Anti-counterfeiting verification method, device, system, mobile terminal and server

文档序号:192294 发布日期:2021-11-02 浏览:33次 中文

阅读说明:本技术 防伪验证方法、装置、系统、移动终端以及服务器 (Anti-counterfeiting verification method, device, system, mobile terminal and server ) 是由 罗培钦 于 2021-07-12 设计创作,主要内容包括:本申请实施例公开了一种防伪验证方法、装置、系统、移动终端、服务器及存储介质。所述方法包括:获取目标设备的第一防伪验证信息,其中,所述第一防伪验证信息至少包括所述目标设备的第一设备标识,所述第一防伪验证信息通过所述目标设备获得;若所述第一防伪验证信息中缺少所述目标设备的第二设备标识,获取第二防伪验证信息,其中,所述第二防伪验证信息通过所述移动终端的输入接口获得;将所述第一设备标识和所述第二防伪验证信息发送给服务器,以使所述服务器基于所述第一设备标识和所述第二防伪验证信息对所述目标设备进行验证。通过上述方法,可以避免设备系统错误或设备出厂时人工失误导致设备信息缺失,设备防伪功能无法正常进行的问题。(The embodiment of the application discloses an anti-counterfeiting verification method, an anti-counterfeiting verification device, an anti-counterfeiting verification system, a mobile terminal, a server and a storage medium. The method comprises the following steps: acquiring first anti-counterfeiting verification information of target equipment, wherein the first anti-counterfeiting verification information at least comprises a first equipment identifier of the target equipment, and the first anti-counterfeiting verification information is acquired through the target equipment; if the first anti-counterfeiting verification information lacks a second equipment identifier of the target equipment, acquiring second anti-counterfeiting verification information, wherein the second anti-counterfeiting verification information is acquired through an input interface of the mobile terminal; and sending the first equipment identifier and the second anti-counterfeiting verification information to a server so that the server verifies the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information. By the method, the problems that equipment information is lost and the anti-counterfeiting function of the equipment cannot be normally performed due to equipment system errors or manual errors during equipment delivery can be avoided.)

1. An anti-counterfeiting verification method is applied to a mobile terminal, and comprises the following steps:

acquiring first anti-counterfeiting verification information of target equipment, wherein the first anti-counterfeiting verification information at least comprises a first equipment identifier of the target equipment, and the first anti-counterfeiting verification information is acquired through the target equipment;

if the first anti-counterfeiting verification information lacks a second equipment identifier of the target equipment, acquiring second anti-counterfeiting verification information, wherein the second anti-counterfeiting verification information is acquired through an input interface of the mobile terminal;

and sending the first equipment identifier and the second anti-counterfeiting verification information to a server so that the server verifies the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information.

2. The method of claim 1, wherein sending the first device identifier and the second anti-counterfeit verification information to a server to enable the server to verify the target device based on the first device identifier and the second anti-counterfeit verification information further comprises:

if a message which is sent by the server and represents that the verification fails is received, acquiring a first verification frequency of the message which is sent by the server and represents that the verification fails, wherein the first verification frequency is the frequency of verifying the target equipment based on the first equipment identification and the second anti-counterfeiting verification information, and the verification result is the failure frequency;

if the first verification times are less than or equal to first preset times, second anti-counterfeiting verification information is obtained again;

and sending the second anti-counterfeiting verification information obtained again to a server so that the server verifies the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information obtained again.

3. The method of claim 2, wherein after obtaining the first number of times of verification that the message indicating verification failure is received, further comprising:

if the first verification times are larger than the first preset times, third anti-counterfeiting verification information is obtained, wherein the third anti-counterfeiting verification information is obtained through an input interface of the mobile terminal and is different from information included in the second anti-counterfeiting verification information;

and sending the third anti-fake verification information to the server so that the server verifies the target equipment based on the first equipment identification and the third anti-fake verification information.

4. The method of claim 3, wherein after sending the third tamper-proof verification information to the server to cause the server to verify the target device based on the first device identification and the third tamper-proof verification information, further comprising:

if a message of the characterization verification failure sent by the server is received, acquiring a second verification frequency of the message of the characterization verification failure, wherein the second verification frequency is the frequency of the failure of the target device verified based on the first device identification and the third fake verification information;

if the second verification frequency is less than or equal to a second preset frequency, acquiring third fake verification information again;

and sending the re-acquired third anti-fake verification information to the server so that the server verifies the target device based on the re-acquired third anti-fake verification information and the first device identifier.

5. The method of claim 3, wherein the second anti-counterfeiting validation information comprises at least one of a serial number of the target device and a shopping credential of the target device, and wherein the third anti-counterfeiting validation information comprises at least one of a serial number of the target device and a shopping credential of the target device.

6. The method of claim 3, wherein the second anti-counterfeiting validation information is a serial number of the target device, and the third anti-counterfeiting validation information is a shopping credential of the target device.

7. The method of claim 1, further comprising:

and if the first anti-counterfeiting verification information comprises a second equipment identifier of the target equipment, sending the first anti-counterfeiting verification information to the server so that the server verifies the target equipment based on the first equipment identifier and the second equipment identifier.

8. The method of claim 1, wherein the obtaining the first anti-counterfeiting authentication information of the target device comprises:

and acquiring first anti-counterfeiting verification information of the target equipment in a wireless communication mode.

9. The method according to any one of claims 1-8, further comprising:

and if a message of successful representation verification sent by the server is received, prompting that the target equipment is a genuine product.

10. An anti-counterfeiting authentication method is applied to a server, and the method comprises the following steps:

receiving first anti-counterfeiting verification information and second anti-counterfeiting verification information sent by a mobile terminal, wherein the first anti-counterfeiting verification information at least comprises a first device identifier of a target device, the first anti-counterfeiting verification information is obtained through the target device, and the second anti-counterfeiting verification information is obtained through an input interface of the mobile terminal when the second device identifier of the target device is absent in the first anti-counterfeiting verification information;

and verifying the target equipment based on the first equipment identification and the second anti-counterfeiting verification information.

11. The method of claim 10, wherein after authenticating the target device based on the first device identification and the second anti-counterfeit authentication information, further comprising:

if the verification fails, acquiring a first verification frequency of the verification failure, wherein the first verification frequency is the frequency of the failure of the target equipment based on the first equipment identification and the second anti-counterfeiting verification information;

if the first verification times are less than or equal to first preset times, sending first prompt information to the mobile terminal, wherein the first prompt information is used for prompting a user to send second anti-counterfeiting verification information acquired again through the mobile terminal;

and verifying the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information acquired again.

12. The method of claim 11, wherein obtaining the first number of verifications for which the verification failed further comprises:

if the first verification frequency is greater than the first preset frequency, sending second prompt information to the mobile terminal, wherein the second prompt information is used for prompting a user to send third anti-counterfeiting verification information through the mobile terminal, the third anti-counterfeiting verification information is obtained through an input interface of the mobile terminal, and the third anti-counterfeiting verification information is different from the second anti-counterfeiting verification information;

and verifying the target equipment based on the first equipment identification and the third fake verification information.

13. The method according to claim 12, wherein a database storing an order number of a device and a purchase channel of the device is pre-established in the server;

the verifying the target device based on the first device identifier and the third counterfeit verification information includes:

acquiring an order number and a purchase channel of the target equipment, which are included in the third anti-fake verification information;

and inquiring the database and verifying the target equipment based on the first equipment identification, the order number and the purchase channel of the target equipment.

14. The method of claim 12, wherein after verifying the target device based on the first device identification and the third fake verification information, further comprising:

if the verification fails, acquiring a second verification frequency of the verification failure, wherein the second verification frequency is the frequency of the failure of the target equipment verified based on the first equipment identification and the third fake verification information;

if the second verification frequency is less than or equal to a second preset frequency, sending third prompt information to the mobile terminal again, wherein the third prompt information is used for prompting a user to send third pseudo-verification information acquired again through the mobile terminal;

and verifying the target equipment based on the first equipment identification and the second obtained third fake verification information.

15. The method of claim 10, further comprising:

if first anti-counterfeiting verification information sent by the mobile terminal is received, wherein the first anti-counterfeiting verification information comprises the first equipment identifier and the second equipment identifier;

and verifying the target equipment based on the first equipment identification and the second equipment identification.

