CN203338404U - Product anti-counterfeiting system employing machine vision and based on two dimensional drawing - Google Patents

Product anti-counterfeiting system employing machine vision and based on two dimensional drawing Download PDF

Info

Publication number
CN203338404U
CN203338404U CN2013201805225U CN201320180522U CN203338404U CN 203338404 U CN203338404 U CN 203338404U CN 2013201805225 U CN2013201805225 U CN 2013201805225U CN 201320180522 U CN201320180522 U CN 201320180522U CN 203338404 U CN203338404 U CN 203338404U
Authority
CN
China
Prior art keywords
product
code
inquiry
false proof
counterfeiting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN2013201805225U
Other languages
Chinese (zh)
Inventor
程涛
徐刚
冯平
彭小波
王燕燕
彭涛
李商旭
唐志坚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen University
Original Assignee
Shenzhen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen University filed Critical Shenzhen University
Priority to CN2013201805225U priority Critical patent/CN203338404U/en
Application granted granted Critical
Publication of CN203338404U publication Critical patent/CN203338404U/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The utility model is applicable to the technical field of product anti-counterfeiting, and provides a product anti-counterfeiting system employing machine vision and based on two dimensional drawing. The system comprises a coded lock, client equipment, a telephone network, a mobile communication network, an Internet network, a server, an anti-counterfeiting query and management unit, an exchanger, an order management module, and a product anti-counterfeiting code label generation unit. The coded lock is disposed at an opening of an anti-counterfeiting product. The client equipment is connected with the server respectively through the telephone network, the mobile communication network and the Internet network. The exchanger is connected with the server. The anti-counterfeiting query and management unit is connected with the exchanger. The order management module is connected with the exchanger and the product anti-counterfeiting code label generation unit. The system provided by the utility model can be used for effectively cracking down on market product counterfeiting, thereby protecting the legitimate interests of consumers better. Meanwhile, the system solves a technical problem that an anti-counterfeiting code is overlong in the prior art.

Description

A kind of machine vision and product anti-fake system based on X-Y scheme of utilizing
Technical field
The utility model belongs to the products antifake technique field, relates in particular to a kind of machine vision and product anti-fake system based on X-Y scheme of utilizing.
Background technology
Along with high-tech development, fake products also occurs thereupon, and emerges in an endless stream, the appearance of various personations on market, high imitative product, not only encroach on consumers in general's interests, also upset normal market order, and brought huge economic loss to production firm.Be accompanied by the appearance of fake products, the technology of various antagonism fake productss also occurs thereupon.Although the generation of many method for anti-counterfeit is also arranged at present, traditional method for anti-counterfeit is generally limited to these two kinds of physics package anti-counterfeiting and digital encode false-proofs.The physics package anti-counterfeiting needs special-purpose discriminating instrument, to check with respect to the consumer whether bought product is that genuine piece is more difficult, and some lawless persons can be by reclaiming the packing of genuine piece, with the true false pain product of packing into of packing, load onto just more difficult identification from physical package like this, for consumers.The inquiry of digital encode false-proof also has inconvenience, and the real chance of using of consumer is also few.
Have now the antifake method for products based on technology of Internet of things, by utilizing the network platform or telephony platform to be inquired about the true and false of anti-fake code and the unlocking cipher of acquisition coded lock, but this kind of method consumer is still not too convenient in the process of using, can not learn timely the true and false of product, meanwhile the anti-fake code of anti-counterfeiting technology is long, in use can bring inconvenience to production firm.
The utility model content
Technical problem to be solved in the utility model is to provide a kind of machine vision and product anti-fake system based on X-Y scheme of utilizing, and is intended to solve the problem of products antifake technique.By the machine vision mode, true and false X-Y scheme is identified automatically, by client software, select message search or network inquiry mode to send anti-fake code in the local backstage of product false proof infosystem or producer's background database manager system, background data base feeds back the true and false information of product to the user, thereby completes the true and false inquiry of product; When the user need open product, by machine vision mode dual lock X-Y scheme, automatically identify, by client software, select message search or network inquiry mode to send anti-fake code in the local backstage of product false proof infosystem or producer's background database manager system, background database manager system feedback unlocking cipher is to the user, thereby completes the unlatching of product.
The utility model is to realize like this, a kind of machine vision and product anti-fake system based on X-Y scheme of utilizing, comprise coded lock, client device, telephone network, mobile communications network, Internet network, server end, security code inquiry and administrative unit, switch, order management module, product false proof code label generation unit;
Described server end is for placing site home page, message search interface, network inquiry interface;
Described coded lock is added in the opening part of anti-fake product;
Described client device is connected by the one or more and described server end in described telephone network, described mobile communications network, described Internet network;
Described switch is connected with described server end, for the exchange between data;
Described security code inquiry and administrative unit are connected with described switch;
Described order management module is connected with described switch, described product false proof code label generation unit respectively, described order management module sends security code information to described product false proof code label generation unit, described product false proof code label generation unit generates product false proof code label, and described product false proof code label includes X-Y scheme.
Further, described client device comprises phone, mobile phone, panel computer, portable computer and PC.
Further, described order management module comprises security code generation unit, order and contract management unit and expanded application unit;
Described security code generation unit is connected with described switch, for unblank inquiry code convert X-Y scheme to of the product false proof inquiry code according to security code coding rule generating anti-counterfeiting code and product;
Described order is connected with described switch with the contract management unit, for management enterprise, by the order of page download contract that enterprise is uploaded, is examined, and examines the instruction of qualified rear transmission production product false proof code label;
Described expanded application unit is connected with described switch, for expanding the function of order management module.
Further, described product anti-fake system also comprises system management and maintenance module and the product database be connected with described switch, described system management and maintenance module are for data are managed and periodic maintenance, and described product database is for the data of storage products information.
The utility model compared with prior art; beneficial effect is that antifake method for products of the present utility model can effectively hit market product and fake; the legitimate rights and interests of Protection of consumer better; and fully combine the application in product false proof of smart mobile phone, panel computer; solved current products antifake technique because the long technical matters of anti-fake code, the antifalse technology of the new and high technology of integrated various modern simultaneously.
The accompanying drawing explanation
Fig. 1 is the product anti-fake system structural drawing that the utility model embodiment provides;
Fig. 2 is the antifake method for products schematic diagram that the utility model embodiment provides.
Embodiment
In order to make the purpose of this utility model, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the utility model is further elaborated.Should be appreciated that specific embodiment described herein is only in order to explain the utility model, and be not used in restriction the utility model.
Antifake method for products of the present utility model reaches false proof purpose in conjunction with physics encryption device and the double protection of information encryption.The encrypted physical device, such as electronic lock, mechanical lock etc. carries out encrypted physical to each product, reaches the false proof purpose of ground floor.Encrypted physical also utilizes encryption device to be blocked the unlatching of product, only has and inputs the opening and closing that correct password could be realized product as the user.For example, carry out wine false proofly, at first traditional wine bottle cover be made to the wine bottle cover with mechanical code lock, be attached to the bottle mouth, then mechanical cipher is set, only have after from producer, obtaining correct unlocking cipher and just can open bottle.
Information encryption is to utilize infosystem to carry out information encryption to each product to reach the false proof purpose of the second layer.The relevant information of each product that manufacturer will produce is such as product coding, product category, Enterprise organization system code etc. are mapped on unique two-dimensional bar code one by one, simultaneously these information also manufactured business be submitted to the product false proof inquiry information system of an Internet-based.By this process, make the product information authenticated through manufacturer in the physical message of each product and product false proof infosystem set up one-to-one relationship, thereby and the mode that these information exchanges are crossed phone, short message, network is submitted to this Antiforge inquiry infosystem verifies that one by one the true and false that can judge this product reaches false proof purpose.
As shown in Figure 1, a kind of machine vision and product anti-fake system based on X-Y scheme of utilizing, comprise coded lock, client device 101, telephone network 102, mobile communications network 103, Internet network 104, server end 106, security code inquiry and administrative unit 105, switch 107, order management module 108, product false proof code label generation unit 109.Described coded lock is added in the opening part of anti-fake product; Described server end 106 is for placing site home page, message search interface, network inquiry interface.Described client device 101 is connected by the one or more and described server end 106 in described telephone network 102, described mobile communications network 103, described Internet network 104.Described Antiforge inquiry and administrative unit 105 are connected with described switch 107.Described switch 107 is connected with described server end 106, for the exchange between data.Described order management module 108 is connected with described switch 107, described product false proof code label generation unit 109 respectively, described order management module 108 sends security code information to described product false proof code label generation unit 109, described product false proof code label generation unit 109 generates product false proof code label 112, and described product false proof code label 112 includes X-Y scheme.
Further, described client device 101 comprises phone, mobile phone, panel computer, portable computer, PC, and preferably, described mobile phone is smart mobile phone; Described smart mobile phone, panel computer, portable computer are equipped with camera.
Further, described order management module 108 comprises security code generation unit, order and contract management unit and expanded application unit.Described security code generation unit is connected with described switch, for unblank inquiry code convert X-Y scheme to of the product false proof inquiry code that generates product false proof code label according to the security code coding rule and product, and the security code generated is managed.Described order is connected with described switch with the contract management unit, for management enterprise, by the order under webpage contract that enterprise is uploaded, is examined, and examines the instruction of qualified rear transmission production product false proof code label.Described expanded application unit is connected with described switch, for expanding the function of order management module 108.
The described machine vision of utilizing also comprises with the product anti-fake system based on X-Y scheme system management and maintenance module 110 and the product database 111 be connected with described switch 107, described system management and maintenance module 110 are for data are managed and periodic maintenance, and described product database 111 is for the data of storage products information.
As shown in Figure 2, the utility model also provides a kind of machine vision and antifake method for products based on X-Y scheme of utilizing, and comprises the following steps:
The product information that steps A, order management module 108 provide producer produces security code by the coding of the security code in the security code generation unit and encryption software, described security code has the product false proof of comprising inquiry code and/or the product inquiry code of unblanking, and by data encryption algorithm, described product false proof inquiry code and/or the product inquiry code of unblanking is encrypted, and convert X-Y scheme to, and the information of described X-Y scheme is uploaded to product database 111, the product false proof code label 112 that is printed with described X-Y scheme hangs on product or coded lock;
Step B, client device 101 gather X-Y scheme the identification on product or coded lock, obtain the product false proof code, and the security code obtained is sent to security code inquiry and administrative unit 105, enter product database 111 by switch 107 after described security code inquiry and 105 pairs of security codes of administrative unit are decrypted and mated, and matching result is returned to client device 101;
In described step B, the user need verify when product is true and false, the client software of developing by download system installation; Open client software and X-Y scheme identification interface occurs, the user identifies camera automatically facing to X-Y scheme, after identification, the user can select message search or network inquiry, security code can be sent to security code inquiry and administrative unit 105, enter product database 111 by switch 107 after the inquiry of described security code and 105 pairs of security codes of administrative unit are decrypted and mated, if find corresponding security code mode by note or network returns to the user; If the product false proof inquiry code is returned to the true and false of product, if product is unblanked, inquiry code is returned to the unlocking cipher of corresponding product, and the user opens coded lock according to the explanation on label and gets final product after obtaining unlocking cipher.
Generation and the process of exchange of security code described in the utility model have been realized robotization.Enterprise, by the management service of the service of network customization Antiforge inquiry, tailored ciphers lock, order, produces the security code of respective amount and converts X-Y scheme, product database, system management and maintenance, speech polling interface, network inquiry interface, message search interface, data base encryption, security code coding rule, cell-phone customer terminal X-Y scheme software to for order.
