CN106709546A - Anti-counterfeiting method and device based on fiber code - Google Patents
Anti-counterfeiting method and device based on fiber code Download PDFInfo
- Publication number
- CN106709546A CN106709546A CN201611142924.0A CN201611142924A CN106709546A CN 106709546 A CN106709546 A CN 106709546A CN 201611142924 A CN201611142924 A CN 201611142924A CN 106709546 A CN106709546 A CN 106709546A
- Authority
- CN
- China
- Prior art keywords
- fiber
- pattern
- quick response
- response code
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10544—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
- G06K7/10821—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
- G06K7/10861—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices sensing of data fields affixed to objects or articles, e.g. coded labels
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09F—DISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
- G09F3/00—Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
- G09F3/02—Forms or constructions
- G09F3/0297—Forms or constructions including a machine-readable marking, e.g. a bar code
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Electromagnetism (AREA)
- Finance (AREA)
- Entrepreneurship & Innovation (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides an anti-counterfeiting method based on a fiber code. The method comprises the steps that an anti-counterfeiting two-dimensional code is generated; the two-dimensional code is printed on an inspection label, and a number of fibers are randomly added on the inspection label; the fiber pattern is shot, and the correspondence between the fiber pattern and the two-dimensional code is established to receive an authentication request, wherein the authentication request comprises scanned two-dimensional code information and a fiber picture; the two-dimensional code information and the fiber picture are compared with the stored correspondence between the fiber pattern and the two-dimensional code; and if the two-dimensional code information and the fiber picture are consistent with the stored correspondence, authentication is successful, otherwise authentication fails. According to the technical scheme provided by the invention, the method has the advantage of good anti-counterfeiting effect.
Description
Technical field
The present invention relates to anti-counterfeiting technology, more particularly to a kind of method for anti-counterfeit and device based on fiber code.
Background technology
With the development of electronics technology, Quick Response Code is more and more applied in false proof field, for false proof,
Especially the performance of two-dimension code anti-counterfeit is excessively poor, so causes existing method for anti-counterfeit to realize true false proof purpose.
The content of the invention
An object of the present invention is to improve false proof.
According to an aspect of the invention, there is provided a kind of method for anti-counterfeit based on fiber code, methods described includes:
The network equipment generates a false proof Quick Response Code;
Be printed upon the Quick Response Code on check tag by the network equipment, adds a plurality of fiber at random on check tag;
The network equipment shoots the pattern of the fiber, and the fiber pattern and Quick Response Code are set up into corresponding relation;
The network equipment receives checking request, and the checking request includes the 2 D code information and fiber picture for scanning,
The 2 D code information is set up into corresponding relation with Quick Response Code with the fiber pattern of storage with fiber picture to compare, such as one
Cause, be then proved to be successful, such as inconsistent, authentication failed.
Optionally, methods described deletes the corresponding relation that the fiber pattern and Quick Response Code are set up after being proved to be successful.
Optionally, optionally, the verification mode of the fiber pattern is specially:
The fiber pattern that will be obtained removes the ambient noise of binaryzation, and the pattern is divided into multiple equal-sized pros
Shape, calculates the length of fiber in each square, and the length of fiber in each positive direction is formed into matrix A in order, and acquisition is deposited
The square length matrix B of the fiber pattern of storage, if B=C*A, wherein C is constant, it is determined that fiber pattern and the fibre for storing
Dimension pattern is consistent, otherwise, inconsistent.
Second aspect, there is provided a kind of false proof device based on fiber code, described device includes:
Generation unit, a false proof Quick Response Code is generated for the network equipment;
Adding device, for the Quick Response Code to be printed upon into check tag, adds a plurality of fiber at random on check tag;
The fiber pattern and Quick Response Code are set up corresponding relation by shooting unit, the pattern for shooting the fiber;
Receiving unit, for receiving checking request, 2 D code information and fiber picture of the checking request comprising scanning,
Authentication unit, for the 2 D code information is corresponding with Quick Response Code foundation with the fiber pattern of storage with fiber picture
Relation is compared, such as consistent, then be proved to be successful, such as inconsistent, authentication failed.
Optionally, the system also includes:
Unit is deleted, for after being proved to be successful, the corresponding relation that the fiber pattern and Quick Response Code are set up being deleted.This side
Case is that in order to ensure the uniqueness of checking, i.e., one corresponding relation can only be verified once.
Optionally, the ambient noise of fiber pattern removal binaryzation of the authentication unit specifically for that will obtain, by this
Pattern is divided into multiple equal-sized squares, calculates the length of fiber in each square, by fiber in each positive direction
Length form matrix A in order, obtain the square length matrix B of the fiber pattern of storage, if B=C*A, wherein C is
Constant, it is determined that fiber pattern is consistent with the fiber pattern of storage, otherwise, inconsistent.
Although those of ordinary skill in the art will be appreciated that following detailed description carries out referenced in schematic embodiment, accompanying drawing,
But the present invention is not limited in these embodiments.But, the scope of the present invention is extensive, and is intended to be bound only by appended right
It is required that limiting the scope of the present invention.
Brief description of the drawings
By the detailed description made to non-limiting example made with reference to the following drawings of reading, it is of the invention other
Feature, objects and advantages will become more apparent upon:
Fig. 1 is the flow chart of the method for anti-counterfeit 1 based on fiber code according to a preferred embodiment of the invention;
Fig. 2 is the schematic diagram of the false proof device 2 based on fiber code according to a preferred embodiment of the invention;
The fiber pattern schematic diagram that Fig. 3 A are provided for the present invention;
The division schematic diagram of the fiber pattern that Fig. 3 B are provided for the present invention.
Same or analogous reference represents same or analogous part in accompanying drawing.
Specific embodiment
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail
The treatment described as flow chart or method.Although operations to be described as flow chart the treatment of order, therein to be permitted
Multioperation can be implemented concurrently, concomitantly or simultaneously.Additionally, the order of operations can be rearranged.When it
The treatment can be terminated when operation is completed, it is also possible to have the additional step being not included in accompanying drawing.The treatment
Can correspond to method, function, code, subroutine, subprogram etc..
Alleged within a context " computer equipment ", also referred to as " computer ", referring to can be by running preset program or referring to
Make performing the intelligent electronic device of the predetermined process process such as numerical computations and/or logical calculated, its can include processor with
Memory, the survival instruction prestored in memory by computing device performs predetermined process process, or by ASIC,
The hardware such as FPGA, DSP perform predetermined process process, or are combined by said two devices and to realize.Computer equipment includes but does not limit
In server, PC, notebook computer, panel computer, smart mobile phone etc..
Method (some of them are illustrated by flow) discussed hereafter can be by hardware, software, firmware, centre
Part, microcode, hardware description language or its any combination are implemented.Implement when with software, firmware, middleware or microcode
When, it is used to implement that the program code or code segment of necessary task can be stored in machine or computer-readable medium (is such as deposited
Storage media) in.(one or more) processor can implement necessary task.
Concrete structure disclosed herein and function detail are only representational, and are for describing of the invention showing
The purpose of example property embodiment.But the present invention can be implemented by many alternative forms, and be not interpreted as
It is limited only by the embodiments set forth herein.
Although it should be appreciated that may have been used term " first ", " second " etc. herein to describe unit,
But these units should not be limited by these terms.It is used for the purpose of a unit and another unit using these terms
Make a distinction.For example, in the case of the scope without departing substantially from exemplary embodiment, it is single that first module can be referred to as second
Unit, and similarly second unit can be referred to as first module.Term "and/or" used herein above include one of them or
Any and all combination of more listed associated items.
Term used herein above is not intended to limit exemplary embodiment just for the sake of description specific embodiment.Unless
Context clearly refers else, and singulative " one " otherwise used herein above, " one " also attempt to include plural number.Should also
When understanding, term used herein above " including " and/or "comprising" specify stated feature, integer, step, operation,
The presence of unit and/or component, and do not preclude the presence or addition of one or more other features, integer, step, operation, unit,
Component and/or its combination.
It should further be mentioned that in some replaces realization modes, the function/action being previously mentioned can be according to different from attached
The order indicated in figure occurs.For example, depending on involved function/action, the two width figures for showing in succession actually may be used
Substantially simultaneously to perform or can perform in a reverse order sometimes.
The present invention is described in further detail below in conjunction with the accompanying drawings.
It should be noted that the smart machine is only for example, other it is existing or be likely to occur from now on the network equipment,
Computer equipment and user equipment in the present invention, should be also included within the scope of the present invention if applicable, and with reference side
Formula is incorporated herein.
Fig. 1 is refer to, Fig. 1 is the flow of the method for anti-counterfeit based on fiber code according to a preferred embodiment of the invention
Figure.
As shown in figure 1, the method for anti-counterfeit 1 based on fiber code that a preferred embodiment of the invention is provided includes:
Step S101, the network equipment generate a false proof Quick Response Code;
Be printed upon the Quick Response Code on check tag by step S102, the network equipment, adds a plurality of at random on check tag
Fiber;
Step S103, the network equipment shoot the pattern of the fiber, and the fiber pattern and Quick Response Code are set up into corresponding relation.
Step S104, the network equipment receive checking request, 2 D code information and fiber of the checking request comprising scanning
Picture,
Step S105, the 2 D code information and fiber picture are set up into corresponding relation with the fiber pattern and Quick Response Code of storage
Compare, it is such as consistent, then it is proved to be successful, such as inconsistent, authentication failed.
The technical scheme that the present invention is provided realizes checking by way of Quick Response Code and fiber code are combined, for fibrogram
Case, because it is to add on check tag at random, so it has contingency, to this, it has uniqueness, specific fiber
Pattern as shown in Figure 3A, so the fiber pattern has uniformity, is so verified to the fiber pattern and can improve anti-
Pseudo- effect, in addition, increase Quick Response Code is to quickly be recognized to fiber pattern, because for fiber pattern, by
The information content recognized in it is very big, and due to the uniqueness of each fiber pattern, the speed of its identification can be very low, if
Only be identified with fiber pattern, then the speed of identification certainly will be influenceed, and the recognition speed of Quick Response Code is fast, its equivalent to
One index of fiber pattern, is identified before the fiber pattern that the server on backstage is indexed its needs identification, so its
There is quick identification.
Optionally, the above method deletes the corresponding relation that the fiber pattern and Quick Response Code are set up after being proved to be successful.This
Scheme is that in order to ensure the uniqueness of checking, i.e., one corresponding relation can only be verified once.
The verification mode of above-mentioned fiber pattern is specifically as follows:
The fiber pattern that will be obtained removes the ambient noise of binaryzation, and the pattern is divided into multiple equal-sized pros
Shape (as shown in Figure 3 B), calculates the length of fiber in each square, and the length of fiber in each positive direction is formed in order
Matrix A, obtains the square length matrix B of the fiber pattern of storage, if B=C*A, wherein C is constant, it is determined that fibrogram
Case is consistent with the fiber pattern of storage, otherwise, inconsistent.
The present embodiment using fiber pattern compare by the way of be using square partition length compare by the way of come
Realize compare because for fiber pattern, its length is all the presence of linear relationship, as long as so C be constant, can say
Bright this fiber pattern is consistent pattern.And this RM has the advantages that recognition speed is fast.
As shown in Fig. 2 the false proof device 2 based on fiber code that a preferred embodiment of the invention is provided includes:
Generation unit 201, a false proof Quick Response Code is generated for the network equipment;
Adding device 202, for the Quick Response Code to be printed upon into check tag, adds a plurality of fibre at random on check tag
Dimension;
The fiber pattern and Quick Response Code are set up corresponding relation by shooting unit 203, the pattern for shooting the fiber.
Receiving unit 204, for receiving checking request, 2 D code information and fibrogram of the checking request comprising scanning
Piece,
Authentication unit 205, for the 2 D code information and fiber picture to be set up with the fiber pattern of storage with Quick Response Code
Corresponding relation is compared, such as consistent, then be proved to be successful, such as inconsistent, authentication failed.
The technical scheme that the present invention is provided realizes checking by way of Quick Response Code and fiber code are combined, for fiber
Code, because it is become rusty in equipment to be tested, because some factors, its embroidered picture can not possibly be completely the same, so should
Fiber code has uniformity, and so fiber code is verified and can improve false proof effect, in addition, increase Quick Response Code with
The corresponding relation of fiber code also improves the precision of fake certification.So it has the advantages that antifalse effect is good.
Optionally, said system can also include:
Unit 206 is deleted, for after being proved to be successful, the corresponding relation that the fiber pattern and Quick Response Code are set up being deleted.
This scheme is that in order to ensure the uniqueness of checking, i.e., one corresponding relation can only be verified once.
Optionally, the ambient noise of fiber pattern removal binaryzation of the above-mentioned authentication unit 205 specifically for that will obtain, will
The pattern is divided into multiple equal-sized squares (as shown in Figure 3 B), calculates the length of fiber in each square, will be every
The length of fiber forms matrix A in order in individual positive direction, the square length matrix B of the fiber pattern of storage is obtained, if B
=C*A, wherein C are constant, it is determined that fiber pattern is consistent with the fiber pattern of storage, otherwise, inconsistent.
Wherein, the equipment includes but is not limited to computer, server, intelligent watch, Intelligent bracelet, smart mobile phone, PDA
Deng;The network equipment includes but is not limited to single network server, the server group of multiple webserver compositions or is based on
The cloud being made up of a large amount of computers or the webserver of cloud computing (Cloud Computing), wherein, cloud computing is distributed
One kind of calculating, a super virtual computer being made up of the computer collection of a group loose couplings.Wherein, the computer sets
It is standby can isolated operation realize the present invention, also can access network and by with network in other computer equipments interactive operation
To realize the present invention.Wherein, the network residing for the computer equipment includes but is not limited to internet, wide area network, Metropolitan Area Network (MAN), office
Domain net, VPN etc..
It should be noted that the user equipment, the network equipment and network etc. are only for example, other are existing or from now on may be used
The computer equipment or network that can occur such as are applicable to the present invention, should also be included within the scope of the present invention, and to draw
It is incorporated herein with mode.
It should be noted that the present invention can be carried out in the assembly of software and/or software with hardware, for example, this hair
Each bright device can be realized using application specific integrated circuit (ASIC) or any other similar hardware device.In one embodiment
In, software program of the invention can be by computing device realizing steps described above or function.Similarly, it is of the invention
Software program (including related data structure) can be stored in computer readable recording medium storing program for performing, for example, RAM memory,
Magnetically or optically driver or floppy disc and similar devices.In addition, some steps of the invention or function can employ hardware to realize, example
Such as, coordinate so as to perform the circuit of each step or function as with processor.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie
In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be in other specific forms realized.Therefore, no matter
From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power
Profit requires to be limited rather than described above, it is intended that all in the implication and scope of the equivalency of claim by falling
Change is included in the present invention.Any reference in claim should not be considered as the claim involved by limitation.This
Outward, it is clear that " including " word is not excluded for other units or step, odd number is not excluded for plural number.The multiple stated in system claims
Unit or device can also be realized by a unit or device by software or hardware.The first, the second grade word is used for table
Show title, and be not offered as any specific order.
Claims (6)
1. it is a kind of based on fiber code method for anti-counterfeit, it is characterised in that methods described includes:
The network equipment generates a false proof Quick Response Code;
Be printed upon the Quick Response Code on check tag by the network equipment, adds a plurality of fiber at random on check tag;
The network equipment shoots the pattern of the fiber, and the fiber pattern and Quick Response Code are set up into corresponding relation;
The network equipment receives checking request, and the checking request includes the 2 D code information and fiber picture for scanning,
The 2 D code information is set up into corresponding relation with Quick Response Code with the fiber pattern of storage with fiber picture to compare, it is such as consistent,
Then it is proved to be successful, such as inconsistent, authentication failed.
2. method according to claim 1, it is characterised in that methods described after being proved to be successful, by the fiber pattern with
The corresponding relation that Quick Response Code is set up is deleted.
3. method according to claim 1, it is characterised in that the verification mode of the fiber pattern is specially:
The fiber pattern that will be obtained removes the ambient noise of binaryzation, and the pattern is divided into multiple equal-sized squares,
The length of fiber in each square is calculated, the length of fiber in each positive direction is formed into matrix A in order, obtain storage
The square length matrix B of fiber pattern, if B=C*A, wherein C is constant, it is determined that fiber pattern and the fibrogram for storing
Case is consistent, otherwise, inconsistent.
4. it is a kind of based on fiber code false proof device, it is characterised in that described device includes:
Generation unit, a false proof Quick Response Code is generated for the network equipment;
Adding device, for the Quick Response Code to be printed upon into check tag, adds a plurality of fiber at random on check tag;
The fiber pattern and Quick Response Code are set up corresponding relation by shooting unit, the pattern for shooting the fiber;
Receiving unit, for receiving checking request, 2 D code information and fiber picture of the checking request comprising scanning,
Authentication unit, for the 2 D code information and fiber picture to be set up into corresponding relation with Quick Response Code with the fiber pattern of storage
Compare, it is such as consistent, then it is proved to be successful, such as inconsistent, authentication failed.
5. system according to claim 4, it is characterised in that the system also includes:
Unit is deleted, for after being proved to be successful, the corresponding relation that the fiber pattern and Quick Response Code are set up being deleted.This scheme is
In order to ensure the uniqueness of checking, i.e., one corresponding relation can only be verified once.
6. system according to claim 4, it is characterised in that the authentication unit is specifically for the fiber pattern that will obtain
The ambient noise of binaryzation is removed, the pattern is divided into multiple equal-sized squares, calculate fiber in each square
Length, the length of fiber in each positive direction is formed into matrix A in order, obtain the square length of the fiber pattern of storage
Matrix B, if B=C*A, wherein C is constant, it is determined that fiber pattern is consistent with the fiber pattern of storage, otherwise, inconsistent.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611142924.0A CN106709546A (en) | 2016-12-13 | 2016-12-13 | Anti-counterfeiting method and device based on fiber code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611142924.0A CN106709546A (en) | 2016-12-13 | 2016-12-13 | Anti-counterfeiting method and device based on fiber code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106709546A true CN106709546A (en) | 2017-05-24 |
Family
ID=58937244
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611142924.0A Pending CN106709546A (en) | 2016-12-13 | 2016-12-13 | Anti-counterfeiting method and device based on fiber code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106709546A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1379353A (en) * | 2002-04-30 | 2002-11-13 | 孙显林 | Antiforge method by random texture distribution |
CN102890893A (en) * | 2011-07-20 | 2013-01-23 | 广东广新信息技术产业发展有限公司 | Anti-counterfeiting label for wine |
KR20130105797A (en) * | 2013-08-30 | 2013-09-26 | 김경중 | Information provide service and system of packing have data record tag |
CN103646333A (en) * | 2013-12-25 | 2014-03-19 | 北京慧眼智行科技有限公司 | Anti-fake detection method, device and system |
CN105303223A (en) * | 2015-11-18 | 2016-02-03 | 广东正迪科技股份有限公司 | Random image anti-fake conflict logistics logo preparation method, logos and identification method |
-
2016
- 2016-12-13 CN CN201611142924.0A patent/CN106709546A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1379353A (en) * | 2002-04-30 | 2002-11-13 | 孙显林 | Antiforge method by random texture distribution |
CN102890893A (en) * | 2011-07-20 | 2013-01-23 | 广东广新信息技术产业发展有限公司 | Anti-counterfeiting label for wine |
KR20130105797A (en) * | 2013-08-30 | 2013-09-26 | 김경중 | Information provide service and system of packing have data record tag |
CN103646333A (en) * | 2013-12-25 | 2014-03-19 | 北京慧眼智行科技有限公司 | Anti-fake detection method, device and system |
CN105303223A (en) * | 2015-11-18 | 2016-02-03 | 广东正迪科技股份有限公司 | Random image anti-fake conflict logistics logo preparation method, logos and identification method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112491551B (en) | Data verification method and device based on block chain and electronic equipment | |
EP3678346A1 (en) | Blockchain smart contract verification method and apparatus, and storage medium | |
US20210049715A1 (en) | Blockchain-based data procesing method, apparatus, and electronic device | |
CN104994425A (en) | Video labeling method and device | |
CN108228188A (en) | A kind of view component processing method, electronic equipment and readable storage medium storing program for executing | |
CN105075223B (en) | Tracking in a computing environment using | |
CN109033475A (en) | A kind of file memory method, device, equipment and storage medium | |
CN104133775A (en) | Method and apparatus for managing memory | |
CN103425785A (en) | Data storage system and user data storage and reading method thereof | |
CN104834599A (en) | WEB security detection method and device | |
CN103975336A (en) | Encoding labels in values to capture information flows | |
CN104182403A (en) | Method and equipment for loading image information | |
CN108897859A (en) | A kind of metadata retrieval method, apparatus, equipment and computer readable storage medium | |
CN109960534A (en) | Equipment detection method, device, storage medium and electronic equipment | |
CN102970380B (en) | Obtain method and the cloud storage server of the media data of cloud storage file | |
CN109885535A (en) | A kind of method and relevant apparatus of file storage | |
US20170091058A1 (en) | Method and apparatus for testing compatibility of 3D engine | |
CN107133163A (en) | A kind of method and apparatus for verifying description class API | |
CN106709546A (en) | Anti-counterfeiting method and device based on fiber code | |
CN108491457A (en) | A kind of method and apparatus for synchronizing public cloud resource | |
CN111353007B (en) | Geographic element pickup method, coding method and device based on vector slicing and electronic equipment | |
CN106254092A (en) | A kind of method for early warning, Apparatus and system | |
CN111125332A (en) | Method, device, equipment and storage medium for calculating TF-IDF value of word | |
CN102902820B (en) | The recognition methods of type of database and device | |
CN108073411A (en) | A kind of kernel loads method and device of patch |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170524 |