CN110223091A - A kind of traceability anti-fake system and its method - Google Patents

A kind of traceability anti-fake system and its method Download PDF

Info

Publication number
CN110223091A
CN110223091A CN201910532610.9A CN201910532610A CN110223091A CN 110223091 A CN110223091 A CN 110223091A CN 201910532610 A CN201910532610 A CN 201910532610A CN 110223091 A CN110223091 A CN 110223091A
Authority
CN
China
Prior art keywords
code
source
tracing
product
coding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910532610.9A
Other languages
Chinese (zh)
Inventor
宋华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SICHUAN 5F SCIENCE & TECHNOLOGY Co Ltd
Original Assignee
SICHUAN 5F SCIENCE & TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SICHUAN 5F SCIENCE & TECHNOLOGY Co Ltd filed Critical SICHUAN 5F SCIENCE & TECHNOLOGY Co Ltd
Priority to CN201910532610.9A priority Critical patent/CN110223091A/en
Publication of CN110223091A publication Critical patent/CN110223091A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The purpose of the present invention is to provide a kind of traceability anti-fake system and its methods, its encoding setting multilayer proofing that can trace to the source product false proof, increase the traceable safety and anti-forgery security of product, to guarantee product using safe, the traceability anti-fake system includes: that coding generates management assembly, validity period is assigned for generating trace to the source code and identifying code, and to code of tracing to the source;One corresponding identifying code of code of tracing to the source;Authorization management component is encoded, for the validity period authorization to code of tracing to the source;Only it can otherwise be encoded authorization management component by user query by the code of tracing to the source of authorization and be generated the first warning information and be sent to user;Anti-counterfeiting information management assembly, the number being queried for counting each code of tracing to the source;When user query number is more than preset times, anti-counterfeiting information management assembly generates the second warning information and is sent to user;User query component, for obtaining identifying code according to code of tracing to the source;For verifying the authenticity of product information by comparison code.

