[go: up one dir, main page]

CN111565381A - Consumable authentication method and system, intelligent terminal and background server - Google Patents

Consumable authentication method and system, intelligent terminal and background server Download PDF

Info

Publication number
CN111565381A
CN111565381A CN202010358815.2A CN202010358815A CN111565381A CN 111565381 A CN111565381 A CN 111565381A CN 202010358815 A CN202010358815 A CN 202010358815A CN 111565381 A CN111565381 A CN 111565381A
Authority
CN
China
Prior art keywords
information
consumable
authentication
authenticated
intelligent terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010358815.2A
Other languages
Chinese (zh)
Inventor
黄斌
王思
李明
袁龙刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Hongmei Intelligent Technology Co Ltd
Original Assignee
Sichuan Hongmei Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Hongmei Intelligent Technology Co Ltd filed Critical Sichuan Hongmei Intelligent Technology Co Ltd
Priority to CN202010358815.2A priority Critical patent/CN111565381A/en
Publication of CN111565381A publication Critical patent/CN111565381A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Control Or Security For Electrophotography (AREA)

Abstract

The invention provides a consumable authentication method and system, an intelligent terminal and a background server, comprising the following steps: receiving an externally input Bluetooth search request; determining whether a Bluetooth signal which is sent by the consumable to be authenticated and corresponds to first identification information in a Bluetooth search request can be searched, if the Bluetooth signal which corresponds to the first identification information is searched, acquiring authentication information of the consumable to be authenticated through the Bluetooth signal, and sending the authentication information to an external background server, so that the background server determines an authentication result of the consumable to be authenticated according to the authentication information, and when the authentication result from the background server is received, displaying the authentication result; and if the Bluetooth signal corresponding to the first identification information is not searched, outputting abnormal prompt information indicating that the consumable item to be authenticated is abnormal in authentication. This scheme can reduce the degree of difficulty of distinguishing consumptive material true and false nature.