The transaction that the product information that described order management module provides producer produces security code and security code by the coding of the security code in the security code generation unit and encryption software comprises the following steps:
Step 1, enterprise are placed an order by logon web page, and the keeper is by order and contract management unit audit order, examine after qualified and allow the enterprise customer to be downloaded and upload the contract of having signed by server end 106 on webpage;
The contract that step 2, keeper are uploaded by order and contract management unit audit enterprise, need to pay corresponding deposit according to quantity of service and the length of service of customization by enterprise;
Step 3, keeper examine whether receive deposit, are that the sequence information that starts to provide according to the enterprise customer produces corresponding security code and generates X-Y scheme and prints with product false proof code label generation unit 109; The generation of described security code is to produce according to certain coding rule; Described security code adopts cryptographic algorithm to encrypt, and the security code become after encryption offers the enterprise customer;
Step 4, X-Y scheme label are sent in enterprise customer's hand together with coded lock, and the enterprise customer directly is added on product;
Step 5, system manager upload to the security code of electronic version in product database 111, and the system manager examines errorless security code can start to start inquiry service, and the product of this order is started selling;
Step 6, enterprise product after the user buys product, carry out true and false inquiry and obtain unlocking cipher after selling;
After step 7, product are sold, the user, according to scraping hidden code coating off, obtains the inquiry code of unblanking, the inquiry of being unblanked.If system is returned to unlocking cipher and is directly unblanked to get final product, if what return is the index code the user finds corresponding password on label according to index code of unblanking, such as the corresponding unlocking cipher of X1Y1Z1Z2 is 1478.What system returned to the user is that password or index code are to decide according to enterprise customer's requirement.
Described step 1,2 and 3 orders of mentioning and contract management unit are mainly used in managing the order of security code, can realize audit to order contents, to underproof order annotated and commented on, treaty content is checked audit, underproof contract is annotated and commented on, checked the state of order details, change order.Major function have order audit, contract audit, determine the state demonstration such as gathering audit.After completing, all work start to enter inquiry phase, service will first be opened by enterprise, the service side starts formally to put into effect after service, when the order state that expired changes service stopping into, when the order stopped according to circumstances can being deleted order, unblank table and the also deletion simultaneously of false proof code table of product database.Described order and contract management unit provide according to the state of order is classified to order, and such as when select submitting to order etc. pending, the capital occurred is to submit the pending part such as order to.
Further, as follows according to certain coding rule in described step 3: before, during and after security code is divided into three sections, the security code cryptographic algorithm that is encoded to of leading portion obtains, and interlude is the random code that system produces, and back segment is encoded to production code member; Totally 31 of security codes, be respectively 10 of front segment encodes, 10 of middle segment encodes, and 10 of rear segment encodes, 1 of effect code, the step that produces corresponding security code comprises:
Step 301: front segment encode obtains by function x=f (y), and y is middle segment encode, and x is front segment encode, is 10 bit digital, such as, y equals 1234567890, gets even bit 24680;
Step 302: the even bit of the y obtained according to step 31 finds corresponding value in mapping table, and will in mapping table, find corresponding value to replace the numeral of even bit, obtain new y, such as 24680 in mapping table corresponding number be A8F4C, A8F4C is replaced to 24680, and y equals 1A385F749C;
Mapping table:
1 2 3 4 5 6 7 8 9 0
9 A 7 8 6 F D 4 B C
Step 303: transfer new y to binary number, such as, 1A385F749C is converted into scale-of-two and equals 1101000111000010111110111010010011100;
Step 304: described binary number odd bits and even bit are exchanged, such as, for several odd bits of example and even bit be 1110001011000001111101110101100011010 after exchanging;
Step 305: change into again the decimal system after the exchange of even bit and odd bits, if the decimal system of gained surpasses 10 get first 10, be no more than 10 10 of polishings in front;
Step 306: the effect code respectively by front segment encode, in the middle double figures of segment encode, rear segment encode be multiplied by key, then divided by 10 remainders that obtain, for example security code is 7883137400-12345678936-0201208010-6.Key is 123456, and the effect code equals (1*1+3*2+5*3+6*4+2*5+0*6) %10=6.
