Movatterモバイル変換


[0]ホーム

URL:


CN103049857A - Anti-counterfeiting method using third party by leading and adopting identification of smart phone - Google Patents

Anti-counterfeiting method using third party by leading and adopting identification of smart phone
Download PDF

Info

Publication number
CN103049857A
CN103049857ACN2013100053983ACN201310005398ACN103049857ACN 103049857 ACN103049857 ACN 103049857ACN 2013100053983 ACN2013100053983 ACN 2013100053983ACN 201310005398 ACN201310005398 ACN 201310005398ACN 103049857 ACN103049857 ACN 103049857A
Authority
CN
China
Prior art keywords
counterfeiting
false proof
party
technology
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100053983A
Other languages
Chinese (zh)
Inventor
张延坦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to CN2013100053983ApriorityCriticalpatent/CN103049857A/en
Publication of CN103049857ApublicationCriticalpatent/CN103049857A/en
Pendinglegal-statusCriticalCurrent

Links

Landscapes

Abstract

The invention discloses an anti-counterfeiting method using the third party by leading and adopting the identification of a smart phone. The anti-counterfeiting method comprises the steps that a third party anti-counterfeiting technology provider is intervened between an anti-counterfeiting user and an anti-counterfeiting identifier which participate in anti-counterfeiting, a third party provides an anti-counterfeiting technology and formulates an anti-counterfeiting rule, and controls and manages an anti-counterfeiting identification node of the anti-counterfeiting user according to a rule application software technical mean for solving the problem of anti-counterfeiting misuse and embezzlement fleeing goods, and therefore, an anti-counterfeiting confidence mechanism is established between the anti-counterfeiting user and the anti-counterfeiting identifier for solving the anti-counterfeiting problem; the third party provides the anti-counterfeiting technology, and specifically provides an anti-counterfeiting information generation technology and an anti-counterfeiting information loading technology and anti-counterfeiting electronic information uploading software to the anti-counterfeiting user, provides a technology of solving the problem of anti-counterfeiting misuse and embezzlement fleeing goods and anti-counterfeiting check software used by the smart phone to the anti-counterfeiting identifier; and the third party formulates the anti-counterfeiting rule mainly and promotes the anti-counterfeiting user to sign a legal file with an anti-counterfeiting provider according to the rule, and the anti-counterfeiting user and the anti-counterfeiting technology provider perform respective obligations and bear respective responsibilities according to the agreement for efficiently implementing the anti-counterfeiting technology.