16. The method according to any one of claims 10-15, wherein the first device identifier is a MAC address of the target device, and the second anti-counterfeit authentication information is a serial number of the target device; the server is pre-established with a database storing the MAC address of the device and the serial number of the device, and the verifying the target device based on the first device identifier and the second anti-counterfeit verification information includes:

querying the database based on the MAC address of the target device and the serial number of the target device;

and determining whether the MAC address of the target device and the serial number of the target device are stored in the database so as to verify the target device.

17. An anti-counterfeiting authentication device, which is operated in a mobile terminal, the device comprising:

the system comprises a first information acquisition unit, a first authentication unit and a second information acquisition unit, wherein the first authentication information is used for acquiring first anti-counterfeiting authentication information of target equipment, the first anti-counterfeiting authentication information at least comprises a first equipment identifier of the target equipment, and the first anti-counterfeiting authentication information is acquired by the target equipment;

a second information obtaining unit, configured to obtain second anti-counterfeit verification information if the first anti-counterfeit verification information lacks a second device identifier of the target device, where the second anti-counterfeit verification information is obtained through an input interface of the mobile terminal;

and the information sending unit is used for sending the first equipment identifier and the second anti-counterfeiting verification information to a server so that the server verifies the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information.

18. An anti-counterfeiting authentication device, operating on a server, the device comprising:

the information receiving unit is used for receiving first anti-counterfeiting verification information and second anti-counterfeiting verification information sent by a mobile terminal, wherein the first anti-counterfeiting verification information at least comprises a first device identifier of a target device, the first anti-counterfeiting verification information is obtained through the target device, and the second anti-counterfeiting verification information is obtained through an input interface of the mobile terminal when the second device identifier of the target device is absent in the first anti-counterfeiting verification information;

and the verification unit is used for verifying the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information.

19. An anti-counterfeiting verification system is characterized by comprising a mobile terminal and a server,

the mobile terminal is used for acquiring first anti-counterfeiting verification information of target equipment, wherein the first anti-counterfeiting verification information at least comprises a first equipment identifier of the target equipment, and the first anti-counterfeiting verification information is acquired through the target equipment;

the mobile terminal is configured to acquire second anti-counterfeiting verification information if the first anti-counterfeiting verification information lacks a second device identifier of the target device, where the second anti-counterfeiting verification information is acquired through an input interface of the mobile terminal;

the mobile terminal is used for sending the first equipment identifier and the second anti-counterfeiting verification information to the server;

the server is used for receiving the first equipment identifier and the second anti-counterfeiting verification information sent by the mobile terminal;

and the server is used for verifying the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information.

20. A mobile terminal comprising one or more processors and memory; one or more programs stored in the memory and configured to be executed by the one or more processors to perform the method of any of claims 1-9.

21. A server, comprising one or more processors and memory; one or more programs stored in the memory and configured to be executed by the one or more processors to perform the method of any of claims 10-16.

22. A computer-readable storage medium, having program code stored therein, wherein the program code when executed by a processor performs the method of any of claims 1-9 or any of claims 10-16.

Technical Field

The application belongs to the technical field of detection, and particularly relates to an anti-counterfeiting verification method, an anti-counterfeiting verification device, an anti-counterfeiting verification system, a mobile terminal, a server and a storage medium.

Background

With the development of market economy, more and more abundant products enrich and lively life of people, and huge market value brought by the product makes lawless persons see a machine for taking advantage of the product, and counterfeit and shoddy products become very headache problems for consumers and well-known enterprises. In order to reduce the loss caused by counterfeit products, the products can be subjected to anti-counterfeiting verification. In the related anti-counterfeiting verification method, equipment information is lost due to equipment system errors or manual errors during equipment delivery, so that the anti-counterfeiting function of the equipment cannot be normally performed.

Disclosure of Invention

In view of the foregoing problems, the present application provides an anti-counterfeit verification method, apparatus, system, mobile terminal, server, and storage medium to improve the foregoing problems.

In a first aspect, an embodiment of the present application provides an anti-counterfeit verification method, which is applied to a mobile terminal, and the method includes: acquiring first anti-counterfeiting verification information of target equipment, wherein the first anti-counterfeiting verification information at least comprises a first equipment identifier of the target equipment, and the first anti-counterfeiting verification information is acquired through the target equipment; if the first anti-counterfeiting verification information lacks a second equipment identifier of the target equipment, acquiring second anti-counterfeiting verification information, wherein the second anti-counterfeiting verification information is acquired through an input interface of the mobile terminal; and sending the first equipment identifier and the second anti-counterfeiting verification information to a server so that the server verifies the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information.

In a second aspect, an embodiment of the present application provides an anti-counterfeiting verification method, which is applied to a server, and the method includes: receiving first anti-counterfeiting verification information and second anti-counterfeiting verification information sent by a mobile terminal, wherein the first anti-counterfeiting verification information at least comprises a first device identifier of a target device, the first anti-counterfeiting verification information is obtained through the target device, and the second anti-counterfeiting verification information is obtained through an input interface of the mobile terminal when the second device identifier of the target device is absent in the first anti-counterfeiting verification information; and verifying the target equipment based on the first equipment identification and the second anti-counterfeiting verification information.

In a third aspect, an embodiment of the present application provides an anti-counterfeit verification apparatus, which operates in a mobile terminal, and the apparatus includes: the system comprises a first information acquisition unit, a first authentication unit and a second information acquisition unit, wherein the first authentication information is used for acquiring first anti-counterfeiting authentication information of target equipment, the first anti-counterfeiting authentication information at least comprises a first equipment identifier of the target equipment, and the first anti-counterfeiting authentication information is acquired by the target equipment; a second information obtaining unit, configured to obtain second anti-counterfeit verification information if the first anti-counterfeit verification information lacks a second device identifier of the target device, where the second anti-counterfeit verification information is obtained through an input interface of the mobile terminal; and the information sending unit is used for sending the first equipment identifier and the second anti-counterfeiting verification information to a server so that the server verifies the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information.

In a fourth aspect, an embodiment of the present application provides an anti-counterfeit verification apparatus, which operates on a server device, and includes: the information receiving unit is used for receiving first anti-counterfeiting verification information and second anti-counterfeiting verification information sent by a mobile terminal, wherein the first anti-counterfeiting verification information at least comprises a first device identifier of a target device, the first anti-counterfeiting verification information is obtained through the target device, and the second anti-counterfeiting verification information is obtained through an input interface of the mobile terminal when the second device identifier of the target device is absent in the first anti-counterfeiting verification information; and the verification unit is used for verifying the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information.

In a fifth aspect, an embodiment of the present application provides an anti-counterfeiting verification system, where the system includes a mobile terminal and a server, where the mobile terminal is configured to obtain first anti-counterfeiting verification information of a target device, where the first anti-counterfeiting verification information at least includes a first device identifier of the target device, and the first anti-counterfeiting verification information is obtained by the target device; the mobile terminal is configured to acquire second anti-counterfeiting verification information if the first anti-counterfeiting verification information lacks a second device identifier of the target device, where the second anti-counterfeiting verification information is acquired through an input interface of the mobile terminal; the mobile terminal is used for sending the first equipment identifier and the second anti-counterfeiting verification information to the server; the server is used for receiving the first equipment identifier and the second anti-counterfeiting verification information sent by the mobile terminal; and the server is used for verifying the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information.

In a sixth aspect, an embodiment of the present application provides a mobile terminal, including one or more processors and a memory; one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the methods described above.

In a seventh aspect, an embodiment of the present application provides a server, including one or more processors and a memory; one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the methods described above.

In an eighth aspect, the present application provides a computer-readable storage medium, in which a program code is stored, wherein the program code performs the above-mentioned method when running.

