CN108875866A - A kind of two dimensional code article identity dicode identification method - Google Patents

A kind of two dimensional code article identity dicode identification method Download PDF

Info

Publication number
CN108875866A
CN108875866A CN201810702799.7A CN201810702799A CN108875866A CN 108875866 A CN108875866 A CN 108875866A CN 201810702799 A CN201810702799 A CN 201810702799A CN 108875866 A CN108875866 A CN 108875866A
Authority
CN
China
Prior art keywords
code
primary key
user
dimensional code
article
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810702799.7A
Other languages
Chinese (zh)
Inventor
邵洪贵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Lang Jin Anti-Counterfeit Technology Co Ltd
Original Assignee
Hefei Lang Jin Anti-Counterfeit Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Lang Jin Anti-Counterfeit Technology Co Ltd filed Critical Hefei Lang Jin Anti-Counterfeit Technology Co Ltd
Priority to CN201810702799.7A priority Critical patent/CN108875866A/en
Publication of CN108875866A publication Critical patent/CN108875866A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

The invention discloses a kind of two dimensional code article identity dicode identification method, this method is used as auxiliary code using two dimensional code as primary key, by number or letter, and the two, which combines, is identified the uniqueness of article.This dicode identification method can use two dimensional code identification software and quickly identify two dimensional code corresponding to primary key, can then open coating if necessary to carry out Antiforge inquiry and integration managing, further input auxiliary code.Since the length of auxiliary code is shorter, input process very simple, therefore this method has good applicability, and can be realized simultaneously the multi-functional including product false proof, anti-channel conflict, logistics management, trace to the source tracking and integration managing.

Description

A kind of two dimensional code article identity dicode identification method
Technical field
The invention belongs to anti-counterfeit and counterfeit distinguishing technical field more particularly to a kind of two dimensional code article identity dicode identification methods.
Background technique
Currently, counterfeit goods has become global public hazards.The whole world is every year because economic loss is not caused by counterfeit goods Under hundreds billion of dollars.Therefore, national governments, enterprise are all carrying out the anti-fake work for having underlying commodity using effective measure.Such as I State is from October, 2010 in March, 2011, and in the whole nation, concentration has carried out strike piracy of intellectual property rights and made and sold fake and forged quotient The further sprawling of fake and inferior commodities has effectively been contained in the special campaigns of product.
So-called " As viocerises one foot, virtues rise toil ", for more and more rampant commodity counterfeit behavior, related anti-counterfeiting technology Among being evolving.Traditional antifalsification label mainly uses the modes such as laser hologram, color-change ink, masking label.This side Uniqueness is not present in the label that formula generates, and identification process depends on the recognition capability and special equipment of user in addition, commonly disappears The person of expense is difficult to use.Currently used code anti-fake is using means of communication such as short message, phone, networks, by making a phone call Or the modes such as online input code realize the inquiry of commodity true and false.Although ordinary consumer is easy to using due to input Number it is more, operation is more troublesome, and user uses enthusiastic not high.
With being widely used for intelligent terminal, the two dimensional code identification software being mounted on intelligent terminal is also become increasingly popular.Have People proposes the solution that commodity counterfeit prevention is carried out using two dimensional code.Specifically, plus all or part of on two dimensional code Coating, user open coating, two dimensional code are identified by the two dimensional code identification software installed on intelligent terminal, then by data It is submitted to the true and false that background data base removes verifying commodity.Such as application No. is 200810115748.0 Chinese invention patents In application, a kind of two-dimensional code anti-counterfeiting label and forming method thereof of part covering is proposed.The two-dimensional code anti-counterfeiting label includes: Bottom, the bottom include the two dimensional code that can be read optically;And removable surface coating, it is described removable Surface coating covers the area of the two dimensional code, thus in the removable surface coating not by least partly Before removal, the identifiable two dimensional code of optical mode cannot be read optically.
Although code anti-fake and two-dimension code anti-counterfeit are technically more advanced than traditional antiforge laser holographic etc..But this two It is anti-fake that kind mode all uses coating covering to carry out.User is not able to verify that the true and false before purchase, after only destroying packaging after point of purchase Just it is able to verify that the true and false.For the buyer of gift, since packaging cannot be destroyed after point of purchase, gift still can not be differentiated The true and false.In addition, being later discovered that this code was queried, trade company may not recognize this if user does not inquire immediately after point of purchase Code is queried, to cause dispute.So current code anti-fake and two-dimension code anti-counterfeit is only suitable for after commodity purchasing immediately The true and false is checked, there are significant limitations for antiforge function.
In logistics field, traditional article mark method mainly passes through single digital alphabet, bar code or two dimensional code An article is identified, to realize the management and inquiry to article.Currently, object can be solved simultaneously there is an urgent need to a kind of in the market The integrated article mark methods such as product are anti-fake, anti-channel conflict, logistics management and integral marketing.Here technological difficulties are to prevent Pseudo-code is connected with background data base, needs to guarantee only once to inquire effectively in such a way that coating covers, and anti-channel conflict and object Inquiry code used in flow management is plain code, cannot be covered using coating, so that each logistics post and inspection point can be looked at any time It askes.In this way, in order to realize anti-fake and anti-channel conflict simultaneously, it usually needs use two sets of coded systems, increase answering for production technology Miscellaneous degree and production cost.In the Chinese invention patent application application No. is 201010101642.2, a kind of genuine piece is disclosed Method for anti-counterfeit, this method be used for two dimensional code labeling carry out anti-counterfeit package article.It is using labeling two dimensional code as first Identification code, is additionally provided with second identification code in article body, and the second identification code is identical as first identifier code.The technical side Case is adhered on article body surface on the basis of carrying out anti-fake with the labeling with two dimensional code by laser coding device Two dimensional code makes article have effects that double anti-forge, effectively avoids the generation of personation with string goods phenomenon.
Summary of the invention
Technical problem to be solved by the present invention lies in providing, a kind of two dimensional code article identity dicode identification method is (referred to as double Code identification method), this method is used as auxiliary code using two dimensional code as primary key, by number or letter, and the two combines to article Uniqueness is identified.
To realize that above-mentioned goal of the invention, the present invention use following technical solutions:
A kind of two dimensional code article identity dicode identification method, includes the following steps:
For each article, identity is carried out using primary key mode associated with auxiliary code;
The primary key is indicated in a manner of two dimensional code, in open state;The auxiliary code is being in hidden state using preceding;
The interrelational form of the primary key and the auxiliary code is:Correspondence unidirectionally and is uniquely parsed by the data content of primary key The data content of auxiliary code.
