CN1333625A - Network code based commodity anti-counterfeit system - Google Patents
Network code based commodity anti-counterfeit system Download PDFInfo
- Publication number
- CN1333625A CN1333625A CN 01128766 CN01128766A CN1333625A CN 1333625 A CN1333625 A CN 1333625A CN 01128766 CN01128766 CN 01128766 CN 01128766 A CN01128766 A CN 01128766A CN 1333625 A CN1333625 A CN 1333625A
- Authority
- CN
- China
- Prior art keywords
- char
- sign indicating
- indicating number
- function
- inquiry
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention discloses a web code based commodity antifalse system, and is characterized by that it uses the interconnection of web inquiry server, telephone inquiry server, data server and exchange as inquiry support hardware platform, in said system modular structure is used, all the components are interconnected by means of intefaces, also can be communicated with INTERNET by means of flame-proof wall, also can be communicated with communiation web by means of telephone line. The length of web code is 20 bits, and the available quantity of web codes of every enterprise having access to the network is 1X10 to the power 16. Said invention utilizes data base to make management, the web code can be formed by adopting encryption method, so it is stable and reliable, it adopts middleware as encryption and decryption key component, and possesses standard program interface and protocol, can implement data sharing and application interoperation, so it possesses strong communication capacity and good expandability.
Description
One, technical field
The present invention relates to a kind of Comodity anti-fake system, relate to cryptography, cti (telecommunications and computer are integrated), middleware, fields such as Database Systems, specifically a kind of Comodity anti-fake system based on the net sign indicating number.
Two, background technology
Present existing anti-counterfeiting technology has: laser labeling, fluorescent ink, temperature sensitive ink, cryptomorphic marker etc.These technology all belong to first generation anti-counterfeiting technology, have following shortcoming:
1 utilizes certain particular technology or material that anti-counterfeiting information is fabricated on the anti-fake identification mark, and the anti-counterfeiting information of every class marker is all identical, and anti-fake identification mark and commodity do not have one-to-one relationship.
As long as the 2 anti-counterfeiting mark samples that collect, perhaps obtaining manufacturing equipment, technology and material can copy in batches.
3 will accurately identify the true and false of anti-counterfeiting mark, need professional's instrument, and ordinary consumer is difficult to differentiate.
Second generation anti-counterfeiting technology adopts with the means of computer in conjunction with network technology (identity code recognition technology (and common code anti-fake)), as Chinese patent 98112924.2 " computor network goods anti-fake system ", Chinese patent 99125163.6 " antiforge method for commodities and Comodity anti-fake system " etc., its technological means mostly is to utilize the product supplier product root sign indicating number (identity code) of computer for manufacturing enterprise, obtain the commodity subcode by encryption, and invest on the commodity by carrier, link up (Help by Phone identity code) according to the commodity of being bought by information medium and manufacturing enterprise by the consumer, distinguish the true and false of the commodity of buying.Because the commodity difference that each enterprise produced provides the sign indicating number of commodity also different, makes the consumer be difficult to distinguish, simultaneously, the antifalse effect of these irregular codings is poor, and is also dangerous.This false proof following shortcoming that exists: the Antiforge inquiry means are single, and the inquiry phone is costly, brings a large amount of inconveniences to the consumer.
Three, summary of the invention
According to the defective that above-mentioned prior art partly exists, the purpose of this invention is to provide a kind of safe, be convenient to inquire about, use the Comodity anti-fake system based on the net sign indicating number reliable, advanced technology.
The technical solution used in the present invention is: this system adopts modular construction, and interface is interconnected between the parts, comprises
A web querying server 1, web querying server 1 is provided with fire compartment wall 2, is communicated with INTERNET by fire compartment wall 2;
A directory assistance device 3, directory assistance device 3 is communicated with communication network by telephone wire 4;
A switch 5;
A data server 6;
Be characterized in:
Web querying server 1, directory assistance device 3, data server 6 and switch 5 interconnection are as inquiry support hardware platform.
The net code length is 20;
Adopt middleware as encrypting, decipher core members;
Adopt ISAPIQuery Components as the kernel software of supporting the WEB Antiforge inquiry;
Employing operates in program on the unified message platform as the kernel software of supporting telephone Antiforge inquiry.
Middleware, be on computer hardware and operating system, support the software of application and development and operation, it can make application system be relatively independent of computer hardware and operating system platform, routine interface and agreement with standard, can realize the data sharing on different hardware and the operating system platform and use interoperability, be a distributed software Governance framework with the API definition, has powerful communication capacity and good extensibility.
Middleware has encapsulated following power function:
(1) the true and false built-in function of checking net sign indicating number;
(2) the true and false checking built-in function of net sign indicating number of support cti platform;
(3) criticize the encryption library function;
(4) effective original text encryption library function;
(5) decrypt ciphertext built-in function.
Other characteristics of the present invention are: encryption is that the product code coding that 14 pure digi-tal are formed is encrypted as the security code that 20 cardinar number word strings constitute, and described deciphering is that the security code deciphering that 20 cardinar number word strings are constituted is 14 cardinar number word strings.
The true and false built-in function form of checking net sign indicating number is:
Interface is described:
Functional form: char
*Query
Parameter is: char strPswordID, char sServerName, char sDBName, char
*SUserID, char
*SPasswwrd, char
*SFilePaths
Behind checking, the poll-final, Query Result is returned:
If successful inquiring, then return results is 26 valid strings, and the form of the composition is as follows:
Preceding 4 is Query Result, and form is: XXXX, and wherein the codomain of XXXX is: 0000--9999, the security code of the 4th 0 expression input in 0000 does not exist, and promptly number of times is that 0,0004 expression was inquired about 4 times, and the like, inquiry times are 9999 times at most;
From the 5th to the 12nd is query time, if the form of time is that " year, month, day " is as 20000713; 14 of backs are the pairing plaintext of net sign indicating number;
Otherwise return following information character string:
The path of " 3 " expression file not found, at this moment, the value of SinOutParam is FileNoFound12345678900987654321;
20 of the false proof number deficiencies of " 2 " expression input, sInOutParam is the former value of importing into;
The anti-counterfeit number code length of " 1 " expression input has surpassed 20, and sInOutParam is the former value of importing into;
" 0 " expression number storehouse abnormal information is provided with mistake as the data library information;
Support the true and false checking built-in function of the net sign indicating number form of cti platform to be:
Interface is described:
Functional form: extern " C " UINTPASCAL EXPORT ScePUERY
Parameter is: LPVOIDpNoUse, char
*SInOutParam;
After execution has been inquired about, if successful inquiring will be inserted sInOutParam to the result of inquiry again;
Inquiry return results and sInOutParam value type information are as follows:
-3: expression can not find the path of ciphertext part, and at this moment, the value of sInOutParam is FileNoFound12345678900987654321;
-2: 20 of the false proof number deficiencies of expression input, sInOutParam be former import into value;
-1: the anti-counterfeit number code length of expression input has surpassed 20, and sInOutParam is the former value of importing into;
0: expression database abnormal information,, as the data library information mistake is set;
1: the expression Query Result is legal;
Criticizing the encryption library functional form is:
Interface is described:
Functional form: extern " C " char
*_ stdcall BatchEncryption
Parameter is: char
*SBatchID, char
*SStartID, char
*SEndID, intnBatchcount, char
*SFileLocation
NBatchCount: correspondence is opened the encryption batch of this goods number and lot number, valid value range 1, and----9999, promptly similar commodity can be encrypted at most 9999 times;
SFileLocation: the path of batch encrypt file.