Description

A kind of traceability anti-fake system and its method
Technical field
The present invention relates to product false proof fields, in particular to a kind of traceability anti-fake system and its method.
Background technique
The frequency of the Special Agriculture Product quality safety event as caused by pesticide residue, illegal additive, fake and inferior product etc. in recent years How numerous generation ensures food safety, it has also become extremely urgent problems.China is a large agricultural country, agricultural production quality Amount safety problem is even more to be related to the big problem of national health.In recent years, in order to solve agricultural product quality and safety, in addition to improving food Product safety legislation is reinforced except supervision, and most effective measures are to realize can be traced for food.The traceable essence of agricultural product be for Agricultural product establish digital identity ID, are equivalent to the digital ID card of agricultural product, this agricultural product digital identity ID are based on, in conjunction with meter Calculation machine software management system records the information of the links such as agricultural cultivation process, production and processing, logistics transportation, sale, consumption Person obtains the archive information of tracing to the source of agricultural product by inquiry this identity ID, thus realize the quality safety of agricultural product, agricultural product The code of tracing to the source of agricultural product would generally be converted into two dimensional code by the code of tracing to the source of identity ID i.e. agricultural product, inquiry for the convenience of the user Bar code form, user need to only be scanned the two-dimensional code with mobile phone can easily realize agricultural product trace to the source anti-counterfeiting information inquiry.
But agricultural product yard generating mode of tracing to the source mainly has one yard of two ways of a product one yard and an object at present.One product one A yard generating mode of tracing to the source for code, which refers to, generates a code of tracing to the source for each category, and the product of all minimum packages of the category is all Anti-fake trace to the source is carried out using the same code of tracing to the source, it is clear that the mode anti-counterfeit capability of a product one yard is poor, and what is be replicated and decode can Energy property is very big, as long as illegal businessman obtains this coding of tracing to the source and can be carried out batch duplicating, manufactures counterfeit and shoddy goods.
Yard generating mode of tracing to the source of one one yard of object, which refers to, generates a code of tracing to the source for the minimum package of each Special Agriculture Product, The coding for guaranteeing the commodity of each minimum package according to special algorithm is uniquely, can to enhance coding of tracing to the source by batch duplicating Difficulty, the phenomenon that further preventing product to be palmed off in batches.
Although enhancing coding of tracing to the source to a certain extent by batch duplicating using one yard of an an object yard generating mode of tracing to the source Difficulty, but if the generating algorithm for code of tracing to the source is fairly simple, data are not encrypted, while being carried out without identifying code secondary Verifying, as long as criminal decodes the generating algorithm for code of tracing to the source, so that it may it is a large amount of to generate code of tracing to the source, manufacture counterfeit and shoddy goods. No inquiry times limitation is encoded if traced to the source simultaneously, also that repeatedly inquiry is not reminded, as long as criminal has decoded one A coding of tracing to the source can also replicate several identical codings of tracing to the source, and fake products offer can be also manufactured to criminal to be taken advantage of Machine.
It therefore, is complete using a yard generating mode of tracing to the source for a product one yard in the application of the quality tracing of Special Agriculture Product It is not able to satisfy the anti-fake requirement of product.Using one yard of yard generating mode of tracing to the source of a simple object, if the generating algorithm of coding Not by encryption, secondary verifying also is carried out without identifying code, and there is no limit repeatedly inquire to the inquiry times for code of tracing to the source User is not reminded, is equally that cannot effectively realize the anti-fake of product traceability code.
Summary of the invention
The purpose of the present invention is to provide a kind of traceability anti-fake system and its methods, and can trace to the source to product false proof coding Multilayer proofing is set, the traceable safety and anti-forgery security of product are increased, thus guarantee product using safe, maintenance disappears The person's of expense equity.
The embodiment of the present invention is achieved in that
A kind of traceability anti-fake system, the traceability anti-fake system include:
Coding generates management assembly, assigns validity period for generating trace to the source code and identifying code, and to code of tracing to the source;One is traced to the source The corresponding identifying code of code;
Authorization management component is encoded, for the validity period authorization to code of tracing to the source;Code of tracing to the source only by authorization can By user query, otherwise encodes authorization management component and generate the first warning information and be sent to user;
Anti-counterfeiting information management assembly, the number being queried for counting each code of tracing to the source;User query number is more than default When number, anti-counterfeiting information management assembly generates the second warning information and is sent to user;
User query component, for obtaining identifying code according to code of tracing to the source;For verifying product information by comparison code Authenticity.
In the preferred embodiment, above-mentioned coding generation management assembly includes:
Product coding management module, for generating product coding;Each product corresponds to unique Product coding, and product coding has A numbers;
It traces to the source serial number generation module, for generating product traceability serial number, product traceability serial number has b numbers;
CRC8 encrypted code generation module, for generating the first encrypted code and the second encrypted code, the first encrypted code and second add Password has c numbers and d numbers respectively;
Identifying code generation module, for generating random verification code, random verification code has e numbers;
Die-filling piece of code character of tracing to the source, for product coding, product traceability serial number and the first encrypted code to be combined into code of tracing to the source;
Identifying code assembles module, for the second encrypted code and random verification code to be combined into identifying code.
In the preferred embodiment, above-mentioned CRC8 encrypted code generation module be also used to verify trace to the source code the 1st to X position verification and and 1 to Y of identifying code verification and, X=a+b+c-3;Y=d+e-3;The result of verification sum is done For the encrypted bits of trace to the source code and identifying code.
In the preferred embodiment, above-mentioned identifying code generation module uses pseudo random number algorithm, pseudo-random algorithm The time of current traceability anti-fake system is intercepted as initial value seed, pseudo-random number sequence is generated by linear congruential method.
In the preferred embodiment, it in above-mentioned coding authorization management component, after request is more than validity period, traces to the source Code automatically restores to unauthorized state.
In the preferred embodiment, above-mentioned user query component includes human-computer interaction part, trace to the source code and identifying code By print code of tracing to the source in the outer packing for being perhaps pasted onto product be converted into can by graphic code that human-computer interaction part identifies or Digital code is coated with secrecy coating in the one at least in trace to the source code and identifying code.
It traces to the source method for anti-counterfeit the present invention also provides one kind, this method comprises the following steps:
Step 1: making and uploading product information to traceability anti-fake system, the coding in traceability anti-fake system generates management Component according to product information generation trace to the source code and with the one-to-one identifying code of code of tracing to the source;Authorization management component is encoded to code of tracing to the source It is authorized;The inquiry times of anti-counterfeiting information management assembly counting user;User query component is for obtaining identifying code, Yong Hutong Cross the authenticity that comparison code verifies product information;
Step 2: user, which scrapes secrecy coating off, obtains trace to the source code and identifying code, and code of tracing to the source is scanned using human-computer interaction part Anti-counterfeiting information is obtained, if there is anti-fake risk, traceability anti-fake system generates warning information and prompts user;If without anti-fake risk, user Whether consistent check identifying code;If identifying code is consistent, product is there is no risk is counterfeited, if identifying code is inconsistent, there are quilts The risk of personation.
In the preferred embodiment, above-mentioned anti-fake risk includes tracing to the source a yard unauthorized, code of tracing to the source not in validity period Interior, yard inquiry times of tracing to the source are greater than preset value.
In the preferred embodiment, the operating procedure of above-mentioned anti-counterfeiting information includes: tracing back on scanning input product Source code, traceability anti-fake system reception are traced to the source code, and whether coding authorization management component judgement code of tracing to the source is authorized to, if being authorized to, Coding authorization management component continues whether before the deadline judgement traces to the source code, if tracing to the source code before the deadline, code of tracing to the source is transferred to Anti-counterfeiting information management assembly;Yard unauthorized or code is traced to the source not before the deadline if tracing to the source, and traceability anti-fake system is by information warning It is transferred to user query component.
In the preferred embodiment, above-mentioned anti-counterfeiting information management assembly includes following operating procedure: anti-counterfeiting information The code of tracing to the source after coding authorization management component passes through is received, the inquiry times in anti-counterfeiting information management assembly are cumulative, if inquiry time Number is greater than 1, then warning result is sent to user query component;If inquiry times obtain identifying code less than 1.
The beneficial effect of the embodiment of the present invention is: the present invention uses one yard of code generating method of tracing to the source of an object, and code of tracing to the source is adopted Encrypted with CRC8 checksum algorithm, increase the difficulty that yard generating algorithm of tracing to the source is decrypted, it is established that code of tracing to the source it is anti-fake The first line of defence.Since the code of tracing to the source of each minimum package of product is that uniquely, which also can be used as production Product identify coding in the ERP system of manufacturing enterprise, JXC System identity ID, avoid carrying out weight in different systems for product Multiple coding, can simplify enterprise digital management process, raise the management level.
2. the present invention carries out the secondary verifying of product false proof using identifying code, each corresponding identifying code of code of tracing to the source, When consumer inquires anti-counterfeiting information by code of tracing to the source, an identifying code can be returned to from system, consumer is by checking the identifying code It is whether consistent, to judge the authenticity of product information, it is established that the anti-fake second defence line for code of tracing to the source, even if the generation for code of tracing to the source Algorithm is decrypted, and can also carry out second anti-counterfeiting verifying by identifying code, greatly improve the anti-counterfeiting performance of product.
3. the number that the present invention is queried by record and accumulative code of tracing to the source, as long as code of tracing to the source is to be queried for the second time, i.e., Consumer's product is reminded to have anti-fake risk, it is established that the anti-fake three lines of defence for code of tracing to the source.
4. the mode of user query overscanning of the present invention, without being manually entered code of tracing to the source, identifying code is carried out using coating Covering, user only need to scrape off coating, and whether what comparison system returned trace to the source code and the code of tracing to the source for scraping coating off are consistent, nothing It must carry out any operation being manually entered.
5. a yard authorization of tracing to the source of the invention has a validity period, manufacturer can life cycle according to product, quality guarantee The features such as phase free device authorization validity period, only authorized code of tracing to the source could be traced to the source inquiry, and illegal businessman time is prevented Receive the production that product packaging carries out fake products.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the composition schematic diagram of the traceability anti-fake system of the embodiment of the present invention;
Fig. 2 is that the coding of the embodiment of the present invention generates the composition schematic diagram of management assembly;
Fig. 3 is each field meanings schematic diagram of code of tracing to the source of the embodiment of the present invention;
Fig. 4 is each field meanings schematic diagram of identifying code of the embodiment of the present invention;
Fig. 5 is the coding authorization management component operational flowchart of the embodiment of the present invention;
Fig. 6 is the anti-counterfeiting information management assembly operational flowchart of the embodiment of the present invention;
Fig. 7 is the user query component operational flowchart of the embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.The present invention being usually described and illustrated herein in the accompanying drawings is implemented The component of example can be arranged and be designed with a variety of different configurations.
Therefore, the detailed description of the embodiment of the present invention provided in the accompanying drawings is not intended to limit below claimed The scope of the present invention, but be merely representative of selected embodiment of the invention.Based on the embodiments of the present invention, this field is common Technical staff's every other embodiment obtained without creative efforts belongs to the model that the present invention protects It encloses.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.
In the description of the present invention, it should be noted that term " center ", "upper", "lower", "left", "right", "vertical", The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" is to be based on the orientation or positional relationship shown in the drawings, or be somebody's turn to do Invention product using when the orientation or positional relationship usually put, be merely for convenience of description of the present invention and simplification of the description, without It is that the device of indication or suggestion meaning or element must have a particular orientation, be constructed and operated in a specific orientation, therefore not It can be interpreted as limitation of the present invention.In addition, term " first ", " second ", " third " etc. are only used for distinguishing description, and cannot manage Solution is indication or suggestion relative importance.
In addition, the terms such as term "horizontal", "vertical", " pendency " are not offered as requiring component abswolute level or pendency, and It is that can be slightly tilted.It is not to indicate the structure if "horizontal" only refers to that its direction is more horizontal with respect to for "vertical" It has to fully horizontally, but can be slightly tilted.
In the description of the present invention, it is also necessary to which explanation is unless specifically defined or limited otherwise, term " setting ", " installation ", " connected ", " connection " shall be understood in a broad sense, for example, it may be fixedly connected, may be a detachable connection or one Connect to body;It can be mechanical connection, be also possible to be electrically connected;It can be directly connected, it can also be indirect by intermediary It is connected, can be the connection inside two elements.For the ordinary skill in the art, on being understood with concrete condition State the concrete meaning of term in the present invention.
First embodiment
In the present embodiment by taking agricultural product as an example, trace to the source the volume of tracing to the source of agricultural product in application system for current Special Agriculture Product Code generate and method for anti-counterfeit there are the problem of, propose a kind of to carry out endowed one yard of code of tracing to the source of an object based on agricultural product minimum package Generation method provides a kind of traceability anti-fake system and method for anti-counterfeit of tracing to the source.
It traces to the source being encrypted using CRC8 checksum algorithm of code, to increase the difficulty that yard generating algorithm of tracing to the source is decrypted, Set up the anti-fake the first line of defence for code of tracing to the source.Each corresponding identifying code of code of tracing to the source, consumer pass through code of tracing to the source simultaneously Inquiry trace to the source anti-counterfeiting information when, can from system return an identifying code, consumer by check the identifying code it is whether consistent, to sentence The authenticity of disconnected product information, it is established that the anti-fake second defence line for code of tracing to the source.When the code of tracing to the source of each agricultural product is searched, System can all record the time of inquiry, calculate it is accumulative be queried number, and consumer is fed back to, as long as code of tracing to the source is the Secondary to be queried, i.e. prompting consumer's product has anti-fake risk, it is established that the anti-fake three lines of defence for code of tracing to the source.Each traces back Source code requires just to can be used by system authorization, and the authorization for code of tracing to the source has validity period attribute, and manufacturer can The features such as according to the life cycle of product, quality guarantee period free device authorization validity period, only by authorization and effective Code of tracing to the source in phase could be traced to the source inquiry, effectively prevent illegal businessman to recycle the production that product packaging carries out fake products, built Erect the anti-fake four lines of defense for code of tracing to the source.
Referring to Figure 1, the present embodiment provides a kind of traceability anti-fake system, which includes:
