CN110533430A - A kind of antifake method for products and system and electronic device - Google Patents
A kind of antifake method for products and system and electronic device Download PDFInfo
- Publication number
- CN110533430A CN110533430A CN201810429620.5A CN201810429620A CN110533430A CN 110533430 A CN110533430 A CN 110533430A CN 201810429620 A CN201810429620 A CN 201810429620A CN 110533430 A CN110533430 A CN 110533430A
- Authority
- CN
- China
- Prior art keywords
- information
- products
- product
- following feature
- antifake method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 239000002994 raw material Substances 0.000 claims abstract description 5
- 238000004519 manufacturing process Methods 0.000 claims description 12
- 238000003860 storage Methods 0.000 claims description 8
- 238000009826 distribution Methods 0.000 claims description 5
- 230000005284 excitation Effects 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims description 4
- 238000010200 validation analysis Methods 0.000 claims description 4
- 238000012795 verification Methods 0.000 claims description 4
- 230000002159 abnormal effect Effects 0.000 claims description 3
- 210000000744 eyelid Anatomy 0.000 claims description 3
- 238000005520 cutting process Methods 0.000 claims description 2
- 238000013523 data management Methods 0.000 claims description 2
- 210000000554 iris Anatomy 0.000 claims description 2
- 230000002093 peripheral effect Effects 0.000 claims description 2
- 210000001367 artery Anatomy 0.000 claims 1
- 239000008280 blood Substances 0.000 claims 1
- 210000004369 blood Anatomy 0.000 claims 1
- 210000003462 vein Anatomy 0.000 claims 1
- 230000007246 mechanism Effects 0.000 abstract description 7
- 239000003814 drug Substances 0.000 abstract description 6
- 229940079593 drug Drugs 0.000 abstract description 6
- 239000000383 hazardous chemical Substances 0.000 abstract 1
- 239000000126 substance Substances 0.000 abstract 1
- 239000000047 product Substances 0.000 description 52
- 238000004806 packaging method and process Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 238000012856 packing Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 208000027418 Wounds and injury Diseases 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 210000004204 blood vessel Anatomy 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000013066 combination product Substances 0.000 description 1
- 229940127555 combination product Drugs 0.000 description 1
- 239000013065 commercial product Substances 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- OWZREIFADZCYQD-NSHGMRRFSA-N deltamethrin Chemical compound CC1(C)[C@@H](C=C(Br)Br)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 OWZREIFADZCYQD-NSHGMRRFSA-N 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000004880 explosion Methods 0.000 description 1
- 208000014674 injury Diseases 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000007789 sealing Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Landscapes
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Marketing (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of antifake method for products, it is characterized in that its encryption information changes with supply chain dynamic encryption, the primary embryonics information such as raw material manufacturer can not be obtained and be identified by making to copy, it is excluded in market, it is very convenient to food, drug, the security control of Hazardous Chemical Substances, consumption, it is a kind of antifake method for products of decentralization, important social influence will be generated.Not only it had realized big data to excavate shared but also protect individual privacy and business secret, but also has established role in system and rebuild incentive mechanism.Anti-counterfeiting system based on supply chain includes encryption system, decryption system, distributed and customer end systems.Antiforge electronic device based on supply chain includes computer hardware, radio frequency reading rifle, PAD, mobile phone or Internet of Things endpoint, wireless interconnected system and corresponding software management system.
Description
Technical field
The present invention relates to a kind of antifake method for products, system and electronic devices, can effectively prevent the false protection manufacture of manufacturing and marketing the fake
The legitimate rights and interests of quotient and consumer.
Background technique
For a long time, manufacturing and marketing the fake had not only upset market order but also cannot be guaranteed the product quality of consumer or even will cause
Even more serious injury, such as food and drug safety.
Anti-counterfeiting technology is both the hot spot that manufacturer pays close attention to and government and the focus of attention of consumer.
Product is counterfeit in order to prevent by businessman, can convert packaging in different periods to identical product.Businessman is releasing new product
When, it can also replace new packing.Therefore, when causing the kind of packing of a kind of product various, consumer also layman mostly, very
Hardly possible judges the true and false of the packaging.The true and false for how verifying commodity, becomes the problem of consumer especially pays close attention to.
