Electronic label anti-counterfeiting and sales chain information management system
[ad_1]
1. Demand analysis;
Purpose: To achieve the label as the identification medium of the product sales status, and cooperate with the terminal to realize the data collection of the information of the product in the sales chain from time to time.
Technical requirements: Adopt self-adhesive, the label will self-destruct after unpacking; the ID number of the label can be read.
Technical difficulties: The label needs to be pasted on the main body of the mobile phone (not on detachable accessories), and the viscosity of the label is good enough to be stuck on the smoothest surface, and the label is damaged during the tearing process. The label is very small (the size is preferably less than 1*2.5mm), which increases the difficulty of reading and writing. The label is attached to the mobile phone, the mobile phone is in the packaging box, and the mobile phone is packaged in a large packaging box. The labeling direction is complicated. And the uncertainty of the attributes of the packaging increases the difficulty of reading the label. These problems can only be determined after experimentation.
2. Principles of anti-counterfeiting technology:
A. Uniqueness of tag UID
We use electronic tags, and there are only 4-5 companies in the world that produce the core chips of electronic tags. The ID number generation algorithm of the electronic tag can ensure that the UID of the electronic tag will not be repeated. In addition to the reputation and management of several companies, it will not be used in the market for some users to customize this tag number segment that can infringe the interests of other users. Therefore, the UID of the electronic tag can be guaranteed to be unique.
B. Anti-transfer of electronic tags
When the electronic label is pasted on our products, we are required to ensure the firmness of the electronic label. This can be achieved with the current technology. What we are most concerned about is to prevent someone from transferring these labels out of some malicious intent, such as removing the labels through extreme means such as heating. We adopt a special method in our technology. When the label is removed, the label can be self-destructed and cannot be recycled.
C. Data relevance
The uniqueness of the label number is not enough. Through the generation and use of these data, the system establishes a data relationship that is independent and has conditions of use, forming a complete data generation, audit, certification, authorization, reception, issuance, use, and log verification system , To ensure the security and availability of data.
The label manufacturer only needs to supply the label, and the ID of these labels is invalid in the system at this time;
The headquarters needs to read and enter the tag ID to form the legal ID data of the tag, and send it out to each production plant to form the legal ID data that can be used by this plant.
After the production is completed, the manufacturer associates the ID label with the product data to generate the warehousing data, and at the same time sends this data to the headquarters, and the headquarters compares the legitimacy of the ID data of the label as the headquarters inventory data; the product data includes name and model , Mobile phone serial code, time, quantity and other required data.
When the product is shipped out of the factory and the agent is specified, the completed outbound data is formed and then submitted to the headquarters. After the headquarters is reviewed, it is entered into the database to form effective sales data. The headquarters also sends this data to the agent terminal to form the agent purchase data;
After receiving the goods, the agent reads the label and enters the warehouse. The generated warehousing data is compared with the purchase data locally, and the result of the comparison is sent to the headquarters, and an error alarm is issued;
When the agent is out of the warehouse, it takes time to send the related information such as ID to the headquarters to form an agent sales list at the headquarters. The list includes the agent name, product name, ID number, product model, outbound (sale) time, and inbound Time (purchasing), label status, etc. The sales list formed here needs to determine whether the equipment is legal, the location is correct, whether the operation is authorized, whether the data is legal (encryption and decryption), and whether the comparison with the sales data of the headquarters is correct, etc. If the outbound ID data of the production has defined the outbound direction and receiver, the inbound and outbound of the receiver must also be verified with the upper layer data. In this way, an interlocking data link is formed to ensure the correctness of product circulation. If the data in each step does not match the data in the previous step, the headquarters will receive an alarm and form a list of abnormal data for an agent.
D. Data encryption: The 3DES algorithm is used to encrypt and decrypt data.
E. Relationship between parties: label manufacturing, label validity entry, production process data collection, data review upload server, and agent sales data transmission are completed by the four parties respectively to avoid artificial fraud in intermediate links.