Coding generates management assembly, assigns validity period for generating trace to the source code and identifying code, and to code of tracing to the source;One is traced to the source The corresponding identifying code of code;Coding in the present embodiment generates management assembly and mainly completes 13 trace to the source code and 7 identifying codes Generation, encryption and assembling;
Authorization management component is encoded, for the validity period authorization to code of tracing to the source;Code of tracing to the source only by authorization can By user query, otherwise encodes authorization management component and generate the first warning information and be sent to user;Volume in the present embodiment Code authorization management component is mainly completed to be authorized to code is traced to the source according to preset validity period, only awards by coding authorized component The code of tracing to the source of power can be inquired by nest, can just return to anti-fake warning information;
Anti-counterfeiting information management assembly, the number being queried for counting each code of tracing to the source;User query number is more than default When number, anti-counterfeiting information management assembly generates the second warning information and is sent to user;Anti-counterfeiting information management in the present embodiment Component, which is mainly responsible for, counts each code of tracing to the source by the number of user query, and generates early warning letter to the coding being repeatedly queried Breath prompts consumer;
User query component, for obtaining identifying code according to code of tracing to the source;For verifying product information by comparison code Authenticity, user query component in the present embodiment mainly realizes that obtaining the anti-fake of the corresponding product by code of tracing to the source tests Code is demonstrate,proved, for there is the coding of early warning risk that can then obtain warning information automatically.
Fig. 2 is referred to, generates management assembly for coding.Coding generates management assembly and includes product coding management module, traces back Source serial number generation module, identifying code generation module, CRC8 check code generation module, die-filling piece of code character of tracing to the source, identifying code assembling Module.In the present embodiment, coding generate management assembly mainly complete the generations of 13 trace to the source code and 7 identifying codes, encryption and Assembling.Product coding management module is responsible for distributing the product traced to the source one unique coding, product coding length position 4 Position, range can at most manage 9999 kinds of agricultural product from 0000---9999.Serial number generation module of tracing to the source is responsible for according to difference The actual demand of product of tracing to the source generates the coding continuous product traceability serial number of serial number, range 000000---999999, every kind of production 999999 serial numbers of tracing to the source at most can be generated in product.Identifying code generation module is responsible for generating one-to-one with serial number of tracing to the source Four random verification codes, the algorithm of random verification code are a kind of pseudo random number algorithms, are done by intercepting current present system time Pseudo-random number sequence is generated by being calculated with linear congruential method for initial value seed.CRC8 check code generation module is responsible for calculating code of tracing to the source The 1st to 11 bit checks and, calculate random verification code the 1st to 4 bit checks and, verify the result of sum and code and tested as tracing to the source The encrypted bits of code are demonstrate,proved, it is hexadecimal 0x00---0xFF that the result of CRC8 checksum algorithm, which is range, i.e., metric 00- 255, so 3 bit digital of length position of CRC8 encrypted bits.Die-filling piece of code character of tracing to the source is responsible for 4 product codings, 6 serial numbers of tracing to the source Code, 3 CRC8 encrypted codes are assembled into complete 13 code of tracing to the source, 4 random verification codes and 3 CRC8 encrypted code assemblings At complete 7 identifying code.
Fig. 3 is referred to, the number that code is 13 length generated of tracing to the source of product coding management module in the present embodiment, The definition of each field can be set to the reference encoder mode such as Fig. 3, and first four are product number, range from 0000-9999, A unique product number is distributed for each product.5th to the tenth be product traceability code serial number, range from 000000—999999.11st to the 13rd is the CRC8 verification of top ten number and encrypted bits.
Fig. 4 is referred to, product coding management module identifying code generated in the present embodiment is the number of 7 bit lengths Word, the definition of each field can be set to the reference encoder mode such as Fig. 4, first four 4 generated at random for software systems with Machine code, latter three are the CRC8 verification of preceding 4-digit number and encrypted bits.
Fig. 5 is referred to, coding authorization management component in the present embodiment, the component is mainly completed to award code of tracing to the source Power, only could be by user query by the code of tracing to the source of authorization and authorization within validity period, the authorization of each code of tracing to the source Authorization validity period can be set, and after being more than validity period, the state for code of tracing to the source can automatically restore to unauthorized state.Work as user When inquiring product traceability archive information by code of tracing to the source, code of tracing to the source can be transferred to coding authorized component progress licensing status first and sentence Break, the process judged notifies anti-fake warning module record to look into as shown in figure 5, if the state of authorization code is licensing status Number is ask, anti-fake prompt information of tracing to the source is returned.If code of tracing to the source is unauthorized state, the state is directly returned into user query Component directly prompts user's code that should trace to the source uncommitted, cannot be queried.