A mark of the bar code as product, most of commodity are in order to enter market, supermarket is convenient for settling accounts, it is necessary to set
Bar code, therefore either genuine piece or fake products are set, bar code can be all set, bar code has national standard, general quotient
Product bar code is generally made of prefix part, manufacturer's code, commercial product code and check code, therefore similar commodity its bar codes
It is middle identify the commodity part be all it is identical, no matter genuine piece and counterfeit goods, in order to which product can be scanned in market, supermarket
Type, the bar code of similar product are identical.It bar code and its is easy counterfeit, does not have antifalsification substantially.
With being widely used for the product identification codes such as two dimensional code, many commodity are both provided with identification code convenient for consumer at present
Scanning obtains the information of the commodity, and the two dimensional code is anti-fake as anti-counterfeiting information progress.But two dimensional code is also easy to be imitated
It emits, therefore simple also very poor using the antifalsification of two dimensional code, it is anti-fake to generally require the progress such as identifying code of combination product.Identifying code
It could be used after needing to buy the product, be difficult to accomplish pre-sales anti-fake.There is the manufacturer of some fake products, in order to avoid disappearing
Expense person be scanned using two dimensional code it is anti-fake, specially select not set two-dimension code label packaging carry out it is counterfeit.For more
The product with two dimensional code packaging is changed, personation manufacturer then selects the old packaging that antifalsification label is not used before use to be imitated
It emits.Since the packaging of many products is varied, consumer is difficult to recognize new second hand packing and expired some packagings, this is disappeared
The fake certification of expense person is made troubles.
Based on the above circumstances, commodity counterfeit prevention problem still could not well solve.Therefore, one kind being suitable for the internet of things era
Block chain anti-counterfeiting technology be in demand.
Summary of the invention
For method for anti-counterfeit of tracing to the source, system and the electronic device for solving a kind of internet of things oriented technology, the product that we invent
Method for anti-counterfeit is achieved in that
When product export raw material of product etc. manufacture information, production information, batch bulk information, geographical location information, price,
Manufacturer's information, distributor information, distribution circulation and billing information add information automatically and encrypt generation graphic code by machine
It goes together with goods, this process cannot manually intervene, and confirmed to user terminal by user and confidentiality agreement, layering decrypted user are enjoyed
The informed information having, while sharable unclassified big data information is passed through permission and the confidentiality agreement side of knowing automatically by machine
Formula carries out layering decryption.
The antifake method for products has following feature, is diffused as according to product supply chain presentation distribution non-central anti-
The antifake method for products has following feature, and various clients find illicit sources product, the counterfeit production of cutting in time
The entrance of product inflow consumer.Various clients include dealer, consumer and market surpervision department.
The antifake method for products has following feature, and client is fixed in advance according to system to the informed permission of information
The role of justice determines, is determined by signing confidentiality agreement when registration with identity validation when decryption.
The antifake method for products is applied after there is following feature, excitation role counterfeit or inferior quality goods are identified and be identified
Enthusiasm can reward the ideal money or commodity of certain number.
The antifake method for products has following feature, in order to radio frequency barcode scanning when encryption information circulates with supply chain
The two dimension with authentication, three-dimensional or the multidimensional coding figure or bar code table of encryption reach.
The antifake method for products has following feature, and commodity consumption person consumption must pass through body using when checking commodity
Part verifying and the prompt of source legitimacy, can prompt commodity circulation abnormal prompt to government regulation cell phone client, can mention to law enforcement
For the information that can trace to the source in more detail.
The antifake method for products has following feature, and permission of knowing is will be appreciated that according to market surpervision and client
Or not, it should be appreciated that centre can not manually intervene including system super keepe by the predefined come what is realized of system actor.
The antifake method for products has following feature, and identity validation is by people's eyelid, iris, blood vessels, fingerprint etc.
The modes such as bio-identification, short message verification code are not limited to realize with upper type.
The anti-counterfeiting system based on supply chain that we invent includes shared encrypting module, deciphering module, distributed data pipe
Manage module and customer end systems.
The Antiforge electronic device based on supply chain that we invent includes storage medium, execution unit, input unit and shows
Show unit, the computer program for realizing preceding method or system above-mentioned is recorded on storage medium, execution unit is used for
Computer program is executed, display unit is used to receive peripheral operation and shows the implementing result of execution unit, and input unit includes
It is not limited to various radio frequencies, keyboard, mouse input.
Detailed description of the invention
Fig. 1 is method for anti-counterfeit flow chart of the invention.As seen from the figure, authenticity of products is the necessary way of consumer, otherwise
It can not consume and commodity in use.
Fig. 2 is system structure module map of the invention.
Fig. 3 is electronic device construction schematic diagram of the invention.
Specific embodiment
Technical solution of the present invention is further illustrated with reference to the accompanying drawing.
There is provided a kind of fair and just social supervision systems for technical characterstic of the invention, that is, protect businessman's business secret
The individual privacy of close and consumer, and can allow social sharing big data achievement, it is common to supervise adulterant and deceptive information.This system adds
Close is that system is encrypted automatically, decrypted, and can only manually intervene process and cannot be directly viewable or change data.
As shown in Fig. 1, the antifake method for products of the invention based on supply chain, comprising the following steps:
First step S1: Cryptographic code or two dimensional code generate.When the product export of manufacturer, manufacturer is by the raw material etc. of product
Manufacture information, production information, batch bulk information, geographical location information, price, manufacturer's information, distributor information, distribution flow
Logical and billing information by machine adds information and encrypting automatically and generates graphic code encrypt and life automatically with goods anti-counterfeiting system of going together
At the graphic code or two dimensional code of encryption.
Dealer is gone together graphic code or two dimensional code by what manufacturer issued with goods, and scanning input is generated into stores list bitmap
Shape code (with storage bill and), automatically generate to go together with goods again when selling out inventory and code and check with batch quantity in stock=storage quantity-
Sales volume, is such as veritified successfully, is circulated to next stage dealer or consumer with goods colleague's code.
Second step S2: barcode scanning verifying and hierarchical decoding.
It prevents from palming off safely for merchandise news, various Role Identity registrations, and electronic signature agreement clearly maintains secrecy, identity is true
Reality and purposes or use scope agreement.
Consumer would know that the commodity by verification information by mobile phone or intelligent terminal scanning figure shape code or two dimensional code
Whether source legal or authenticity of products.
Logistics would know that the information such as Shipping Address and the contact person, phone of the cargo or product by verifying by barcode scanning,
It is very suitable to the secret protection of the stronger products customers of the privacy such as drug.
After next stage dealer scanning is by verifying, it is known that authenticity of products, anti-channel conflict.
In the case where executing quotient's privacy protection by verifying and agreement after market surpervision personnel scanning, it is known that this product is in locality
Sales volume, quantity in stock, judgement is illegal flows into situation, can arrive any one market and check commodity true and false, find the problem in time, in time
It solves, it is very convenient and reliable to guarantee drug and food safety.
According to the role of registration and by accordingly auditing, the identification of people's eyelid, iris recognition, fingerprint recognition or short can be passed through
The modes such as letter verifying pass through verifying.It can be for different role layering decryption.As consumer it is available whether genuine article or source it is legal
Information, make consumer the true and false of product or the legitimacy in source as product consumption or the first step used.This point pair
Drug, food or staple commodities are even more important.
Third step S3: role's excitation.It was found that after source of goods exception, consumer, sell commercial city can be in first time to manufacturer
It is reported with government regulator, market surpervision law enforcement group can then put on record executions, we will be using integrating or credit or bit coin
Incentive mechanism rewards various roles, works as one man, and false pseudo- product is evicted from market.
For example we implement following incentive mechanism: to the exception of discovery, taking incentive mechanism, report primary reward bit
Coin or the every report of consumer be primary and be verified as very rewarding 1000 bit coin, can convert and consume for several RMB.
Or integral 2000.
Another embodiment takes incentive mechanism to the exception of discovery, reports primary reward bit coin or integral 500;Quotient
Family's credit value increases at 1000 points;Supervision department's disposition is primary, and public letter value increases at 1000 points;The same day announces disposition result, public affairs letter
Value increases at 5000 points;Disposition result is announced in 2 days, public letter value increases at 3000 points;The increase of government regulator public affairs letter value, can
As the foundation of reward related personnel, and the foundation of related government functionary's quantitative appraisal.
Specific excitation value adjusts stage by stage according to the actual situation.
