[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN116128001A - Anti-counterfeiting tracking method and device - Google Patents

Anti-counterfeiting tracking method and device Download PDF

Info

Publication number
CN116128001A
CN116128001A CN202211632080.3A CN202211632080A CN116128001A CN 116128001 A CN116128001 A CN 116128001A CN 202211632080 A CN202211632080 A CN 202211632080A CN 116128001 A CN116128001 A CN 116128001A
Authority
CN
China
Prior art keywords
consumable
target
serial number
information
tag information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211632080.3A
Other languages
Chinese (zh)
Inventor
陈晓森
牛宇强
吴帆
周程
卢卫彬
范声芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Powersite Electric Co Ltd
Original Assignee
Suzhou Powersite Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Powersite Electric Co Ltd filed Critical Suzhou Powersite Electric Co Ltd
Priority to CN202211632080.3A priority Critical patent/CN116128001A/en
Publication of CN116128001A publication Critical patent/CN116128001A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H40/00ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Business, Economics & Management (AREA)
  • Biomedical Technology (AREA)
  • Bioethics (AREA)
  • Epidemiology (AREA)
  • Medical Informatics (AREA)
  • Primary Health Care (AREA)
  • Public Health (AREA)
  • Medical Treatment And Welfare Office Work (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides an anti-counterfeiting tracking method and device, comprising the following steps: acquiring tag information in the target consumable, and performing decryption calculation on the check code in the tag information to judge whether the check code is correct or not and whether the target consumable does not exceed the effective service life or not; if the check code is correct and the check code does not exceed the period, judging whether the flag bit of the activation flag in the tag information is valid or not and whether the serial number is repeated with the serial number information in the target database or not in sequence; if the flag bit of the activation flag is valid and is not repeated with the serial number information in the target database, the target consumable is a usable consumable, the flag bit of the activation flag is modified, and the serial number in the tag information is stored in the target database. The anti-plagiarism and anti-reuse and anti-overdue use of the consumable matched with the active medical instrument can be realized, the use position and the use amount of the consumable are tracked, and the efficiency and the safety of the consumable are obviously improved.

Description

Anti-counterfeiting tracking method and device
Technical Field
The application relates to the technical field of medical instruments, in particular to an anti-counterfeiting tracking method and device.
Background
In the medical field, often can relate to the consumable use of active instrument, because the quantity of consumable is big, and used repeatedly or overdue the use probably can lead to the security risk, so the design of preventing falsification and use tracking to the consumable are increasingly important.
An electronic tag (RFID) is a non-contact automatic identification technology, which is used for identifying a target object and acquiring related data through radio frequency signals, does not need manual intervention in identification work, and is used as a wireless version of a bar code, and the RFID technology has the advantages of water resistance, magnetism resistance, high temperature resistance, long service life, large reading distance, encryption of data on the tag, larger data storage capacity, free change of stored information and the like, which are not possessed by the bar code. At present, the prior art is often based on an electronic tag (RFID) method to realize information reading of consumable materials, and the information reading of the consumable materials can be realized through a bar code or a two-dimensional code, so that the anti-counterfeiting and tracking of the consumable materials are realized, and the method is mostly realized directly based on a database of the Internet of things.
In the scheme, the anti-counterfeiting and tracking of consumables are directly realized based on the database of the Internet of things, the network security risk is high, and continuous maintenance is required, so that the efficiency and the security are low.
Disclosure of Invention
The application provides an anti-counterfeiting tracking method and device, which can realize anti-plagiarism, anti-reuse and anti-overdue use of consumable matched with active medical equipment, and track the use position and the use amount of the consumable, and the efficiency and the safety of the consumable are obviously improved.
In one aspect, there is provided a method of anti-counterfeiting tracking, the method comprising:
acquiring label information in target consumable materials; the tag information is read by a reader-writer arranged on a target active instrument end matched with the target consumable; the tag information comprises at least one of a serial number, a validity period, an activation flag, product information and a check code;
decrypting and calculating the check code in the tag information to judge whether the check code is correct or not and whether the target consumable does not exceed the valid service life or not;
if the check code is correct and the target consumable does not exceed the valid service period, sequentially judging whether the flag bit of the activation flag in the tag information is valid or not and whether the serial number is repeated with serial number information in a target database or not;
if the flag bit of the activation flag is valid and is not repeated with the serial number information in the target database, the target consumable is a usable consumable, the flag bit of the activation flag is modified, and the serial number in the tag information is stored in the target database.
In yet another aspect, there is provided an anti-counterfeiting tracking device, the device comprising:
the tag information acquisition module is used for acquiring tag information in the target consumable; the tag information is read by a reader-writer arranged on a target active instrument end matched with the target consumable; the tag information comprises at least one of a serial number, a validity period, an activation flag, product information and a check code;
the first judging module is used for carrying out decryption calculation on the check code in the tag information so as to judge whether the check code is correct or not and whether the target consumable does not exceed the valid service life or not;
the second judging module is used for judging whether the flag bit of the activation flag in the tag information is valid or not and whether the serial number is repeatedly compared with serial number information in a target database or not in sequence if the check code is correct and the target consumable does not exceed the valid service period;
and the consumable determining module is used for modifying the flag bit of the activation flag and storing the serial number in the tag information into the target database if the flag bit of the activation flag is valid and is not repeated with the serial number information in the target database, wherein the target consumable is a consumable.
In one possible embodiment, the apparatus is further for:
if the check code is wrong or the target consumable exceeds the effective use period, judging that the target consumable is an invalid consumable and sending out invalid consumable prompt information.
In one possible embodiment, the apparatus is further for:
if the flag bit of the activation flag is invalid or the serial number in the tag information is repeated with the serial number information in the target database, the target consumable is judged to be an invalid consumable, and invalid consumable prompt information is sent out.
In one possible embodiment, the product information includes at least one of a product production specification and a manufacturer's home;
in one possible embodiment, the check code is obtained by performing encryption calculation on at least one of the product production specification, the manufacturer, the validity period, and the serial number.
In one possible implementation, the encryption algorithm used for decrypting the check code in the tag information includes at least one of a parity encryption algorithm, a checksum encryption algorithm, a longitudinal redundancy check encryption algorithm, and a cyclic redundancy check encryption algorithm.
In one possible implementation, the target database includes at least one of a local database of a stand-alone device and a network database of a networked device.
In yet another aspect, a computer device is provided that includes a processor and a memory having at least one instruction stored therein that is loaded and executed by the processor to implement an anti-counterfeiting tracking method as described above.
In yet another aspect, a computer-readable storage medium having stored therein at least one instruction loaded and executed by a processor to implement a method of anti-counterfeiting tracking as described above is provided.
The technical scheme that this application provided can include following beneficial effect:
acquiring tag information in the target consumable, and performing decryption calculation on a check code in the tag information to judge whether the check code is correct or not and whether the target consumable does not exceed the effective service life or not; if the check code is correct and the target consumable does not exceed the valid service period, sequentially judging whether the flag bit of the activation flag in the tag information is valid or not and whether the serial number is repeated with serial number information in a target database or not; if the flag bit of the activation flag is valid and not repeated with the serial number information in the target database, the target consumable is a usable consumable, the flag bit of the activation flag is modified, and the serial number in the tag information is stored in the target database.
In the scheme, the use of the check code is matched with the check algorithm identification of the active medical instrument, so that the simple plagiarism, repeated use and overdue use of the tag content in the consumable can be avoided; the verification code is matched with the database serial number identification of the active medical instrument, so that the consumable is more difficult to copy; reading and writing of an activated flag bit in the tag information and software judgment are carried out, so that the consumable material is prevented from being reused; the database of the consumable serial number is uploaded and stored, and the position of the active medical equipment is matched, so that the use condition of the consumable can be tracked in real time, accurate data is provided for the consumable use amount calculation of manufacturers, and the use efficiency and the safety are improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are needed in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of an anti-counterfeiting tracking system according to an exemplary embodiment.
Fig. 2 is a method flow diagram illustrating a method of anti-counterfeiting tracking, according to an example embodiment.
Fig. 3 is a method flow diagram illustrating a method of anti-counterfeiting tracking, according to an example embodiment.
Fig. 4 is a schematic diagram showing the composition of data information within a consumable tag, according to an example embodiment.
Fig. 5 is a method flow diagram illustrating a method of anti-counterfeiting tracking, according to an example embodiment.
Fig. 6 is a block diagram illustrating the structure of an anti-counterfeiting tracking device according to an example embodiment.
Fig. 7 shows a block diagram of a computer device according to an exemplary embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made apparent and fully in view of the accompanying drawings, in which some, but not all embodiments of the invention are shown. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
It should be understood that, in the description of the embodiments of the present application, the term "corresponding" may indicate that there is a direct correspondence or an indirect correspondence between the two, or may indicate that there is an association between the two, or may indicate a relationship between the two and the indicated, configured, or the like.
Fig. 1 is a schematic diagram of an anti-counterfeiting tracking system according to an exemplary embodiment. The system comprises a server 110, an RFID reader-writer 120 installed on the active instrument end and an RFID tag 130 added in consumable materials.
Optionally, the RFID tag 130 is set and written into each consumable before leaving the factory, the consumables are matched with the active apparatuses, the RFID reader 120 at the active apparatus end reads and identifies the RFID tag 130 in each consumable, further confirms whether the identified consumable is a genuine product, whether the identified consumable is used for the first time or not, if the identified consumable is a genuine product, the active apparatuses are allowed to enter the next operation if the identified consumable is used for the first time in the validity period, the information of the consumable is stored locally, the serial number of the consumable is in communication connection with the server 110 through a transmission network (such as a wireless communication network), and the serial number of the consumable is uploaded to the server 110 and shared with other hospitals with the same type of active medical apparatuses.
Alternatively, since the information in the RFID tag 130 in each consumable is recorded in the consumable by encryption before leaving the factory, after the RFID reader 120 at the active instrument side reads the RFID tag 130 in each consumable, the read information can be decrypted by the server 110 to earn and obtain the information recorded in the RFID tag.
Alternatively, the server 110 may be a server cluster or a distributed system formed by a plurality of physical servers, and may also be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs, and technical computing services such as big data and artificial intelligence platforms.
Optionally, the system may further include a management device, where the management device is configured to manage the system (e.g., manage a connection state between each module and the server, etc.), where the management device is connected to the server through a communication network. Optionally, the communication network is a wired network or a wireless network.
Alternatively, the wireless network or wired network described above uses standard communication techniques and/or protocols. The network is typically the internet, but may be any other network including, but not limited to, a local area network, a metropolitan area network, a wide area network, a mobile, a limited or wireless network, a private network, or any combination of virtual private networks. In some embodiments, techniques and/or formats including hypertext markup language, extensible markup language, and the like are used to represent data exchanged over a network. All or some of the links may also be encrypted using conventional encryption techniques such as secure socket layer, transport layer security, virtual private network, internet protocol security, etc. In other embodiments, custom and/or dedicated data communication techniques may also be used in place of or in addition to the data communication techniques described above.
Fig. 2 is a method flow diagram illustrating a method of anti-counterfeiting tracking, according to an example embodiment. The method is performed by a computer device, which may be a server 110 as shown in fig. 1. As shown in fig. 2, the method may include the steps of:
s201, acquiring label information in target consumable materials; the tag information is read by a reader-writer arranged on a target active instrument end matched with the target consumable; the tag information includes at least one of a serial number, an activation flag, product information, and a check code.
In a possible implementation manner, when any consumable matched with the active instrument end is to be read, the RFID reader-writer installed at the active instrument end is used for reading and identifying the tag information in the consumable to be read, so that the tag information in the target consumable is obtained. The label information of the target consumable is preset specific information in the production process.
Further, the tag information includes at least one of a serial number of the consumable, an activation flag of the consumable, product information of the consumable, and a check code of the consumable, wherein the serial number of the consumable is also called a "machine code", is a same article, is generally a unique identification code of an electronic product, and is commonly used for anti-counterfeiting and tracking; the consumable activation mark is used for identifying whether the consumable is used for the first time; the check code of the consumable is calculated by an encryption algorithm based on the serial number, the activation mark, the product information and other data and is used for identification and anti-counterfeiting.
Further, the information content of the tag information is only given by way of example, and in practical application, the information content of the tag information can be reduced and designed as required, and the design can be increased; that is, the information content in the tag information is not limited to the serial number of the consumable, the activation flag of the consumable, the product information of the consumable, and the check code of the consumable, and can be increased or decreased, and the synonymous replacement of nouns can be performed, which all fall into the protection scope of the present application.
S202, performing decryption calculation on the check code in the tag information to judge whether the check code is correct or not and whether the target consumable does not exceed the valid service life or not.
In one possible implementation manner, since the check code of the consumable is obtained by calculating based on the serial number, the activation flag, the product information and other data through an encryption algorithm and is preset in the tag information before the consumable leaves the factory, when the RFID reader-writer at the active instrument end reads the RFID tag in the consumable, the check code in the tag information needs to be decrypted and calculated, and after decryption, whether the check code in the tag information is correct or not can be judged, and whether the consumable does not exceed the effective service life or not can be judged through the product information.
And S203, if the check code is correct and the target consumable does not exceed the valid service period, sequentially judging whether the flag bit of the activation flag in the tag information is valid or not and whether the serial number is repeated with serial number information in a target database or not.
In one possible implementation manner, after the decryption calculation, if the check code is correct and the consumable does not exceed the valid service life, it is further required to determine whether the flag bit of the activation flag in the tag information is valid, and repeatedly determine whether the serial number is identical to the serial number information in the target database, so as to determine whether the consumable is used and recorded in the target database; thereby realizing the tracking of the consumable.
S204, if the flag bit of the activation flag is valid and is not repeated with the serial number information in the target database, the target consumable is a usable consumable, the flag bit of the activation flag is modified, and the serial number in the tag information is stored in the target database.
In one possible implementation manner, if the flag bit of the activation flag is valid and both conditions that are not repeated with the serial number information in the target database are satisfied, determining that the consumable is first-time used and is a usable consumable; in order to ensure effective tracking of consumable information and avoid reuse, the mark bit of the activation mark needs to be modified and the serial number in the label information needs to be stored in a target database during use. The target database is used for recording the use position and the number of consumable materials.
In summary, the use of the check code is matched with the identification of the check algorithm of the active medical instrument, so that the simple plagiarism, repeated use and overdue use of the tag content in the consumable can be avoided; the verification code is matched with the database serial number identification of the active medical instrument, so that the consumable is more difficult to copy; reading and writing of an activated flag bit in the tag information and software judgment are carried out, so that the consumable material is prevented from being reused; the database of the consumable serial number is uploaded and stored, and the position of the active medical equipment is matched, so that the use condition of the consumable can be tracked in real time, accurate data is provided for the consumable use amount calculation of manufacturers, and the use efficiency and the safety are improved.
Fig. 3 is a method flow diagram illustrating a method of anti-counterfeiting tracking, according to an example embodiment. The method is performed by a computer device, which may be a server 110 as shown in fig. 1. As shown in fig. 3, the method may include the steps of:
s301, acquiring label information in target consumable materials; the tag information is read by a reader-writer arranged on a target active instrument end matched with the target consumable; the tag information includes at least one of a serial number, an activation flag, product information, and a check code.
In one possible embodiment, the product information includes at least one of a product production specification and a manufacturer's home.
In one possible implementation, the check code is obtained by performing encryption calculation on at least one of the product production specification, the manufacturer, the validity period, and the serial number.
Further, please refer to the schematic diagram of the composition of the data information in the consumable tag shown in fig. 4, wherein the tag information includes, but is not limited to, production specification, manufacturer, validity period, unique serial number (ID), activation flag and check code; the product information may include other consumable information required in addition to the product information.
Further, when the check code is obtained, the check code can be obtained by performing encryption calculation on the product production specification, the manufacturer, the validity period and several consumable information in the serial number; the above-mentioned all consumable information may be obtained by encryption calculation, or other non-listed consumable information may be obtained by encryption calculation.
S302, performing decryption calculation on the check code in the tag information to judge whether the check code is correct or not and whether the target consumable does not exceed the valid service life or not.
S303, if the check code is wrong or the target consumable exceeds the valid service period, judging that the target consumable is an invalid consumable and sending out invalid consumable prompt information.
In one possible implementation, please refer to a method flowchart of an anti-counterfeit tracking method shown in fig. 5, if the check code is wrong, the consumable may be a counterfeit consumable, if the target consumable exceeds the valid service life and cannot be used, at this time, the target consumable may be determined to be an invalid consumable, and an invalid consumable prompt message is sent to inform.
In one possible implementation, the encryption algorithm employed to decrypt the check code in the tag information includes at least one of a parity encryption algorithm, a checksum encryption algorithm, a longitudinal redundancy check encryption algorithm, a cyclic redundancy check encryption algorithm, other standard encryption algorithms, or custom algorithms.
Furthermore, the check code E in the RFID tag information in the consumable is obtained by calculating the data based on the production specification A, the manufacturer B, the serial number C, the validity period D and the like through an encryption algorithm (such as parity check, checksum, longitudinal redundancy check, cyclic redundancy check, user definition and the like), and the data information is set and written before delivery.
Taking a custom algorithm as an example, if the custom algorithm is data and the lower eight bits are check codes, the calculation formula is:
f=a+b+c+d, and the check code E takes the binary low octet of F.
As shown in fig. 5, when the consumable is used together with the active medical instrument, the RFID reader inside the active medical instrument can read all information of the tag inside the consumable; judging whether the information of the check code E1 in the tag is matched with the data such as the production specification A1, the manufacturer B1, the unique serial number C1, the validity period D1 and the like according to an encryption algorithm, and if the using date of the consumable does not exceed the validity period, entering the next flow; otherwise, prompting; if the self-defined encryption algorithm data and the low eight bits are taken as check codes, F1 = A1+ B1+ C1+ D1 is calculated first, whether E1 is equal to binary low eight bits of data of F1 is judged, if so, matching is considered, otherwise, equipment cannot be used.
S304, if the check code is correct and the target consumable does not exceed the valid service period, sequentially judging whether the flag bit of the activation flag in the tag information is valid or not and whether the serial number is repeated with serial number information in a target database or not.
S305, if the flag bit of the activation flag is invalid or the serial number in the tag information is repeated with the serial number information in the target database, judging that the target consumable is an invalid consumable, and sending out invalid consumable prompt information.
In one possible implementation manner, if the flag bit of the activation flag is invalid and two conditions that the serial number in the tag information is repeated with the serial number information in the target database are met, the target consumable is determined to be an invalid consumable, and an invalid consumable prompt message is sent out.
S306, if the flag bit of the activation flag is valid and is not repeated with the serial number information in the target database, the target consumable is a usable consumable, the flag bit of the activation flag is modified, and the serial number in the tag information is stored in the target database. The target database is used for recording the use position and the number of consumable materials.
In one possible embodiment, the target database includes at least one of a local database of a stand-alone device and a network database of a networked device, and if the target consumable is a consumable, a surgical procedure may be performed.
Furthermore, the anti-counterfeiting tracking method is not only suitable for the medical field, but also can be applied to other fields needing anti-counterfeiting and tracking of products.
In summary, the use of the check code is matched with the identification of the check algorithm of the active medical instrument, so that the simple plagiarism, the repeated use and the overdue use of the tag content in the consumable can be avoided; the verification code is matched with the database serial number identification of the active medical instrument, so that the consumable is more difficult to copy; reading and writing of an activated flag bit in the tag information and software judgment are carried out, so that the consumable material is prevented from being reused; the database of the consumable serial number is uploaded and stored, and the position of the active medical equipment is matched, so that the use condition of the consumable can be tracked in real time, accurate data is provided for the consumable use amount calculation of manufacturers, and the use efficiency and the safety are improved.
Fig. 6 is a block diagram illustrating the structure of an anti-counterfeiting tracking device according to an example embodiment.
The device comprises:
a tag information acquiring module 601, configured to acquire tag information in a target consumable; the tag information is read by a reader-writer arranged on a target active instrument end matched with the target consumable; the tag information includes at least one of a serial number, an activation flag, product information, and a check code;
a first judging module 602, configured to perform decryption calculation on the check code in the tag information, so as to judge whether the check code is correct, and whether the target consumable does not exceed a valid lifetime;
a second judging module 603, configured to sequentially judge whether the flag bit of the activation flag in the tag information is valid and whether the serial number is repeated with serial number information in a target database if the check code is correct and the target consumable does not exceed the valid lifetime;
the consumable determining module 604 may be used to modify the flag bit of the activation flag and store the serial number in the tag information into the target database if the flag bit of the activation flag is valid and not repeated with the serial number information in the target database. The target database is used for recording the use position and the number of consumable materials.
In one possible embodiment, the device is further adapted to:
if the check code is wrong or the target consumable exceeds the effective use period, the target consumable is judged to be an invalid consumable, and an invalid consumable prompt message is sent out.
In one possible embodiment, the device is further adapted to:
if the flag bit of the activation flag is invalid or the serial number in the tag information is repeated with the serial number information in the target database, the target consumable is judged to be an invalid consumable, and invalid consumable prompt information is sent out.
In one possible embodiment, the product information includes at least one of a product production specification and a manufacturer's home;
in one possible implementation, the check code is obtained by performing encryption calculation on at least one of the product production specification, the manufacturer, the validity period, and the serial number.
In one possible implementation, the encryption algorithm employed to decrypt the check code in the tag information includes at least one of a parity encryption algorithm, a checksum encryption algorithm, a longitudinal redundancy check encryption algorithm, a cyclic redundancy check encryption algorithm, other standard encryption algorithms, or custom algorithms.
In one possible implementation, the target database includes at least one of a local database of stand-alone devices and a network database of networked devices.
In conclusion, the use of the check code is matched with the identification of the check algorithm of the active medical instrument, so that the simple plagiarism and repeated use of the tag content in the consumable can be avoided; the verification code is matched with the database serial number identification of the active medical instrument, so that the consumable is more difficult to copy; the reading and writing of the activated flag bit in the tag information and the software judgment realize the anti-reuse and anti-overdue use of consumable materials; the database of the consumable serial number is uploaded and stored, and the position of the active medical equipment is matched, so that the use condition of the consumable can be tracked in real time, accurate data is provided for the consumable use amount calculation of manufacturers, and the use efficiency and the safety are improved.
Referring to fig. 7, a block diagram of a computer device according to an exemplary embodiment of the present application is provided, where the computer device includes a memory and a processor, and the memory is configured to store a computer program, and when the computer program is executed by the processor, implement an anti-counterfeit tracking method as described above.
The processor may be a central processing unit (Central Processing Unit, CPU). The processor may also be any other general purpose processor, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof.
The memory, as a non-transitory computer readable storage medium, may be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the methods in embodiments of the present application. The processor executes various functional applications of the processor and data processing, i.e., implements the methods of the method embodiments described above, by running non-transitory software programs, instructions, and modules stored in memory.
The memory may include a memory program area and a memory data area, wherein the memory program area may store an operating system, at least one application program required for a function; the storage data area may store data created by the processor, etc. In addition, the memory may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some implementations, the memory optionally includes memory remotely located relative to the processor, the remote memory being connectable to the processor through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
In an exemplary embodiment, a computer readable storage medium is also provided for storing at least one computer program that is loaded and executed by a processor to implement all or part of the steps of the above method. For example, the computer readable storage medium may be Read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), compact disc Read-Only Memory (CD-ROM), magnetic tape, floppy disk, optical data storage device, and the like.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the present application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. A method of anti-counterfeiting tracking, the method comprising:
acquiring label information in target consumable materials; the tag information is read by a reader-writer arranged on a target active instrument end matched with the target consumable; the tag information comprises at least one of a serial number, a validity period, an activation flag, product information and a check code;
decrypting and calculating the check code in the tag information to judge whether the check code is correct or not and whether the target consumable does not exceed the valid service life or not;
if the check code is correct and the target consumable does not exceed the valid service period, sequentially judging whether the flag bit of the activation flag in the tag information is valid or not and whether the serial number is repeated with serial number information in a target database or not;
if the flag bit of the activation flag is valid and is not repeated with the serial number information in the target database, the target consumable is a usable consumable, the flag bit of the activation flag is modified, and the serial number in the tag information is stored in the target database.
2. The method of claim 1, wherein after said decrypting the check code in the tag information, the method further comprises:
if the check code is wrong or the target consumable exceeds the effective use period, judging that the target consumable is an invalid consumable and sending out invalid consumable prompt information.
3. The method according to claim 1, wherein after the sequentially determining whether the flag bit of the activation flag in the tag information is valid, and whether the sequence number is repeated with sequence number information in a target database, the method further comprises:
if the flag bit of the activation flag is invalid or the serial number in the tag information is repeated with the serial number information in the target database, the target consumable is judged to be an invalid consumable, and invalid consumable prompt information is sent out.
4. A method according to any one of claims 1 to 3, wherein the product information comprises at least one of a product production specification and a manufacturer's home.
5. The method of claim 4, wherein the check code is obtained by performing encryption calculations on at least one of the product manufacturing specification, the manufacturer, the expiration date, and the serial number.
6. A method according to any one of claims 1 to 3, wherein the encryption algorithm used for decrypting the check code in the tag information comprises at least one of a parity encryption algorithm, a checksum encryption algorithm, a longitudinal redundancy check encryption algorithm, and a cyclic redundancy check encryption algorithm.
7. A method according to any one of claims 1 to 3, wherein the target database comprises at least one of a local database of stand-alone devices and a network database of networked devices.
8. An anti-counterfeiting tracking device, the device comprising:
the tag information acquisition module is used for acquiring tag information in the target consumable; the tag information is read by a reader-writer arranged on a target active instrument end matched with the target consumable; the tag information comprises at least one of a serial number, a validity period, an activation flag, product information and a check code;
the first judging module is used for carrying out decryption calculation on the check code in the tag information so as to judge whether the check code is correct or not and whether the target consumable does not exceed the valid service life or not;
the second judging module is used for judging whether the flag bit of the activation flag in the tag information is valid or not and whether the serial number is repeatedly compared with serial number information in a target database or not in sequence if the check code is correct and the target consumable does not exceed the valid service period;
and the consumable determining module is used for modifying the flag bit of the activation flag and storing the serial number in the tag information into the target database if the flag bit of the activation flag is valid and is not repeated with the serial number information in the target database, wherein the target consumable is a consumable.
9. A computer device comprising a processor and a memory having stored therein at least one instruction that is loaded and executed by the processor to implement a method of anti-counterfeiting tracking according to any one of claims 1 to 7.
10. A computer readable storage medium having stored therein at least one instruction that is loaded and executed by a processor to implement a method of anti-counterfeiting tracking according to any one of claims 1 to 7.
CN202211632080.3A 2022-12-19 2022-12-19 Anti-counterfeiting tracking method and device Pending CN116128001A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211632080.3A CN116128001A (en) 2022-12-19 2022-12-19 Anti-counterfeiting tracking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211632080.3A CN116128001A (en) 2022-12-19 2022-12-19 Anti-counterfeiting tracking method and device

Publications (1)

Publication Number Publication Date
CN116128001A true CN116128001A (en) 2023-05-16

Family

ID=86310917

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211632080.3A Pending CN116128001A (en) 2022-12-19 2022-12-19 Anti-counterfeiting tracking method and device

Country Status (1)

Country Link
CN (1) CN116128001A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117094739A (en) * 2023-10-16 2023-11-21 湖南半岛医疗科技有限公司 Medical consumable counterfeit identification method and device, electronic equipment and readable storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117094739A (en) * 2023-10-16 2023-11-21 湖南半岛医疗科技有限公司 Medical consumable counterfeit identification method and device, electronic equipment and readable storage medium
CN117094739B (en) * 2023-10-16 2024-02-06 湖南半岛医疗科技有限公司 Medical consumable counterfeit identification method and device, electronic equipment and readable storage medium

Similar Documents

Publication Publication Date Title
US11669807B2 (en) System and method for using RFID tags to determine sterilization of devices
JP7336152B2 (en) A system that monitors the environment
JP2007220070A (en) Target device, device management system, device management method, and external device
US20230060663A1 (en) Playing card dealing shoe activation device
CN113656780B (en) Cross-chain access control method and device
JP6385842B2 (en) Information processing terminal, information processing method, and information processing system
CN116128001A (en) Anti-counterfeiting tracking method and device
US20200351108A1 (en) Semiconductor device, update data-providing method, update data-receiving method, and program
JP2008059013A (en) Ic memory and access device for ic memory, and validity verification method
JP5227474B2 (en) Device management system, device management method, and external device
CN111553689A (en) Matching correlation method and system based on quadratic hash
KR100848791B1 (en) Tag data recording and acquisition method that enables security verification, tag data recording and acquisition device
CN113849859A (en) Linux kernel modification method, terminal device and storage medium
US20230024180A1 (en) Systems and methods for tracking medical instruments cleaning and sterilization
CN117370960A (en) Data destruction method, system and equipment
JP4073091B2 (en) Electronic document authentication apparatus and authentication method
US12164985B1 (en) System and method for selectively adjustable data exchange between a smart package and a requesting system
CN113010201A (en) Firmware file identification method, firmware upgrade pairing method and device
CN116419729A (en) Methods, devices and systems for storing utilization data and tracking medical products
WO2025012782A1 (en) Systems and method for selectively adjustable data exchange between a smart package and a requesting system
WO2025012790A1 (en) System and method for selectively adjustable data exchange between a smart package and a requesting system
WO2025012791A1 (en) System and method for selectively adjustable data exchange between a smart package and a requesting system
KR100903125B1 (en) Apparatus for forgery detection and circulation point verification of securities and method therefor
CN109523277B (en) Product anti-counterfeiting electronic tag authentication method and system
US20190333003A1 (en) Identification tag for monitoring a supply chain of an entity or a workflow of processes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination