[go: up one dir, main page]

CN102622691B - Realize the method for the false proof and network identity authentication of commodity substep - Google Patents

Realize the method for the false proof and network identity authentication of commodity substep Download PDF

Info

Publication number
CN102622691B
CN102622691B CN201210019619.8A CN201210019619A CN102622691B CN 102622691 B CN102622691 B CN 102622691B CN 201210019619 A CN201210019619 A CN 201210019619A CN 102622691 B CN102622691 B CN 102622691B
Authority
CN
China
Prior art keywords
false proof
commodity
authentication
client
codeword value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210019619.8A
Other languages
Chinese (zh)
Other versions
CN102622691A (en
Inventor
吕洋波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang 1one Technology Co., Ltd.
Original Assignee
Hangzhou Yi Wang New Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Yi Wang New Science And Technology Co Ltd filed Critical Hangzhou Yi Wang New Science And Technology Co Ltd
Priority to CN201210019619.8A priority Critical patent/CN102622691B/en
Publication of CN102622691A publication Critical patent/CN102622691A/en
Application granted granted Critical
Publication of CN102622691B publication Critical patent/CN102622691B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Realize the method for the false proof and network identity authentication of commodity substep, it utilizes up-to-date commodity counterfeit prevention authentication techniques, solves long-standing problem enterprise and crack down on counterfeit goods false proof, when consumer buys commodity and equipment, has no way of understanding in advance a difficult problem for its true identity situation.Due to the false proof authentication verification design of its open substep, facilitate enterprise of businessman anti-counterfeiting technology, any selection of scheme and combination, and the production period and batch, the dynamic conditioning at any time of anti-counterfeiting technology, scheme is set, does not so leave any space of playing tricks to fake producer; Set up the technical system of " knowing very false proof ", not only reach false proof object, be to enterprise of businessman and products thereof more, carried out promotional display popularization; Realize the transparent consumption that " goods is to knowing " is " known in advance ", the extension false proof business being carried out identification authentication business is integrated.Like this, the participation of businessman and user is just very high, thus ensure that the marketing application of this technological invention.

Description

Realize the method for the false proof and network identity authentication of commodity substep
Technical field
The present invention relates to the application that an Internet technology and Internet of Things and digital identification techniques merge, it utilizes existing state-of-the-art technology, solving long-standing problem enterprise cracks down on counterfeit goods false proof, when consumer network buys commodity and equipment, understand its true identity situation in advance because having no way of and a difficult problem of usually being swindled.Due to the false proof authentication verification design of its open substep, facilitate enterprise of businessman anti-counterfeiting technology, any selection of scheme and combination, and the production period and batch, the dynamic conditioning at any time of anti-counterfeiting technology, scheme is set, does not so just leave any Time and place of playing tricks to fake producer; Set up the technical system of " knowing very false proof ", not only reach false proof object, be to enterprise of businessman and products thereof more, carried out promotional display popularization, organic combination has been done in anti-counterfeiting technology service and network electronic commerce; Realize the transparent consumption that " goods is to knowing " is " known in advance ", the extension false proof business being carried out identification authentication business is integrated.Like this, the participation of businessman and user is just very high, thus ensure that the marketing application of this technological invention.
Background technology
Anti-counterfeiting technology kind is a lot, mainly contains antiforge technology, chemical material anti-counterfeiting technology, physical security technology, digital information false proof technology, structure and package anti-counterfeiting technology, human body and biological characteristic anti-counterfeiting technology etc.
Computer network anti-counterfeiting technology is that comprehensive utilization computer networking technology, the communication technology, data encoding technique and printing marking technique carry out false proof a kind of new and high technology.Its developing direction and emphasis is: be constantly melted in anti-fake network system by new technology, should develop simultaneously and be applicable to false proof special technology, strengthen the security performance of anti-fake network on this basis, ensures the reliability of whole system.
Existing computer network anti-counterfeiting technology, and patent of invention and application for a patent for invention, propose some anti-counterfeiting technology thinking and methods for using thems, part solves some anti-pseudo problems, but also exist much in actual applications, the obstacle that cannot overcome, is mainly manifested in the following aspects:
Whether 1, single anti-fake code mark mode, refer to and only arrange an anti-fake mark coding, and existed by this anti-fake mark of database lookup coding, judge the method for anti-counterfeit of authenticity of products.Such drawback is, even if be judged to be true, but can not stop for the very large commodity of value or equipment, illegal producer or dealer, take to steal the beams and change the pillars, stay shell from the bottom of one's heart, replaces critical component etc. and fake the behavior of rehearsing; If checking passage does not have popularity, or anti-counterfeiting technology does not have exclusivity, the person of faking just can use same technical approach, and mislead users goes to verify to its checking passage, and deceptive person copies same technology, finally does user is hard to tell whether it is true or false; Because single anti-fake mark cannot provide user more genuine piece information, the person of faking is counterfeit to play tricks easily, and user also has no way of comparing discriminating, does not reach really false proof object.
2, verify the false proof mode once lost efficacy, be namely exactly the mode adopting note code or voice directory enquiry, whether decision verification code has been verified used, thus whether reminding user is false method for anti-counterfeit.Such drawback is, if user not after this authentication, just must buy these commodity or equipment, so producer and businessman certainly will will be authenticated commodity or equipment, changes identifying code, causes very large trouble, moreover, sometimes cannot change again; If because producing, packaging, transport and storage cause the breakage of input code or identifying code, fuzzy, the true and false verifying these commodity or equipment cannot be carried out, the process even if businessman gives a discount, user also can suspect, but the item property of these commodity or equipment and use attribute, still partly or entirely exist.
3, the false proof mode of proprietary technology, is namely exactly adopt a kind of single proprietary anti-counterfeiting technology or method, realizes the false proof process to commodity or equipment.Such drawback is, cannot cover the false proof demand of all products, if will make large area Application in Anti-counterfeiting, builds up integrated form anti-counterfeiting technology service platform, and cultivate the certain use habit of user and platform credit worthiness, this cannot accomplish; In addition for this anti-counterfeiting technology, if inadequate communication, general user is not cognitive, cannot understand that it is true and false, provides leak space to counterfeit false making; Meanwhile, also there is great administrative vulnerability and security risk in the outer mode for anti-counterfeiting mark.
4, the false proof mode of light and shade code combination, is the private mark that will verify, indicates the place generally can not arbitrarily read at product, or needs the checking coding by the identification of special instrument ability.Such drawback is, checking needs the shelf integrity (but not affecting use globality) destroying commodity or equipment, if user is finally because of other reasons, abandon buying these commodity or equipment, and the behavior of user is not illegal, this will inevitably cause trouble and conflict, thus suppresses the desire to purchase of user, affects the sale of these commodity or equipment; If could identification checking will encode by special instrument, this also makes troubles to user and inconvenience, can suppress the desire to purchase of user equally, affect the sale of these commodity or equipment.
The existence of the problems referred to above, for using brand-new anti-counterfeiting technology theory, integrates state-of-the-art technology, and the application of Development of New Generation anti-counterfeiting technology and product, provide wide space.
Summary of the invention
The present invention relates to the fusion application of an Internet technology and Internet of Things and digital identification techniques, it utilizes state-of-the-art technology, solves long-standing problem enterprise and crack down on counterfeit goods false proof, and when consumer buys commodity and equipment, has no way of understanding in advance a difficult problem for product real conditions.Technology application characteristic of the present invention, is mainly manifested in the following aspects:
1, the brand-new anti-counterfeiting technology system of " knowing very false proof " is set up.Changing traditional " verification is false proof " is " knowing very false proof " pattern, the production technology of the title of enterprise of businessman, brand, trade mark and product, uses material, external appearance characteristic, the production time etc., can as one of the parameter and foundation of authenticity of products checking.Like this, unique way that fake producer will successfully fake, only has and selects the materials and process the same with genuine piece, causes fraud profitless, the necessity of naturally also just not faking.This not only reaches false proof object of cracking down on counterfeit goods, and simultaneously also to enterprise of businessman and products thereof, carried out extensive promotional display and promoted, allow user fully understand, grasp genuine piece, certified products, the quality that qualified product should have ensures feature.The participation of businessman and user is very high, ensure that the marketing application of this technological invention, particularly the E-business service of anti-counterfeiting technology service with the Internet is organically combined, operational space and the profit of greatly having expanded operation platform are worth, also be that its new technology from now on merges, new business extends has carried out resources reserve.
2, the design of open multidimensional anti-counterfeiting characteristic and anti-fake mark, facilitate enterprise of businessman, based on the product of oneself, the actual conditions of equipment and process need, to suitable feasible multiple anti-counterfeiting technology, scheme, select arbitrarily and combine, and producing period and different production batch for product difference, carrying out the adjustment at any time of anti-counterfeiting technology, scheme.So just greatly increase the fraud difficulty of fake producer, any chance can not be stayed to fake producer.
3, substep verifies anti-counterfeiting design, user can according to the needs self understanding these commodity or equipment, and buy the possibility of these commodity or equipment, progressively realize judging the checking of these commodity or equipment, particularly for the method for anti-counterfeit of private mark mark, when not assert this private mark anti-fake mark, also the anti-fake mark can be able to assert by other or identity characteristic, judge the basic true and false of these commodity or equipment, for whether buying, continue next step fake certification, finally realized buying, reference is provided.Be unlikely to, because will private mark be read, to destroy the item property of commodity or equipment, cause dispute and trouble.
4, the authentication functions that general digital product networks, be incorporated into the networking identification authentication identification to all commodity or equipment, greatly enriched the anti-fake mark information of system acquisition and the scope of application of feature fake certification descriptor, this is also the thorough revolution to all fake and forged behaviors.Particularly at internet electronic business today, in the epoch that online fake traffic is prevailing, " identify " to all online merchants and commodity, setting up the consumption guarantee that brand-new " goods is to knowing " is " known in advance ", having huge meaning.
Ecommerce Third-party payment instrument, has assured the safety of fund and payment.But for the true and false and the quality grade guarantee of commodity, go back the Third Party Authentication instrument of neither one authority, provide the quality assurance of commodity to support; And, allow third party go to identify the whether qualified of all products, can not realize, even legal quality inspection mechanism of country does not accomplish yet.But the business predicament that such fake products spreads unchecked, must change and specification; Sincerity, knows genuine business rule, must set up.
The invention provides one allows the producer, legal person carry on a shoulder pole product " identification authentication " solution of duty.It allows buys consumption and first starts from education is cognitive, and it allows all true and falsely all expose in the sun, and it allows all producers, and the evaluation that all will accept total user is supervised.So just from source, provide the most direct solution the most thoroughly of one.In other words, the present invention, from another angle, establishes a kind of Third Party Authentication business, provides commodity quality supervision to ensure and identity authentication service.
The present invention relates to the fusion application of an Internet technology and Internet of Things recognition technology, the affiliated method realizing the false proof and network identity authentication of commodity substep, is made up of following technical essential step:
Realize the method for the false proof and network identity authentication of commodity substep, that manufacturer's product own coding will be set, the false proof authentication signature of establishment marked product, by product false proof authentication signature Message Entry System database, system matches also marks false proof authentication codeword value, the system client of configuration Intelligent Recognition terminal, and on system client, the recognition mode functional module of the different recognition technology of integrated support, Mobile intelligent identification terminal client passes through network, build the access analytic relationship to system database, comprise the steps:
The first, at product external packaging, inner packing, the parts of product itself and product are one or more to be marked a little, according to fake certification or the identification authentication class requirement of this product needed, arranges the false proof authentication signature of unique or multiple codes and the false proof authentication signature of feature.
The false proof authentication signature of code, refers at product external packaging, inner packing, product itself and a certain parts of product are one or more marks a little, write numeral or alphanumeric codes by certain rule, and by these identical or different codes, mark by false proof class requirement.Write the not same sex of numeral or alphanumeric codes by certain rule, also show and can allocate different voluntarily to each single product of same batch, irregular random code.By the packaging of encoder at product, on production line, automatic printing, marking, mark also system synchronization typing.This ensures that there the fail safe of anti-fake code, do not leave any possibility of playing tricks to fake producer.
The false proof authentication signature of feature, refer at product external packaging, inner packing, the parts of product itself and product are multiple to be marked a little, the feature anti-fake mark of the realization such as such as antiforge technology, chemical material anti-counterfeiting technology, physical security technology, laser digital information anti-fake technology of mark.
The second, arrange product own coding, according to product own coding, system arranges to set up certain service charging fees policy by both sides.
Product own coding is set, refer to and first by manufacturer, all anti-counterfeiting characteristic data acquisitions can be completed, set up this product or equipment or this batch products, the data system of the false proof authentication information of markd code or the false proof authentication information of feature interpretation, then by this data system import system.Like this between production line and system, owing to not needing to set up teleinstruction, reduce technical difficulty and equipment scale input, be applicable to the Workplace application of all large small-scales and technical conditions.If the sync mark realized by professional equipment and telemanagement, editor, typing etc., the input of producer is more, and automaticity requires high, is only suitable for large-scale pipeline operation, does not have popularity promotional value.
Set up certain service charge charging regulation, the system of referring to provides false proof authentication service, collects certain service charge to accepting service side.In general, this service charge is main or all paid by manufacturer's (or manufacturers' agent).To the charge of manufacturer, there is multiple design alternative, after both sides consult, realized from the corresponding charge accounting module of exploitation by system.
The network platform that system also can be applicable to other or application terminal, set up function and service revenue shared service pattern, mainly facilitate user, improve the coverage rate of this service application, cultivate the use habit of user.And by the mode that business income is shared, for Benefit share is brought in the network platform or application terminal.
Three, according to product own coding, configuration editor producer and products thereof promotion message files such as related text, picture or video, and input system database.
To the production technology of the title of enterprise of businessman, brand, trade mark and product, use material, external appearance characteristic, the production time, Sales Channel terminal etc. carries out word and data describe.And these words and data are described, both as anti-counterfeiting characteristic and identification authentication foundation, set up the popularization system to producer's commodity with this again, realized the promotional to producer's product, and allowed consumer understand merchandise news more.System is according to these businessman's enterprises registration information, and all right unique legal person's account of matching system, is convenient to carry out unified management and extension service, billing of services to enterprise of businessman, particularly more valuable to network electronic commerce business.
Four, to this product or this batch products, the false proof authentication signature information of code of all settings, or the false proof authentication signature information of feature, by the general enforceable fake certification order to these commodity, or the network identity authentication requirement to these commodity, carry out system database editor typing.
General enforceable fake certification order, refers under the item property prerequisite not destroying commodity or equipment, first outward appearance, rear inner packing, then commodity equipment itself etc. arranges anti-fake mark point, can progressively to the order implemented of the fake certification of commodity or equipment.Buy commodity consumer like this, time not because the fake certification to commodity will be implemented, cause certain some attribute of commodity destroy and cause consuming dispute.
Five, setting product own coding is false proof authentication codeword value, or system mates the false proof authentication codeword value of corresponding product own coding in addition.This can according to the actual state of manufacturer, system flexible configuration data acquisition scheme, meets the needs of code data editor under different situations.
Six, adapt to different intelligent identification terminal or different digital recognition technology, the configuration of single or combined distinguishing mark is carried out to this false proof authentication codeword value.
Meet the different hardware configurations of different mobile intelligent terminal, the different digital recognition technology of application, comprise laser scanner technique, bluetooth recognition technology, RFID REID, NFC recognition technology, Quick Response Code recognition technology, camera recognition technology and following other new recognition technologies expansion, the identification of false proof authentication codeword value is read.By same false proof authentication codeword value, by conventional different recognition technology requirement, carry out different Technology design, then carry out composite marking.And design like this, meet the progress because of anti-counterfeiting technology and recognition technology, system is also supported to incorporate the slitless connection of new technology, without the need to carrying out much transformations to system.
Seven, by the false proof authentication codeword value mark of configuration, be marked at user the most directly to read, one or more places of exterior of commodity, or by the digit chip false proof authentication codeword value mark of configuration, meet digit chip identification reading requirement, be configured in one or more places of commodity.The false proof authentication codeword value that digit chip makes, generally need not be marked at outer package, is applicable to Huge value, the class I goods that false proof class requirement is high.
Eight, when user initiates the substep fake certification of commodity, or when carrying out the network identity authentication of commodity, mobile intelligent terminal client automatic discrimination recognition mode, instruction mobile intelligent terminal identification end, reads the false proof authentication codeword value of these commodity.
Nine, mobile intelligent terminal will identify the false proof authentication codeword value read, and submits mobile intelligent terminal system client to, then submits to system server by the Internet, initiates substep fake certification or network identity authentication request.
Or at mobile intelligent terminal, open WEB (WAP) the search function module of system configuration client, user directly inputs the false proof authentication codeword value of these commodity, system configuration client, submit to system server by the Internet again, initiate fake certification request or network identity authentication request.
Ten, system server is asked, and server initiates false proof authentication verification request to Direction Center.
11, Direction Center is by system database, searches false proof authentication codeword value with this, corresponding all false proof authentication signature information.
12, will find this false proof authentication codeword value, corresponding all false proof authentication signature information, returns mobile intelligent terminal client, or by promotion messages such as more for producer and products thereof related text, picture or videos, returns mobile intelligent terminal client.
13, user reads all false proof authentication signature information returned, contrast each characteristic point, and whether finally buy the actual conditions of these commodity, determine the substep fake certification not destroying item property, or do not destroy the substep fake certification of use attribute, or the step by step fake certification right to all false proof some perfect kernels, or carry out network identity authentication.
Here be noted that system will return prompting and information warning if system does not find the corresponding false proof authentication information of all marks or feature interpretation false proof authentication information, its prompting and information warning comprise:
1, whether false proof authentication code is wrong, please give and checking.
2, inform that commodity have been crossed to guarantee the quality operating period and each day it's overdue, system has regained this false proof authentication code.
3, the relief after carrying out fake certification and identification authentication failure please be give, and inform rescue skills.
4, as errorless in the input of false proof authentication code, and after relief inquiry looks into, without these commodity or equipment associated production manufacturer information record, then point out these commodity or equipment to have puppet, careful purchase.
2, realize the method for the false proof and network identity authentication of commodity substep, comprise the steps:
The first, configuration is applicable to the different businessmans subscription client of different network terminals, at terminal businessman subscription client, sets up merchant registration account management subsystem; Configuration is applicable to different consumer-user's clients of different network terminals, in consumer-user's client, sets up consumer-user's login account ADMINISTRATION SUBSYSTEM.
Different network terminals client, refers to existing based on mobile network's terminal, also has Based PC terminal, and different clients version that the network interactive television terminal in future needs; The client of different user terminals, refers to the different manufacturers based on mobile terminal, based on the client release that different hardware configurations compatibility needs, facilitates user's correspondence to download and install.
Set up the login account ADMINISTRATION SUBSYSTEM of businessman user and consumer-user, the first conveniently carries out account management to user, more importantly in order between businessman and consumer, the end-to-end mutual transmission module of the information utilizing login account to develop, mutual information transmission is conveniently provided and exchanges, ensure carrying out in order of e-commerce initiative, also allow system further for businessman and consumer provide abundanter Extension Services, laid in user base.
The second, the data-interface of configuration-system and e-commerce platform, terminal businessman is by merchant registration account management subsystem, application manufacturer is to the selling license authorization code of terminal businessman, and at the platform commodity displaying page, the selling license authorization code mark of mark terminal businessman links.
The selling license authorization code of terminal businessman, refer to any same commodity, the general end-retailer man that all can have One's name is legion, or directly for the One's name is legion network seller of consumer, how to ensure how controlling fake and forged businessman, retrain seller and be responsible for the sales behavior of oneself if assuming another's name to sell, be necessary to help exploitation a set of, producer, to the authentication management system of terminal businessman, facilitates consumer by the simplest mode, realizes the identity understanding to this businessman or commodity.
This system finally can also occur as the cloud computing system of producer's sales management.About business data fail safe and the confidentiality architecture design of this cloud computing system, do not state in this patent content.
Three, when consumer-user is on e-commerce platform, when having a purchase intention to a certain commodity or a certain item service, click the link of selling license authorization code mark, checking these commodity of Merchant sales or the mandate qualification of this service is provided, or point out the recommended information of this producer and the more related text of this product, picture or video.
Four, confirm the selling license mandate of terminal businessman, or after having understood producer and products thereof introduction further, consumer places an order online, send and buy confirmation, or consumer is by having third party's network payment instrument defrayment of guarantee function.Here defrayment is based on general ecommerce orthodox practice, if after native system successful implementation, should be after obtaining the false proof authentication codeword value of getting ready the goods, user is row defrayment again, this requirement must got ready the goods in advance with regard to You Liaoyige businessman, stops the generation of deceiving money swindle.
Five, the system client of terminal businessman, obtains the sequence information of consumer-user, gets all the commodity ready by the requirement of consumer, and by mobile intelligent terminal merchant client, identifies the false proof authentication codeword value reading these commodity.
Six, businessman's mobile intelligent terminal client, by system by identifying the false proof authentication codeword value read, is submitted in the client terminals account of consumer-user.
Utilize the consumer of system businessman to place an order online management system, click singular link under corresponding consumer, reply information of having got ready the goods, and transfer the false proof authentication codeword value identifying and read, be submitted in the client terminals account of consumer-user.
Seven, consumer-user obtains commodity counterfeit prevention authentication codeword value, system server is submitted to by the Internet, implement commodity substep fake certification, or further commodity network identification authentication, after consumer-user confirms the true and false or identity, or by having third party's network payment instrument defrayment of guarantee function.
Eight, after consumer receives commodity, check the false proof authentication codeword value that businessman provides, by the system client of mobile intelligent terminal, again implement the anti-fake certificate to commodity and identification authentication certification, confirm that errorless rear signature is received, or confirm that the wrong rear return of goods are rejected.
3, the method for the false proof and network identity authentication of commodity substep is realized, be the different hardware configurations of satisfied different mobile intelligent terminal, the different digital recognition technology of application, comprise laser scanner technique, bluetooth recognition technology, RFID REID, NFC recognition technology, Quick Response Code recognition technology, camera recognition technology and following other new recognition technologies expansion, the identification of false proof authentication codeword value is read.
4, realize the method for the false proof and network identity authentication of commodity substep, be to set up mobile intelligent terminal client, to the function command driving relationship of camera, when initiating to identify that reading false proof authentication codeword value mark asks, the camera of client instructions identification end, the false proof authentication codeword value mark of commodity is taken pictures, again photo submitted to picture modular converter and resolve functional module, obtain false proof authentication codeword value, the false proof authentication codeword value that mobile intelligent terminal client will obtain, by mobile network's submission system database, carry out commodity substep fake certification, or carry out commodity network identification authentication.Current at mobile intelligent terminal, implement security code identification, the most real technology has been exactly the camera extensively configured by mobile intelligent terminal.
5, realize the method for the false proof and network identity authentication of commodity substep, be to set up mobile intelligent terminal client, to the function command driving relationship of NFC chip, when initiating to identify that reading false proof authentication codeword value mark asks, the NFC chip of client instructions identification end, start and identify read functions, to the false proof authentication codeword value NFC chip configured on commodity, identify the false proof authentication codeword value reading these commodity, and submit to mobile intelligent terminal client, the false proof authentication codeword value that mobile intelligent terminal client will obtain, by network submission system database, carry out commodity substep fake certification, or carry out commodity network identification authentication.The following NFC technique can estimating extensive use, NFC technique is used to carry out security code identification, the application standard configuration of individual mobile intelligent terminal can be become, particularly based on the integration identification reading technology of NFC technique, a function sharing identification end can be formed, so, be necessary to do an earlier technique planning here.
Fig. 1 is the principle modules figure that the present invention realizes the method for the false proof and network identity authentication of commodity substep.
Fig. 2 is that the network identity authentication part that the present invention realizes the method for the false proof and network identity authentication of commodity substep implements module map.
With reference to shown in legend, the operation flow process below by specific embodiment further illustrates, and the present invention realizes the method implementing procedure of the false proof and network identity authentication of commodity substep.
1, suitable anti-counterfeiting technology and scheme is selected, or the anti-counterfeiting technology of system matches and scheme, special anti-counterfeiting marking arrangement 110 and 111 is installed additional at product line 109 end, install anti-fake mark additional and read editing equipment 108, and set up anti-fake mark read editing equipment 108 be connected with system data typing end 107, set up anti-fake mark work flow.Without the need to special equipment, also can be designed to artificial false proof work flow.
2, at the parts of product, or product itself, or product inner packing, or on product external packaging, designing one or more gauge point, use characteristic marker 110 carries out anti-counterfeiting characteristic mark, uses coded marker 111 to carry out anti-fake code mark.
3, digital independent editing machine 108 is read by marker, or directly reads label information at gauge point, and edits reading information; Simultaneously, to the enterprise of businessman also not having Standard Edition or needs amendment, the production technology of relevant title, brand, trade mark and product, use material, external appearance characteristic, the information such as production time Sales Channel terminal carry out registration editor or amendment, build should the false proof authentication information of mark of product or the false proof authentication information normal data of feature interpretation, manufacturer mates corresponding unique Product own coding.
4, by data inputting end 107, will gather, the normal data after edit-modify and manufacturer's product own coding, input system server 104, is stored in system database 106.
5, system server 104, the false proof authentication codeword value corresponding to the configuration of product own coding, by code configuration end 112, returns to code signing end 113 the false proof authentication codeword value of configuration, and on product or external packing, or production line prompting position marks.
6, according to the design of system accounting module and the requirement of both service fee agreements, automatically complete by false proof authentication codeword value, the charge accounting of quantity configuration or product number statistics is arranged.
Above-mentioned flow process, completes the setting of the false proof authentication at production end.Flow process is below at user side, illustrates and how to realize false proof authentication, comprise the following steps:
7, when consumer's shopping, when initiation is to the fake certification of these commodity or identification authentication request, operation mobile intelligent terminal client 102, client 102 instruction identification end 101, read or this false proof authentication codeword value of decoding reading, identify that end submits false proof authentication codeword value to, to mobile intelligent terminal client 102, mobile intelligent terminal client 102, by mobile base station 103, enter mobile radio communication, request is to system server 104 to submit to this access to verify, system server 104, to Direction Center 105, initiates false proof authentication verification request.
Or user is by mobile intelligent terminal client 102, input this false proof authentication codeword value, enter mobile Internet by mobile base station 103, by false proof authentication request, be submitted to system server 104, system server 104 initiates false proof authentication verification request to Direction Center 105.
8, Direction Center 105 is by system database 106, searches the false proof authentication result information that authentication codeword value false proof with this is corresponding, and the object information that will find, return to mobile intelligent terminal client 102.If system does not find corresponding object information, prompting and information warning will be returned.
9, user reads the false proof authentication result information returned, and instructs flow process, carry out substep fake certification or identification authentication to product according to it.
By the enforcement of above-mentioned technology, achieve the object realizing product false proof authentication based on terminal recognition technology of the present invention, help enterprise of producer to crack down on counterfeit goods false proof, provide solution the most thoroughly, and at the visual features to enterprise, in product promotion; The business of implementation platform operator increases income, and service function extends, and new functions expanding, develops the approach that another is brand-new.

Claims (3)

1. realize the method for the false proof and network identity authentication of commodity substep, it is characterized in that arranging manufacturer's product own coding, the false proof authentication signature of establishment marked product, by product false proof authentication signature Message Entry System database, system matches also marks false proof authentication codeword value, the system client of configuration Intelligent Recognition terminal, and on system client, the recognition mode functional module of the different recognition technology of integrated support, Mobile intelligent identification terminal client, by network, builds the access analytic relationship to system database;
The described commodity substep that carries out is false proof, comprises the steps:
The first, mark a little the parts of product external packaging, inner packing, product itself and product are one or more, according to fake certification or the identification authentication class requirement of this product needed, the false proof authentication signature of unique or multiple codes and the false proof authentication signature of feature are set;
The second, arrange product own coding, according to product own coding, system arranges to set up certain service charging fees policy by both sides;
Three, according to product own coding, configuration editor producer and products thereof promotion message files such as related text, picture or video, and input system database;
Four, to the false proof authentication signature information of the code of all settings of this product, or the false proof authentication signature information of feature, by the general enforceable fake certification order to these commodity, or the network identity authentication requirement to these commodity, carry out system database editor typing;
Five, setting product own coding is false proof authentication codeword value, or system mates the false proof authentication codeword value of corresponding product own coding in addition;
Six, adapt to different intelligent identification terminal or different digital recognition technology, the configuration of single or combined distinguishing mark is carried out to this false proof authentication codeword value;
Seven, by the false proof authentication codeword value mark of configuration, be marked at user the most directly to read, one or more places of exterior of commodity, or by the digit chip false proof authentication codeword value mark of configuration, meet digit chip identification reading requirement, be configured in one or more places of commodity;
Eight, when user initiates the substep fake certification of commodity, or when carrying out the network identity authentication of commodity, mobile intelligent terminal client automatic discrimination recognition mode, instruction mobile intelligent terminal identification end, reads the false proof authentication codeword value of these commodity;
Nine, mobile intelligent terminal will identify the false proof authentication codeword value read, and submits mobile intelligent terminal system client to, then submits to system server by the Internet, initiates substep fake certification or network identity authentication request;
Or at mobile intelligent terminal, open WEB or the WAP search function module of system configuration client, user directly inputs the false proof authentication codeword value of these commodity, system configuration client, submit to system server by the Internet again, initiate fake certification request or network identity authentication request;
Ten, system server is asked, and server initiates false proof authentication verification request to Direction Center;
11, Direction Center is by system database, searches false proof authentication codeword value with this, corresponding all false proof authentication signature information;
12, will find this false proof authentication codeword value, corresponding all false proof authentication signature information, returns mobile intelligent terminal client, or by promotion messages such as more for producer and products thereof related text, picture or videos, returns mobile intelligent terminal client;
13, user reads all false proof authentication signature information returned, contrast each characteristic point, and whether finally buy the actual conditions of these commodity, determine the substep fake certification not destroying item property, or do not destroy the substep fake certification of use attribute, or the step by step fake certification right to all false proof some perfect kernels, or carry out network identity authentication;
Describedly carry out commodity network identification authentication, comprise the steps:
The first, configuration is applicable to the different businessmans subscription client of different network terminals, at terminal businessman subscription client, sets up merchant registration account management subsystem; Configuration is applicable to different consumer-user's clients of different network terminals, in consumer-user's client, sets up consumer-user's login account ADMINISTRATION SUBSYSTEM;
The second, the data-interface of configuration-system and e-commerce platform, terminal businessman is by merchant registration account management subsystem, application manufacturer is to the selling license authorization code of terminal businessman, and at the platform commodity displaying page, the selling license authorization code mark of mark terminal businessman links;
Three, when consumer-user is on e-commerce platform, when having a purchase intention to a certain commodity or a certain item service, click the link of selling license authorization code mark, checking these commodity of Merchant sales or the mandate qualification of this service is provided, or point out the recommended information of this producer and the more related text of this product, picture or video;
Four, confirm the selling license mandate of terminal businessman, or after having understood producer and products thereof introduction further, consumer places an order online, sends and buys confirmation; Or consumer is by having third party's network payment instrument defrayment of guarantee function;
Five, the system client of terminal businessman, obtains the sequence information of consumer-user, gets all the commodity ready by the requirement of consumer, and by mobile intelligent terminal merchant client, identifies the false proof authentication codeword value reading these commodity;
Six, businessman's mobile intelligent terminal client, by system by identifying the false proof authentication codeword value read, is submitted in the client terminals account of consumer-user;
Seven, consumer-user obtains false proof authentication codeword value, system server is submitted to by the Internet, implement commodity substep fake certification, or implement commodity network identification authentication, after consumer-user confirms commodity true and false or identity, or by having third party's network payment instrument defrayment of guarantee function;
Eight, after consumer receives commodity, check the false proof authentication codeword value that businessman provides, by the system client of mobile intelligent terminal, again implement the anti-fake certificate to commodity and identification authentication certification, confirm that errorless rear signature is received, or confirm that the wrong rear return of goods are rejected.
2. realize the method for the false proof and network identity authentication of commodity substep according to claim 1, be characterised in that the recognition mode functional module of the different recognition technology of integrated support on described system client, it is the different hardware configurations by satisfied different mobile intelligent terminal, the different digital recognition technology of application, comprise laser scanner technique, bluetooth recognition technology, RFID REID, NFC recognition technology, Quick Response Code recognition technology, camera recognition technology and following other new recognition technologies expansion, the identification of false proof authentication codeword value is read;
Described camera recognition technology, by setting up mobile intelligent terminal client, to the function command driving relationship of camera, when initiating to identify that reading false proof authentication codeword value mark asks, the camera of client instructions identification end, the false proof authentication codeword value mark of commodity is taken pictures, again photo submitted to picture modular converter and resolve functional module, obtain false proof authentication codeword value, the false proof authentication codeword value that mobile intelligent terminal client will obtain, by mobile network's submission system database, carry out commodity or equipment substep fake certification, or carry out commodity or device network identification authentication.
3. realize the method for the false proof and network identity authentication of commodity substep according to claim 1, be characterised in that the recognition mode functional module of the different recognition technology of integrated support on described system client, it is the different hardware configurations by satisfied different mobile intelligent terminal, the different digital recognition technology of application, comprise laser scanner technique, bluetooth recognition technology, RFID REID, NFC recognition technology, Quick Response Code recognition technology, camera recognition technology and following other new recognition technologies expansion, the identification of false proof authentication codeword value is read;
Described NFC near field recognition technology, by setting up mobile intelligent terminal client, to the function command driving relationship of NFC chip, when initiating to identify that reading false proof authentication codeword value mark asks, the NFC chip of client instructions identification end, start and identify read functions, to the false proof authentication codeword value digital technology chip configured on commodity, identify the false proof authentication codeword value reading these commodity, and submit to mobile intelligent terminal client, the false proof authentication codeword value that mobile intelligent terminal client will obtain, by network submission system database, carry out commodity substep fake certification, or carry out commodity network identification authentication.
CN201210019619.8A 2012-01-25 2012-01-25 Realize the method for the false proof and network identity authentication of commodity substep Active CN102622691B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210019619.8A CN102622691B (en) 2012-01-25 2012-01-25 Realize the method for the false proof and network identity authentication of commodity substep

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210019619.8A CN102622691B (en) 2012-01-25 2012-01-25 Realize the method for the false proof and network identity authentication of commodity substep

Publications (2)

Publication Number Publication Date
CN102622691A CN102622691A (en) 2012-08-01
CN102622691B true CN102622691B (en) 2015-11-18

Family

ID=46562596

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210019619.8A Active CN102622691B (en) 2012-01-25 2012-01-25 Realize the method for the false proof and network identity authentication of commodity substep

Country Status (1)

Country Link
CN (1) CN102622691B (en)

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102824321A (en) * 2012-09-15 2012-12-19 海南亚元防伪技术研究所 Anti-counterfeiting tablets
CN103902948A (en) * 2012-12-26 2014-07-02 北大方正集团有限公司 Anti-counterfeiting information verification method and device
CN104182885A (en) * 2014-08-26 2014-12-03 黑龙江大学 An NFC-based clothing intelligent order exhibition management system and method
CN104504571A (en) * 2014-12-16 2015-04-08 新余兴邦信息产业有限公司 Method and device for online commodity anti-counterfeiting authentication
CN104993930A (en) * 2015-05-19 2015-10-21 吴晗 Digital voucher generation method and system, and digital voucher verifying method and system
CN105049429B (en) * 2015-06-30 2018-05-18 百度在线网络技术(北京)有限公司 A kind of authentication method and system based on Third Party Authentication mechanism
CN105205694A (en) * 2015-08-28 2015-12-30 国网山东胶州市供电公司 Intelligent marketing system base on various network technologies
CN105488717A (en) * 2015-11-25 2016-04-13 四川诚品电子商务有限公司 Real-time video on-line auction platform
CN105373950A (en) * 2015-11-25 2016-03-02 四川诚品电子商务有限公司 Online trading platform based on cloud security
CN105469267A (en) * 2015-11-25 2016-04-06 四川诚品电子商务有限公司 Visual online trading platform
CN105512923A (en) * 2015-11-25 2016-04-20 四川诚品电子商务有限公司 On-line transaction platform of online game
CN105488707A (en) * 2015-11-25 2016-04-13 四川诚品电子商务有限公司 Intellectual property online trading platform
CN105373934A (en) * 2015-11-25 2016-03-02 四川诚品电子商务有限公司 Simulated mall type online trading platform
CN105488718A (en) * 2015-11-25 2016-04-13 四川诚品电子商务有限公司 Video online auction platform
CN105488719A (en) * 2015-11-25 2016-04-13 四川诚品电子商务有限公司 Video online auction platform based on cloud security
CN105488706A (en) * 2015-11-25 2016-04-13 四川诚品电子商务有限公司 Online trading platform
CN106339881A (en) * 2016-08-24 2017-01-18 莫小成 Commodity information anti-counterfeiting method, commodity information anti-counterfeiting device and terminal
CN106447345A (en) * 2016-08-26 2017-02-22 武汉众睿科技发展股份有限公司 Traceability system of commodity traceability equipment
CN108074106A (en) * 2016-11-17 2018-05-25 深圳童萌汇网络技术有限公司 Method for anti-counterfeit and system
CN106952098A (en) * 2017-01-19 2017-07-14 深圳市卡尔智能科技有限公司 A kind of filter element of water purifier recognition methods
CN107045687A (en) * 2017-03-24 2017-08-15 李建魁 A kind of internet security for commodity counterfeit prevention is locked
CN107220839B (en) * 2017-06-26 2020-11-27 南京熊猫电子股份有限公司 Internet-based smart television authentication and information preparation implementation method
CN107341899A (en) * 2017-07-11 2017-11-10 广州市银科电子有限公司 A kind of planning type is customizable illegally to determine bill anti-counterfeit discriminating expert system
CN108022154A (en) * 2017-12-07 2018-05-11 钱伟民 The method of user's value chain management after a kind of transaction and transaction
CN108595974B (en) * 2018-05-07 2021-04-20 襄阳市尚贤信息科技有限公司 Quick verification system for electronic product code
CN109615400A (en) * 2018-12-10 2019-04-12 盐城华科智造数据科技有限公司 The specificity detection method of heterogeneous attached product
CN111091394A (en) * 2019-01-27 2020-05-01 海南亚元防伪技术研究所(普通合伙) Product anti-fake safety packing method
CN110675210B (en) * 2019-08-16 2022-04-05 广东省广袤科技有限公司 Commodity transaction payment website system
CN111401987A (en) * 2020-02-19 2020-07-10 北京三快在线科技有限公司 Catering merchant information management and display method, system, server and storage medium
CN111401588A (en) * 2020-02-28 2020-07-10 北京三快在线科技有限公司 Scenic spot merchant information management and display method and system, and storage medium
CN111899039A (en) * 2020-08-15 2020-11-06 李志彬 A method for anti-counterfeiting through the characteristic data of the commodity itself
CN112288442A (en) * 2020-10-15 2021-01-29 江苏图码信息科技有限公司 Associated customized image code anti-counterfeiting tracing system and application component
TWI754489B (en) * 2020-12-14 2022-02-01 中華電信股份有限公司 Shopping service system and voice control shopping method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1952971A (en) * 2006-09-22 2007-04-25 莫宁 Information issue method and system based on product identification ID
WO2007098660A1 (en) * 2006-03-02 2007-09-07 Huawei Technologies Co., Ltd. An authentication method and system between network entities in ip multimedia subsystem
CN201449627U (en) * 2009-06-26 2010-05-05 广州宽度信息技术有限公司 Two-dimension code anti-counterfeit identification system of mobile phone
CN102082815A (en) * 2010-09-08 2011-06-01 任明和 Terminal-based stepwise anti-counterfeiting verification and identity authentication system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007098660A1 (en) * 2006-03-02 2007-09-07 Huawei Technologies Co., Ltd. An authentication method and system between network entities in ip multimedia subsystem
CN1952971A (en) * 2006-09-22 2007-04-25 莫宁 Information issue method and system based on product identification ID
CN201449627U (en) * 2009-06-26 2010-05-05 广州宽度信息技术有限公司 Two-dimension code anti-counterfeit identification system of mobile phone
CN102082815A (en) * 2010-09-08 2011-06-01 任明和 Terminal-based stepwise anti-counterfeiting verification and identity authentication system and method

Also Published As

Publication number Publication date
CN102622691A (en) 2012-08-01

Similar Documents

Publication Publication Date Title
CN102622691B (en) Realize the method for the false proof and network identity authentication of commodity substep
EP4165855B1 (en) Systems and methods for building blockchains for verifying assets for smart contracts
US8374920B2 (en) Anti-counterfeiting system and method
KR102269812B1 (en) System for providing blockchain based drawing transaction service
CN115809375A (en) Data processing method, equipment and server based on social network search
US12177366B1 (en) Systems and methods for certifying and transacting PBT-linked physical artifacts
CN109146635A (en) The exchange of geographical big data and transaction system and method based on block chain
CN110648225A (en) Method for applying digital code chain
CN107239992B (en) Public delivery and advertisement transaction system for sharing articles
CN112669165A (en) Unified access method applying digital personal code chain
CN107657445A (en) A kind of on-line payment method and on-line payment system
CN110503529A (en) A kind of transaction platform
CN107438072A (en) A kind of Identity Management and management of differential account system based on Cloud Server
CN108985431A (en) A kind of method of antifalsification label and its commodity genuine piece of Testing and appraisal registered trademark
Kathuria et al. Unleashing e-commerce for South Asian integration
Kim et al. Role of blockchain technology in IoT applications
CN117236871A (en) Supply chain management system, method and platform based on Handle identification
CN102082815B (en) Terminal-based stepwise anti-counterfeiting verification and identity authentication system and method
Meydani et al. A comprehensive review of the applications of blockchain technology
FR2819323A1 (en) METHOD FOR ACCESSING A SECURE SYSTEM
CN105809457A (en) System and method for authenticating commodity through coupled double codes
Kamaleshwaran et al. Digital Certification–Certification Credential as Non Fungible Token (NFT)
CN114155106A (en) Blockchain-based financing methods, devices, equipment, media and program products
KR102280438B1 (en) System for transacting digital contents and method thereof
CN120317890B (en) Artwork up-chain evidence-preserving and tracing method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
CB03 Change of inventor or designer information

Inventor after: Lv Yangbo

Inventor before: Ren Minghe

COR Change of bibliographic data
TA01 Transfer of patent application right

Effective date of registration: 20151021

Address after: Xihu District Hangzhou City, Zhejiang province 310000 Wensan Road No. 630, room 218

Applicant after: Hangzhou Yi Wang new science and technology Co., Ltd

Address before: 400803 Chongqing City Nantong District Wansheng town 801 Village No. 635 with No.

Applicant before: Ren Minghe

C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP01 Change in the name or title of a patent holder

Address after: Xihu District Hangzhou City, Zhejiang province 310000 Wensan Road No. 630, room 218

Patentee after: Zhejiang 1one Technology Co., Ltd.

Address before: Xihu District Hangzhou City, Zhejiang province 310000 Wensan Road No. 630, room 218

Patentee before: Hangzhou Yi Wang new science and technology Co., Ltd