CN107103346A - Clothing user's big data interference acquisition method - Google Patents

Clothing user's big data interference acquisition method Download PDF

Info

Publication number
CN107103346A
CN107103346A CN201710354405.9A CN201710354405A CN107103346A CN 107103346 A CN107103346 A CN 107103346A CN 201710354405 A CN201710354405 A CN 201710354405A CN 107103346 A CN107103346 A CN 107103346A
Authority
CN
China
Prior art keywords
clothing
coded lock
user
big data
lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710354405.9A
Other languages
Chinese (zh)
Inventor
陈柏霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hainan Asian Anti Counterfeiting Technology Research Institute (general Partner)
Original Assignee
Hainan Asian Anti Counterfeiting Technology Research Institute (general Partner)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hainan Asian Anti Counterfeiting Technology Research Institute (general Partner) filed Critical Hainan Asian Anti Counterfeiting Technology Research Institute (general Partner)
Publication of CN107103346A publication Critical patent/CN107103346A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Lock And Its Accessories (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a kind of clothing user big data interference acquisition method, coded lock is arranged on clothing, unlocking cipher is stored in the database on network;With smart mobile phone scanning Quick Response Code, big data acquisition system can be logged in, unlocking cipher is transferred from database, is opened and coded lock is removed, removal reuses clothing after disturbing.Big data acquisition system in the present invention, can gather storage into database, low cost, expeditiously acquisition clothing user's big data by the user profile of barcode scanning person and clothing information.