Description

Consumable authentication method and system, intelligent terminal and background server
Technical Field
The invention relates to the technical field of Internet of things, in particular to a consumable authentication method and system, an intelligent terminal and a background server.
Background
At present, products such as a water purifier, an air purifier, a sweeping robot and the like need to regularly replace consumables such as a filter screen, a filter element and the like to ensure the filtering effect.
In the filter element consumable management method, management device, and management system of a water purifier disclosed in application No. CN201510424525.2, a user scans a pre-generated two-dimensional code corresponding to a filter element consumable of a water purifier to be managed, sends the two-dimensional code to a server, and receives information of the filter element consumable to be managed, which is sent by the server and corresponds to the two-dimensional code. And managing the filter core consumables to be managed according to the information of the filter core consumables to be managed.
For another example, CN201611116420.1, a patent for comparing the filter anti-counterfeit device and method with RFID and electronic tag discloses that a filter assembly is disposed on an outer wall of an air purifier, a filter screen is disposed in the filter assembly, an electronic tag is mounted on the filter screen, the electronic tag is provided with a plurality of data sectors capable of performing attribute operations of the data sectors and performing anti-counterfeit identification, a card reader system for identifying and operating the electronic tag is disposed on the air purifier, and a control panel is disposed on the upper portion of the air purifier and used for controlling the air purifier and the card reader system to operate through data transmission lines after the card reader system reads and identifies attributes of each data sector in the electronic tag.
Therefore, in the prior art, the consumable is authenticated based on the two-dimensional code on the consumable, the two-dimensional code and the electronic tag information are easy to crack and forge, and a user can hardly distinguish the authenticity of the consumable. And the verification by adopting the electronic tag mode needs special equipment, and a user usually lacks related reading equipment, so that the difficulty of identifying the authenticity of the consumable is increased.
Disclosure of Invention
The embodiment of the invention provides a consumable authentication method and system, an intelligent terminal and a background server, which can reduce the difficulty of identifying the authenticity of a consumable.
In a first aspect, the present invention provides a consumable authentication method, applied to an intelligent terminal, including:
s1: receiving an externally input Bluetooth search request;
s2: determining whether a Bluetooth signal corresponding to the first identification information in the Bluetooth search request, which is sent by the consumable to be authenticated, can be searched, if so, executing S3, otherwise, executing S6;
s3: obtaining the authentication information of the consumable to be authenticated through the Bluetooth signal, and executing S4;
s4: sending the authentication information to an external background server, so that the background server determines the authentication result of the consumable item to be authenticated according to the authentication information, and executing S5;
s5: when the authentication result from the background server is received, displaying the authentication result;
s6: and outputting abnormal prompt information indicating that the consumable to be authenticated is abnormal in authentication.
Preferably, the first and second electrodes are formed of a metal,
before the S2, further comprising:
when an information identification request input from the outside is received, scanning an identification code on the consumable to be authenticated;
and analyzing the first identification information from the identification code.
In a second aspect, the present invention provides a consumable authentication method, applied to a background server, including:
receiving authentication information of consumables to be authenticated sent by an external intelligent terminal;
determining the authentication result of the consumable to be authenticated according to prestored data and the authentication information;
and sending the authentication result to the intelligent terminal sending the authentication information.
Preferably, the first and second electrodes are formed of a metal,
the method for determining the authentication result of the consumable to be authenticated according to the prestored data and the authentication information comprises the following steps:
when the authentication information includes: when the second identification information and the verification information of the consumable are to be authenticated,
d1: determining whether first information identical to the second identification information exists in pre-stored data stored in advance, if so, performing D2, otherwise, performing D4;
d2: determining whether second information matched with the verification information exists in the pre-stored data, if so, executing D3, otherwise, executing D4;
d3: taking the information indicating that the consumable to be authenticated passes the authentication as an authentication result;
d4: and taking the information indicating the authentication abnormity of the consumable to be authenticated as an authentication result.
Preferably, the first and second electrodes are formed of a metal,
after the receiving the authentication information of the consumable part to be authenticated sent by the external intelligent terminal, before the determining the authentication result of the consumable part to be authenticated according to the prestored data and the authentication information, the method further includes:
and when the authentication information is in a ciphertext form, decrypting the authentication information in the ciphertext form by using a preset secret key to obtain the authentication information in a plaintext form.
Preferably, the first and second electrodes are formed of a metal,
further comprising:
f1: establishing an incidence relation between a terminal identifier corresponding to the intelligent terminal and the second identification information corresponding to the consumable item to be authenticated;
f2: determining the service life of the consumable to be authenticated in the authentication information and the receiving time point of receiving the authentication information;
f3: determining a first difference value between a current time point and the receiving time point;
f4: determining whether the first difference is greater than the age, if so, performing F5, otherwise, performing F6;
f5: sending first use prompt information indicating that the consumable to be used has reached the service life to the intelligent terminal;
f6: determining a second difference between the age and the first difference, performing F7;
f7: and carrying second use prompt information of the second difference value to the intelligent terminal, wherein the second difference value indicates the time length when the distance reaches the service life of the consumable to be authenticated.
In a third aspect, the present invention provides an intelligent terminal, including:
the information receiving module is used for receiving a Bluetooth search request input from the outside;
the information processing module is used for determining whether a Bluetooth signal which is sent by the consumable to be authenticated and corresponds to the first identification information in the Bluetooth search request received by the information receiving module can be searched, if so, S3 is executed, otherwise, S6 is executed; s3: acquiring the authentication information of the consumable to be authenticated through the Bluetooth signal, and triggering an information sending module to execute S4; s5: when the information receiving module receives the authentication result of the consumable to be authenticated determined by the background server according to the authentication information sent by the information sending module, displaying the authentication result; s6: outputting abnormal prompt information indicating that the consumable to be authenticated is abnormal in authentication;
the information sending module is configured to execute S4: and sending the authentication information to an external background server so that the background server determines the authentication result of the consumable item to be authenticated according to the authentication information.
In a fourth aspect, the present invention provides a backend server, including:
the information interaction module is used for receiving authentication information of the consumable to be authenticated sent by an external intelligent terminal; sending the authentication result determined by the data processing module to the intelligent terminal sending the authentication information;
and the data processing module is used for determining the authentication result of the consumable to be authenticated according to prestored data and the authentication information received by the information interaction module.
In a fifth aspect, the present invention provides a consumable authentication system comprising: at least one intelligent terminal of the third aspect and the background server of the fourth aspect.
In a sixth aspect, the present invention also provides a storage medium comprising: at least one memory and at least one processor;
the at least one memory to store a machine readable program;
the at least one processor is used for calling the machine readable program to execute the consumable authentication method.
In a seventh aspect, the present invention also provides a computer readable medium having stored thereon computer instructions, which, when executed by a processor, cause the processor to execute the consumable authentication method of any one of the above.
The invention provides a consumable authentication method and system, an intelligent terminal and a background server, wherein a user can input a Bluetooth search request for searching a Bluetooth signal of a consumable to be authenticated to the intelligent terminal if the user needs to authenticate the consumable to be authenticated, so that the intelligent terminal judges whether the Bluetooth signal sent by the consumable to be authenticated can be searched based on first identification information in the Bluetooth search request, and can output abnormal prompt information to prompt the user that the consumable to be authenticated is abnormal if authentication information corresponding to the first identification information in the Bluetooth search request is not searched; if the Bluetooth signal corresponding to the first identification information is searched, acquiring authentication information for authenticating the consumable to be authenticated from the consumable to be authenticated based on the Bluetooth signal, and then sending the authentication information to a background server so as to authenticate the consumable to be authenticated based on the authentication information through the background server and obtain an authentication result of the consumable to be authenticated; after receiving the authentication result from the background server, the authentication result can be displayed so that the user can determine the authenticity of the consumable to be authenticated through the authentication result. In conclusion, in the process of authenticating the consumable materials to be authenticated, the authentication of the consumable materials to be authenticated can be realized only by inputting the Bluetooth search request to the intelligent terminal, and other operations are not required to be executed, so that the difficulty in distinguishing the authenticity of the consumable materials can be reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flowchart of a consumable authentication method according to an embodiment of the present invention;
FIG. 2 is a flowchart of a consumable authentication method according to another embodiment of the present invention;
fig. 3 is a schematic structural diagram of an intelligent terminal according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a backend server according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of a consumable authentication system according to an embodiment of the present invention;
FIG. 6 is a schematic structural diagram of a consumable authentication system according to another embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer and more complete, the technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention, and based on the embodiments of the present invention, all other embodiments obtained by a person of ordinary skill in the art without creative efforts belong to the scope of the present invention.
As shown in fig. 1, an embodiment of the present invention provides a consumable authentication method, which is applied to an intelligent terminal, and includes:
s1: receiving an externally input Bluetooth search request;
s2: determining whether a Bluetooth signal corresponding to the first identification information in the Bluetooth search request, which is sent by the consumable to be authenticated, can be searched, if so, executing S3, otherwise, executing S6;
s3: obtaining the authentication information of the consumable to be authenticated through the Bluetooth signal, and executing S4;
s4: sending the authentication information to an external background server, so that the background server determines the authentication result of the consumable item to be authenticated according to the authentication information, and executing S5;
s5: when the authentication result from the background server is received, displaying the authentication result;
s6: and outputting abnormal prompt information indicating that the consumable to be authenticated is abnormal in authentication.
In the embodiment of the invention, if a user needs to authenticate a consumable part to be authenticated, a Bluetooth search request for searching a Bluetooth signal of the consumable part to be authenticated can be input to an intelligent terminal, so that the intelligent terminal judges whether the Bluetooth signal sent by the consumable part to be authenticated can be searched based on first identification information in the Bluetooth search request, and if authentication information corresponding to the first identification information in the Bluetooth search request is not searched, abnormal prompt information can be output to prompt the user that the consumable part to be authenticated is abnormal in authentication; if the Bluetooth signal corresponding to the first identification information is searched, acquiring authentication information for authenticating the consumable to be authenticated from the consumable to be authenticated based on the Bluetooth signal, and then sending the authentication information to a background server so as to authenticate the consumable to be authenticated based on the authentication information through the background server and obtain an authentication result of the consumable to be authenticated; after receiving the authentication result from the background server, the authentication result can be displayed so that the user can determine the authenticity of the consumable to be authenticated through the authentication result. In conclusion, in the process of authenticating the consumable materials to be authenticated, the authentication of the consumable materials to be authenticated can be realized only by inputting the Bluetooth search request to the intelligent terminal, and other operations are not required to be executed, so that the difficulty in distinguishing the authenticity of the consumable materials can be reduced.
Specifically, the bluetooth signal that corresponds with first identification information that intelligent terminal searched for is the signal that is emitted by the bluetooth module of encapsulation in waiting to authenticate the consumptive material, still stores the authentication information who waits to authenticate the consumptive material in the bluetooth module, wherein, authentication information is including being used for instructing the second identification information of waiting to authenticate the consumptive material identity, the date of production of waiting to authenticate the consumptive material, date of production, service life, use notice, product information such as manufacturer's information and be convenient for background server to treat authentication codes or key information of authentication consumptive material.
Because encapsulation is in treating the authentication consumptive material during the bluetooth module, the user if need take out the bluetooth module from treating in the authentication consumptive material and need treat the authentication consumptive material and break open, treat like this that the authentication consumptive material then can't continue to use to guarantee the security of the information of storage in the bluetooth module, avoid the information of bluetooth module to be tampered at will, can also improve the reliability of consumptive material authentication.
In order to simplify the user operation, in an embodiment of the present invention, before the S2, the method further includes:
when an information identification request input from the outside is received, scanning an identification code on the consumable to be authenticated;
and analyzing the first identification information from the identification code.
In the embodiment of the invention, the user can input the information identification request to the intelligent terminal, and the intelligent terminal can scan and analyze the identification code on the consumable to be authenticated to obtain the first identification information, so that the first identification information on the consumable to be authenticated is simplified for the user, and the Bluetooth search request carrying the first identification information is manually input to the intelligent terminal, thereby improving the user experience.
As shown in fig. 2, an embodiment of the present invention provides a consumable authentication method, applied to a backend server, including:
step 201: receiving authentication information of consumables to be authenticated sent by an external intelligent terminal;
step 202: determining the authentication result of the consumable to be authenticated according to prestored data and the authentication information;
step 203: and sending the authentication result to the intelligent terminal sending the authentication information.
In the embodiment of the invention, after the authentication information for authenticating the authenticity of the consumable material to be authenticated is received, the authenticity of the consumable material to be authenticated can be judged based on the prestored data and the received authentication information, the authentication result after the consumable material to be authenticated is obtained, and finally the authentication result is returned to the intelligent terminal sending the authentication information, so that a user can know the authentication condition of the consumable material to be authenticated through the intelligent terminal.
In an embodiment of the present invention, the determining the authentication result of the consumable part to be authenticated according to the pre-stored data and the authentication information includes:
when the authentication information includes: when the second identification information and the verification information of the consumable are to be authenticated,
d1: determining whether first information identical to the second identification information exists in pre-stored data stored in advance, if so, performing D2, otherwise, performing D4;
d2: determining whether second information matched with the verification information exists in the pre-stored data, if so, executing D3, otherwise, executing D4;
d3: taking the information indicating that the consumable to be authenticated passes the authentication as an authentication result;
d4: and taking the information indicating the authentication abnormity of the consumable to be authenticated as an authentication result.