Wherein more preferably, the data content of the primary key is any of 16 or more numbers, letter or other characters Combination.
Wherein more preferably, the auxiliary code is made of 2~8 bit digitals or letter.
Wherein more preferably, the hidden state is that coating covers or be enclosed in package interior.
When being used for product false proof occasion, user uses the intelligent terminal with two dimensional code identification software to generate primary key Two dimensional code take pictures;The primary key data content that will identify that is sent to background server and is verified;If this primary key is not It was queried, then the article is to verify for the first time, further prompts the user whether to need to input auxiliary code verifying, if user is not defeated Enter, terminate, if user inputs auxiliary code and is proved to be successful, otherwise it is counterfeit merchandise which, which is genuine piece,.
When being used for product false proof occasion, if primary key and auxiliary code be all queried, and auxiliary code to be checked is still located In hidden state, then judge that the article is counterfeit merchandise.
When being used for product false proof occasion, after user inquires primary key and auxiliary code for the first time, intelligence of the background server to user Terminal sends protection password;Buy later the article user inquire primary key again after, prompt the user input protection password; If success cannot be inputted, judge that the article is counterfeit merchandise.
When being used for integration managing occasion, user uses the intelligent terminal with two dimensional code identification software to generate primary key Two dimensional code take pictures;The primary key data content that will identify that is sent to background server and is verified;Background server mentions Show that user inputs auxiliary code;User inputs auxiliary code and is sent to background server;After background server verifies auxiliary code success, prompt User integral success;If the auxiliary code had been queried, it is unsuccessful to prompt the user with integral.
When for article uniqueness certification occasion, user uses the intelligent terminal with two dimensional code identification software to master The two dimensional code that code generates is taken pictures;The primary key data content that will identify that is sent to background server and is verified;Backstage takes Business device prompt user inputs auxiliary code;User inputs auxiliary code and is sent to background server;After background server verifies auxiliary code success, Prompt this article of user is genuine piece, and requires user to input personally identifiable information and authenticate;Background server, which receives, to be recognized Protection password is generated after demonstrate,proving information, and protection password is sent on the intelligent terminal of user;Inquiring and authenticating is excessively true after user After pseudo- article, further input protection password confirms that the article is genuine piece if protection Password Input is correct;If protected Shield Password Input is incorrect, then the article may be counterfeit merchandise.
Compared with prior art, dicode identification method provided by the present invention has the following advantages that:
1. the identification code of multiple simple functions realizes unified management by dicode method, simplify production technology and production cost;
2. using dicode identification means, the Antiforge inquiry before commodity purchasing may be implemented, the user integral after purchase uses letter Just;
3. using dicode identification means, counterfeiter's batch duplicating anti-counterfeiting mark code can be effectively prevented, increase what counterfeiter faked Risk;
4. using dicode identification means, product false proof and integration managing can be realized simultaneously, user is anti-fake to be looked into greatly promote The enthusiasm of inquiry.
Detailed description of the invention
The present invention is described in further detail with reference to the accompanying drawings and detailed description.
Fig. 1 is the encoding examples figure of primary key and auxiliary code used in the present invention;
Fig. 2 is in the present invention, and coating covers the implementation diagram of auxiliary code mode;
Fig. 3 is to pack the implementation diagram of interior hiding auxiliary code mode in the present invention;
Fig. 4 be the present invention be applied to product false proof occasion when, auxiliary code be not queried in the case of operational flowchart;
Fig. 5 be the present invention be applied to product false proof occasion when, auxiliary code be queried in the case of operational flowchart;
Fig. 6 be the present invention be applied to integration managing occasion when, auxiliary code be not queried in the case of operational flowchart;
Fig. 7 be the present invention be applied to integration managing occasion when, auxiliary code be queried in the case of operational flowchart;
Fig. 8 be the present invention be applied to article uniqueness authenticate occasion when, auxiliary code be not queried in the case of operational flowchart;
Fig. 9 be the present invention be applied to article uniqueness authenticate occasion when, auxiliary code be queried in the case of operational flowchart.
Specific embodiment
It is preceding to have addressed, use single coding mainly to have the disadvantage that as anti-counterfeiting mark:(1) cannot realize simultaneously it is anti-fake, Logistics management and anti-channel conflict;(2) anti-counterfeiting mark of seal coat cannot buy preceding true-false inquiring in user, application No. is Although 201010101642.2 Chinese invention patent application has used two kinds of identification codes, but due to second identification code and first Identification code is identical, and using effect and single coding have no difference substantially.
For the multiple demand of article anti-counterfeit, anti-channel conflict, logistics management etc., the invention proposes a kind of two dimensional code objects Product identity dicode identification method carries out article identity using primary key mode associated with auxiliary code in the dicode identification method Mark.Each article has associated two codes in lane database, and one is primary key, and one is auxiliary code.It is shown in Figure 1, The data content of primary key is any combination of number, letter or other characters, but needs to indicate using two dimensional code;Auxiliary code Directly indicated using string number (or letter).Primary key and auxiliary code are interrelated, can uniquely parse auxiliary code by primary key (such as auxiliary code can directly obtain auxiliary code after then parsing primary key data content using the data content of specific position in primary key Content), it is then untenable in turn.On the other hand, primary key is in open state always, optically can directly read It takes;Auxiliary code is being in hidden state using preceding.Hiding can be coating covering, be also possible to be enclosed in package interior. Before user buys article, this auxiliary code cannot see that;After user buys article, this can just be seen by opening coating or opening packaging Auxiliary code.
In the different embodiments of this dicode identification method, which can be used existing any standard two-dimensional code, Such as QR code, DM code, PDF417 etc..The data length of primary key should be at 16 or more.Since two dimensional code identification does not need craft Input, the longer safety of data length is higher in principle.In addition, in order to further improve the safety of primary key, it can be to primary key Data content be encrypted.Auxiliary code needs to be manually entered by user in this dicode identification method, therefore its data Length is unsuitable too long, and being made of 2~8 bit digitals or letter can.
In the embodiment shown in fig. 1, primary key is 20 bit digitals, and auxiliary code is 5 bit digitals.Software is generated using two dimensional code Primary key is compiled into two dimensional code, auxiliary code is arranged in the lower section of two dimensional code, is covered with coating above, carries out true and false identification in user Or use is opened when logistic track.Here the adjacent area in article surface can be set in dicode mark, can also be not provided with In adjacent area, such as primary key is outside packaging, auxiliary code portion etc. within a package.
Since primary key uses exposed two dimensional code, user passes through the two dimensional code on intelligent terminal before buying article Identification software take pictures two dimensional code may be implemented article genuine-fake inquiry.If user takes pictures in its outer packing after buying certain article Two dimensional code after two dimensional code identification software identifies primary key, is connected with background server by network and shows auxiliary code input frame, User continues input auxiliary code and verifies, so that it may ensure the true and false of article.In the process, if counterfeiter with one There are primary key and the auxiliary code progress article of article counterfeit, as long as user query cross a primary key and auxiliary code, user pass through two dimension of taking pictures When code inquires same primary key again, background server can prompt the corresponding auxiliary code of this primary key of user to be queried, but such as The article that fruit user is inquiring is new product, and auxiliary code is not opened, and user can affirm that this article is counterfeit merchandise.This Sample, user just can determine that the true and false of article before purchase, thus be very easy to find counterfeit article.In addition, in this way When user need the number that inputs or letter seldom, operate very simple, the participation enthusiasm of user will necessarily be excited.
Fig. 2 and Fig. 3 respectively illustrates two kinds of common auxiliary code hidings:Coating covers hidden in auxiliary code mode and packaging Hide auxiliary code mode.In coating covering auxiliary code mode shown in Fig. 2, auxiliary code surface is covered by way of covering coating, User, which only opens coating just, can know the particular content of auxiliary code.This mode is suitable for production with anti-fake or integrating function Label.The label is attached on article surface, the primary key on label can be used for logistics management and anti-channel conflict.Shown in Fig. 3 Packaging in hide auxiliary code mode be suitable in production link it is online endowed.It is online endowed to be usually not easily accomplished coating and cover Lid, therefore auxiliary code is hidden using manner of packing.As shown in Fig. 3, auxiliary code is hidden in inner packing by manner of packing, product The primary key of quick response code form is printed in outer packing.In this way, user, which does not need opening product packaging, is obtained with primary key, but Auxiliary code must be obtained by opening inner packing.
The characteristics of according to production link, dicode identification method provided by the present invention can use following several endowed sides Formula.
One, automatically forms the incidence relation of primary key and auxiliary code in the database, when making label, exports from database Associated primary key and auxiliary code data, make outgoing label by label scheme.
Two, generate primary key and auxiliary code on price labeling, according to scheduled algorithm in real time, and print corresponding label.It is logical Network or other modes are crossed, the data base management system of tag data transmission to background server, and are stored.
Three, first generate primary key, and the corresponding two dimensional code of primary key is printed on article surface, lead to when packing article in the production line It crosses two dimensional code reading equipment and parses primary key, to automatically generate auxiliary code.In turn, auxiliary code is printed upon to the inside of article packaging. Primary key and auxiliary code data are transferred to the data base management system of background server by network or other modes, and stored Come.
This dicode identification method realizes the mark of article identity uniqueness by primary key and the associated mode of auxiliary code, can be with The multi-functional including product false proof, anti-channel conflict, logistics management, trace to the source tracking and integration managing is realized simultaneously.Lead to below It crosses and is specifically illustrated one by one using example.
Using example one:Product false proof
Currently, the two dimensional code identification software being mounted on intelligent terminal becomes increasingly popular.It is proposed that being produced using two dimensional code The anti-fake technical thought of product, but widespread practice is that all or part of coating is covered on two dimensional code, and user opens coating Afterwards, two dimensional code is identified by the two dimensional code identification software on intelligent terminal, and data is submitted to background data base and remove verifying object The true and false of product.This simple two-dimension code anti-counterfeit mode can not solve the problems, such as that user buys the Antiforge inquiry before commodity, therefore User's is not high using enthusiasm.
In dicode identification method provided by the present invention, user can know the true and false of product before purchase, buy After can also carry out auxiliary code verifying.Concrete operations process is as follows:
(1) two dimensional code that user uses the intelligent terminal with two dimensional code identification software to generate primary key is taken pictures;
(2) the primary key data content that will identify that is sent to background server by wire/radio network and is verified;
(3) if this primary key is unauthenticated, prompting this article of user is to verify for the first time, is genuine piece, further prompts the user whether It needs to input auxiliary code verifying, terminates if not inputting, if input auxiliary code, whether further prompt is proved to be successful;
(4) if auxiliary code is proved to be successful, it is otherwise counterfeit merchandise that prompting this article, which is genuine piece (shown in Figure 4),;
(5) if primary key and auxiliary code be all queried, the primary key of this article of user and auxiliary code is prompted to be queried, such as Fruit auxiliary code to be checked at this time is not lifted, then this article is counterfeit merchandise, and user should not buy (shown in Figure 5).
Except aforesaid operations process, after user inquires the primary key and auxiliary code of article for the first time, user's input handset can be allowed Number or mail address, background server to user intelligent terminal send protection password.Buying the user of this article again Prompt user inputs protection password after identifying primary key, after inputting successfully, is verified.If there is counterfeiter is intended to pass through duplication The mode of primary key and auxiliary code realize it is counterfeit, as long as then there is a user query to cross primary key and auxiliary code, the user one bought later I.e. prompt input protection password is inquired, user just readily appreciates that this article is counterfeit merchandise at this time, to guarantee that user exists It can distinguish true from false before purchase, protect the interests of producer and consumer.
Using example two:Integration managing
In order to motivate consumer to carry out Antiforge inquiry, the Antiforge inquiry of auxiliary code and integration managing can be combined, make user Total mark of consumption can be obtained when carrying out Antiforge inquiry, to greatly promote the inquiry enthusiasm of consumer.
The operating process of integration managing is as follows:
(1) two dimensional code that user uses the intelligent terminal with two dimensional code identification software to generate primary key is taken pictures;
(2) the primary key data content that will identify that is sent to background server by wire/radio network and is verified;
(3) background server returns to the operation pages for having auxiliary code input frame, and user is prompted to input auxiliary code;
(4) user inputs auxiliary code, after clicking confirmation, transmits data to background server;
(5) after the success of background server verifying auxiliary code, user integral success is prompted, and inform the current integral of user (referring to figure Shown in 6);If the auxiliary code had been queried, prompts the user with the corresponding integral of this auxiliary code and used (referring to Fig. 7 It is shown), it cannot be integrated again.If user query is new product at this time, illustrate that this article is counterfeit merchandise.
Above-mentioned integration managing measure can not only combine with product false proof, operationally also than in the prior art Need to input more than ten bit digitals or alphabetical easy too much.
Using example three:The certification of article uniqueness
With the development of national economy, demand of the user to collectibles is more and more.One important feature of collectibles is that It is necessary to ensure that the uniqueness of article, this uniqueness are the key points of collectibles value preserving and appreciation.User wishes to readily identify The true and false of collectibles, producer also wish that the collectibles of itself are not counterfeit.Dicode identification method provided by the present invention has very Good article uniqueness authentication function can be applied to the true and false certification of collectibles.Concrete operations process is as shown in fig. 7, packet Include following steps:
(1) two dimensional code that user uses the intelligent terminal with two dimensional code identification software to generate primary key is taken pictures;
(2) the primary key data content that will identify that is sent to background server by wire/radio network and is verified;
(3) background server returns to the operation pages for having auxiliary code input frame, and user is prompted to input auxiliary code;
(4) user inputs auxiliary code, after clicking confirmation, transmits data to background server;
(5) after the success of background server verifying auxiliary code, prompt this collectibles of user are genuine piece, and provide the user with an input The input frame of subscriber identity information;
(6) user inputs identity card and phone number information in input frame, after clicking confirmation, transmits data to backstage and takes Business device is authenticated;
(7) after background server receives authentication information, a protection password is generated, and protection password is sent to user's On intelligent terminal;
(8) after inquiring and authenticating crosses the article of the true and false after user, user is prompted to input protection password.As shown in figure 9, if protecting It is correct to protect Password Input, then confirms that this collectibles is genuine piece;If protecting Password Input incorrect, this collection of user is prompted Product may be counterfeit merchandise.
It, can be with identity card if the protection password loss or forgetting of user in above-mentioned article uniqueness verification process It makes up.
In general, dicode identification method provided by the present invention can use two dimensional code identification software and quickly identify master Two dimensional code corresponding to code can then open coating if necessary to carry out Antiforge inquiry and integration managing, further input auxiliary code. Since the length of auxiliary code is shorter, input process very simple, therefore this method has good applicability, and can be real simultaneously The now multi-functional including product false proof, anti-channel conflict, logistics management, trace to the source tracking and integration managing.
A kind of two dimensional code article identity dicode identification method provided by the present invention is described in detail above.It is right For those skilled in the art, it is done under the premise of without departing substantially from true spirit any obvious Change, the infringement for all weighing composition to the invention patent, will undertake corresponding legal liabilities.

Claims (1)

1. a kind of two dimensional code article identity dicode identification method, it is characterised in that include the following steps:For each article, adopt Identity is carried out with primary key mode associated with auxiliary code;The primary key is indicated in a manner of two dimensional code, in open state;Institute It states auxiliary code and is being in hidden state using preceding;The interrelational form of the primary key and the auxiliary code is:Pass through the data content of primary key Unidirectionally and uniquely parse the data content of corresponding auxiliary code.
CN201810702799.7A 2018-06-30 2018-06-30 A kind of two dimensional code article identity dicode identification method Withdrawn CN108875866A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810702799.7A CN108875866A (en) 2018-06-30 2018-06-30 A kind of two dimensional code article identity dicode identification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810702799.7A CN108875866A (en) 2018-06-30 2018-06-30 A kind of two dimensional code article identity dicode identification method

Publications (1)

Publication Number Publication Date
CN108875866A true CN108875866A (en) 2018-11-23

Family

ID=64297706

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810702799.7A Withdrawn CN108875866A (en) 2018-06-30 2018-06-30 A kind of two dimensional code article identity dicode identification method

Country Status (1)

Country Link
CN (1) CN108875866A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113657566A (en) * 2021-08-18 2021-11-16 杭州中粮包装有限公司 Metal cover coding method and device
CN113682641A (en) * 2021-08-18 2021-11-23 杭州中粮包装有限公司 Two-dimensional code anti-theft metal cover, preparation method and two-dimensional code anti-theft tank

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113657566A (en) * 2021-08-18 2021-11-16 杭州中粮包装有限公司 Metal cover coding method and device
CN113682641A (en) * 2021-08-18 2021-11-23 杭州中粮包装有限公司 Two-dimensional code anti-theft metal cover, preparation method and two-dimensional code anti-theft tank
CN113657566B (en) * 2021-08-18 2024-01-26 杭州中粮包装有限公司 Method and device for coding metal cover

Similar Documents

Publication Publication Date Title
CN102663592B (en) Article identity dicode identification method based on Quick Response Code
CN102163291B (en) Laser marking multi-encrypted two-dimensional code fingerprint anti-counterfeit authentication method and system
US8245927B2 (en) Method and system for deterring product counterfeiting, diversion and piracy
US7996319B2 (en) Authentication and tracking system
US8421593B2 (en) Apparatus, systems and methods for authentication of objects having multiple components
CN109146024A (en) Art work Anti-fake electronic label System and method for based on block chain
CN103189891A (en) Product authentication method
CN101882277A (en) Wine anti-counterfeit method and system thereof
CN104217241A (en) Electronic anti-fake label and realizing method
CN101877095A (en) Product anti-counterfeit method based on QR codes, short messages and internet
CN102663590A (en) System and method of commodity anti-counterfeiting authentication based on restriction of authentication frequency
CN101853605A (en) Researchable commodity marker, anti-counterfeiting label and anti-counterfeiting method thereof
RU2199781C1 (en) Method for branding commodity, or part, or structure for its identification (alternatives) and system for identifying commodity, of part, or structure branded by this method (alternatives)
CN108629603B (en) Commodity anti-counterfeiting method based on two-dimensional code
CN108875866A (en) A kind of two dimensional code article identity dicode identification method
US20130317996A1 (en) Systems and Methods for Tracking Status of Random Unique Code Strings and Generation of Random Unique Code Strings
US20130024387A1 (en) Systems and Methods for Tracking Assigned Code Strings
KR101527582B1 (en) System for verifying product genuineness using double security key and method thereof
CN106815614A (en) A kind of bank acceptance Antiforge system of use NFC anti-counterfeiting technologies
CN1387156A (en) Antiforge combined encode method
CN107483427A (en) A kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips
CN111951032A (en) Third-party article anti-counterfeiting authentication method
CN201662818U (en) Anti-fake certification device with laser-marking and multi-encrypting two-dimensional code fingerprint
Hoffman et al. Securing number plates based on digital signatures and RFID
JP2002117165A (en) Brand mark and commodity collation system using the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20181123