F. Terminal security: data encrypted transmission
Only authorized devices can send and receive data
Authorize SAM card authentication data to be valid
Authorized operators to send data valid
Effective location to send data
The sales data is uploaded at one time and checked with the warehousing data to determine the validity
All background and terminal operations must form an operation log, which can be checked.
G. Inspection machine: The staff carries a special terminal to conduct irregular inspections of the agent’s inventory equipment.
H. Data structure: (to be determined)
Outbound time + Inbound time + Product name + UID + 15-digit electronic serial code + Outbound location (compared to the original location number) + SAM card + operator + equipment number + status + other required data
Three, system structure
620)this.style.width=620;” border=0>
Four, label design and installation
A. Where to paste the label: The label can only be pasted on important parts of the fuselage, not on accessories, lenses, or batteries. The reason is that these accessories can be replaced by users.
B. How to calculate the viscosity of the label: There are many processes used in the case of the mobile phone, and the appearance is distinguished, there are smooth, pitted, and varnished; materials: plastic, metal, and synthetic products;
C. Label size: Can not be customized too much, and the location where the mobile phone can choose to paste is very small. The principle of the label is that the smaller the size, the weaker the signal, and the specific specifications and reading and writing need to be designed-experimentally-proven.
D. Label frequency: Interference is an important factor affecting the accuracy of label reading. The lower the frequency, the longer the wavelength, the stronger the penetration ability. Because at least 30 labels need to be read at the same time, the design of the card reader needs to have anti-collision function. These also need to be verified by experiments.
5. Description of audit function:
Inspection is a special device held by headquarter personnel or regional representatives to read and verify the products of agents one by one. The verification method is realized by reading the electronic tag ID data on the mobile phone with a dedicated terminal and comparing it with the downloaded agent inventory data, and sending the comparison result to the headquarters server. Data information includes verifier, terminal number, location information, time, agent name, product information, verification result information, etc.
Verification process:
Power on—swipe to log in—download the agent’s inventory data—read tags—upload the comparison results to the headquarters server
6. Headquarters
The headquarters set up servers and management terminals to wirelessly collect and manage manufacturer data and agent sales data across the country; constantly monitor the validity and correctness of the data in the sales chain; automatically count abnormal data and settle the data with financials. Various data of products and sellers can be inquired separately; labels, equipment, operators can be authorized; production data can be issued, sales data can be issued, etc.
620)this.style.width=620;” border=0>
Headquarters interface:
Agent name XXX Inventory data XXX Abnormal data XXX Number of inspections XXX
620)this.style.width=620;” border=0>
Seven, front-end collection anti-counterfeiting mode design:
A. Handheld high-power wireless mode:
Suitable for mobile FCL tag reading, the number of tags is less than or equal to 30 tags; the difficulty lies in the accuracy of tag reading, it is necessary to design a high-power external reading antenna; it is necessary to design the best state of the frequency combination of the tag and the antenna, Need to be experimentally realized.
620)this.style.width=620;” border=0>
B. Fixed high-power wireless mode:
It is suitable for fixing the antenna and moving the whole box of products to read within the range of the antenna. For higher reading efficiency, it is recommended to use two antennas, one on top and one on the side. This kind of scheme is ideal if it is a pipeline operation. It can also be applied to the warehouse and assembly line of production.
620)this.style.width=620;” border=0>
C. Handheld wireless mode one:
It is suitable for unpacking, reading on each small package, and sending it to the headquarters server from time to time. This kind of cost is lower, but it is troublesome to unpack and read small package labels.
620)this.style.width=620;” border=0>
D. Handheld wireless mode two:
It is suitable for unpacking and reading on each small package. This machine is a single-task processor and can only batch process the data and send it to the headquarters server. This kind of cost is the lowest, but it is troublesome to unpack and read small packages.
620)this.style.width=620;” border=0>
[ad_2]