[0008] 1. A single code is easy to be forged. The
common method of forgery is to use one real code to
forge multiple ones. This method is easy to be identified, but because consumers lack the
habit of verifying the authenticity, or lack the network environment to verify before
purchasing. The real operation is often exploited by the counterfeiters in a short period of time
[0009] 2. It can be judged whether the product is used by judging whether the film is damaged or not. However, for products placed in public areas such as supermarkets, the film may be maliciously damaged, causing direct losses to the merchant. Counterfeiting by means of lamination, so it is impossible to truly eliminate counterfeit goods
[0010] 3. Since the anti-counterfeiting code composed of a single number set needs to be based on a certain digital standard and
algorithm to generate the unique mark of the product, as long as the generated
algorithm is cracked, the counterfeiter can fake it without showing any traces. In particular, most of the current anti-counterfeiting codes are
plaintext records or simple universal
encryption. As long as there is a certain batch of anti-counterfeiting data samples, it is possible to crack the algorithm.
[0011] 4. In the process of commodity circulation, there may also be cases of malicious code scanning. If the judgment rules in the background
system are too strict, the genuine product may be judged as counterfeit. If it is not strict enough, the goal of authenticity judgment may not be achieved at all. As a result, many anti-counterfeiting platforms currently on the market can only provide the authenticity of the anti-counterfeiting digital string and the
record of the scanned code, but cannot effectively distinguish the authenticity of the product
[0012] 5. Due to the lack of a pre-sale verification mechanism in the circulation of commodities, many consumers scan the codes of the commodities out of
curiosity, resulting in the anti-counterfeit codes being scanned multiple times after the commodities are sold. Information prompt that the anti-counterfeiting code has expired
[0013] 6. The production process of using combined codes is very complicated and lacks universality. It can only be used for specific industries or packaging methods. It requires special coding equipment and
software systems, and must be completely embedded in the production and packaging of products to form combined codes. One-to-one relationship; therefore, it will inevitably increase production costs and require continuous investment, which directly affects the enthusiasm of enterprises for brand building
[0014] 7. It is very inconvenient to use the combination code. It is necessary to obtain the code inside the
package after opening the
package to determine the authenticity. Consumers must verify the authenticity after purchase. However, because the outer
package has been damaged, merchants often Excuse on the grounds that the product has been used or the package has been damaged, which makes it difficult for consumers to protect their rights
[0017] 10. The existing technical solutions for the authenticity identification method of bulk commodities cannot be solved
[0018] 11. It is impossible to identify the authenticity in the absence of the network, and only return to the area with the network to scan the code after purchase, so that time and space have changed, which will lead to difficulties in counterfeit rights protection
[0019] 12. There is a lack of a pre-sale verification method, which will not affect the sales of the product, but also allow consumers to understand the situation and authenticity of the product before buying
[0020] The main reason is that there are limitations in the consideration of the application environment, the consideration of the encoding method, the consideration of the
data model, the consideration of the core algorithm and the consideration of the judgment standard.