Summary of the invention
The present invention relates to the fusion application of an Internet technology and Internet of Things and digital identification techniques, it utilizes state-of-the-art technology, solves long-standing problem enterprise and crack down on counterfeit goods false proof, and when consumer buys commodity and equipment, has no way of understanding in advance a difficult problem for product real conditions.Technology application characteristic of the present invention, is mainly manifested in the following aspects:
1, the brand-new anti-counterfeiting technology system of " knowing very false proof " is set up.Changing traditional " verification is false proof " is " knowing very false proof " pattern, the production technology of the title of enterprise of businessman, brand, trade mark and product, uses material, external appearance characteristic, the production time etc., can as one of the parameter and foundation of authenticity of products checking.Like this, unique way that fake producer will successfully fake, only has and selects the materials and process the same with genuine piece, causes fraud profitless, the necessity of naturally also just not faking.This not only reaches false proof object of cracking down on counterfeit goods, and simultaneously also to enterprise of businessman and products thereof, carried out extensive promotional display and promoted, allow user fully understand, grasp genuine piece, certified products, the quality that qualified product should have ensures feature.The participation of businessman and user is very high, ensure that the marketing application of this technological invention, particularly the E-business service of anti-counterfeiting technology service with the Internet is organically combined, operational space and the profit of greatly having expanded operation platform are worth, also be that its new technology from now on merges, new business extends has carried out resources reserve.
2, the design of open multidimensional anti-counterfeiting characteristic and anti-fake mark, facilitate enterprise of businessman, based on the product of oneself, the actual conditions of equipment and process need, to suitable feasible multiple anti-counterfeiting technology, scheme, select arbitrarily and combine, and producing period and different production batch for product difference, carrying out the adjustment at any time of anti-counterfeiting technology, scheme.So just greatly increase the fraud difficulty of fake producer, any chance can not be stayed to fake producer.
3, substep verifies anti-counterfeiting design, user can according to the needs self understanding these commodity or equipment, and buy the possibility of these commodity or equipment, progressively realize judging the checking of these commodity or equipment, particularly for the method for anti-counterfeit of private mark mark, when not assert this private mark anti-fake mark, also the anti-fake mark can be able to assert by other or identity characteristic, judge the basic true and false of these commodity or equipment, for whether buying, continue next step fake certification, finally realized buying, reference is provided.Be unlikely to, because will private mark be read, to destroy the item property of commodity or equipment, cause dispute and trouble.
4, the authentication functions that general digital product networks, be incorporated into the networking identification authentication identification to all commodity or equipment, greatly enriched the anti-fake mark information of system acquisition and the scope of application of feature fake certification descriptor, this is also the thorough revolution to all fake and forged behaviors.Particularly at internet electronic business today, in the epoch that online fake traffic is prevailing, " identify " to all online merchants and commodity, setting up the consumption guarantee that brand-new " goods is to knowing " is " known in advance ", having huge meaning.
Ecommerce Third-party payment instrument, has assured the safety of fund and payment.But for the true and false and the quality grade guarantee of commodity, go back the Third Party Authentication instrument of neither one authority, provide the quality assurance of commodity to support; And, allow third party go to identify the whether qualified of all products, can not realize, even legal quality inspection mechanism of country does not accomplish yet.But the business predicament that such fake products spreads unchecked, must change and specification; Sincerity, knows genuine business rule, must set up.
The invention provides one allows the producer, legal person carry on a shoulder pole product " identification authentication " solution of duty.It allows buys consumption and first starts from education is cognitive, and it allows all true and falsely all expose in the sun, and it allows all producers, and the evaluation that all will accept total user is supervised.So just from source, provide the most direct solution the most thoroughly of one.In other words, the present invention, from another angle, establishes a kind of Third Party Authentication business, provides commodity quality supervision to ensure and identity authentication service.
The present invention relates to the fusion application of an Internet technology and Internet of Things recognition technology, the affiliated method realizing the false proof and network identity authentication of commodity substep, is made up of following technical essential step:
Realize the method for the false proof and network identity authentication of commodity substep, that manufacturer's product own coding will be set, the false proof authentication signature of establishment marked product, by product false proof authentication signature Message Entry System database, system matches also marks false proof authentication codeword value, the system client of configuration Intelligent Recognition terminal, and on system client, the recognition mode functional module of the different recognition technology of integrated support, Mobile intelligent identification terminal client passes through network, build the access analytic relationship to system database, comprise the steps:
The first, at product external packaging, inner packing, the parts of product itself and product are one or more to be marked a little, according to fake certification or the identification authentication class requirement of this product needed, arranges the false proof authentication signature of unique or multiple codes and the false proof authentication signature of feature.
The false proof authentication signature of code, refers at product external packaging, inner packing, product itself and a certain parts of product are one or more marks a little, write numeral or alphanumeric codes by certain rule, and by these identical or different codes, mark by false proof class requirement.Write the not same sex of numeral or alphanumeric codes by certain rule, also show and can allocate different voluntarily to each single product of same batch, irregular random code.By the packaging of encoder at product, on production line, automatic printing, marking, mark also system synchronization typing.This ensures that there the fail safe of anti-fake code, do not leave any possibility of playing tricks to fake producer.
The false proof authentication signature of feature, refer at product external packaging, inner packing, the parts of product itself and product are multiple to be marked a little, the feature anti-fake mark of the realization such as such as antiforge technology, chemical material anti-counterfeiting technology, physical security technology, laser digital information anti-fake technology of mark.
The second, arrange product own coding, according to product own coding, system arranges to set up certain service charging fees policy by both sides.
Product own coding is set, refer to and first by manufacturer, all anti-counterfeiting characteristic data acquisitions can be completed, set up this product or equipment or this batch products, the data system of the false proof authentication information of markd code or the false proof authentication information of feature interpretation, then by this data system import system.Like this between production line and system, owing to not needing to set up teleinstruction, reduce technical difficulty and equipment scale input, be applicable to the Workplace application of all large small-scales and technical conditions.If the sync mark realized by professional equipment and telemanagement, editor, typing etc., the input of producer is more, and automaticity requires high, is only suitable for large-scale pipeline operation, does not have popularity promotional value.
Set up certain service charge charging regulation, the system of referring to provides false proof authentication service, collects certain service charge to accepting service side.In general, this service charge is main or all paid by manufacturer's (or manufacturers' agent).To the charge of manufacturer, there is multiple design alternative, after both sides consult, realized from the corresponding charge accounting module of exploitation by system.
The network platform that system also can be applicable to other or application terminal, set up function and service revenue shared service pattern, mainly facilitate user, improve the coverage rate of this service application, cultivate the use habit of user.And by the mode that business income is shared, for Benefit share is brought in the network platform or application terminal.
Three, according to product own coding, configuration editor producer and products thereof promotion message files such as related text, picture or video, and input system database.
To the production technology of the title of enterprise of businessman, brand, trade mark and product, use material, external appearance characteristic, the production time, Sales Channel terminal etc. carries out word and data describe.And these words and data are described, both as anti-counterfeiting characteristic and identification authentication foundation, set up the popularization system to producer's commodity with this again, realized the promotional to producer's product, and allowed consumer understand merchandise news more.System is according to these businessman's enterprises registration information, and all right unique legal person's account of matching system, is convenient to carry out unified management and extension service, billing of services to enterprise of businessman, particularly more valuable to network electronic commerce business.
Four, to this product or this batch products, the false proof authentication signature information of code of all settings, or the false proof authentication signature information of feature, by the general enforceable fake certification order to these commodity, or the network identity authentication requirement to these commodity, carry out system database editor typing.
General enforceable fake certification order, refers under the item property prerequisite not destroying commodity or equipment, first outward appearance, rear inner packing, then commodity equipment itself etc. arranges anti-fake mark point, can progressively to the order implemented of the fake certification of commodity or equipment.Buy commodity consumer like this, time not because the fake certification to commodity will be implemented, cause certain some attribute of commodity destroy and cause consuming dispute.
Five, setting product own coding is false proof authentication codeword value, or system mates the false proof authentication codeword value of corresponding product own coding in addition.This can according to the actual state of manufacturer, system flexible configuration data acquisition scheme, meets the needs of code data editor under different situations.
Six, adapt to different intelligent identification terminal or different digital recognition technology, the configuration of single or combined distinguishing mark is carried out to this false proof authentication codeword value.
Meet the different hardware configurations of different mobile intelligent terminal, the different digital recognition technology of application, comprise laser scanner technique, bluetooth recognition technology, RFID REID, NFC recognition technology, Quick Response Code recognition technology, camera recognition technology and following other new recognition technologies expansion, the identification of false proof authentication codeword value is read.By same false proof authentication codeword value, by conventional different recognition technology requirement, carry out different Technology design, then carry out composite marking.And design like this, meet the progress because of anti-counterfeiting technology and recognition technology, system is also supported to incorporate the slitless connection of new technology, without the need to carrying out much transformations to system.
Seven, by the false proof authentication codeword value mark of configuration, be marked at user the most directly to read, one or more places of exterior of commodity, or by the digit chip false proof authentication codeword value mark of configuration, meet digit chip identification reading requirement, be configured in one or more places of commodity.The false proof authentication codeword value that digit chip makes, generally need not be marked at outer package, is applicable to Huge value, the class I goods that false proof class requirement is high.
Eight, when user initiates the substep fake certification of commodity, or when carrying out the network identity authentication of commodity, mobile intelligent terminal client automatic discrimination recognition mode, instruction mobile intelligent terminal identification end, reads the false proof authentication codeword value of these commodity.
Nine, mobile intelligent terminal will identify the false proof authentication codeword value read, and submits mobile intelligent terminal system client to, then submits to system server by the Internet, initiates substep fake certification or network identity authentication request.
Or at mobile intelligent terminal, open WEB (WAP) the search function module of system configuration client, user directly inputs the false proof authentication codeword value of these commodity, system configuration client, submit to system server by the Internet again, initiate fake certification request or network identity authentication request.
Ten, system server is asked, and server initiates false proof authentication verification request to Direction Center.
11, Direction Center is by system database, searches false proof authentication codeword value with this, corresponding all false proof authentication signature information.
12, will find this false proof authentication codeword value, corresponding all false proof authentication signature information, returns mobile intelligent terminal client, or by promotion messages such as more for producer and products thereof related text, picture or videos, returns mobile intelligent terminal client.
13, user reads all false proof authentication signature information returned, contrast each characteristic point, and whether finally buy the actual conditions of these commodity, determine the substep fake certification not destroying item property, or do not destroy the substep fake certification of use attribute, or the step by step fake certification right to all false proof some perfect kernels, or carry out network identity authentication.
Here be noted that system will return prompting and information warning if system does not find the corresponding false proof authentication information of all marks or feature interpretation false proof authentication information, its prompting and information warning comprise:
1, whether false proof authentication code is wrong, please give and checking.
2, inform that commodity have been crossed to guarantee the quality operating period and each day it's overdue, system has regained this false proof authentication code.
3, the relief after carrying out fake certification and identification authentication failure please be give, and inform rescue skills.
4, as errorless in the input of false proof authentication code, and after relief inquiry looks into, without these commodity or equipment associated production manufacturer information record, then point out these commodity or equipment to have puppet, careful purchase.
2, realize the method for the false proof and network identity authentication of commodity substep, comprise the steps:
The first, configuration is applicable to the different businessmans subscription client of different network terminals, at terminal businessman subscription client, sets up merchant registration account management subsystem; Configuration is applicable to different consumer-user's clients of different network terminals, in consumer-user's client, sets up consumer-user's login account ADMINISTRATION SUBSYSTEM.
Different network terminals client, refers to existing based on mobile network's terminal, also has Based PC terminal, and different clients version that the network interactive television terminal in future needs; The client of different user terminals, refers to the different manufacturers based on mobile terminal, based on the client release that different hardware configurations compatibility needs, facilitates user's correspondence to download and install.
Set up the login account ADMINISTRATION SUBSYSTEM of businessman user and consumer-user, the first conveniently carries out account management to user, more importantly in order between businessman and consumer, the end-to-end mutual transmission module of the information utilizing login account to develop, mutual information transmission is conveniently provided and exchanges, ensure carrying out in order of e-commerce initiative, also allow system further for businessman and consumer provide abundanter Extension Services, laid in user base.
The second, the data-interface of configuration-system and e-commerce platform, terminal businessman is by merchant registration account management subsystem, application manufacturer is to the selling license authorization code of terminal businessman, and at the platform commodity displaying page, the selling license authorization code mark of mark terminal businessman links.
The selling license authorization code of terminal businessman, refer to any same commodity, the general end-retailer man that all can have One's name is legion, or directly for the One's name is legion network seller of consumer, how to ensure how controlling fake and forged businessman, retrain seller and be responsible for the sales behavior of oneself if assuming another's name to sell, be necessary to help exploitation a set of, producer, to the authentication management system of terminal businessman, facilitates consumer by the simplest mode, realizes the identity understanding to this businessman or commodity.
This system finally can also occur as the cloud computing system of producer's sales management.About business data fail safe and the confidentiality architecture design of this cloud computing system, do not state in this patent content.
Three, when consumer-user is on e-commerce platform, when having a purchase intention to a certain commodity or a certain item service, click the link of selling license authorization code mark, checking these commodity of Merchant sales or the mandate qualification of this service is provided, or point out the recommended information of this producer and the more related text of this product, picture or video.
Four, confirm the selling license mandate of terminal businessman, or after having understood producer and products thereof introduction further, consumer places an order online, send and buy confirmation, or consumer is by having third party's network payment instrument defrayment of guarantee function.Here defrayment is based on general ecommerce orthodox practice, if after native system successful implementation, should be after obtaining the false proof authentication codeword value of getting ready the goods, user is row defrayment again, this requirement must got ready the goods in advance with regard to You Liaoyige businessman, stops the generation of deceiving money swindle.
Five, the system client of terminal businessman, obtains the sequence information of consumer-user, gets all the commodity ready by the requirement of consumer, and by mobile intelligent terminal merchant client, identifies the false proof authentication codeword value reading these commodity.
Six, businessman's mobile intelligent terminal client, by system by identifying the false proof authentication codeword value read, is submitted in the client terminals account of consumer-user.
Utilize the consumer of system businessman to place an order online management system, click singular link under corresponding consumer, reply information of having got ready the goods, and transfer the false proof authentication codeword value identifying and read, be submitted in the client terminals account of consumer-user.
Seven, consumer-user obtains commodity counterfeit prevention authentication codeword value, system server is submitted to by the Internet, implement commodity substep fake certification, or further commodity network identification authentication, after consumer-user confirms the true and false or identity, or by having third party's network payment instrument defrayment of guarantee function.
Eight, after consumer receives commodity, check the false proof authentication codeword value that businessman provides, by the system client of mobile intelligent terminal, again implement the anti-fake certificate to commodity and identification authentication certification, confirm that errorless rear signature is received, or confirm that the wrong rear return of goods are rejected.
3, the method for the false proof and network identity authentication of commodity substep is realized, be the different hardware configurations of satisfied different mobile intelligent terminal, the different digital recognition technology of application, comprise laser scanner technique, bluetooth recognition technology, RFID REID, NFC recognition technology, Quick Response Code recognition technology, camera recognition technology and following other new recognition technologies expansion, the identification of false proof authentication codeword value is read.
4, realize the method for the false proof and network identity authentication of commodity substep, be to set up mobile intelligent terminal client, to the function command driving relationship of camera, when initiating to identify that reading false proof authentication codeword value mark asks, the camera of client instructions identification end, the false proof authentication codeword value mark of commodity is taken pictures, again photo submitted to picture modular converter and resolve functional module, obtain false proof authentication codeword value, the false proof authentication codeword value that mobile intelligent terminal client will obtain, by mobile network's submission system database, carry out commodity substep fake certification, or carry out commodity network identification authentication.Current at mobile intelligent terminal, implement security code identification, the most real technology has been exactly the camera extensively configured by mobile intelligent terminal.
5, realize the method for the false proof and network identity authentication of commodity substep, be to set up mobile intelligent terminal client, to the function command driving relationship of NFC chip, when initiating to identify that reading false proof authentication codeword value mark asks, the NFC chip of client instructions identification end, start and identify read functions, to the false proof authentication codeword value NFC chip configured on commodity, identify the false proof authentication codeword value reading these commodity, and submit to mobile intelligent terminal client, the false proof authentication codeword value that mobile intelligent terminal client will obtain, by network submission system database, carry out commodity substep fake certification, or carry out commodity network identification authentication.The following NFC technique can estimating extensive use, NFC technique is used to carry out security code identification, the application standard configuration of individual mobile intelligent terminal can be become, particularly based on the integration identification reading technology of NFC technique, a function sharing identification end can be formed, so, be necessary to do an earlier technique planning here.
Fig. 1 is the principle modules figure that the present invention realizes the method for the false proof and network identity authentication of commodity substep.
Fig. 2 is that the network identity authentication part that the present invention realizes the method for the false proof and network identity authentication of commodity substep implements module map.
With reference to shown in legend, the operation flow process below by specific embodiment further illustrates, and the present invention realizes the method implementing procedure of the false proof and network identity authentication of commodity substep.
1, suitable anti-counterfeiting technology and scheme is selected, or the anti-counterfeiting technology of system matches and scheme, special anti-counterfeiting marking arrangement 110 and 111 is installed additional at product line 109 end, install anti-fake mark additional and read editing equipment 108, and set up anti-fake mark read editing equipment 108 be connected with system data typing end 107, set up anti-fake mark work flow.Without the need to special equipment, also can be designed to artificial false proof work flow.
2, at the parts of product, or product itself, or product inner packing, or on product external packaging, designing one or more gauge point, use characteristic marker 110 carries out anti-counterfeiting characteristic mark, uses coded marker 111 to carry out anti-fake code mark.
3, digital independent editing machine 108 is read by marker, or directly reads label information at gauge point, and edits reading information; Simultaneously, to the enterprise of businessman also not having Standard Edition or needs amendment, the production technology of relevant title, brand, trade mark and product, use material, external appearance characteristic, the information such as production time Sales Channel terminal carry out registration editor or amendment, build should the false proof authentication information of mark of product or the false proof authentication information normal data of feature interpretation, manufacturer mates corresponding unique Product own coding.
4, by data inputting end 107, will gather, the normal data after edit-modify and manufacturer's product own coding, input system server 104, is stored in system database 106.
5, system server 104, the false proof authentication codeword value corresponding to the configuration of product own coding, by code configuration end 112, returns to code signing end 113 the false proof authentication codeword value of configuration, and on product or external packing, or production line prompting position marks.
6, according to the design of system accounting module and the requirement of both service fee agreements, automatically complete by false proof authentication codeword value, the charge accounting of quantity configuration or product number statistics is arranged.
Above-mentioned flow process, completes the setting of the false proof authentication at production end.Flow process is below at user side, illustrates and how to realize false proof authentication, comprise the following steps:
7, when consumer's shopping, when initiation is to the fake certification of these commodity or identification authentication request, operation mobile intelligent terminal client 102, client 102 instruction identification end 101, read or this false proof authentication codeword value of decoding reading, identify that end submits false proof authentication codeword value to, to mobile intelligent terminal client 102, mobile intelligent terminal client 102, by mobile base station 103, enter mobile radio communication, request is to system server 104 to submit to this access to verify, system server 104, to Direction Center 105, initiates false proof authentication verification request.
Or user is by mobile intelligent terminal client 102, input this false proof authentication codeword value, enter mobile Internet by mobile base station 103, by false proof authentication request, be submitted to system server 104, system server 104 initiates false proof authentication verification request to Direction Center 105.
8, Direction Center 105 is by system database 106, searches the false proof authentication result information that authentication codeword value false proof with this is corresponding, and the object information that will find, return to mobile intelligent terminal client 102.If system does not find corresponding object information, prompting and information warning will be returned.
9, user reads the false proof authentication result information returned, and instructs flow process, carry out substep fake certification or identification authentication to product according to it.
By the enforcement of above-mentioned technology, achieve the object realizing product false proof authentication based on terminal recognition technology of the present invention, help enterprise of producer to crack down on counterfeit goods false proof, provide solution the most thoroughly, and at the visual features to enterprise, in product promotion; The business of implementation platform operator increases income, and service function extends, and new functions expanding, develops the approach that another is brand-new.