SStartID, sStartID, sEndID is CHAR, and not enough specific figure place is all by abnormality processing and provide abnormal information.
Function returns:
Return 18 long digit strings after finishing encryption, wherein constituting of 18 character strings: 4 supplier number, 2 product category position dates, 4 batches.When 4 of batch less thaies, in batch leading zero until enough 4.
Effectively original text encryption library functional form is:
Interface is described:
Functional form: extern " C " CHAR
*_ stdcall Encryptidon
Parameter is: char
*StrOrigText
Original text length surpasses 20 return character pointers " 2 ";
20 return character pointers of original text curtailment " 1 ";
Legal original text return results is 20 bit digital character string, i.e. ciphertexts;
Decrypt ciphertext built-in function form is:
Interface is described:
Functional form: extern " C " char
*_ stdcallDecryption
Parameter is: char
*StrPswdText
Ciphertext length surpasses 20 return character string pointers " 2 ";
20 return character string pointers of ciphertext curtailment " 1 ";
Legal cipher-text function return results is 14 valid strings, promptly expressly.
ISAPI Query Components is a kind of and operating system http serves seamless integrated software, supports multithreading to carry out the search efficiency height; Built-in Packet Filtering, 3DS authentication, safe ready; Support remote procedure call (RPC), in heterogeneous system, upgrading, it is convenient to transplant;
ISAPI Query Components comprises following function: carry out authentication to assembly is possessory, confirm that at first the sender of packet can trust; Again packet is filtered deletion malicious user or hacker's attack; From packet, isolate the net sign indicating number, analyze this net sign indicating number and whether meet rule searching; Call middleware " the net sign indicating number of checking web inquiry is true and false, and " built-in function according to function return value, returns to client browser with Query Result by web; Be shown to the user; The record queries daily record.
Program on the unified message platform be with voice and data integration in an integrated system, by the support of systems soft ware, on this platform, can realize phone, mobile phone, short message, the Antiforge inquiry of equipment such as mail.Make user's Antiforge inquiry more flexible, more convenient.
This software comprises following function: ACD (automatic resource distribution), IVR (automatic voice responding), and the hot line of cracking down on counterfeit goods is transferred in the manual position service, automatic query function, SCE (business customizing environment).Utilize the operation flow of customization can realize functions such as Antiforge inquiry, log, voice answer-back, resource allocation.
The rule of encrypting is:
(1) given long position 20 bit positions make it become 20 numeral after encrypting 14 numerals;
(2) 14 bit digital that will decide are divided into preceding 6 lot number position and back 8 numbering position, distinguish independent encryption then, and 14 original texts are deposited in 20 given long hungry positions after encrypting;
When (3) encrypting, appointment is earlier numbered random order, lot number random order and is verified as;
(4) lot number random order and numbering are deposited a numeral between the 0-9 that generates at random on the random order, and check digit is deposited the unit numbers of preceding 19 bit digital sums;
(5) by the field long position of lot number random order with original position, lot number and the numbering of numbering random order decision encryption;
(6) shift rule is followed the digit position distribution method, distributes lot number respectively and distributes numbering;
(7) after 14 bit digital have sequenced, reserve the 4th, 8,15, fill last remaining 3 vacant positions with random number;
(8) by setting up the mapping table one by one between the 0-9, sorted 20 position effective digitals are carried out Function Mapping, 20 bit digital that obtain thus are last ciphertext.
The rule of deciphering is:
(1) according to password ciphertext is reduced into encryption ordering done state;
(2) the 4th and the 15th that reads after the reduction promptly obtains key;
(3) according to ordinal number being arranged to the 4th and the 15th translation;
(4) according to logical order ciphertext is reduced into expressly.
The net sign indicating number design length that the present invention adopts is 20, and the available net sign indicating number amount of each networking enterprise is 100,000,000 hundred million, utilizes data base administration.The net sign indicating number generates the encryption method that adopts independent development, reliably, stable, adopt the unified message platform as the inquiry supporting platform, with middleware Technology as the encryption and decryption core, effectively solved safety, load balancing is striden the problem of operating platform, and whole system adopts modular construction, interface is distinct between each functional part, and system is easy to upgrading.
Four, description of drawings
Fig. 1 is a system construction drawing of the present invention.
Five, embodiment
Referring to Fig. 1, the Comodity anti-fake system based on the net sign indicating number of the present invention adopts modular construction, and interface is interconnected between the parts, comprises
A web querying server 1, web querying server 1 is provided with fire compartment wall 2, is communicated with INTERNET by fire compartment wall 2;
A directory assistance device 3, directory assistance device 3 is communicated with communication network by telephone wire 4;
A switch 5;
A data server 6;
Web querying server 1, directory assistance device 3, data server 6 and switch 5 interconnection are as the inquiry supporting platform.
The net code length is 20.
Adopt middleware as encrypting, decipher core members.
Adopt ISAPIQueryComponents as the kernel software of supporting the WEB Antiforge inquiry.
Employing operates in program on the unified message platform as the kernel software of supporting telephone Antiforge inquiry.
Middleware, be on computer hardware and operating system, support the systems soft ware of application and development and operation, it can make application system be relatively independent of computer hardware and operating system platform, routine interface and agreement with standard, can realize the data sharing on different hardware and the operating system platform and use interoperability, be a distributed software Governance framework with the API definition, has powerful communication capacity and good extensibility.
Middleware has encapsulated following power function:
(1) the true and false built-in function of checking net sign indicating number;
(2) the true and false checking built-in function of net sign indicating number of support cti platform;
(3) criticize the encryption library function;
(4) effective original text encryption library function;
(5) decrypt ciphertext built-in function.
ISAPI Query Components is a kind of and operating system http serves seamless integrated software, supports multithreading, carries out the search efficiency height; Built-in Packet Filtering, 3DS authentication, safe ready; Support remote procedure call (RPC), in heterogeneous system, upgrading, it is convenient to transplant;
Program on the unified message platform be with voice and data integration in an integrated system, by the support of systems soft ware, on this platform, can realize phone, mobile phone, short message, the Antiforge inquiry of equipment such as mail.Make user's Antiforge inquiry more flexible, more convenient.