Description

Take the method for anti-counterfeit of identifying with smart mobile phone as the leading factor with the third party
Technical field
The method for anti-counterfeit of taking as the leading factor with smart mobile phone identification with the third party is a kind of anti-counterfeiting technology of innovation mode, solves the problem that false proof abuse is usurped falsifying, belongs to field of anti-counterfeit technology.
Background technology
The development of anti-counterfeiting technology can be divided into following several stages:
First generation product: the product take laser anti-counterfeit as representative.Laser anti-counterfeit is the higher anti-counterfeiting technology of a kind of technical threshold, and this series products once was a comparatively desirable anti-counterfeiting technology through the several generations development, because technology is extensively promoted, antifalse effect descends gradually, the false proof field of gradually fading out.
Second generation product: query formulation numerical code anti-fake label.The consumer can be by the true and false of mobile phone short message internet checking digital label, this technology has very large defective, scrape off coating obtain number do not go the inquiry can copy, also can be digital next imitated by bribing purchase, the inquiry end also may be counterfeiting, and can't inquire about before purchase, anti-fake effect is very limited.
Third generation product: the texture anti-fake technology, this texture has the advantages such as randomness and uniqueness.Making is more loaded down with trivial details, and the product category coverage rate is very limited, and it is not convenient to implement checking, can't distinguish intuitively whenever and wherever possible that very large use limitation is arranged, and the personator can mix pearl by ichthyosauru by imitateing application, and is hard to tell whether it is true or false.
The 4th generation product: the product of safety line cheque paper technology and application thereof, antifalse effect is good, the imitated expensive large non-general enterprises of threshold can be used, application has limitation, imitated possibility is very big, present this technology is extensively grasped.
The 5th generation product: the method for anti-counterfeit of internet or communication network inquiry comparison is exactly with anti-counterfeiting characteristic information such as multimedia picture, video, coding, symbol, figures, records, inquires about the technology of comparison anti-counterfeiting information with Internet resources and communication resources.This type of technology is varied, can be summed up as the anti-counterfeiting technology that open or ostensible anti-counterfeiting information and the anti-counterfeiting information of hiding or bury compare and distinguish true from false to them.How to see and think that this technology is very fresh very novel, go into seriously and find that it carries out information recording/with common search database in fact and the user side search inquiry is as broad as long, someone is incorporated in the false proof very novel very science of feeling to it, it but is exactly heavily bullet of old song, there be very large defective and careless mistake, it be exactly that genuine piece do not conform to is exactly fake and poor products that the comparison of two kinds of information conforms to, and everybody can imitate and use without any false proof value such as the method.This technology early has application on each businessman's Antiforge inquiry server, fact proved that its antifalse effect is very limited, only rests on the information inquiry comparison function, and its whole false proof measure is very empty very empty, does not have application and the operation of practical significance.
In recent years, various antifalsification label manufacturing technologies are constantly updated, such as, profiling, wet profiling, the Concealed label of nuclear track, heat, concealed code, anti-forgery ink printing and electronic tag etc., scientific and technological content is very high, imitation difficulty is also very high,, existing all technology have separately weak point, otherwise identify loaded down with trivial details, or damage label after the identification, identification has the experience restriction, label is with high costs, or identification has the restriction of specific specialized equipment, so that does not have a kind of technology to obtain market to approve widely and use.With high content of technology, check and correction identification lacks understandable convenience, and the effective property of technology and abuse property.Anti-counterfeiting technology before summing up, they have individual common ground is exactly that the anti-counterfeiting technology use is in free state, and utilization is unfettered, and the mixed pearl phenomenon of ichthyosauru is serious, and anti-pseudo-pattern is outmoded, and antifalse effect is very limited.
Summary of the invention
False proof participant has false proof user and false proof discriminating side (comprising consumer, law enfrocement official etc.) in the anti-pseudo-pattern of tradition, false proof user uses anti-counterfeiting technology or anti-fake product that oneself product is implemented false proof measure and sticks anti-counterfeiting mark and introduce to the market, and false proof discriminating side identifies the evaluation true and false to anti-counterfeiting mark.Anti-pseudo-pattern like this exists very large defective and drawback, from the anti-pseudo-pattern of tradition, can find, false proof user uses anti-counterfeiting technology or anti-fake product not restricted by any rule or certain agreement, use freely, it is false proof that the willing investment of user can use anti-counterfeiting technology or anti-fake product to carry out to a certain product, and described a certain product can be that genuine piece can be fake and poor products also certainly.Here it is, and why commodity counterfeit prevention feature is available in all varieties but is a fake and poor products.All there is the problem of technology abuse in existing any anti-counterfeiting technology, causes serious abuse even high-end technology also has ageing meeting.The anti-pseudo-pattern of tradition often all is from the high threshold high investment of the high barrier of hi-tech the defence barrier to be set, and the result is because impermanent effectively solution of the defective of the pattern that adopts existence itself prevented pseudo problem.