4th step S4: disposition and feedback
Role's excitation makes various roles work hard, and most critical is also resided in the disposition after the discovery of true and false product, according to existing
Regulation and law enforcement situation, product false proof is the important process of governance market order, it is therefore desirable to which government participates in, this will beat
Broken product false proof is the thinking boundary in manufacturer's ego-defense market, and product false proof work is established and is ensureing that market order is public
Ideological plane that is just, protecting the legitimate rights and interests of consumers with the security of the lives and property is equalled, government, enterprise, consumer participate in jointly, close
Note, can just carry out, especially drug, food relationship citizen's life security product it is anti-fake, it is even more so.
Business and government market surpervision department will put on record immediately after receiving or finding the abnormal conditions of product anti-fake system, adopt
Card, rapid field examination, until quickly disposition, allows manufacturing and marketing the fake person nowhere to dodge.This system will track government regulation portion
The putting on record of door, the sealing up for safekeeping of Cha Zhenghou, disappears and the whole process such as ruins, punish at task assignment and on-site verification, and the nothing that makes to crack down on counterfeit goods is discussed, processing stream
Journey legalization is without asking panel discussion for instructions.
Disposition result is fed back into reporter simultaneously, advantageously forms the benign cycle of closed loop management.
As shown in Fig. 2, the anti-counterfeiting system of the invention based on supply chain includes shared encrypting module, deciphering module, registration
Module, distributed data management module and customer end systems.Shared encrypting module is not disclose to disclosed merchandise news and
Information encrypted, for example raw material sources and amount can disclose no one as important business secret, and every family does not know
Road.But total amount can be summarized, there is one accurately to hold the injected volume in market for manufacturer, in order to avoid accumulate a large amount of production
Data occupies substantial contribution, very good for the in due course material supply of enterprise, but this information is a transitional information,
Only machine is known all right, and any other people is not necessarily to know, quickly judges that system, illicit sources product or product are true
Puppet is beneficial.Therefore, only machine encrypts and assigns pre- special quick-searching identification information, is conducive to information retrieval, feedback.
The security mechanism that system encryption is decrypted automatically, can software copyright registration unit or software test mechanism tested
Card after test passes through repeatedly, grants registration or operation.
Deciphering module is directed to different clients, decrypts information needed respectively, and the seller of the fake goods that rehearses can not obtain comprehensively
Product information is found once appearing in market.
Accordingly, the authentication and information privacy of government market supervisor is crucial, and registration module is necessary this
The important composition of the anti-counterfeiting system of invention.
Distributed data inventory's management uses HADOOP technological frame.Since encryption data is using retrieval code is generated, believe
Breath feedback is very quick, solves the problems, such as data redundancy and data safety by distributed data base Storage Techniques.
The present invention solves the problems, such as the increase of explosion type amount of access by HADOOP technology, it is ensured that data safety, transmission are suitable
Freely.
Data encryption and data sharing are conflicts, therefore, fast and effeciently filter out and share by data, to greatest extent
Business secret is protected on ground and individual privacy is the key that one of of the invention.Distributed data storage had not only solved data safety but also energy
Prevention breaks out the problem of formula access causes data transmission blocking.
Antiforge electronic device of the invention is collectively constituted by software and hardware.Including computer hardware, radio frequency reading rifle, PAD, hand
Machine, intelligent terminal or Internet of Things endpoint, wireless interconnected system and corresponding software management system.Specifically be classified as memory cell,
Input or data acquisition unit, arithmetic element, execution unit, as shown in figure 3, the technology upgrading of each unit has no effect on the present invention
Protection to technological system.
Wherein, the method and system of the embodiment of the present invention can be realized by way of computer program, and computer journey
Sequence can store in the electronic device for including storage medium, such as in smart machine (mobile phone, wrist-watch, tablet computer etc.).This
Sample, so that it may realize the smart machine of the above method or system by recording and provide corresponding service for user, equally
Including passing through Internet of Things, internet and other intelligent wireless communication modes.
Above-described is only some embodiments of the present invention.For those of ordinary skill in the art, not
Under the premise of being detached from the invention design, various modifications and improvements can be made, these belong to protection model of the invention
It encloses.
Claims (11)
1. a kind of antifake method for products is achieved in that
When product export raw material of product etc. manufacture information, production information, batch bulk information, geographical location information, price,
Manufacturer's information, distributor information, distribution circulation and billing information are added information automatically and are encrypted by machine, are generated same with goods
Capable graphic code or two dimensional code, is unable to manual intervention, is confirmed to user terminal by user and confidentiality agreement, decrypted user are enjoyed
Informed information, while sharable unclassified big data information is passed through know permission and confidentiality agreement mode automatically by machine
Carry out layering decryption.
