Summary of the invention
Technical matters to be solved by this invention is to provide a kind of and utilizes machine vision and based on the product anti-fake system and the method for X-Y scheme, be intended to solve the problem of products antifake technique.By the machine vision mode true and false X-Y scheme is discerned automatically, select message search or network inquiry mode to send anti-fake code in local backstage of product false proof infosystem or background database manager system of producer by client software, the true and false information of background data base feedback product is given the user, thereby finishes the true and false inquiry of product; When the user need open product, by the machine vision mode X-Y scheme of unblanking is discerned automatically, select message search or network inquiry mode to send anti-fake code in local backstage of product false proof infosystem or background database manager system of producer by client software, background database manager system feedback unlocking cipher is given the user, thereby finishes the unlatching of product.
The present invention realizes like this, a kind ofly utilize machine vision and, comprise coded lock, client device, telephone network, mobile communications network, Internet network, server end, security code inquiry and administrative unit, switch, order management module, product false proof sign indicating number label generation unit based on the product anti-fake system of X-Y scheme;
Described server end is used to place site home page, message search interface, network inquiry interface;
Described coded lock is added in the opening part of anti-fake product;
Described client device is connected by the one or more and described server end in described telephone network, described mobile communications network, the described Internet network;
Described switch is connected with described server end, is used for the exchange between the data;
Described security code inquiry and administrative unit are connected with described switch;
Described order management module links to each other with described switch, described product false proof sign indicating number label generation unit respectively, described order management module sends security code information to described product false proof sign indicating number label generation unit, described product false proof sign indicating number label generation unit generates product false proof sign indicating number label, and described product false proof sign indicating number label includes X-Y scheme.
Further, described client device comprises phone, mobile phone, panel computer, portable computer and PC.
Further, described order management module comprises security code generation unit, order and contract management unit and expanded application unit;
Described security code generation unit links to each other with described switch, is used for generating unblank inquiry code and convert X-Y scheme to of the product false proof inquiry code of security code and product according to the security code coding rule;
Described order links to each other with described switch with the contract management unit, is used for management enterprise and examines by the order of page download and to the contract that enterprise uploads, and examines the instruction that qualified back sends production product false proof sign indicating number label;
Described expanded application unit links to each other with described switch, is used to expand the function of order management module.
Further, described product anti-fake system also comprises system management and maintenance module and the product database that links to each other with described switch, described system management and maintenance module are used for data are managed and periodic maintenance, and described product database is used for the data of storage products information.
The present invention also provides a kind of and utilizes machine vision and based on the antifake method for products of X-Y scheme, may further comprise the steps:
Steps A, order management module produce security code with the product information that producer provides by coding of the security code in the security code generation unit and encryption software, described security code generation unit converts security code to X-Y scheme, and with the information uploading of described X-Y scheme to product database, the product false proof sign indicating number label that is printed with described X-Y scheme hangs on product or the coded lock;
Step B, client device are gathered X-Y scheme and the identification on product or the coded lock, obtain the product false proof sign indicating number, and the security code that obtains sent to security code inquiry and administrative unit, enter product database by switch after described security code inquiry and administrative unit are decrypted security code and mate, and matching result is returned to client device.
Further, described security code comprises product false proof inquiry code and/or the product inquiry code of unblanking, and with data encryption algorithm described product false proof inquiry code and/or product is unblanked to convert X-Y scheme to after inquiry code encrypts;
In described step B, if described matching result is a corresponding security code then mode by note or network returns to the user; If described matching result is the product false proof inquiry code then returns the true and false of product, if described matching result is a product unblank inquiry code then return the unlocking cipher of corresponding product.
Further, described order management module comprises the product information that producer provides by the step that coding of the security code in the security code generation unit and encryption software produce security code:
Step 1, enterprise place an order by logon web page, and the keeper is by order and contract management unit audit order, examine then to allow the enterprise customer to download and upload the contract of having signed by server end on webpage after qualified;
The contract that step 2, keeper are uploaded by order and contract management unit audit enterprise need be paid corresponding deposit according to the quantity of service and the length of service of customization by enterprise then;
Step 3, keeper examine whether receive deposit, be that the sequence information that then begins to provide according to the enterprise customer produces corresponding security code according to certain coding rule, and the generation X-Y scheme print by product false proof sign indicating number label generation unit.
Further, after the described step 3, also comprise:
Step 4, X-Y scheme label are sent in enterprise customer's hand with coded lock, and the enterprise customer needs the time spent directly to be added on the product;
Step 5, system manager upload to the security code of electronic version in the product database, and the system manager examines errorless then security code can begin to start inquiry service, and the product of this order is started selling;
After step 6, enterprise product are sold, after the user buys product, carry out true and false inquiry and obtain unlocking cipher;
After step 7, product were sold, the user obtained the inquiry code of unblanking according to scraping latent sign indicating number coating off, the inquiry of unblanking.
Further, the step of carrying out true and false inquiry in the described step 6 and obtaining unlocking cipher is:
The X-Y scheme that the user claps the Product labelling top with other X-Y scheme identification softwares obtains the mobile phone client software download address that native system comprises, by accessed web page download client software, download and install and open the very false proof software of bat after finishing, clap product false proof inquiry code on the product false proof sign indicating number label or the product inquiry code of unblanking, the user selects to send message search, then system can send to user mobile phone by note with Query Result, the user select network inquiry then the result directly turn back to the software page; Perhaps
Send product false proof inquiry code on the label or the product number of inquiry code to the label of unblanking, system can send to user mobile phone by note with Query Result; Perhaps
Dial hotline and inquire about according to Voice Navigation, system can report the result to the user; Perhaps
Open the site home page on the label, input product false proof inquiry code or the product inquiry code of unblanking, system can directly show the result by the mode of dialog box.
Further, coding rule is as follows described in the step 3: totally 31 of security codes comprise 10 preceding segment encode, 10 middle segment encode, 10 back segment encode and 1 check code; Described top end stops is obtained by the security code cryptographic algorithm, and described middle segment encode is a random code, and described back segment encode is a production code member; The described step that produces corresponding security code comprises:
Step 301: preceding segment encode obtains by function x=f (y), and y is middle segment encode, and x is preceding segment encode, is 10 bit digital;
Step 302: the even bit of the y that obtains according to step 301 finds corresponding value in a mapping table, and will find corresponding value to replace the numeral of even bit in mapping table, obtains new y;
Step 303: transfer new y to binary number;
Step 304: described binary number odd bits and even bit are exchanged;
Step 305: change into the decimal system again after the exchange of even bit and odd bits,, be no more than 10 then 10 of polishings in front if the decimal system of gained surpasses 10 then get preceding 10;
Step 306: the effect sign indicating number multiply by key by the middle double figures of preceding segment encode, middle segment encode, back segment encode respectively, then divided by 10 remainders that obtain.
The present invention compared with prior art; beneficial effect is that antifake method for products of the present invention can effectively hit market product and fake; protect consumer's legitimate rights and interests better; and fully combine the application in product false proof of smart mobile phone, panel computer; solved present products antifake technique simultaneously because the long technical matters of anti-fake code, the antifalse technology of the new and high technology of integrated various modern.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with drawings and Examples.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
Antifake method for products of the present invention reaches false proof purpose in conjunction with physics encryption device and the double protection of information encryption.The encrypted physical device carries out encrypted physical such as electronic lock, mechanical lock etc. to each product, reaches the false proof purpose of ground floor.Encrypted physical also promptly utilizes encryption device that the unlatching of product is blocked, and has only as the user and inputs the opening and closing that correct password could be realized product.For example, carry out false proofly, at first traditional bottle lid be made the bottle lid that has mechanical code lock, be attached to the bottle mouth, mechanical cipher is set again, have only when behind the correct unlocking cipher of producer's acquisition, just opening bottle to wine.
Information encryption is to utilize infosystem that each product is carried out information encryption to reach the false proof purpose of the second layer.The relevant information of each product that manufacturer will produce is mapped on unique two-dimensional bar code one by one such as product coding, product category, business organization's Institution Code etc., and the also manufactured merchant of these information is submitted to a product false proof inquiry information system based on the internet simultaneously.Make the product information that authenticates through manufacturer in the physical message of each product and the product false proof infosystem set up one-to-one relationship by this process, thereby and the mode of these information by phone, short message, network is submitted to this Antiforge inquiry infosystem verifies that one by one the true and false that can judge this product reaches false proof purpose.
As shown in Figure 1, a kind ofly utilize machine vision and, comprise coded lock, client device 101, telephone network 102, mobile communications network 103, Internet network 104, server end 106, security code inquiry and administrative unit 105, switch 107, order management module 108, product false proof sign indicating number label generation unit 109 based on the product anti-fake system of X-Y scheme.Described coded lock is added in the opening part of anti-fake product; Described server end 106 is used to place site home page, message search interface, network inquiry interface.Described client device 101 is connected by the one or more and described server end 106 in described telephone network 102, described mobile communications network 103, the described Internet network 104.Described Antiforge inquiry and administrative unit 105 are connected with described switch 107.Described switch 107 is connected with described server end 106, is used for the exchange between the data.Described order management module 108 links to each other with described switch 107, described product false proof sign indicating number label generation unit 109 respectively, described order management module 108 sends security code information to described product false proof sign indicating number label generation unit 109, described product false proof sign indicating number label generation unit 109 generates product false proof sign indicating number label 112, and described product false proof sign indicating number label 112 includes X-Y scheme.
Further, described client device 101 comprises phone, mobile phone, panel computer, portable computer, PC, and preferably, described mobile phone is a smart mobile phone; Described smart mobile phone, panel computer, portable computer are equipped with camera.
Further, described order management module 108 comprises security code generation unit, order and contract management unit and expanded application unit.Described security code generation unit links to each other with described switch, is used for generating unblank inquiry code and convert X-Y scheme to of the product false proof inquiry code of product false proof sign indicating number label and product according to the security code coding rule, and the security code that generates is managed.Described order links to each other with described switch with the contract management unit, is used for management enterprise and examines by the order under the webpage and to the contract that enterprise uploads, and examines the instruction that qualified back sends production product false proof sign indicating number label.Described expanded application unit links to each other with described switch, is used to expand the function of order management module 108.
The described machine vision of utilizing also comprises system management and maintenance module 110 and the product database 111 that links to each other with described switch 107 with product anti-fake system based on X-Y scheme, described system management and maintenance module 110 are used for data are managed and periodic maintenance, and described product database 111 is used for the data of storage products information.
As shown in Figure 2, the present invention also provides a kind of and utilizes machine vision and based on the antifake method for products of X-Y scheme, may further comprise the steps:
Steps A, order management module 108 produce security code with the product information that producer provides by coding of the security code in the security code generation unit and encryption software, described security code has the product false proof of comprising inquiry code and/or the product inquiry code of unblanking, and described product false proof inquiry code and/or the product inquiry code of unblanking is encrypted with data encryption algorithm, and convert X-Y scheme to, and with the information uploading of described X-Y scheme to product database 111, the product false proof sign indicating number label 112 that is printed with described X-Y scheme hangs on product or the coded lock;
Step B, client device 101 are gathered X-Y scheme and the identification on product or the coded lock, obtain the product false proof sign indicating number, and the security code that obtains sent to security code inquiry and administrative unit 105, enter product database 111 by switch 107 after described security code inquiry and 105 pairs of security codes of administrative unit are decrypted and mate, and matching result is returned to client device 101;
In described step B, the user need verify when product is true and false, by the client software and the installation of download system exploitation; Open client software and X-Y scheme identification interface occurs, the user discerns camera automatically facing to X-Y scheme, identification back user can select message search or network inquiry, security code can be sent to security code inquiry and administrative unit 105, the inquiry of described security code and 105 pairs of security codes of administrative unit are decrypted the back and enter product database 111 by switch 107 and mate, if find corresponding security code then mode by note or network returns to the user; If the product false proof inquiry code is then returned the true and false of product, inquiry code is then returned the unlocking cipher of corresponding product if product is unblanked, and the user opens coded lock according to the explanation on the label and gets final product after obtaining unlocking cipher.
The generation and the process of exchange of security code of the present invention have been realized robotization.Enterprise produces the security code of respective amount and converts X-Y scheme, product database, system management and maintenance, speech polling interface, network inquiry interface, message search interface, data base encryption, security code coding rule, cell-phone customer terminal X-Y scheme software at order by the management service of the service of network customization Antiforge inquiry, tailored ciphers lock, order.
Described order management module may further comprise the steps the product information that producer provides by the transaction that coding of the security code in the security code generation unit and encryption software produce security code and security code:
Step 1, enterprise place an order by logon web page, and the keeper is by order and contract management unit audit order, examine then to allow the enterprise customer to download and upload the contract of having signed by server end 106 on webpage after qualified;
The contract that step 2, keeper are uploaded by order and contract management unit audit enterprise need be paid corresponding deposit according to the quantity of service and the length of service of customization by enterprise then;
Step 3, keeper examine whether receive deposit, are the sequence information that provides according to the enterprise customer then to be provided produce corresponding security code and generate X-Y scheme and print with product false proof sign indicating number label generation unit 109; The generation of described security code is to produce according to certain coding rule; Described security code adopts cryptographic algorithm to encrypt, and the security code that becomes after the encryption offers the enterprise customer;
Step 4, X-Y scheme label are sent in enterprise customer's hand with coded lock, and the enterprise customer directly is added on the product;
Step 5, system manager upload to the security code of electronic version in the product database 111, and the system manager examines errorless then security code can begin to start inquiry service, and the product of this order is started selling;
After step 6, enterprise product are sold, after the user buys product, carry out true and false inquiry and obtain unlocking cipher;
After step 7, product were sold, the user obtained the inquiry code of unblanking according to scraping latent sign indicating number coating off, the inquiry of unblanking.If system returns unlocking cipher and directly unblanks to get final product,, be 1478 such as the corresponding unlocking cipher of X1Y1Z1Z2 if what return is that unblank index code then user finds corresponding password according to index code on label.System returns to the user is that password or index code are that requirement according to the enterprise customer decides.
Described step 1,2 and 3 orders of mentioning and contract management unit are mainly used in the order of management security code, can realize to order contents audit, to underproof order annotate and comment on, treaty content is checked audit, underproof contract is annotated and commented on, checked the order details, changes the state of order.Major function has states such as audit, the contract audit of order, the audit of determining to collect money to show.After finishing, all work begin to enter inquiry phase, enterprise will open service earlier, service side begins formally to put into effect after the service, state changes service stopping into when order has expired then, when the order that stops according to circumstances can being deleted order, unblank table and the false proof code table of product database are also deleted simultaneously.Described order and contract management unit provide the state according to order to come order is classified, and such as when select submitting to order etc. pending, then the capital of Chu Xianing is pending parts such as submission order.
Further, as follows according to certain coding rule in the described step 3: before, during and after security code is divided into three sections, the security code cryptographic algorithm that is encoded to of leading portion obtains, and interlude is the random code that system produces, and back segment is encoded to production code member; Totally 31 of security codes are respectively 10 of preceding segment encodes, 10 of middle segment encodes, and 10 of back segment encodes, 1 of effect sign indicating number, the step that produces corresponding security code comprises:
Step 301: preceding segment encode obtains by function x=f (y), and y is middle segment encode, and x is preceding segment encode, is 10 bit digital, such as, y equals 1234567890, gets even bit 24680;
Step 302: the even bit of the y that obtains according to step 31 finds corresponding value in mapping table, and will in mapping table, find corresponding value to replace the numeral of even bit, obtain new y, such as 24680 in mapping table corresponding number be A8F4C, A8F4C is replaced 24680, and then y equals 1A385F749C;
Mapping table:
Step 303: transfer new y to binary number, such as, 1A385F749C is converted into scale-of-two and equals 1,101 0,001 1,100 0,010 1,111 1,011 1,010 0,100 1,110 0;
Step 304: described binary number odd bits and even bit are exchanged, such as, for several odd bits of example and even bit be 1,110 0,010 1,100 0,001 1,111 0,111 0,101 1,000 1,101 0 after exchanging;
Step 305: change into the decimal system again after the exchange of even bit and odd bits,, be no more than 10 then 10 of polishings in front if the decimal system of gained surpasses 10 then get preceding 10;
Step 306: the effect sign indicating number multiply by key by the middle double figures of preceding segment encode, middle segment encode, back segment encode respectively, and then divided by 10 remainders that obtain, for example security code is 7883137400-12345678936-0201208010-6.Key is 123456, and then the effect sign indicating number equals (1*1+3*2+5*3+6*4+2*5+0*6) %10=6.
The security code of the generation correspondence that described step 3 is mentioned also generates X-Y scheme and mainly comprises the order of searching security codes to be generated such as product database, the security code generation unit generates security code for this order after finding order, and the security code that generates converted to corresponding X-Y scheme, and be saved in the word document in order.Major function is to find the numbering that needs generate security code according to order status, the first step: order generates the product false proof sign indicating number according to above-mentioned coding rule; Second step: the security code that obtains according to step (1) generates X-Y scheme; The 3rd step: the typesetted word the inside that is saved in order of X-Y scheme.
The cryptographic algorithm of mentioning in the described step 3 is defined as follows:
The definition of relevant character string:
The first step: encrypted character string: Cn={c0c1c2c3 ... ci ... cn-1}
Wherein: i is the sequence number (span 0~n-1) of character among the Cn;
N is a Cn length.
Second step: encrypted characters string: Dn={d0d1d2d3 ... di ... dn-1}
Wherein: i is the sequence number (span 0~n-1) of character among the Dn;
N is a Dn length.
The 3rd step: database table major key: Px={p0p1p2p3 ... pa ... px-1}
Wherein: i is the sequence number (span 0~x-1) of character among the Px;
X is a Px length.
The 4th step: secret key character: K
The algorithm definition:
The generating algorithm of K:
If flag=is (p1+p2+p3+ ... pa+ ... px+i) %4 then
if?flag=0,K=0x01;
if?flag=1,K=0x02;
if?flag=2,K=0x04;
if?flag=3,K=0x08。
Operational symbol % meaning: C=A%B represents that C is the remainder of A divided by B.
The generating algorithm of Dn in second step:
di=K^ci
Operational symbol ^ meaning: C=A^B represent C be A and B step-by-step with or the result.
Further, carry out true and false inquiry and obtain unlocking cipher four kinds of methods are arranged in the described step 6:
Method one: the X-Y scheme that the user claps the Product labelling top with other X-Y scheme identification softwares obtains the mobile phone client software download address that native system comprises, by accessed web page download client software, download and install and open the very false proof software of bat after finishing, clap product false proof inquiry code on the product false proof sign indicating number label or the product inquiry code of unblanking, the user selects to send message search, then system can send to user mobile phone by note with Query Result, the user select network inquiry then the result directly turn back to the software page;
Method two: send product false proof inquiry code on the label or the product number of inquiry code to the label of unblanking, system can send to user mobile phone by note with Query Result;
Method three: dial hotline and inquire about according to Voice Navigation, system can report the result to the user;
Method four: open the site home page on the label, input product false proof inquiry code or the product inquiry code of unblanking, system can directly show the result by the mode of dialog box.
The client X-Y scheme identification software of mentioning in the described step 6 is to make full use of smart mobile phone, the vision system of panel computer and the automatic identify customer end software of developing in conjunction with product anti-fake system of X-Y scheme, the client only need open client software and aim at the false proof X-Y scheme coding that is printed on the product false proof sign indicating number label, client software can be finished X-Y scheme identification automatically, client software can eject the client and select message search mode and network inquiry mode automatically after identification was finished, the client selects inquiry mode according to demands of individuals, and system just carries out corresponding information feedback according to the content of inquiry.Such as, inquiry true or false of products information, system will be fed back the true and false information and the production company of product; The unlocking cipher of inquiry product, the unlatching cryptographic service information of product will be fed back by system; Inquiry be not the false proof X-Y scheme coding of native system correspondence, system is will the feedback encoding rule incorrect, beware of imitations!
The true and false query script that relates in the described step 6, backstage carry out primary screening according to coding rule after obtaining the security code that the user provides, and get rid of the security code that non-native system produces.Enter the product data library inquiry by first screening, check at first whether inquiry code or IP address are added into blacklist, described blacklist is primarily aimed at the user of malice inquiry, then do not check whether meet querying condition at blacklist, native system same number of the account of same number inquiry in hour can only be inquired about once, and this product is not also unblanked.
The process of obtaining unlocking cipher that relates in the described step 6, backstage are carried out primary screening according to coding rule after obtaining the inquiry code that the user provides, and get rid of the security code that non-native system produces.Enter the product data library inquiry by screening for the first time, check at first whether enquiry number or IP address are added into blacklist, blacklist is primarily aimed at the user of malice inquiry, then do not check whether meet querying condition at blacklist, whether product drove lock, opened number or the IP address of then checking this inquiry and followed unblank whether consistent, and unanimity is then returned the index code of unblanking, be not return results not then, prompting has been unblanked.
The voice inquiry system that relates in the described step 6 mainly is by the mode of self-service or manual service security code to be inquired about.Self-service mode mainly is to be undertaken realizing that according to Voice Navigation true and false inquiry, unlocking cipher obtain, change the function of manual service by the hotline of dialing system and providing.When receiving the manual service phone, at voice inquiry system input security code, click inquiry and can obtain Query Result, the result shows below edit box.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.