Internet or communication network inquiry anti-counterfeiting technology abuse are especially serious, and its technical essential of this type of anti-counterfeiting technology is open or ostensible anti-counterfeiting characteristic information is inquired about the matching identification true and false with the anti-counterfeiting information of hiding or bury; Although these type of various technology procedures are different, have plenty of visual information and have plenty of sightless information or electronic information, but changeable not from Qi Zong, it is genuine piece that i.e. two kinds of information comparisons conform to, do not conform to is fake and poor products, its anti-counterfeiting characteristic information is at random various changeable, the user can generate at random by own wish, anti-counterfeiting characteristic Information generation technical threshold low cost is little, the anti-counterfeiting technology method is used freely and is not restricted, and everybody can imitate application as long as know method for anti-counterfeit, reaches the effect of the mixed pearl of ichthyosauru, therefore, this type of anti-counterfeiting technology is used and is had serious abuse.Here it is why this type of technology the reason of market approval and widespread use appears not obtaining in nearly 10 years.This type of anti-counterfeiting technology except inquire about convenient, substantially do not have false proof value to say.If the anti-counterfeiting characteristic information exchange is crossed the commodity of label Indirect Loaded, also exist label to steal and use and bribe the drawback of buying use.The fact is verified, and this type of technology does not possess practicality.Under the anti-pseudo-pattern of tradition, anti-pseudo problem can effectively not solved, and fake and poor products is walked crosswise the situation in market and can not taken on a new look.
According to the problem that false proof present situation exists, analysis conventional prevent pseudo-pattern, innovate a kind of with the leading lower method for anti-counterfeit of identifying with smart mobile phone of third party, the problem that it can the current anti-pseudo-pattern existence of fine solution.The false proof activity of false proof user and false proof discriminating side is leading and management is leading lower in third party technology, has thoroughly solved false proof abuse, has usurped and the problem of malice falsifying, uses smart mobile phone identification to make true and false identification realize the automation and intelligentification judicial convenience; The low little antifalse effect of input cost of anti-counterfeiting information generation technique threshold significantly is a kind of ideal method for anti-counterfeit.
The method for anti-counterfeit of taking as the leading factor with smart mobile phone identification with the third party is to belong to network verification anti-counterfeiting technology, what it was different from the anti-pseudo-pattern of tradition is that third-party involvement is arranged, false proof participation role also has third party's anti-counterfeiting technology provider except false proof user and false proof discriminating side.The third party also carries out scientific and effective management to whole false proof activity except anti-counterfeiting technology is provided; Faith mechanism between false proof user and the false proof discriminating side is leading and leading lower foundation of management in third party technology, and false proof activity long-term sustainable is efficiently carried out.
The anti-counterfeiting technology content that anti-counterfeiting technology provider provides comprises: (1) provides false proof service clearance; (2) false proof service regulation is formulated and leading enforcement; (3) to highly effective false proof provide technical service and management; (4) omnidistance leading false proof activity is responsible for false proof.
Fixing approximately of third-party participation and rule, false proof activity no longer is the one-side behavior of false proof user, and false proof user more cannot do at will; The third party is by the effective management with software engineering means, and false proof user can follow agreed specifications and use anti-counterfeiting technology, thus solve between the user abuse, usurp, the problem of falsifying maliciously.This method for anti-counterfeit focuses on false proof use management, inquires about false proof emphasis anti-counterfeiting information generated query with existing network and compares completely differently, and it focuses on false proof use management, and next is only the management of anti-counterfeiting information comparison; Only have false proof use management science effectively not make mistakes, anti-counterfeiting information verification comparison just has false proof value.
Take the method for anti-counterfeit of identifying with smart mobile phone as the leading factor with the third party, the third party is exactly the anti-counterfeiting technology provider, elaborates below the leading realization of third party is false proof.(anti-counterfeiting technology provider is hereinafter referred to as the third party)
1, the leading false proof activity of third party at first will provide the server that carries out false proof activity, and server is the place that all false proof participants are set up service relation, also is the place that the Antiforge electronic information recording/is preserved.
2, the third party formulates false proof target anti-counterfeiting technology is provided, and formulates false proof operation regulation, agreement, obligation and responsibility; The third party illustrates anti-counterfeiting technology effect and the false proof target that will reach and anti-counterfeiting technology is provided for false proof user, formulate false proof operation regulation and agreement, the operation regulation of formulation can impel anti-counterfeiting technology to use has rule to follow, and the Rule content of formulation comprises at least: the content of false proof user's legal identity authentication content, the content of using signatory agreement, appointment third party entry information in coding; Sign the agreement that has legal validity according to the false proof user of operation regulation and third party, both sides keep appointments, fulfil separately obligation and the responsibility of bearing separately, must verify through the anti-counterfeiting technology provider according to regular false proof user's legal identity can qualified use anti-counterfeiting technology after qualified, prevents that from the source anti-counterfeiting technology method from being abused.
3, the third party provides the software technical tool of anti-counterfeiting technology and use according to false proof target and anti-counterfeiting technology requirement to false proof user.Anti-counterfeiting technology comprises: anti-counterfeiting information generation technique, Antiforge electronic information storage technology, anti-counterfeiting information verification recognition technology instrument, solution abuse are usurped the technology of malice falsifying.
Anti-counterfeiting information generation technique means comprise that the employing printing generates, carves generation, paper technology generation, textile technology, electronic technology generates and other can generate the various technology of suitable false proof needs.Anti-counterfeiting characteristic information on commodity or its packing material generate, the network anti-counterfeit technical characterstic is exactly that its anti-counterfeiting characteristic information has the polytrope of diversity randomness, anti-counterfeiting characteristic information can be numeral, symbol, figure, bar shaped, netted, concave-convex and not reproducible electronic information, material can be paper, printing ink, wood, cloth, fiber, glass, metal, mineral matter, so long as any type of information that unique not reproducible suitable user uses can load into anti-counterfeiting information, can be fit to self product demand loading generation according to user self wish.
The phenomenon of usurping falsifying by the false proof abuse of anti-counterfeiting technology requirement containment occurs, anti-counterfeiting characteristic information is after commodity or the generation of its packing material, one piece of coding that is provided by the third party is provided in the anti-counterfeiting characteristic block of information, coding can be that two-dimension code, bar code or other form anti-counterfeiting technology provider can control manageable coding, the third party carries out the scientific and effective management with the software engineering means to the anti-counterfeiting characteristic information coding, and the third party usurps the phenomenon of falsifying and occurs by the control and management of label coding being contained false proof abuse.Coded message and anti-counterfeiting characteristic information combination become complete anti-counterfeiting information.
The third party utilizes the software engineering means that the anti-counterfeiting mark coding is effectively managed, and is usurped with the falsifying phenomenon by abuse with the containment anti-counterfeiting mark to occur, and concrete management method is described as follows:
(1) provide the coding made and anti-counterfeiting characteristic information after the packing of product is complete by the third party, the two is carried in abreast respectively one and forms knockdown anti-counterfeiting mark on product package material, the relative position information feature between the two is to generate at random after the two loading is finished; Only have when coding and anti-counterfeiting characteristic information load respectively finish after, the anti-counterfeiting information of product is just calculated complete formation, avoids very dexterously the generation of the stolen phenomenon of anti-counterfeiting mark.
(2) coding is the coding of anti-counterfeiting mark as a whole, and an anti-counterfeiting mark is joined a unique coding; Coding is information comparison object of reference during as the verification of the anti-counterfeiting characteristic information true and false; Anti-counterfeiting mark has had coding, and false proof discriminating side uses verification software just can ask for fast corresponding standby anti-counterfeiting mark information of depositing and is used for the verification use; Anti-counterfeiting characteristic information has coding as information comparison object of reference, and verification software utilization coding is done check and correction as object of reference one by one to anti-counterfeiting information, thereby judges the true and false of being tested commodity.
(3) specify third party's entry information in coding according to rule, the information content of typing includes third party's network address and anti-counterfeiting mark subject matter manufacturer identity information content; False proof discriminating side just can obtain third party's network address and can login third party website to download false proof verification software with coded scanning software scans coding, scan to obtain and is tested anti-counterfeiting information being tested anti-counterfeiting mark with verification software false proof discriminating side, the quilt that software obtains is tested anti-counterfeiting information and is compared with corresponding standby anti-counterfeiting characteristic information of depositing and obtain check results and show the check results content, and the check results content includes anti-counterfeiting mark subject matter manufacturer identity information content and the anti-counterfeiting characteristic information checking resultant content of anti-counterfeiting technology provider typing in coding; When being tested the anti-counterfeiting information check results and be true anti-counterfeiting characteristic information, false proof discriminating side also should examine the anti-counterfeiting mark subject matter manufacturer identity of being tested the demonstration of commodity production merchant identity and verification software, examining conforms to, and could final decision to be tested commodity are genuine pieces, otherwise are fake and poor products; This just means that can only there be typing in false proof use businessman the anti-counterfeiting mark of self identity to be carried in the enterprising line scanning of product that oneself produces and uploads third-party server and preserve, and so false proof discriminating side can be conformed to anti-counterfeiting mark subject matter manufacturer identification checkup by the commodity production merchant identity of verification when verification.
