CN109949050B - Block chain-based product identification analysis method, terminal device and storage medium - Google Patents

Block chain-based product identification analysis method, terminal device and storage medium Download PDF

Info

Publication number
CN109949050B
CN109949050B CN201910184087.5A CN201910184087A CN109949050B CN 109949050 B CN109949050 B CN 109949050B CN 201910184087 A CN201910184087 A CN 201910184087A CN 109949050 B CN109949050 B CN 109949050B
Authority
CN
China
Prior art keywords
information
product
preset
verification code
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910184087.5A
Other languages
Chinese (zh)
Other versions
CN109949050A (en
Inventor
翟红鹰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGDONG HENGLI INFORMATION TECHNOLOGY CO LTD
Original Assignee
GUANGDONG HENGLI INFORMATION TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGDONG HENGLI INFORMATION TECHNOLOGY CO LTD filed Critical GUANGDONG HENGLI INFORMATION TECHNOLOGY CO LTD
Priority to CN201910184087.5A priority Critical patent/CN109949050B/en
Publication of CN109949050A publication Critical patent/CN109949050A/en
Application granted granted Critical
Publication of CN109949050B publication Critical patent/CN109949050B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a product identification and analysis method based on a block chain, terminal equipment and a computer readable storage medium, wherein the method is used for reading verification code information and two-dimension code information of a product by responding to scanning operation of a user; verifying whether the verification code information is matched with the two-dimension code information; when the verification code information is matched with the two-dimensional code information, second preset information related to the product is obtained; detecting whether the acquired second preset information meets a preset requirement or not; and when the second preset information meets the preset requirement, confirming that the product is a genuine product. In order to prevent others from maliciously stealing and sticking the two-dimensional code of a real product, the method of the invention sets the secret code-verification code, judges the authenticity of the two-dimensional code according to the combination of the verification code and the two-dimensional code, and provides production information and link information according to the authenticity condition of the two-dimensional code, so that consumers can conveniently judge whether counterfeit goods exist or not or distributors judge whether goods fleeing exists or not.

Description

Block chain-based product identification analysis method, terminal device and storage medium
Technical Field
The present invention relates to the field of electronic device technologies, and in particular, to a product identification analysis method based on a block chain, a terminal device, and a computer-readable storage medium.
Background
The tracing system is a production control system which can track products in a forward direction, a reverse direction or a non-direction, and is suitable for various types of processes and production control systems. It can let you trace back to the following information of the product: which parts are installed in the finished product. In the production process of the product, key parameters needing to be controlled are generated, and whether the parameters are qualified or not is judged. As well as tight control of the current manufacturing process, etc.
However, along with the rapid development of the society, more and more counterfeit products appear, and the counterfeit products can be very similar in appearance, and meanwhile, the two-dimensional code information of real products can be attached to the counterfeit products, so that the authenticity of the counterfeit products is increased.
In view of the above, there is a need for a method for preventing another person from maliciously reverse pasting a two-dimensional code of a genuine product.
Disclosure of Invention
The invention mainly aims to provide a product identification and analysis method based on a block chain, a terminal device and a computer readable storage medium, and aims to solve the problem that the existing two-dimensional code imitating a fake and inferior product and maliciously inversely sticking a real product.
In order to achieve the above object, the present invention provides a method for product identification and analysis based on blockchain, comprising the following steps:
step S10, responding to the scanning operation of a user, reading the verification code information and the two-dimension code information of a product, wherein the verification code information is associated with the first preset information of the product, and the two-dimension code information is associated with the second preset information of the product;
step S20, verifying whether the verification code information is matched with the two-dimension code information;
step S30, when the verification code information is matched with the two-dimension code information, second preset information related to the product is obtained;
step S40, detecting whether the acquired second preset information meets a preset requirement;
and step S50, when the second preset information meets the preset requirement, confirming that the product is a genuine product.
Preferably, the generation method of the verification code information in step S10 is as follows:
step S11, acquiring first preset characteristic information of a product;
step S12, generating verification code information for verifying the identity of the product according to the preset rule and the first preset feature information of the product.
Preferably, the step S12 is followed by:
step S13, acquiring generated verification code information and two-dimensional code information;
and step S14, generating a relationship chain for matching the verification code information and the two-dimension code information according to the verification code information and the two-dimension code information.
Preferably, the first preset characteristic information is geometric characteristic information of the product,
the step S11 includes acquiring geometric feature information of the product;
step S12 includes generating verification code information that can be used to verify the identity of the product according to preset rules and the geometric feature information of the product.
Preferably, the step S11 is followed by:
step S111, judging the integrity of the product according to the geometric characteristic information of the product
And step S112, when the product is judged to be in the damaged state, regenerating the verification code by using a preset repair algorithm.
Preferably, the method further comprises:
and S001, acquiring data of the user scanning the two-dimensional code and/or the verification code, and uploading the acquired data to a block chain system to analyze the data of the user.
Preferably, the method for analyzing the data of the user in step S001 includes:
step S001a, extracting keywords from the user data to set label words for the user;
and step S001b, matching the business demand information close to the user for the user according to the label words.
Preferably, the method further comprises:
step S002, acquiring scanning record data of a user scanning the two-dimensional code and/or the verification code;
step S003, a preset scanning reward rule is obtained according to the scanning record data;
step S004, combining the scanning record data and the scanning reward rule to calculate reward matched with the scanning record data;
and step S005, the rewards are issued to accounts corresponding to the scanned two-dimensional codes and/or the verified users according to a preset path.
In addition, to achieve the above object, the present invention also provides a terminal device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the steps of the method according to any one of the above.
Furthermore, to achieve the above object, the present invention also proposes a computer-readable storage medium storing a computer program, which when executed by a processor implements the steps of the method according to any one of the above.
The method comprises the steps that verification code information and two-dimension code information of a product are read by responding to scanning operation of a user, the verification code information is associated with first preset information of the product, and the two-dimension code information is associated with second preset information of the product; verifying whether the verification code information is matched with the two-dimension code information; when the verification code information is matched with the two-dimensional code information, second preset information related to the product is obtained; detecting whether the acquired second preset information meets a preset requirement; and when the second preset information meets the preset requirement, confirming that the product is a genuine product. The method provided by the embodiment of the invention aims to prevent others from maliciously attaching the two-dimension code of the real product to the fake product. The 'secret code' -verification code is set, the authenticity of the two-dimensional code is judged according to the combination of the verification code and the two-dimensional code, and production information and link information are provided according to the authenticity of the two-dimensional code, so that whether a consumer has counterfeit or a dealer judges whether a product has channel conflict.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention to the proper form disclosed herein. It is obvious that the drawings in the following description are only some embodiments and that for a person skilled in the art, other drawings can also be derived from them without inventive effort. In the drawings:
FIG. 1 is a schematic flow chart of an embodiment of a blockchain-based product authentication analysis method according to the present invention;
FIG. 2 is a schematic flow chart of another embodiment of the method for analysis of product identification based on blockchain according to the present invention;
FIG. 3 is a schematic flow chart of another embodiment of the blockchain-based product authentication analysis method according to the present invention;
FIG. 4 is a schematic flow chart diagram illustrating a method for performing blockchain-based product authentication analysis in accordance with another embodiment of the present invention;
fig. 5 is a block diagram of the terminal device according to the present invention.
The implementation, functional features and advantages of the present invention will be further described with reference to the accompanying drawings.
Detailed Description
The technical problems solved, the technical solutions adopted and the technical effects achieved by the embodiments of the present invention are clearly and completely described below with reference to the accompanying drawings and the specific embodiments. It should be apparent that the described embodiments are only a few embodiments of the present application, and not all embodiments. All other equivalent or obviously modified embodiments obtained by the person skilled in the art on the basis of the embodiments presented in the present application fall within the scope of protection of the invention without inventive step. The embodiments of the invention can be embodied in many different ways as defined and covered by the claims.
It should be noted that in the following description, numerous specific details are set forth in order to provide an understanding. It may be evident, however, that the present invention may be practiced without these specific details.
It should be noted that, without being explicitly defined or conflicting, the embodiments of the present invention and the technical features thereof may be combined with each other to form a technical solution.
Referring to fig. 1, fig. 1 is a block chain-based product authentication analysis method according to a first embodiment of the present invention. In this embodiment, the method comprises the steps of:
step S10, responding to the scanning operation of a user, reading verification code information and two-dimension code information of a product, wherein the verification code information is associated with first preset information of the product, and the two-dimension code information is associated with second preset information of the product;
in the embodiment of the invention, the two-dimension code information and the verification code information are linked into the block chain system, for example, the two-dimension code information corresponds to product information of a supplier, when a user scans the two-dimension code, the user can read the product information of the supplier when the scanning is successful, the product information of the supplier is input into the block chain system before the two-dimension code is generated, and the two-dimension code information is generated according to the information. Of course, the two-dimensional code information corresponds to not only the product information of the supplier, but also the linked corresponding information can be set before the two-dimensional code is generated according to the requirement.
The user adopts smart machine to scan the two-dimensional code and the identifying code information of the product, responds to the code scanning operation of the user, and reads the identifying code information and the two-dimensional code information of the product. The verification code information is associated with first preset information of the product, and the two-dimension code information is associated with second preset information of the product. In this embodiment, the first preset information includes an appearance geometric characteristic of the product, and the second preset information includes information of a production place, a production manufacturer, a generation time, and the like of the product. The intelligent device for scanning the product two-dimensional code can be an intelligent electronic device with a scanning function, such as a smart phone, a smart watch, a tablet computer and the like.
It should be noted that the verification code described in this embodiment is a "secret code," that is, the verification code may not be directly displayed on the surface of the product, but the user may scan a certain part of the product to scan the verification code information. The design is also adopted to further prevent other counterfeited product merchants from directly attaching the verification code to other counterfeited products. The intelligent device downloads and installs an application program which can be used for scanning the password to realize scanning verification, and the specific scanning and identifying method is not described herein.
In specific operation, a user firstly scans the verification code information to obtain information corresponding to the verification code, wherein the information comprises matching information matched with the two-dimensional code, appearance geometric information of a product and the like. And after the user scans the verification code and the intelligent equipment normally reads the verification code information, continuously scanning the two-dimensional code and reading the information corresponding to the two-dimensional code.
Step S20, verifying whether the verification code information is matched with the two-dimension code information;
specifically, the verification code information is a defense line for further guaranteeing authenticity verification of the product, so that the verification code information and the two-dimensional code information are subjected to relational matching at the beginning of generation. The relational matching can be that a check code which can enable the verification code and the two-dimensional code to be matched uniquely is generated on the verification code and the two-dimensional code. And after the verification code information and the two-dimension code information are read, further verifying whether the verification code information is matched with the two-dimension code information.
Step S30, when the verification code information is matched with the two-dimension code information, second preset information related to the product is obtained;
when the identifying code information is matched with the two-dimensional code information, the identifying code and the two-dimensional code which represent the product correspond to each other, then the second preset information corresponding to the two-dimensional code can be linked into at the moment, the production information of the product can be obtained in the embodiment, and when the information corresponding to the two-dimensional code is linked into smoothly after the identifying code and the two-dimensional code are scanned, the authenticity of the product can be ensured to a certain extent. This is because the verification code of the present embodiment is generated by the merchant according to some detailed feature of the appearance of the product.
Step S40, detecting whether the obtained second preset information meets a preset requirement;
and step S50, when the second preset information meets the preset requirement, confirming that the product is a genuine product.
And further, after second preset information corresponding to the two-dimensional code is read, whether the second preset information meets preset requirements is further detected, and the preset requirements can be that whether products corresponding to the second preset information are consistent with the product or not. And when the product corresponding to the second preset information is detected to be consistent with the product, confirming that the product is a genuine product. Certainly, the preset requirement may also be other means, such as detecting whether the second preset information includes verification information added when the two-dimensional code is generated, and the like; or the preset requirement is to check whether the comparison data between the production information and the link information of the product on the block chain exceeds a set value, and if the comparison data exceeds the set value, the product is determined to be a counterfeit product. Wherein, each link of circulation of product includes: the method comprises the following steps of production, transportation, total sales, retail and purchase, wherein link information is the information of the location and time of the product circulation to the link. The production information includes: the production location and production time of the product. And when the two-dimension code is matched with the verification code, displaying production information and link information of the product.
The method of the embodiment of the invention reads the verification code information and the two-dimension code information of the product by responding to the scanning operation of a user, wherein the verification code information is associated with the first preset information of the product, and the two-dimension code information is associated with the second preset information of the product; verifying whether the verification code information is matched with the two-dimension code information; when the verification code information is matched with the two-dimensional code information, second preset information related to the product is obtained; detecting whether the acquired second preset information meets a preset requirement or not; and when the second preset information meets the preset requirement, confirming that the product is a genuine product. The method of the embodiment of the invention aims to prevent other people from maliciously attaching the two-dimensional code of the real product to a fake product. The 'secret code' -verification code is set, the authenticity of the two-dimensional code is judged according to the combination of the verification code and the two-dimensional code, and production information and link information are provided according to the authenticity of the two-dimensional code, so that whether a consumer has counterfeit or a dealer judges whether a product has channel conflict.
Referring to fig. 2, in the first embodiment of the blockchain-based product authentication analysis method according to the present invention, and in the second embodiment of the blockchain-based product authentication analysis method according to the present invention, the generation method of the verification code information in step S10 is as follows:
step S11, acquiring first preset characteristic information of the product;
step S12, generating verification code information that can be used to verify the identity of the product according to a preset rule and the first preset feature information of the product.
In the embodiment of the invention, the first preset feature information comprises geometric feature information of a product, and pattern information or character information set by a manufacturer. The geometric characteristic information of the product is fixed information after the product is produced, and the pattern information or the text information set by the manufacturer can be the pattern or the text designed by the manufacturer and related to or unrelated to the product and used for identifying the verification code.
In this embodiment, the description is given by taking the first preset feature information as geometric feature information of a product as an example, specifically, the step S11 includes acquiring geometric feature information of a product;
step S12 includes generating verification code information that can be used to verify the identity of the product according to preset rules and the geometric feature information of the product.
The generation of the verification code is based on the geometric feature information of the product, and the verification code capable of being scanned and identified is generated according to the preset coding rule and the geometric feature information of the product.
Referring to fig. 3, in the first embodiment or the second embodiment of the blockchain-based product authentication analysis method according to the present invention, and in the third embodiment of the blockchain-based product authentication analysis method according to the present invention, after the step S12, the method further includes:
step S13, acquiring the generated verification code information and two-dimension code information;
and step S14, generating a matching relationship chain for matching the verification code information and the two-dimension code information according to the verification code information and the two-dimension code information.
In the embodiment of the invention, a relationship chain capable of matching the generated verification code and the two-dimensional code is generated between the verification code and the two-dimensional code, and the relationship chain can be displayed in various forms, for example, a unique matching code capable of matching the verification code and the two-dimensional code is generated between the verification code and the two-dimensional code, or a unique link is generated between the verification code and the two-dimensional code, so that the verification code can be linked to a block of the two-dimensional code after being scanned, and when the two-dimensional code is scanned, if verification code information linked to the block is detected, the surface verification code and the two-dimensional code are successfully matched. Of course, the relationship chain may also be another way that enables the verification code and the two-dimensional code to generate a matching relationship.
Referring to fig. 4, in the first to third embodiments of the blockchain-based product authentication analysis method according to the present invention, and in the fourth embodiment of the blockchain-based product authentication analysis method according to the present invention, after the step S11, the method further includes:
step S111, judging the integrity of the product according to the geometric characteristic information of the product
And step S112, when the product is judged to be in the damaged state, regenerating the verification code by using a preset repair algorithm.
Further, in this embodiment, in order to avoid that the information of the verification code obtained by scanning the product is blocked when the geometric features of the product are damaged, the verification code is regenerated by using a preset repair algorithm. Specifically, when a certain appearance feature of the product is scanned to identify the verification code, if it is detected that the scanned geometric feature is incomplete, that is, the geometric feature information of the product is damaged, the damage information of the product is analyzed, and the verification code is regenerated according to the damage information of the product so that when the geometric shape of the damaged portion is scanned again, the corresponding information can be directly identified.
According to the embodiment of the invention, the integrity of the product is judged according to the geometric characteristic information of the product, and the verification code is regenerated by using the preset repair algorithm when the product is judged to be in a damaged state.
In addition, when the product is judged to be in a damaged state according to the geometric characteristic information of the product, the damaged grade of the product is further judged, whether the damaged condition of the product is the condition that the verification code can be regenerated through a repair algorithm is judged according to the damaged grade, and if the damaged grade shows that the damaged condition of the product is serious and the new verification code cannot be regenerated under the damaged grade, repair is abandoned. And uploading the damaged information to a block chain system, analyzing and searching matching information of the product verification code and the corresponding two-dimensional code by the block chain system, matching the product verification code with the corresponding two-dimensional code according to the matching information, and adjusting the information linked in by the two-dimensional code. The adjustment of the specific two-dimensional code chaining-in information can be that when a user scans the two-dimensional code, the information that the product is a genuine product can be directly chained in and displayed, and certainly, other product information is not excluded, and only the situation that the product is a genuine product cannot be verified through the matching of the verification code and the two-dimensional code under the situation is prevented.
In a fifth embodiment of the blockchain-based product authentication analysis method according to the present invention, based on the first to fourth embodiments of the blockchain-based product authentication analysis method according to the present invention, the method further comprises:
s001, acquiring data of a user scanning the two-dimensional code and/or the verification code, and uploading the acquired data to a block chain system to analyze the data of the user; the data comprises information of a commodity circulation link and commodity intermediate circulation information, the commodity circulation link information comprises ex-warehouse information of a production manufacturer corresponding to the commodity, and the commodity intermediate circulation information comprises distributor information of the commodity, flowing state information of the commodity, receiving information and secondary forwarding information.
The method for analyzing the user data in step S001 includes:
step S001a, extracting keywords from the user data to set label words for the user;
and step S001b, matching the business demand information close to the user for the user according to the label words.
In the embodiment of the invention, the block chain system acquires the data of the user who scans the two-dimensional code and/or the verification code, namely the data of the user who scans the product verification code or the two-dimensional code through the intelligent equipment. The embodiment hopes to realize business analysis by collecting information of a user who scans a two-dimensional code or a verification code and collecting data of the user on a block chain, and the method is applied to business scenes, improves the matching degree between a commercial product and the user, and improves business information management.
Specifically, when data of a user scanning a two-dimensional code or a verification code is obtained, the data is uploaded to a block chain system, the data of the user is analyzed, tag words are set for the user by extracting keywords in the data of the user, for example, if the data of the user is collected to be 26 years old, office workers, women and hobby games, the tag words set by the user include office workers, women and game fans, and business information with high matching degree is screened for the user according to the tag words, for example, a certain electronic product or office supplies are recommended, and the like. Further, the obtained label words can be classified for management.
In another embodiment, the user who scans the product may also be a transportation person who transports the product, and the work information of the transportation person who transports the product at present is known by collecting the information of the transportation person who scans the two-dimensional code, so that the analysis and management are facilitated based on the information.
The method further comprises the following steps:
step S002, acquiring scanning record data of a user scanning the two-dimensional code and/or the verification code;
step S003, a preset scanning reward rule is obtained according to the scanning record data;
step S004, combining the scanning record data and the scanning reward rule to calculate reward matched with the scanning record data;
and S005, issuing the reward to an account corresponding to the scanned two-dimensional code and/or the verified user according to a preset path.
In view of the above-described collection of information about the user, the user may further be motivated to scan in a manner that encourages scanning by the user. Specifically, the reward rules can be set and displayed; acquiring scanning record data of a scanner; and issuing the reward according to the scanning record data and the reward rule.
The reward rule can be that a certain proportion of the profit of the commodity is used as reward-general evidence, and the reward is distributed to the scanned participants according to a certain proportion. The total amount of the awards may be limited, and the certificates awarded for the same uplink action may be different (e.g., decrease over time, etc.) for different users in each link, thereby ensuring that the value of the certificates does not decrease with unlimited distribution.
The reward rule can also be that each time scanning can obtain points, and accumulated points can obtain the reward of the material; the reward rule can also be that a scanning game is played, the game is a game with the culture characteristics of a selling company, and a scanner obtains the reward through the game, can also feel the culture of the company and invisibly increases the soft strength propaganda of the company. For example, the double-eleven and heaven cats rob the red envelope game, so that the consumer can invisibly know the heaven cat which is an animal image, and then the heaven cat shopping mall can be further known.
By adopting the reward mechanism method, the user is encouraged to scan the two-dimensional code and/or the verification code, more data of the commodity are uploaded to the block chain system, and the data volume of the commodity traceability and anti-counterfeiting is increased.
Fig. 5 is a schematic diagram of a terminal device according to an embodiment of the present invention. As shown in fig. 5, the embodiment/terminal device 6 includes: a processor 60, a memory 61 and a computer program 62, such as a blockchain based product authentication analysis program, stored in said memory 61 and executable on said processor 60.
The terminal device 6 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal 6 device may include, but is not limited to, a processor 60, a memory 61. Those skilled in the art will appreciate that fig. 5 is only an example of the terminal device 6, and does not constitute a limitation to the terminal device 6, and may include more or less components than those shown, or some components may be combined, or different components, for example, the terminal device 6 may further include an input-output device, a network access device, a bus, etc.
The Processor 60 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 61 may be an internal storage unit of the terminal device 6, such as a hard disk or a memory of the terminal device 6. The memory 61 may also be an external storage device of the terminal device 6, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the terminal device. Further, the memory 61 may also include both an internal storage unit and an external storage device of the terminal device 6. The memory 61 is used for storing the computer programs and other programs and data required by the terminal device. The memory 61 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. . Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (6)

1. A blockchain-based product authentication analysis method, comprising the steps of:
step S10, responding to the scanning operation of a user, reading the verification code information and the two-dimension code information of a product, wherein the verification code information is associated with the first preset information of the product, and the two-dimension code information is associated with the second preset information of the product;
step S20, verifying whether the verification code information is matched with the two-dimension code information;
step S30, when the verification code information is matched with the two-dimensional code information, second preset information related to the product is obtained;
step S40, detecting whether the acquired second preset information meets a preset requirement;
step S50, when the second preset information meets the preset requirement, confirming that the product is a genuine product;
the method for generating the verification code information in step S10 is as follows:
step S11, acquiring first preset characteristic information of a product;
step S12, generating verification code information which can be used for verifying the identity of the product according to a preset rule and by combining first preset characteristic information of the product;
the step S12 is followed by:
step S13, acquiring generated verification code information and two-dimensional code information;
step S14, generating a relationship chain for matching the verification code information and the two-dimension code information according to the verification code information and the two-dimension code information;
the first preset feature information is geometric feature information of a product;
the step S11 includes acquiring geometric feature information of the product;
step S12 includes generating verification code information for verifying the identity of the product according to the preset rule and the geometric feature information of the product;
the step S11 is followed by:
s111, judging the integrity of the product according to the geometric characteristic information of the product;
step S112, when the product is judged to be in a damaged state, regenerating the verification code by using a preset repair algorithm;
when the product is judged to be in a damaged state according to the geometric characteristic information of the product, further judging the damage level of the product, judging whether the damage condition of the product is in a condition that the verification code can be regenerated through a repair algorithm or not according to the damage level, and if the damage level indicates that the damage condition of the product is serious and judges that a new verification code cannot be regenerated under the damage level, giving up repair;
and uploading the damaged information to a block chain system, analyzing and searching matching information of the product verification code and the corresponding two-dimensional code by the block chain system, matching the product verification code with the corresponding two-dimensional code according to the matching information, and adjusting the information linked in by the two-dimensional code.
2. The blockchain-based product authentication analysis method of claim 1, further comprising:
step S001, data of a user scanning the two-dimensional code and/or the verification code is obtained, the obtained data are uploaded to a block chain system, and the data of the user are analyzed
The data comprises information of a commodity circulation link and commodity intermediate circulation information, the commodity circulation link information comprises ex-warehouse information of a production manufacturer corresponding to the commodity, and the commodity intermediate circulation information comprises distributor information of the commodity, flow state information of the commodity, receiving information and secondary forwarding information.
3. The blockchain-based product authentication analyzing method according to claim 2, wherein the analyzing of the user data in the step S001 includes:
step S001a, extracting keywords from the user data to set tag words for the user;
and step S001b, matching the business demand information close to the user for the user according to the label words.
4. The blockchain-based product authentication analysis method of claim 2, further comprising:
step S002, acquiring scanning record data of a user scanning the two-dimensional code and/or the verification code;
step S003, obtaining a preset scanning reward rule according to the scanning record data;
step S004, combining the scanning record data and the scanning reward rule to calculate the reward matched with the scanning record data;
and step S005, the rewards are issued to accounts corresponding to the scanned two-dimensional codes and/or the verified users according to a preset path.
5. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor realizes the steps of the method according to any of claims 1 to 4 when executing the computer program.
6. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 4.
CN201910184087.5A 2019-03-12 2019-03-12 Block chain-based product identification analysis method, terminal device and storage medium Active CN109949050B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910184087.5A CN109949050B (en) 2019-03-12 2019-03-12 Block chain-based product identification analysis method, terminal device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910184087.5A CN109949050B (en) 2019-03-12 2019-03-12 Block chain-based product identification analysis method, terminal device and storage medium

Publications (2)

Publication Number Publication Date
CN109949050A CN109949050A (en) 2019-06-28
CN109949050B true CN109949050B (en) 2022-07-15

Family

ID=67009574

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910184087.5A Active CN109949050B (en) 2019-03-12 2019-03-12 Block chain-based product identification analysis method, terminal device and storage medium

Country Status (1)

Country Link
CN (1) CN109949050B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111541676B (en) * 2020-04-17 2022-10-28 卓尔智联(武汉)研究院有限公司 Data processing method and device
CN112508515A (en) * 2020-12-04 2021-03-16 武汉矽感科技有限公司 Electronic insurance policy generation method, system, storage medium and equipment based on identification code
CN117094736A (en) * 2023-08-09 2023-11-21 云海链控股股份有限公司 Product authentication method, device, equipment and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN107220836A (en) * 2017-05-31 2017-09-29 无锡井通网络科技有限公司 A kind of block chain logistics based on Quick Response Code is traced to the source tracking method for anti-counterfeit
CN107679877A (en) * 2017-10-18 2018-02-09 上海唯链信息科技有限公司 A kind of cosmetics based on block chain technology are false proof and traceability system
CN108416590A (en) * 2018-04-08 2018-08-17 程昔恩 A kind of block chain technical certification method based on topography
CN108665288A (en) * 2018-05-11 2018-10-16 中国联合网络通信集团有限公司 The method of checking article genuine-fake and the system of checking article genuine-fake

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030229811A1 (en) * 2001-10-31 2003-12-11 Cross Match Technologies, Inc. Method that provides multi-tiered authorization and identification
EP2325829A1 (en) * 2009-11-18 2011-05-25 KPSS Kao Professional Salon Services GmbH Label, packaging, use of an adhesive label and method of providing a test sample
CN108422938B (en) * 2018-03-30 2024-04-05 斑马网络技术有限公司 Vehicle with sensing device and application
CN109359716A (en) * 2018-10-12 2019-02-19 北京印刷学院 The dimension code anti-counterfeit method of invalid code stuffing digit image complementation identification

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN107220836A (en) * 2017-05-31 2017-09-29 无锡井通网络科技有限公司 A kind of block chain logistics based on Quick Response Code is traced to the source tracking method for anti-counterfeit
CN107679877A (en) * 2017-10-18 2018-02-09 上海唯链信息科技有限公司 A kind of cosmetics based on block chain technology are false proof and traceability system
CN108416590A (en) * 2018-04-08 2018-08-17 程昔恩 A kind of block chain technical certification method based on topography
CN108665288A (en) * 2018-05-11 2018-10-16 中国联合网络通信集团有限公司 The method of checking article genuine-fake and the system of checking article genuine-fake

Also Published As

Publication number Publication date
CN109949050A (en) 2019-06-28

Similar Documents

Publication Publication Date Title
CN109949050B (en) Block chain-based product identification analysis method, terminal device and storage medium
CN107358350A (en) A kind of third party's intelligence trademark anti-fake certificate cloud service system
CN111950673B (en) Commodity anti-counterfeiting verification method, device and equipment based on two-dimensional code and storage medium
US9619807B2 (en) Genuine product certification means and system
TWI632514B (en) Digital transaction method,user device,service provider device and digital transaction management server system
CN107169777B (en) Overlay code anti-counterfeiting method and system applying same
CN109949058A (en) Antifake method for products, device, electronic equipment and read/write memory medium
CN111461743A (en) NFC-based block chain Pu' er tea anti-counterfeiting tracing implementation method
CN105471889A (en) Combined dual-certification method and system for circulation retracing and authenticity certification of commodity
CN105469260A (en) Product anti-counterfeiting and anti-bugselling method and system
CN110503441A (en) A kind of ceramic texture fingerprint characteristic authentication method and system based on cloud platform
CN108806075A (en) The shipment control method and device of machine for vending, storage medium
CN108960820A (en) A kind of real name identification method based on block chain, system and storage medium
CN111159458A (en) Agricultural product image processing and block chain interactive identification method and system
CN110942320A (en) Full-process tracking type anti-counterfeiting system and method
CN107609883B (en) Anti-counterfeiting verification sharing system and verification method
CN114782059A (en) Electronic commerce platform for metauniverse decentralization based on block chain
CN111831941B (en) Two-dimensional code identification method and device, storage medium and electronic device
CN110992139B (en) Bidding price realizing method and related product
CN110738489A (en) Two-dimensional code payment anti-theft method and system, storage medium and terminal
CN110162957B (en) Authentication method and device for intelligent equipment, storage medium and electronic device
KR102210448B1 (en) Method, apparatus and computer program for providing ownership registration and counterfeit judgment service for product using blockchain
CN109003097A (en) A kind of antifake method for products
CN109033807A (en) A kind of Product Experience auth method and system based on member authentication
KR20110100801A (en) System and method for recognizing authenticity uisng label

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20190719

Address after: Room 202, 2nd floor, F1 Building, Yuanjun Shuyuan International Media Industry Park, No. 8 Gaojing Cultural Park Road, Chaoyang District, Beijing

Applicant after: Puhua Yunchuang Technology (Beijing) Co.,Ltd.

Address before: 100038 No. 141, Gate 1, 3rd Floor, No. 14 Fuxing Road, Haidian District, Beijing

Applicant before: Zhai Hongying

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220624

Address after: 524005 Room 301, third floor, No. 8 Longping South Road, Zhanjiang Development Zone, Guangdong Province

Applicant after: GUANGDONG HENGLI INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 100123 Room 202, 2 / F, building F1, Dongyi International Media Industrial Park, No.8, Gaojing Cultural Park Road, Chaoyang District, Beijing

Applicant before: Puhua Yunchuang Technology (Beijing) Co.,Ltd.

GR01 Patent grant
GR01 Patent grant