In the embodiment of the invention, each shipped consumable part stores the information for representing the identity of the consumable part, the information for representing the authenticity of the consumable part, and the information for the production date, the shipment date, the service life, the use notice and the product parameters of the consumable part in the background server. When the authenticity of the consumable to be authenticated is authenticated, the data to be prestored simultaneously contains the information matched with the second identification information and the verification information in the authentication information, and the consumable to be authenticated can be judged to be a genuine product, so that the information indicating that the consumable to be authenticated passes the authentication can be generated as an authentication result, otherwise, the information indicating that the consumable to be authenticated is abnormal in authentication is generated as the authentication result.
It can be understood that, when the consumable to be authenticated is genuine and the first identification information on the consumable to be authenticated is not tampered, the first identification information may be the same as the second identification information stored in the bluetooth module packaged in the consumable to be authenticated.
The verification information may be a single randomly generated authentication code, a single key information, or both the authentication code and the key information.
When the verification information comprises key information and the key information is a key for decryption, the pre-stored data comprises second information matched with the key information, the second information comprises encrypted first ciphertext information and first plaintext information corresponding to the first ciphertext information, and the authenticity of the consumable to be authenticated can be determined by determining whether the key information can decrypt the second information, for example, if the key information can decrypt the first ciphertext information to obtain the first plaintext information, the consumable to be authenticated is not a forged product, and the data stored in the consumable to be authenticated is not tampered by people. And if the key information cannot decrypt the first ciphertext information to obtain corresponding first plaintext information, the authentication failure of the consumable to be authenticated is indicated.
Similarly, if the verification information comprises key information and the key information is a key used for encryption, the second information matched with the key information in the prestored data comprises information to be encrypted and second ciphertext information obtained by encrypting the information to be encrypted, if the key information obtains the second ciphertext information after encrypting the information to be encrypted, the consumable to be authenticated passes authentication, and otherwise, the consumable to be authenticated fails authentication.
In order to improve the security of data transmission, in an embodiment of the present invention, after receiving authentication information of a consumable to be authenticated sent by an external smart terminal, before determining an authentication result of the consumable to be authenticated according to prestored data and the authentication information, the method further includes:
and when the authentication information is in a ciphertext form, decrypting the authentication information in the ciphertext form by using a preset secret key to obtain the authentication information in a plaintext form.
In the embodiment of the invention, the authentication information stored in the Bluetooth module in the consumable to be authenticated is encrypted information, the authentication information sent by the intelligent terminal is information in a ciphertext form, and in order to judge the authenticity of the consumable to be authenticated, the ciphertext information needs to be decrypted by using a preset secret key so as to obtain the authentication information in a plaintext form, so that data can be read and compared conveniently.
In order to further improve the user experience, in an embodiment of the present invention, the method further includes:
f1: establishing an incidence relation between a terminal identifier corresponding to the intelligent terminal and the second identification information corresponding to the consumable item to be authenticated;
f2: determining the service life of the consumable to be authenticated in the authentication information and the receiving time point of receiving the authentication information;
f3: determining a first difference value between a current time point and the receiving time point;
f4: determining whether the first difference is greater than the age, if so, performing F5, otherwise, performing F6;
f5: sending first use prompt information indicating that the consumable to be used has reached the service life to the intelligent terminal;
f6: determining a second difference between the age and the first difference, performing F7;
f7: and carrying second use prompt information of the second difference value to the intelligent terminal, wherein the second difference value indicates the time length when the distance reaches the service life of the consumable to be authenticated.
In the embodiment of the invention, after the authentication information is received, whether the pre-stored data has the association relationship with the second identification information in the authentication information can be judged, if the pre-stored data has the association relationship with the second identification information, the second identification information is bound with an intelligent terminal, otherwise, the association relationship formed by binding the second identification information and the terminal identification of the intelligent terminal can be established. When the service life of the consumable to be authenticated is determined to be reached based on the authentication information stored in the consumable to be authenticated, first use prompt information can be sent to the intelligent terminal bound with the consumable to be authenticated, and a user is prompted that the service life of the consumable to be authenticated is reached. If the consumable part to be authenticated does not reach the service life, a second difference value of the distance of the current time point reaching the service life of the consumable part to be authenticated can be calculated, and the second difference value is sent to the intelligent terminal bound with the consumable part to be authenticated so as to prompt the user of the remaining time of the consumable part to be authenticated reaching the service life.
As shown in fig. 3, an embodiment of the present invention provides an intelligent terminal, including:
an information receiving module 301, configured to receive a bluetooth search request input from the outside;
an information processing module 302, configured to determine whether a bluetooth signal corresponding to the first identification information in the bluetooth search request received by the information receiving module 301 and sent by the consumable to be authenticated can be searched, if so, perform S3, otherwise, perform S6; s3: acquiring the authentication information of the consumable to be authenticated through the Bluetooth signal, and triggering the information sending module 303 to execute S4; s5: when the information receiving module receives the authentication result of the consumable to be authenticated determined by the background server according to the authentication information sent by the information sending module, displaying the authentication result; s6: outputting abnormal prompt information indicating that the consumable to be authenticated is abnormal in authentication;
the information sending module 303 is configured to execute S4: and sending the authentication information to an external background server so that the background server determines the authentication result of the consumable item to be authenticated according to the authentication information.
In the embodiment of the invention, if a user needs to authenticate a consumable part to be authenticated, a Bluetooth search request for searching a Bluetooth signal of the consumable part to be authenticated can be input to an intelligent terminal, so that an information processing module judges whether the Bluetooth signal sent by the consumable part to be authenticated can be searched based on first identification information in the Bluetooth search request received by an information receiving module, and if authentication information corresponding to the first identification information in the Bluetooth search request is not searched, abnormal prompt information can be output to prompt the user that the consumable part to be authenticated is abnormal in authentication; if the Bluetooth signal corresponding to the first identification information is searched, acquiring authentication information for authenticating the consumable to be authenticated from the consumable to be authenticated based on the Bluetooth signal, and then sending the authentication information to a background server through an information sending module so as to authenticate the consumable to be authenticated based on the authentication information through the background server and obtain an authentication result of the consumable to be authenticated; after the information receiving module receives the authentication result from the background server, the information processing module can display the authentication result so that the user can determine the authenticity of the consumable material to be authenticated through the authentication result. In conclusion, in the process of authenticating the consumable materials to be authenticated, the authentication of the consumable materials to be authenticated can be realized only by inputting the Bluetooth search request to the intelligent terminal, and other operations are not required to be executed, so that the difficulty in distinguishing the authenticity of the consumable materials can be reduced.
In an embodiment of the invention, the information receiving module is further configured to scan an identification code on the consumable to be authenticated when an externally input information identification request is received.
It is to be understood that the illustrated structure of the embodiment of the present invention does not specifically limit the intelligent terminal. In other embodiments of the invention the intelligent terminal may include more or fewer components than shown, or some components may be combined, some components may be split, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
Because the information interaction, execution process, and other contents between the units in the device are based on the same concept as the method embodiment of the present invention, specific contents may refer to the description in the method embodiment of the present invention, and are not described herein again.
As shown in fig. 4, an embodiment of the present invention provides a background server, including:
the information interaction module 401 is used for receiving authentication information of the consumable to be authenticated sent by an external intelligent terminal; sending the authentication result determined by the data processing module to the intelligent terminal sending the authentication information;
the data processing module 402 is configured to determine an authentication result of the consumable item to be authenticated according to prestored data and the authentication information received by the information interaction module 401.
In the embodiment of the invention, after the information interaction module receives the authentication information for authenticating the authenticity of the consumable material to be authenticated, the data processing module can judge the authenticity of the consumable material to be authenticated based on the prestored data and the received authentication information and obtain the authentication result after the consumable material to be authenticated is authenticated, and finally, the information interaction module returns the authentication result to the intelligent terminal sending the authentication information, so that a user can know the authentication condition of the consumable material to be authenticated through the intelligent terminal.
It is to be understood that the illustrated structure of the embodiment of the present invention does not form a specific limitation to the backend server. In other embodiments of the invention the backend server may include more or fewer components than shown, or some components may be combined, some components may be split, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
Because the information interaction, execution process, and other contents between the units in the device are based on the same concept as the method embodiment of the present invention, specific contents may refer to the description in the method embodiment of the present invention, and are not described herein again.
In an embodiment of the present invention, the data processing module is configured to execute:
when the authentication information includes: when the second identification information and the verification information of the consumable are to be authenticated,
d1: determining whether first information identical to the second identification information exists in pre-stored data stored in advance, if so, performing D2, otherwise, performing D4;
d2: determining whether second information matched with the verification information exists in the pre-stored data, if so, executing D3, otherwise, executing D4;
d3: taking the information indicating that the consumable to be authenticated passes the authentication as an authentication result;
d4: and taking the information indicating the authentication abnormity of the consumable to be authenticated as an authentication result.
In an embodiment of the present invention, the data processing module is further configured to, when the authentication information is in a ciphertext form, decrypt the authentication information in the ciphertext form by using a preset key, and obtain authentication information in a plaintext form.
In an embodiment of the present invention, the data processing module is further configured to execute:
f1: establishing an incidence relation between a terminal identifier corresponding to the intelligent terminal and the second identification information corresponding to the consumable item to be authenticated;
f2: determining the service life of the consumable to be authenticated in the authentication information and the receiving time point of receiving the authentication information;
f3: determining a first difference value between a current time point and the receiving time point;
f4: determining whether the first difference is greater than the age, if so, performing F5, otherwise, performing F6;
f5: sending first use prompt information indicating that the consumable to be used has reached the service life to the intelligent terminal;
f6: determining a second difference between the age and the first difference, performing F7;
f7: and carrying second use prompt information of the second difference value to the intelligent terminal, wherein the second difference value indicates the time length when the distance reaches the service life of the consumable to be authenticated.
As shown in fig. 5, an embodiment of the present invention provides a consumable authentication system, including: at least one intelligent terminal 501 described in any one of the above embodiments and a background server 502 described in any one of the above embodiments.
In the embodiment of the invention, if a user needs to authenticate a consumable part to be authenticated, a Bluetooth search request for searching a Bluetooth signal of the consumable part to be authenticated can be input to an intelligent terminal, so that the intelligent terminal judges whether the Bluetooth signal sent by the consumable part to be authenticated can be searched based on first identification information in the Bluetooth search request, and if authentication information corresponding to the first identification information in the Bluetooth search request is not searched, abnormal prompt information can be output to prompt the user that the consumable part to be authenticated is abnormal in authentication; if the Bluetooth signal corresponding to the first identification information is searched, acquiring authentication information for authenticating the consumable to be authenticated from the consumable to be authenticated based on the Bluetooth signal, and then sending the authentication information to a background server so as to authenticate the consumable to be authenticated based on the authentication information through the background server and obtain an authentication result of the consumable to be authenticated; after receiving the authentication result from the background server, the authentication result can be displayed so that the user can determine the authenticity of the consumable to be authenticated through the authentication result. In conclusion, in the process of authenticating the consumable materials to be authenticated, the authentication of the consumable materials to be authenticated can be realized only by inputting the Bluetooth search request to the intelligent terminal, and other operations are not required to be executed, so that the difficulty in distinguishing the authenticity of the consumable materials can be reduced.
In fig. 5, 3 intelligent terminals are shown.
In order to more clearly illustrate the technical solution and advantages of the present invention, the following describes in detail a consumable authentication system provided in an embodiment of the present invention, taking a consumable to be authenticated as a filter element in an air purifier and an intelligent terminal as an example, as shown in fig. 6, including:
the intelligent terminal 601 is configured to execute:
q1: receiving an externally input Bluetooth search request;
specifically, the encapsulation has the bluetooth module in the filter core, and the second identification information that has the filter core has been write in advance in the bluetooth module, like product serial number SN sign indicating number, the user can be based on the demand, and the manual SN sign indicating number that will read on the follow filter core is inputed to the smart mobile phone. In order to simplify user operation, improve user and use experience, the user can also be through the APP scanning identification code on the pre-installation on the smart mobile phone on the identification filter core, then analyze out first identification information to search for the bluetooth signal that corresponds through first identification information, with the operation that reduces artifical manual input information.
Q2: determining whether a Bluetooth signal corresponding to the first identification information in the Bluetooth search request sent by the filter core can be searched, if so, executing Q3, otherwise, executing Q6;
q3: acquiring authentication information of the filter element through a Bluetooth signal, and executing Q4;
specifically, after the smart phone searches for the Bluetooth signal named by the SN code based on the first identification information, the authentication information in the Bluetooth module arranged in the filter element can be read through the Bluetooth signal, then the authentication information is sent to the background server, and the background server can verify the authenticity of the filter element based on the authentication information.
Q4: sending the authentication information to the backend server 602, and executing Q5;
q5: when receiving the authentication result from the background server 602, displaying the authentication result;
specifically, no matter whether the filter element is a genuine product or a pirated product, the background server returns a corresponding authentication result based on the authentication information, so that the user can know the authentication condition of the filter element.
Q6: and outputting abnormal prompt information indicating that the filter element is abnormal in authentication.
Specifically, if the corresponding bluetooth signal is not searched based on the first identification information, it indicates that the name of the bluetooth signal sent by the bluetooth module packaged in the filter element is not matched with the first identification information. Because the bluetooth module is encapsulated in the filter core, if take out the bluetooth module from the filter core and need break the filter core and tear open, the filter core after breaking open then can't continue to use, so can judge that the first identification information that the user read from the filter core or the first identification information that smart mobile phone analyzed out from the identification code has been tampered, consequently, can output and instruct the unusual information of filter core authentication, so that the user makes clear that the filter core is pirate product, and need not to carry out the authentication through backend server again, thereby can reduce and the data interaction between the backend server, avoid occupying the too much resource of backend server.
The background server 602 is configured to receive the authentication information of the filter element sent by the smartphone 601, and execute:
specifically, in order to ensure the safety in the data transmission process, the authentication information written into the bluetooth module of the filter element is encrypted information, so that the authentication information read by the smart phone is also encrypted authentication information, and after receiving the encrypted authentication information, the background server can decrypt the encrypted authentication information by using a preset secret key to obtain the authentication information in a plaintext form, and then judge the authenticity of the filter element.
W1: determining whether first information identical to second identification information in the authentication information exists in prestored data, if so, executing W2, otherwise, executing W4;
specifically, each outgoing filter element stores, in the background server, second identification information (the second identification information may be the same information as the first identification information) for representing an identity, product information on specific parameters of a product, and verification information for verifying authenticity of the filter element. Therefore, after receiving the authentication information of the smart phone, the background server may first determine whether corresponding first information exists in the pre-stored data based on the second identification information in the authentication information, and if so, indicate that the filter element indicated by the second identification information leaves the factory, and if not, indicate that the filter element indicated by the second identification information does not leave the factory.
W2: determining whether second information matched with the verification information exists in the pre-stored data, if so, executing W3, otherwise, executing W4;
specifically, after the filter element indicated by the second identification information is determined to exist, it is further required to determine whether the second information matched with the verification information in the authentication information exists in the pre-stored data, so as to determine whether the information in the bluetooth module packaged in the filter element is tampered, and thus, the use safety of the filter element is ensured. If the second information exists in the pre-stored data, the filter element is a product leaving the factory, so that the filter element can be determined to pass the authentication, and otherwise, the filter element is a counterfeit product.
Specifically, the verification information may be a randomly generated authentication code or key information generated based on information of the specified number of bits of the second identification information. After the second information corresponding to the pre-stored data is used for decrypting the secret key information, if the second identification information with the specified digit is obtained, the filter element is a product leaving the factory, otherwise, the filter element is a counterfeit product.
W3: performing W5 with information indicating that the filter element passes the authentication as an authentication result;
w4: performing W5 with information indicating that the filter element is abnormal as an authentication result;
w5: and sending the authentication result to the smart phone which sends the authentication information.
The background server is further used for executing:
e1: establishing an incidence relation between a terminal identifier corresponding to the smart phone 601 and second identifier information corresponding to the filter element;
specifically, each filter element can be bound with at least one intelligent terminal, so that the background server regularly sends related information to the intelligent terminal bound with the filter element based on product information such as service life and operation instructions of the filter element, and a user can know the condition of the filter element through the intelligent terminal.
E2: determining the service life of a filter element in the authentication information and a receiving time point of the authentication information;
e3: determining a first difference value between the current time point and the receiving time point;
specifically, after the authentication information is received, that is, the receiving time point of the authentication information is recorded, and when it is determined that the authentication of the filter cartridge is passed, the service life of the filter cartridge is determined from the authentication information of the trip, for example, the service life of the trip is 3 months, 6 months, or 1 year. Then, the current time point is determined, the current time point is differed from the receiving time point, and the used time length of the filter element, namely the first difference value, can be roughly calculated.
E4: determining whether the first difference is greater than the age, if so, performing F5, otherwise, performing F6;
specifically, if the first difference is greater than the service life of the filter element, it indicates that the filter element has reached the service life, and therefore, the first use prompt message can be sent to the smart phone, so that the user can replace the filter element in time. If the first difference is not greater than the service life, a second difference between the service life of the filter element and the used time (namely the first difference) of the filter element can be calculated to determine the remaining time when the distance between the filter element and the service life reaches, and second use prompt information carrying the second difference is sent to the smart phone to prompt a user of the usable time of the filter element, so that the user can purchase a new filter element to change when the filter element reaches the service life in time.
E5: sending first use prompt information indicating that the consumable to be used has reached the service life to the smart phone 601;
e6: determining a second difference between the age and the first difference, performing E7;
e7: a second usage prompt message of a second difference is carried to the smartphone 601, where the second difference indicates a duration of time for which the distance reaches the service life of the filter element.
An embodiment of the present invention further provides a storage medium, including: at least one memory and at least one processor;
the at least one memory to store a machine readable program;
the at least one processor is used for calling the machine readable program to execute the consumable authentication method in any embodiment of the invention.
Embodiments of the present invention further provide a computer-readable medium, where computer instructions are stored, and when executed by a processor, cause the processor to execute the consumable authentication method in any embodiment of the present invention.
Specifically, a system or an apparatus equipped with a storage medium on which software program codes that realize the functions of any of the above-described embodiments are stored may be provided, and a computer (or a CPU or MPU) of the system or the apparatus is caused to read out and execute the program codes stored in the storage medium.
In this case, the program code itself read from the storage medium can realize the functions of any of the above-described embodiments, and thus the program code and the storage medium storing the program code constitute a part of the present invention.
Examples of the storage medium for supplying the program code include a floppy disk, a hard disk, a magneto-optical disk, an optical disk (e.g., CD-ROM, CD-R, CD-RW, DVD-ROM, DVD-RAM, DVD-RW, DVD + RW), a magnetic tape, a nonvolatile memory card, and a ROM. Alternatively, the program code may be downloaded from a server computer via a communications network.
Further, it should be clear that the functions of any one of the above-described embodiments may be implemented not only by executing the program code read out by the computer, but also by causing an operating system or the like operating on the computer to perform a part or all of the actual operations based on instructions of the program code.
Further, it is to be understood that the program code read out from the storage medium is written to a memory provided in an expansion board inserted into the computer or to a memory provided in an expansion unit connected to the computer, and then causes a CPU or the like mounted on the expansion board or the expansion unit to perform part or all of the actual operations based on instructions of the program code, thereby realizing the functions of any of the above-described embodiments.
It should be noted that not all steps and modules in the above flows and system structure diagrams are necessary, and some steps or modules may be omitted according to actual needs. The execution order of the steps is not fixed and can be adjusted as required. The system structure described in the above embodiments may be a physical structure or a logical structure, that is, some modules may be implemented by the same physical entity, or some modules may be implemented by a plurality of physical entities, or some components in a plurality of independent devices may be implemented together.
In the above embodiments, the hardware unit may be implemented mechanically or electrically. For example, a hardware element may comprise permanently dedicated circuitry or logic (such as a dedicated processor, FPGA or ASIC) to perform the corresponding operations. The hardware elements may also comprise programmable logic or circuitry, such as a general purpose processor or other programmable processor, that may be temporarily configured by software to perform the corresponding operations. The specific implementation (mechanical, or dedicated permanent, or temporarily set) may be determined based on cost and time considerations.
While the invention has been shown and described in detail in the drawings and in the preferred embodiments, it is not intended to limit the invention to the embodiments disclosed, and it will be apparent to those skilled in the art that various combinations of the code auditing means in the various embodiments described above may be used to obtain further embodiments of the invention, which are also within the scope of the invention.

Claims (10)

1. The consumable authentication method is characterized by being applied to an intelligent terminal and comprising the following steps:
s1: receiving an externally input Bluetooth search request;
s2: determining whether a Bluetooth signal corresponding to the first identification information in the Bluetooth search request, which is sent by the consumable to be authenticated, can be searched, if so, executing S3, otherwise, executing S6;
s3: obtaining the authentication information of the consumable to be authenticated through the Bluetooth signal, and executing S4;
s4: sending the authentication information to an external background server, so that the background server determines the authentication result of the consumable item to be authenticated according to the authentication information, and executing S5;
s5: when the authentication result from the background server is received, displaying the authentication result;
s6: and outputting abnormal prompt information indicating that the consumable to be authenticated is abnormal in authentication.
2. The consumable authentication method according to claim 1, further comprising, before the S2:
when an information identification request input from the outside is received, scanning an identification code on the consumable to be authenticated;
and analyzing the first identification information from the identification code.
3. The consumable authentication method is characterized by being applied to a background server and comprising the following steps:
receiving authentication information of consumables to be authenticated sent by an external intelligent terminal;
determining the authentication result of the consumable to be authenticated according to prestored data and the authentication information;
and sending the authentication result to the intelligent terminal sending the authentication information.
4. The consumable authentication method of claim 3,
the method for determining the authentication result of the consumable to be authenticated according to the prestored data and the authentication information comprises the following steps:
when the authentication information includes: when the second identification information and the verification information of the consumable are to be authenticated,
d1: determining whether first information identical to the second identification information exists in pre-stored data stored in advance, if so, performing D2, otherwise, performing D4;
d2: determining whether second information matched with the verification information exists in the pre-stored data, if so, executing D3, otherwise, executing D4;
d3: taking the information indicating that the consumable to be authenticated passes the authentication as an authentication result;
d4: taking the information indicating the authentication abnormity of the consumable to be authenticated as an authentication result;
and/or the presence of a gas in the gas,
after the receiving the authentication information of the consumable part to be authenticated sent by the external intelligent terminal, before the determining the authentication result of the consumable part to be authenticated according to the prestored data and the authentication information, the method further includes:
and when the authentication information is in a ciphertext form, decrypting the authentication information in the ciphertext form by using a preset secret key to obtain the authentication information in a plaintext form.
5. The consumable authentication method according to claim 3 or 4, further comprising:
f1: establishing an incidence relation between a terminal identifier corresponding to the intelligent terminal and the second identification information corresponding to the consumable item to be authenticated;
f2: determining the service life of the consumable to be authenticated in the authentication information and the receiving time point of receiving the authentication information;
f3: determining a first difference value between a current time point and the receiving time point;
f4: determining whether the first difference is greater than the age, if so, performing F5, otherwise, performing F6;
f5: sending first use prompt information indicating that the consumable to be used has reached the service life to the intelligent terminal;
f6: determining a second difference between the age and the first difference, performing F7;
f7: and carrying second use prompt information of the second difference value to the intelligent terminal, wherein the second difference value indicates the time length when the distance reaches the service life of the consumable to be authenticated.
6. Intelligent terminal, its characterized in that includes:
the information receiving module is used for receiving a Bluetooth search request input from the outside;
the information processing module is used for determining whether a Bluetooth signal which is sent by the consumable to be authenticated and corresponds to the first identification information in the Bluetooth search request received by the information receiving module can be searched, if so, S3 is executed, otherwise, S6 is executed; s3: acquiring the authentication information of the consumable to be authenticated through the Bluetooth signal, and triggering an information sending module to execute S4; s5: when the information receiving module receives the authentication result of the consumable to be authenticated determined by the background server according to the authentication information sent by the information sending module, displaying the authentication result; s6: outputting abnormal prompt information indicating that the consumable to be authenticated is abnormal in authentication;
the information sending module is configured to execute S4: and sending the authentication information to an external background server so that the background server determines the authentication result of the consumable item to be authenticated according to the authentication information.
7. A backend server, comprising:
the information interaction module is used for receiving authentication information of the consumable to be authenticated sent by an external intelligent terminal; sending the authentication result determined by the data processing module to the intelligent terminal sending the authentication information;
and the data processing module is used for determining the authentication result of the consumable to be authenticated according to prestored data and the authentication information received by the information interaction module.
8. A consumable authentication system, comprising: at least one intelligent terminal as claimed in claim 6 and a backend server as claimed in claim 7.
9. A storage medium, comprising: at least one memory and at least one processor;
the at least one memory to store a machine readable program;
the at least one processor, for invoking the machine readable program, to perform the consumable authentication method of any of claims 1-5.
10. Computer readable medium, characterized in that it has stored thereon computer instructions which, when executed by a processor, cause the processor to execute the consumable authentication method according to any one of claims 1 to 5.
CN202010358815.2A 2020-04-29 2020-04-29 Consumable authentication method and system, intelligent terminal and background server Pending CN111565381A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010358815.2A CN111565381A (en) 2020-04-29 2020-04-29 Consumable authentication method and system, intelligent terminal and background server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010358815.2A CN111565381A (en) 2020-04-29 2020-04-29 Consumable authentication method and system, intelligent terminal and background server

Publications (1)

Publication Number Publication Date
CN111565381A true CN111565381A (en) 2020-08-21

Family

ID=72071861

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010358815.2A Pending CN111565381A (en) 2020-04-29 2020-04-29 Consumable authentication method and system, intelligent terminal and background server

Country Status (1)

Country Link
CN (1) CN111565381A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114928839A (en) * 2022-05-10 2022-08-19 四川虹美智能科技有限公司 Anti-counterfeiting authentication system and method for NFC label

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101706928A (en) * 2009-11-04 2010-05-12 中国联合网络通信集团有限公司 Authentication method and system of product information and control platform
CN104282067A (en) * 2014-10-17 2015-01-14 广东美的生活电器制造有限公司 Communication connection device, household appliance and electric heating kettle
CN105260892A (en) * 2015-09-10 2016-01-20 上海乔马电子科技有限公司 Anti-counterfeiting verification and sales information obtaining method and anti-counterfeiting verification and sales information obtaining system
US20180072064A1 (en) * 2016-09-09 2018-03-15 SCREEN Holdings Co., Ltd. System for managing appropriateness of use of consumables for printing apparatus and method for managing appropriateness of use of consumables for printing apparatus
CN109670563A (en) * 2018-12-24 2019-04-23 湖南闪知大数据科技有限公司 A kind of anti-counterfeit authentication method and device
CN110264218A (en) * 2019-05-05 2019-09-20 深圳安吉尔饮水产业集团有限公司 Consumable anti-counterfeiting method and consumable anti-counterfeiting system
CN110428889A (en) * 2019-07-15 2019-11-08 老肯医疗科技股份有限公司 A kind of system for tracing and managing and its application method of medical sterilization consumptive material

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101706928A (en) * 2009-11-04 2010-05-12 中国联合网络通信集团有限公司 Authentication method and system of product information and control platform
CN104282067A (en) * 2014-10-17 2015-01-14 广东美的生活电器制造有限公司 Communication connection device, household appliance and electric heating kettle
CN105260892A (en) * 2015-09-10 2016-01-20 上海乔马电子科技有限公司 Anti-counterfeiting verification and sales information obtaining method and anti-counterfeiting verification and sales information obtaining system
US20180072064A1 (en) * 2016-09-09 2018-03-15 SCREEN Holdings Co., Ltd. System for managing appropriateness of use of consumables for printing apparatus and method for managing appropriateness of use of consumables for printing apparatus
CN109670563A (en) * 2018-12-24 2019-04-23 湖南闪知大数据科技有限公司 A kind of anti-counterfeit authentication method and device
CN110264218A (en) * 2019-05-05 2019-09-20 深圳安吉尔饮水产业集团有限公司 Consumable anti-counterfeiting method and consumable anti-counterfeiting system
CN110428889A (en) * 2019-07-15 2019-11-08 老肯医疗科技股份有限公司 A kind of system for tracing and managing and its application method of medical sterilization consumptive material

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郭强: "基于RFID的医疗耗材管理系统研究与实现", 《中国优秀硕士学位论文全文数据库(电子期刊)》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114928839A (en) * 2022-05-10 2022-08-19 四川虹美智能科技有限公司 Anti-counterfeiting authentication system and method for NFC label

Similar Documents

Publication Publication Date Title
CN104941302B (en) Purifier, filter core, filter core false proof device and method
CN109729046B (en) Two-dimensional code scanning method and terminal, authentication method and server and service system
EP2453398A1 (en) Product authentication system
EP1618756A1 (en) Mobile communication terminal having a function of reading out information from contactless type communication tag and method for providing information of whether an article is genuine or not
CN113065622B (en) Service handling method, terminal and server
TWI529641B (en) System for verifying data displayed dynamically by mobile and method thereof
CN105096143A (en) Anti-counterfeiting method, anti-counterfeiting system, server and intelligent terminal
CN110415414A (en) The unlocking method and device of dynamic puzzle-lock based on both sides' verifying
WO2015063495A1 (en) Transaction authentication
CN105139205A (en) Payment verification method, terminal and server
CN117957812A (en) Anti-counterfeiting verification method, hardware device, system, electronic equipment and storage medium
US9672505B2 (en) Method for verifying the authenticity of a terminal, corresponding device and program
US20230037023A1 (en) Registration Device, Verification Device, Identification Device, and Individual Identification System
CN111565381A (en) Consumable authentication method and system, intelligent terminal and background server
EP4155992A1 (en) Counterfeit hardware detection techniques
US20140344162A1 (en) Method and system for enhancing the security of electronic transactions
CN114207647A (en) Information processing apparatus, payment processing system, method, and program
CN112561015B (en) Bar code encoding and decoding method, device, system, equipment and medium
EP1515476A1 (en) Data communication system, information processing device and method, recording medium, and program
CN113569204B (en) Remote production authorization management system and method
US8843593B2 (en) Information distribution system, information processing server, distribution server, communication apparatus, program and information distribution method
CN106375085B (en) Password verification method, device and system
CN110225034B (en) Method, device and equipment for protecting identity card information, identity card, server and storage medium
CN109634602B (en) Electronic device, man-machine voting recognition method, and storage medium
TW201222317A (en) Data processing methods and systems for processing data in an operation having a predetermined flow based on CAPTCHA (Completely Automated Public Test to tell Computers and Humans Apart) data, and computer program products thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200821