Anti-counterfeiting mark subject matter manufacturer identity information content is to specify third party's typing in coding, subject matter manufacturer identity information content is: this product is that the XX board product that XX company produces please be checked, and also can otherwise express the information that subject matter manufacturer identity can be described; Third party's application technology means all can't be changed or delete in addition anyone of these identity information content third parties; Third party's application software technology means make the false proof businessman that uses be merely able to have the anti-counterfeiting mark scanning of its own identity to be uploaded to the preservation of third-party server record in order to the verification use typing, that is to say that product that false proof user wants oneself is produced does when false proof, must be that the anti-counterfeiting technology provider asks for typing and has the coding of himself identity could implement false proof operation to the third party, not have typing that coding and the self-editing coding of self identity arranged and the coding of stealing other people all can't upload to third-party server and preserves; Because can be shown to false proof discriminating side to anti-counterfeiting mark subject matter manufacturer identity during false proof verification software verification is used for examining being tested commodity production merchant identity, therefore false proof use businessman also is merely able to have the anti-counterfeiting mark of self identity to be carried on the product that oneself produces typing, if deliberate to be carried on the product of other people production, manufacturer's identity that verification software shows is tested commodity production merchant identity with quilt and just can not conformed to, and therefore premeditated falsifying is impossible realization.
More than being exactly third party's application software technology means carries out scientific and effective management to the anti-counterfeiting mark coding, has thoroughly stopped false proof abuse, has usurped and the phenomenon of malice falsifying occurs; The third party solves the technology that abuse is usurped the falsifying problem with the software engineering means by the control and management to the anti-counterfeiting mark coding, is the core technology of this method for anti-counterfeit, is this method for anti-counterfeit innovative technology, also is the claimed technology of this method for anti-counterfeit; Management solves abuse, usurps with falsifying and prevent that the technology of pseudo problem all belongs to the claimed technology of this method for anti-counterfeit to the anti-counterfeiting mark coding-control by the third party.
(4) anti-counterfeiting mark has anti-transfer measure, the personator can't be shifted reuse, and anti-transfer measure can adopt friable material to produce label, and label is carried in product unpacking place, and the not transferable secondary of label is used.
Antiforge electronic information storage technology, software is uploaded in the scanning that false proof user's computing machine is installed the third party to be provided, the scanning device of anti-counterfeiting mark can be distinguished or scan to outfit, and scanning device is connected with computing machine, is uploaded to third-party server and records preservation scanning anti-counterfeiting information; The anti-counterfeiting mark that provides typing that false proof user self identity information is arranged by the third party only is provided, and false proof user can be scanned and upload the third-party server preservation in order to the verification use, and anti-counterfeiting mark in addition can't be uploaded.The scanning that the third party provides is uploaded software and can be scanned anti-counterfeiting mark at a high speed, and the anti-counterfeiting information that obtains is uploaded preservation, guarantees user's production efficiency.
Embodiment
At first, the third party provides complete reliable false proof appropriate technology, and applicable technology comprises that scanning uploads software, verification software, is applicable to the anti-counterfeiting information generation technique of all kinds of commodity, formulates rigorous false proof rule tightly; When false proof user determines to use anti-counterfeiting technology, its legal identity must at first be used agreement through the approved qualified anti-counterfeiting technology of can contracting of anti-counterfeiting technology provider, formally become false proof user; False proof user disposes necessary hardware facility, after all anti-counterfeiting technology demands were equipped with and finish, false proof user just can ask for typing to the anti-counterfeiting technology provider and is carried in by the coding of self identity and form combined anti-fake with anti-counterfeiting characteristic information on the product that oneself produces and identify the false proof activity of enforcement; The anti-counterfeiting technology that the third party provides must by the anti-counterfeiting technology requirement possess be strictly on guard against the abuse usurp the function of falsifying, the third party also should provide verification to identify accurate verification software to false proof discriminating side; False proof discriminating side at first uses coded scanning software and sign is scanned obtains third party's network address when needing verification, and the login third party website is downloaded verification software and is used for true and false verification identification and uses; The personnel of law enforcement agency especially consumer can be known the true and false of commodity as long as with the smart mobile phone that verification software is installed commodity false proof mark is carried out scanned for checkout, determine again to buy after can before buying, discerning the false from the genuine, in order to avoid buy fake and poor products, fake and poor products is eliminated in selling the way.

