CN116128001A - Anti-counterfeiting tracking method and device - Google Patents
Anti-counterfeiting tracking method and device Download PDFInfo
- Publication number
- CN116128001A CN116128001A CN202211632080.3A CN202211632080A CN116128001A CN 116128001 A CN116128001 A CN 116128001A CN 202211632080 A CN202211632080 A CN 202211632080A CN 116128001 A CN116128001 A CN 116128001A
- Authority
- CN
- China
- Prior art keywords
- consumable
- target
- serial number
- information
- tag information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 230000004913 activation Effects 0.000 claims abstract description 49
- 238000004364 calculation method Methods 0.000 claims abstract description 20
- 238000004422 calculation algorithm Methods 0.000 claims description 35
- 239000000463 material Substances 0.000 claims description 15
- 238000004519 manufacturing process Methods 0.000 claims description 13
- 125000004122 cyclic group Chemical group 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 13
- 238000004891 communication Methods 0.000 description 8
- 101100327917 Caenorhabditis elegans chup-1 gene Proteins 0.000 description 5
- 238000012795 verification Methods 0.000 description 4
- 238000004590 computer program Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000013500 data storage Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000005389 magnetism Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000001356 surgical procedure Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0029—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H40/00—ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Business, Economics & Management (AREA)
- Biomedical Technology (AREA)
- Bioethics (AREA)
- Epidemiology (AREA)
- Medical Informatics (AREA)
- Primary Health Care (AREA)
- Public Health (AREA)
- Medical Treatment And Welfare Office Work (AREA)
- Storage Device Security (AREA)
Abstract
The application provides an anti-counterfeiting tracking method and device, comprising the following steps: acquiring tag information in the target consumable, and performing decryption calculation on the check code in the tag information to judge whether the check code is correct or not and whether the target consumable does not exceed the effective service life or not; if the check code is correct and the check code does not exceed the period, judging whether the flag bit of the activation flag in the tag information is valid or not and whether the serial number is repeated with the serial number information in the target database or not in sequence; if the flag bit of the activation flag is valid and is not repeated with the serial number information in the target database, the target consumable is a usable consumable, the flag bit of the activation flag is modified, and the serial number in the tag information is stored in the target database. The anti-plagiarism and anti-reuse and anti-overdue use of the consumable matched with the active medical instrument can be realized, the use position and the use amount of the consumable are tracked, and the efficiency and the safety of the consumable are obviously improved.
Description
Technical Field
The application relates to the technical field of medical instruments, in particular to an anti-counterfeiting tracking method and device.
Background
In the medical field, often can relate to the consumable use of active instrument, because the quantity of consumable is big, and used repeatedly or overdue the use probably can lead to the security risk, so the design of preventing falsification and use tracking to the consumable are increasingly important.
An electronic tag (RFID) is a non-contact automatic identification technology, which is used for identifying a target object and acquiring related data through radio frequency signals, does not need manual intervention in identification work, and is used as a wireless version of a bar code, and the RFID technology has the advantages of water resistance, magnetism resistance, high temperature resistance, long service life, large reading distance, encryption of data on the tag, larger data storage capacity, free change of stored information and the like, which are not possessed by the bar code. At present, the prior art is often based on an electronic tag (RFID) method to realize information reading of consumable materials, and the information reading of the consumable materials can be realized through a bar code or a two-dimensional code, so that the anti-counterfeiting and tracking of the consumable materials are realized, and the method is mostly realized directly based on a database of the Internet of things.
In the scheme, the anti-counterfeiting and tracking of consumables are directly realized based on the database of the Internet of things, the network security risk is high, and continuous maintenance is required, so that the efficiency and the security are low.
Disclosure of Invention
The application provides an anti-counterfeiting tracking method and device, which can realize anti-plagiarism, anti-reuse and anti-overdue use of consumable matched with active medical equipment, and track the use position and the use amount of the consumable, and the efficiency and the safety of the consumable are obviously improved.