2. antifake method for products as described in claim 1 has following feature, distribution is presented according to product supply chain and is diffused as
Non-central method for anti-counterfeit solves contradiction disclosed in privacy, privacy protection and data.
3. antifake method for products as described in claim 1 has following feature, various clients find that illicit sources produce in time
Product, cutting counterfeit product flow into the entrance of consumer.
4. antifake method for products as described in claim 1 has following feature, client is basis to the informed permission of information
System role predetermined determines, is determined by signing confidentiality agreement with identity validation when decrypting when registration.
5. antifake method for products as described in claim 1 has following feature, counterfeit or inferior quality goods are identified and known for excitation role
The enthusiasm that do not apply afterwards can reward the ideal money or commodity of certain number.
6. antifake method for products as claimed in claim 2 have following feature, when encryption information circulates with supply chain so as to
It is reached in the two dimension with authentication, three-dimensional or the multidimensional coding figure or bar code table of the encryption of radio frequency barcode scanning.
7. antifake method for products as claimed in claim 3 has following feature, when commodity consumption person consumes using commodity are checked
It must pass through authentication and the prompt of source legitimacy, commodity circulation abnormal prompt can be prompted to government regulation cell phone client,
The information that can trace to the source in more detail can provide to law enforcement.
8. antifake method for products as claimed in claim 4 has following feature, permission of knowing is according to market surpervision and visitor
Family will be appreciated that or not, it should be appreciated that by the predefined come what is realized of system actor, centre can not manually intervene super including system
Grade administrator.
9. antifake method for products as claimed in claim 5 has following feature, identity validation is by people's eyelid, iris, blood
The modes such as the bio-identifications such as arteries and veins, fingerprint, short message verification code are not limited to realize with upper type.
10. a kind of anti-counterfeiting system based on supply chain include shared encrypting module, deciphering module, distributed data management module and
Customer end systems.
11. a kind of Antiforge electronic device based on supply chain includes storage medium, execution unit, input unit and display unit,
The computer program for realizing preceding method or system above-mentioned is recorded on storage medium, execution unit is for executing calculating
Machine program, display unit are used to receive peripheral operation and show the implementing result of execution unit, and input unit includes being not limited to
Various radio frequencies, keyboard, mouse input.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810429620.5A CN110533430A (en) | 2018-05-08 | 2018-05-08 | A kind of antifake method for products and system and electronic device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810429620.5A CN110533430A (en) | 2018-05-08 | 2018-05-08 | A kind of antifake method for products and system and electronic device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110533430A true CN110533430A (en) | 2019-12-03 |
Family
ID=68656302
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810429620.5A Pending CN110533430A (en) | 2018-05-08 | 2018-05-08 | A kind of antifake method for products and system and electronic device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110533430A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111104882A (en) * | 2019-12-09 | 2020-05-05 | 曹玉平 | Scanning identification method |
CN115293311A (en) * | 2022-10-08 | 2022-11-04 | 北京微点科学技术有限公司 | Color watermark anti-counterfeiting method and device based on micro-point code |
IT202200016464A1 (en) * | 2022-08-03 | 2024-02-03 | Imac S R L | E-COMMERCE SYSTEM AND METHOD WITH SUPPLY CHAIN TRACEABILITY VIA BLOCKCHAIN |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102956005A (en) * | 2011-08-24 | 2013-03-06 | 中国移动通信集团设计院有限公司 | Anti-counterfeiting method, anti-counterfeiting system and packaging structure |
CN103295137A (en) * | 2013-04-11 | 2013-09-11 | 济南润土农业科技有限公司 | Two-dimensional code dynamic anti-fake information intelligent tracing system based on network |