Description

Clothing user's big data interference acquisition method
Technical field
The invention belongs to goods logistic information technical field, more particularly to garment type commodity and its user's big data(With Family and consumption information)A kind of high efficiency, low cost acquisition method.
Background technology
Commodity manufacturer(Maker or seller), thirst for all the time all dreaming of knowing its each commodity, most Finally when, be sold to which user, user somewhere, how old, the user of user be man or female, The wechat number of user is how many, the phone number of user is how many, what feature is the consumption habit of user have.These users are big Data, are a kind of very commercially valuable resource and wealth in the world today of popular big data.
Background technology 1:China Patent Publication No. CN204010023U discloses one kind and " sets the bottle cap of two-dimension code label to prevent Pseudo-device ".So-and-so domestic flood icing board bottled mineral water implements the patent formula.In order to gather user's big data, water factory does not stint Pay the bonus of every bottle of 2 yuans of water, give ample rewards to barcode scanning user, to " purchase " user's big data.So-and-so domestic board is bottled white Wine also implements the patent formula.In order to gather user's big data, brewery do not stint pay every bottle of 5-8 yuans of wine bonus, Barcode scanning user is given ample rewards to, to " purchase " user's big data.So give ample rewards to, produce effects but still little, statistics display:Above-mentioned two are put down The product for there was only 13.8% is received the award by barcode scanning.As described in proverb " money isn't everything ", a huge sum of money " purchase " user's big data, It produces little effect.Trace it to its cause:Many high consumption colonies disdain the bonus of several yuans, and barcode scanning of being reluctant to condescend is received the award.However, that The high-quality user's big data collected is most thirsted for by a little high consumption community informations, exactly producer.
Background technology 2:China Patent Publication No. CN1588406A disclose it is a kind of " anti-fake method for digital compulsive inquiry and its Cipher opening device ", belongs to anti-counterfeit anti-theft technical field.It is mounted with a cipher opening device in commodity packaging, in fact Border is a coded lock, and its advantage is:By installing coded lock additional to commodity, make commodity while possessing pair of Anti-fake digital and password Protect again, with more superior anti-counterfeit anti-theft performance, it is applied to " the packaging of a variety of commodity such as cigarette, wine, tea(Rigid container)It is anti- It is pseudo- " with it is antitheft.Similar invention also has:China Patent Publication No. CN104463641A " the use based on coded lock anti-counterfeiting bottle cap " a kind of pair of coded lock anti-counterfeiting bottle cap of user data processing and analysis system " and China Patent Publication No. CN102446273A Code production method ".
It will be apparent that background technology 2 is confined to the anti-counterfeit anti-theft of the rigid package thing such as bottle cap.Its technical measures taken is: The anti-counterfeit anti-theft goods packing container that a kind of lock of manufacture is integrated with rigid package thing, the food such as cigarette, wine, tea is locked closed Hard packing case in, barcode scanning unlock be take out food unique channel.Its technical standard used is:Lock and rigid package thing It is integrated, can not steals and change, be difficult to crack, if does not unlock, user can not definitely eat the food in it.It is soft for clothing etc. For package goods, how on earth gather user's big data, background technology 1 and 2 does not provide any technology high efficiency, low cost Enlightenment.
In summary, the coded lock in background technology 1 and 2 is only the lockset on conventional meaning, and its effect is " to hinder by force Only " user opens packaging and takes out commodity.
The content of the invention
The purpose of the present invention:Gather garment type user while a kind of high efficiency, low cost is provided(Wearer)Big data it is specific Special method --- clothing user's big data interference acquisition method.The technical measures on clothing are hung using by coded lock, It is intended to disturb user to use the normal of clothing, barcode scanning, which is unlocked, simply removes chaff interference(That is coded lock)A kind of simple and direct way Footpath --- preferred approach, it is not unique channel.Its technical standard used is:Coded lock can be removed from clothing, is easy to Robber changes, is easy to crack, if user is without password, prizes/cut off lock with going back destructibility, and it is to remove chaff interference to prize/cut off lock(It is i.e. close Code lock)A kind of cumbersome approach --- it is secondary to select approach;If not removing coded lock, not removing its chaff interference, user may continue to Use(For example put on)Clothing, is only limited by lock interference, body-sensing(Including psychological feelingses)It is wrong with(Mostly be it is psychological because Caused by plain).
A kind of technical scheme of clothing user big data interference acquisition method of the present invention is as follows.
A kind of clothing user big data interference acquisition method, it is characterised in that comprise the following steps:
1. from a kind of coded lock (1), (1) coded lock is worked out code that at least one has uniqueness (2) to each;The generation Any codings with uniqueness such as (2) code can be sequence number, code of tracing to the source, prize code, logistics code;
2. (1) coded lock is hung clothing hole (3) (4) on or annulus (5) on, or (1) coded lock is clipped in clothing (3) on; Ensure not can not normally remove coded lock (1) the person that knows password;Described hole (4) can be clothing (3) on buttonhole, pinprick, gas The position of any suspended coded lock such as eye, mesh, broken hole, lacing eyelets (1);The annulus (5) can be trousers ear, clasp, suspension ring, The part of any suspended coded lock such as woven label, brace (1);
(6) 3. unlocking cipher corresponded to the database that (2) its code stores the big data acquisition system of access mobile Internet (7) (8) in;The big data acquisition system is a kind of computer information system;Such as product back-tracing platform, Antiforge inquiry platform, micro- Believe public number platform, wechat small routine platform etc.;
4. to coded lock (1) or (3) clothing prints and set the network address Quick Response Code of upper big data acquisition system (9);
5. user (10) scanned with smart mobile phone Quick Response Code (9), log in(Into)Big data acquisition system, from database (8) in transfer Unlocking cipher is (6);
6. the big data acquisition system(While user's barcode scanning logs in and transfers password)In passing by the user profile of barcode scanning person (Such as log-on message, wechat number, QQ number code, microblogging number, phone number, geographical position, barcode scanning time, barcode scanning number of times, purchase Buy usage quantity, frequency of use, whether belong to the information such as brand bean vermicelli)And code (2) corresponding clothing (3) merchandise news(Example Such as the name of an article, dealer, legal possession, falsifying whether, true and false information), in collection storage to database (8);
7. user with seen unlocking cipher (6) character open coded lock (1), remove coded lock (1), remove chaff interference after, make again With(For example put on)Clothing is (3).
It is appreciated that the clothing user big data interference acquisition method, it is characterised in that at least including one of following.
1. (2) include one in the information content of each described Quick Response Code (9) has the code of uniqueness.
2. without hole clothing (4) (3) on, (4) pinprick hole, (4) (1) coded lock is hung in pinprick hole in acupuncture On.
3. the Quick Response Code (9) in include to enter on clothing wechat public's account number access information (3) or wechat small routine Message ceases.
4. the Quick Response Code (9) in include unlocking cipher (6) where webpage link network address.
5. (3) the clothing at least includes towel, scarf, necktie, pillowcase, quilt, sheet, bedcover, shoes, socks, cap One kind in son, bag.
6. (11) (3) (1) the coded lock lock together clothing with other presents;Or, the coded lock (1) by clothing (3) (3) (11) class present locks together with other clothings.(11) the present can be various suspension members, jewelry, headwear, jewellery, handkerchief, object for appreciation Tool, accessory, another small clothes small article that (3) etc. user likes but disturbs clothing (3) normally to use.The present is (11) Promotional item, prize, souvenir etc. can be referred to as.
7. the coded lock (1) provided with screwdriver socket (12), make provision against emergencies when not opening coded lock (1), user is inserted into Screwdriver, pry open coded lock (1) remove its interference.The screwdriver is the standing instrument of family, is not difficult to find, using simple.Use screwdriver Pry open coded lock and (1) remove its interference, though a kind of cumbersome approach, its really a kind of definitely effective, indispensable candidate side Case.
8. (13) anti-shearing force is 100-700N to the hook of the coded lock (1)(Newton), make provision against emergencies and do not open coded lock (1) When, user can will be linked up with instruments such as vices and (13) be cut.The vice(Also known as cutting pliers), it is also the standing work of family Tool, is not difficult to find, using simple, and women and children and old man can use.Using vice cut off the hook of coded lock (1) (13), go Except chaff interference, though a kind of cumbersome approach, its really a kind of definitely effective, indispensable candidate scheme.
9. (1) the coded lock is a kind of padlock or clamp lock, it be fixed in the way of following closely or pressing from both sides the clothing (3) on.
Clothing of the present invention is (3)(Also known as clothes, clothes, clothing)It is the synonym of clothes and dress ornament.Broad sense is determined Justice, refers to the veil of the bodies such as trunk, four limbs, including hand(Gloves), foot(Shoes, boots, socks)With head(Cap Son)Veil and ornament;Also include hand towel, bath towel, pillow cover, scarf, necktie, pillowcase, sheet, quilt etc..
Compared with prior art, the present invention can produce following advantageous effects.
One, the present invention have abandoned lockset is installed on packing material, prevents not obtain unlocking cipher by force in background technology (6) user, open the high-leveled and difficult way that bag obtains commodity, innovated (1) coded lock is hung in packing material, clothing (3) on letter Easy technical measures.In short, the distinguishing characteristics of the two is:One lock is located on packing material, and a lock is located at the clothing in packing material Thing (3) on;One " preventing by force " user's commodity in use, " tenderness interference " user's commodity in use.In other words, in the present invention, The effect of coded lock (1) is not the purposes that conventional meaning is locked, but disturbs user to use clothing (3) as chaff interference.Cause This, (1) the coded lock in the present invention is a kind of chaff interference, is not the lockset on conventional meaning, and it does not have " preventing by force " user Open packaging and take out clothing (3).
Secondly, " tenderness interference " cost of the present invention it is low, " taking preventions by force " cost height of background technology 2.Statistics display: (1) cost is about 10 yuan/to bottle cap coded lock in background technology 2, and (1) the coded lock in the present invention is about 1 yuan/.Compared to the back of the body For scape technology 2, the acquisition cost of user's big data reduces 10 times in the present invention.The acquirement of these beneficial effects, all because of this Invention will " take preventions " and be changed to the creative technical measures of " gentle to disturb " by force.
Thirdly, statistics also show:Barcode scanning rate average out to 13.8% in background technology 1, and the barcode scanning rate average out to of the present invention 98.3%.For background technology 1, the collecting efficiency of user's big data improves more than 7 times in the present invention.
Four, (1), safe class requires very low to the coded lock that (3) normally uses of present invention interference clothing, can customized one kind it is honest and clean Valency, etc. outside, the coded lock of toy locking-type (1).Just in case user does not have band mobile phone or mobile phone not to have electric or network obstructed or do not have During network, user prizes/cut off lock, removes chaff interference with going back destructibility, it is ensured that definitely can use clothing (3).
Five, the purpose of background technology 2 " taking prevention by force " user's commodity in use, be in order to antitheft to commodity counterfeit prevention.This Invent " tenderness interference " user's commodity in use purpose, just for the sake of " lure and take " user's big data, rather than for anti-counterfeit anti-theft. Investigation display, manufacturer is unwilling that the anti-counterfeit anti-theft function of spending stiver to be commodity is checked, and is very willing to pay through the nose the big number of " lure and take " user According to.In other words, the two degree popular with users is as different as light from darkness.
Brief description of the drawings
Fig. 1 is the schematic diagram of clothing user big data interference acquisition embodiment of the method for the present invention.
Fig. 2 is the schematic diagram of shoes and lock in embodiment.
Fig. 3 is the schematic diagram of existing trousers.
Fig. 4 is a kind of schematic diagram of the lock used in embodiment.
Fig. 5 is the lock and trousers ear and the schematic diagram of present in embodiment.
Fig. 6 is a kind of big data acquisition system schematic diagram for using in embodiment.
Drawing reference numeral explanation:1- coded locks, 2- codes, 3- clothings, 4- holes, 5- annulus, 6- unlocking ciphers, 7- movements are mutual Networking (7), 8- databases, 9- Quick Response Codes, 10- smart mobile phones, 11- presents, 12- screwdrivers socket, 13- hook, 14- servers.
Embodiment
To enable the above objects, features and advantages of the present invention to become apparent, comprehensive preferred embodiment cited below particularly, and Accompanying drawing is coordinated to be described in detail.
Embodiment one.
As shown in figure 1, (1) clothing factory chooses some in advance fulfils case Simple coded lock, and the digital sequence on spray printing thereon Number as code (2).
Clothing factory arranges workman on one part part women's dress western-style clothes, i.e. the buttonhole of clothing (3) cuff --- hole (4) in, lock Upper one the coded lock got ready (1).
To it is each (1) coded lock is set a three-figure random digit as unlocking cipher (6).As shown in fig. 6, will open (6) lock cipher is corresponded to during (8) (2) its code store the database of access mobile Internet big data acquisition system (7).It is described big Data collecting system can be a kind of ready-made computer information system;Such as product back-tracing platform, Antiforge inquiry platform, wechat Public's account platform, wechat small routine platform etc..
Coded lock (1) on stick the wechat small routine Quick Response Code of clothing factory (9), wechat small routine and big data gathered are (8) the database of system connects communication.
(3) clothing is put on market again clothing factory.
Work as consumer(That is user)After buying the clothing (3), can first with smart mobile phone (10) in wechat sweep sweep it is soft Part, scanning coded lock (1) on Quick Response Code (9), open wechat small routine, input coded lock (1) on code (2), you can obtain anti- The unlocking cipher of feedback is (6).
Consumer(That is user)(6) opened using unlocking cipher coded lock (1), remove coded lock (1) after, you can normally use (Put on)The clothing sold for is (3).
Due to consumer(That is user)Quick Response Code is scanned using wechat small routine (9), consumer(That is user)Registration letter Breath is early to be reported in wechat server end.Such to sweep, the big data acquisition system of clothing factory has also just collected clothing in passing The big data information of thing (3) user.
Just in case consumer(That is user)When no band mobile phone or mobile phone do not have electric or network obstructed or do not have network, such as Fig. 4 institutes Show, user also can use screwdriver (12) devastatingly to pry open lock from screwdriver socket, to ensure that definitely clothing can be used (3).Certainly Can with vice cut latch hook (13), remove coded lock (1).
Clothing of the present invention (3) include shoes, as shown in Fig. 2 (1) coded lock can be locked in the annulus of shoes (5) on.
Trouble is added to user due to unlocking, for the user that is convinced, some presents can be given.As shown in figure 5, by present (11) (3) locked together with clothing.(11) the present can be that the users such as various suspension members, jewelry, toy, accessory like but disturbed The small article that (3) clothing normally uses.
Above disclosed is only presently preferred embodiments of the present invention, can not limit the right of the present invention with this certainly Scope, the equivalent variations made according to the claims in the present invention still fall within the scope that the present invention is covered.

Claims (2)

1. a kind of clothing user big data interference acquisition method, it is characterised in that comprise the following steps:
1. from a kind of coded lock (1), (1) coded lock is worked out code that at least one has uniqueness (2) to each;
2. (1) coded lock is hung clothing hole (3) (4) on or annulus (5) on, or (1) coded lock is clipped in clothing (3) on; Ensure not can not normally remove coded lock (1) the person that knows password;
(6) 3. unlocking cipher corresponded to the database that (2) its code stores the big data acquisition system of access mobile Internet (7) (8) in;
4. to coded lock (1) or clothing (3) print set upper database (8) network address Quick Response Code (9);
5. user (10) scanned with smart mobile phone Quick Response Code (9), log in big data acquisition system, from database (8) in transfer unlocking close Code is (6);
6. the big data acquisition system is in passing by the user profile and code of barcode scanning person (2) corresponding clothing (3) information, collection In storing database (8);
7. the user with seen unlocking cipher (6) character open coded lock (1), remove coded lock (1), remove after chaff interference, Reuse clothing (3).
2. according to clothing user's big data interference acquisition method described in claim 1, it is characterised in that at least including it is following it One:
1. (2) include one in the information content of each described Quick Response Code (9) has the code of uniqueness;
2. without hole clothing (4) (3) on, in acupuncture pinprick hole (4), (1) coded lock is locked in pinprick hole (4) on;
3. the Quick Response Code (9) in include wechat public number access information or wechat small routine access information on clothing (3);
4. the Quick Response Code (9) in include unlocking cipher (6) where webpage link network address;
5. (3) the clothing at least includes towel, scarf, necktie, pillowcase, quilt, sheet, bedcover, shoes, socks, cap, bag One kind in bag;
6. (11) (3) (1) the coded lock lock together clothing with other presents;Or, the coded lock (1) by clothing (3) with its (3) (11) class present locks together its clothing;
7. the coded lock (1) provided with screwdriver socket (12), make provision against emergencies when not opening coded lock (1), user be inserted into screwdriver, Pry open coded lock and (1) exclude its interference;
8. (13) anti-shearing force is 100-700N to the hook of the coded lock (1), is made provision against emergencies when not opening coded lock (1), Yong Huneng It is enough (13) to cut hook;
9. (1) the coded lock is a kind of padlock or clamp lock, it be fixed in the way of following closely or pressing from both sides the clothing (3) on.
CN201710354405.9A 2017-04-04 2017-05-19 Clothing user's big data interference acquisition method Pending CN107103346A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2017102157773 2017-04-04
CN201710215777 2017-04-04

Publications (1)

Publication Number Publication Date
CN107103346A true CN107103346A (en) 2017-08-29

Family

ID=59670453

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201720556692.7U Active CN206975710U (en) 2017-04-04 2017-05-19 Clothing user's big data interference acquisition system
CN201710354405.9A Pending CN107103346A (en) 2017-04-04 2017-05-19 Clothing user's big data interference acquisition method

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201720556692.7U Active CN206975710U (en) 2017-04-04 2017-05-19 Clothing user's big data interference acquisition system

Country Status (1)

Country Link
CN (2) CN206975710U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11836804B2 (en) 2019-01-27 2023-12-05 Hainan Paipaikan Information Technology Co., Ltd. Anti-fake packing method for product liability insurance

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN206975710U (en) * 2017-04-04 2018-02-06 海南亚元防伪技术研究所(普通合伙) Clothing user's big data interference acquisition system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010131967A1 (en) * 2009-05-13 2010-11-18 Christiaan Barthold Henny Device for safely securing articles of clothing and accessories
CN102542471A (en) * 2011-12-31 2012-07-04 贵州卓霖防伪科技有限公司 Product anti-counterfeiting system based on internet of things technology and anti-counterfeiting method
CN102708184A (en) * 2012-05-11 2012-10-03 贵州卓霖防伪科技有限公司 Method for inquiring anti-fake two-dimension code of coded lock
CN204453273U (en) * 2014-12-15 2015-07-08 天津中安华典数据安全科技有限公司 Internet of Things anti-fake bottle lid
CN104787468A (en) * 2015-04-20 2015-07-22 王化友 Packing box and logistics method
CN105260892A (en) * 2015-09-10 2016-01-20 上海乔马电子科技有限公司 Anti-counterfeiting verification and sales information obtaining method and anti-counterfeiting verification and sales information obtaining system
CN205837528U (en) * 2016-06-20 2016-12-28 开乐开(北京)防伪科技有限公司 A kind of Anti-fake coded lock being obtained unlocking cipher by scanning Quick Response Code
CN205983615U (en) * 2016-08-16 2017-02-22 中山市小榄镇快车电脑服务有限公司 Box that can intelligently unblank
CN206975710U (en) * 2017-04-04 2018-02-06 海南亚元防伪技术研究所(普通合伙) Clothing user's big data interference acquisition system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010131967A1 (en) * 2009-05-13 2010-11-18 Christiaan Barthold Henny Device for safely securing articles of clothing and accessories
CN102542471A (en) * 2011-12-31 2012-07-04 贵州卓霖防伪科技有限公司 Product anti-counterfeiting system based on internet of things technology and anti-counterfeiting method
CN102708184A (en) * 2012-05-11 2012-10-03 贵州卓霖防伪科技有限公司 Method for inquiring anti-fake two-dimension code of coded lock
CN204453273U (en) * 2014-12-15 2015-07-08 天津中安华典数据安全科技有限公司 Internet of Things anti-fake bottle lid
CN104787468A (en) * 2015-04-20 2015-07-22 王化友 Packing box and logistics method
CN105260892A (en) * 2015-09-10 2016-01-20 上海乔马电子科技有限公司 Anti-counterfeiting verification and sales information obtaining method and anti-counterfeiting verification and sales information obtaining system
CN205837528U (en) * 2016-06-20 2016-12-28 开乐开(北京)防伪科技有限公司 A kind of Anti-fake coded lock being obtained unlocking cipher by scanning Quick Response Code
CN205983615U (en) * 2016-08-16 2017-02-22 中山市小榄镇快车电脑服务有限公司 Box that can intelligently unblank
CN206975710U (en) * 2017-04-04 2018-02-06 海南亚元防伪技术研究所(普通合伙) Clothing user's big data interference acquisition system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11836804B2 (en) 2019-01-27 2023-12-05 Hainan Paipaikan Information Technology Co., Ltd. Anti-fake packing method for product liability insurance

Also Published As

Publication number Publication date
CN206975710U (en) 2018-02-06

Similar Documents

Publication Publication Date Title
CN103139204A (en) Network identifying code method and system
CN103729770B (en) A kind of anti-fake traceability system and its method
JP7489921B2 (en) Apparatus and method for generating image/text-based designs
CN104408076B (en) Retrieve accessory system, search assisting method and retrieval auxiliary program
Jackson Commercial cultures: transcending the cultural and the economic
CN106446866B (en) A kind of false-proof texture recognition methods
CN102054183B (en) Product anti-counterfeiting system and method based on wireless radio frequency identification and digital watermarks
CN106649383A (en) Clothes management method and system
CN206975710U (en) Clothing user's big data interference acquisition system
US10201939B1 (en) Product authenticity verification system
CN202771478U (en) Try-on system
CN106991189A (en) A kind of wardrobe control method, device and wardrobe
CN206193926U (en) Quality of agricultural products traces back inquiry system
CN203520422U (en) Multifunctional anti-counterfeiting security code
Toplis The Hidden History of the Smock Frock
CN107145924A (en) The damaged Quick Response Code enhancing of skilful use is false proof
US20140180869A1 (en) Integrated business attire jacket and sports jersey and system for processing online orders of the same
CN108256300A (en) A kind of cipher set-up method, device and computer readable storage medium
CN107622399A (en) A kind of imported article based on block chain technology is false proof and traceability system
KR101423658B1 (en) Pattern recognition system and method
Hinks A structural and functional analysis of eighteenth century buttons
CN1122623C (en) Establishing method of counterfeit action preventing system and four-hierarchy trap-cipher lock type commodity packing
CN211944595U (en) Novel intelligent anti-counterfeiting cigarette case
JP2011132674A (en) Device and method of locking control for vehicle
CN2533084Y (en) Internal printed packaging box or bag using digit for access to networks so as to have antiforging function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: 570125 Jiudu Building, 38 Guomao Road, Longhua District, Haikou City, Hainan Province, 26D

Applicant after: Hainan Yayuan anti counterfeiting technology Research Institute (L.P.)

Address before: 570125 Jiudu Building, 38 Guomao Road, Longhua District, Haikou City, Hainan Province, 26D

Applicant before: HAINAN YAYUAN ANTI COUNTERFEITING TECHNOLOGY Research Institute (GENERAL PARTNERSHIP)

Country or region before: China

CB02 Change of applicant information