Fig. 6 is referred to, the anti-counterfeiting information management assembly in the present embodiment, the component is responsible for counting that each has authorized traces back Source code generates warning information by the number of user query, and to the code of tracing to the source repeatedly being queried, and returns to user query component, mentions Show consumer.Fake certification code is returned to if the code of tracing to the source is to be queried for the first time, while return information is given without anti-fake risk Consumer.It judges and process flow is as shown in Figure 6.
Fig. 7 is referred to, the user query component in the present embodiment, the component is that the terminals such as compatible mobile phone, tablet computer are set Standby human-computer interaction component, tracing to the source code and the printing of fake certification code and is pasted above the outer packing of agricultural product, wherein coding of tracing to the source Be converted into can by the terminals such as mobile phone, tablet computer scan two dimensional code, and using coating be covered in one third two dimensional code and Whole identifying codes guarantees that the inquiry of tracing to the source of the first time of agricultural product is inquired by consumer, so needing before consumption inquiry First scrape coating off, consumer can inquire anti-counterfeiting information and acquisition identifying code by scanning the two dimensional code that code is converted of tracing to the source, such as If the identifying code that fruit obtains is consistent with the identifying code of the figure layer scraped off, then the product is traced to the source without anti-fake risk.User looks into Ask the query steps and process such as Fig. 7 of component.
In conclusion the present invention uses and carries out one yard endowed of an object based on agricultural product minimum package and trace to the source code generation side Method, being encrypted using CRC8 checksum algorithm for code of tracing to the source, increases the difficulty that yard generating algorithm of tracing to the source is decrypted, it is established that It traces to the source the anti-fake the first line of defence of code.Since the code of tracing to the source of each minimum package of product is unique, the volume of tracing to the source Code also can be used as product and identify coding in the ERP system of manufacturing enterprise, JXC System identity ID, avoid in different systems Repeated encoding is carried out for product, enterprise digital management process can be simplified, raised the management level.
Meanwhile the present invention carries out the secondary verifying of product false proof using identifying code, the corresponding verifying of each code of tracing to the source Code when consumer inquires anti-counterfeiting information by code of tracing to the source, can return to an identifying code, consumer is by checking the verifying from system Whether code is consistent, to judge the authenticity of product information, it is established that the anti-fake second defence line for code of tracing to the source, even if the life for code of tracing to the source It is decrypted at algorithm, second anti-counterfeiting verifying can also be carried out by identifying code, greatly improve the anti-counterfeiting performance of product.
Meanwhile the number that the present invention is queried by record and accumulative code of tracing to the source, as long as code of tracing to the source is to be queried for the second time, Consumer's product is reminded to have anti-fake risk, it is established that the anti-fake three lines of defence for code of tracing to the source.
Meanwhile the used mode scanned the two-dimensional code of user query of the present invention, without being manually entered code of tracing to the source, identifying code is used Coating is covered, and user only needs to scrape off coating, what comparison system returned trace to the source code with scrape off coating trace to the source code whether one Cause, without any operation being manually entered of progress.
Meanwhile a yard authorization of tracing to the source of the invention has a validity period, manufacturer can life cycle, matter according to product The features such as duration of insurance free device authorization validity period, only authorized code of tracing to the source could be traced to the source inquiry, and illegal businessman is prevented Recycle the production that product packaging carries out fake products.
Finally, of the invention trace to the source yard generating mode and method for anti-counterfeit, are not only applicable to the anti-fake of Special Agriculture Product, for Food, industrial product, the consumer goods etc. are equally applicable.
Present specification describes the example of the embodiment of the present invention, it is not meant to that these embodiments illustrate and describe this All possible forms of invention.It should be understood that the embodiment in specification can be implemented with a variety of alternative forms.Attached drawing is without in proportion It draws;Some features can be zoomed in or out to show the details of particular elements.Disclosed specific structure and function details should not Make limited interpretation, only those skilled in the art is instructed to implement representative basis of the invention in a variety of forms.In the art It should be understood to the one skilled in the art that the multiple features illustrated and described with reference to either figure can with said in one or more of the other attached drawing Bright feature combination is to form the embodiment for not yet explicitly illustrating or describing.The assemblage characteristic of explanation provides the generation for being used for typical case Table embodiment.It is answered however, can according to need with the multiple combinations of the consistent feature of the teachings of the present invention and modification for specific With or implement.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of traceability anti-fake system, which is characterized in that the traceability anti-fake system includes:
Coding generates management assembly, assigns validity period for generating trace to the source code and identifying code, and to the code of tracing to the source;Described in one Code of tracing to the source corresponds to an identifying code;
Authorization management component is encoded, for the validity period authorization to the code of tracing to the source;Only code is traced to the source just by the described of authorization Can be by user query, otherwise the coding authorization management component generates the first warning information and is sent to user;