CN104156865A (en) * | 2014-08-26 | 2014-11-19 | 昆明特康科技有限公司 | Commodity anti-counterfeiting, verifying and tracing system and use method thereof |
CN106548354A (en) * | 2016-10-10 | 2017-03-29 | 广州智慧城市发展研究院 | A kind of commodity traceability system |
CN107103480A (en) * | 2017-05-18 | 2017-08-29 | 电子科技大学 | Supply chain management method based on block chain with sovereign right |
-
2018
- 2018-05-08 CN CN201810429620.5A patent/CN110533430A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102956005A (en) * | 2011-08-24 | 2013-03-06 | 中国移动通信集团设计院有限公司 | Anti-counterfeiting method, anti-counterfeiting system and packaging structure |
CN103295137A (en) * | 2013-04-11 | 2013-09-11 | 济南润土农业科技有限公司 | Two-dimensional code dynamic anti-fake information intelligent tracing system based on network |
CN104156865A (en) * | 2014-08-26 | 2014-11-19 | 昆明特康科技有限公司 | Commodity anti-counterfeiting, verifying and tracing system and use method thereof |
CN106548354A (en) * | 2016-10-10 | 2017-03-29 | 广州智慧城市发展研究院 | A kind of commodity traceability system |
CN107103480A (en) * | 2017-05-18 | 2017-08-29 | 电子科技大学 | Supply chain management method based on block chain with sovereign right |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111104882A (en) * | 2019-12-09 | 2020-05-05 | 曹玉平 | Scanning identification method |
IT202200016464A1 (en) * | 2022-08-03 | 2024-02-03 | Imac S R L | E-COMMERCE SYSTEM AND METHOD WITH SUPPLY CHAIN TRACEABILITY VIA BLOCKCHAIN |
CN115293311A (en) * | 2022-10-08 | 2022-11-04 | 北京微点科学技术有限公司 | Color watermark anti-counterfeiting method and device based on micro-point code |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Maesa et al. | Blockchain 3.0 applications survey | |
US8421593B2 (en) | Apparatus, systems and methods for authentication of objects having multiple components | |
JP5890834B2 (en) | Product authentication method and system for executing the product authentication method | |
US20090167489A1 (en) | Anti-forgery method and apparatus based on cpk electronic tag | |
CN108389059A (en) | Digital copyrighted work protection, transaction and distributing method based on ownership and system | |
CN104574092A (en) | Commodity anti-counterfeiting system based on invoice and commodity stocks accounting and anti-counterfeiting method | |
CN104217241A (en) | Electronic anti-fake label and realizing method | |
CN109903135A (en) | A kind of jewelry electronic information shared system based on block chain | |
Ionescu et al. | Fraud, corruption and cyber crime in a global digital network | |
CN110533430A (en) | A kind of antifake method for products and system and electronic device | |
CN110310130B (en) | Anti-counterfeiting method and system | |
Al Noman et al. | An intelligent application for preventing the counterfeit medicines through a distributed blockchain | |
CN100492968C (en) | Anti-fake technology based on dynamic cipher | |
CN112884485A (en) | Symmetric encryption traceability transaction method, system and storage medium based on block chain network | |
Han et al. | Fine-grained business data confidentiality control in cross-organizational tracking | |
Jevtic et al. | Blockchain-Based Countermeasures for Luxury Goods Counterfeiting: A Focused Survey | |
Ge | Analysis of legal framework solutions to protect retail consumers | |
Bhuiyan et al. | Reducing Product Counterfeiting Using Blockchain Technology in E-Commerce Business | |
Fang et al. | Construction of the Supply Chain of Live Streaming E-commerce Based on Blockchain and Internet of Things | |
Lo et al. | Blockchain-Based Anti-Counterfeit Product Identification System | |
Mnasri et al. | 5 Current Advances on the Application of Blockchain Solutions in Digital Marketing | |
Saraswathi et al. | Combating Counterfeit Products with Blockchain Technology to Enhance Trust and Authenticity in Consumer Markets | |
Sharma et al. | Fake/Counterfeit Medical Product Identification Using Blockchain & QR Code | |
Pavithra et al. | Identification of Counterfeit Products Using Blockchain in E-Commerce | |
Medhat et al. | Identifying Fake Products using Blockchain Technology in Supply Chain System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210408 Address after: 510070 Room 411, 83 Xianlie Middle Road, Yuexiu District, Guangzhou City, Guangdong Province Applicant after: GUANGZHOU SAVETECH Co.,Ltd. Applicant after: Liu Zhenmin Address before: 510093 Room 411, 83 Xianlie Road, Yuexiu District, Guangzhou City, Guangdong Province Applicant before: Liu Zhenmin |