CN103218723B - Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure - Google Patents

Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure Download PDF

Info

Publication number
CN103218723B
CN103218723B CN201310124535.5A CN201310124535A CN103218723B CN 103218723 B CN103218723 B CN 103218723B CN 201310124535 A CN201310124535 A CN 201310124535A CN 103218723 B CN103218723 B CN 103218723B
Authority
CN
China
Prior art keywords
product
code
inquiry
security code
false proof
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310124535.5A
Other languages
Chinese (zh)
Other versions
CN103218723A (en
Inventor
程涛
徐刚
冯平
彭小波
王燕燕
彭涛
李商旭
唐志坚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Freshness Intelligent Technology Co ltd
Original Assignee
Shenzhen Cheng Xin Fresh Intelligent Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Cheng Xin Fresh Intelligent Polytron Technologies Inc filed Critical Shenzhen Cheng Xin Fresh Intelligent Polytron Technologies Inc
Priority to CN201310124535.5A priority Critical patent/CN103218723B/en
Publication of CN103218723A publication Critical patent/CN103218723A/en
Application granted granted Critical
Publication of CN103218723B publication Critical patent/CN103218723B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to the field of product anti-fake techniques and provides a product anti-fake system and a method by means of machine vision and on basis of a two-dimensional figure. The system comprises a coded lock, a client device, a telephone network, a mobile communication network, an Internet network, a server end, an anti-fake code query and management unit, a switch board, an order management module and a product anti-fake code label generation unit. The coded lock is arranged at an opening of an anti-fake product. The client device is connected with the server end through the telephone network, the mobile communication network and the Internet network. The switch board is connected with the server end. The anti-fake code query and management unit is connected with the switch board. The order management module is respectively connected with the switch board and the product anti-fake code label generation unit. According to the system, market product counterfeiting can be effectively struck, legal rights and interests of consumers can be well protected, and meanwhile the technical problem that in the prior art, anti-fake codes are too long is solved.

Description

A kind of utilization machine vision and the product anti-fake system based on X-Y scheme and method
Technical field
The invention belongs to products antifake technique field, more particularly, to a kind of utilization machine vision and the product based on X-Y scheme Product Antiforge system and method.
Background technology
With high-tech development, fake products also occurs therewith, and emerges in an endless stream, various personations, high imitative product on market The appearance of product, has not only encroached on the interests of consumers in general, has also upset normal market order, and has brought to production firm Huge economic loss.Along with the appearance of fake products, the technology of various antagonism fake products also occurs therewith.Although at present Also have the generation of many method for anti-counterfeit, but traditional method for anti-counterfeit be generally limited to physics package anti-counterfeiting and digital coding false proof this two Kind.Whether physics package anti-counterfeiting needs special discriminating instrument, want the product that inspection institute buys to be genuine piece for consumer Relatively difficult, and some lawless persons can load false pain product by reclaiming the packaging of genuine piece with very pack, so, for disappearing Just it is more difficult to identify for expense person from physics packaging.The false proof inquiry of digital coding also has inconvenience, and consumer really makes Chance is simultaneously few.
The present antifake method for products based on technology of Internet of things, is by using the network platform or telephony platform Carry out inquiring about the true and false of anti-fake code and the unlocking cipher obtaining coded lock, but this kind of method consumer goes back during using It is inconvenient, nor timely learns the true and false of product, meanwhile the anti-fake code of anti-counterfeiting technology is long, in use Inconvenience can be brought to production firm.
Content of the invention
The technical problem to be solved is to provide a kind of utilization machine vision and the product based on X-Y scheme Antiforge system and method are it is intended to solve the problems, such as products antifake technique.By machine vision mode, true and false X-Y scheme is carried out Automatic identification, selects message search or network inquiry mode to send anti-fake code to product false proof information system by client software Unite in local backstage or producer's background database manager system, background data base feeds back the true and false information of product to user, from And complete the true and false inquiry of product;When user need to open product, carried out automatically by machine vision mode dual lock X-Y scheme Identification, selects message search or network inquiry mode to send anti-fake code to product false proof information system originally by client software Ground backstage or producer's background database manager system in, background database manager system feedback unlocking cipher to user, thus Complete the unlatching of product.
The present invention is achieved in that a kind of utilization machine vision and the product anti-fake system based on X-Y scheme, including Coded lock, client device, telephone network, mobile communications network, internet, server end, security code inquiry and management Unit, switch, order management module, product false proof code label generation unit;
Described server end is used for placing site home page, message search interface, network inquiry interface;
Described coded lock is added at the opening of anti-fake product;
Described client device is by described telephone network, described mobile communications network, described internet Individual or multiple and described server end is connected;
Described switch is connected with described server end, for the exchange between data;
Described security code inquiry and administrative unit are connected with described switch;
Described order management module is connected with described switch, described product false proof code label generation unit respectively, described Order management module sends security code information to described product false proof code label generation unit, and described product false proof code label generates Unit generates product false proof code label, and described product false proof code label includes X-Y scheme.
Further, described client device includes phone, mobile phone, panel computer, portable computer and pc machine.
Further, described order management module includes security code signal generating unit, order and contract management unit and extension Applying unit;
Described security code signal generating unit is connected with described switch, for being generated in security code according to security code coding rule Product false proof inquiry code and product unlocking inquiry code be converted into X-Y scheme;
Described order is connected with described switch with contract management unit, for managing the order by page download for the enterprise And the contract of enterprise's upload is examined, examine the qualified rear instruction sending production product false proof code label;
Described expanded application unit is connected with described switch, for extending the function of order management module.
Further, described product anti-fake system also include the system administration that is connected with described switch and maintenance module and Product database, described system administration and maintenance module are used for data is managed and periodic maintenance, described product database For storing the data of product information.
The present invention also provides a kind of utilization machine vision and the antifake method for products based on X-Y scheme, walks including following Rapid:
The security code that the product information that producer provides is passed through in security code signal generating unit by step a, order management module is compiled Code and encryption software produce security code, and security code is converted into X-Y scheme by described security code signal generating unit, and by described two dimension The information of figure is uploaded to product database, and the product false proof code label being printed with described X-Y scheme hangs over product or password Lock;
Step b, client device gather the X-Y scheme on product or coded lock and identify, obtain product false proof code, And the security code obtaining is sent to security code inquiry and administrative unit, described security code inquiry and administrative unit are entered to security code Enter product database by switch after row deciphering to be mated, and matching result is returned to client device.
Further, described security code includes product false proof inquiry code and/or product unlocking inquiry code, and uses data encryption After algorithm is encrypted to described product false proof inquiry code and/or product unlocking inquiry code, it is converted into X-Y scheme;
In described step b, if described matching result is corresponding security code, by way of note or network Return to user;If described matching result is product false proof inquiry code, return the true and false of product, if described matching result It is the unlocking cipher that product unlocking inquiry code then returns corresponding product.
Further, the product information that producer provides is passed through preventing in security code signal generating unit by described order management module The step of pseudo-code coding and encryption software generation security code includes:
Step 1, enterprise are placed an order by logon web page, and manager passes through order and audits order with contract management unit, Then allow enterprise customer to pass through server end after examination & verification is qualified to be downloaded on webpage and upload the contract signed;
Step 2, manager pass through order and contract management unit audits the contract that enterprise uploads, and need root by then enterprise Quantity of service and the length of service according to customization pay corresponding deposit;
Step 3, manager examine whether receive deposit, are, start the sequence information providing according to enterprise customer according to one Fixed coding rule produces corresponding security code, and generates X-Y scheme and printed by product false proof code label generation unit Come.
Further, after described step 3, also include:
Step 4, X-Y scheme label are sent in enterprise customer's handss together with coded lock, and enterprise customer needs the used time directly to add On product;
The security code of electronic version is uploaded in product database by step 5, system manager, and system manager's examination & verification is no Then security code can start to start inquiry service by mistake, and the product of this order is started selling;
After step 6, enterprise product are sold, after user buys product, carry out true and false inquiry and obtain unlocking cipher;
After step 7, product are sold, user, according to scraping hidden code coating off, obtains unlocking inquiry code, carries out inquiry of unlocking.
Further, carry out true and false inquiry in described step 6 and the step of acquisition unlocking cipher be:
The X-Y scheme that user is clapped above Product labelling with other X-Y scheme identification softwares obtains the handss that the system comprises Machine client software download address, by accessing page download client software, bat is opened in download after installing very false proof soft Part, claps the product false proof inquiry code on product false proof code label or product unlocking inquiry code, and user selects transmission note to look into Ask, then Query Result can be passed through short message sending to user mobile phone by system, and user selects network inquiry, and then result is returned directly to The software page;Or
Send the number on label of product false proof inquiry code or product unlocking inquiry code on label, system can be by Query Result passes through short message sending to user mobile phone;Or
Dial hotline to be inquired about according to Voice Navigation, system can be reported result to user;Or
Open the site home page on label, input product Antiforge inquiry code or product unlocking inquiry code, system can be by Result is directly shown by way of dialog box.
Further, described in step 3, coding rule is as follows: security code totally 31, including the front segment encode of 10,10 The effect code of middle segment encode, the rear segment encode of 10 and 1;Described front segment encode is obtained by security code AES, and described middle segment encode is Random code, described rear segment encode is production code member;The described step producing corresponding security code includes:
Step 301: front segment encode is obtained by function x=f (y), y is middle segment encode, and x is front segment encode, is 10 bit digital;
Step 302: the even bit of the y being obtained according to step 301 finds corresponding value in a mapping table, and will be in mapping Find the numeral that corresponding value replaces even bit in table, obtain new y;
Step 303: new y is switched to binary number;
Step 304: described binary number odd bits and even bit are exchanged;
Step 305: change into decimal scale again after even bit and odd bits exchange, the decimal scale of gained is if it exceeds 10 then take First 10, less than 10 then in above polishing 10;
Step 306: effect code division is not multiplied by key by the middle double figures of front segment encode, middle segment encode, rear segment encode, then divided by 10 remainders obtaining.
The present invention compared with prior art, has the beneficial effects that the antifake method for products of the present invention can effectively hit market and produce Product are faked, and preferably protect the legitimate rights and interests of consumer, and fully combine smart mobile phone, panel computer in product false proof Application, solves current products antifake technique because the long technical matters of anti-fake code simultaneously, is integrated with various modern The antifalse technology of new and high technology.
Brief description
Fig. 1 is product anti-fake system structure chart provided in an embodiment of the present invention;
Fig. 2 is antifake method for products schematic diagram provided in an embodiment of the present invention.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, below in conjunction with drawings and Examples, right The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only in order to explain the present invention, and It is not used in the restriction present invention.
The antifake method for products of the present invention is encrypted double protection to reach false proof mesh with reference to physics encryption device and information 's.Encrypted physical device such as electronic lock, mechanical lock etc. carry out encrypted physical to each product, reach the false proof mesh of ground floor 's.Encrypted physical namely using encryption device, the unlatching of product is blocked, only when user input correct password ability Realize the opening and closing of product.For example, wine to be carried out false proof, make traditional wine bottle cover with mechanical code lock first Wine bottle cover, be attached to bottle mouth, then mechanical cipher be set, could beat only after obtaining correct unlocking cipher at producer Open bottle.
Information encryption is, using information system, each product is entered with the row information encryption purpose false proof to reach the second layer. Manufacturer is by the relevant information of each product produced such as product coding, product category, Enterprise organization system code etc. One is mapped on unique two-dimensional bar code, and these information are also submitted to a product false proof based on the Internet by manufacturer simultaneously Inquiry information system.Made in the physical message of each product and product false proof information system through manufacturer by this process The product information of certification sets up one-to-one relationship, and these information are submitted to this by way of phone, short message, network Antiforge inquiry information system is verified the true and false that can determine whether this product one by one thus reaching false proof purpose.
As shown in figure 1, a kind of utilization machine vision and the product anti-fake system based on X-Y scheme, including coded lock, visitor Family end equipment 101, telephone network 102, mobile communications network 103, internet 104, server end 106, security code inquiry And administrative unit 105, switch 107, order management module 108, product false proof code label generation unit 109.Described coded lock It is added at the opening of anti-fake product;Described server end 106 is used for placing site home page, message search interface, network inquiry connect Mouthful.Described client device 101 is by described telephone network 102, described mobile communications network 103, described internet 104 One or more of be connected with described server end 106.Described Antiforge inquiry and administrative unit 105 and described switch 107 Connect.Described switch 107 is connected with described server end 106, for the exchange between data.Described order management module 108 are connected with described switch 107, described product false proof code label generation unit 109 respectively, described order management module 108 Send security code information to described product false proof code label generation unit 109, described product false proof code label generation unit 109 is raw Become product false proof code label 112, described product false proof code label 112 includes X-Y scheme.
Further, described client device 101 includes phone, mobile phone, panel computer, portable computer, pc machine, preferably Ground, described mobile phone is smart mobile phone;Described smart mobile phone, panel computer, portable computer are provided with photographic head.
Further, described order management module 108 includes security code signal generating unit, order and contract management unit and expansion Exhibition applying unit.Described security code signal generating unit is connected with described switch, for generating product according to security code coding rule Product false proof inquiry code in security code label and product unlocking inquiry code are simultaneously converted into X-Y scheme, and to the security code generating It is managed.Described order is connected with described switch with contract management unit, passes through the order under webpage for managing enterprise And the contract of enterprise's upload is examined, examine the qualified rear instruction sending production product false proof code label.Described extension should It is connected with described switch with unit, for extending the function of order management module 108.
Described also include being connected with described switch 107 using machine vision and the product anti-fake system based on X-Y scheme System administration and maintenance module 110 and product database 111, described system administration and maintenance module 110 are for entering to data Line pipe reason and periodic maintenance, described product database 111 is used for storing the data of product information.
As shown in Fig. 2 the present invention also provides a kind of utilization machine vision and the antifake method for products based on X-Y scheme, bag Include following steps:
The product information that producer provides is passed through the security code in security code signal generating unit by step a, order management module 108 Coding and encryption software produce security code, and described security code has including product false proof inquiry code and/or product unlocking inquiry code, and With DEA, described product false proof inquiry code and/or product unlocking inquiry code are encrypted, and are converted into X-Y scheme Shape, and the information of described X-Y scheme is uploaded to product database 111, it is printed with the product false proof code mark of described X-Y scheme Sign 112 to hang on product or coded lock;
Step b, client device 101 gather the X-Y scheme on product or coded lock and identify, obtain product false proof Code, and the security code obtaining is sent to security code inquiry and administrative unit 105, described security code inquiry and administrative unit 105 Enter product database 111 by switch 107 after security code is decrypted to mate, and matching result is returned to visitor Family end equipment 101;
In described step b, when user need to verify that product is true and false, the client software developed by download system is simultaneously pacified Dress;Open client software and X-Y scheme identification interface occurs, photographic head is carried out automatic identification against X-Y scheme, knows by user After not, user can select message search or network inquiry, and security code can be sent to security code inquiry and administrative unit 105, The inquiry of described security code and administrative unit 105 enter product database 111 by switch 107 after security code is decrypted and enter Row coupling, if finding corresponding security code, returns to user by way of note or network;If product false proof Inquiry code then returns the true and false of product, if product unlocking inquiry code then returns the unlocking cipher of corresponding product, user is obtaining To after unlocking cipher, coded lock is opened according to the explanation on label.
The generation of security code of the present invention and process of exchange achieve automatization.Enterprise looks into by network customization is false proof Ask service, tailored ciphers lock, the management service of order, produce the security code of respective amount for order and be converted into X-Y scheme Shape, product database, system administration and maintenance, speech polling interface, network inquiry interface, message search interface, data base add Close, security code coding rule, cell-phone customer terminal X-Y scheme software.
The product information that producer provides is passed through the security code coding in security code signal generating unit by described order management module Produce security code with encryption software and the transaction of security code comprise the following steps:
Step 1, enterprise are placed an order by logon web page, and manager is being ordered with the examination & verification of contract management unit by order Single, then allow enterprise customer to pass through server end 106 after examination & verification is qualified and be downloaded on webpage and upload the conjunction signed With;
Step 2, manager pass through order and contract management unit audits the contract that enterprise uploads, and need root by then enterprise Quantity of service and the length of service according to customization pay corresponding deposit;
Step 3, manager examine whether receive deposit, are, the sequence information generation starting according to enterprise customer's offer is right The security code answered simultaneously generates X-Y scheme product false proof code label generation unit 109 and prints;The generation of described security code It is to produce according to certain coding rule;Described security code adopts AES to encrypt, and becomes the security code after encryption and is supplied to Enterprise customer;
Step 4, X-Y scheme label are sent in enterprise customer's handss together with coded lock, and enterprise customer is applied directly to product On;
The security code of electronic version is uploaded in product database 111 by step 5, system manager, and system manager examines Core is errorless, and security code can start to start inquiry service, and the product of this order is started selling;
After step 6, enterprise product are sold, after user buys product, carry out true and false inquiry and obtain unlocking cipher;
After step 7, product are sold, user, according to scraping hidden code coating off, obtains unlocking inquiry code, carries out inquiry of unlocking.As Fruit system returns unlocking cipher and directly unlocks, if return is unlocking index code, user is according to index code on label Find corresponding password, the corresponding unlocking cipher of such as x1y1z1z2 is 1478.What system returned to user is password or index Code is requirement according to enterprise customer to be determined.
The order that described step 1,2 and 3 are mentioned and contract management unit are mainly used in managing the order of security code, Ke Yishi Now to the examination & verification of order contents, underproof order carried out annotate, treaty content carries out checking examination & verification, to underproof contract Carry out annotating, check order detail, the state of change order.Major function has the examination & verification of order, contract audit, determines that gathering is examined The status displays such as core.Inquiry phase is initially entered, service will first be opened by enterprise, after service side starts service after the completion of all work Formally put into effect, when order has expired, state is changed to service stopping, according to circumstances can delete when the order stopping and order List, the unlocking table of product database and false proof code table are also deleted simultaneously.Described order is provided according to order with contract management unit State order is classified, such as when selecting to submit to order etc. pending, then occur will be to submit to order to wait The part of examination & verification.
Further, as follows according to certain coding rule in described step 3: security code be divided into before, during and after three sections, front The security code AES that is encoded to of section obtains, the random code that interlude produces for system, and back segment is encoded to production code member;False proof Code totally 31, is front segment encode 10 respectively, middle segment encode 10, rear segment encode 10, and effect code 1 produces corresponding security code Step includes:
Step 301: front segment encode is obtained by function x=f (y), y is middle segment encode, and x is front segment encode, is 10 bit digital, than As y is equal to 1234567890, takes even bit 24680;
Step 302: the even bit of the y being obtained according to step 31 finds corresponding value in the mapping table, and will be in mapping table In find the numeral that corresponding value replaces even bit, obtain new y, such as 24680 in the mapping table corresponding number be a8f4c, A8f4c is replaced 24680, then y is equal to 1a385f749c;
Mapping table:
Step 303: new y is switched to binary number, such as, 1a385f749c is converted into binary system and is equal to 1,101 0001 1100 0010 1111 1011 1010 0100 1110 0;
Step 304: described binary number odd bits and even bit are exchanged, such as, several odd bits of institute's illustrated example and idol Numerical digit is 1,110 0,010 1,100 0,001 1,111 0,111 0,101 1,000 1,101 0 after exchanging;
Step 305: change into decimal scale again after even bit and odd bits exchange, the decimal scale of gained is if it exceeds 10 then take First 10, less than 10 then in above polishing 10;
Step 306: effect code division is not multiplied by key by the middle double figures of front segment encode, middle segment encode, rear segment encode, then divided by 10 remainders obtaining, such as security code are 7883137400-12345678936-0201208010-6.Key is 123456, then Effect code is equal to (1*1+3*2+5*3+6*4+2*5+0*6) %10=6.
The corresponding security code of generation that described step 3 is mentioned simultaneously generates X-Y scheme and mainly includes searching product database etc. The order of security code to be generated, after finding order, security code signal generating unit generates security code for this order, and false proof to generate Code is converted into corresponding X-Y scheme, and is saved in word document in order.Major function is to find need according to order status The numbering of security code to be generated, the first step: order generates product false proof code according to above-mentioned coding rule;Second step: root Generate X-Y scheme according to the security code that step (1) obtains;3rd step: be saved in a word in order typesetted for X-Y scheme The inside.
The AES mentioned in described step 3 is defined as follows:
Relevant character string defines:
The first step: encrypted character string: cn={ c0c1c2c3 ... ci ... cn-1 }
Wherein: i is the sequence number (span 0~n-1) of character in cn;
N is cn length.
Second step: encrypted characters string: dn={ d0d1d2d3 ... di ... dn-1 }
Wherein: i is the sequence number (span 0~n-1) of character in dn;
N is dn length.
3rd step: database table major key: px={ p0p1p2p3 ... pa ... px-1 }
Wherein: i is the sequence number (span 0~x-1) of character in px;
X is px length.
4th step: secret key character: k
Algorithm defines:
The generating algorithm of k:
If %4 is then for flag=(p1+p2+p3+ ... pa+ ... px+i)
If flag=0, k=0x01;
If flag=1, k=0x02;
If flag=2, k=0x04;
If flag=3, k=0x08.
Operator % meaning: c=a%b represents that c is the remainder divided by b for a.
The generating algorithm of dn in second step:
Di=k^ci
Operator ^ meaning: c=a^b represent c be a with b step-by-step with or result.
Further, carry out true and false inquiry in described step 6 and obtain unlocking cipher and have four kinds of methods:
Method one: the X-Y scheme that user is clapped above Product labelling with other X-Y scheme identification softwares obtains the system bag The mobile phone client software download address containing, by accessing page download client software, downloads and opens bat after installing very Anti-counterfeit software, claps the product false proof inquiry code on product false proof code label or product unlocking inquiry code, and user selects to send Message search, then system can by Query Result pass through short message sending to user mobile phone, user selects network inquiry, and then result is direct Return to the software page;
Method two: the number on label for the product false proof inquiry code or product unlocking inquiry code on transmission label, Query Result can be passed through short message sending to user mobile phone by system;
Method three: dial hotline and inquired about according to Voice Navigation, system can be reported result to user;
Method four: open the site home page on label, input product Antiforge inquiry code or product unlocking inquiry code, be Result can directly be shown by way of dialog box by system.
The client X-Y scheme identification software mentioned in described step 6 makes full use of smart mobile phone, panel computer Visual system the X-Y scheme automatic identification client software of bonded products Antiforge system exploitation, client only need to open client Software be aligned is printed on the false proof X-Y scheme coding on product false proof code label, and client software can be automatically performed X-Y scheme Identification, after the completion of identification, client software can eject client and automatically select message search mode and network inquiry mode, client root Select inquiry mode according to demands of individuals, system just carries out corresponding feedback of the information according to the content of inquiry.Such as, inquiry product is true Fake information, system will feed back true and false information and the production company of product;The unlocking cipher of inquiry product, system will be anti- The unlatching cryptographic service information of feedback product;Inquiry is not the corresponding false proof X-Y scheme coding of the system, and system will be fed back Coding rule is incorrect, and beware of imitations!
The true and false query script being related in described step 6, backstage is advised according to coding after obtaining the security code that user provides Then carry out primary screening, the security code that the non-the system of exclusion produces.Product data library inquiry is entered by first screening, First look at inquiry code or whether ip address is added into blacklist, the user that described blacklist is inquired about mainly for malice, no Then check whether to meet querying condition in blacklist, the same account of the system same number inquiry in a hour can only Inquire about once, and this product is not also unlocked.
The process of the acquisition unlocking cipher being related in described step 6, after backstage obtains the inquiry code that user provides, according to Coding rule carries out primary screening, the security code that the non-the system of exclusion produces.Product data are entered by first time screening Library inquiry, first looks at enquiry number or whether ip address is added into blacklist, and blacklist is mainly for the use of malice inquiry Family, does not then check whether to meet querying condition in blacklist, and whether product drove lock, opened then check this inquiry number or Whether person ip address is consistent with unlock, unanimously then returns unlocking index code, is not then not returning result, points out to be unlocked ?.
The voice inquiry system being related in described step 6 is mainly by way of self-service or manual service to false proof Code is inquired about.Self-service mode mainly carries out realizing the true and false according to Voice Navigation by the hotline dialing system offer Inquiry, unlocking cipher obtain, turn the function of manual service.When being connected to manual service phone, anti-in voice inquiry system input Pseudo-code, clicks on inquiry and can get Query Result, result is illustrated below in edit box.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention Any modification, equivalent and improvement made within god and principle etc., should be included within the scope of the present invention.

Claims (9)

1. a kind of utilization machine vision and the product anti-fake system based on X-Y scheme are it is characterised in that include coded lock, client End equipment, telephone network, mobile communications network, internet, server end, security code inquiry and administrative unit, switch, Order management module, product false proof code label generation unit;
Described server end is used for placing site home page, message search interface, network inquiry interface;
Described coded lock is added at the opening of anti-fake product;
Described client device by one of described telephone network, described mobile communications network, described internet or Multiple and described server end is connected;
Described switch is connected with described server end, for the exchange between data;
Described security code inquiry and administrative unit are connected with described switch;
Described order management module is connected with described switch, described product false proof code label generation unit respectively, described order Management module sends security code information to described product false proof code label generation unit, described product false proof code label generation unit Generate product false proof code label, described product false proof code label includes X-Y scheme;
Security code in described product false proof code label totally 31, after the front segment encode of 10, the middle segment encode of 10,10 The effect code of segment encode and 1;Described front segment encode is obtained by security code AES, and described middle segment encode is random code, described back segment Code is production code member;Wherein, described security code produces in the following way: front segment encode is obtained by function x=f (y), during y is Segment encode, x is front segment encode, is 10 bit digital;Even bit according to the y obtaining finds corresponding value in a mapping table, and will Find the numeral that corresponding value replaces even bit in the mapping table, obtain new y;New y is switched to binary number;Described two enter Number odd bits processed and even bit are exchanged;Change into decimal scale again after even bit and odd bits exchange, the decimal scale of gained if it exceeds 10 then take first 10, less than 10 then in above polishing 10;Effect code division is not by front segment encode, middle segment encode, rear segment encode Middle double figures is multiplied by key, then divided by 10 remainders obtaining.
2. product anti-fake system as claimed in claim 1 is it is characterised in that described client device includes phone, mobile phone, puts down Plate computer, portable computer and pc machine.
3. product anti-fake system as claimed in claim 1 is it is characterised in that described order management module includes security code generation Unit, order and contract management unit and expanded application unit;
Described security code signal generating unit is connected with described switch, for generating the product in security code according to security code coding rule Product Antiforge inquiry code and product unlocking inquiry code are simultaneously converted into X-Y scheme;
Described order is connected with described switch with contract management unit, by the order of page download and right for managing enterprise The contract that enterprise uploads is examined, examines the qualified rear instruction sending production product false proof code label;
Described expanded application unit is connected with described switch, for extending the function of order management module.
4. product anti-fake system as claimed in claim 1 is it is characterised in that also include the system pipes being connected with described switch Reason and maintenance module and product database, described system administration and maintenance module are used for data is managed and periodic maintenance, Described product database is used for storing the data of product information.
5. a kind of antifake method for products using machine vision with based on X-Y scheme is it is characterised in that comprise the following steps:
The product information that producer is provided by step a, order management module pass through security code coding in security code signal generating unit and Encryption software produces security code, and security code is converted into X-Y scheme by described security code signal generating unit, and by described X-Y scheme Information be uploaded to product database, the product false proof code label being printed with described X-Y scheme hangs over product or coded lock On;Described security code totally 31, including the effect code of the front segment encode of 10, the middle segment encode of 10, the rear segment encode of 10 and 1; Described front segment encode is obtained by security code AES, and described middle segment encode is random code, and described rear segment encode is production code member;Wherein, Described security code produces in the following way: front segment encode is obtained by function x=f (y), and y is middle segment encode, and x is front segment encode, is 10 bit digital;Even bit according to the y obtaining finds corresponding value in a mapping table, and will find corresponding in the mapping table Value replaces the numeral of even bit, obtains new y;New y is switched to binary number;Described binary number odd bits and even bit pair Adjust;Decimal scale is changed into again, the decimal scale of gained, if it exceeds 10 then take first 10, is less than after even bit and odd bits exchange 10 then in above polishing 10;Effect code division is not multiplied by key by the middle double figures of front segment encode, middle segment encode, rear segment encode, so Afterwards divided by 10 remainders obtaining;
Step b, client device gather the X-Y scheme on product or coded lock and identify, obtain product false proof code, and will The security code obtaining is sent to security code inquiry and administrative unit, and described security code inquiry and administrative unit solve to security code Enter product database by switch after close to be mated, and matching result is returned to client device.
6. antifake method for products as claimed in claim 5 is it is characterised in that described security code includes product false proof inquiry code And/or product unlocking inquiry code, and with DEA, described product false proof inquiry code and/or product unlocking inquiry code are entered After row encryption, it is converted into X-Y scheme;
In described step b, if described matching result is corresponding security code, returned by way of note or network To user;If described matching result is product false proof inquiry code, return the true and false of product, if described matching result is to produce Product unlocking inquiry code then returns the unlocking cipher of corresponding product.
7. antifake method for products as claimed in claim 5 is it is characterised in that the described order management module product that provides producer Product information is included by the step that the security code coding in security code signal generating unit and encryption software produce security code:
Step 1, enterprise are placed an order by logon web page, and manager passes through order and audits order, examination & verification with contract management unit Then allow enterprise customer to pass through server end after qualified to be downloaded on webpage and upload the contract signed;
Step 2, manager pass through order and contract management unit audits the contract that enterprise uploads, and are needed according to fixed by then enterprise The quantity of service of system and the length of service pay corresponding deposit;
Step 3, manager examine whether receive deposit, are, start according to enterprise customer provide sequence information according to certain Coding rule produces corresponding security code, and generates X-Y scheme and printed by product false proof code label generation unit.
8. antifake method for products as claimed in claim 7 is it is characterised in that after described step 3, also include:
Step 4, X-Y scheme label are sent in enterprise customer's handss together with coded lock, and enterprise customer needs the used time to be applied directly to produce On product;
The security code of electronic version is uploaded in product database by step 5, system manager, and system manager's examination & verification is errorless then Security code can start to start inquiry service, and the product of this order is started selling;
After step 6, enterprise product are sold, after user buys product, carry out true and false inquiry and obtain unlocking cipher;
After step 7, product are sold, user, according to scraping hidden code coating off, obtains unlocking inquiry code, carries out inquiry of unlocking.
9. antifake method for products as claimed in claim 8 is it is characterised in that carry out true and false inquiry and acquisition in described step 6 The step of unlocking cipher is:
The X-Y scheme that user is clapped above Product labelling with other X-Y scheme identification softwares obtains the mobile phone visitor that the system comprises Family end software download address, by accessing page download client software, downloads and opens the true anti-counterfeit software of bat after installing, clap Product false proof inquiry code on product false proof code label or product unlocking inquiry code, user selects to send message search, then Query Result can be passed through short message sending to user mobile phone by system, and user selects network inquiry, and then result is returned directly to software page Face;Or
The number on label for the product false proof inquiry code or product unlocking inquiry code on transmission label, system can will be inquired about Result passes through short message sending to user mobile phone;Or
Dial hotline to be inquired about according to Voice Navigation, system can be reported result to user;Or
Open the site home page on label, input product Antiforge inquiry code or product unlocking inquiry code, system can be by result Directly shown by way of dialog box.
CN201310124535.5A 2013-04-11 2013-04-11 Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure Expired - Fee Related CN103218723B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310124535.5A CN103218723B (en) 2013-04-11 2013-04-11 Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310124535.5A CN103218723B (en) 2013-04-11 2013-04-11 Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure

Publications (2)

Publication Number Publication Date
CN103218723A CN103218723A (en) 2013-07-24
CN103218723B true CN103218723B (en) 2017-02-01

Family

ID=48816484

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310124535.5A Expired - Fee Related CN103218723B (en) 2013-04-11 2013-04-11 Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure

Country Status (1)

Country Link
CN (1) CN103218723B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105184576A (en) * 2015-07-17 2015-12-23 吕锦明 Electronic anti-fake system and electronic anti-fake method thereof
CN105096142A (en) * 2015-08-11 2015-11-25 深圳正品创想科技有限公司 Anti-counterfeiting system and anti-counterfeiting method
CN105654314A (en) * 2015-12-30 2016-06-08 深圳爱正品科技有限公司 Electronic tag based anti-counterfeiting method and system
CN106127495A (en) * 2016-06-28 2016-11-16 昆明珍茗食品有限责任公司 A kind of bottled water two-dimension code label identification management Antiforge system
CN107609620A (en) * 2017-08-15 2018-01-19 深圳市通用条码技术开发中心 A kind of making of false proof discoloration Quick Response Code and application method
CN108763939A (en) * 2018-05-02 2018-11-06 开源物联网(广州)有限公司 The encryption method and encryption system of security code
CN110570211B (en) * 2019-01-07 2022-12-09 原仓(广州)文化科技有限公司 IP filing and management system and anti-counterfeiting mark generation method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102163313A (en) * 2011-03-12 2011-08-24 曹信江 Anti-counterfeit method based on dual-right verification principle
CN102254278A (en) * 2011-07-01 2011-11-23 广州宽度信息技术有限公司 Shopping quality maintenance system based on two-dimension code
CN102663961A (en) * 2012-03-21 2012-09-12 杜浩燕 Fabrication method for anti-counterfeiting film, tag of anti-counterfeiting film, anti-counterfeiting tag and anti-counterfeiting system
CN102708184A (en) * 2012-05-11 2012-10-03 贵州卓霖防伪科技有限公司 Method for inquiring anti-fake two-dimension code of coded lock
CN102982459A (en) * 2012-11-06 2013-03-20 童浩铭 Dual-code anti-counterfeiting system and dual-code anti-counterfeiting method for intelligent communication terminals
CN203338404U (en) * 2013-04-11 2013-12-11 深圳大学 Product anti-counterfeiting system employing machine vision and based on two dimensional drawing

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101483686A (en) * 2008-11-20 2009-07-15 杭州华科通信设备有限公司 Digital anticounterfeiting system and method based on IP telephone operation system
CN102622633A (en) * 2012-03-14 2012-08-01 江苏联博计算机信息产业有限公司 Multifunctional digital anti-counterfeiting code tag and applications of multifunctional digital anti-counterfeiting code tag

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102163313A (en) * 2011-03-12 2011-08-24 曹信江 Anti-counterfeit method based on dual-right verification principle
CN102254278A (en) * 2011-07-01 2011-11-23 广州宽度信息技术有限公司 Shopping quality maintenance system based on two-dimension code
CN102663961A (en) * 2012-03-21 2012-09-12 杜浩燕 Fabrication method for anti-counterfeiting film, tag of anti-counterfeiting film, anti-counterfeiting tag and anti-counterfeiting system
CN102708184A (en) * 2012-05-11 2012-10-03 贵州卓霖防伪科技有限公司 Method for inquiring anti-fake two-dimension code of coded lock
CN102982459A (en) * 2012-11-06 2013-03-20 童浩铭 Dual-code anti-counterfeiting system and dual-code anti-counterfeiting method for intelligent communication terminals
CN203338404U (en) * 2013-04-11 2013-12-11 深圳大学 Product anti-counterfeiting system employing machine vision and based on two dimensional drawing

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
中国码通手机二维码防伪解决方案;sinovis;《百度文库》;20120725;第1页第5段,第2页第3-6段,第3页第1段 *

Also Published As

Publication number Publication date
CN103218723A (en) 2013-07-24

Similar Documents

Publication Publication Date Title
CN103218723B (en) Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure
CN108964905A (en) A kind of safe and efficient block chain implementation method
CN108520293A (en) A kind of product false proof source tracing method, device, server and storage medium
CN100533456C (en) Security code production method and methods of using the same, and programmable device therefor
CN1588386B (en) System and method for realizing article information detection by radio frequency identification and mobile communication combination
CN106713508B (en) A kind of data access method and system based on Cloud Server
CN107409002A (en) Method and apparatus of the repeatable encryption key of general certainty to expression are provided for all SKU, canister and article
CN110457930A (en) The attribute base encryption method and system of the hiding traceable revocation malicious user of strategy
CN103093361A (en) Commodity double-layer anti-fake method based on technologies of internet of things
CN104125230B (en) A kind of short message certification service system and authentication method
CN102930307A (en) Anti-counterfeiting authentication method for famous wine
CN107070660A (en) A kind of design Storage method of block chain encrypted radio-frequency chip
CN101771541A (en) Secret key certificate generating method and system for home gateway
CN103886469A (en) Product two-dimension code generation and query system
CN104574122A (en) Two-dimensional code anti-counterfeit and random product packaging goods-fleeing preventing method
CN107567625A (en) Group license encryption and decryption
CN106504007A (en) A kind of commodity counterfeit prevention management system based on NFC electronic tags
CN203338404U (en) Product anti-counterfeiting system employing machine vision and based on two dimensional drawing
CN108830624A (en) A kind of product anti-fake system and method based on X-Y scheme and utilization machine vision
CN108038979A (en) Continuously operating method based on STS payment systems
CN107483427A (en) A kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips
CN109728908A (en) A kind of key management method based on quantum safety moving storage medium
CN101833728A (en) Commodity anti-counterfeiting method
CN101424142B (en) Lock, unlocking method thereof, lock administrative center and control method thereof
CN111708996B (en) Enterprise internal management consultation information sharing system based on Internet

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20161230

Address after: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A (located in Shenzhen Qianhai Business Secretary limited) business places in Shenzhen City, Luohu District Shennan East Road, building D, Jinlong Plaza 100 building room 905

Applicant after: SHENZHEN FRESHNESS INTELLIGENT TECHNOLOGY CO.,LTD.

Address before: 518060 Nanhai Road, Guangdong, Shenzhen, No. 3688, No.

Applicant before: Shenzhen University

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170201

CF01 Termination of patent right due to non-payment of annual fee