Anti-counterfeiting information management assembly, the number being queried for counting each code of tracing to the source;User query number is more than default When number, the anti-counterfeiting information management assembly generates the second warning information and is sent to user;User query component, for according to institute It states code of tracing to the source and obtains the identifying code;For verifying the authenticity of product information by comparing the identifying code.
2. traceability anti-fake system according to claim 1, which is characterized in that the coding generates management assembly and includes:
Product coding management module, for generating product coding;The corresponding unique product coding of each product, the product are compiled Code has a numbers;
It traces to the source serial number generation module, for generating product traceability serial number, the product traceability serial number has b numbers;
CRC8 encrypted code generation module, for generating the first encrypted code and the second encrypted code, first encrypted code and described the Two encrypted codes have c numbers and d numbers respectively;
Identifying code generation module, for generating random verification code, the random verification code has e numbers;Die-filling piece of code character of tracing to the source, For the product coding, the product traceability serial number and first encrypted code to be combined into the code of tracing to the source;
Identifying code assembles module, for second encrypted code and the random verification code to be combined into the identifying code.
3. traceability anti-fake system according to claim 2, which is characterized in that the CRC8 encrypted code generation module is also used to Trace to the source described in verification code the 1st to X position verification and and 1 to Y of the identifying code verification and, X=a+b+c- 3;Y=d+e-3;Encrypted bits of the result of the verification sum as the trace to the source code and the identifying code.
4. traceability anti-fake system according to claim 1, which is characterized in that the identifying code generation module uses pseudorandom Method is figured, the pseudo-random algorithm intercepts the time of presently described traceability anti-fake system as initial value seed, passes through linear congruence Method generates pseudo-random number sequence.
5. traceability anti-fake system according to claim 1, which is characterized in that in the coding authorization management component, when asking It asks more than after the validity period, the code of tracing to the source automatically restores to unauthorized state.
6. traceability anti-fake system according to claim 1, which is characterized in that the user query component includes human-computer interaction Part, trace to the source code and the identifying code are by printing or are pasted onto the outer packing of product, and the code of tracing to the source is converted into energy The graphic code identified by the human-computer interaction part or digital code are reached, it is at least one of in the trace to the source code and the identifying code Secrecy coating is coated on person.
The method for anti-counterfeit 7. one kind is traced to the source, which is characterized in that described method includes following steps:
Step 1: making and uploading product information to traceability anti-fake system, the coding in the traceability anti-fake system generates management Component according to the product information generation trace to the source code and with the one-to-one identifying code of code of tracing to the source;The coding empowerment management Component authorizes code of tracing to the source;The inquiry times of the anti-counterfeiting information management assembly counting user;The user query component For obtaining identifying code, user verifies the authenticity of product information by comparing the identifying code;
Step 2: user, which scrapes secrecy coating off, obtains trace to the source code and identifying code, and use code of tracing to the source described in the scanning of human-computer interaction part Anti-counterfeiting information is obtained, if there is anti-fake risk, the traceability anti-fake system generates warning information and prompts user;If without anti-fake risk, Whether user checks identifying code consistent;If identifying code is consistent, product, if identifying code is inconsistent, is deposited there is no risk is counterfeited In the risk being counterfeited.
8. method for anti-counterfeit according to claim 7 of tracing to the source, which is characterized in that the anti-fake risk traces to the source code not including described Authorization, it is described trace to the source code not before the deadline, yard inquiry times of tracing to the source are greater than preset value.
9. method for anti-counterfeit according to claim 7 of tracing to the source, which is characterized in that the operating procedure of the anti-counterfeiting information includes: The code of tracing to the source on scanning input product, the traceability anti-fake system receive described in trace to the source code, the coding empowerment management group Whether code of tracing to the source described in part judgement is authorized to, if being authorized to, the coding authorization management component continues code of tracing to the source described in judgement Before the deadline whether, if described trace to the source code before the deadline, the code of tracing to the source is transferred to the anti-counterfeiting information management assembly;If Described trace to the source or traces to the source code not before the deadline at yard unauthorized, and information warning is transferred to the use by the traceability anti-fake system Family enquiring component.
10. method for anti-counterfeit according to claim 7 of tracing to the source, which is characterized in that the anti-counterfeiting information management assembly includes such as Lower operating procedure: the anti-counterfeiting information receives the code of tracing to the source after the coding authorization management component passes through, the anti-fake letter The inquiry times ceased in management assembly are cumulative, if the inquiry times are greater than 1, warning result is sent to the user query Component;If the inquiry times obtain identifying code less than 1.
CN201910532610.9A 2019-06-19 2019-06-19 A kind of traceability anti-fake system and its method Pending CN110223091A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910532610.9A CN110223091A (en) 2019-06-19 2019-06-19 A kind of traceability anti-fake system and its method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910532610.9A CN110223091A (en) 2019-06-19 2019-06-19 A kind of traceability anti-fake system and its method

