Method for checking authenticity of goods and services

文档序号:1409744 发布日期:2020-03-06 浏览:6次 中文

阅读说明:本技术 用于检查商品和服务的真伪的方法 (Method for checking authenticity of goods and services ) 是由 A·V·伊科诺莫夫 于 2018-05-11 设计创作,主要内容包括:本发明涉及一种用于检查商品或服务的真伪的方法,其中,一个生命周期被划分成多个阶段,生成新的独特跟踪码,并且每个跟踪码与所有商品和服务的集成数据库中的信息相关联。根据本发明,生成一列表的用户访问参数,并且将集成数据库划分成与不同用户访问参数相对应的多个区域,其中,用户已经定义了对每个区域的访问权限。针对每个用户,生成与该用户的访问参数相对应的用户识别码。为了将数据传输到集成数据库中,需要检查用户识别码。在对应的事件中,允许用户访问。所获得的技术结果是为具有各种访问权限的用户提供了限制对所有商品和服务的集成数据库的访问的可能性。(The invention relates to a method for checking the authenticity of goods or services, wherein a life cycle is divided into a plurality of phases, new unique tracking codes are generated, and each tracking code is associated with information in an integrated database of all goods and services. According to the invention, a list of user access parameters is generated and the integrated database is divided into a plurality of regions corresponding to different user access parameters, wherein the user has defined access rights to each region. For each user, a user identification code corresponding to the access parameter of that user is generated. In order to transfer the data into the integrated database, the user identification code needs to be checked. In the corresponding event, the user is allowed access. The technical result obtained is that users with various access rights are provided with the possibility to restrict access to an integrated database of all goods and services.)

1. A method for checking the authenticity of goods and services, wherein:

dividing the life cycle of the goods or services into a plurality of phases;

generating a unique tracking code at a first stage of the lifecycle;

the code is applied to the goods or used to mark documents corresponding to the services;

each such unique tracking code is associated with information in an integrated database of all of the goods and services, such database including data relating to parameters of the goods or services at the first stage of the life cycle;

generating a new unique tracking code at each subsequent stage of the life cycle, the code being applied to the good or used to mark the document corresponding to the service;

each such tracking code is associated with information in the integrated database of all of the goods and services, such database including data relating to parameters of the goods or services at each subsequent stage of the life cycle and at all previous stages;

the buyer of the goods or the user of the service is granted access to the integrated database of all goods and services, wherein the buyer of the goods or the user of the service sends a unique tracking code scanned by means of a personal client device to a remote server, and then a signal corresponding to verified information related to the goods or services is sent back to the personal client device of the buyer of the goods or the user of the service,

it is characterized in that the preparation method is characterized in that,

generating a list of user access parameters, such access parameters matching various access rights to said integrated database of all of said goods and services;

dividing the integrated database of all the goods and services into regions corresponding to different user access parameters, wherein a user has defined access rights to each of the regions;

generating, for each user of the integrated database of all goods and services, a user identification code corresponding to an access parameter of the user, the code also being registered in the integrated database of all goods and services;

checking the user identification code for transmission of data into the integration database or during a request to the integration database;

in the event that the submitted user identification code is consistent with the code registered with the integrated database for all goods and services, allowing the user to access an area corresponding to the user's access rights; if the codes do not match, access is not granted.

2. The method of claim 1, wherein the subscriber identity code is generated as a graphical code.

3. The method of claim 1, wherein information related to the user is recorded in the integrated database of all goods and services using blockchain technology.

4. The method of claim 1, wherein regions of the integrated database of all goods and services are generated to be embedded in each other.

5. The method of claim 1, wherein a unique sales code for the good or service is generated that, when scanned by the user client device, activates automatic crediting of the buyer account for revenue of a seller account.

6. The method of claim 1, wherein a unique tracking code is generated for a group of goods or services, which allows a single unique tracking code to be generated for a group of goods or services when the group of goods or services are bound together.