The false proof flow process that native system is realized:
Adopt present information coding hairdo to have computer to generate false proof identity code, divide two channels then: one enters the private database preservation, and another enters and sticks on the packing material of product after specialty printing factory is printed as label.The consumer inquired about by web-enabled phone after product came into the market, and discerned check and correction by system, and with literal or voice suggestion, helped the consumer to confirm that product is true and false.
False proof identity code has write down the relevant information of protected product, has uniqueness, the function of disposable and integrated anti-counterfeit.Anyone anywhere, as long as put through given query phone (8008409315) or pass through the Internet (http://www.e-fence.com.cn), press the false proof identity code on call voice prompting (or the prompting on the internet web page) the input anti-counterfeiting mark, after the computer verification system of central database passes through decryption processing with the Antiforge inquiry sign indicating number of being imported, again with database in data compare, just can obtain following three kinds of results:
If the false proof identity code of your input A. exists at a side central database, and is to inquire about first:
When the interconnection online enquiries:
Query Result shows: what you inquired about is product of an established trade mark, clicks " inquiry details " button of result page and can inquire about the manufacturer of this anti-fake code correspondence and the details of product.When on phone, inquiring about:
The Query Result voice show: what you inquired about is the product of an established trade mark of the * * of * * company product, welcomes inquiry once more.
If the false proof identity code of your input B. exists at a side central database, but is not to inquire about first:
When the interconnection online enquiries:
Query Result shows: you were inquired about * time by the number of input, and Cha Xun time is * * month * day first, please notes false proof.Click " details " button of this page and can inquire about the manufacturer of this anti-fake code correspondence and the details of product.
When on phone, inquiring about:
The Query Result voice show: you are inquired about in * * month * day by the number of input first, please note false proof!
If C. the false proof identity code of your input does not exist at a side central database, the product of this security code correspondence may be a counterfeit goods:
When the interconnection online enquiries:
Query Result shows: you do not exist by the number of input, please note false proof!
When on phone, inquiring about:
The Query Result voice show: you do not exist by the number of input, please note false proof! The enforcement of technical scheme
(1), net sign indicating number false proof middleware: Anti-counterfeitMiddleware
(1) so-called middleware, be on computer hardware and operating system, support the systems soft ware of application and development and operation, it can make application system be relatively independent of computer hardware and operating system platform, set up the platform of a standard for current large-scale distributed application, realized the integrated of large-scale application system.
Middleware has the routine interface and the agreement of standard, can realize the data sharing on different hardware and the operating system platform and use interoperability.On specific implementation, middleware is a distributed software Governance framework with the API definition, has powerful communication capacity and good extensibility.
Being applied to middleware Technology false proof is the original creation of native system, also indicates the technical advance of native system simultaneously
(2) function of the false proof middleware of net sign indicating number describes in detail:
This middleware has encapsulated following power function:
1) the true and false built-in function of checking net sign indicating number:
Interface is described: char * query
Parameter is: char strPswordID, char sServerName, char sDBName, char
*SUserID, char
*SPasswwrd, char
*SFilePaths
Parameter declaration:
StrPswordID is 20 valid strings (anti-counterfeit numbers of user's input);
SServerName: the server name at database place;
SDBName: database-name;
SUserID: database user title;
Spassword: database password;
SFilepaths: file path.
Behind checking, the poll-final, Query Result is returned:
If successful inquiring, then return results is 26 valid strings, and the form of the composition is as follows:
Preceding 4 is Query Result, and form is: XXXX, and wherein the codomain of XXXX is: 0000--9999, the security code of the 4th 0 expression input in 00 does not exist, and promptly number of times is that 0,0004 expression was inquired about 4 times, and the like, inquiry times are 9999 times at most;
From the 5th to the 12nd is query time, if the form of time is that " year, month, day " is as 20000713; 14 of backs are the pairing plaintext of net sign indicating number.Otherwise return following information character string:
The path of " 3 " expression file not found, at this moment, the value of SinOutParam is FileNoFound12345678900987654321.
20 of the false proof number deficiencies of " 2 " expression input, sInOutParam is the former value of importing into;
The anti-counterfeit number code length of " 1 " expression input has surpassed 20, and sInOutParam is the former value of importing into;
" 0 " expression number storehouse abnormal information is provided with mistake as the data library information.
2) the true and false checking built-in function of net sign indicating number of support cti platform:
Interface is described:
Functional form: extern " C " UINTPASCALEXPORT ScePUERY
Parameter is: LPVOID pNoUse, char
*SInOutParam
Parameter declaration:
PNoUse: for typeless length refers to encourage the parameter of LPVOID type, designated value is NULL (not allowing other values) when inquiry;
SInOutParam:, transmit the parameter of security code, database and file path for character refers to encourage sInOutParam.This parameter will be decomposed into respectively: security code (20), server name, database-name, database user title, database user password, 6 parameters in cryptogam path.
SInOutParam: be that ", " when parameter is empty, do not fill out any value as the character string of separator after ", ", only use ", " to separate, last parameter can not add ", ".For example: after execution has been inquired about, if successful inquiring will be inserted sInOutParam (in fact sInOutParam had both had the transmission suction parameter, had the double action that Query Result is transmitted out again) to the result of inquiry again.
Inquiry return results and sInOutParam value type information are as follows:
-3: expression can not find the path of ciphertext part, and at this moment, the value of sInOutParam is FileNoFound12345678900987654321.
-2: 20 of the false proof number deficiencies of expression input, sInOutParam be former import into value;
-1: the anti-counterfeit number code length of expression input has surpassed 20, and sInOuParam is the former value of importing into;
0: expression database abnormal information is provided with mistake as the data library information;
1: the expression Query Result is legal.
3), criticize the encryption library function:
A. functional description:
Criticizing the function of encrypting is by product open numbering and product finish number a collection of production number to be encrypted, and the ciphertext after encrypting is stored in the text, returns the filename of depositing ciphertext at last.
B. functional form: extern " C " char
*_ stdcall BatchEncryption parameter is: char
*SBatchID, char
*SStartID, char
*SEndID, inmBatchcount, char
*SFileLocation
Parameter declaration:
SBatchID: product supplier number, 6 valid strings of effective value;
SStartID: product open numbering, 8 valid strings of effective value;
SEndID: product end numbering, 8 valid strings of effective value;
NBatchCount: correspondence is opened the encryption batch of this goods number and lot number, valid value range (1,9999), and promptly similar commodity can be encrypted at most 9999 times;
SFileLocation: the path of batch encrypt file.
SStartID, sStartID, sEndID is CHAR, and not enough specific figure place is all by abnormality processing and provide abnormal information.
Function returns:
Return 18 long digit strings after finishing encryption, wherein constituting of 18 character strings: 4 supplier number, 2 product category position dates, 4 batches.When 4 of batch less thaies, in batch leading zero until enough 4.
4). effective original text encryption library function:
Interface is described:
Functional form: extern " C " CHAR
*_ stdcallEncryption
Parameter is: char
*StrOrigText
Parameter declaration:
StrOrigText: be original text to be encrypted, effective length is 14.Not enough or surpass 14 all by treating unusually.Do not ignore intercharacter space during the processing character string, even between character string if the space is arranged, then this character is the forbidden character string, does not carry out ciphering process.
Function returns:
Original text length surpasses 20 return strings (character pointer) " 2 ";
20 return character pointers of original text curtailment " 1 ";
Legal original text return results is 20 bit digital character string, i.e. ciphertexts.
5). the decrypt ciphertext built-in function:
Interface is described:
Functional form: extern " C " char
*_ stdcallDecryption
Parameter is: char
*StrPswdText
Parameter declaration:
StrPswdText: be ciphertext to be deciphered, effective length is 20.
Function returns:
Ciphertext length surpasses 20 return strings (character pointer) " 2 ":
20 return strings of ciphertext curtailment " 1 ";
Legal cipher-text function return results is 14 valid strings, promptly expressly.
(3) advantage of employing middleware:
Middleware is general, based on a certain standard interface, have good reusability.Overcome the shortcoming of traditional CLIENT fully, had a series of excellent characteristic such as reusability, flexibility, manageability, ease for maintenance.
(2), Antiforge inquiry system is the true and false of judging product according to the production number of user input, is the practicality and the validity of system, system must provide special use to add (separating) close algorithm can provide service accurately and reliably to the business in the service range.Specifically, on performance, add (separating) close algorithm and should possess good reliability, have complete encryption and decryption functions, algorithm must be scientific and reasonable in design.Related request is summarized as follows:
(1), functional requirement:
A. encryption function
Ciphering process is that the product code coding that 14 pure digi-tal are formed is encrypted, and is encrypted to the net sign indicating number that 20 cardinar number word strings constitute.
B. the decrypting process decrypting process is that 20 net sign indicating numbers are decrypted into 14 cardinar number word string (production number).
(2), reliability requirement:
1). algorithm must be able to provide effectively and add (separating) close function.
2). encryption and decryption should be separate (from should being used for of reality).For the specific input of system requirements, by cryptographic algorithm, should be able to finish ciphering process, realize the conversion from the original text to the ciphertext; Simultaneously,, can finish decrypting process, realize from ciphertext to conversion expressly by decipherment algorithm for any legal ciphertext that decipherment algorithm relates to.
3). the validation verification standard of algorithm is for the encryption and decryption in the algorithm scope, must be in full accord by the plaintext that deciphering solves with original text, can not produce ambiguity (even small probability event).
4). algorithm should possess good fail safe, reliability and can bear aggressiveness.
(3), way of realization:
A, encryption rule:
1, given long position 20 bit positions make it become 20 numeral after encrypting 14 numerals;
2,14 bit digital that will decide are divided into preceding 6 lot number position and back 8 numbering position, distinguish independent encryption then, and 14 original texts are deposited in 20 given long positions after encrypting;
When 3, encrypting, specify numbering random order, lot number random order and check digit earlier;
4, lot number random order and numbering are deposited a numeral between the 0-9 that generates at random on the random order, and check digit is deposited the unit numbers of preceding 19 bit digital sums;
5, determine the long position of field of original position, lot number and the numbering of encryption by lot number random order and numbering random order;
6, shift rule is followed the digit position distribution method, distributes lot number respectively and distributes numbering;
7, after 14 bit digital have sequenced, reserve the 4th, 8,15, fill last remaining 3 vacant positions with random number;
8, by setting up the mapping table one by one between the 0-9, sorted 20 position effective digitals are carried out Function Mapping, 20 bit digital that obtain thus are last ciphertext.
B, deciphering rule:
1, will make it become 14 plaintext after 20 the ciphertext process deciphering conversion;
2, according to the password mapping table ciphertext is reduced into encryption ordering done state;
3, the 4th and the 15th that reads after the reduction promptly obtains key;
4, according to ordinal number being arranged to the 4th and the 15th translation;
5, according to logical order ciphertext is reduced into expressly.
(4). the cryptographic algorithm design
(1) design philosophy
According to encryption rule, the final task of Jia Miing is 14 numeral to be converted to 20 numeral according to this rule as can be seen.
Method of encrypting is to have arrangement numeral on the position of regular length, arrange numeral and follow ordering rule, the numeral that comprises the fixed position fill out method and by and the original position of decision and the relative shift of the row's for the treatment of numeral etc., handling the approach that sorts on the fixed length position has many, as pass through Lian Biaofa, the array method, or even the double linked list method etc.What adopt during ordering is " leaving remainder method " (relative immediately allocating method, digital analysis method, middle square method, jackknife method) of also most convenient the most commonly used in the hash algorithm, and this also is the difficult point place of this algorithm.Method all may run into conflict in which in the process of ordering no matter adopt.
If the object that will sort (no matter it is numeral or other characters) is regarded as keyword, the key of hash (Hash) algorithm is the structure of hash function.Hash function is a map list, and it makes the hash function value of any keyword by this map gained all drop within the long scope that allows of table and gets final product.
May obtain same Hash address for different keywords, just conflict.If promptly key1!=key2, and f (key1)=f (key2).Conflict (collision) that Here it is.Keyword with same functions value is called synonym (synonym) concerning this hash function.In the ordinary course of things, we wish that conflict can not avoid (remove non-keyword considerably less and table is long very long) as much as possible less fully.Because hash function is the map that is incorporated into address set from set of keywords.Usually, the set of keyword is bigger, and its element comprises all possible keyword, and the element of address set only is the address value in the Hash table.So hash function is a compression map, this just inevitable generation is conflicted.Therefore, when ordering, to handle conflict emphatically.
Cryptographic algorithm is to be sequencer procedure on the ordered set of 1-20 in address set.Conflict is meant that the Hash address that is obtained by keyword (keyword is the numeral between the 0-9 in this algorithm) is to have had record on the position of j (1≤j≤20), and then " handling conflict " is exactly the Hash address of arriving another " sky " for the record search of keyword.In the process of handling conflict, may obtain an address sequence Hi (I-1,2 ... k), and Hi ∈ [1,20].Promptly when handling conflict if another Hash address H that obtains
1Still clash, then ask next address H again
2, if H
2Still H is then asked in conflict again
3H
3And the like, until H
kDo not clash to last and (needn't worry, the address that certain existence does not conflict, reason is very simple, keyword has only 14 and can have 20 for the position of depositing keyword, be that key length is during less than address set, the permanent address of not conflicting that exists), then Hk is designated as the address in table, and Here it is handles the principle of conflicting.
Usually the method for handling conflict has open addressing method, Hash method, chain address method and public overflow area method again, and wherein the form of open addressing method is:
H
i=(H(key)+d
i)Modmi=1,2,…,k(k≤m-1)
Wherein: H (key) is a hash function; M is that Hash table is long; d
iBe increment sequence, can have following three kinds to follow the example of:
(1) d
i=1,2,3 ... m-1 claims linear probing hash again;
(2) d
i=1
2,-1
2, 2
2,-2
2..., ± k
2(k≤m/2) is called quadratic probing hash again;
(3) d
i=pseudo-random number sequence claims pseudorandom to survey hash again.
Be not difficult to find that the hash function here is actually the mapping counting to the integer between 1-20 at random that 0-9 constitutes, angle from mapping, for lot number or numbering, mapping is corresponding one by one, but consider simultaneously that lot number and numbering then can be found neither mapping one by one, neither surjection (because when the numbering random number is 0, number field length position is 5, and the long position of lot number field also is 5 when the lot number random number is 4, i.e. address time conflict in this case).This function is a discrete function, can define this hash function like this
I=H(key)
Wherein the value of key is 0-9, and the value of H (key) is the natural number between the 1-20.Key i.e. the independent variable of this hash function, and I is a dependent variable.As the lot number random number is 3 o'clock, key=3, H (key)=7.
Obviously, false proof algorithm of the present invention is a linear probing hash again.The design philosophy of bright algorithm for instance below:
According to encrypting requirement, the 4th and the 8th 's value produces at random, suppose that the value on the lot number random order is respectively 0, then the long position of lot number field should be 20 (being that initial address is the 20th position), and to establish lot number be abcdef (a, b, c, d, e, f are any numbers between the 0-9).
Corresponding to this six figure place (will be 6 for digit strings definitely, because 001234 numerical value of course not, with individual position, ten addresses only is needs in order to sort), then according to the requirement of ordering rule, as earlier from a position high position begin ordering (high-order earlier still low level can all be a digit strings because of lot number or numbering) then the absolute address` of a should be (20+3) mod20=3, the absolute address` of b should be (20+6) mod20=6.
And the like, c, d, e, the address of f should be respectively: 10,1,8,16.At this moment, digital e is on the 8th position, because the 8th to be taken by lot number machine number, i.e. conflict, at this moment the absolute address` of e should be calculated again, (8+1) mod20=9, here 8 be last absolute address` of trying to achieve, find not conflict on the 9th position, the absolute address` of abodefg should be 3,6 like this, 10,1,9,16.From above-mentioned linear probing again hash process as can be seen: as long as Hash table do not fill up, can find an address Hk. who does not clash this also be cryptographic algorithm carried out according to the place.
Summarize, false proof algorithm is based on lot number and numbering random order and on the discrete hash function that determines in itself, adopt linear probing a kind of arrangement of hashing processing conflict again, the randomness of lot number and numbering position has determined the confidentiality and the reliability of algorithm, and this is because the high complexity of security code sample space determines.
(2) design realizes
1) encryption and decryption step
From top design philosophy, encryption is that the numeric string with length-specific is arranged on the fixed length position according to encryption rule, though in advance and do not know collision position, but be not difficult to find, whenever insert data and will take one " position ", this position can be carried out mark at an easy rate, if whenever fill out data, the position at this input place promptly becomes " busy attitude " (can not insert data again), like this when running into the data that to insert this position next time, since this position be " busy attitude ", promptly clash, then wait to fill out data and seek possible " not busy attitude " position of the next one, if the next position really is not busy attitude, then insert, otherwise, continue to seek the position that is in " not busy attitude ".For no matter be lot number or numbering, the thought of arrangement all is the same, and arranging only earlier that lot number still numbers should be consistent with decrypting process.
Be not difficult to summarize the step of encryption from above analysis, below encrypting step done to describe in detail:
1.. the address space that finally will sort is set, as array or chained list (also can be double linked list), effective length is 20 and (represents with array during the specific implementation of algorithm, length is 21, do like this be since the subscript of array since 0, and final effective address label is since 1 to 20 end).The essence of encrypting is that 14 position effective digitals are arranged in length is to go in 20 the array, owing to will handle conflict, so at first need to indicate the position of conflict, the array of the position that is used for indicating conflict is set for this reason, and the length of array is for also being 21.Convenient for the narration of back, the array that title will insert 14 production numbers is the target array, and the array of mark collision position is the sign array.And the data type of target array is a character type, and the data type of sign array is an integer.
2.. aray variable.Though the original text of encrypting is numeral but generally is that (as 0012 and 0231 is the numeral that can not distinguish size to the numeral that can not compare size, certainly be to compare size on the character meaning), so being worked as character string, the original text that will encrypt treats (being digit strings).Because the requirement of encryption rule, very naturally to carry out assignment with a random number to the 5th, 16 element of target array earlier, at this moment nature will be the 1st of sign array, 5,9,16 elements are changed to " busy attitude ", and (reason is that first position is not used the effect of just having played adjusting position all the time.Other object elements are initialized as ' a ' (certainly being other nonnumeric character), and residue sign array is changed to " not busy attitude ".
3.. select the encryption sequencing of lot number and numbering.No matter be to encrypt to lot number or to numbering earlier, can both reach the requirement of encryption rule regulation, only when deciphering, to note forming corresponding with ciphering process.
4. by encryption rule lot number and numbering are encrypted separately.The detailed process of encrypting is: for an effective production number, earlier it press lot number and number separated into two parts: 6 lot numbers and 8 bit numbers.In case determined the encryption order of lot number and numbering, then ordering should be followed production number direction from left to right and carries out.Promptly concerning lot number and numbering, ordering should be undertaken by the order from a high position to the low level.The principle of following (Pos+Abs) mod20 is determined the final absolute position of the row's for the treatment of element.Determine not collision position of the next one by (ColPos+1) mod20 when handling conflict, if do not conflict, then the position of gained is the final absolute position of the row's for the treatment of element thus.Every row's one element, the mark position of putting this element place immediately is " busy attitude ", reason obviously, this position can not be arranged other any element again.Comply with. these regularly arranged intact 14 production numbers.
5. fill rest position.Fill rest position by the encryption rule requirement with random number,, filling so want earlier random number to be converted to character because the target location is the character array.
6. fill random order.Because the 8th (being the 9th element in array) is random order, and when initialization, be changed to " busy attitude ", so existing the needs this position reset is not busy attitude, and every digital translation of preceding 19 bit digital sums becomes character to insert, because the front has 5 bit digital to insert at random, so the value of this position also is at random, is fated so be called random order.
7. password conversion.Once change by the password table of comparisons arranging 20 good bit digital characters, so far encrypt and finish.
(2). the realization of inquiry
False proof id by the user, the id log sheet has been inquired about in inquiry earlier, have, tell the user that your number of input is inquired about, do not have, with supplier number inquiry manufacturer's information table, no, tell user prompt 1, have, inquire about T2 (the production code member table of manufacturer) with production code member, no, tell user prompt 1, have, with 8 goods number inquiry T3 (production code member scope table), no, tell user prompt 1, tell user prompt 2, and the voice document name that obtains is combined into the discernible form of information station, return as return results.Web is returned as related words information.
Wherein user prompt 1 is " you do not exist by the number of inquiry "; User prompt 2 is " the upright product of the material company material product that you inquire about ".
(3). the Antiforge inquiry of unified message platform is realized:
The telephone set internet checking of native system is to realize on the platform based on unified message, and the false code of program is as follows:
∥ begins inquiry, and " you are good, are side's Antiforge inquiry hot line here, please import 20 Commercial goods labels anti-fake codes, press the # keyboard and finish to play voice suggestion.
STR?1,29,=,0,1
SEARCH:
SET?01,
OPT?0,@34,PleaseinputId.vox,,21,3
ACP?01
JPC@36=,1|exit
SET?02,@36
∥ judges whether to be 20 id
checkid:
STR?0,01,@36
JPC?@01=20,0|idno20,1|startsearch
20 of the id less thaies of ∥ prompting user input or above 20
idno20:
SET?01,
OPT?0,@34,reinputid.vox,,21,3
ACP?01
JPC?@36=,1|exit
SET?02,@36
JMP?checkid
∥ calls middleware, begins to inquire about
startsearch:
SET36,@02
SET10,@36,xayfsqlserver,yifang,sa,,g:\pswfile\
PLG?ArithDll.dll,SceQuery,@10,05,06
TRC<REL>?@05
JPC@05,1|idyes,-3|errorid,-2|idno20,-1|idno20
idyes:
STR1,11,@06,0,4
STR1,12,@06,12,4
STR1,13,@06,16,2
STR1,02,@06,4,8
STR1,24,@06,12,14
SET04,@12
SET05,0
JPC@11=1,1|to5is1,0|nexttodb
to5is1:
SET05,1
nexttodb:
JPC@11=0,1|errorid
SET01,@12
STR1,12,select ManufacturerVox?from?ManufacturerInfo?whereManufacturerID@29'@01',0,-1
STR?1,03,select?ProductNameVox?from?ProductClass?whereManufacturerID@29'@01'and?ProductClass@29'@13',0,-1
DBR?dsn=yifang;uid=sa;pwd=;database=yifang,@12,14,15,1,|
DBR?dsn=yifang;uid=sa;pwd=;database=yifang,@03,16,17,1,
FUC0,28
STR1,19,@30,0,4
DBR?odbc;dsn=yifang;uid=sa;pwd=;database=yifang,select?Netherlandsfrom?TelephoneArea?where?HostArea=@19,20,21
SET22,'@24','@37','@30',@18',@28','@05','@2'
SET23,MarqueId,Hostphone,CallNumber,StartTime,EndTime,Sign,IncidentAddress
DBW?dsn=yifang;uid=sa;pwd=;database=yifang,insert?into?AccessLog(@23)values(@22),01
JPC@11=0,1|errorid,0|ifnot0
ifnot0:
JPC@11<0,1|exit,0|if1
if1:
JPC@11=1,1|okid,0|Overid
The ∥ Query Result: the number that prompting is inquired about was inquired about in xx xx month xx day
Overid:
SET01,
OPT0,@34,ResearchId.vox|<@02>|Researchtime.vox,,0,1
ACP01
JMP?exit
The ∥ Query Result: the number that prompting is inquired about does not exist
errorid:
SET01,
OPT0,@34,errorid.vox,,0,1
ACP01
JMP?exit
The ∥ Query Result: what you inquired about is certain product of an established trade mark of certain factory
okid:
SET01,
OPT0,@34,Thisis.vox|@15|@17|Produce.vox,,0,1
ACP01
DBW?dsn=yifang;uid=sa;pwd=;database=yifang,update?ProductClassSET?searchcount=searchcount+1?where?ManufacturerID@29'@04′andProductClass@29'@13'
∥ finishes inquiry, stops action
exit:
OPT0,@34,over.vox,,0,1
ACP01
OPT6,@34
This false code can be moved on the directory assistance device, finishes Antiforge inquiry according to program circuit.
(4) Antiforge inquiry on the .WEB website is realized: ISAPI Components
The core of WEB inquiry is an ISAPI assembly, considers fail safe, and this software adopts the 3ds cryptographic algorithm.Middleware carries out authentication to assembly is possessory, has only the sender who confirms packet to trust, just allow the component call middleware " the checking net is yard true and false, and " built-in function according to function return value, returns to inquiring user with Query Result by web.
The advantage of ISAPI Components is to combine together with the web service, supports multithreading, carries out the efficient height; Carry Packet Filtering, the multiple identities authentication, safe ready is transplanted.
ISAPI Query Components is that a kind of and operating system http serve seamless integrated software, comprises following function: carry out authentication to assembly is possessory, confirm that at first the sender of packet can trust; Again packet is filtered deletion malicious user or hacker's attack; From packet, isolate the net sign indicating number, analyze this net sign indicating number and whether meet rule searching; Call " the net sign indicating number of checking web inquiry is true and false " built-in function of middleware,, Query Result is returned to client browser by web according to function return value; Be shown to the user; The record queries daily record.
Program on the unified message platform be with voice and data integration in an integrated system, this software comprises following function: ACD (automatic resource distribution), IVR (automatic voice responding), the manual position service, transfer the hot line of cracking down on counterfeit goods, automatic query function, SCE (business customizing environment).Utilize the operation flow of customization can realize functions such as Antiforge inquiry, log, voice answer-back, resource allocation.
Compared with the prior art the present invention has the following advantages:
Can't forge: anti-counterfeiting technology in the past all belongs to the monobasic anti-counterfeiting technology theoretically, in fact always can forge, only the complexity difference of Wei Zaoing.What native system adopted is that security code set in every product antiforgerg identification thing all generates by special cryptographic algorithm, and security code information all is stored in central database.Even if the adulterator can forge the same product of pre-false proof marker outward appearance, meet irregular governed security code between the product but also can't puppet produce, more the security code information of forging can't be sent and deposit in the party database.
Coding is strict: the coding that is contained in every piece of anti-fake identification mark all is unique, and the mathematical algorithm by precision generates at random, never repeat, and do not have rule and rule, and be a kind of pure unordered random code, the fake producer can't copy.Code capacity reaches 10
20Thereby, satisfy large-scale needs.
Inquire about easy: verify that true and false use is simple, be suitable for operation, convenient, flexible.Traditional anti-counterfeiting technology is actually some complicated markers that adopt special material, specific process to make.Want to discern the false from the genuine, need special expertise or buy expensive instrumentation, consumers in general can't directly use anti-fake identification mark to differentiate the true and false of product basically.Adopt the product of net sign indicating number anti-counterfeiting technology, any buyer, put through the inquiry phone or enter internet system, inquire about and just know authenticity of products, thereby with a kind of technical very strong complex process, be simplified to a simple procedure of calling with internet checking, more need not know-how, equipment, training, thus make query script more afterburning just flexible, safe and reliable.
Advanced technology: extensive use current software industry, the advanced technology of internet industry, as MIDDLEWARE, CONPONMENTS, 3DS, thereby guaranteed the fail safe of this system, reliability, the advance of response real-time and technology.The false proof operating position of net sign indicating number in Baoji Cigarette Factory:
By the net code anti-fake system that the false proof Science and Technology Ltd. of a side is developed, prove repeatedly through Baoji Cigarette Factory, the frosted Monkey King cigarette of producing at Baoji Yan Chang is used with renovating on the red Monkey King cigarette.It is implemented by 20 security code and corresponding explanation all is printed on the cigarette pack barrel.
Similar false proof comparing with market has following advantage:
1. the science of net code anti-fake system itself, advance, preciseness, and right The simplification of consumer's discriminating and convenience, than the laser anti-counterfeit epoch such as the laser mark It is superior many that the technology such as knowledge, positioning bronzing are wanted.
2. with regard to digital code anti-false, by being printed on the way on the packing box, effectively Difficulty, the production process that has solved the management that way is brought such as labeling increases, corresponding production The problems such as cost increase.
These two brands with the false proof new product release of this kind after, the consumer inquires about phone Constantly, there are every day thousands of inquiry phones to squeeze into inquiry. Facts have proved that employing net code is false proof, Effect is fairly obvious.
Claims (10)
1. Comodity anti-fake system based on net sign indicating number, system adopts modular construction, and interface is interconnected between the parts, comprises
A web querying server [1], web querying server [1] is provided with fire compartment wall [2], is communicated with INTERNET by fire compartment wall [2];
A directory assistance device [3], directory assistance device [3] is communicated with communication network by telephone wire [4];
A switch [5];
A database server [6];
It is characterized in that:
Web querying server [1], directory assistance device [3], database server [6] and switch [5] interconnection are as inquiry support hardware platform;
The net code length is 20;
Adopt Anti-counterfeit Middleware middleware as encrypting, decipher kernel software;
Adopt ISAPI Query Components as the kernel software of supporting the WEB Antiforge inquiry;
Employing operates in program on the unified message platform as the kernel software of supporting telephone Antiforge inquiry;
Described middleware, be on computer hardware and operating system, support the software of application and development and operation, it can make application system be relatively independent of computer hardware and operating system platform, routine interface and agreement with standard, can realize the data sharing on different hardware and the operating system platform and use interoperability, be a distributed software Governance framework with the API definition, has communication capacity and extensibility;
Middleware has encapsulated following power function:
(1) the true and false built-in function of net sign indicating number of checking web inquiry
(2) the true and false checking built-in function of net sign indicating number of support cti platform
(3) criticize the encryption library function
(4) effective original text encryption library function
(5) decrypt ciphertext built-in function.
2. the Comodity anti-fake system based on the net sign indicating number according to claim 1, it is characterized in that: described encryption is that the product coding (expressly) that 14 pure digi-tal are formed is encrypted as the security code (ciphertext) that 20 cardinar number word strings constitute, and described deciphering is that the security code deciphering that 20 cardinar number word strings are constituted is 14 cardinar number word strings.
3. the Comodity anti-fake system based on the net sign indicating number according to claim 1 is characterized in that: the true and false built-in function form of net sign indicating number of described checking web inquiry is:
Interface is described:
Functional form: char
*Query
Parameter is: char strPswordID, char sServerName, char sDBName, char
*SUserID, char
*SPasswwrd, char
*SFilePaths
Behind checking, the poll-final, Query Result is returned:
If successful inquiring, then return results is 26 valid strings, and the form of the composition is as follows:
Preceding 4 is Query Result, and form is: XXXX, and wherein the codomain of XXXX is: 0000--9999, the security code of the 4th 0 expression input in 0000 does not exist, and promptly number of times is that 0,0004 expression was inquired about 4 times, and the like, inquiry times are 9999 times at most;
From the 5th to the 12nd is query time, if the form of time is that " year, month, day " is as 20000713; 14 of backs are the pairing plaintext of net sign indicating number;
Otherwise return following information character string:
The path of " 3 " expression file not found, at this moment, the value of SinOutParam is FileNoFound12345678900987654321;
20 of the false proof number deficiencies of " 2 " expression input, sInOutParam is the former value of importing into;
The anti-counterfeit number code length of " 1 " expression input has surpassed 20, and sInOutParam is the former value of importing into;
" 0 " expression number storehouse abnormal information is provided with mistake as the data library information;
4. the Comodity anti-fake system based on the net sign indicating number according to claim 1 is characterized in that: the true and false checking built-in function of the net sign indicating number form of described support cti platform is:
Interface is described:
Functional form: extern " C " UINTPASCAL EXPORT ScePUERY
Parameter is: LPVOIDpNoUse, char
*SInOutParam;
After execution has been inquired about, if successful inquiring will be inserted sInOutParam to the result of inquiry again;
Inquiry return results and sInOutParam value type information are as follows:
-3: expression can not find the path of ciphertext part, and at this moment, the value of sInOutParam is FileNoFound12345678900987654321;
-2: 20 of the false proof number deficiencies of expression input, sInOutParam be former import into value;
-1: the anti-counterfeit number code length of expression input has surpassed 20, and sInOutParam is the former value of importing into;
0: expression database abnormal information is provided with mistake as the data library information;
1: the expression Query Result is legal;
5. the Comodity anti-fake system based on the net sign indicating number according to claim 1, it is characterized in that: described batch of encryption library functional form is:
Interface is described:
Functional form: extern " C " char
*Stdcall BatchEncryption
Parameter is: char
*SBatchID, char
*SStartID, char
*SEndID, intnBatchcount, char
*SFileLocation
NBatchCount: correspondence is opened the encryption batch of this goods number and lot number, valid value range 1, and----9999, promptly similar commodity can be encrypted at most 9999 times;
SFileLocation: the path of batch encrypt file.
SStartID, sStartID, sEndID is CHAR, and not enough specific figure place is all by abnormality processing and provide abnormal information.
Function returns:
Return 18 long digit strings after finishing encryption, wherein constituting of 18 character strings: 4 supplier number, 2 product category position dates, 4 batches.When 4 of batch less thaies, in batch leading zero until enough 4.
6. the Comodity anti-fake system based on the net sign indicating number according to claim 1, it is characterized in that: described effective original text encryption library functional form is:
Interface is described:
Functional form: extern " C " CHAR
*_ stdcallEncryption
Parameter is: char
*StrOrigTexf
Original text length surpasses 20 return character pointers " 2 ";
20 return character pointers of original text curtailment " 1 ";
Legal original text return results is 20 bit digital character string, i.e. ciphertexts;
7. the Comodity anti-fake system based on the net sign indicating number according to claim 1, it is characterized in that: described decrypt ciphertext built-in function form is:
Interface is described:
Functional form: extern " C " char
*_ stdcallDecryption
Parameter is: char
*StrPswdText
Ciphertext length surpasses 20 return character string pointers " 2 ";
20 return character string pointers of ciphertext curtailment " 1 ";
Legal cipher-text function return results is 14 valid strings, promptly expressly.
8. the Comodity anti-fake system based on the net sign indicating number according to claim 1 is characterized in that: described ISAPI Query Components is a kind of and operating system http serves seamless integrated software, supports multithreading; Built-in Packet Filtering, the 3DS authentication; Support remote procedure call (RPC), in heterogeneous system, upgrading, it is convenient to transplant;
Program on the described unified message platform be with voice and data integration in an integrated system, by the support of systems soft ware, on this platform, can realize phone, mobile phone, short message, the Antiforge inquiry of equipment such as mail.
9. the Comodity anti-fake system based on the net sign indicating number according to claim 2, it is characterized in that: the rule of described encryption is:
(1) given one long be 20 bit positions, numerals that will 14 make it become 20 numeral through behind the enciphering transformation;
(2) 14 bit digital that will decide are divided into preceding 6 lot number position and back 8 numbering position;
When (3) encrypting, specify numbering random order, lot number random order and verification bit position earlier;
(4) lot number random order and numbering are deposited a numeral between the 0-9 that generates at random on the random order;
(5) check digit is deposited the unit numbers of preceding 19 bit digital sums;
(6) by the field long position of lot number random order with original position, lot number and the numbering of numbering random order decision encryption;
(7) shift rule is followed the digit position distribution method, distributes lot number respectively and distributes numbering;
(8) after 14 bit digital have sequenced, reserve the 4th, 8,15, fill last remaining 3 vacant positions with random number;
By setting up the mapping table one by one between the 0-9, sorted 20 position effective digitals are carried out Function Mapping, 20 bit digital that obtain thus are last ciphertext (net sign indicating number).
10. the Comodity anti-fake system based on the net sign indicating number according to claim 2, it is characterized in that: the rule of described deciphering is:
(1) will make it become 14 plaintext after 20 the ciphertext process deciphering conversion;
(2) according to the password mapping table ciphertext is reduced into encryption ordering done state;
(3) the 4th and the 15th that reads after the reduction promptly obtains key;
(4) according to ordinal number being arranged to the 4th and the 15th translation;
According to logical order ciphertext is reduced into expressly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 01128766 CN1195372C (en) | 2001-08-27 | 2001-08-27 | Network code based commodity anti-counterfeit system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 01128766 CN1195372C (en) | 2001-08-27 | 2001-08-27 | Network code based commodity anti-counterfeit system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1333625A true CN1333625A (en) | 2002-01-30 |
CN1195372C CN1195372C (en) | 2005-03-30 |
Family
ID=4668597
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 01128766 Expired - Fee Related CN1195372C (en) | 2001-08-27 | 2001-08-27 | Network code based commodity anti-counterfeit system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1195372C (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102306014A (en) * | 2011-04-26 | 2012-01-04 | 浙江中烟工业有限责任公司 | Cigarette equipment data acquisition system for WIN2 control system |
CN102711065A (en) * | 2012-04-11 | 2012-10-03 | 佳都新太科技股份有限公司 | Method using original called fields to transmit text message verification code |
CN108763939A (en) * | 2018-05-02 | 2018-11-06 | 开源物联网(广州)有限公司 | The encryption method and encryption system of security code |
CN111475486A (en) * | 2020-04-09 | 2020-07-31 | 广州创显科教股份有限公司 | Cargo transportation management method, system and device based on artificial intelligence and readable storage medium |
US11647100B2 (en) | 2018-09-30 | 2023-05-09 | China Mobile Communication Co., Ltd Research Inst | Resource query method and apparatus, device, and storage medium |
-
2001
- 2001-08-27 CN CN 01128766 patent/CN1195372C/en not_active Expired - Fee Related
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102306014A (en) * | 2011-04-26 | 2012-01-04 | 浙江中烟工业有限责任公司 | Cigarette equipment data acquisition system for WIN2 control system |
CN102711065A (en) * | 2012-04-11 | 2012-10-03 | 佳都新太科技股份有限公司 | Method using original called fields to transmit text message verification code |
CN108763939A (en) * | 2018-05-02 | 2018-11-06 | 开源物联网(广州)有限公司 | The encryption method and encryption system of security code |
US11647100B2 (en) | 2018-09-30 | 2023-05-09 | China Mobile Communication Co., Ltd Research Inst | Resource query method and apparatus, device, and storage medium |
CN111475486A (en) * | 2020-04-09 | 2020-07-31 | 广州创显科教股份有限公司 | Cargo transportation management method, system and device based on artificial intelligence and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN1195372C (en) | 2005-03-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1112000C (en) | Image transmission apparatus, image transmission system, and communciation apparatus | |
CN100339844C (en) | Information management system | |
CN1290052C (en) | Private electronic value bank system | |
CN1302408C (en) | Authentication system, authentication device, terminal device, and authentication method | |
CN1665184A (en) | Using a flexible rights template to obtain a signed rights label (SRL) for digital content | |
CN1608263A (en) | Rights management unit | |
CN1276364C (en) | Data management apparatus, data management method and computer program | |
CN1993688A (en) | Printing shortening starting time | |
CN1483278A (en) | Contents directory service system | |
CN1049946A (en) | The transmission method of data, e-file etc. and system and the card that uses according to this method | |
CN1274107C (en) | Encrypted data delivery system | |
CN1470972A (en) | System and method for providing key operation of safety server | |
CN1729460A (en) | Communication method, communication system, relay system, communication program, program for communication system, mail distribution system, mail distribution method, and mail distribution program | |
CN1276575A (en) | Database access system | |
CN1631023A (en) | Method and system for getting on-line status, authentication, verification, authorization, communication and transaction services for web-enabled hardware and software, based on uniform telephone addr | |
CN1679026A (en) | Web services apparatus and methods | |
CN1839581A (en) | Device authentication information installation system | |
CN1476195A (en) | Terminal apparatus, communication method and system | |
CN1283040A (en) | Method and system of distributing multimedia data using management information | |
CN1653463A (en) | Method and apparatus for processing usage rights expressions | |
CN1579065A (en) | Method and system for the supply of data, transactions and electronic voting | |
CN1394312A (en) | Authentication system, authentication agent apparatus, and terminal | |
CN1483177A (en) | Computer-readable information storage medium where content data is stored and content charging system | |
CN101034426A (en) | Information processing device, system and method | |
CN1753013A (en) | System and method of patent item on line investment and industrilization over internet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C06 | Publication | ||
PB01 | Publication | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C19 | Lapse of patent right due to non-payment of the annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |