CN103218723A - Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure - Google Patents

Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure Download PDF

Info

Publication number
CN103218723A
CN103218723A CN2013101245355A CN201310124535A CN103218723A CN 103218723 A CN103218723 A CN 103218723A CN 2013101245355 A CN2013101245355 A CN 2013101245355A CN 201310124535 A CN201310124535 A CN 201310124535A CN 103218723 A CN103218723 A CN 103218723A
Authority
CN
China
Prior art keywords
product
inquiry
code
security code
false proof
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013101245355A
Other languages
Chinese (zh)
Other versions
CN103218723B (en
Inventor
程涛
徐刚
冯平
彭小波
王燕燕
彭涛
李商旭
唐志坚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Freshness Intelligent Technology Co ltd
Original Assignee
Shenzhen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen University filed Critical Shenzhen University
Priority to CN201310124535.5A priority Critical patent/CN103218723B/en
Publication of CN103218723A publication Critical patent/CN103218723A/en
Application granted granted Critical
Publication of CN103218723B publication Critical patent/CN103218723B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to the field of product anti-fake techniques and provides a product anti-fake system and a method by means of machine vision and on basis of a two-dimensional figure. The system comprises a coded lock, a client device, a telephone network, a mobile communication network, an Internet network, a server end, an anti-fake code query and management unit, a switch board, an order management module and a product anti-fake code label generation unit. The coded lock is arranged at an opening of an anti-fake product. The client device is connected with the server end through the telephone network, the mobile communication network and the Internet network. The switch board is connected with the server end. The anti-fake code query and management unit is connected with the switch board. The order management module is respectively connected with the switch board and the product anti-fake code label generation unit. According to the system, market product counterfeiting can be effectively struck, legal rights and interests of consumers can be well protected, and meanwhile the technical problem that in the prior art, anti-fake codes are too long is solved.

Description

A kind ofly utilize machine vision and based on the product anti-fake system and the method for X-Y scheme
Technical field
The invention belongs to the products antifake technique field, relate in particular to and a kind ofly utilize machine vision and based on the product anti-fake system and the method for X-Y scheme.
Background technology
Along with high-tech development, fake products also occurs thereupon, and emerges in an endless stream, the appearance of various personations on the market, high imitative product, not only encroached on consumers in general's interests, also upset normal market order, and brought enormous economic loss to production firm.Be accompanied by the appearance of fake products, the technology of various antagonism fake productss also occurs thereupon.Though the generation of many method for anti-counterfeit is also arranged at present, traditional method for anti-counterfeit is generally limited to these two kinds of physics package anti-counterfeiting and digital encode false-proofs.The physics package anti-counterfeiting needs special-purpose discriminating instrument, to check with respect to the consumer whether the product of being bought is relatively difficulty of genuine piece, and some lawless persons can be by reclaiming the packing of genuine piece, with the true false pain product of packing into of packing, load onto just more difficult identification from physical package like this, for consumers.The inquiry of digital encode false-proof also has inconvenience, and the real chance of using of consumer is also few.
Existing now antifake method for products based on technology of Internet of things, be by utilizing the network platform or telephony platform to inquire about the true and false of anti-fake code and the unlocking cipher of acquisition coded lock, but this kind method consumer is still not too convenient in the process of using, can not learn the true and false of product timely, meanwhile the anti-fake code of anti-counterfeiting technology is long, in use can bring inconvenience to production firm.
Summary of the invention
Technical matters to be solved by this invention is to provide a kind of and utilizes machine vision and based on the product anti-fake system and the method for X-Y scheme, be intended to solve the problem of products antifake technique.By the machine vision mode true and false X-Y scheme is discerned automatically, select message search or network inquiry mode to send anti-fake code in local backstage of product false proof infosystem or background database manager system of producer by client software, the true and false information of background data base feedback product is given the user, thereby finishes the true and false inquiry of product; When the user need open product, by the machine vision mode X-Y scheme of unblanking is discerned automatically, select message search or network inquiry mode to send anti-fake code in local backstage of product false proof infosystem or background database manager system of producer by client software, background database manager system feedback unlocking cipher is given the user, thereby finishes the unlatching of product.
The present invention realizes like this, a kind ofly utilize machine vision and, comprise coded lock, client device, telephone network, mobile communications network, Internet network, server end, security code inquiry and administrative unit, switch, order management module, product false proof sign indicating number label generation unit based on the product anti-fake system of X-Y scheme;
Described server end is used to place site home page, message search interface, network inquiry interface;
Described coded lock is added in the opening part of anti-fake product;
Described client device is connected by the one or more and described server end in described telephone network, described mobile communications network, the described Internet network;
Described switch is connected with described server end, is used for the exchange between the data;
Described security code inquiry and administrative unit are connected with described switch;
Described order management module links to each other with described switch, described product false proof sign indicating number label generation unit respectively, described order management module sends security code information to described product false proof sign indicating number label generation unit, described product false proof sign indicating number label generation unit generates product false proof sign indicating number label, and described product false proof sign indicating number label includes X-Y scheme.
Further, described client device comprises phone, mobile phone, panel computer, portable computer and PC.
Further, described order management module comprises security code generation unit, order and contract management unit and expanded application unit;
Described security code generation unit links to each other with described switch, is used for generating unblank inquiry code and convert X-Y scheme to of the product false proof inquiry code of security code and product according to the security code coding rule;
Described order links to each other with described switch with the contract management unit, is used for management enterprise and examines by the order of page download and to the contract that enterprise uploads, and examines the instruction that qualified back sends production product false proof sign indicating number label;
Described expanded application unit links to each other with described switch, is used to expand the function of order management module.
Further, described product anti-fake system also comprises system management and maintenance module and the product database that links to each other with described switch, described system management and maintenance module are used for data are managed and periodic maintenance, and described product database is used for the data of storage products information.
The present invention also provides a kind of and utilizes machine vision and based on the antifake method for products of X-Y scheme, may further comprise the steps:
Steps A, order management module produce security code with the product information that producer provides by coding of the security code in the security code generation unit and encryption software, described security code generation unit converts security code to X-Y scheme, and with the information uploading of described X-Y scheme to product database, the product false proof sign indicating number label that is printed with described X-Y scheme hangs on product or the coded lock;
Step B, client device are gathered X-Y scheme and the identification on product or the coded lock, obtain the product false proof sign indicating number, and the security code that obtains sent to security code inquiry and administrative unit, enter product database by switch after described security code inquiry and administrative unit are decrypted security code and mate, and matching result is returned to client device.
Further, described security code comprises product false proof inquiry code and/or the product inquiry code of unblanking, and with data encryption algorithm described product false proof inquiry code and/or product is unblanked to convert X-Y scheme to after inquiry code encrypts;
In described step B, if described matching result is a corresponding security code then mode by note or network returns to the user; If described matching result is the product false proof inquiry code then returns the true and false of product, if described matching result is a product unblank inquiry code then return the unlocking cipher of corresponding product.
Further, described order management module comprises the product information that producer provides by the step that coding of the security code in the security code generation unit and encryption software produce security code:
Step 1, enterprise place an order by logon web page, and the keeper is by order and contract management unit audit order, examine then to allow the enterprise customer to download and upload the contract of having signed by server end on webpage after qualified;
The contract that step 2, keeper are uploaded by order and contract management unit audit enterprise need be paid corresponding deposit according to the quantity of service and the length of service of customization by enterprise then;
Step 3, keeper examine whether receive deposit, be that the sequence information that then begins to provide according to the enterprise customer produces corresponding security code according to certain coding rule, and the generation X-Y scheme print by product false proof sign indicating number label generation unit.
Further, after the described step 3, also comprise:
Step 4, X-Y scheme label are sent in enterprise customer's hand with coded lock, and the enterprise customer needs the time spent directly to be added on the product;
Step 5, system manager upload to the security code of electronic version in the product database, and the system manager examines errorless then security code can begin to start inquiry service, and the product of this order is started selling;
After step 6, enterprise product are sold, after the user buys product, carry out true and false inquiry and obtain unlocking cipher;
After step 7, product were sold, the user obtained the inquiry code of unblanking according to scraping latent sign indicating number coating off, the inquiry of unblanking.
Further, the step of carrying out true and false inquiry in the described step 6 and obtaining unlocking cipher is:
The X-Y scheme that the user claps the Product labelling top with other X-Y scheme identification softwares obtains the mobile phone client software download address that native system comprises, by accessed web page download client software, download and install and open the very false proof software of bat after finishing, clap product false proof inquiry code on the product false proof sign indicating number label or the product inquiry code of unblanking, the user selects to send message search, then system can send to user mobile phone by note with Query Result, the user select network inquiry then the result directly turn back to the software page; Perhaps
Send product false proof inquiry code on the label or the product number of inquiry code to the label of unblanking, system can send to user mobile phone by note with Query Result; Perhaps
Dial hotline and inquire about according to Voice Navigation, system can report the result to the user; Perhaps
Open the site home page on the label, input product false proof inquiry code or the product inquiry code of unblanking, system can directly show the result by the mode of dialog box.
Further, coding rule is as follows described in the step 3: totally 31 of security codes comprise 10 preceding segment encode, 10 middle segment encode, 10 back segment encode and 1 check code; Described top end stops is obtained by the security code cryptographic algorithm, and described middle segment encode is a random code, and described back segment encode is a production code member; The described step that produces corresponding security code comprises:
Step 301: preceding segment encode obtains by function x=f (y), and y is middle segment encode, and x is preceding segment encode, is 10 bit digital;
Step 302: the even bit of the y that obtains according to step 301 finds corresponding value in a mapping table, and will find corresponding value to replace the numeral of even bit in mapping table, obtains new y;
Step 303: transfer new y to binary number;
Step 304: described binary number odd bits and even bit are exchanged;
Step 305: change into the decimal system again after the exchange of even bit and odd bits,, be no more than 10 then 10 of polishings in front if the decimal system of gained surpasses 10 then get preceding 10;
Step 306: the effect sign indicating number multiply by key by the middle double figures of preceding segment encode, middle segment encode, back segment encode respectively, then divided by 10 remainders that obtain.
The present invention compared with prior art; beneficial effect is that antifake method for products of the present invention can effectively hit market product and fake; protect consumer's legitimate rights and interests better; and fully combine the application in product false proof of smart mobile phone, panel computer; solved present products antifake technique simultaneously because the long technical matters of anti-fake code, the antifalse technology of the new and high technology of integrated various modern.
Description of drawings
Fig. 1 is the product anti-fake system structural drawing that the embodiment of the invention provides;
Fig. 2 is the antifake method for products schematic diagram that the embodiment of the invention provides.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with drawings and Examples.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
Antifake method for products of the present invention reaches false proof purpose in conjunction with physics encryption device and the double protection of information encryption.The encrypted physical device carries out encrypted physical such as electronic lock, mechanical lock etc. to each product, reaches the false proof purpose of ground floor.Encrypted physical also promptly utilizes encryption device that the unlatching of product is blocked, and has only as the user and inputs the opening and closing that correct password could be realized product.For example, carry out false proofly, at first traditional bottle lid be made the bottle lid that has mechanical code lock, be attached to the bottle mouth, mechanical cipher is set again, have only when behind the correct unlocking cipher of producer's acquisition, just opening bottle to wine.
Information encryption is to utilize infosystem that each product is carried out information encryption to reach the false proof purpose of the second layer.The relevant information of each product that manufacturer will produce is mapped on unique two-dimensional bar code one by one such as product coding, product category, business organization's Institution Code etc., and the also manufactured merchant of these information is submitted to a product false proof inquiry information system based on the internet simultaneously.Make the product information that authenticates through manufacturer in the physical message of each product and the product false proof infosystem set up one-to-one relationship by this process, thereby and the mode of these information by phone, short message, network is submitted to this Antiforge inquiry infosystem verifies that one by one the true and false that can judge this product reaches false proof purpose.
As shown in Figure 1, a kind ofly utilize machine vision and, comprise coded lock, client device 101, telephone network 102, mobile communications network 103, Internet network 104, server end 106, security code inquiry and administrative unit 105, switch 107, order management module 108, product false proof sign indicating number label generation unit 109 based on the product anti-fake system of X-Y scheme.Described coded lock is added in the opening part of anti-fake product; Described server end 106 is used to place site home page, message search interface, network inquiry interface.Described client device 101 is connected by the one or more and described server end 106 in described telephone network 102, described mobile communications network 103, the described Internet network 104.Described Antiforge inquiry and administrative unit 105 are connected with described switch 107.Described switch 107 is connected with described server end 106, is used for the exchange between the data.Described order management module 108 links to each other with described switch 107, described product false proof sign indicating number label generation unit 109 respectively, described order management module 108 sends security code information to described product false proof sign indicating number label generation unit 109, described product false proof sign indicating number label generation unit 109 generates product false proof sign indicating number label 112, and described product false proof sign indicating number label 112 includes X-Y scheme.
Further, described client device 101 comprises phone, mobile phone, panel computer, portable computer, PC, and preferably, described mobile phone is a smart mobile phone; Described smart mobile phone, panel computer, portable computer are equipped with camera.
Further, described order management module 108 comprises security code generation unit, order and contract management unit and expanded application unit.Described security code generation unit links to each other with described switch, is used for generating unblank inquiry code and convert X-Y scheme to of the product false proof inquiry code of product false proof sign indicating number label and product according to the security code coding rule, and the security code that generates is managed.Described order links to each other with described switch with the contract management unit, is used for management enterprise and examines by the order under the webpage and to the contract that enterprise uploads, and examines the instruction that qualified back sends production product false proof sign indicating number label.Described expanded application unit links to each other with described switch, is used to expand the function of order management module 108.
The described machine vision of utilizing also comprises system management and maintenance module 110 and the product database 111 that links to each other with described switch 107 with product anti-fake system based on X-Y scheme, described system management and maintenance module 110 are used for data are managed and periodic maintenance, and described product database 111 is used for the data of storage products information.
As shown in Figure 2, the present invention also provides a kind of and utilizes machine vision and based on the antifake method for products of X-Y scheme, may further comprise the steps:
Steps A, order management module 108 produce security code with the product information that producer provides by coding of the security code in the security code generation unit and encryption software, described security code has the product false proof of comprising inquiry code and/or the product inquiry code of unblanking, and described product false proof inquiry code and/or the product inquiry code of unblanking is encrypted with data encryption algorithm, and convert X-Y scheme to, and with the information uploading of described X-Y scheme to product database 111, the product false proof sign indicating number label 112 that is printed with described X-Y scheme hangs on product or the coded lock;
Step B, client device 101 are gathered X-Y scheme and the identification on product or the coded lock, obtain the product false proof sign indicating number, and the security code that obtains sent to security code inquiry and administrative unit 105, enter product database 111 by switch 107 after described security code inquiry and 105 pairs of security codes of administrative unit are decrypted and mate, and matching result is returned to client device 101;
In described step B, the user need verify when product is true and false, by the client software and the installation of download system exploitation; Open client software and X-Y scheme identification interface occurs, the user discerns camera automatically facing to X-Y scheme, identification back user can select message search or network inquiry, security code can be sent to security code inquiry and administrative unit 105, the inquiry of described security code and 105 pairs of security codes of administrative unit are decrypted the back and enter product database 111 by switch 107 and mate, if find corresponding security code then mode by note or network returns to the user; If the product false proof inquiry code is then returned the true and false of product, inquiry code is then returned the unlocking cipher of corresponding product if product is unblanked, and the user opens coded lock according to the explanation on the label and gets final product after obtaining unlocking cipher.
The generation and the process of exchange of security code of the present invention have been realized robotization.Enterprise produces the security code of respective amount and converts X-Y scheme, product database, system management and maintenance, speech polling interface, network inquiry interface, message search interface, data base encryption, security code coding rule, cell-phone customer terminal X-Y scheme software at order by the management service of the service of network customization Antiforge inquiry, tailored ciphers lock, order.
Described order management module may further comprise the steps the product information that producer provides by the transaction that coding of the security code in the security code generation unit and encryption software produce security code and security code:
Step 1, enterprise place an order by logon web page, and the keeper is by order and contract management unit audit order, examine then to allow the enterprise customer to download and upload the contract of having signed by server end 106 on webpage after qualified;
The contract that step 2, keeper are uploaded by order and contract management unit audit enterprise need be paid corresponding deposit according to the quantity of service and the length of service of customization by enterprise then;
Step 3, keeper examine whether receive deposit, are the sequence information that provides according to the enterprise customer then to be provided produce corresponding security code and generate X-Y scheme and print with product false proof sign indicating number label generation unit 109; The generation of described security code is to produce according to certain coding rule; Described security code adopts cryptographic algorithm to encrypt, and the security code that becomes after the encryption offers the enterprise customer;
Step 4, X-Y scheme label are sent in enterprise customer's hand with coded lock, and the enterprise customer directly is added on the product;
Step 5, system manager upload to the security code of electronic version in the product database 111, and the system manager examines errorless then security code can begin to start inquiry service, and the product of this order is started selling;
After step 6, enterprise product are sold, after the user buys product, carry out true and false inquiry and obtain unlocking cipher;
After step 7, product were sold, the user obtained the inquiry code of unblanking according to scraping latent sign indicating number coating off, the inquiry of unblanking.If system returns unlocking cipher and directly unblanks to get final product,, be 1478 such as the corresponding unlocking cipher of X1Y1Z1Z2 if what return is that unblank index code then user finds corresponding password according to index code on label.System returns to the user is that password or index code are that requirement according to the enterprise customer decides.
Described step 1,2 and 3 orders of mentioning and contract management unit are mainly used in the order of management security code, can realize to order contents audit, to underproof order annotate and comment on, treaty content is checked audit, underproof contract is annotated and commented on, checked the order details, changes the state of order.Major function has states such as audit, the contract audit of order, the audit of determining to collect money to show.After finishing, all work begin to enter inquiry phase, enterprise will open service earlier, service side begins formally to put into effect after the service, state changes service stopping into when order has expired then, when the order that stops according to circumstances can being deleted order, unblank table and the false proof code table of product database are also deleted simultaneously.Described order and contract management unit provide the state according to order to come order is classified, and such as when select submitting to order etc. pending, then the capital of Chu Xianing is pending parts such as submission order.
Further, as follows according to certain coding rule in the described step 3: before, during and after security code is divided into three sections, the security code cryptographic algorithm that is encoded to of leading portion obtains, and interlude is the random code that system produces, and back segment is encoded to production code member; Totally 31 of security codes are respectively 10 of preceding segment encodes, 10 of middle segment encodes, and 10 of back segment encodes, 1 of effect sign indicating number, the step that produces corresponding security code comprises:
Step 301: preceding segment encode obtains by function x=f (y), and y is middle segment encode, and x is preceding segment encode, is 10 bit digital, such as, y equals 1234567890, gets even bit 24680;
Step 302: the even bit of the y that obtains according to step 31 finds corresponding value in mapping table, and will in mapping table, find corresponding value to replace the numeral of even bit, obtain new y, such as 24680 in mapping table corresponding number be A8F4C, A8F4C is replaced 24680, and then y equals 1A385F749C;
Mapping table:
1 2 3 4 5 6 7 8 9 0
9 A 7 8 6 F D 4 B C
Step 303: transfer new y to binary number, such as, 1A385F749C is converted into scale-of-two and equals 1,101 0,001 1,100 0,010 1,111 1,011 1,010 0,100 1,110 0;
Step 304: described binary number odd bits and even bit are exchanged, such as, for several odd bits of example and even bit be 1,110 0,010 1,100 0,001 1,111 0,111 0,101 1,000 1,101 0 after exchanging;
Step 305: change into the decimal system again after the exchange of even bit and odd bits,, be no more than 10 then 10 of polishings in front if the decimal system of gained surpasses 10 then get preceding 10;
Step 306: the effect sign indicating number multiply by key by the middle double figures of preceding segment encode, middle segment encode, back segment encode respectively, and then divided by 10 remainders that obtain, for example security code is 7883137400-12345678936-0201208010-6.Key is 123456, and then the effect sign indicating number equals (1*1+3*2+5*3+6*4+2*5+0*6) %10=6.
The security code of the generation correspondence that described step 3 is mentioned also generates X-Y scheme and mainly comprises the order of searching security codes to be generated such as product database, the security code generation unit generates security code for this order after finding order, and the security code that generates converted to corresponding X-Y scheme, and be saved in the word document in order.Major function is to find the numbering that needs generate security code according to order status, the first step: order generates the product false proof sign indicating number according to above-mentioned coding rule; Second step: the security code that obtains according to step (1) generates X-Y scheme; The 3rd step: the typesetted word the inside that is saved in order of X-Y scheme.
The cryptographic algorithm of mentioning in the described step 3 is defined as follows:
The definition of relevant character string:
The first step: encrypted character string: Cn={c0c1c2c3 ... ci ... cn-1}
Wherein: i is the sequence number (span 0~n-1) of character among the Cn;
N is a Cn length.
Second step: encrypted characters string: Dn={d0d1d2d3 ... di ... dn-1}
Wherein: i is the sequence number (span 0~n-1) of character among the Dn;
N is a Dn length.
The 3rd step: database table major key: Px={p0p1p2p3 ... pa ... px-1}
Wherein: i is the sequence number (span 0~x-1) of character among the Px;
X is a Px length.
The 4th step: secret key character: K
The algorithm definition:
The generating algorithm of K:
If flag=is (p1+p2+p3+ ... pa+ ... px+i) %4 then
if?flag=0,K=0x01;
if?flag=1,K=0x02;
if?flag=2,K=0x04;
if?flag=3,K=0x08。
Operational symbol % meaning: C=A%B represents that C is the remainder of A divided by B.
The generating algorithm of Dn in second step:
di=K^ci
Operational symbol ^ meaning: C=A^B represent C be A and B step-by-step with or the result.
Further, carry out true and false inquiry and obtain unlocking cipher four kinds of methods are arranged in the described step 6:
Method one: the X-Y scheme that the user claps the Product labelling top with other X-Y scheme identification softwares obtains the mobile phone client software download address that native system comprises, by accessed web page download client software, download and install and open the very false proof software of bat after finishing, clap product false proof inquiry code on the product false proof sign indicating number label or the product inquiry code of unblanking, the user selects to send message search, then system can send to user mobile phone by note with Query Result, the user select network inquiry then the result directly turn back to the software page;
Method two: send product false proof inquiry code on the label or the product number of inquiry code to the label of unblanking, system can send to user mobile phone by note with Query Result;
Method three: dial hotline and inquire about according to Voice Navigation, system can report the result to the user;
Method four: open the site home page on the label, input product false proof inquiry code or the product inquiry code of unblanking, system can directly show the result by the mode of dialog box.
The client X-Y scheme identification software of mentioning in the described step 6 is to make full use of smart mobile phone, the vision system of panel computer and the automatic identify customer end software of developing in conjunction with product anti-fake system of X-Y scheme, the client only need open client software and aim at the false proof X-Y scheme coding that is printed on the product false proof sign indicating number label, client software can be finished X-Y scheme identification automatically, client software can eject the client and select message search mode and network inquiry mode automatically after identification was finished, the client selects inquiry mode according to demands of individuals, and system just carries out corresponding information feedback according to the content of inquiry.Such as, inquiry true or false of products information, system will be fed back the true and false information and the production company of product; The unlocking cipher of inquiry product, the unlatching cryptographic service information of product will be fed back by system; Inquiry be not the false proof X-Y scheme coding of native system correspondence, system is will the feedback encoding rule incorrect, beware of imitations!
The true and false query script that relates in the described step 6, backstage carry out primary screening according to coding rule after obtaining the security code that the user provides, and get rid of the security code that non-native system produces.Enter the product data library inquiry by first screening, check at first whether inquiry code or IP address are added into blacklist, described blacklist is primarily aimed at the user of malice inquiry, then do not check whether meet querying condition at blacklist, native system same number of the account of same number inquiry in hour can only be inquired about once, and this product is not also unblanked.
The process of obtaining unlocking cipher that relates in the described step 6, backstage are carried out primary screening according to coding rule after obtaining the inquiry code that the user provides, and get rid of the security code that non-native system produces.Enter the product data library inquiry by screening for the first time, check at first whether enquiry number or IP address are added into blacklist, blacklist is primarily aimed at the user of malice inquiry, then do not check whether meet querying condition at blacklist, whether product drove lock, opened number or the IP address of then checking this inquiry and followed unblank whether consistent, and unanimity is then returned the index code of unblanking, be not return results not then, prompting has been unblanked.
The voice inquiry system that relates in the described step 6 mainly is by the mode of self-service or manual service security code to be inquired about.Self-service mode mainly is to be undertaken realizing that according to Voice Navigation true and false inquiry, unlocking cipher obtain, change the function of manual service by the hotline of dialing system and providing.When receiving the manual service phone, at voice inquiry system input security code, click inquiry and can obtain Query Result, the result shows below edit box.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. one kind is utilized machine vision and based on the product anti-fake system of X-Y scheme, it is characterized in that, comprise coded lock, client device, telephone network, mobile communications network, Internet network, server end, security code inquiry and administrative unit, switch, order management module, product false proof sign indicating number label generation unit;
Described server end is used to place site home page, message search interface, network inquiry interface;
Described coded lock is added in the opening part of anti-fake product;
Described client device is connected by the one or more and described server end in described telephone network, described mobile communications network, the described Internet network;
Described switch is connected with described server end, is used for the exchange between the data;
Described security code inquiry and administrative unit are connected with described switch;
Described order management module links to each other with described switch, described product false proof sign indicating number label generation unit respectively, described order management module sends security code information to described product false proof sign indicating number label generation unit, described product false proof sign indicating number label generation unit generates product false proof sign indicating number label, and described product false proof sign indicating number label includes X-Y scheme.
2. product anti-fake system as claimed in claim 1 is characterized in that described client device comprises phone, mobile phone, panel computer, portable computer and PC.
3. product anti-fake system as claimed in claim 1 is characterized in that, described order management module comprises security code generation unit, order and contract management unit and expanded application unit;
Described security code generation unit links to each other with described switch, is used for generating unblank inquiry code and convert X-Y scheme to of the product false proof inquiry code of security code and product according to the security code coding rule;
Described order links to each other with described switch with the contract management unit, is used for management enterprise and examines by the order of page download and to the contract that enterprise uploads, and examines the instruction that qualified back sends production product false proof sign indicating number label;
Described expanded application unit links to each other with described switch, is used to expand the function of order management module.
4. product anti-fake system as claimed in claim 1, it is characterized in that, also comprise the system management and maintenance module and the product database that link to each other with described switch, described system management and maintenance module are used for data are managed and periodic maintenance, and described product database is used for the data of storage products information.
5. one kind is utilized machine vision and based on the antifake method for products of X-Y scheme, it is characterized in that, may further comprise the steps:
Steps A, order management module produce security code with the product information that producer provides by coding of the security code in the security code generation unit and encryption software, described security code generation unit converts security code to X-Y scheme, and with the information uploading of described X-Y scheme to product database, the product false proof sign indicating number label that is printed with described X-Y scheme hangs on product or the coded lock;
Step B, client device are gathered X-Y scheme and the identification on product or the coded lock, obtain the product false proof sign indicating number, and the security code that obtains sent to security code inquiry and administrative unit, enter product database by switch after described security code inquiry and administrative unit are decrypted security code and mate, and matching result is returned to client device.
6. antifake method for products as claimed in claim 5, it is characterized in that, described security code comprises product false proof inquiry code and/or the product inquiry code of unblanking, and with data encryption algorithm described product false proof inquiry code and/or product is unblanked to convert X-Y scheme to after inquiry code encrypts;
In described step B, if described matching result is a corresponding security code then mode by note or network returns to the user; If described matching result is the product false proof inquiry code then returns the true and false of product, if described matching result is a product unblank inquiry code then return the unlocking cipher of corresponding product.
7. antifake method for products as claimed in claim 5 is characterized in that, described order management module comprises the product information that producer provides by the step that coding of the security code in the security code generation unit and encryption software produce security code:
Step 1, enterprise place an order by logon web page, and the keeper is by order and contract management unit audit order, examine then to allow the enterprise customer to download and upload the contract of having signed by server end on webpage after qualified;
The contract that step 2, keeper are uploaded by order and contract management unit audit enterprise need be paid corresponding deposit according to the quantity of service and the length of service of customization by enterprise then;
Step 3, keeper examine whether receive deposit, be that the sequence information that then begins to provide according to the enterprise customer produces corresponding security code according to certain coding rule, and the generation X-Y scheme print by product false proof sign indicating number label generation unit.
8. antifake method for products as claimed in claim 7 is characterized in that, after the described step 3, also comprises:
Step 4, X-Y scheme label are sent in enterprise customer's hand with coded lock, and the enterprise customer needs the time spent directly to be added on the product;
Step 5, system manager upload to the security code of electronic version in the product database, and the system manager examines errorless then security code can begin to start inquiry service, and the product of this order is started selling;
After step 6, enterprise product are sold, after the user buys product, carry out true and false inquiry and obtain unlocking cipher;
After step 7, product were sold, the user obtained the inquiry code of unblanking according to scraping latent sign indicating number coating off, the inquiry of unblanking.
9. antifake method for products as claimed in claim 8 is characterized in that, the step of carrying out true and false inquiry in the described step 6 and obtaining unlocking cipher is:
The X-Y scheme that the user claps the Product labelling top with other X-Y scheme identification softwares obtains the mobile phone client software download address that native system comprises, by accessed web page download client software, download and install and open the very false proof software of bat after finishing, clap product false proof inquiry code on the product false proof sign indicating number label or the product inquiry code of unblanking, the user selects to send message search, then system can send to user mobile phone by note with Query Result, the user select network inquiry then the result directly turn back to the software page; Perhaps
Send product false proof inquiry code on the label or the product number of inquiry code to the label of unblanking, system can send to user mobile phone by note with Query Result; Perhaps
Dial hotline and inquire about according to Voice Navigation, system can report the result to the user; Perhaps
Open the site home page on the label, input product false proof inquiry code or the product inquiry code of unblanking, system can directly show the result by the mode of dialog box.
10. antifake method for products as claimed in claim 7 is characterized in that coding rule is as follows described in the step 3: totally 31 of security codes comprise 10 preceding segment encode, 10 middle segment encode, 10 back segment encode and 1 check code; Described top end stops is obtained by the security code cryptographic algorithm, and described middle segment encode is a random code, and described back segment encode is a production code member; The described step that produces corresponding security code comprises:
Step 301: preceding segment encode obtains by function x=f (y), and y is middle segment encode, and x is preceding segment encode, is 10 bit digital;
Step 302: the even bit of the y that obtains according to step 301 finds corresponding value in a mapping table, and will find corresponding value to replace the numeral of even bit in mapping table, obtains new y;
Step 303: transfer new y to binary number;
Step 304: described binary number odd bits and even bit are exchanged;
Step 305: change into the decimal system again after the exchange of even bit and odd bits,, be no more than 10 then 10 of polishings in front if the decimal system of gained surpasses 10 then get preceding 10;
Step 306: the effect sign indicating number multiply by key by the middle double figures of preceding segment encode, middle segment encode, back segment encode respectively, then divided by 10 remainders that obtain.
CN201310124535.5A 2013-04-11 2013-04-11 Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure Expired - Fee Related CN103218723B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310124535.5A CN103218723B (en) 2013-04-11 2013-04-11 Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310124535.5A CN103218723B (en) 2013-04-11 2013-04-11 Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure

Publications (2)

Publication Number Publication Date
CN103218723A true CN103218723A (en) 2013-07-24
CN103218723B CN103218723B (en) 2017-02-01

Family

ID=48816484

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310124535.5A Expired - Fee Related CN103218723B (en) 2013-04-11 2013-04-11 Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure

Country Status (1)

Country Link
CN (1) CN103218723B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105096142A (en) * 2015-08-11 2015-11-25 深圳正品创想科技有限公司 Anti-counterfeiting system and anti-counterfeiting method
CN105654314A (en) * 2015-12-30 2016-06-08 深圳爱正品科技有限公司 Electronic tag based anti-counterfeiting method and system
CN106127495A (en) * 2016-06-28 2016-11-16 昆明珍茗食品有限责任公司 A kind of bottled water two-dimension code label identification management Antiforge system
TWI566183B (en) * 2015-07-17 2017-01-11 呂錦明 System and method for anti-forgery digital labeling
CN107609620A (en) * 2017-08-15 2018-01-19 深圳市通用条码技术开发中心 A kind of making of false proof discoloration Quick Response Code and application method
CN108763939A (en) * 2018-05-02 2018-11-06 开源物联网(广州)有限公司 The encryption method and encryption system of security code
CN110570211A (en) * 2019-01-07 2019-12-13 原仓(广州)文化科技有限公司 IP filing and management system and anti-counterfeiting label generation method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101483686A (en) * 2008-11-20 2009-07-15 杭州华科通信设备有限公司 Digital anticounterfeiting system and method based on IP telephone operation system
CN102163313A (en) * 2011-03-12 2011-08-24 曹信江 Anti-counterfeit method based on dual-right verification principle
CN102254278A (en) * 2011-07-01 2011-11-23 广州宽度信息技术有限公司 Shopping quality maintenance system based on two-dimension code
CN102622633A (en) * 2012-03-14 2012-08-01 江苏联博计算机信息产业有限公司 Multifunctional digital anti-counterfeiting code tag and applications of multifunctional digital anti-counterfeiting code tag
CN102663961A (en) * 2012-03-21 2012-09-12 杜浩燕 Fabrication method for anti-counterfeiting film, tag of anti-counterfeiting film, anti-counterfeiting tag and anti-counterfeiting system
CN102708184A (en) * 2012-05-11 2012-10-03 贵州卓霖防伪科技有限公司 Method for inquiring anti-fake two-dimension code of coded lock
CN102982459A (en) * 2012-11-06 2013-03-20 童浩铭 Dual-code anti-counterfeiting system and dual-code anti-counterfeiting method for intelligent communication terminals
CN203338404U (en) * 2013-04-11 2013-12-11 深圳大学 Product anti-counterfeiting system employing machine vision and based on two dimensional drawing

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101483686A (en) * 2008-11-20 2009-07-15 杭州华科通信设备有限公司 Digital anticounterfeiting system and method based on IP telephone operation system
CN102163313A (en) * 2011-03-12 2011-08-24 曹信江 Anti-counterfeit method based on dual-right verification principle
CN102254278A (en) * 2011-07-01 2011-11-23 广州宽度信息技术有限公司 Shopping quality maintenance system based on two-dimension code
CN102622633A (en) * 2012-03-14 2012-08-01 江苏联博计算机信息产业有限公司 Multifunctional digital anti-counterfeiting code tag and applications of multifunctional digital anti-counterfeiting code tag
CN102663961A (en) * 2012-03-21 2012-09-12 杜浩燕 Fabrication method for anti-counterfeiting film, tag of anti-counterfeiting film, anti-counterfeiting tag and anti-counterfeiting system
CN102708184A (en) * 2012-05-11 2012-10-03 贵州卓霖防伪科技有限公司 Method for inquiring anti-fake two-dimension code of coded lock
CN102982459A (en) * 2012-11-06 2013-03-20 童浩铭 Dual-code anti-counterfeiting system and dual-code anti-counterfeiting method for intelligent communication terminals
CN203338404U (en) * 2013-04-11 2013-12-11 深圳大学 Product anti-counterfeiting system employing machine vision and based on two dimensional drawing

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SINOVIS: "中国码通手机二维码防伪解决方案", 《百度文库》, 25 July 2012 (2012-07-25), pages 1 - 4 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI566183B (en) * 2015-07-17 2017-01-11 呂錦明 System and method for anti-forgery digital labeling
CN105096142A (en) * 2015-08-11 2015-11-25 深圳正品创想科技有限公司 Anti-counterfeiting system and anti-counterfeiting method
CN105654314A (en) * 2015-12-30 2016-06-08 深圳爱正品科技有限公司 Electronic tag based anti-counterfeiting method and system
CN106127495A (en) * 2016-06-28 2016-11-16 昆明珍茗食品有限责任公司 A kind of bottled water two-dimension code label identification management Antiforge system
CN107609620A (en) * 2017-08-15 2018-01-19 深圳市通用条码技术开发中心 A kind of making of false proof discoloration Quick Response Code and application method
CN108763939A (en) * 2018-05-02 2018-11-06 开源物联网(广州)有限公司 The encryption method and encryption system of security code
CN110570211A (en) * 2019-01-07 2019-12-13 原仓(广州)文化科技有限公司 IP filing and management system and anti-counterfeiting label generation method
CN110570211B (en) * 2019-01-07 2022-12-09 原仓(广州)文化科技有限公司 IP filing and management system and anti-counterfeiting mark generation method

Also Published As

Publication number Publication date
CN103218723B (en) 2017-02-01

Similar Documents

Publication Publication Date Title
CN103218723A (en) Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure
CN108520293A (en) A kind of product false proof source tracing method, device, server and storage medium
CN102663592B (en) Article identity dicode identification method based on Quick Response Code
CN108964905A (en) A kind of safe and efficient block chain implementation method
CN102779284B (en) RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like
CN101847225B (en) A kind of method based on CN39 code managing commodity circulation
CN109074433A (en) Method and system for verifying digital asset integrity using distributed hash tables and point-to-point distributed ledgers
CN107409002A (en) Method and apparatus of the repeatable encryption key of general certainty to expression are provided for all SKU, canister and article
CN102004965B (en) Double ant-counterfeiting method and system of product
CN104618334A (en) Method and system for generating and verifying dynamic two-dimensional code
CN108664798B (en) Information encryption method and device
CN103093361A (en) Commodity double-layer anti-fake method based on technologies of internet of things
CN107025460A (en) The system and method for improving contract management level and efficiency
CN103295137A (en) Two-dimensional code dynamic anti-fake information intelligent tracing system based on network
CN105930892A (en) Variable logo two-dimensional code anti-counterfeiting method and system
CN104766113A (en) Plain and secret code type anti-fake label and anti-fake method thereof
CN101201886A (en) Three-he-code for recognizing commodity
CN103942845A (en) Method for checking electronic invoice
CN104463647A (en) Electronic invoice-based electronic posting method and system and electronic invoice client
CN107992759A (en) Realize device, method and the computer-readable recording medium of E-seal
CN104125230A (en) Short message authentication service system and authentication method
CN106778993A (en) A kind of generation method of antifalsification label, verification method and its device
CN102891841B (en) The method of a kind of Web bank Account lockout, device and system
CN106504007A (en) A kind of commodity counterfeit prevention management system based on NFC electronic tags
CN203338404U (en) Product anti-counterfeiting system employing machine vision and based on two dimensional drawing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20161230

Address after: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A (located in Shenzhen Qianhai Business Secretary limited) business places in Shenzhen City, Luohu District Shennan East Road, building D, Jinlong Plaza 100 building room 905

Applicant after: SHENZHEN FRESHNESS INTELLIGENT TECHNOLOGY CO.,LTD.

Address before: 518060 Nanhai Road, Guangdong, Shenzhen, No. 3688, No.

Applicant before: Shenzhen University

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170201

CF01 Termination of patent right due to non-payment of annual fee