CN107103346A - Clothing user's big data interference acquisition method - Google Patents
Clothing user's big data interference acquisition method Download PDFInfo
- Publication number
- CN107103346A CN107103346A CN201710354405.9A CN201710354405A CN107103346A CN 107103346 A CN107103346 A CN 107103346A CN 201710354405 A CN201710354405 A CN 201710354405A CN 107103346 A CN107103346 A CN 107103346A
- Authority
- CN
- China
- Prior art keywords
- clothing
- coded lock
- user
- big data
- lock
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 13
- 238000012546 transfer Methods 0.000 claims description 3
- 238000001467 acupuncture Methods 0.000 claims description 2
- 238000003825 pressing Methods 0.000 claims description 2
- 238000010008 shearing Methods 0.000 claims description 2
- 238000003860 storage Methods 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 description 14
- 238000010586 diagram Methods 0.000 description 6
- 238000012856 packing Methods 0.000 description 6
- 238000013459 approach Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 5
- 239000000463 material Substances 0.000 description 4
- 238000004806 packaging method and process Methods 0.000 description 4
- 230000002265 prevention Effects 0.000 description 4
- 235000013305 food Nutrition 0.000 description 3
- 239000000725 suspension Substances 0.000 description 3
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 3
- 235000014101 wine Nutrition 0.000 description 3
- 241000272173 Calidris Species 0.000 description 2
- 244000269722 Thea sinensis Species 0.000 description 2
- 235000019504 cigarettes Nutrition 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 235000013616 tea Nutrition 0.000 description 2
- 244000046052 Phaseolus vulgaris Species 0.000 description 1
- 235000010627 Phaseolus vulgaris Nutrition 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000005520 cutting process Methods 0.000 description 1
- 229910052500 inorganic mineral Inorganic materials 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 239000011707 mineral Substances 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 239000007921 spray Substances 0.000 description 1
- 230000035922 thirst Effects 0.000 description 1
- 235000020097 white wine Nutrition 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Lock And Its Accessories (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a kind of clothing user big data interference acquisition method, coded lock is arranged on clothing, unlocking cipher is stored in the database on network;With smart mobile phone scanning Quick Response Code, big data acquisition system can be logged in, unlocking cipher is transferred from database, is opened and coded lock is removed, removal reuses clothing after disturbing.Big data acquisition system in the present invention, can gather storage into database, low cost, expeditiously acquisition clothing user's big data by the user profile of barcode scanning person and clothing information.
Description
Technical field
The invention belongs to goods logistic information technical field, more particularly to garment type commodity and its user's big data(With
Family and consumption information)A kind of high efficiency, low cost acquisition method.
Background technology
Commodity manufacturer(Maker or seller), thirst for all the time all dreaming of knowing its each commodity, most
Finally when, be sold to which user, user somewhere, how old, the user of user be man or female,
The wechat number of user is how many, the phone number of user is how many, what feature is the consumption habit of user have.These users are big
Data, are a kind of very commercially valuable resource and wealth in the world today of popular big data.
Background technology 1:China Patent Publication No. CN204010023U discloses one kind and " sets the bottle cap of two-dimension code label to prevent
Pseudo-device ".So-and-so domestic flood icing board bottled mineral water implements the patent formula.In order to gather user's big data, water factory does not stint
Pay the bonus of every bottle of 2 yuans of water, give ample rewards to barcode scanning user, to " purchase " user's big data.So-and-so domestic board is bottled white
Wine also implements the patent formula.In order to gather user's big data, brewery do not stint pay every bottle of 5-8 yuans of wine bonus,
Barcode scanning user is given ample rewards to, to " purchase " user's big data.So give ample rewards to, produce effects but still little, statistics display:Above-mentioned two are put down
The product for there was only 13.8% is received the award by barcode scanning.As described in proverb " money isn't everything ", a huge sum of money " purchase " user's big data,
It produces little effect.Trace it to its cause:Many high consumption colonies disdain the bonus of several yuans, and barcode scanning of being reluctant to condescend is received the award.However, that
The high-quality user's big data collected is most thirsted for by a little high consumption community informations, exactly producer.
Background technology 2:China Patent Publication No. CN1588406A disclose it is a kind of " anti-fake method for digital compulsive inquiry and its
Cipher opening device ", belongs to anti-counterfeit anti-theft technical field.It is mounted with a cipher opening device in commodity packaging, in fact
Border is a coded lock, and its advantage is:By installing coded lock additional to commodity, make commodity while possessing pair of Anti-fake digital and password
Protect again, with more superior anti-counterfeit anti-theft performance, it is applied to " the packaging of a variety of commodity such as cigarette, wine, tea(Rigid container)It is anti-
It is pseudo- " with it is antitheft.Similar invention also has:China Patent Publication No. CN104463641A " the use based on coded lock anti-counterfeiting bottle cap
" a kind of pair of coded lock anti-counterfeiting bottle cap of user data processing and analysis system " and China Patent Publication No. CN102446273A
Code production method ".
It will be apparent that background technology 2 is confined to the anti-counterfeit anti-theft of the rigid package thing such as bottle cap.Its technical measures taken is:
The anti-counterfeit anti-theft goods packing container that a kind of lock of manufacture is integrated with rigid package thing, the food such as cigarette, wine, tea is locked closed
Hard packing case in, barcode scanning unlock be take out food unique channel.Its technical standard used is:Lock and rigid package thing
It is integrated, can not steals and change, be difficult to crack, if does not unlock, user can not definitely eat the food in it.It is soft for clothing etc.
For package goods, how on earth gather user's big data, background technology 1 and 2 does not provide any technology high efficiency, low cost
Enlightenment.
In summary, the coded lock in background technology 1 and 2 is only the lockset on conventional meaning, and its effect is " to hinder by force
Only " user opens packaging and takes out commodity.
The content of the invention
The purpose of the present invention:Gather garment type user while a kind of high efficiency, low cost is provided(Wearer)Big data it is specific
Special method --- clothing user's big data interference acquisition method.The technical measures on clothing are hung using by coded lock,
It is intended to disturb user to use the normal of clothing, barcode scanning, which is unlocked, simply removes chaff interference(That is coded lock)A kind of simple and direct way
Footpath --- preferred approach, it is not unique channel.Its technical standard used is:Coded lock can be removed from clothing, is easy to
Robber changes, is easy to crack, if user is without password, prizes/cut off lock with going back destructibility, and it is to remove chaff interference to prize/cut off lock(It is i.e. close
Code lock)A kind of cumbersome approach --- it is secondary to select approach;If not removing coded lock, not removing its chaff interference, user may continue to
Use(For example put on)Clothing, is only limited by lock interference, body-sensing(Including psychological feelingses)It is wrong with(Mostly be it is psychological because
Caused by plain).
A kind of technical scheme of clothing user big data interference acquisition method of the present invention is as follows.
A kind of clothing user big data interference acquisition method, it is characterised in that comprise the following steps:
1. from a kind of coded lock (1), (1) coded lock is worked out code that at least one has uniqueness (2) to each;The generation
Any codings with uniqueness such as (2) code can be sequence number, code of tracing to the source, prize code, logistics code;
2. (1) coded lock is hung clothing hole (3) (4) on or annulus (5) on, or (1) coded lock is clipped in clothing (3) on;
Ensure not can not normally remove coded lock (1) the person that knows password;Described hole (4) can be clothing (3) on buttonhole, pinprick, gas
The position of any suspended coded lock such as eye, mesh, broken hole, lacing eyelets (1);The annulus (5) can be trousers ear, clasp, suspension ring,
The part of any suspended coded lock such as woven label, brace (1);
(6) 3. unlocking cipher corresponded to the database that (2) its code stores the big data acquisition system of access mobile Internet (7)
(8) in;The big data acquisition system is a kind of computer information system;Such as product back-tracing platform, Antiforge inquiry platform, micro-
Believe public number platform, wechat small routine platform etc.;
4. to coded lock (1) or (3) clothing prints and set the network address Quick Response Code of upper big data acquisition system (9);
5. user (10) scanned with smart mobile phone Quick Response Code (9), log in(Into)Big data acquisition system, from database (8) in transfer
Unlocking cipher is (6);
6. the big data acquisition system(While user's barcode scanning logs in and transfers password)In passing by the user profile of barcode scanning person
(Such as log-on message, wechat number, QQ number code, microblogging number, phone number, geographical position, barcode scanning time, barcode scanning number of times, purchase
Buy usage quantity, frequency of use, whether belong to the information such as brand bean vermicelli)And code (2) corresponding clothing (3) merchandise news(Example
Such as the name of an article, dealer, legal possession, falsifying whether, true and false information), in collection storage to database (8);
7. user with seen unlocking cipher (6) character open coded lock (1), remove coded lock (1), remove chaff interference after, make again
With(For example put on)Clothing is (3).
It is appreciated that the clothing user big data interference acquisition method, it is characterised in that at least including one of following.
1. (2) include one in the information content of each described Quick Response Code (9) has the code of uniqueness.
2. without hole clothing (4) (3) on, (4) pinprick hole, (4) (1) coded lock is hung in pinprick hole in acupuncture
On.
3. the Quick Response Code (9) in include to enter on clothing wechat public's account number access information (3) or wechat small routine
Message ceases.
4. the Quick Response Code (9) in include unlocking cipher (6) where webpage link network address.
5. (3) the clothing at least includes towel, scarf, necktie, pillowcase, quilt, sheet, bedcover, shoes, socks, cap
One kind in son, bag.
6. (11) (3) (1) the coded lock lock together clothing with other presents;Or, the coded lock (1) by clothing (3)
(3) (11) class present locks together with other clothings.(11) the present can be various suspension members, jewelry, headwear, jewellery, handkerchief, object for appreciation
Tool, accessory, another small clothes small article that (3) etc. user likes but disturbs clothing (3) normally to use.The present is (11)
Promotional item, prize, souvenir etc. can be referred to as.
7. the coded lock (1) provided with screwdriver socket (12), make provision against emergencies when not opening coded lock (1), user is inserted into
Screwdriver, pry open coded lock (1) remove its interference.The screwdriver is the standing instrument of family, is not difficult to find, using simple.Use screwdriver
Pry open coded lock and (1) remove its interference, though a kind of cumbersome approach, its really a kind of definitely effective, indispensable candidate side
Case.
8. (13) anti-shearing force is 100-700N to the hook of the coded lock (1)(Newton), make provision against emergencies and do not open coded lock (1)
When, user can will be linked up with instruments such as vices and (13) be cut.The vice(Also known as cutting pliers), it is also the standing work of family
Tool, is not difficult to find, using simple, and women and children and old man can use.Using vice cut off the hook of coded lock (1) (13), go
Except chaff interference, though a kind of cumbersome approach, its really a kind of definitely effective, indispensable candidate scheme.
9. (1) the coded lock is a kind of padlock or clamp lock, it be fixed in the way of following closely or pressing from both sides the clothing (3) on.
Clothing of the present invention is (3)(Also known as clothes, clothes, clothing)It is the synonym of clothes and dress ornament.Broad sense is determined
Justice, refers to the veil of the bodies such as trunk, four limbs, including hand(Gloves), foot(Shoes, boots, socks)With head(Cap
Son)Veil and ornament;Also include hand towel, bath towel, pillow cover, scarf, necktie, pillowcase, sheet, quilt etc..
Compared with prior art, the present invention can produce following advantageous effects.
One, the present invention have abandoned lockset is installed on packing material, prevents not obtain unlocking cipher by force in background technology
(6) user, open the high-leveled and difficult way that bag obtains commodity, innovated (1) coded lock is hung in packing material, clothing (3) on letter
Easy technical measures.In short, the distinguishing characteristics of the two is:One lock is located on packing material, and a lock is located at the clothing in packing material
Thing (3) on;One " preventing by force " user's commodity in use, " tenderness interference " user's commodity in use.In other words, in the present invention,
The effect of coded lock (1) is not the purposes that conventional meaning is locked, but disturbs user to use clothing (3) as chaff interference.Cause
This, (1) the coded lock in the present invention is a kind of chaff interference, is not the lockset on conventional meaning, and it does not have " preventing by force " user
Open packaging and take out clothing (3).
Secondly, " tenderness interference " cost of the present invention it is low, " taking preventions by force " cost height of background technology 2.Statistics display:
(1) cost is about 10 yuan/to bottle cap coded lock in background technology 2, and (1) the coded lock in the present invention is about 1 yuan/.Compared to the back of the body
For scape technology 2, the acquisition cost of user's big data reduces 10 times in the present invention.The acquirement of these beneficial effects, all because of this
Invention will " take preventions " and be changed to the creative technical measures of " gentle to disturb " by force.
Thirdly, statistics also show:Barcode scanning rate average out to 13.8% in background technology 1, and the barcode scanning rate average out to of the present invention
98.3%.For background technology 1, the collecting efficiency of user's big data improves more than 7 times in the present invention.
Four, (1), safe class requires very low to the coded lock that (3) normally uses of present invention interference clothing, can customized one kind it is honest and clean
Valency, etc. outside, the coded lock of toy locking-type (1).Just in case user does not have band mobile phone or mobile phone not to have electric or network obstructed or do not have
During network, user prizes/cut off lock, removes chaff interference with going back destructibility, it is ensured that definitely can use clothing (3).
Five, the purpose of background technology 2 " taking prevention by force " user's commodity in use, be in order to antitheft to commodity counterfeit prevention.This
Invent " tenderness interference " user's commodity in use purpose, just for the sake of " lure and take " user's big data, rather than for anti-counterfeit anti-theft.
Investigation display, manufacturer is unwilling that the anti-counterfeit anti-theft function of spending stiver to be commodity is checked, and is very willing to pay through the nose the big number of " lure and take " user
According to.In other words, the two degree popular with users is as different as light from darkness.
Brief description of the drawings
Fig. 1 is the schematic diagram of clothing user big data interference acquisition embodiment of the method for the present invention.
Fig. 2 is the schematic diagram of shoes and lock in embodiment.
Fig. 3 is the schematic diagram of existing trousers.
Fig. 4 is a kind of schematic diagram of the lock used in embodiment.
Fig. 5 is the lock and trousers ear and the schematic diagram of present in embodiment.
Fig. 6 is a kind of big data acquisition system schematic diagram for using in embodiment.
Drawing reference numeral explanation:1- coded locks, 2- codes, 3- clothings, 4- holes, 5- annulus, 6- unlocking ciphers, 7- movements are mutual
Networking (7), 8- databases, 9- Quick Response Codes, 10- smart mobile phones, 11- presents, 12- screwdrivers socket, 13- hook, 14- servers.
Embodiment
To enable the above objects, features and advantages of the present invention to become apparent, comprehensive preferred embodiment cited below particularly, and
Accompanying drawing is coordinated to be described in detail.
Embodiment one.
As shown in figure 1, (1) clothing factory chooses some in advance fulfils case Simple coded lock, and the digital sequence on spray printing thereon
Number as code (2).
Clothing factory arranges workman on one part part women's dress western-style clothes, i.e. the buttonhole of clothing (3) cuff --- hole (4) in, lock
Upper one the coded lock got ready (1).
To it is each (1) coded lock is set a three-figure random digit as unlocking cipher (6).As shown in fig. 6, will open
(6) lock cipher is corresponded to during (8) (2) its code store the database of access mobile Internet big data acquisition system (7).It is described big
Data collecting system can be a kind of ready-made computer information system;Such as product back-tracing platform, Antiforge inquiry platform, wechat
Public's account platform, wechat small routine platform etc..
Coded lock (1) on stick the wechat small routine Quick Response Code of clothing factory (9), wechat small routine and big data gathered are
(8) the database of system connects communication.
(3) clothing is put on market again clothing factory.
Work as consumer(That is user)After buying the clothing (3), can first with smart mobile phone (10) in wechat sweep sweep it is soft
Part, scanning coded lock (1) on Quick Response Code (9), open wechat small routine, input coded lock (1) on code (2), you can obtain anti-
The unlocking cipher of feedback is (6).
Consumer(That is user)(6) opened using unlocking cipher coded lock (1), remove coded lock (1) after, you can normally use
(Put on)The clothing sold for is (3).
Due to consumer(That is user)Quick Response Code is scanned using wechat small routine (9), consumer(That is user)Registration letter
Breath is early to be reported in wechat server end.Such to sweep, the big data acquisition system of clothing factory has also just collected clothing in passing
The big data information of thing (3) user.
Just in case consumer(That is user)When no band mobile phone or mobile phone do not have electric or network obstructed or do not have network, such as Fig. 4 institutes
Show, user also can use screwdriver (12) devastatingly to pry open lock from screwdriver socket, to ensure that definitely clothing can be used (3).Certainly
Can with vice cut latch hook (13), remove coded lock (1).
Clothing of the present invention (3) include shoes, as shown in Fig. 2 (1) coded lock can be locked in the annulus of shoes (5) on.
Trouble is added to user due to unlocking, for the user that is convinced, some presents can be given.As shown in figure 5, by present
(11) (3) locked together with clothing.(11) the present can be that the users such as various suspension members, jewelry, toy, accessory like but disturbed
The small article that (3) clothing normally uses.
Above disclosed is only presently preferred embodiments of the present invention, can not limit the right of the present invention with this certainly
Scope, the equivalent variations made according to the claims in the present invention still fall within the scope that the present invention is covered.
Claims (2)
1. a kind of clothing user big data interference acquisition method, it is characterised in that comprise the following steps:
1. from a kind of coded lock (1), (1) coded lock is worked out code that at least one has uniqueness (2) to each;
2. (1) coded lock is hung clothing hole (3) (4) on or annulus (5) on, or (1) coded lock is clipped in clothing (3) on;
Ensure not can not normally remove coded lock (1) the person that knows password;
(6) 3. unlocking cipher corresponded to the database that (2) its code stores the big data acquisition system of access mobile Internet (7)
(8) in;
4. to coded lock (1) or clothing (3) print set upper database (8) network address Quick Response Code (9);
5. user (10) scanned with smart mobile phone Quick Response Code (9), log in big data acquisition system, from database (8) in transfer unlocking close
Code is (6);
6. the big data acquisition system is in passing by the user profile and code of barcode scanning person (2) corresponding clothing (3) information, collection
In storing database (8);
7. the user with seen unlocking cipher (6) character open coded lock (1), remove coded lock (1), remove after chaff interference,
Reuse clothing (3).
2. according to clothing user's big data interference acquisition method described in claim 1, it is characterised in that at least including it is following it
One:
1. (2) include one in the information content of each described Quick Response Code (9) has the code of uniqueness;
2. without hole clothing (4) (3) on, in acupuncture pinprick hole (4), (1) coded lock is locked in pinprick hole (4) on;
3. the Quick Response Code (9) in include wechat public number access information or wechat small routine access information on clothing (3);
4. the Quick Response Code (9) in include unlocking cipher (6) where webpage link network address;
5. (3) the clothing at least includes towel, scarf, necktie, pillowcase, quilt, sheet, bedcover, shoes, socks, cap, bag
One kind in bag;
6. (11) (3) (1) the coded lock lock together clothing with other presents;Or, the coded lock (1) by clothing (3) with its
(3) (11) class present locks together its clothing;
7. the coded lock (1) provided with screwdriver socket (12), make provision against emergencies when not opening coded lock (1), user be inserted into screwdriver,
Pry open coded lock and (1) exclude its interference;
8. (13) anti-shearing force is 100-700N to the hook of the coded lock (1), is made provision against emergencies when not opening coded lock (1), Yong Huneng
It is enough (13) to cut hook;
9. (1) the coded lock is a kind of padlock or clamp lock, it be fixed in the way of following closely or pressing from both sides the clothing (3) on.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2017102157773 | 2017-04-04 | ||
CN201710215777 | 2017-04-04 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107103346A true CN107103346A (en) | 2017-08-29 |
Family
ID=59670453
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201720556692.7U Active CN206975710U (en) | 2017-04-04 | 2017-05-19 | Clothing user's big data interference acquisition system |
CN201710354405.9A Pending CN107103346A (en) | 2017-04-04 | 2017-05-19 | Clothing user's big data interference acquisition method |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201720556692.7U Active CN206975710U (en) | 2017-04-04 | 2017-05-19 | Clothing user's big data interference acquisition system |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN206975710U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11836804B2 (en) | 2019-01-27 | 2023-12-05 | Hainan Paipaikan Information Technology Co., Ltd. | Anti-fake packing method for product liability insurance |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN206975710U (en) * | 2017-04-04 | 2018-02-06 | 海南亚元防伪技术研究所(普通合伙) | Clothing user's big data interference acquisition system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010131967A1 (en) * | 2009-05-13 | 2010-11-18 | Christiaan Barthold Henny | Device for safely securing articles of clothing and accessories |
CN102542471A (en) * | 2011-12-31 | 2012-07-04 | 贵州卓霖防伪科技有限公司 | Product anti-counterfeiting system based on internet of things technology and anti-counterfeiting method |
CN102708184A (en) * | 2012-05-11 | 2012-10-03 | 贵州卓霖防伪科技有限公司 | Method for inquiring anti-fake two-dimension code of coded lock |
CN204453273U (en) * | 2014-12-15 | 2015-07-08 | 天津中安华典数据安全科技有限公司 | Internet of Things anti-fake bottle lid |
CN104787468A (en) * | 2015-04-20 | 2015-07-22 | 王化友 | Packing box and logistics method |
CN105260892A (en) * | 2015-09-10 | 2016-01-20 | 上海乔马电子科技有限公司 | Anti-counterfeiting verification and sales information obtaining method and anti-counterfeiting verification and sales information obtaining system |
CN205837528U (en) * | 2016-06-20 | 2016-12-28 | 开乐开(北京)防伪科技有限公司 | A kind of Anti-fake coded lock being obtained unlocking cipher by scanning Quick Response Code |
CN205983615U (en) * | 2016-08-16 | 2017-02-22 | 中山市小榄镇快车电脑服务有限公司 | Box that can intelligently unblank |
CN206975710U (en) * | 2017-04-04 | 2018-02-06 | 海南亚元防伪技术研究所(普通合伙) | Clothing user's big data interference acquisition system |
-
2017
- 2017-05-19 CN CN201720556692.7U patent/CN206975710U/en active Active
- 2017-05-19 CN CN201710354405.9A patent/CN107103346A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010131967A1 (en) * | 2009-05-13 | 2010-11-18 | Christiaan Barthold Henny | Device for safely securing articles of clothing and accessories |
CN102542471A (en) * | 2011-12-31 | 2012-07-04 | 贵州卓霖防伪科技有限公司 | Product anti-counterfeiting system based on internet of things technology and anti-counterfeiting method |
CN102708184A (en) * | 2012-05-11 | 2012-10-03 | 贵州卓霖防伪科技有限公司 | Method for inquiring anti-fake two-dimension code of coded lock |
CN204453273U (en) * | 2014-12-15 | 2015-07-08 | 天津中安华典数据安全科技有限公司 | Internet of Things anti-fake bottle lid |
CN104787468A (en) * | 2015-04-20 | 2015-07-22 | 王化友 | Packing box and logistics method |
CN105260892A (en) * | 2015-09-10 | 2016-01-20 | 上海乔马电子科技有限公司 | Anti-counterfeiting verification and sales information obtaining method and anti-counterfeiting verification and sales information obtaining system |
CN205837528U (en) * | 2016-06-20 | 2016-12-28 | 开乐开(北京)防伪科技有限公司 | A kind of Anti-fake coded lock being obtained unlocking cipher by scanning Quick Response Code |
CN205983615U (en) * | 2016-08-16 | 2017-02-22 | 中山市小榄镇快车电脑服务有限公司 | Box that can intelligently unblank |
CN206975710U (en) * | 2017-04-04 | 2018-02-06 | 海南亚元防伪技术研究所(普通合伙) | Clothing user's big data interference acquisition system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11836804B2 (en) | 2019-01-27 | 2023-12-05 | Hainan Paipaikan Information Technology Co., Ltd. | Anti-fake packing method for product liability insurance |
Also Published As
Publication number | Publication date |
---|---|
CN206975710U (en) | 2018-02-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103139204A (en) | Network identifying code method and system | |
CN103729770B (en) | A kind of anti-fake traceability system and its method | |
JP7489921B2 (en) | Apparatus and method for generating image/text-based designs | |
CN104408076B (en) | Retrieve accessory system, search assisting method and retrieval auxiliary program | |
Jackson | Commercial cultures: transcending the cultural and the economic | |
CN106446866B (en) | A kind of false-proof texture recognition methods | |
CN102054183B (en) | Product anti-counterfeiting system and method based on wireless radio frequency identification and digital watermarks | |
CN106649383A (en) | Clothes management method and system | |
CN206975710U (en) | Clothing user's big data interference acquisition system | |
US10201939B1 (en) | Product authenticity verification system | |
CN202771478U (en) | Try-on system | |
CN106991189A (en) | A kind of wardrobe control method, device and wardrobe | |
CN206193926U (en) | Quality of agricultural products traces back inquiry system | |
CN203520422U (en) | Multifunctional anti-counterfeiting security code | |
Toplis | The Hidden History of the Smock Frock | |
CN107145924A (en) | The damaged Quick Response Code enhancing of skilful use is false proof | |
US20140180869A1 (en) | Integrated business attire jacket and sports jersey and system for processing online orders of the same | |
CN108256300A (en) | A kind of cipher set-up method, device and computer readable storage medium | |
CN107622399A (en) | A kind of imported article based on block chain technology is false proof and traceability system | |
KR101423658B1 (en) | Pattern recognition system and method | |
Hinks | A structural and functional analysis of eighteenth century buttons | |
CN1122623C (en) | Establishing method of counterfeit action preventing system and four-hierarchy trap-cipher lock type commodity packing | |
CN211944595U (en) | Novel intelligent anti-counterfeiting cigarette case | |
JP2011132674A (en) | Device and method of locking control for vehicle | |
CN2533084Y (en) | Internal printed packaging box or bag using digit for access to networks so as to have antiforging function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Country or region after: China Address after: 570125 Jiudu Building, 38 Guomao Road, Longhua District, Haikou City, Hainan Province, 26D Applicant after: Hainan Yayuan anti counterfeiting technology Research Institute (L.P.) Address before: 570125 Jiudu Building, 38 Guomao Road, Longhua District, Haikou City, Hainan Province, 26D Applicant before: HAINAN YAYUAN ANTI COUNTERFEITING TECHNOLOGY Research Institute (GENERAL PARTNERSHIP) Country or region before: China |
|
CB02 | Change of applicant information |