In one aspect, there is provided a method of anti-counterfeiting tracking, the method comprising:
acquiring label information in target consumable materials; the tag information is read by a reader-writer arranged on a target active instrument end matched with the target consumable; the tag information comprises at least one of a serial number, a validity period, an activation flag, product information and a check code;
decrypting and calculating the check code in the tag information to judge whether the check code is correct or not and whether the target consumable does not exceed the valid service life or not;
if the check code is correct and the target consumable does not exceed the valid service period, sequentially judging whether the flag bit of the activation flag in the tag information is valid or not and whether the serial number is repeated with serial number information in a target database or not;
if the flag bit of the activation flag is valid and is not repeated with the serial number information in the target database, the target consumable is a usable consumable, the flag bit of the activation flag is modified, and the serial number in the tag information is stored in the target database.
In yet another aspect, there is provided an anti-counterfeiting tracking device, the device comprising:
the tag information acquisition module is used for acquiring tag information in the target consumable; the tag information is read by a reader-writer arranged on a target active instrument end matched with the target consumable; the tag information comprises at least one of a serial number, a validity period, an activation flag, product information and a check code;
the first judging module is used for carrying out decryption calculation on the check code in the tag information so as to judge whether the check code is correct or not and whether the target consumable does not exceed the valid service life or not;
the second judging module is used for judging whether the flag bit of the activation flag in the tag information is valid or not and whether the serial number is repeatedly compared with serial number information in a target database or not in sequence if the check code is correct and the target consumable does not exceed the valid service period;
and the consumable determining module is used for modifying the flag bit of the activation flag and storing the serial number in the tag information into the target database if the flag bit of the activation flag is valid and is not repeated with the serial number information in the target database, wherein the target consumable is a consumable.
In one possible embodiment, the apparatus is further for:
if the check code is wrong or the target consumable exceeds the effective use period, judging that the target consumable is an invalid consumable and sending out invalid consumable prompt information.
In one possible embodiment, the apparatus is further for:
if the flag bit of the activation flag is invalid or the serial number in the tag information is repeated with the serial number information in the target database, the target consumable is judged to be an invalid consumable, and invalid consumable prompt information is sent out.
In one possible embodiment, the product information includes at least one of a product production specification and a manufacturer's home;
in one possible embodiment, the check code is obtained by performing encryption calculation on at least one of the product production specification, the manufacturer, the validity period, and the serial number.
In one possible implementation, the encryption algorithm used for decrypting the check code in the tag information includes at least one of a parity encryption algorithm, a checksum encryption algorithm, a longitudinal redundancy check encryption algorithm, and a cyclic redundancy check encryption algorithm.
In one possible implementation, the target database includes at least one of a local database of a stand-alone device and a network database of a networked device.
In yet another aspect, a computer device is provided that includes a processor and a memory having at least one instruction stored therein that is loaded and executed by the processor to implement an anti-counterfeiting tracking method as described above.
In yet another aspect, a computer-readable storage medium having stored therein at least one instruction loaded and executed by a processor to implement a method of anti-counterfeiting tracking as described above is provided.
The technical scheme that this application provided can include following beneficial effect:
acquiring tag information in the target consumable, and performing decryption calculation on a check code in the tag information to judge whether the check code is correct or not and whether the target consumable does not exceed the effective service life or not; if the check code is correct and the target consumable does not exceed the valid service period, sequentially judging whether the flag bit of the activation flag in the tag information is valid or not and whether the serial number is repeated with serial number information in a target database or not; if the flag bit of the activation flag is valid and not repeated with the serial number information in the target database, the target consumable is a usable consumable, the flag bit of the activation flag is modified, and the serial number in the tag information is stored in the target database.
