Content of the invention
The technical problem to be solved is to provide a kind of utilization machine vision and the product based on X-Y scheme
Antiforge system and method are it is intended to solve the problems, such as products antifake technique.By machine vision mode, true and false X-Y scheme is carried out
Automatic identification, selects message search or network inquiry mode to send anti-fake code to product false proof information system by client software
Unite in local backstage or producer's background database manager system, background data base feeds back the true and false information of product to user, from
And complete the true and false inquiry of product;When user need to open product, carried out automatically by machine vision mode dual lock X-Y scheme
Identification, selects message search or network inquiry mode to send anti-fake code to product false proof information system originally by client software
Ground backstage or producer's background database manager system in, background database manager system feedback unlocking cipher to user, thus
Complete the unlatching of product.
The present invention is achieved in that a kind of utilization machine vision and the product anti-fake system based on X-Y scheme, including
Coded lock, client device, telephone network, mobile communications network, internet, server end, security code inquiry and management
Unit, switch, order management module, product false proof code label generation unit;
Described server end is used for placing site home page, message search interface, network inquiry interface;
Described coded lock is added at the opening of anti-fake product;
Described client device is by described telephone network, described mobile communications network, described internet
Individual or multiple and described server end is connected;
Described switch is connected with described server end, for the exchange between data;
Described security code inquiry and administrative unit are connected with described switch;
Described order management module is connected with described switch, described product false proof code label generation unit respectively, described
Order management module sends security code information to described product false proof code label generation unit, and described product false proof code label generates
Unit generates product false proof code label, and described product false proof code label includes X-Y scheme.
Further, described client device includes phone, mobile phone, panel computer, portable computer and pc machine.
Further, described order management module includes security code signal generating unit, order and contract management unit and extension
Applying unit;
Described security code signal generating unit is connected with described switch, for being generated in security code according to security code coding rule
Product false proof inquiry code and product unlocking inquiry code be converted into X-Y scheme;
Described order is connected with described switch with contract management unit, for managing the order by page download for the enterprise
And the contract of enterprise's upload is examined, examine the qualified rear instruction sending production product false proof code label;
Described expanded application unit is connected with described switch, for extending the function of order management module.
Further, described product anti-fake system also include the system administration that is connected with described switch and maintenance module and
Product database, described system administration and maintenance module are used for data is managed and periodic maintenance, described product database
For storing the data of product information.
The present invention also provides a kind of utilization machine vision and the antifake method for products based on X-Y scheme, walks including following
Rapid:
The security code that the product information that producer provides is passed through in security code signal generating unit by step a, order management module is compiled
Code and encryption software produce security code, and security code is converted into X-Y scheme by described security code signal generating unit, and by described two dimension
The information of figure is uploaded to product database, and the product false proof code label being printed with described X-Y scheme hangs over product or password
Lock;
Step b, client device gather the X-Y scheme on product or coded lock and identify, obtain product false proof code,
And the security code obtaining is sent to security code inquiry and administrative unit, described security code inquiry and administrative unit are entered to security code
Enter product database by switch after row deciphering to be mated, and matching result is returned to client device.
Further, described security code includes product false proof inquiry code and/or product unlocking inquiry code, and uses data encryption
After algorithm is encrypted to described product false proof inquiry code and/or product unlocking inquiry code, it is converted into X-Y scheme;
In described step b, if described matching result is corresponding security code, by way of note or network
Return to user;If described matching result is product false proof inquiry code, return the true and false of product, if described matching result
It is the unlocking cipher that product unlocking inquiry code then returns corresponding product.
Further, the product information that producer provides is passed through preventing in security code signal generating unit by described order management module
The step of pseudo-code coding and encryption software generation security code includes:
Step 1, enterprise are placed an order by logon web page, and manager passes through order and audits order with contract management unit,
Then allow enterprise customer to pass through server end after examination & verification is qualified to be downloaded on webpage and upload the contract signed;
Step 2, manager pass through order and contract management unit audits the contract that enterprise uploads, and need root by then enterprise
Quantity of service and the length of service according to customization pay corresponding deposit;
Step 3, manager examine whether receive deposit, are, start the sequence information providing according to enterprise customer according to one
Fixed coding rule produces corresponding security code, and generates X-Y scheme and printed by product false proof code label generation unit
Come.
Further, after described step 3, also include:
Step 4, X-Y scheme label are sent in enterprise customer's handss together with coded lock, and enterprise customer needs the used time directly to add
On product;
The security code of electronic version is uploaded in product database by step 5, system manager, and system manager's examination & verification is no
Then security code can start to start inquiry service by mistake, and the product of this order is started selling;
After step 6, enterprise product are sold, after user buys product, carry out true and false inquiry and obtain unlocking cipher;
After step 7, product are sold, user, according to scraping hidden code coating off, obtains unlocking inquiry code, carries out inquiry of unlocking.
Further, carry out true and false inquiry in described step 6 and the step of acquisition unlocking cipher be:
The X-Y scheme that user is clapped above Product labelling with other X-Y scheme identification softwares obtains the handss that the system comprises
Machine client software download address, by accessing page download client software, bat is opened in download after installing very false proof soft
Part, claps the product false proof inquiry code on product false proof code label or product unlocking inquiry code, and user selects transmission note to look into
Ask, then Query Result can be passed through short message sending to user mobile phone by system, and user selects network inquiry, and then result is returned directly to
The software page;Or
Send the number on label of product false proof inquiry code or product unlocking inquiry code on label, system can be by
Query Result passes through short message sending to user mobile phone;Or
Dial hotline to be inquired about according to Voice Navigation, system can be reported result to user;Or
Open the site home page on label, input product Antiforge inquiry code or product unlocking inquiry code, system can be by
Result is directly shown by way of dialog box.
Further, described in step 3, coding rule is as follows: security code totally 31, including the front segment encode of 10,10
The effect code of middle segment encode, the rear segment encode of 10 and 1;Described front segment encode is obtained by security code AES, and described middle segment encode is
Random code, described rear segment encode is production code member;The described step producing corresponding security code includes:
Step 301: front segment encode is obtained by function x=f (y), y is middle segment encode, and x is front segment encode, is 10 bit digital;
Step 302: the even bit of the y being obtained according to step 301 finds corresponding value in a mapping table, and will be in mapping
Find the numeral that corresponding value replaces even bit in table, obtain new y;
Step 303: new y is switched to binary number;
Step 304: described binary number odd bits and even bit are exchanged;
Step 305: change into decimal scale again after even bit and odd bits exchange, the decimal scale of gained is if it exceeds 10 then take
First 10, less than 10 then in above polishing 10;
Step 306: effect code division is not multiplied by key by the middle double figures of front segment encode, middle segment encode, rear segment encode, then divided by
10 remainders obtaining.
The present invention compared with prior art, has the beneficial effects that the antifake method for products of the present invention can effectively hit market and produce
Product are faked, and preferably protect the legitimate rights and interests of consumer, and fully combine smart mobile phone, panel computer in product false proof
Application, solves current products antifake technique because the long technical matters of anti-fake code simultaneously, is integrated with various modern
The antifalse technology of new and high technology.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, below in conjunction with drawings and Examples, right
The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only in order to explain the present invention, and
It is not used in the restriction present invention.
The antifake method for products of the present invention is encrypted double protection to reach false proof mesh with reference to physics encryption device and information
's.Encrypted physical device such as electronic lock, mechanical lock etc. carry out encrypted physical to each product, reach the false proof mesh of ground floor
's.Encrypted physical namely using encryption device, the unlatching of product is blocked, only when user input correct password ability
Realize the opening and closing of product.For example, wine to be carried out false proof, make traditional wine bottle cover with mechanical code lock first
Wine bottle cover, be attached to bottle mouth, then mechanical cipher be set, could beat only after obtaining correct unlocking cipher at producer
Open bottle.
Information encryption is, using information system, each product is entered with the row information encryption purpose false proof to reach the second layer.
Manufacturer is by the relevant information of each product produced such as product coding, product category, Enterprise organization system code etc.
One is mapped on unique two-dimensional bar code, and these information are also submitted to a product false proof based on the Internet by manufacturer simultaneously
Inquiry information system.Made in the physical message of each product and product false proof information system through manufacturer by this process
The product information of certification sets up one-to-one relationship, and these information are submitted to this by way of phone, short message, network
Antiforge inquiry information system is verified the true and false that can determine whether this product one by one thus reaching false proof purpose.
As shown in figure 1, a kind of utilization machine vision and the product anti-fake system based on X-Y scheme, including coded lock, visitor
Family end equipment 101, telephone network 102, mobile communications network 103, internet 104, server end 106, security code inquiry
And administrative unit 105, switch 107, order management module 108, product false proof code label generation unit 109.Described coded lock
It is added at the opening of anti-fake product;Described server end 106 is used for placing site home page, message search interface, network inquiry connect
Mouthful.Described client device 101 is by described telephone network 102, described mobile communications network 103, described internet 104
One or more of be connected with described server end 106.Described Antiforge inquiry and administrative unit 105 and described switch 107
Connect.Described switch 107 is connected with described server end 106, for the exchange between data.Described order management module
108 are connected with described switch 107, described product false proof code label generation unit 109 respectively, described order management module 108
Send security code information to described product false proof code label generation unit 109, described product false proof code label generation unit 109 is raw
Become product false proof code label 112, described product false proof code label 112 includes X-Y scheme.
Further, described client device 101 includes phone, mobile phone, panel computer, portable computer, pc machine, preferably
Ground, described mobile phone is smart mobile phone;Described smart mobile phone, panel computer, portable computer are provided with photographic head.
Further, described order management module 108 includes security code signal generating unit, order and contract management unit and expansion
Exhibition applying unit.Described security code signal generating unit is connected with described switch, for generating product according to security code coding rule
Product false proof inquiry code in security code label and product unlocking inquiry code are simultaneously converted into X-Y scheme, and to the security code generating
It is managed.Described order is connected with described switch with contract management unit, passes through the order under webpage for managing enterprise
And the contract of enterprise's upload is examined, examine the qualified rear instruction sending production product false proof code label.Described extension should
It is connected with described switch with unit, for extending the function of order management module 108.
Described also include being connected with described switch 107 using machine vision and the product anti-fake system based on X-Y scheme
System administration and maintenance module 110 and product database 111, described system administration and maintenance module 110 are for entering to data
Line pipe reason and periodic maintenance, described product database 111 is used for storing the data of product information.
As shown in Fig. 2 the present invention also provides a kind of utilization machine vision and the antifake method for products based on X-Y scheme, bag
Include following steps:
The product information that producer provides is passed through the security code in security code signal generating unit by step a, order management module 108
Coding and encryption software produce security code, and described security code has including product false proof inquiry code and/or product unlocking inquiry code, and
With DEA, described product false proof inquiry code and/or product unlocking inquiry code are encrypted, and are converted into X-Y scheme
Shape, and the information of described X-Y scheme is uploaded to product database 111, it is printed with the product false proof code mark of described X-Y scheme
Sign 112 to hang on product or coded lock;
Step b, client device 101 gather the X-Y scheme on product or coded lock and identify, obtain product false proof
Code, and the security code obtaining is sent to security code inquiry and administrative unit 105, described security code inquiry and administrative unit 105
Enter product database 111 by switch 107 after security code is decrypted to mate, and matching result is returned to visitor
Family end equipment 101;
In described step b, when user need to verify that product is true and false, the client software developed by download system is simultaneously pacified
Dress;Open client software and X-Y scheme identification interface occurs, photographic head is carried out automatic identification against X-Y scheme, knows by user
After not, user can select message search or network inquiry, and security code can be sent to security code inquiry and administrative unit 105,
The inquiry of described security code and administrative unit 105 enter product database 111 by switch 107 after security code is decrypted and enter
Row coupling, if finding corresponding security code, returns to user by way of note or network;If product false proof
Inquiry code then returns the true and false of product, if product unlocking inquiry code then returns the unlocking cipher of corresponding product, user is obtaining
To after unlocking cipher, coded lock is opened according to the explanation on label.
The generation of security code of the present invention and process of exchange achieve automatization.Enterprise looks into by network customization is false proof
Ask service, tailored ciphers lock, the management service of order, produce the security code of respective amount for order and be converted into X-Y scheme
Shape, product database, system administration and maintenance, speech polling interface, network inquiry interface, message search interface, data base add
Close, security code coding rule, cell-phone customer terminal X-Y scheme software.
The product information that producer provides is passed through the security code coding in security code signal generating unit by described order management module
Produce security code with encryption software and the transaction of security code comprise the following steps:
Step 1, enterprise are placed an order by logon web page, and manager is being ordered with the examination & verification of contract management unit by order
Single, then allow enterprise customer to pass through server end 106 after examination & verification is qualified and be downloaded on webpage and upload the conjunction signed
With;
Step 2, manager pass through order and contract management unit audits the contract that enterprise uploads, and need root by then enterprise
Quantity of service and the length of service according to customization pay corresponding deposit;
Step 3, manager examine whether receive deposit, are, the sequence information generation starting according to enterprise customer's offer is right
The security code answered simultaneously generates X-Y scheme product false proof code label generation unit 109 and prints;The generation of described security code
It is to produce according to certain coding rule;Described security code adopts AES to encrypt, and becomes the security code after encryption and is supplied to
Enterprise customer;
Step 4, X-Y scheme label are sent in enterprise customer's handss together with coded lock, and enterprise customer is applied directly to product
On;
The security code of electronic version is uploaded in product database 111 by step 5, system manager, and system manager examines
Core is errorless, and security code can start to start inquiry service, and the product of this order is started selling;
After step 6, enterprise product are sold, after user buys product, carry out true and false inquiry and obtain unlocking cipher;
After step 7, product are sold, user, according to scraping hidden code coating off, obtains unlocking inquiry code, carries out inquiry of unlocking.As
Fruit system returns unlocking cipher and directly unlocks, if return is unlocking index code, user is according to index code on label
Find corresponding password, the corresponding unlocking cipher of such as x1y1z1z2 is 1478.What system returned to user is password or index
Code is requirement according to enterprise customer to be determined.
The order that described step 1,2 and 3 are mentioned and contract management unit are mainly used in managing the order of security code, Ke Yishi
Now to the examination & verification of order contents, underproof order carried out annotate, treaty content carries out checking examination & verification, to underproof contract
Carry out annotating, check order detail, the state of change order.Major function has the examination & verification of order, contract audit, determines that gathering is examined
The status displays such as core.Inquiry phase is initially entered, service will first be opened by enterprise, after service side starts service after the completion of all work
Formally put into effect, when order has expired, state is changed to service stopping, according to circumstances can delete when the order stopping and order
List, the unlocking table of product database and false proof code table are also deleted simultaneously.Described order is provided according to order with contract management unit
State order is classified, such as when selecting to submit to order etc. pending, then occur will be to submit to order to wait
The part of examination & verification.
Further, as follows according to certain coding rule in described step 3: security code be divided into before, during and after three sections, front
The security code AES that is encoded to of section obtains, the random code that interlude produces for system, and back segment is encoded to production code member;False proof
Code totally 31, is front segment encode 10 respectively, middle segment encode 10, rear segment encode 10, and effect code 1 produces corresponding security code
Step includes:
Step 301: front segment encode is obtained by function x=f (y), y is middle segment encode, and x is front segment encode, is 10 bit digital, than
As y is equal to 1234567890, takes even bit 24680;
Step 302: the even bit of the y being obtained according to step 31 finds corresponding value in the mapping table, and will be in mapping table
In find the numeral that corresponding value replaces even bit, obtain new y, such as 24680 in the mapping table corresponding number be a8f4c,
A8f4c is replaced 24680, then y is equal to 1a385f749c;
Mapping table:
Step 303: new y is switched to binary number, such as, 1a385f749c is converted into binary system and is equal to 1,101 0001
1100 0010 1111 1011 1010 0100 1110 0;
Step 304: described binary number odd bits and even bit are exchanged, such as, several odd bits of institute's illustrated example and idol
Numerical digit is 1,110 0,010 1,100 0,001 1,111 0,111 0,101 1,000 1,101 0 after exchanging;
Step 305: change into decimal scale again after even bit and odd bits exchange, the decimal scale of gained is if it exceeds 10 then take
First 10, less than 10 then in above polishing 10;
Step 306: effect code division is not multiplied by key by the middle double figures of front segment encode, middle segment encode, rear segment encode, then divided by
10 remainders obtaining, such as security code are 7883137400-12345678936-0201208010-6.Key is 123456, then
Effect code is equal to (1*1+3*2+5*3+6*4+2*5+0*6) %10=6.
The corresponding security code of generation that described step 3 is mentioned simultaneously generates X-Y scheme and mainly includes searching product database etc.
The order of security code to be generated, after finding order, security code signal generating unit generates security code for this order, and false proof to generate
Code is converted into corresponding X-Y scheme, and is saved in word document in order.Major function is to find need according to order status
The numbering of security code to be generated, the first step: order generates product false proof code according to above-mentioned coding rule;Second step: root
Generate X-Y scheme according to the security code that step (1) obtains;3rd step: be saved in a word in order typesetted for X-Y scheme
The inside.
The AES mentioned in described step 3 is defined as follows:
Relevant character string defines:
The first step: encrypted character string: cn={ c0c1c2c3 ... ci ... cn-1 }
Wherein: i is the sequence number (span 0~n-1) of character in cn;
N is cn length.
Second step: encrypted characters string: dn={ d0d1d2d3 ... di ... dn-1 }
Wherein: i is the sequence number (span 0~n-1) of character in dn;
N is dn length.
3rd step: database table major key: px={ p0p1p2p3 ... pa ... px-1 }
Wherein: i is the sequence number (span 0~x-1) of character in px;
X is px length.
4th step: secret key character: k
Algorithm defines:
The generating algorithm of k:
If %4 is then for flag=(p1+p2+p3+ ... pa+ ... px+i)
If flag=0, k=0x01;
If flag=1, k=0x02;
If flag=2, k=0x04;
If flag=3, k=0x08.
Operator % meaning: c=a%b represents that c is the remainder divided by b for a.
The generating algorithm of dn in second step:
Di=k^ci
Operator ^ meaning: c=a^b represent c be a with b step-by-step with or result.
Further, carry out true and false inquiry in described step 6 and obtain unlocking cipher and have four kinds of methods:
Method one: the X-Y scheme that user is clapped above Product labelling with other X-Y scheme identification softwares obtains the system bag
The mobile phone client software download address containing, by accessing page download client software, downloads and opens bat after installing very
Anti-counterfeit software, claps the product false proof inquiry code on product false proof code label or product unlocking inquiry code, and user selects to send
Message search, then system can by Query Result pass through short message sending to user mobile phone, user selects network inquiry, and then result is direct
Return to the software page;
Method two: the number on label for the product false proof inquiry code or product unlocking inquiry code on transmission label,
Query Result can be passed through short message sending to user mobile phone by system;
Method three: dial hotline and inquired about according to Voice Navigation, system can be reported result to user;
Method four: open the site home page on label, input product Antiforge inquiry code or product unlocking inquiry code, be
Result can directly be shown by way of dialog box by system.
The client X-Y scheme identification software mentioned in described step 6 makes full use of smart mobile phone, panel computer
Visual system the X-Y scheme automatic identification client software of bonded products Antiforge system exploitation, client only need to open client
Software be aligned is printed on the false proof X-Y scheme coding on product false proof code label, and client software can be automatically performed X-Y scheme
Identification, after the completion of identification, client software can eject client and automatically select message search mode and network inquiry mode, client root
Select inquiry mode according to demands of individuals, system just carries out corresponding feedback of the information according to the content of inquiry.Such as, inquiry product is true
Fake information, system will feed back true and false information and the production company of product;The unlocking cipher of inquiry product, system will be anti-
The unlatching cryptographic service information of feedback product;Inquiry is not the corresponding false proof X-Y scheme coding of the system, and system will be fed back
Coding rule is incorrect, and beware of imitations!
The true and false query script being related in described step 6, backstage is advised according to coding after obtaining the security code that user provides
Then carry out primary screening, the security code that the non-the system of exclusion produces.Product data library inquiry is entered by first screening,
First look at inquiry code or whether ip address is added into blacklist, the user that described blacklist is inquired about mainly for malice, no
Then check whether to meet querying condition in blacklist, the same account of the system same number inquiry in a hour can only
Inquire about once, and this product is not also unlocked.
The process of the acquisition unlocking cipher being related in described step 6, after backstage obtains the inquiry code that user provides, according to
Coding rule carries out primary screening, the security code that the non-the system of exclusion produces.Product data are entered by first time screening
Library inquiry, first looks at enquiry number or whether ip address is added into blacklist, and blacklist is mainly for the use of malice inquiry
Family, does not then check whether to meet querying condition in blacklist, and whether product drove lock, opened then check this inquiry number or
Whether person ip address is consistent with unlock, unanimously then returns unlocking index code, is not then not returning result, points out to be unlocked
?.
The voice inquiry system being related in described step 6 is mainly by way of self-service or manual service to false proof
Code is inquired about.Self-service mode mainly carries out realizing the true and false according to Voice Navigation by the hotline dialing system offer
Inquiry, unlocking cipher obtain, turn the function of manual service.When being connected to manual service phone, anti-in voice inquiry system input
Pseudo-code, clicks on inquiry and can get Query Result, result is illustrated below in edit box.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention
Any modification, equivalent and improvement made within god and principle etc., should be included within the scope of the present invention.