Publications (1)

Publication Number Publication Date
CN110223091A true CN110223091A (en) 2019-09-10

Family

ID=67813951

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910532610.9A Pending CN110223091A (en) 2019-06-19 2019-06-19 A kind of traceability anti-fake system and its method

Country Status (1)

Country Link
CN (1) CN110223091A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581541A (en) * 2020-05-13 2020-08-25 成都信息工程大学 Agricultural product traceability information query method and system
CN111698220A (en) * 2020-05-20 2020-09-22 厦门区块链云科技有限公司 Block chain anti-counterfeiting traceability verification system
CN112001630A (en) * 2020-08-24 2020-11-27 中国建材检验认证集团股份有限公司 Product quality monitoring method and device
CN112487834A (en) * 2020-12-23 2021-03-12 智锐达仪器科技南通有限公司 Livestock carcass skin traceability code spray printing method, ink jet printer, traceability code and server
CN112800313A (en) * 2021-01-25 2021-05-14 吉林省吉科软信息技术有限公司 Intelligent information tracing system based on cloud platform
CN112001630B (en) * 2020-08-24 2024-05-31 中国建材检验认证集团股份有限公司 Product quality monitoring method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7516128B2 (en) * 2006-11-14 2009-04-07 International Business Machines Corporation Method for cleansing sequence-based data at query time
CN101500018A (en) * 2008-02-03 2009-08-05 张元梅 Method for digital information false proof
CN103729770A (en) * 2013-12-26 2014-04-16 重庆文理学院 Novel anti-fake traceability system and method
CN104252677A (en) * 2014-06-27 2014-12-31 北京信祥源科技有限公司 Two-dimension code anti-counterfeiting technology and two-dimension code anti-counterfeiting system-based platform system
CN106548353A (en) * 2016-09-30 2017-03-29 昆明理工大学 A kind of commodity counterfeit prevention code is generated and verification method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7516128B2 (en) * 2006-11-14 2009-04-07 International Business Machines Corporation Method for cleansing sequence-based data at query time
CN101500018A (en) * 2008-02-03 2009-08-05 张元梅 Method for digital information false proof
CN103729770A (en) * 2013-12-26 2014-04-16 重庆文理学院 Novel anti-fake traceability system and method
CN104252677A (en) * 2014-06-27 2014-12-31 北京信祥源科技有限公司 Two-dimension code anti-counterfeiting technology and two-dimension code anti-counterfeiting system-based platform system
CN106548353A (en) * 2016-09-30 2017-03-29 昆明理工大学 A kind of commodity counterfeit prevention code is generated and verification method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581541A (en) * 2020-05-13 2020-08-25 成都信息工程大学 Agricultural product traceability information query method and system
CN111698220A (en) * 2020-05-20 2020-09-22 厦门区块链云科技有限公司 Block chain anti-counterfeiting traceability verification system
CN112001630A (en) * 2020-08-24 2020-11-27 中国建材检验认证集团股份有限公司 Product quality monitoring method and device
CN112001630B (en) * 2020-08-24 2024-05-31 中国建材检验认证集团股份有限公司 Product quality monitoring method and device
CN112487834A (en) * 2020-12-23 2021-03-12 智锐达仪器科技南通有限公司 Livestock carcass skin traceability code spray printing method, ink jet printer, traceability code and server
CN112800313A (en) * 2021-01-25 2021-05-14 吉林省吉科软信息技术有限公司 Intelligent information tracing system based on cloud platform

Similar Documents

Publication Publication Date Title
CN110223091A (en) A kind of traceability anti-fake system and its method
US9619706B2 (en) Security scheme for authenticating object origins
Cheung et al. Implementation issues in RFID-based anti-counterfeiting systems
US20180350180A1 (en) Computerized voting system
CN103077467B (en) A kind of method and system verifying authenticity of products
CN107909372A (en) A kind of agricultural product source tracing method based on block chain technology
CN103093365B (en) The method and system of checking authenticity of products
CN109190736B (en) Anti-counterfeiting two-dimensional code and generation method and generation application system thereof
CN104392260A (en) Two-dimensional code anti-counterfeiting method based on additional information
CN104992335A (en) Full-circulation type two-dimensional code anti-counterfeiting system and realization method thereof
CN104424579B (en) Anti-counterfeiting tracing management system
CN104574122A (en) Two-dimensional code anti-counterfeit and random product packaging goods-fleeing preventing method
CN104091267A (en) Tracking anti-counterfeiting method based on two-dimension code and tracking anti-counterfeiting system
CN112712310A (en) Key piece management and control system and method and electronic equipment
CN107918873A (en) Item authentication plateform system and item authentication management system
CN108154207B (en) Anti-counterfeiting unique code generation and anti-counterfeiting verification method
CA3038506A1 (en) Computerized voting system
CN102110270A (en) Genuine-supportive fake-resistant rewarding and marketing system
US20230353353A1 (en) Anti-counterfeiting System and Method of Use
CN110083784A (en) Data processing method and device, server
CN110322255A (en) A kind of verification method and device of product quality
CN104408499A (en) Product anti-counterfeiting system
CN110689356A (en) Method for recording commodity circulation process by using nested digital twin
CN101789051B (en) Calculating anti-counterfeiting method
KR101591020B1 (en) Standard garbage bag AND System for Preventing standard garbage bag from forgery using Production time

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190910