Goods false proof method and system based on Internet safety lock

A security lock and Internet technology, applied in computer security devices, commerce, instruments, etc., can solve problems such as the lack of commodity anti-counterfeiting systems

Inactive Publication Date: 2017-07-11
李建魁
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Recently, the Internet security lock has developed rapidly and has been applied in some fiel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Goods false proof method and system based on Internet safety lock
  • Goods false proof method and system based on Internet safety lock
  • Goods false proof method and system based on Internet safety lock

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0049] see figure 1 , the embodiment of the present invention provides a first embodiment of an Internet security lock-based commodity anti-counterfeiting method, including:

[0050] 101. Generate a corresponding security lock code by uniformly coding Internet security locks, and write the information of the corresponding locked product in the security lock code. Security locks include physical anti-counterfeiting locks, card anti-counterfeiting locks, and virtual anti-counterfeiting locks. The information on locked products includes Commodity code and commodity code-related information, commodity traceability code and commodity traceability code-related information, commodity-specific anti-counterfeiting information;

[0051] In the embodiment of the present invention, it is first necessary to uniformly encode the Internet security lock to generate a corresponding security lock code, and write the information of the corresponding locked product in the security lock code. The ...

no. 2 example

[0059] see figure 2 , the embodiment of the present invention provides a second embodiment of an Internet security lock-based commodity anti-counterfeiting method, including:

[0060] 201. Obtaining information on several commodities through the user management system, commodity resource management system, commodity traceability system, and commodity anti-counterfeiting information system, and correcting the accuracy of the information on several commodities by obtaining the national Internet of Things logo;

[0061] In the embodiment of the present invention, it is first necessary to obtain the information of several commodities through the user management system, commodity resource management system, commodity traceability system, and commodity anti-counterfeiting information system, and correct the accuracy of the information of several commodities by obtaining the national Internet of Things logo to ensure The product information written in the security lock code is accur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention discloses a commodity anti-counterfeiting method and system based on an Internet security lock. By uniformly encoding the Internet security lock and writing the locked commodity information into the security lock code, the user can verify the identity of the commodity through the security lock. Information to identify the authenticity of the goods, so as to achieve anti-counterfeiting. The method in the embodiment of the present invention includes: generating a corresponding security lock code by uniformly encoding the Internet security lock, and writing information corresponding to locked commodities in the security lock code, the security lock includes a physical anti-counterfeiting lock, a card anti-counterfeiting lock, Virtual anti-counterfeiting lock, the information of the locked commodity includes commodity code and commodity code associated information, commodity traceability code and commodity traceable code associated information, commodity specific anti-counterfeiting information; generating the first opening method corresponding to each entity anti-counterfeiting lock code ; Generate an anti-counterfeit card corresponding to each of the card anti-counterfeit lock codes; generate a second opening method corresponding to each of the virtual anti-counterfeit lock codes.

Description

technical field [0001] The invention relates to the field of commodity anti-counterfeiting, in particular to a commodity anti-counterfeiting method and system based on an Internet security lock. Background technique [0002] In the market economy and commercial society, counterfeit and shoddy goods are repeatedly banned, and the anti-counterfeiting of goods (including: articles, commodities, products) to ensure their authenticity and credibility has great social and market demand. [0003] With the rapid development of information technology, information management, and information engineering, especially in recent years, technologies and applications such as cloud computing, Internet of Things, mobile Internet, big data, GIS, artificial intelligence, Internet +, virtual reality, and sharing economy have emerged continuously. Internet security lock came into being. The Internet security lock is a lock that people can open and lock related resources and items through the Int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q30/00G06F21/62
CPCG06Q30/018G06F21/6218
Inventor 李建魁李逸天
Owner 李建魁
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products