trace to the source described in if code and the feature of described security code Position do not meet the condition of setting, then, and arrange described in trace to the source code and security code invalid.
Method the most according to claim 3, it is characterised in that trace to the source described in if code and the feature of described security code Position meets the condition of setting, then, it is judged that the terminal of described first mobile terminal whether first scan security code or authorization terminal, as Fruit not, confirms that being verified product is "false", otherwise, continues executing with trace to the source described in judgement code and the most corresponding number of security code According to the step of product record same in storehouse, or, continue executing with the step judging whether described security code meets characterization rules.
Method the most according to claim 4, it is characterised in that also include:
First mobile terminal sends the authorized application for the second mobile terminal to the webserver;
The described webserver judges that described first mobile terminal is traced to the source the mandate of code and security code described in having obtained, as Fruit is, arrange described in trace to the source code and the security code mandate to the second mobile terminal, otherwise, send to described first mobile terminal Refusal arranges the information of mandate.
Method the most according to claim 5, it is characterised in that: the webserver judges to be verified as steps described below Whether product is true:
Whether code of tracing to the source described in judgement meets characterization rules, if it does not, confirm that product is false, otherwise,
Product record in code of tracing to the source described in judgement whether correspondence database, if it does not, confirm that product is false, otherwise,
Judge whether described security code meets characterization rules, if it does not, confirm that product is false, otherwise,
Judge the product record in described security code whether correspondence database, if it does not, confirm that product is false, otherwise,
Whether the Q-character of code and described security code of tracing to the source described in judgement meets the condition of setting, if do not met, confirms to be verified Product is "false", otherwise, confirms that being verified product is "true";Or, it is judged that described first mobile terminal is swept first Retouch terminal or the authorization terminal of security code, if it is not, confirm that being verified product is "false", otherwise, confirm to be verified product Product are "true".
7. verifying a system for authenticity of products, arrange device including the webserver, the first mobile terminal and mark, it is special Levy and be:
Described mark arranges device, arranges uniquely trace to the source code and unique security code on the surface be verified product, described in trace back Source code and described security code have unique incidence relation and one-to-one relationship;Described trace to the source code and security code is all by specific volume Code rule combination producing, and described in the numeral that coding rule generated by code of tracing to the source add the preceding paragraph URL and connect the two of generation standard Dimension code;
Described first mobile terminal includes scanning processor, is verified trace to the source code and the security code of product surface for scanning, with And trace to the source described in sending code and security code are to the webserver;
The described webserver, including Database Unit, the first judging unit and the first granted unit, wherein,
Described Database Unit, is verified product information, and trace to the source code and the security code of correspondence for storage;
Described first judging unit, for according to described in trace to the source code and security code judge to be verified the true and false of product, and, to Described mobile terminal sends the true and false information being verified product, and, it is true time being verified product, authorizes to described first Unit sends trigger message
Described first granted unit, for according to the trigger message of described first judging unit, arrange described in trace to the source code and false proof The code mandate to the first mobile terminal;
Wherein, described first mobile terminal also includes authorized application unit, moves for second for sending to the webserver The authorized application of terminal;And, the described webserver also includes the second judging unit and the second granted unit, wherein:
Described second judging unit, for after the authorized application receiving described first mobile terminal, it is judged that described first moves Terminal is traced to the source the mandate of code and security code described in having obtained, if it is, it is described to indicate described second granted unit to arrange Tracing to the source code and the security code mandate to the second mobile terminal, otherwise, sending refusal to described first mobile terminal is second to move Terminal arranges the information of mandate.
CN201310034533.7A 2013-01-30 2013-01-30 A kind of method and system verifying authenticity of products Expired - Fee Related CN103077467B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310034533.7A CN103077467B (en) 2013-01-30 2013-01-30 A kind of method and system verifying authenticity of products

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310034533.7A CN103077467B (en) 2013-01-30 2013-01-30 A kind of method and system verifying authenticity of products

Publications (2)

Publication Number Publication Date
CN103077467A CN103077467A (en) 2013-05-01
CN103077467B true CN103077467B (en) 2016-06-29

Family

ID=48153987

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310034533.7A Expired - Fee Related CN103077467B (en) 2013-01-30 2013-01-30 A kind of method and system verifying authenticity of products

Country Status (1)

Country Link
CN (1) CN103077467B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103426092A (en) * 2013-08-02 2013-12-04 北京科技大学 Two-dimensional code verification method for food safety
CN104574090B (en) * 2013-10-09 2018-08-17 无锡中科方德软件有限公司 A kind of combination is traced to the source the method for anti-counterfeit of code and accidental enciphering password
WO2015161496A1 (en) * 2014-04-25 2015-10-29 康家铭 Commodity anti-counterfeiting verification system
CN105321076A (en) * 2014-06-03 2016-02-10 江南大学 Variable and long-term anti-counterfeiting marking method and system for circulation commodities
CN104331728B (en) * 2014-10-24 2017-04-19 安徽农业大学 Two-dimensional code generation method and application thereof
CN104715382A (en) * 2015-03-23 2015-06-17 北京金和软件股份有限公司 Product anti-fake method
CN104835046B (en) * 2015-04-20 2018-03-16 信码互通(北京)科技有限公司 A kind of data false distinguishing method for two-dimension code safe verification
CN105046501A (en) * 2015-06-26 2015-11-11 河南省烟草公司商丘市公司 Cigarette authenticity electronic identification method and device
CN106778993A (en) * 2016-11-23 2017-05-31 广州市人民印刷厂股份有限公司 A kind of generation method of antifalsification label, verification method and its device
CN207182792U (en) * 2017-03-06 2018-04-03 郑州新华方数字信息有限公司 A kind of Anti-fake digital device
CN106875566A (en) * 2017-03-21 2017-06-20 厦门巍然信息科技有限公司 A kind of intelligent automatic meal taking cabinet and its management system
CN111311268A (en) * 2018-11-26 2020-06-19 深圳市节点加科技有限责任公司 Commodity anti-counterfeiting code generation and verification method, system and computer readable storage medium
CN109872167A (en) * 2019-02-22 2019-06-11 李国岐 A kind of antiforge method for commodities and anti-counterfeiting system
CN111401919A (en) * 2020-02-17 2020-07-10 北京环网瑞通软件有限责任公司 Time division multipurpose anti-counterfeiting tracing code and using method
CN112418885A (en) * 2020-11-18 2021-02-26 上海中商网络股份有限公司 Label generation method, product tracing method and related device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102385710A (en) * 2011-08-15 2012-03-21 王志刚 Method and system for verifying fact or fiction

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201716765U (en) * 2010-07-24 2011-01-19 包宋德 Wine counterfeiting tracing system based on two-dimensional bar codes
CN101944187B (en) * 2010-09-07 2014-04-02 龚湘明 Two-dimensional micro code and processing method and device thereof
CN102622693A (en) * 2012-02-11 2012-08-01 海南亚元防伪技术研究所 Video tag system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102385710A (en) * 2011-08-15 2012-03-21 王志刚 Method and system for verifying fact or fiction

Also Published As

Publication number Publication date
CN103077467A (en) 2013-05-01

Similar Documents

Publication Publication Date Title
CN103077467B (en) A kind of method and system verifying authenticity of products
CN103093365B (en) The method and system of checking authenticity of products
CN109523683B (en) Anonymous electronic voting method based on block chain technology
CN106452721A (en) Method and system for instruction identification of intelligent device based on identification public key
CN104156862A (en) Wechat-platform-based two-dimensional code anti-fake and anti-channel conflict inquiry system and method
CN104620225B (en) Method and system for server security checking
CN107169776A (en) Product certification method for anti-counterfeit based on block chain technology
CN112165382B (en) Software authorization method and device, authorization server side and terminal equipment
CN104951943A (en) Anti-counterfeiting method based on random plain and secret code association examination
CN104392260A (en) Two-dimensional code anti-counterfeiting method based on additional information
CN105046504A (en) Multiple key checking, inspection and forgery prevention source forming method and forgery prevention label
CN106548352A (en) A kind of commodity counterfeit prevention traceability system and its implementation
CN104424579B (en) Anti-counterfeiting tracing management system
CN104574090A (en) Anti-fake method combining tracing code with random encryption password
CN109360008B (en) Product anti-counterfeiting authentication updating method and system
CN109522988B (en) Method and system for updating product anti-counterfeiting electronic label information
CN102496113A (en) Method and system for realizing commodity authentication service
CN105260900A (en) Product unique identification anti-counterfeiting method and device
CN113570387A (en) Artwork tracing method based on block chain and electronic equipment
CN104836817A (en) Architecture and method for ensuring network information safety
CN206961165U (en) A kind of NFC Antiforge systems
CN117709979A (en) Textile traceability system and method based on blockchain
CN111027990A (en) Product anti-counterfeiting method and system based on material mark block chain
CN116561822A (en) Product anti-counterfeiting method, component and system
CN114444130A (en) Electronic certificate mutual trust and mutual authentication platform based on block chain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
DD01 Delivery of document by public notice

Addressee: Wang Zhigang

Document name: Notification of Passing Examination on Formalities

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160629

Termination date: 20210130

CF01 Termination of patent right due to non-payment of annual fee