Technical Field

The present invention relates to a method for checking the authenticity of goods or services, wherein the life cycle of goods and services is divided into a number of stages, a new unique tracking code is generated at each stage of the life cycle, said code being applied to said goods or for marking documents corresponding to the services, and each such tracking code is associated with information in an integrated database of all goods and services, such database comprising data relating to parameters of the goods or services in each subsequent and all previous stages of the life cycle, and being located on a remote server.

The description uses the following terms and definitions:

server-an electronic device that performs service functions upon request of a client by providing access to specific resources. For the purposes of this description, the server is permanently connected to a unified network that is capable of transmitting data from the client device to the server. The server may process the data and transmit the results of the processing back to the client device.

The unified network, and all connections between all modules and units, includes a variety of topologies, configurations, and arrangements of interconnected network connection components that are established to connect enterprise, global, and local computing networks, including, but not limited to, traditional wired networks, wireless, satellite, optical, and equivalent network solutions. Preferably, the internet is commonly used as such a unified network.

Personal user device — any type of computing platform that can connect to a network (e.g., a unified network) and allow interaction with an application. Typical examples of personal client devices include, but are not limited to, desktop and mobile personal computers, "smart" cell phones (or smartphones), portable computers (including tablet computers), lightweight clients, workstations, non-smart terminals connected to application servers, and different arrangements and configurations of the same device, i.e., as physical devices designed to interact within a communication system, and as virtual devices implemented on programmable computer devices and having program interfaces for facilitating communication functions. Examples of such devices are preferably smart phones with touch screens (smart cell phones, or cell phones comprising computer device functionality), or tablet PCs and similar devices, such as smart watches, glasses, etc. Such devices are often portable or wearable to enable a user to carry them around.

The life cycle of goods and services is a series of stages within the lifespan of the goods or services, from creation, processing, until sale or provision of the services to the end consumer, including transportation, storage, maintenance, and possible transfer of ownership.

The unique tracking code (pass for goods or services) is an alphanumeric or graphic or similar code, such as a bar code, two-dimensional code, which can act as a message readable by the electronic device and containing the unique code associated with the information of the goods or services. For example, such information may include: date of manufacture, composition, manufacturer, seller, or price.

The user identification code is an alphanumeric or graphic or similar code, such as a bar code, two-dimensional code, which may serve as a message readable by the electronic device and containing a unique code associated with the individual. Such as full name, date of birth, personal ID or other identification data, gender, household registration, position, title or position, status, access level, etc.

A blockchain (or transaction blockchain) is a blockchain formed from transaction data that is constructed according to predefined rules and stored in a distributed database.

Payment means-any means for payment, e.g., monetary account, virtual currency, etc.

Background

Counterfeit goods are a very pressing problem today. A method of preventing counterfeiting comprises applying a scannable code to an article, such code containing information relating to the article (or service), including manufacturer data, date of manufacture, etc. However, a real problem is that these data are not updated or visualized after the transfer of ownership of the good, a change of state, or another stage of the manufacturing cycle.

There is no systematic government approach to controlling and deterring counterfeiting. Most people have difficulty distinguishing genuine goods from counterfeit goods. The quality of counterfeit goods is increasing year by year. Counterfeiters are increasingly moving from high-end goods to mass-market goods with a high demand. There is a long chain of brokers and intermediaries between the buyer and the manufacturer. It is not possible to know the true source of any item on the store shelf.

These problems have been solved by existing solutions.

Disclosure of Invention

The present invention relies on this novel observation, the main object of which is to provide a method for checking the authenticity of goods or services, which at least alleviates one of the aforementioned drawbacks, i.e. to provide the possibility of restricting access to an integrated database for users having various access rights, said object being the technical object of the present invention as claimed.

For this purpose, the method comprises further phases in which:

generating a list of user access parameters, such access parameters matching various access rights to the integrated database of all goods and services;

the integrated database of all goods and services is divided into areas corresponding to different user access parameters, wherein the user has defined access rights to each of the areas;

-generating, for each user of the integrated database of all goods and services, a user identification code corresponding to the access parameter of said user, said code also being registered in the integrated database of all goods and services;

checking the user identification code for the transmission of data into the integration database or during a request to the integration database;

in the event that the submitted user identification code coincides with a code registered with the integrated database of all goods and services, allowing the user to access an area corresponding to the user's access rights; if the codes do not match, access is not granted.

These useful features make it possible to assign a status or access level to the integrated database data to each user, and thus a user identification code can be generated, which code can then be processed automatically, and the user can obtain access only to the area corresponding to his/her access rights based on the result of the code processing. The remaining data is not visible to the user so that he/she cannot add or edit information.

One version of the invention includes user identification code generation as a graphical code.

This useful feature makes it possible to automatically identify the access level of any user. The identification code data may be read automatically using a personal client device.

One version of the present invention includes the use of blockchain technology to record information about users in an integrated database of all goods and services.

This useful feature makes it possible to eliminate the possibility of altering or forging such information. Protection of goods or services has been achieved in this solution, but the weakness is user authorization. This is why it is proposed to encrypt the user authorisation data.

One version of the invention includes the generation of regions of an integrated database of all goods and services, which are embedded within each other.

This useful functionality makes it possible to employ a pyramidal, hierarchical data access scheme in which a user with a minimum access level accesses a minimum area of an integrated database of all goods and services, a user with a next access level can access data available to the user with the minimum access level plus additional data, and so on. There is also all data in the integrated database that the user can access for all goods and services. In essence, this is the highest government control authority.

One version of the invention includes the generation of a unique sales code for a good or service that, when scanned by a user client device, activates automatic crediting (credit) of a buyer account for revenue of a seller account.

This useful feature makes it possible to generate a graphical code which, when scanned by the user client device, activates automatic crediting of the buyer's account for the benefit of the seller's account, which serves to make payment more convenient and to check the authenticity of goods or services using payment information.

Finally, one version of the present invention includes the generation of a unique tracking code for a group of goods or services that allows a single unique tracking code to be generated for a group of goods or services when the group of goods or services are bundled together.

This useful feature makes it possible to check the authenticity of an entire group of goods or services in a single action.

The combination of the essential features of the claimed invention is not known from the prior art of similar processes, and therefore the invention possesses the required novel features associated with this process. The solutions are not obvious and the task is significant and unsolved, and therefore, the solutions described above are not obvious to those skilled in the art and the present invention has the desirable features of the inventive step.

Drawings

Other significant features and advantages of the invention will be readily apparent from the following description, including but not limited to the following, with reference to the accompanying drawings:

figure 1 represents the life cycle of a good or service according to the prior art based on the claimed method.

Figure 2 shows a functional diagram of the authenticity check of goods or services according to the invention based on the proposed method.

Figure 3 represents a diagram showing the stages of the method for checking the authenticity of a good or service according to the invention.

According to fig. 1, the life cycle of a good or service (see arrow marked with t) is divided into a number of phases. At the first stage of the life cycle, a unique tracking code 11 is generated, which is applied to the goods or used to mark documents corresponding to the service.

Each such tracking code 11 is (in a first phase) associated with information in an integrated database 2 of all goods and services, such integrated database comprising data relating to parameters of goods or services at a first phase of the life cycle.

The database 2 is located on a remote server or on a plurality of servers (distributed database).

A new unique tracking code 12, 13, 14 … is generated at each subsequent stage of the life cycle and applied to the goods or used to mark documents corresponding to the service.

Each new unique tracking code is associated with information in an integrated database 2 of all goods and services, such database including data relating to parameters of goods or services at each subsequent stage and at all previous stages of the life cycle.

The buyer 31 of the goods (or the user of the service) is granted access to the integrated database 2 of all goods and services, wherein the buyer of the goods or the user of the service will send the unique tracking code 11, 12, 13 … scanned by means of the personal client device 41 to a remote server or servers, following which a signal corresponding to verified information relating to the goods or services is sent back to the personal client device 41 of the user of the goods or services.

A list of user access parameters is generated that match various access rights to the integrated database of all goods and services.

The integrated database 2 of all goods and services is divided into 21, 22, 23, 24 … corresponding to different user access parameters, where the user has defined access rights to each area therein, see fig. 2.

For each user 31 of the integrated database 2 of all goods and services, a user identification code 51 corresponding to the access parameter of the user is generated, which is also registered in the integrated database 2 of all goods and services. (fig. 2 also shows another user 32 with a code 52, etc.).

The subscriber identity 51 is checked for the transmission of data into the integration database 2 or during a request to the integration database 2.

In the event that the submitted user identification code is consistent with a code registered with an integrated database of all goods and services, allowing the user to access an area corresponding to the user's access authority; if the codes do not match, access is not granted.

Fig. 1 and 2 show how a user identification code is generated as a graphic code.

Generally, all information (related to the user and related to goods and services) can be recorded in an integrated database of all goods and services using blockchain techniques, and thus is tamper-resistant.

In particular, the areas 21, 22, 23, 24 … in the integrated database of all goods and services may be generated to be embedded in each other to form access levels in order.

Another unique feature of this invention is the possibility of generating a unique sales code for a good or service that, when scanned by a user client device, activates the automatic crediting of a buyer account for the revenue of a seller account. Importantly, the fact of payment can be used as proof of authenticity for the goods during a subsequent authenticity check. In other words, the possibility of payment is not only a convenient option for the buyer, but also another way of checking authenticity, since payment is an additional authentication channel, which may be requested from the clearing company (mainly a bank) if necessary.

Furthermore, this unique sales code for a good or service may be used not only by the buyer, but also at any stage of the life cycle of the good or service where payment is an option, for example, between the manufacturer, supplier or raw material, or intermediary and assembler of the finished product.

Detailed Description

The method for checking the authenticity of goods or services works as follows. The most exhaustive and non-limiting examples are provided.

According to FIG. 3:

stage a 1. At each stage of manufacture of a good or service, a unique tracking code for the good or service (product ID) is generated as a two-dimensional code or other graphical code (or another similar method based on identification that can generate physically visible information scannable by a computing device such as a mobile device).

Stage a 2. Each manufacturer of goods and services is registered with a remote server (or servers) that includes an integrated database of all goods and services. A label or user identification code (here a manufacturer identification code) is assigned to the manufacturer. At the same time, the manufacturer may also have a user identification code for purchasing raw materials and components for manufacturing goods and services, or for verification, or as an individual buyer's purpose.

Stage a 3. At each stage of the goods or services lifecycle (e.g., at each stage of the production chain, after each stage is over), the process owner, having its own user identification code, receives the product. Meanwhile, such a process owner scans a unique tracking code (ID) of goods or services during reception, performs his/her partial work, and creates a new ID using his/her mobile device or a dedicated terminal specifying work data and an end date after completion. These data are uploaded to a remote server and recorded in an integrated database for all goods and services.

Stage a 4. The new unique tracking code (ID) is printed and attached or applied to the goods or documents/specifications of the service using a dedicated device (e.g., a laser).

Stage a 5. The next process owner downstream then scans for a new tracking code corresponding to the action "received" (specifying the date of reception), performs his/her work, and upon completion generates a new unique tracking code (corresponding to the "done" operation) that is based on the previous code and that includes all the information contained in the previous unique tracking code and specifies the required parameters and date. The code is then printed and attached to the obtained product.

Stage a 6. The previous steps are repeated until the goods are completed. Each scan made during receipt or completion means that the information is uploaded to and received from a remote server hosting an integrated database of all goods and services.

For example, the employee responsible for the packaging scans the unique tracking code of the received item (which corresponds to the "receive" action) and packages the item. Thereafter, another unique tracking code is generated and applied to the goods/documents.

Stage a 7. The purchaser may then scan the unique tracking code for the goods or services using the mobile device. In this case, it may mean "complete" action, since all relevant parameters and dates are specified during the generation of each unique tracking code or during each scan.

If the unique tracking code is scanned by the buyer and not by other manufacturers, the buyer, after scanning the goods and delivery order (the invoice which includes all relevant information for the purchase, such as price), can create a new unique sales code corresponding to the invoice appended to the buyer's bank account.

The buyer scans the unique sales code of the goods or services and sends it to his/her bank so that the required amount can be withdrawn. The bank may issue a notification to the buyer to verify the transaction (confirmed via encryption or signature, retinal scan, or code entry) and then batch the money to the seller. This operation may be repeated multiple times, and the buyer may then act as the seller.

Stage A8. If the goods must be packaged in a large package, an integrated database of all goods and services may combine the goods during scanning, which corresponds to a "receive, quantity and date verified" action, and a unique tracking code may be generated for a group of goods or services after the goods are packaged in one large package. The code is applied to the package, e.g., to a tray, which corresponds to a "done" action.

The package is then received by the next user, e.g., a loader, inspector, or warehouse manager. He/she loads it on the vehicle, generates a new unique tracking code for a group of goods or services to cover all products, prints out the new unique tracking code for a group of goods or services, and attaches it to the door of a truck or other vehicle, for example.

The driver or carrier scans a new unique tracking code for a group of goods or services to their device, which corresponds to a "received" action. The process of receiving, transporting, reselling, and storing of goods/services may be repeated multiple times if no storage time is provided in the data sheet, contract, or specification according to the laws or contractual provisions of the relevant country. When the storage period expires or the services are no longer relevant, the information in the integrated database of all goods and services on the remote server will have a flag showing that the goods/services have expired. When the unique tracking code of such goods/services is scanned, this information is visible to the customer on the screen of the client device.

Stage a 9. At any stage in the life cycle of the goods or services, or at any stage in the production chain, the goods or services may be controlled by any authorized user, such as production inspectors, border controllers, customs personnel, insiders, other law enforcement and special purpose government departments and institutes personnel who are authorized to perform the inspection and control. Each control person has its own user identification code which is checked each time he/she accesses the integrated database. That is, during each inspection, a unique tracking code (with a designated scan date and time) is scanned, then the control personnel performs the inspection and generates a new unique tracking code that is printed out together with the previous unique tracking code (main product ID) and attached to the carrier's automobile door or a suitable merchandise, or in the factory or storage warehouse if the merchandise is a single merchandise. These operations continue to repeat down the production chain, where each control personnel scans the primary unique tracking code, prints it out, and appends it alongside the code from the previous inspection and the primary unique tracking code. Depending on the scope of the authorization, the control personnel will have access to all available information about the goods or services.

Various users have access to various areas of the integrated database of all goods and services. The individual buyer may have access to the most basic and relevant information about the goods, or manufacturer, date of manufacture, materials, previous owners, repair or service data, etc., with dates attached.

A user with the identity of a tax agency may act as a controlling person who accesses the relevant area of the integrated database for all goods and services. However, he/she may also act as an individual buyer.

The higher the access level, the more files are available in the application. Access depends on the registry.

Some information may be automatically transmitted to the tax department or other federal agency if desired.

Special services, special goods or special factories may be encrypted and moved to the restricted access portion of the integrated database of all goods and services, for example, they may be stored on a separate server or have additional encryption protection.

A dedicated contactless reader may be used to read a unique tracking code, for example in the form of a QR code. Which is convenient for the buyer and further payment for goods or services.

Previously recorded information cannot be canceled. It is only possible to cancel the information entered after scanning and before registration in the integrated database of all goods and services, i.e. before the graphic code is printed out. Modifying the information before registration in the integrated database of all goods and services is only possible if the time frame of the changes is set in advance, however, these changes do not cover the information but appear as additional information on the previous information so that all the information entered by the user will be visible. The change cannot be applied after a new buyer or user (shipper or storage operator) receives the goods/services.

As the merchandise is returned, a new unique tracking code is generated at each stage by the person responsible for receipt. The information includes the fact of the return, the date and reason of the return. A new unique tracking code is then generated for the returned item, including the previous unique tracking code, the date of the return item, and the reason for the return item, or a unique recycle code is generated.

If the process is sensitive for commercial or military reasons, the manufacturer may additionally encrypt the process, with the contractor's consent. This is because each stage is encrypted. This process is only visible to personnel represented or authorized by the manufacturer.

A sequence of multiple stages is provided as an example. Individual stages can be switched, deleted, added, or executed simultaneously without affecting the possibility of performing authenticity checks on goods/services. This means that any particular set of stages can be performed simultaneously, separately, or in any combination.

Example 1

A bill in a restaurant with a QR code that, when scanned, gives the following information:

-all information related to the food ordered;

-place and time of purchase, manufacturing, and manufacturing process;

-how to pay for the restaurant service by means of a bank card bound to the mobile device or using another account.

Example 2.

A merchandise purchased at a store with a QR code that, when scanned, gives the following information:

all information related to the customer, e.g. the order of the life cycle, or alternatively the order of payment transactions, storage, transportation, etc.,

-how to pay for the goods by means of a bank card bound to the mobile device or using another account.

Example 3.

A user who is a customs officer inspects the merchandise and generates a unique code to mark the customs cleared merchandise. When scanned, the code shows that the item has been cleared by customs, the name of the customs officer, the time of the clearance, and other relevant information.

Example 4.

The access level may be measured from 1 to 10, the higher the value, the higher the access level to the goods and services information. The individual user (buyer) has an access level of 1 and can only see basic information. He/she downloads the application and registers it in the integrated database of all goods and services with his/her official ID or scanned information like documents. A user identification code is generated to link the system to the client device. When the application is activated, the client device activates the user identification code and indicia. When the user is identified, the database displays the relevant information.

Each organization and company may create its own user profile. Database administrators use cryptographic systems to provide access to administrators of these institutions and companies so that they can use the cryptographic systems themselves to authorize access to employees. Employees download the application to create their own user identification with a tag. If the client device is lost, the employee or other user must report and register again, and a new user identification code with a corresponding access level will be generated.

Industrial applicability.

The claimed method for checking the authenticity of goods or services can be practically implemented by a person skilled in the art and ensures that the claimed object is met after implementation, which leads to the conclusion that the invention meets the requirements of "industrial applicability".

According to the claimed invention, a prototype system for checking the authenticity of goods or services is made, i.e. a server configured to support the processing of all relevant data is tested.

The trial run of the prototype shows that it can perform the following functions:

-automatically assigning user rights by the level of access to the integrated database;

-automatically checking the user access parameter with the user identification code;

-paying for the goods or services by scanning the unique sales code of the goods or services with the client device in order to facilitate automatic buyer account crediting by the seller.

The present invention is therefore directed towards achieving the technical result described above, i.e. providing the possibility to limit the access to an integrated database of all goods and services for users with various access rights.

Another useful technical result of the present invention is:

the method makes it possible to register and control the manufacturing process of goods/services at each stage of the lifecycle, from initial manufacturing until final sale, which includes identifying all changes, i.e. services or repairs, of the owner and applications, if the goods have no expiration date;

the method makes it possible to eliminate counterfeiting to know the origin of the goods from the date of manufacture. If the goods are stolen, the goods will appear in the integrated database of all goods and services as required;

government control rights will have more accurate data relating to counterfeit goods to prevent them from entering the market and provide certified transaction IDs to the service agencies, which is not possible at present. The QR code associated with each service transaction will be stored on the mobile device to facilitate payment.

12页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:终端设备中的消息处理

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!