In the scheme, the use of the check code is matched with the check algorithm identification of the active medical instrument, so that the simple plagiarism, repeated use and overdue use of the tag content in the consumable can be avoided; the verification code is matched with the database serial number identification of the active medical instrument, so that the consumable is more difficult to copy; reading and writing of an activated flag bit in the tag information and software judgment are carried out, so that the consumable material is prevented from being reused; the database of the consumable serial number is uploaded and stored, and the position of the active medical equipment is matched, so that the use condition of the consumable can be tracked in real time, accurate data is provided for the consumable use amount calculation of manufacturers, and the use efficiency and the safety are improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are needed in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of an anti-counterfeiting tracking system according to an exemplary embodiment.
Fig. 2 is a method flow diagram illustrating a method of anti-counterfeiting tracking, according to an example embodiment.
Fig. 3 is a method flow diagram illustrating a method of anti-counterfeiting tracking, according to an example embodiment.
Fig. 4 is a schematic diagram showing the composition of data information within a consumable tag, according to an example embodiment.
Fig. 5 is a method flow diagram illustrating a method of anti-counterfeiting tracking, according to an example embodiment.
Fig. 6 is a block diagram illustrating the structure of an anti-counterfeiting tracking device according to an example embodiment.
Fig. 7 shows a block diagram of a computer device according to an exemplary embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made apparent and fully in view of the accompanying drawings, in which some, but not all embodiments of the invention are shown. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
It should be understood that, in the description of the embodiments of the present application, the term "corresponding" may indicate that there is a direct correspondence or an indirect correspondence between the two, or may indicate that there is an association between the two, or may indicate a relationship between the two and the indicated, configured, or the like.
Fig. 1 is a schematic diagram of an anti-counterfeiting tracking system according to an exemplary embodiment. The system comprises a server 110, an RFID reader-writer 120 installed on the active instrument end and an RFID tag 130 added in consumable materials.
Optionally, the RFID tag 130 is set and written into each consumable before leaving the factory, the consumables are matched with the active apparatuses, the RFID reader 120 at the active apparatus end reads and identifies the RFID tag 130 in each consumable, further confirms whether the identified consumable is a genuine product, whether the identified consumable is used for the first time or not, if the identified consumable is a genuine product, the active apparatuses are allowed to enter the next operation if the identified consumable is used for the first time in the validity period, the information of the consumable is stored locally, the serial number of the consumable is in communication connection with the server 110 through a transmission network (such as a wireless communication network), and the serial number of the consumable is uploaded to the server 110 and shared with other hospitals with the same type of active medical apparatuses.
Alternatively, since the information in the RFID tag 130 in each consumable is recorded in the consumable by encryption before leaving the factory, after the RFID reader 120 at the active instrument side reads the RFID tag 130 in each consumable, the read information can be decrypted by the server 110 to earn and obtain the information recorded in the RFID tag.
Alternatively, the server 110 may be a server cluster or a distributed system formed by a plurality of physical servers, and may also be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs, and technical computing services such as big data and artificial intelligence platforms.
Optionally, the system may further include a management device, where the management device is configured to manage the system (e.g., manage a connection state between each module and the server, etc.), where the management device is connected to the server through a communication network. Optionally, the communication network is a wired network or a wireless network.
Alternatively, the wireless network or wired network described above uses standard communication techniques and/or protocols. The network is typically the internet, but may be any other network including, but not limited to, a local area network, a metropolitan area network, a wide area network, a mobile, a limited or wireless network, a private network, or any combination of virtual private networks. In some embodiments, techniques and/or formats including hypertext markup language, extensible markup language, and the like are used to represent data exchanged over a network. All or some of the links may also be encrypted using conventional encryption techniques such as secure socket layer, transport layer security, virtual private network, internet protocol security, etc. In other embodiments, custom and/or dedicated data communication techniques may also be used in place of or in addition to the data communication techniques described above.
Fig. 2 is a method flow diagram illustrating a method of anti-counterfeiting tracking, according to an example embodiment. The method is performed by a computer device, which may be a server 110 as shown in fig. 1. As shown in fig. 2, the method may include the steps of:
s201, acquiring label information in target consumable materials; the tag information is read by a reader-writer arranged on a target active instrument end matched with the target consumable; the tag information includes at least one of a serial number, an activation flag, product information, and a check code.
In a possible implementation manner, when any consumable matched with the active instrument end is to be read, the RFID reader-writer installed at the active instrument end is used for reading and identifying the tag information in the consumable to be read, so that the tag information in the target consumable is obtained. The label information of the target consumable is preset specific information in the production process.
Further, the tag information includes at least one of a serial number of the consumable, an activation flag of the consumable, product information of the consumable, and a check code of the consumable, wherein the serial number of the consumable is also called a "machine code", is a same article, is generally a unique identification code of an electronic product, and is commonly used for anti-counterfeiting and tracking; the consumable activation mark is used for identifying whether the consumable is used for the first time; the check code of the consumable is calculated by an encryption algorithm based on the serial number, the activation mark, the product information and other data and is used for identification and anti-counterfeiting.
Further, the information content of the tag information is only given by way of example, and in practical application, the information content of the tag information can be reduced and designed as required, and the design can be increased; that is, the information content in the tag information is not limited to the serial number of the consumable, the activation flag of the consumable, the product information of the consumable, and the check code of the consumable, and can be increased or decreased, and the synonymous replacement of nouns can be performed, which all fall into the protection scope of the present application.
S202, performing decryption calculation on the check code in the tag information to judge whether the check code is correct or not and whether the target consumable does not exceed the valid service life or not.
In one possible implementation manner, since the check code of the consumable is obtained by calculating based on the serial number, the activation flag, the product information and other data through an encryption algorithm and is preset in the tag information before the consumable leaves the factory, when the RFID reader-writer at the active instrument end reads the RFID tag in the consumable, the check code in the tag information needs to be decrypted and calculated, and after decryption, whether the check code in the tag information is correct or not can be judged, and whether the consumable does not exceed the effective service life or not can be judged through the product information.
And S203, if the check code is correct and the target consumable does not exceed the valid service period, sequentially judging whether the flag bit of the activation flag in the tag information is valid or not and whether the serial number is repeated with serial number information in a target database or not.
In one possible implementation manner, after the decryption calculation, if the check code is correct and the consumable does not exceed the valid service life, it is further required to determine whether the flag bit of the activation flag in the tag information is valid, and repeatedly determine whether the serial number is identical to the serial number information in the target database, so as to determine whether the consumable is used and recorded in the target database; thereby realizing the tracking of the consumable.
S204, if the flag bit of the activation flag is valid and is not repeated with the serial number information in the target database, the target consumable is a usable consumable, the flag bit of the activation flag is modified, and the serial number in the tag information is stored in the target database.
In one possible implementation manner, if the flag bit of the activation flag is valid and both conditions that are not repeated with the serial number information in the target database are satisfied, determining that the consumable is first-time used and is a usable consumable; in order to ensure effective tracking of consumable information and avoid reuse, the mark bit of the activation mark needs to be modified and the serial number in the label information needs to be stored in a target database during use. The target database is used for recording the use position and the number of consumable materials.
In summary, the use of the check code is matched with the identification of the check algorithm of the active medical instrument, so that the simple plagiarism, repeated use and overdue use of the tag content in the consumable can be avoided; the verification code is matched with the database serial number identification of the active medical instrument, so that the consumable is more difficult to copy; reading and writing of an activated flag bit in the tag information and software judgment are carried out, so that the consumable material is prevented from being reused; the database of the consumable serial number is uploaded and stored, and the position of the active medical equipment is matched, so that the use condition of the consumable can be tracked in real time, accurate data is provided for the consumable use amount calculation of manufacturers, and the use efficiency and the safety are improved.
Fig. 3 is a method flow diagram illustrating a method of anti-counterfeiting tracking, according to an example embodiment. The method is performed by a computer device, which may be a server 110 as shown in fig. 1. As shown in fig. 3, the method may include the steps of:
s301, acquiring label information in target consumable materials; the tag information is read by a reader-writer arranged on a target active instrument end matched with the target consumable; the tag information includes at least one of a serial number, an activation flag, product information, and a check code.
In one possible embodiment, the product information includes at least one of a product production specification and a manufacturer's home.
In one possible implementation, the check code is obtained by performing encryption calculation on at least one of the product production specification, the manufacturer, the validity period, and the serial number.
Further, please refer to the schematic diagram of the composition of the data information in the consumable tag shown in fig. 4, wherein the tag information includes, but is not limited to, production specification, manufacturer, validity period, unique serial number (ID), activation flag and check code; the product information may include other consumable information required in addition to the product information.
Further, when the check code is obtained, the check code can be obtained by performing encryption calculation on the product production specification, the manufacturer, the validity period and several consumable information in the serial number; the above-mentioned all consumable information may be obtained by encryption calculation, or other non-listed consumable information may be obtained by encryption calculation.
S302, performing decryption calculation on the check code in the tag information to judge whether the check code is correct or not and whether the target consumable does not exceed the valid service life or not.
S303, if the check code is wrong or the target consumable exceeds the valid service period, judging that the target consumable is an invalid consumable and sending out invalid consumable prompt information.
In one possible implementation, please refer to a method flowchart of an anti-counterfeit tracking method shown in fig. 5, if the check code is wrong, the consumable may be a counterfeit consumable, if the target consumable exceeds the valid service life and cannot be used, at this time, the target consumable may be determined to be an invalid consumable, and an invalid consumable prompt message is sent to inform.
In one possible implementation, the encryption algorithm employed to decrypt the check code in the tag information includes at least one of a parity encryption algorithm, a checksum encryption algorithm, a longitudinal redundancy check encryption algorithm, a cyclic redundancy check encryption algorithm, other standard encryption algorithms, or custom algorithms.
Furthermore, the check code E in the RFID tag information in the consumable is obtained by calculating the data based on the production specification A, the manufacturer B, the serial number C, the validity period D and the like through an encryption algorithm (such as parity check, checksum, longitudinal redundancy check, cyclic redundancy check, user definition and the like), and the data information is set and written before delivery.
Taking a custom algorithm as an example, if the custom algorithm is data and the lower eight bits are check codes, the calculation formula is:
f=a+b+c+d, and the check code E takes the binary low octet of F.
As shown in fig. 5, when the consumable is used together with the active medical instrument, the RFID reader inside the active medical instrument can read all information of the tag inside the consumable; judging whether the information of the check code E1 in the tag is matched with the data such as the production specification A1, the manufacturer B1, the unique serial number C1, the validity period D1 and the like according to an encryption algorithm, and if the using date of the consumable does not exceed the validity period, entering the next flow; otherwise, prompting; if the self-defined encryption algorithm data and the low eight bits are taken as check codes, F1 = A1+ B1+ C1+ D1 is calculated first, whether E1 is equal to binary low eight bits of data of F1 is judged, if so, matching is considered, otherwise, equipment cannot be used.
S304, if the check code is correct and the target consumable does not exceed the valid service period, sequentially judging whether the flag bit of the activation flag in the tag information is valid or not and whether the serial number is repeated with serial number information in a target database or not.
S305, if the flag bit of the activation flag is invalid or the serial number in the tag information is repeated with the serial number information in the target database, judging that the target consumable is an invalid consumable, and sending out invalid consumable prompt information.
In one possible implementation manner, if the flag bit of the activation flag is invalid and two conditions that the serial number in the tag information is repeated with the serial number information in the target database are met, the target consumable is determined to be an invalid consumable, and an invalid consumable prompt message is sent out.
S306, if the flag bit of the activation flag is valid and is not repeated with the serial number information in the target database, the target consumable is a usable consumable, the flag bit of the activation flag is modified, and the serial number in the tag information is stored in the target database. The target database is used for recording the use position and the number of consumable materials.
In one possible embodiment, the target database includes at least one of a local database of a stand-alone device and a network database of a networked device, and if the target consumable is a consumable, a surgical procedure may be performed.
Furthermore, the anti-counterfeiting tracking method is not only suitable for the medical field, but also can be applied to other fields needing anti-counterfeiting and tracking of products.
In summary, the use of the check code is matched with the identification of the check algorithm of the active medical instrument, so that the simple plagiarism, the repeated use and the overdue use of the tag content in the consumable can be avoided; the verification code is matched with the database serial number identification of the active medical instrument, so that the consumable is more difficult to copy; reading and writing of an activated flag bit in the tag information and software judgment are carried out, so that the consumable material is prevented from being reused; the database of the consumable serial number is uploaded and stored, and the position of the active medical equipment is matched, so that the use condition of the consumable can be tracked in real time, accurate data is provided for the consumable use amount calculation of manufacturers, and the use efficiency and the safety are improved.
Fig. 6 is a block diagram illustrating the structure of an anti-counterfeiting tracking device according to an example embodiment.
The device comprises:
a tag information acquiring module 601, configured to acquire tag information in a target consumable; the tag information is read by a reader-writer arranged on a target active instrument end matched with the target consumable; the tag information includes at least one of a serial number, an activation flag, product information, and a check code;
a first judging module 602, configured to perform decryption calculation on the check code in the tag information, so as to judge whether the check code is correct, and whether the target consumable does not exceed a valid lifetime;
a second judging module 603, configured to sequentially judge whether the flag bit of the activation flag in the tag information is valid and whether the serial number is repeated with serial number information in a target database if the check code is correct and the target consumable does not exceed the valid lifetime;
the consumable determining module 604 may be used to modify the flag bit of the activation flag and store the serial number in the tag information into the target database if the flag bit of the activation flag is valid and not repeated with the serial number information in the target database. The target database is used for recording the use position and the number of consumable materials.
In one possible embodiment, the device is further adapted to:
if the check code is wrong or the target consumable exceeds the effective use period, the target consumable is judged to be an invalid consumable, and an invalid consumable prompt message is sent out.
In one possible embodiment, the device is further adapted to:
if the flag bit of the activation flag is invalid or the serial number in the tag information is repeated with the serial number information in the target database, the target consumable is judged to be an invalid consumable, and invalid consumable prompt information is sent out.
In one possible embodiment, the product information includes at least one of a product production specification and a manufacturer's home;
in one possible implementation, the check code is obtained by performing encryption calculation on at least one of the product production specification, the manufacturer, the validity period, and the serial number.
In one possible implementation, the encryption algorithm employed to decrypt the check code in the tag information includes at least one of a parity encryption algorithm, a checksum encryption algorithm, a longitudinal redundancy check encryption algorithm, a cyclic redundancy check encryption algorithm, other standard encryption algorithms, or custom algorithms.
In one possible implementation, the target database includes at least one of a local database of stand-alone devices and a network database of networked devices.
In conclusion, the use of the check code is matched with the identification of the check algorithm of the active medical instrument, so that the simple plagiarism and repeated use of the tag content in the consumable can be avoided; the verification code is matched with the database serial number identification of the active medical instrument, so that the consumable is more difficult to copy; the reading and writing of the activated flag bit in the tag information and the software judgment realize the anti-reuse and anti-overdue use of consumable materials; the database of the consumable serial number is uploaded and stored, and the position of the active medical equipment is matched, so that the use condition of the consumable can be tracked in real time, accurate data is provided for the consumable use amount calculation of manufacturers, and the use efficiency and the safety are improved.
Referring to fig. 7, a block diagram of a computer device according to an exemplary embodiment of the present application is provided, where the computer device includes a memory and a processor, and the memory is configured to store a computer program, and when the computer program is executed by the processor, implement an anti-counterfeit tracking method as described above.
The processor may be a central processing unit (Central Processing Unit, CPU). The processor may also be any other general purpose processor, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof.
The memory, as a non-transitory computer readable storage medium, may be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the methods in embodiments of the present application. The processor executes various functional applications of the processor and data processing, i.e., implements the methods of the method embodiments described above, by running non-transitory software programs, instructions, and modules stored in memory.
The memory may include a memory program area and a memory data area, wherein the memory program area may store an operating system, at least one application program required for a function; the storage data area may store data created by the processor, etc. In addition, the memory may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some implementations, the memory optionally includes memory remotely located relative to the processor, the remote memory being connectable to the processor through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
In an exemplary embodiment, a computer readable storage medium is also provided for storing at least one computer program that is loaded and executed by a processor to implement all or part of the steps of the above method. For example, the computer readable storage medium may be Read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), compact disc Read-Only Memory (CD-ROM), magnetic tape, floppy disk, optical data storage device, and the like.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the present application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.
Claims (10)
1. A method of anti-counterfeiting tracking, the method comprising:
acquiring label information in target consumable materials; the tag information is read by a reader-writer arranged on a target active instrument end matched with the target consumable; the tag information comprises at least one of a serial number, a validity period, an activation flag, product information and a check code;
decrypting and calculating the check code in the tag information to judge whether the check code is correct or not and whether the target consumable does not exceed the valid service life or not;
if the check code is correct and the target consumable does not exceed the valid service period, sequentially judging whether the flag bit of the activation flag in the tag information is valid or not and whether the serial number is repeated with serial number information in a target database or not;
if the flag bit of the activation flag is valid and is not repeated with the serial number information in the target database, the target consumable is a usable consumable, the flag bit of the activation flag is modified, and the serial number in the tag information is stored in the target database.
2. The method of claim 1, wherein after said decrypting the check code in the tag information, the method further comprises:
if the check code is wrong or the target consumable exceeds the effective use period, judging that the target consumable is an invalid consumable and sending out invalid consumable prompt information.
3. The method according to claim 1, wherein after the sequentially determining whether the flag bit of the activation flag in the tag information is valid, and whether the sequence number is repeated with sequence number information in a target database, the method further comprises:
if the flag bit of the activation flag is invalid or the serial number in the tag information is repeated with the serial number information in the target database, the target consumable is judged to be an invalid consumable, and invalid consumable prompt information is sent out.
4. A method according to any one of claims 1 to 3, wherein the product information comprises at least one of a product production specification and a manufacturer's home.
5. The method of claim 4, wherein the check code is obtained by performing encryption calculations on at least one of the product manufacturing specification, the manufacturer, the expiration date, and the serial number.
6. A method according to any one of claims 1 to 3, wherein the encryption algorithm used for decrypting the check code in the tag information comprises at least one of a parity encryption algorithm, a checksum encryption algorithm, a longitudinal redundancy check encryption algorithm, and a cyclic redundancy check encryption algorithm.
7. A method according to any one of claims 1 to 3, wherein the target database comprises at least one of a local database of stand-alone devices and a network database of networked devices.
8. An anti-counterfeiting tracking device, the device comprising:
the tag information acquisition module is used for acquiring tag information in the target consumable; the tag information is read by a reader-writer arranged on a target active instrument end matched with the target consumable; the tag information comprises at least one of a serial number, a validity period, an activation flag, product information and a check code;
the first judging module is used for carrying out decryption calculation on the check code in the tag information so as to judge whether the check code is correct or not and whether the target consumable does not exceed the valid service life or not;
the second judging module is used for judging whether the flag bit of the activation flag in the tag information is valid or not and whether the serial number is repeatedly compared with serial number information in a target database or not in sequence if the check code is correct and the target consumable does not exceed the valid service period;
and the consumable determining module is used for modifying the flag bit of the activation flag and storing the serial number in the tag information into the target database if the flag bit of the activation flag is valid and is not repeated with the serial number information in the target database, wherein the target consumable is a consumable.
9. A computer device comprising a processor and a memory having stored therein at least one instruction that is loaded and executed by the processor to implement a method of anti-counterfeiting tracking according to any one of claims 1 to 7.
10. A computer readable storage medium having stored therein at least one instruction that is loaded and executed by a processor to implement a method of anti-counterfeiting tracking according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211632080.3A CN116128001A (en) | 2022-12-19 | 2022-12-19 | Anti-counterfeiting tracking method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211632080.3A CN116128001A (en) | 2022-12-19 | 2022-12-19 | Anti-counterfeiting tracking method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116128001A true CN116128001A (en) | 2023-05-16 |
Family
ID=86310917
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211632080.3A Pending CN116128001A (en) | 2022-12-19 | 2022-12-19 | Anti-counterfeiting tracking method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116128001A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117094739A (en) * | 2023-10-16 | 2023-11-21 | 湖南半岛医疗科技有限公司 | Medical consumable counterfeit identification method and device, electronic equipment and readable storage medium |
-
2022
- 2022-12-19 CN CN202211632080.3A patent/CN116128001A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117094739A (en) * | 2023-10-16 | 2023-11-21 | 湖南半岛医疗科技有限公司 | Medical consumable counterfeit identification method and device, electronic equipment and readable storage medium |
CN117094739B (en) * | 2023-10-16 | 2024-02-06 | 湖南半岛医疗科技有限公司 | Medical consumable counterfeit identification method and device, electronic equipment and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11669807B2 (en) | System and method for using RFID tags to determine sterilization of devices | |
JP7336152B2 (en) | A system that monitors the environment | |
JP2007220070A (en) | Target device, device management system, device management method, and external device | |
US20230060663A1 (en) | Playing card dealing shoe activation device | |
CN113656780B (en) | Cross-chain access control method and device | |
JP6385842B2 (en) | Information processing terminal, information processing method, and information processing system | |
CN116128001A (en) | Anti-counterfeiting tracking method and device | |
US20200351108A1 (en) | Semiconductor device, update data-providing method, update data-receiving method, and program | |
JP2008059013A (en) | Ic memory and access device for ic memory, and validity verification method | |
JP5227474B2 (en) | Device management system, device management method, and external device | |
CN111553689A (en) | Matching correlation method and system based on quadratic hash | |
KR100848791B1 (en) | Tag data recording and acquisition method that enables security verification, tag data recording and acquisition device | |
CN113849859A (en) | Linux kernel modification method, terminal device and storage medium | |
US20230024180A1 (en) | Systems and methods for tracking medical instruments cleaning and sterilization | |
CN117370960A (en) | Data destruction method, system and equipment | |
JP4073091B2 (en) | Electronic document authentication apparatus and authentication method | |
US12164985B1 (en) | System and method for selectively adjustable data exchange between a smart package and a requesting system | |
CN113010201A (en) | Firmware file identification method, firmware upgrade pairing method and device | |
CN116419729A (en) | Methods, devices and systems for storing utilization data and tracking medical products | |
WO2025012782A1 (en) | Systems and method for selectively adjustable data exchange between a smart package and a requesting system | |
WO2025012790A1 (en) | System and method for selectively adjustable data exchange between a smart package and a requesting system | |
WO2025012791A1 (en) | System and method for selectively adjustable data exchange between a smart package and a requesting system | |
KR100903125B1 (en) | Apparatus for forgery detection and circulation point verification of securities and method therefor | |
CN109523277B (en) | Product anti-counterfeiting electronic tag authentication method and system | |
US20190333003A1 (en) | Identification tag for monitoring a supply chain of an entity or a workflow of processes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |