CN106709546A - Anti-counterfeiting method and device based on fiber code - Google Patents

Anti-counterfeiting method and device based on fiber code Download PDF

Info

Publication number
CN106709546A
CN106709546A CN201611142924.0A CN201611142924A CN106709546A CN 106709546 A CN106709546 A CN 106709546A CN 201611142924 A CN201611142924 A CN 201611142924A CN 106709546 A CN106709546 A CN 106709546A
Authority
CN
China
Prior art keywords
fiber
pattern
quick response
response code
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611142924.0A
Other languages
Chinese (zh)
Inventor
黄勇
刘本颖
刘伟洲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Fusion Internet Of Things Ltd
Original Assignee
Shenzhen Fusion Internet Of Things Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Fusion Internet Of Things Ltd filed Critical Shenzhen Fusion Internet Of Things Ltd
Priority to CN201611142924.0A priority Critical patent/CN106709546A/en
Publication of CN106709546A publication Critical patent/CN106709546A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10544Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
    • G06K7/10821Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
    • G06K7/10861Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices sensing of data fields affixed to objects or articles, e.g. coded labels
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F3/0297Forms or constructions including a machine-readable marking, e.g. a bar code

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Electromagnetism (AREA)
  • Finance (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides an anti-counterfeiting method based on a fiber code. The method comprises the steps that an anti-counterfeiting two-dimensional code is generated; the two-dimensional code is printed on an inspection label, and a number of fibers are randomly added on the inspection label; the fiber pattern is shot, and the correspondence between the fiber pattern and the two-dimensional code is established to receive an authentication request, wherein the authentication request comprises scanned two-dimensional code information and a fiber picture; the two-dimensional code information and the fiber picture are compared with the stored correspondence between the fiber pattern and the two-dimensional code; and if the two-dimensional code information and the fiber picture are consistent with the stored correspondence, authentication is successful, otherwise authentication fails. According to the technical scheme provided by the invention, the method has the advantage of good anti-counterfeiting effect.

Description

A kind of method for anti-counterfeit and device based on fiber code
Technical field
The present invention relates to anti-counterfeiting technology, more particularly to a kind of method for anti-counterfeit and device based on fiber code.
Background technology
With the development of electronics technology, Quick Response Code is more and more applied in false proof field, for false proof, Especially the performance of two-dimension code anti-counterfeit is excessively poor, so causes existing method for anti-counterfeit to realize true false proof purpose.
The content of the invention
An object of the present invention is to improve false proof.
According to an aspect of the invention, there is provided a kind of method for anti-counterfeit based on fiber code, methods described includes:
The network equipment generates a false proof Quick Response Code;
Be printed upon the Quick Response Code on check tag by the network equipment, adds a plurality of fiber at random on check tag;
The network equipment shoots the pattern of the fiber, and the fiber pattern and Quick Response Code are set up into corresponding relation;
The network equipment receives checking request, and the checking request includes the 2 D code information and fiber picture for scanning,
The 2 D code information is set up into corresponding relation with Quick Response Code with the fiber pattern of storage with fiber picture to compare, such as one Cause, be then proved to be successful, such as inconsistent, authentication failed.
Optionally, methods described deletes the corresponding relation that the fiber pattern and Quick Response Code are set up after being proved to be successful.
Optionally, optionally, the verification mode of the fiber pattern is specially:
The fiber pattern that will be obtained removes the ambient noise of binaryzation, and the pattern is divided into multiple equal-sized pros Shape, calculates the length of fiber in each square, and the length of fiber in each positive direction is formed into matrix A in order, and acquisition is deposited The square length matrix B of the fiber pattern of storage, if B=C*A, wherein C is constant, it is determined that fiber pattern and the fibre for storing Dimension pattern is consistent, otherwise, inconsistent.
Second aspect, there is provided a kind of false proof device based on fiber code, described device includes:
Generation unit, a false proof Quick Response Code is generated for the network equipment;
Adding device, for the Quick Response Code to be printed upon into check tag, adds a plurality of fiber at random on check tag;
The fiber pattern and Quick Response Code are set up corresponding relation by shooting unit, the pattern for shooting the fiber;
Receiving unit, for receiving checking request, 2 D code information and fiber picture of the checking request comprising scanning,
Authentication unit, for the 2 D code information is corresponding with Quick Response Code foundation with the fiber pattern of storage with fiber picture Relation is compared, such as consistent, then be proved to be successful, such as inconsistent, authentication failed.
Optionally, the system also includes:
Unit is deleted, for after being proved to be successful, the corresponding relation that the fiber pattern and Quick Response Code are set up being deleted.This side Case is that in order to ensure the uniqueness of checking, i.e., one corresponding relation can only be verified once.
Optionally, the ambient noise of fiber pattern removal binaryzation of the authentication unit specifically for that will obtain, by this Pattern is divided into multiple equal-sized squares, calculates the length of fiber in each square, by fiber in each positive direction Length form matrix A in order, obtain the square length matrix B of the fiber pattern of storage, if B=C*A, wherein C is Constant, it is determined that fiber pattern is consistent with the fiber pattern of storage, otherwise, inconsistent.
Although those of ordinary skill in the art will be appreciated that following detailed description carries out referenced in schematic embodiment, accompanying drawing, But the present invention is not limited in these embodiments.But, the scope of the present invention is extensive, and is intended to be bound only by appended right It is required that limiting the scope of the present invention.
Brief description of the drawings
By the detailed description made to non-limiting example made with reference to the following drawings of reading, it is of the invention other Feature, objects and advantages will become more apparent upon:
Fig. 1 is the flow chart of the method for anti-counterfeit 1 based on fiber code according to a preferred embodiment of the invention;
Fig. 2 is the schematic diagram of the false proof device 2 based on fiber code according to a preferred embodiment of the invention;
The fiber pattern schematic diagram that Fig. 3 A are provided for the present invention;
The division schematic diagram of the fiber pattern that Fig. 3 B are provided for the present invention.
Same or analogous reference represents same or analogous part in accompanying drawing.
Specific embodiment
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail The treatment described as flow chart or method.Although operations to be described as flow chart the treatment of order, therein to be permitted Multioperation can be implemented concurrently, concomitantly or simultaneously.Additionally, the order of operations can be rearranged.When it The treatment can be terminated when operation is completed, it is also possible to have the additional step being not included in accompanying drawing.The treatment Can correspond to method, function, code, subroutine, subprogram etc..
Alleged within a context " computer equipment ", also referred to as " computer ", referring to can be by running preset program or referring to Make performing the intelligent electronic device of the predetermined process process such as numerical computations and/or logical calculated, its can include processor with Memory, the survival instruction prestored in memory by computing device performs predetermined process process, or by ASIC, The hardware such as FPGA, DSP perform predetermined process process, or are combined by said two devices and to realize.Computer equipment includes but does not limit In server, PC, notebook computer, panel computer, smart mobile phone etc..
Method (some of them are illustrated by flow) discussed hereafter can be by hardware, software, firmware, centre Part, microcode, hardware description language or its any combination are implemented.Implement when with software, firmware, middleware or microcode When, it is used to implement that the program code or code segment of necessary task can be stored in machine or computer-readable medium (is such as deposited Storage media) in.(one or more) processor can implement necessary task.
Concrete structure disclosed herein and function detail are only representational, and are for describing of the invention showing The purpose of example property embodiment.But the present invention can be implemented by many alternative forms, and be not interpreted as It is limited only by the embodiments set forth herein.
Although it should be appreciated that may have been used term " first ", " second " etc. herein to describe unit, But these units should not be limited by these terms.It is used for the purpose of a unit and another unit using these terms Make a distinction.For example, in the case of the scope without departing substantially from exemplary embodiment, it is single that first module can be referred to as second Unit, and similarly second unit can be referred to as first module.Term "and/or" used herein above include one of them or Any and all combination of more listed associated items.
Term used herein above is not intended to limit exemplary embodiment just for the sake of description specific embodiment.Unless Context clearly refers else, and singulative " one " otherwise used herein above, " one " also attempt to include plural number.Should also When understanding, term used herein above " including " and/or "comprising" specify stated feature, integer, step, operation, The presence of unit and/or component, and do not preclude the presence or addition of one or more other features, integer, step, operation, unit, Component and/or its combination.
It should further be mentioned that in some replaces realization modes, the function/action being previously mentioned can be according to different from attached The order indicated in figure occurs.For example, depending on involved function/action, the two width figures for showing in succession actually may be used Substantially simultaneously to perform or can perform in a reverse order sometimes.
The present invention is described in further detail below in conjunction with the accompanying drawings.
It should be noted that the smart machine is only for example, other it is existing or be likely to occur from now on the network equipment, Computer equipment and user equipment in the present invention, should be also included within the scope of the present invention if applicable, and with reference side Formula is incorporated herein.
Fig. 1 is refer to, Fig. 1 is the flow of the method for anti-counterfeit based on fiber code according to a preferred embodiment of the invention Figure.
As shown in figure 1, the method for anti-counterfeit 1 based on fiber code that a preferred embodiment of the invention is provided includes:
Step S101, the network equipment generate a false proof Quick Response Code;
Be printed upon the Quick Response Code on check tag by step S102, the network equipment, adds a plurality of at random on check tag Fiber;
Step S103, the network equipment shoot the pattern of the fiber, and the fiber pattern and Quick Response Code are set up into corresponding relation.
Step S104, the network equipment receive checking request, 2 D code information and fiber of the checking request comprising scanning Picture,
Step S105, the 2 D code information and fiber picture are set up into corresponding relation with the fiber pattern and Quick Response Code of storage Compare, it is such as consistent, then it is proved to be successful, such as inconsistent, authentication failed.
The technical scheme that the present invention is provided realizes checking by way of Quick Response Code and fiber code are combined, for fibrogram Case, because it is to add on check tag at random, so it has contingency, to this, it has uniqueness, specific fiber Pattern as shown in Figure 3A, so the fiber pattern has uniformity, is so verified to the fiber pattern and can improve anti- Pseudo- effect, in addition, increase Quick Response Code is to quickly be recognized to fiber pattern, because for fiber pattern, by The information content recognized in it is very big, and due to the uniqueness of each fiber pattern, the speed of its identification can be very low, if Only be identified with fiber pattern, then the speed of identification certainly will be influenceed, and the recognition speed of Quick Response Code is fast, its equivalent to One index of fiber pattern, is identified before the fiber pattern that the server on backstage is indexed its needs identification, so its There is quick identification.
Optionally, the above method deletes the corresponding relation that the fiber pattern and Quick Response Code are set up after being proved to be successful.This Scheme is that in order to ensure the uniqueness of checking, i.e., one corresponding relation can only be verified once.
The verification mode of above-mentioned fiber pattern is specifically as follows:
The fiber pattern that will be obtained removes the ambient noise of binaryzation, and the pattern is divided into multiple equal-sized pros Shape (as shown in Figure 3 B), calculates the length of fiber in each square, and the length of fiber in each positive direction is formed in order Matrix A, obtains the square length matrix B of the fiber pattern of storage, if B=C*A, wherein C is constant, it is determined that fibrogram Case is consistent with the fiber pattern of storage, otherwise, inconsistent.
The present embodiment using fiber pattern compare by the way of be using square partition length compare by the way of come Realize compare because for fiber pattern, its length is all the presence of linear relationship, as long as so C be constant, can say Bright this fiber pattern is consistent pattern.And this RM has the advantages that recognition speed is fast.
As shown in Fig. 2 the false proof device 2 based on fiber code that a preferred embodiment of the invention is provided includes:
Generation unit 201, a false proof Quick Response Code is generated for the network equipment;
Adding device 202, for the Quick Response Code to be printed upon into check tag, adds a plurality of fibre at random on check tag Dimension;
The fiber pattern and Quick Response Code are set up corresponding relation by shooting unit 203, the pattern for shooting the fiber.
Receiving unit 204, for receiving checking request, 2 D code information and fibrogram of the checking request comprising scanning Piece,
Authentication unit 205, for the 2 D code information and fiber picture to be set up with the fiber pattern of storage with Quick Response Code Corresponding relation is compared, such as consistent, then be proved to be successful, such as inconsistent, authentication failed.
The technical scheme that the present invention is provided realizes checking by way of Quick Response Code and fiber code are combined, for fiber Code, because it is become rusty in equipment to be tested, because some factors, its embroidered picture can not possibly be completely the same, so should Fiber code has uniformity, and so fiber code is verified and can improve false proof effect, in addition, increase Quick Response Code with The corresponding relation of fiber code also improves the precision of fake certification.So it has the advantages that antifalse effect is good.
Optionally, said system can also include:
Unit 206 is deleted, for after being proved to be successful, the corresponding relation that the fiber pattern and Quick Response Code are set up being deleted. This scheme is that in order to ensure the uniqueness of checking, i.e., one corresponding relation can only be verified once.
Optionally, the ambient noise of fiber pattern removal binaryzation of the above-mentioned authentication unit 205 specifically for that will obtain, will The pattern is divided into multiple equal-sized squares (as shown in Figure 3 B), calculates the length of fiber in each square, will be every The length of fiber forms matrix A in order in individual positive direction, the square length matrix B of the fiber pattern of storage is obtained, if B =C*A, wherein C are constant, it is determined that fiber pattern is consistent with the fiber pattern of storage, otherwise, inconsistent.
Wherein, the equipment includes but is not limited to computer, server, intelligent watch, Intelligent bracelet, smart mobile phone, PDA Deng;The network equipment includes but is not limited to single network server, the server group of multiple webserver compositions or is based on The cloud being made up of a large amount of computers or the webserver of cloud computing (Cloud Computing), wherein, cloud computing is distributed One kind of calculating, a super virtual computer being made up of the computer collection of a group loose couplings.Wherein, the computer sets It is standby can isolated operation realize the present invention, also can access network and by with network in other computer equipments interactive operation To realize the present invention.Wherein, the network residing for the computer equipment includes but is not limited to internet, wide area network, Metropolitan Area Network (MAN), office Domain net, VPN etc..
It should be noted that the user equipment, the network equipment and network etc. are only for example, other are existing or from now on may be used The computer equipment or network that can occur such as are applicable to the present invention, should also be included within the scope of the present invention, and to draw It is incorporated herein with mode.
It should be noted that the present invention can be carried out in the assembly of software and/or software with hardware, for example, this hair Each bright device can be realized using application specific integrated circuit (ASIC) or any other similar hardware device.In one embodiment In, software program of the invention can be by computing device realizing steps described above or function.Similarly, it is of the invention Software program (including related data structure) can be stored in computer readable recording medium storing program for performing, for example, RAM memory, Magnetically or optically driver or floppy disc and similar devices.In addition, some steps of the invention or function can employ hardware to realize, example Such as, coordinate so as to perform the circuit of each step or function as with processor.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be in other specific forms realized.Therefore, no matter From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power Profit requires to be limited rather than described above, it is intended that all in the implication and scope of the equivalency of claim by falling Change is included in the present invention.Any reference in claim should not be considered as the claim involved by limitation.This Outward, it is clear that " including " word is not excluded for other units or step, odd number is not excluded for plural number.The multiple stated in system claims Unit or device can also be realized by a unit or device by software or hardware.The first, the second grade word is used for table Show title, and be not offered as any specific order.

Claims (6)

1. it is a kind of based on fiber code method for anti-counterfeit, it is characterised in that methods described includes:
The network equipment generates a false proof Quick Response Code;
Be printed upon the Quick Response Code on check tag by the network equipment, adds a plurality of fiber at random on check tag;
The network equipment shoots the pattern of the fiber, and the fiber pattern and Quick Response Code are set up into corresponding relation;
The network equipment receives checking request, and the checking request includes the 2 D code information and fiber picture for scanning,
The 2 D code information is set up into corresponding relation with Quick Response Code with the fiber pattern of storage with fiber picture to compare, it is such as consistent, Then it is proved to be successful, such as inconsistent, authentication failed.
2. method according to claim 1, it is characterised in that methods described after being proved to be successful, by the fiber pattern with The corresponding relation that Quick Response Code is set up is deleted.
3. method according to claim 1, it is characterised in that the verification mode of the fiber pattern is specially:
The fiber pattern that will be obtained removes the ambient noise of binaryzation, and the pattern is divided into multiple equal-sized squares, The length of fiber in each square is calculated, the length of fiber in each positive direction is formed into matrix A in order, obtain storage The square length matrix B of fiber pattern, if B=C*A, wherein C is constant, it is determined that fiber pattern and the fibrogram for storing Case is consistent, otherwise, inconsistent.
4. it is a kind of based on fiber code false proof device, it is characterised in that described device includes:
Generation unit, a false proof Quick Response Code is generated for the network equipment;
Adding device, for the Quick Response Code to be printed upon into check tag, adds a plurality of fiber at random on check tag;
The fiber pattern and Quick Response Code are set up corresponding relation by shooting unit, the pattern for shooting the fiber;
Receiving unit, for receiving checking request, 2 D code information and fiber picture of the checking request comprising scanning,
Authentication unit, for the 2 D code information and fiber picture to be set up into corresponding relation with Quick Response Code with the fiber pattern of storage Compare, it is such as consistent, then it is proved to be successful, such as inconsistent, authentication failed.
5. system according to claim 4, it is characterised in that the system also includes:
Unit is deleted, for after being proved to be successful, the corresponding relation that the fiber pattern and Quick Response Code are set up being deleted.This scheme is In order to ensure the uniqueness of checking, i.e., one corresponding relation can only be verified once.
6. system according to claim 4, it is characterised in that the authentication unit is specifically for the fiber pattern that will obtain The ambient noise of binaryzation is removed, the pattern is divided into multiple equal-sized squares, calculate fiber in each square Length, the length of fiber in each positive direction is formed into matrix A in order, obtain the square length of the fiber pattern of storage Matrix B, if B=C*A, wherein C is constant, it is determined that fiber pattern is consistent with the fiber pattern of storage, otherwise, inconsistent.
CN201611142924.0A 2016-12-13 2016-12-13 Anti-counterfeiting method and device based on fiber code Pending CN106709546A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611142924.0A CN106709546A (en) 2016-12-13 2016-12-13 Anti-counterfeiting method and device based on fiber code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611142924.0A CN106709546A (en) 2016-12-13 2016-12-13 Anti-counterfeiting method and device based on fiber code

Publications (1)

Publication Number Publication Date
CN106709546A true CN106709546A (en) 2017-05-24

Family

ID=58937244

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611142924.0A Pending CN106709546A (en) 2016-12-13 2016-12-13 Anti-counterfeiting method and device based on fiber code

Country Status (1)

Country Link
CN (1) CN106709546A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1379353A (en) * 2002-04-30 2002-11-13 孙显林 Antiforge method by random texture distribution
CN102890893A (en) * 2011-07-20 2013-01-23 广东广新信息技术产业发展有限公司 Anti-counterfeiting label for wine
KR20130105797A (en) * 2013-08-30 2013-09-26 김경중 Information provide service and system of packing have data record tag
CN103646333A (en) * 2013-12-25 2014-03-19 北京慧眼智行科技有限公司 Anti-fake detection method, device and system
CN105303223A (en) * 2015-11-18 2016-02-03 广东正迪科技股份有限公司 Random image anti-fake conflict logistics logo preparation method, logos and identification method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1379353A (en) * 2002-04-30 2002-11-13 孙显林 Antiforge method by random texture distribution
CN102890893A (en) * 2011-07-20 2013-01-23 广东广新信息技术产业发展有限公司 Anti-counterfeiting label for wine
KR20130105797A (en) * 2013-08-30 2013-09-26 김경중 Information provide service and system of packing have data record tag
CN103646333A (en) * 2013-12-25 2014-03-19 北京慧眼智行科技有限公司 Anti-fake detection method, device and system
CN105303223A (en) * 2015-11-18 2016-02-03 广东正迪科技股份有限公司 Random image anti-fake conflict logistics logo preparation method, logos and identification method

Similar Documents

Publication Publication Date Title
CN112491551B (en) Data verification method and device based on block chain and electronic equipment
EP3678346A1 (en) Blockchain smart contract verification method and apparatus, and storage medium
US20210049715A1 (en) Blockchain-based data procesing method, apparatus, and electronic device
CN104994425A (en) Video labeling method and device
CN108228188A (en) A kind of view component processing method, electronic equipment and readable storage medium storing program for executing
CN105075223B (en) Tracking in a computing environment using
CN109033475A (en) A kind of file memory method, device, equipment and storage medium
CN104133775A (en) Method and apparatus for managing memory
CN103425785A (en) Data storage system and user data storage and reading method thereof
CN104834599A (en) WEB security detection method and device
CN103975336A (en) Encoding labels in values to capture information flows
CN104182403A (en) Method and equipment for loading image information
CN108897859A (en) A kind of metadata retrieval method, apparatus, equipment and computer readable storage medium
CN109960534A (en) Equipment detection method, device, storage medium and electronic equipment
CN102970380B (en) Obtain method and the cloud storage server of the media data of cloud storage file
CN109885535A (en) A kind of method and relevant apparatus of file storage
US20170091058A1 (en) Method and apparatus for testing compatibility of 3D engine
CN107133163A (en) A kind of method and apparatus for verifying description class API
CN106709546A (en) Anti-counterfeiting method and device based on fiber code
CN108491457A (en) A kind of method and apparatus for synchronizing public cloud resource
CN111353007B (en) Geographic element pickup method, coding method and device based on vector slicing and electronic equipment
CN106254092A (en) A kind of method for early warning, Apparatus and system
CN111125332A (en) Method, device, equipment and storage medium for calculating TF-IDF value of word
CN102902820B (en) The recognition methods of type of database and device
CN108073411A (en) A kind of kernel loads method and device of patch

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170524