The embodiment of the application provides an anti-counterfeiting verification method, an anti-counterfeiting verification device, an anti-counterfeiting verification system, a mobile terminal, a server and a storage medium. The method comprises the steps of firstly obtaining first anti-counterfeiting verification information of target equipment, wherein the first anti-counterfeiting verification information at least comprises a first equipment identifier of the target equipment, the first anti-counterfeiting verification information is obtained through the target equipment, and if a second equipment identifier of the target equipment is absent in the first anti-counterfeiting verification information, second anti-counterfeiting verification information is obtained, wherein the second anti-counterfeiting verification information is obtained through an input interface of a mobile terminal, and then the first equipment identifier and the second anti-counterfeiting verification information are sent to a server, so that the server verifies the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information. By the method, under the condition that the acquired anti-counterfeiting verification information of the target equipment lacks the second equipment identifier, the target equipment can be verified according to the acquired anti-counterfeiting verification information of the target equipment from the input interface of the mobile terminal and the acquired anti-counterfeiting verification information and the first equipment identifier, so that the problem that the anti-counterfeiting function of the equipment cannot be normally performed due to equipment information loss caused by equipment system errors or manual errors when the equipment leaves a factory can be solved.

Drawings

In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.

Fig. 1 is a schematic diagram illustrating an application environment of an anti-counterfeit verification method according to an embodiment of the present application;

fig. 2 is a flowchart illustrating an anti-counterfeit verification method according to an embodiment of the present application;

fig. 3 is a flow chart illustrating an anti-counterfeit authentication method according to another embodiment of the present application;

FIG. 4 is a flow chart illustrating a method for anti-counterfeit authentication according to yet another embodiment of the present application;

fig. 5 shows a flow chart of a method for anti-counterfeit authentication according to another embodiment of the present application;

fig. 6 is a block diagram illustrating a structure of an anti-counterfeit authentication device according to an embodiment of the present disclosure;

fig. 7 is a block diagram illustrating a structure of another anti-counterfeit authentication device according to an embodiment of the present application;

fig. 8 is a block diagram illustrating a structure of another anti-counterfeit authentication device according to an embodiment of the present application;

fig. 9 is a block diagram illustrating a structure of another anti-counterfeit authentication device according to an embodiment of the present application;

fig. 10 is a block diagram illustrating a structure of an anti-counterfeit authentication system according to an embodiment of the present application;

fig. 11 is a schematic diagram illustrating a specific application flow of an anti-counterfeit verification method in an anti-counterfeit verification system according to an embodiment of the present application;

fig. 12 is a block diagram illustrating a mobile terminal or a server for executing an anti-counterfeit authentication method according to an embodiment of the present application in real time;

fig. 13 illustrates a storage unit for storing or carrying program codes for implementing the anti-counterfeit authentication method according to the embodiment of the present application in real time.

Detailed Description

The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.

The anti-fake technology is a technology which can accurately identify true or false within a certain range and is not easy to copy and duplicate in order to achieve the anti-fake purpose. The technology is simple, and the technology is used for preventing counterfeiting and counterfeit. Anti-counterfeiting is a precaution against fraudulent activity that is imitated or duplicated without the permission of the owner. The anti-fake product is made by adopting anti-fake technology and has anti-fake function.

The equipment serial number is better than the equipment identity card, and the equipment serial number can be obtained through the system attribute value of the equipment. In the process of using the equipment in factory production, the equipment needs to be registered according to the equipment serial number, namely, the equipment serial number is bound with the registration server, so that the registration server can conveniently inquire corresponding equipment information according to the equipment serial number, the equipment is ensured to be a regular product produced by a specific company, and the anti-counterfeiting verification of the equipment can be realized.

The inventor finds that in the related anti-counterfeiting verification method, the anti-counterfeiting function of the equipment cannot be normally performed due to equipment information loss caused by equipment system errors or manual errors during equipment delivery.

Therefore, the inventor proposes an anti-counterfeiting verification method, an apparatus, a system, a mobile terminal, a server, and a storage medium in the present application, which can verify a target device according to anti-counterfeiting verification information of the target device obtained from another place and according to the re-obtained anti-counterfeiting verification information and a first device identifier, and can avoid the problem that the anti-counterfeiting function of the device cannot be performed normally due to device information loss caused by device system error or manual error when the device leaves a factory.

An application environment related to the embodiments of the present application will be described below.

As shown in fig. 1, the application environment shown in fig. 1 includes an electronic device (simply referred to as a device), a server, an MES (Manufacturing Execution System) System, and a mobile terminal. The electronic device is an actual product which can provide value for a user, for example, the electronic device can be a massage device, an intelligent hardware and other electronic devices, for example, the electronic device can be a cervical vertebra massage instrument, a waist massage instrument and the like. In addition, the electronic equipment is provided with a wireless communication module which can be in communication connection with the mobile terminal in a wireless connection mode, the wireless communication module can comprise modules such as but not limited to Bluetooth, WIFI and Zigbee, a unique serial number can be burnt in the electronic equipment in advance, and the wireless connection module is provided with a unique MAC address. Optionally, the mobile terminal may be a mobile phone, a tablet computer, a notebook computer, or the like.

The server can be used for recording information such as MAC addresses, serial numbers and the like corresponding to the electronic equipment uploaded by the MES system, after the mobile terminal and the electronic equipment are in wireless communication connection and the MAC addresses and the serial numbers corresponding to the electronic equipment are read, the MAC addresses and the serial numbers are uploaded to the server, the server compares the MAC addresses and the serial numbers uploaded by the mobile terminal with the MAC addresses and the serial numbers stored locally in advance, anti-counterfeiting verification of the electronic equipment is carried out, and whether the electronic equipment is a genuine product or a counterfeit product is verified.

After receiving the equipment production order, the MES system generates a serial number list according to the production order, wherein the number of serial numbers in the serial number list is the same as that of the equipment in the production order, each serial number in the serial number list is different and is also different from that in other production orders, namely, the serial number in the serial number list corresponding to each production order is unique. And determining the number of the packaging boxes according to the number of the serial numbers in the serial number list. Each package is attached with or printed with a serial number, and the serial number attached to or printed on each package is different. When the produced electronic equipment is placed into the packaging box, the MES system is connected with the equipment, scans the serial number on the packaging box and writes the scanned serial number into the equipment, so that the serial number on the packaging box is consistent with the serial number of the equipment. During the writing of the sequence number, the sequence number writing may fail due to human error or system error.

After the writing is finished, the MES system reads the serial number written in the equipment and the MAC address corresponding to the equipment, locally stores the read serial number and the MAC address corresponding to the equipment, and uploads the serial number and the MAC address corresponding to the equipment to the server for storage.

The mobile terminal can be used for reading data such as a serial number of the electronic equipment and an MAC address corresponding to the electronic equipment, uploading the read data to the server for verification, and prompting a user whether the equipment is a genuine product or a counterfeit product according to a verification result of the server.

Embodiments of the present application will be described in detail below with reference to the accompanying drawings.

Referring to fig. 2, an anti-counterfeit verification method provided in the embodiment of the present application is applied to a mobile terminal, and the method includes:

step S110: the method comprises the steps of obtaining first anti-counterfeiting verification information of target equipment, wherein the first anti-counterfeiting verification information at least comprises a first equipment identifier of the target equipment, and the first anti-counterfeiting verification information is obtained through the target equipment.

In the embodiment of the application, the target device is a device subjected to anti-counterfeiting verification; the first anti-counterfeiting verification information is used for verifying whether the target equipment is fake or not, and the first anti-counterfeiting verification information can comprise various different marks for marking the target equipment; the first device identification is the device identification of the target device for unique identification, and the first device identification is composed of numbers, letters, symbols, characters, graphs and images or any combination of the former.

In a specific embodiment, the first device identifier is a MAC address of a wireless communication module in the device.

As a mode, after the communication connection is established between the mobile terminal and the target device, the mobile terminal may automatically read the first anti-counterfeit verification information of the target device. Specifically, in order to ensure that the complete first anti-counterfeit verification information can be read, when the mobile terminal automatically reads the first anti-counterfeit verification information of the target device, the mobile terminal may be configured to automatically read the first anti-counterfeit verification information of the target device every preset time period, or after a communication connection is established between the mobile terminal and the target device, the mobile terminal may automatically read the first anti-counterfeit verification information of the target device for multiple times, where the number of times of reading may be determined according to actual requirements, for example, may be determined according to a reading speed of the device, a network state, and the like, and is not specifically limited herein.

As another way, in order to reduce the memory space occupied by the mobile terminal, after the mobile terminal establishes a communication connection with the target device, the mobile terminal does not automatically read the first anti-counterfeit verification information of the target device, but triggers the mobile terminal to acquire the first anti-counterfeit verification information of the target device after receiving a specific instruction. Specifically, the mobile terminal may read the first anti-counterfeit verification information of the target device after receiving the anti-counterfeit verification instruction sent by the external device. The external device is a mobile terminal which establishes communication connection with the mobile terminal and stores the identification of the target device.

Furthermore, the mobile terminal may also obtain the first anti-counterfeiting authentication information of the target device from a server in which the first anti-counterfeiting authentication information of the target device is stored in advance. Specifically, after the mobile terminal and the target device establish communication connection, the mobile terminal may read first anti-counterfeiting verification information of the target device from the server; optionally, the first anti-counterfeit verification information of the target device may be obtained from the server only after the mobile terminal receives the anti-counterfeit verification instruction.

Step S120: and if the first anti-counterfeiting verification information lacks a second equipment identifier of the target equipment, acquiring second anti-counterfeiting verification information, wherein the second anti-counterfeiting verification information is acquired through an input interface of the mobile terminal.

The second device identifier may be an identifier for identifying a unique target device, the second device identifier may be composed of numbers, letters, symbols, characters, graphics, images, or any combination of the foregoing, and the first device identifier and the second device identifier are different identifiers; the second anti-counterfeiting verification information is verification information which is obtained through an input interface of the mobile terminal and can be used for anti-counterfeiting verification of the target equipment; the input interface of the mobile terminal may be an image acquisition device of the mobile terminal, such as a camera, or the input interface of the mobile terminal may also be an image uploading interface of the mobile terminal, or the input interface of the mobile terminal may also be a virtual input key of the mobile terminal, and the like, which is not limited specifically herein. Optionally, in this embodiment of the application, the second anti-counterfeit verification information may include at least one of a serial number of the target device, an order number of the target device, and a purchase channel, where the order number and the purchase channel of the target device may be obtained by identifying a shopping credential uploaded by the user through an input interface of the mobile terminal.

As a mode, after the mobile terminal obtains the first anti-counterfeiting verification information of the target device, the integrity of the first anti-counterfeiting verification information may be verified first, and if it is determined that the verification information included in the first anti-counterfeiting verification information is incomplete, the second anti-counterfeiting verification information may be obtained through the input interface of the mobile terminal. Specifically, the mobile terminal knows which verification information specifically includes in the first anti-counterfeiting verification information of the target device that needs to be acquired in advance, and then the mobile terminal can verify the integrity of the first anti-counterfeiting verification information after acquiring the first anti-counterfeiting verification information of the target device, and when it is determined that the second device identifier of the target device is absent in the first anti-counterfeiting verification information, the user can input the second anti-counterfeiting verification information through the input interface of the mobile terminal, so that the mobile terminal can obtain the second anti-counterfeiting verification information through the input interface, wherein the second anti-counterfeiting verification information can include the absent second device identifier in the first anti-counterfeiting verification information, and can also be verification information different from the first anti-counterfeiting verification information.

Specifically, if the second anti-counterfeiting verification information is the serial number of the target device, the second anti-counterfeiting verification information can be obtained by scanning through a camera or manually input by a user; if the second anti-counterfeiting verification information is a shopping certificate, the second anti-counterfeiting verification information can be obtained through shooting by a camera or through an accessed webpage screenshot. The camera can be a camera of the mobile terminal or a camera of other external equipment.

Step S130: and sending the first equipment identifier and the second anti-counterfeiting verification information to a server so that the server verifies the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information.

In this embodiment of the application, the server stores, in advance, verification information included in first anti-counterfeit verification information of the target device, and also stores, in advance, verification information included in second anti-counterfeit verification information.

After the mobile terminal acquires the second anti-counterfeiting verification information through the input interface, the first equipment identifier and the second anti-counterfeiting verification information are sent to the server, and then the server can compare the first equipment identifier and the second anti-counterfeiting verification information sent by the mobile terminal with pre-stored verification information corresponding to the target equipment to verify the target equipment and determine whether the target equipment is a genuine product.

As a mode, if a message that the representation verification is successful is received, the target device is prompted to be a genuine product. Specifically, if the server finds, in the pre-stored verification information, verification information that matches the first device identifier and the second anti-counterfeit verification information sent by the mobile terminal, the server may send a message indicating that the verification is successful to the mobile terminal, so as to prompt the user that the target device is genuine.

As another mode, if a message indicating that the verification fails is received, which is sent by the server, the target device is prompted to be a counterfeit.

Specifically, if the server does not find the verification information matched with the first device identifier sent by the mobile terminal in the prestored verification information or does not find the verification information matched with the second anti-counterfeiting verification information sent by the mobile terminal, the server may send a message indicating that the verification fails to the mobile terminal, so as to prompt the user target device as a counterfeit.

According to the anti-counterfeiting verification method, under the condition that the acquired first anti-counterfeiting verification information of the target equipment lacks the second equipment identification, the second anti-counterfeiting verification information of the target equipment can be acquired from the input interface of the mobile terminal, and then the target equipment can be verified according to the second anti-counterfeiting verification information and the first equipment identification, so that the problem that the anti-counterfeiting function of the equipment cannot be normally performed due to equipment information loss caused by equipment system errors or manual errors when the equipment leaves a factory can be avoided.

Referring to fig. 3, an anti-counterfeit verification method provided in the embodiment of the present application is applied to a mobile terminal, and the method includes:

step S210: the method comprises the steps of obtaining first anti-counterfeiting verification information of target equipment, wherein the first anti-counterfeiting verification information at least comprises a first equipment identifier of the target equipment, and the first anti-counterfeiting verification information is obtained through the target equipment.

Wherein the first device identification is the MAC address of the target device.

As a mode, the first anti-counterfeiting authentication information of the target device is acquired through a wireless communication mode.

In this embodiment of the application, the wireless communication mode may be a communication mode based on a wireless communication protocol, where the wireless communication protocol may be a bluetooth communication protocol, a Zigbee communication protocol, a WIFI communication protocol, an infrared data transmission protocol, and the like.

Specifically, after it is detected that the mobile terminal and the target device establish wireless communication connection, the mobile terminal may automatically obtain the first anti-counterfeiting verification information of the target device in a wireless communication manner. Optionally, in order to improve the security of the first anti-counterfeiting verification information in the information transmission process, when the mobile terminal obtains the first anti-counterfeiting verification information of the target device, the first anti-counterfeiting verification information may be encrypted and then sent to the mobile terminal in the process that the target device sends the first anti-counterfeiting verification information to the mobile terminal. Specifically, the target device may perform encryption operation on the first anti-counterfeiting verification information through a preset encryption rule, and send the encryption information to the mobile terminal after obtaining the corresponding encryption information. Further, in order to complete information transmission, a preset decryption rule corresponding to a preset encryption rule is also preset in the mobile terminal, so as to implement decryption of the encrypted information generated in the target device. The preset encryption rule may be an MD5 algorithm, and is not limited herein.

Step S220: and if the first anti-counterfeiting verification information lacks a second equipment identifier of the target equipment, acquiring second anti-counterfeiting verification information, wherein the second anti-counterfeiting verification information is acquired through an input interface of the mobile terminal.

In this embodiment of the application, the second device identifier is a serial number of a target device, and the second anti-counterfeit verification information is the serial number of the target device.

Specifically, when it is determined that the serial number of the target device is absent in the first anti-counterfeiting verification information, the mobile terminal may prompt the user so that the user scans the serial number on the packaging box for packaging the target device through the input interface of the mobile terminal, or the user manually inputs the serial number of the target device through the input interface of the mobile terminal, so that the mobile terminal obtains the second anti-counterfeiting verification information.

Optionally, in this embodiment of the application, if the first anti-counterfeit verification information includes the second device identifier of the target device, the first anti-counterfeit verification information is sent to the server, so that the server verifies the target device based on the first device identifier and the second device identifier.

Specifically, when the first anti-counterfeit verification information acquired by the mobile terminal includes both the serial number of the target device and the MAC address of the target device, the serial number of the target device and the MAC address of the target device are directly sent to the server. Optionally, in order to improve the data transmission efficiency, when the serial number of the target device and the MAC address of the target device are sent to the server, the serial number of the target device and the MAC address of the target device may be sent to the server as one piece of data.

Step S230: and sending the first equipment identifier and the second anti-counterfeiting verification information to a server so that the server verifies the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information.

As a mode, in order to improve the security of information transmission, before the first device identifier and the second anti-counterfeit verification information are sent to the server, the first device identifier and the second anti-counterfeit verification information may be encrypted according to a preset encryption rule to generate corresponding encrypted information, and then the encrypted information is sent to the server. Furthermore, in order to complete information transmission, a preset decryption rule corresponding to the preset encryption rule is also preset in the server, so as to implement decryption of the encrypted information sent by the mobile terminal. The preset encryption rule may be a hash encryption algorithm, and the like, and is not specifically limited herein.

Optionally, when the first device identifier and the second anti-counterfeiting verification information are sent to the server as one piece of data, the first device identifier and the second anti-counterfeiting verification information may be stored in different fields, and the server may determine the first device identifier and the second anti-counterfeiting verification information according to the fields. For example, if the first device identifier is the MAC address of the target device and the second anti-counterfeit verification information is the serial number of the target device, when the MAC address of the target device and the serial number of the target device are sent to the server as one piece of data, the following data may be generated according to the MAC address of the target device and the serial number of the target device: "# begin #" + "# data1 #" + "# data2 #" + "# end #". The field data1 carries the first anti-counterfeit verification information, i.e. the MAC address of the target device, and the field data2 carries the second anti-counterfeit verification information, i.e. the serial number of the target device. Then, when receiving the previous data, the server may obtain the MAC address of the target device and the serial number of the target device at the same time by obtaining the value of the corresponding field.

Further, the server may verify the target device based on the obtained MAC address of the target device and the serial number of the target device.

Step S240: and if the message which is sent by the server and fails in the representation verification is received, acquiring the first verification times of the message which fails in the representation verification.

And the first verification times are times of failure in verification of the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information.

As one mode, when the mobile terminal receives a message of token authentication failure sent by the server for the first time, the counting module of the mobile terminal starts counting, and when the mobile terminal receives a message of token authentication failure sent by the server for the first time, the counting module accumulates the counting once.

In this embodiment of the application, since the first verification failure frequency is the frequency of performing verification and verification failure on the target device based on the first device identifier and the second anti-counterfeit verification information, when the server sends the frequency representing the verification failure to the mobile terminal, an identifier may be added at the specified data position of the message, where the identifier is used to determine that the message is the message sent after the verification and verification failure is performed on the target device based on the first device identifier and the second anti-counterfeit verification information.

Furthermore, when the mobile terminal receives a message representing that the verification fails, which is sent by the server in real time, the first verification times corresponding to the message can be directly obtained from the counting module of the mobile terminal.

Step S250: judging whether the first verification frequency is less than or equal to a first preset frequency, if so, executing step S260; if not, go to step S270.

In this embodiment of the application, the first preset number of times is a preset maximum number of times of verification failure that the target device can be verified through the first device identifier and the second anti-counterfeit verification information. After the mobile terminal obtains the first verification times, the first verification times are compared with the first preset times to obtain a comparison result, and whether the target device is verified again according to the same verification information can be determined according to the comparison result.

Step S260: and acquiring second anti-counterfeiting verification information again, and sending the second anti-counterfeiting verification information acquired again to the server so that the server verifies the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information acquired again.

In the embodiment of the application, if a message which is sent by a server and represents that verification fails is received, and the first verification time of receiving the message is less than or equal to the first preset time, it can be determined that verification information matched with a first device identifier and second anti-counterfeiting verification information is not found in the server, a user is prompted to scan a serial number on a packaging box of a target device or manually input the serial number again until the first verification time is greater than the first preset time, multiple verification is set, and verification failure caused by scanning errors or verification failure caused by input errors of the serial number manually input by the user can be effectively reduced.

Specifically, when the mobile terminal determines that the first verification frequency is less than or equal to the first verification frequency, the mobile terminal prompts the user to input second anti-counterfeiting verification information again through the input interface of the mobile terminal, the mobile terminal can acquire the second anti-counterfeiting verification information again, after the mobile terminal acquires the second anti-counterfeiting verification information again, the second anti-counterfeiting verification information acquired again is sent to the server, because it is determined that the first anti-counterfeiting verification information at least comprises the first equipment identifier of the target equipment, and when the verification information is sent to the server for the first time, the first equipment identifier is sent to the server, and when the second anti-counterfeiting verification information acquired again is sent to the server, the first equipment identifier does not need to be sent to the server again, so that the transmission quantity of data is reduced.

After the mobile terminal sends the second anti-counterfeiting verification information obtained again to the server, the server may verify the target device based on the second anti-counterfeiting verification information obtained again and sent by the mobile terminal and the first device identifier.

Furthermore, in order to enable the server to distinguish that the second anti-counterfeiting authentication information sent by the mobile terminal is specifically obtained through the input interface of the mobile terminal for the second time, when the mobile terminal sends the second anti-counterfeiting authentication information to the server, a field which can represent that the second anti-counterfeiting authentication information is obtained through the input interface of the mobile terminal for the second time may be added to the piece of authentication information, for example, if the authentication information 1 is the second anti-counterfeiting authentication information obtained through the input interface of the mobile terminal for the second time, the field may be "# 2", and if the authentication information 3 is the second anti-counterfeiting authentication information obtained through the input interface of the mobile terminal for the fifth time, the field may be "# 5".

Step S270: and acquiring third anti-counterfeiting verification information, and sending the third anti-counterfeiting verification information to the server so that the server verifies the target equipment based on the first equipment identification and the third anti-counterfeiting verification information.

The third anti-counterfeiting verification information is obtained through an input interface of the mobile terminal, and the third anti-counterfeiting verification information is different from information included in the second anti-counterfeiting verification information.

In an embodiment of the present application, the third counterfeit verification information may include at least one of a serial number of the target device, an order number of the target device, and a purchase channel. Specifically, the third counterfeit prevention verification information is an order number and a purchase channel of the target device.

As a mode, if the first verification time is greater than a first preset time and the second anti-counterfeit verification information is the second device identifier, third anti-counterfeit verification information is obtained. Specifically, when the mobile terminal determines that the first verification frequency is greater than the first preset frequency according to the comparison result and the second anti-counterfeiting verification information is the second equipment identifier, the mobile terminal prompts a user to upload the shopping certificate of the target equipment through an input interface of the mobile terminal so that the mobile terminal can obtain the third anti-counterfeiting verification information.

When the mobile terminal sends the third anti-counterfeiting verification information to the server, the server can distinguish the first anti-counterfeiting verification information, the second anti-counterfeiting verification information and the third anti-counterfeiting verification information, and therefore, data heads of specified formats can be set for the first anti-counterfeiting verification information, the second anti-counterfeiting verification information and the third anti-counterfeiting verification information, for example, the data head of the first anti-counterfeiting verification information can be set to be '@ 1', the data head of the second anti-counterfeiting verification information can be set to be '@ 2', and the data head of the third anti-counterfeiting verification information can be set to be '@ 3'. Therefore, the server can determine whether the verification information is the first anti-counterfeiting verification information, the second anti-counterfeiting verification information or the third anti-counterfeiting verification information according to the data header of the received verification information.

By the method, after the mobile terminal sends the third anti-fake verification information to the server, the server can verify the target equipment based on the first equipment identification and the third anti-fake verification information, and can send a message representing verification failure to the mobile terminal after the target equipment fails to be verified.

Step S280: and if the message which is sent by the server and fails in the representation verification is received, acquiring the second verification times of the message which fails in the representation verification.

And the second verification frequency is the frequency of verifying the target equipment based on the first equipment identification and the third fake verification information, and the verification result is failure.

In this embodiment of the present application, since the second verification failure number is the number of times of the token verification failure sent based on the first device identifier and the third mobile terminal, when the server sends the message indicating the verification failure to the mobile terminal, an identifier may be added at the specified data location of the message, where the identifier is used to determine that the message is the message sent after the verification failure is performed on the target device based on the first device identifier and the third pseudo-verification information. The designated data location here is the same as the aforementioned designated location, but the identification here is different from the aforementioned identification.

As one mode, when the mobile terminal receives a message of token authentication failure sent by the server for the first time, the counting module of the mobile terminal starts counting, and when the mobile terminal receives a message of token authentication failure sent by the server for the first time, the counting module accumulates the counting once.

Specifically, when the mobile terminal obtains the message indicating that the verification fails, which is sent by the server, in real time, the corresponding second verification times may be obtained from a counting module of the mobile terminal.

Step S290: and if the second verification frequency is less than or equal to a second preset frequency, acquiring third anti-fake verification information again.

The second preset times is greater than the first preset times, and the second preset times is the preset maximum verification failure times for verifying the target device through the same information.

And when the mobile terminal determines that the second verification frequency is less than or equal to a second preset frequency, acquiring third anti-counterfeiting verification information through an input interface of the mobile terminal, and after the third anti-counterfeiting verification information is acquired again, sending the third acquired third anti-counterfeiting verification information to the server.

Step S291: and sending the re-acquired third anti-fake verification information to the server so that the server verifies the target device based on the re-acquired third anti-fake verification information and the first device identifier.

Similarly, in order to enable the server to distinguish that the third counterfeit prevention verification information sent by the mobile terminal is specifically obtained through the input interface of the mobile terminal for the second time, when the mobile terminal sends the third counterfeit prevention verification information to the server, a field which can represent that the third counterfeit prevention verification information is obtained through the input interface of the mobile terminal for the second time may also be added to the piece of verification information.

After the mobile terminal sends the third anti-fake verification information obtained again to the server, the server determines that the verification information is the third anti-fake verification information according to the data header of the received verification information, and the server can verify the target device based on the third anti-fake verification information obtained again and sent by the mobile terminal and the first device identifier.

According to the anti-counterfeiting verification method, under the condition that the acquired first anti-counterfeiting verification information of the target equipment lacks the second equipment identification, the target equipment can be verified according to the acquired second anti-counterfeiting verification information of the target equipment from other places, and furthermore, under the condition that the target equipment is failed to be verified according to the acquired second anti-counterfeiting verification information and the acquired first equipment identification, the third anti-counterfeiting verification information can be acquired again, so that the target equipment can be verified again according to the third anti-counterfeiting verification information and the acquired first equipment identification, and further, the problem that equipment information is lost due to equipment system errors or manual errors when the equipment leaves a factory and the anti-counterfeiting function of the equipment cannot be normally performed can be avoided.

Referring to fig. 4, an anti-counterfeit verification method provided in the embodiment of the present application is applied to a server, and the method includes:

step S310: and receiving the first anti-counterfeiting verification information and the second anti-counterfeiting verification information sent by the mobile terminal.

The first anti-counterfeiting verification information at least comprises a first device identification of a target device, the first anti-counterfeiting verification information is obtained through the target device, and the second anti-counterfeiting verification information is obtained through an input interface of the mobile terminal when the second device identification of the target device is absent in the first anti-counterfeiting verification information.

Step S320: and verifying the target equipment based on the first equipment identification and the second anti-counterfeiting verification information.

Specifically, the server may verify the target device according to verification information obtained in real time and sent by the mobile terminal.

As a mode, when the verification information sent by the mobile terminal is the first device identifier and the second anti-counterfeit verification information, the server may verify the target device according to the first device identifier and the second anti-counterfeit verification information.

As another mode, if the first anti-counterfeit verification information sent by the mobile terminal includes a first device identifier and a second device identifier, the target device is verified based on the first device identifier and the second device identifier.

Specifically, after the server receives the complete first anti-counterfeiting verification information sent by the mobile terminal, the target device can be verified according to the first device identifier and the second device identifier in the first anti-counterfeiting verification information.

According to the anti-counterfeiting verification method, under the condition that the acquired first anti-counterfeiting verification information of the target equipment lacks the second equipment identification, the target equipment can be verified according to the second anti-counterfeiting verification information of the target equipment acquired from the input interface of the mobile terminal and the acquired second anti-counterfeiting verification information and the first equipment identification, and the problem that the anti-counterfeiting function of the equipment cannot be normally performed due to equipment information loss caused by equipment system errors or manual errors when the equipment leaves a factory can be avoided.

Referring to fig. 5, an anti-counterfeit verification method provided in the embodiment of the present application is applied to a server, and the method includes:

step S410: and receiving the first anti-counterfeiting verification information and the second anti-counterfeiting verification information sent by the mobile terminal.

The step S410 can refer to the detailed explanation in the above embodiments, and therefore, is not described herein.

Step S420: and verifying the target equipment based on the first equipment identification and the second anti-counterfeiting verification information.

As a mode, the first device identifier is an MAC address of the target device, and the second anti-counterfeit verification information is a serial number of the target device; the server is pre-established with a database storing the MAC address of the device and the serial number of the device, and the step of verifying the target device based on the first device identifier and the second anti-counterfeit verification information includes: querying the database based on the MAC address of the target device and the serial number of the target device; and determining whether the MAC address of the target device and the serial number of the target device are stored in the database so as to verify the target device.

Specifically, the first device identifier is a MAC address of the target device, and the second range verification information is a serial number of the target device. Optionally, the MAC of the device and the serial number of the device are pre-stored in the database of the server, and the MAC address of the device and the serial number of the device are in one-to-one correspondence. When the server receives the MAC address of the target device and the serial number of the target device sent by the mobile terminal, the MAC address of the target device and the serial number of the target device are matched with the MAC address of the device and the serial number of the device which are stored in the database in advance, and therefore the target device is verified.

And when the database has the matched MAC address and the serial number, determining that the verification is successful, returning a message representing the successful verification to the mobile terminal, prompting the user that the target equipment is genuine by the mobile terminal, and normally providing the mobile terminal application function of the target equipment for the user by the mobile terminal. The mobile application function may include a function of controlling the target device through the mobile application, such as turning on the target device or turning off the target device.

Step S430: if the verification fails, acquiring a first verification frequency of the verification failure.

The first verification times are times of verifying the target device based on the first device identifier and the second anti-counterfeiting verification information, and the verification result is failure.

And when the database does not have a matched MAC address or a matched serial number, determining that the verification fails, returning a message representing the verification failure to the mobile terminal, prompting the target equipment of the user to be a counterfeit product by the mobile terminal, and no longer providing the normal mobile terminal application function of the target equipment for the user by the mobile terminal.

Step S440: judging whether the first verification frequency is less than or equal to a first preset frequency, if so, executing step S450; if not, go to step S460.

Wherein, the meaning of the first preset times is the same as that of the first preset times. Also, in the server, the total number of the first authentication times is increased once every time the authentication of the target device based on the authentication information fails.

Step S450: sending first prompt information to the mobile terminal, wherein the first prompt information is used for prompting a user to send second anti-counterfeiting verification information acquired again through the mobile terminal; and verifying the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information acquired again.

When the first verification frequency is less than or equal to the first preset frequency, the server may send first prompt information to the mobile terminal to prompt the user to acquire second anti-counterfeiting verification information again through an input interface of the mobile terminal, and the mobile terminal sends the second anti-counterfeiting verification information acquired again to the server, so that the server may verify whether the target device is a genuine product or a counterfeit product based on the first device identifier and the second anti-counterfeiting verification information acquired again.

Step S460: and sending second prompt information to the mobile terminal, wherein the second prompt information is used for prompting a user to send third fake verification information through the mobile terminal, and verifying the target equipment based on the first equipment identification and the third fake verification information.

The third anti-counterfeiting verification information is obtained through an input interface of the mobile terminal, and the third anti-counterfeiting verification information is different from information included in the second anti-counterfeiting verification information.

And when the first verification times are greater than the first preset times and the second anti-counterfeiting verification information is the serial number of the target equipment, sending second prompt information to the mobile terminal to prompt a user to upload a shopping certificate through an input interface of the mobile terminal, and then sending the shopping certificate to the server by the mobile terminal.

After the server receives the shopping certificate sent by the mobile terminal, the server can perform picture recognition on the shopping certificate to recognize the order number and the shopping channel corresponding to the target device, and then the server can verify the target device according to the first device identification of the target device, the order number and the shopping channel corresponding to the target device.

As one mode, a database storing an order number of the device and a purchase channel of the device is pre-established in the server; the step of verifying the target device based on the first device identification and the third fake verification information includes: acquiring an order number and a purchase channel of the target equipment, which are included in the third anti-fake verification information; and inquiring the database and verifying the target equipment based on the first equipment identification, the order number and the purchase channel of the target equipment.

Specifically, the order number of the device and the purchase channel of the device are stored in the database of the server in advance, and the order number of the device and the purchase channel of the device are in one-to-one correspondence.

After the server obtains the order number of the target device and the purchase channel of the target device, the order number of the target device and the purchase channel of the target device can be matched with the order number of the device and the purchase channel of the device which are stored in the database in advance, and the first device identifier and the MAC address of the device which is stored in the database in advance can be matched.

And when the matched order number, purchase channel and MAC address exist in the database, the verification is determined to be successful, a message representing the successful verification is returned to the mobile terminal, the mobile terminal prompts the user that the target equipment is genuine, and the mobile terminal normally provides the mobile terminal application function of the target equipment for the user. The mobile application function may include a function of controlling the target device through the mobile application, such as turning on the target device or turning off the target device.

Step S470: and if the verification fails, acquiring a second verification frequency of the verification failure, wherein the second verification frequency is the frequency of the failure of the target equipment based on the first equipment identification and the third fake verification information.

And when the database does not have a matched order number, or a matched purchase channel, or a matched MAC address, determining that the verification fails, acquiring second verification times for verifying the target equipment based on the first equipment identification and the third fake verification information, and verifying the target equipment in a failed way.

Step S480: and if the second verification frequency is less than or equal to a second preset frequency, sending third prompt information to the mobile terminal again, wherein the third prompt information is used for prompting the user to send third pseudo-verification information acquired again through the mobile terminal.

Wherein the meaning of the second preset number is the same as that of the second preset number. When the second verification frequency is less than or equal to the second preset frequency, the server may send third prompt information to the mobile terminal to prompt the user to input third tamper-proof verification information again through an input interface of the mobile terminal, and the mobile terminal sends the third tamper-proof verification information acquired again to the server, so that the server may verify whether the target device is a genuine product or a counterfeit product based on the first device identifier and the third tamper-proof verification information acquired again.

Step S490: and verifying the target equipment based on the first equipment identification and the second obtained third fake verification information.

And when no matched order number, no matched purchase channel or no matched MAC address exists in the database, determining that the verification fails, returning a message representing the verification failure to the mobile terminal, prompting the target equipment to be a counterfeit product by the mobile terminal, and no longer providing the mobile terminal application function of the target equipment for the user by the mobile terminal.

According to the anti-counterfeiting verification method, under the condition that the acquired first anti-counterfeiting verification information of the target equipment lacks the second equipment identification, the second anti-counterfeiting verification information of the target equipment can be acquired from an input interface of the mobile terminal, and then the target equipment can be verified according to the acquired second anti-counterfeiting verification information and the acquired first equipment identification, furthermore, under the condition that the target equipment is verified according to the acquired second anti-counterfeiting verification information and the acquired first equipment identification, the third anti-counterfeiting verification information can be acquired again, so that the target equipment can be verified again according to the third anti-counterfeiting verification information and the acquired first equipment identification, and further the problem that equipment information is lost due to equipment system errors or manual errors when the equipment leaves a factory and the anti-counterfeiting function of the equipment cannot be performed normally can be avoided.

Referring to fig. 6, an anti-counterfeit verification apparatus 500 provided in the embodiment of the present application is operated in a mobile terminal, where the apparatus 500 includes:

a first information obtaining unit 510, configured to obtain first anti-counterfeit verification information of a target device, where the first anti-counterfeit verification information at least includes a first device identifier of the target device, and the first anti-counterfeit verification information is obtained by the target device.

Optionally, the first information obtaining unit 510 is configured to obtain the first anti-counterfeit verification information of the target device in a wireless communication manner.

A second information obtaining unit 520, configured to obtain second anti-counterfeit verification information if the first anti-counterfeit verification information lacks a second device identifier of the target device, where the second anti-counterfeit verification information is obtained through an input interface of the mobile terminal.

An information sending unit 530, configured to send the first device identifier and the second anti-counterfeit verification information to a server, so that the server verifies the target device based on the first device identifier and the second anti-counterfeit verification information.

Optionally, the information sending unit 530 is further configured to send the first anti-counterfeit verification information to the server if the first anti-counterfeit verification information includes the second device identifier of the target device, so that the server verifies the target device based on the first device identifier and the second device identifier.

Referring to fig. 7, the apparatus 500 further includes:

a first verification frequency obtaining unit 540, configured to obtain, if a message that the representation verification fails and sent by the server is received, a first verification frequency of receiving the message that the representation verification fails, where the first verification frequency is a frequency of verifying the target device based on the first device identifier and the second anti-counterfeit verification information, and a verification result is a failure frequency; if the first verification times are less than or equal to first preset times, second anti-counterfeiting verification information is obtained again; and sending the second anti-counterfeiting verification information obtained again to a server so that the server verifies the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information obtained again.

Optionally, the first verification frequency obtaining unit 540 is further configured to obtain third anti-counterfeit verification information if the first verification frequency is greater than the first preset frequency, where the third anti-counterfeit verification information is obtained through an input interface of the mobile terminal, and information included in the third anti-counterfeit verification information is different from information included in the second anti-counterfeit verification information; and sending the third anti-fake verification information to the server so that the server verifies the target equipment based on the first equipment identification and the third anti-fake verification information.

A second verification frequency obtaining unit 550, configured to obtain, if a message that the characterization verification fails and sent by the server is received, a second verification frequency of the message that the characterization verification fails and is received, where the second verification frequency is a frequency of failure for verifying the target device based on the first device identifier and the third pseudo-verification information; if the second verification frequency is less than or equal to a second preset frequency, acquiring third fake verification information again; and sending the re-acquired third anti-fake verification information to the server so that the server verifies the target device based on the re-acquired third anti-fake verification information and the first device identifier.

Referring to fig. 8, in an embodiment of the present application, an anti-counterfeit verification apparatus 600 operates in a server, where the apparatus 600 includes:

the information receiving unit 610 is configured to receive first anti-counterfeiting verification information and second anti-counterfeiting verification information sent by a mobile terminal, where the first anti-counterfeiting verification information at least includes a first device identifier of a target device, the first anti-counterfeiting verification information is obtained through the target device, and the second anti-counterfeiting verification information is obtained through an input interface of the mobile terminal when the second device identifier of the target device is absent from the first anti-counterfeiting verification information.

A verification unit 620, configured to verify the target device based on the first device identifier and the second anti-counterfeit verification information.

Optionally, the verification unit 620 is further configured to obtain an order number and a purchase channel of the target device included in the third counterfeit verification information; and inquiring the database and verifying the target equipment based on the first equipment identification, the order number and the purchase channel of the target equipment.

Optionally, the verification unit 620 is further configured to, if first anti-counterfeit verification information sent by the mobile terminal is received, where the first anti-counterfeit verification information includes the first device identifier and the second device identifier; and verifying the target equipment based on the first equipment identification and the second equipment identification.

Furthermore, the verifying unit 620 is further configured to query the database based on the MAC address of the target device and the serial number of the target device; and determining whether the MAC address of the target device and the serial number of the target device are stored in the database so as to verify the target device.

Referring to fig. 9, the apparatus 600 further includes:

a first verification frequency obtaining unit 630, configured to obtain, if the verification fails, a first verification frequency of the verification failure, where the first verification frequency is a frequency of the failure when the target device is verified based on the first device identifier and the second anti-counterfeit verification information; if the first verification times are less than or equal to first preset times, sending first prompt information to the mobile terminal, wherein the first prompt information is used for prompting a user to send second anti-counterfeiting verification information acquired again through the mobile terminal; and verifying the target equipment based on the first equipment identifier and the second anti-counterfeiting verification information acquired again.

Optionally, the first verification frequency obtaining unit 630 is configured to send, to the mobile terminal, second prompt information if the first verification frequency is greater than the first preset frequency, where the second prompt information is used to prompt a user to send third anti-counterfeit verification information through the mobile terminal, where the third anti-counterfeit verification information is obtained through an input interface of the mobile terminal, and information included in the third anti-counterfeit verification information is different from information included in the second anti-counterfeit verification information; and verifying the target equipment based on the first equipment identification and the third fake verification information.

A second verification frequency obtaining unit 640, configured to obtain, if the verification fails, a second verification frequency of the verification failure, where the second verification frequency is a frequency of the verification of the target device based on the first device identifier and the third fake verification information, and a verification result is a failure frequency; if the second verification frequency is less than or equal to a second preset frequency, sending third prompt information to the mobile terminal again, wherein the third prompt information is used for prompting a user to send third pseudo-verification information acquired again through the mobile terminal; and verifying the target equipment based on the first equipment identification and the second obtained third fake verification information.

Referring to fig. 10, an anti-counterfeit verification system 700 according to an embodiment of the present application includes a mobile terminal 710 and a server 720,

the mobile terminal 710 is configured to obtain first anti-counterfeit verification information of a target device, where the first anti-counterfeit verification information at least includes a first device identifier of the target device, and the first anti-counterfeit verification information is obtained by the target device.

The mobile terminal 710 is configured to obtain second anti-counterfeit verification information if the first anti-counterfeit verification information lacks a second device identifier of the target device, where the second anti-counterfeit verification information is obtained through an input interface of the mobile terminal 710.

The mobile terminal 710 is configured to send the first device identifier and the second anti-counterfeit verification information to the server 720.

The server 720 is configured to receive the first device identifier and the second anti-counterfeit verification information sent by the mobile terminal 710.

The server 720 is configured to verify the target device based on the first device identifier and the second anti-counterfeit verification information.

The specific application process of the method is shown in fig. 11, a user puts a production order into the MES system, and the MES system generates a corresponding unique serial number list (which is not repeated with the previous serial number) according to the quantity of the production order; according to the produced serial number list data, the corresponding number of the packaging boxes is produced, and serial numbers are pasted one by one (the serial numbers pasted on each packaging are different); in the production process, when the produced equipment needs to be placed into a packaging box, the equipment is connected by using an MES system, and the serial number of the packaging box is scanned by using the MES system after the equipment is connected; reading the serial number of the packaging box by the MES system and writing the serial number into corresponding equipment; the MES system reads the serial number and the MAC in the equipment, uploads the serial number and the MAC to the server after local backup, and the server stores the serial number and the MAC into an equipment table; and if the actual ex-warehouse quantity is inconsistent with the quantity uploaded to the server after production, the MES system repeats the sequence number list generated in the first step and uploads the sequence number list to the server. At this time, the server database has normal records containing both the serial number and the MAC, and also has abnormal records containing only the serial number.

After purchasing the equipment, the user establishes Bluetooth connection with the equipment by using the mobile terminal application of the mobile terminal; the mobile terminal automatically reads the serial number and MAC of the equipment; if the mobile terminal successfully reads the serial number and the MAC, uploading the serial number and the MAC to a server, and if the server can inquire the serial number and the MAC address in a database, marking the serial number and the MAC address as a genuine product; and if the database does not have the matched serial number and MAC, marking the database as a counterfeit product, and returning a result of failed verification.

If the serial number read by the mobile terminal is empty, prompting a user to scan the serial number on the packaging box for verification or manually inputting the serial number for verification; uploading the scanned serial number or the manually input serial number to a server, and marking the server as a genuine product if the server can inquire the serial number and the MAC address in a database; and if the database does not have the matched serial number and MAC, marking the database as a counterfeit product, and returning a result of failed verification.

After the equipment is verified in a progressive mode by scanning the serial number on the packaging box or the manually input serial number and the verification fails, the mobile terminal can retry to upload the serial number or upload a shopping certificate to the server, and after the mobile terminal uploads the shopping certificate to the server, the server can carry out picture recognition on the shopping certificate and recognize a corresponding order number and a corresponding shopping channel. After the server identifies the order number and the shopping channel, the order number and the shopping channel are matched with an existing order list in a database of the server, if the matching is successful, the equipment is identified to be a genuine product, the mobile terminal does not check the equipment any more, and if the matching is failed, the mobile terminal can upload the shopping certificate again to verify the equipment.

It should be noted that the device embodiment and the method embodiment in the present application correspond to each other, and specific principles in the device embodiment may refer to the contents in the method embodiment, which is not described herein again.

A mobile terminal or a server provided by the present application will be described with reference to fig. 11.

Referring to fig. 11, based on the above anti-counterfeit authentication method and apparatus, another mobile terminal or server 800 capable of performing the above anti-counterfeit authentication method is provided in the embodiment of the present application. The mobile terminal or server 800 includes one or more processors 802 (only one shown), memory 804, and a network module 806 coupled to each other. The memory 804 stores programs that can execute the content of the foregoing embodiments, and the processor 802 can execute the programs stored in the memory 804.

Processor 802 may include one or more processing cores, among others. The processor 802 interfaces with various components throughout the mobile terminal or server 800 using various interfaces and lines to perform various functions of the mobile terminal or server 800 and process data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 804 and invoking data stored in the memory 804. Alternatively, the processor 802 may be implemented in hardware using at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 802 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing display content; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 802, but may be implemented by a single communication chip.

The Memory 804 may include a Random Access Memory (RAM) or a Read-Only Memory (ROM). The memory 804 may be used to store instructions, programs, code, sets of codes, or sets of instructions. The memory 804 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing various method embodiments described below, and the like. The storage data area may also store data created by the mobile terminal or server 800 in use, such as a phonebook, audio-video data, chat log data, and the like.

The network module 806 is configured to receive and transmit electromagnetic waves, and achieve interconversion between the electromagnetic waves and the electrical signals, so as to communicate with a communication network or other devices, for example, an audio playing device. The network module 806 may include various existing circuit elements for performing these functions, such as an antenna, a radio frequency transceiver, a digital signal processor, an encryption/decryption chip, a Subscriber Identity Module (SIM) card, memory, and so forth. The network module 806 may communicate with various networks, such as the internet, an intranet, a wireless network, or with other devices via a wireless network. The wireless network may comprise a cellular telephone network, a wireless local area network, or a metropolitan area network. For example, the network module 806 can interact with the base station.

Referring to fig. 12, a block diagram of a computer-readable storage medium according to an embodiment of the present application is shown. The computer-readable storage medium 900 has stored therein program code that can be called by a processor to execute the methods described in the above-described method embodiments.

The computer-readable storage medium 900 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Alternatively, the computer-readable storage medium 900 includes a non-volatile computer-readable storage medium. The computer readable storage medium 900 has storage space for program code 910 to perform any of the method steps of the method described above. The program code can be read from or written to one or more computer program products. The program code 910 may be compressed, for example, in a suitable form.

The application provides an anti-counterfeiting verification method, an anti-counterfeiting verification device, an anti-counterfeiting verification system, a mobile terminal, a server and a storage medium, wherein first anti-counterfeiting verification information of a target device is firstly obtained, the first anti-counterfeiting verification information at least comprises a first device identifier of the target device, the first anti-counterfeiting verification information is obtained through the target device, if a second device identifier of the target device is absent in the first anti-counterfeiting verification information, second anti-counterfeiting verification information is obtained, the second anti-counterfeiting verification information is obtained through an input interface of the mobile terminal, and then the first device identifier and the second anti-counterfeiting verification information are sent to the server, so that the server verifies the target device based on the first device identifier and the second anti-counterfeiting verification information. By the method, under the condition that the acquired anti-counterfeiting verification information of the target equipment lacks the second equipment identifier, the target equipment can be verified according to the acquired anti-counterfeiting verification information of the target equipment from the input interface of the mobile terminal and the acquired anti-counterfeiting verification information and the first equipment identifier, so that the problem that the anti-counterfeiting function of the equipment cannot be normally performed due to equipment information loss caused by equipment system errors or manual errors when the equipment leaves a factory can be solved.

While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

30页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种线上商品身份唯一性识别确认系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!