Claims (5)

5. third party according to claim 1 is by management solves false proof abuse to the anti-counterfeiting mark coding-control, usurp, the falsifying problem, its technical characterictic (1) is to load one piece of coding that is provided and had uniqueness by the third party to anti-counterfeiting characteristic information place, coding forms complete anti-counterfeiting mark with anti-counterfeiting characteristic information, feature (2) is to specify the third party to coding typing third party's website information and anti-counterfeiting mark subject matter manufacturer identity information, feature (3) is that third party's application software technology means make false proof user be merely able to have the anti-counterfeiting mark scanning of himself identity to be uploaded to the third-party server record typing and preserve in order to verification and use, feature (4) is that anyone except the third party is the anti-counterfeiting technology provider of information of third party's application technology means typing in coding can't change or delete, and shows when feature (5) is the verification software verification that anti-counterfeiting mark subject matter manufacturer identity information is tested commercial product identification for false proof discriminating side to quilt and examined.
CN2013100053983A2013-01-082013-01-08Anti-counterfeiting method using third party by leading and adopting identification of smart phonePendingCN103049857A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN2013100053983ACN103049857A (en)2013-01-082013-01-08Anti-counterfeiting method using third party by leading and adopting identification of smart phone

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN2013100053983ACN103049857A (en)2013-01-082013-01-08Anti-counterfeiting method using third party by leading and adopting identification of smart phone

Publications (1)

Publication NumberPublication Date
CN103049857Atrue CN103049857A (en)2013-04-17

Family

ID=48062487

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN2013100053983APendingCN103049857A (en)2013-01-082013-01-08Anti-counterfeiting method using third party by leading and adopting identification of smart phone

Country Status (1)

CountryLink
CN (1)CN103049857A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104408631A (en)*2014-11-252015-03-11张延坦Application method of anti-counterfeit labels
CN109308621A (en)*2018-05-272019-02-05成都零光量子科技有限公司A kind of safe and efficient product false proof and recognition methods

Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1331455A (en)*2000-06-272002-01-16石朝生Antiforge electronic label scanned over network for commodites and its making method
CN1354439A (en)*2001-12-102002-06-19刘名忠Third-side network personal identification code anti-false system and its method
US20080106372A1 (en)*2006-10-192008-05-08Wei ChangAuthentication method during product transactions
CN101504749A (en)*2009-03-122009-08-12李贵明Anti-fake method based on third party credit system information
CN101546402A (en)*2008-03-272009-09-30蔡其Anti-counterfeiting method and system of same for electronic commerce transactions
US20110208418A1 (en)*2010-02-252011-08-25Looney Erin CCompleting Obligations Associated With Transactions Performed Via Mobile User Platforms Based on Digital Interactive Tickets
CN102496114A (en)*2011-11-222012-06-13成都天钥科技有限公司Method and system for product counterfeiting prevention and method and device for identity information generation
CN102542469A (en)*2011-12-212012-07-04李利民Commodity barcode anti-fake system and method based on cloud computing mode

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1331455A (en)*2000-06-272002-01-16石朝生Antiforge electronic label scanned over network for commodites and its making method
CN1354439A (en)*2001-12-102002-06-19刘名忠Third-side network personal identification code anti-false system and its method
US20080106372A1 (en)*2006-10-192008-05-08Wei ChangAuthentication method during product transactions
CN101546402A (en)*2008-03-272009-09-30蔡其Anti-counterfeiting method and system of same for electronic commerce transactions
CN101504749A (en)*2009-03-122009-08-12李贵明Anti-fake method based on third party credit system information
US20110208418A1 (en)*2010-02-252011-08-25Looney Erin CCompleting Obligations Associated With Transactions Performed Via Mobile User Platforms Based on Digital Interactive Tickets
CN102496114A (en)*2011-11-222012-06-13成都天钥科技有限公司Method and system for product counterfeiting prevention and method and device for identity information generation
CN102542469A (en)*2011-12-212012-07-04李利民Commodity barcode anti-fake system and method based on cloud computing mode

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104408631A (en)*2014-11-252015-03-11张延坦Application method of anti-counterfeit labels
CN109308621A (en)*2018-05-272019-02-05成都零光量子科技有限公司A kind of safe and efficient product false proof and recognition methods

Similar Documents

PublicationPublication DateTitle
CN103729770B (en)A kind of anti-fake traceability system and its method
CN103077467B (en)A kind of method and system verifying authenticity of products
CN103093365B (en)The method and system of checking authenticity of products
CN108765023A (en)A kind of commodity evaluation management method, system and equipment
CN204375008U (en)A kind of marketed material tracing management identification system
CN109816070A (en)The method for anti-counterfeit of query rate is improved using insurance policy
CN109544192A (en)A kind of anti-fake source tracing method of collection based on block chain technology
CN101807285A (en)Method for interactive dynamic forgery prevention and verification
CN108985431B (en)Anti-counterfeit label and method for detecting and identifying genuine goods of registered trademark
CN101673387A (en)Commodity digital anti-counterfeit method
CN101388086A (en)Digital coding method for products anti-counterfeiting physical distribution monitoring system
CN108154207B (en)Anti-counterfeiting unique code generation and anti-counterfeiting verification method
CN106971311A (en)A kind of false proof traceability system of logistics Means of Agricultural Production and method
CN105590227A (en)Dynamic verification method, apparatus, and system of authenticity of commodity
CN103996122A (en)Merchandise anti-counterfeiting system and method
CN103049857A (en)Anti-counterfeiting method using third party by leading and adopting identification of smart phone
Fedosov et al.Sharing physical objects using smart contracts
CN102930448B (en)Network verification anti-counterfeiting system for images
CN110443626A (en)Card anti-counterfeiting system is deposited in a kind of commodity transaction based on block chain
CN101833728A (en)Commodity anti-counterfeiting method
BurriNew legal design for digital commerce in free trade agreements
CN206757700U (en)A kind of false proof traceability system of logistics Means of Agricultural Production
CN105894302A (en)Product anti-counterfeiting method
CN108985780A (en)A kind of product anti-fake system and method
GeredaThe electronic communications and transactions act

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20130417


[8]ページ先頭

©2009-2025 Movatter.jp