The security code of the generation correspondence that described step 3 is mentioned also generates X-Y scheme and mainly comprises and search the order that product database is waited for generating anti-counterfeiting code, finding security code generation unit after order is this order generating anti-counterfeiting code, and the security code generated is converted to corresponding X-Y scheme, and be saved in order the word document.Major function is to find according to order status the numbering that needs generating anti-counterfeiting code, the first step: order generates the product false proof code according to above-mentioned coding rule; Second step: the security code obtained according to step (1) generates X-Y scheme; The 3rd step: the typesetted word the inside that is saved in order of X-Y scheme.
The cryptographic algorithm of mentioning in described step 3 is defined as follows:
The definition of relevant character string:
The first step: encrypted character string: Cn={c0c1c2c3 ... ci ... cn-1}
Wherein: the sequence number that i is character in Cn (span 0~n-1);
N is Cn length.
Second step: encrypted characters string: Dn={d0d1d2d3 ... di ... dn-1}
Wherein: the sequence number that i is character in Dn (span 0~n-1);
N is Dn length.
The 3rd step: database table major key: Px={p0p1p2p3 ... pa ... px-1}
Wherein: the sequence number that i is character in Px (span 0~x-1);
X is Px length.
The 4th step: secret key character: K
The algorithm definition:
The generating algorithm of K:
If flag=is (p1+p2+p3+ ... pa+ ... px+i) %4
if?flag=0,K=0x01;
if?flag=1,K=0x02;
if?flag=2,K=0x04;
if?flag=3,K=0x08。
Operational symbol % meaning: C=A%B means that C is the remainder of A divided by B.
The generating algorithm of Dn in second step:
di=K^ci
Operational symbol ^ meaning: C=A^B mean C be A and B step-by-step with or result.
Further, carry out true and false inquiry in described step 6 and obtain unlocking cipher that four kinds of methods are arranged:
Method one: the X-Y scheme that the user claps the Product labelling top with other X-Y scheme identification softwares obtains the mobile phone client software download address that native system comprises, by accessed web page download client software, open the very false proof software of bat after downloading and installing, clap product false proof inquiry code on product false proof code label or the product inquiry code of unblanking, the user selects to send message search, system can send to user mobile phone by note by Query Result, the user select network inquiry result directly turn back to the software page;
Method two: send product false proof inquiry code on label or product and unblank inquiry code to the number on label, system can send to user mobile phone by note by Query Result;
Method three: dial hotline and inquired about according to Voice Navigation, system can be reported result to the user;
Method four: open the site home page on label, input product Antiforge inquiry code or the product inquiry code of unblanking, system can directly show result by the mode of dialog box.
The client X-Y scheme identification software of mentioning in described step 6 is to take full advantage of smart mobile phone, the automatic identify customer end software of X-Y scheme of the vision system of panel computer the exploitation of combination product Antiforge system, the client only need open client software and aim at the false proof X-Y scheme coding be printed on product false proof code label, client software can complete X-Y scheme identification automatically, having identified rear client software can eject the client and automatically select message search mode and network inquiry mode, the client selects inquiry mode according to demands of individuals, system is just carried out corresponding information feedback according to the content of inquiry.Such as, inquiry true or false of products information, system will be fed back true and false information and the production company of product; The unlocking cipher of inquiry product, system will be fed back the unlatching cryptographic service information of product; Inquiry be not the false proof X-Y scheme coding that native system is corresponding, system is will the feedback encoding rule incorrect, beware of imitations!
The true and false query script related in described step 6, primary screening is carried out according to coding rule after obtaining the security code that the user provides in backstage, gets rid of the security code that non-native system produces.Enter the product data library inquiry by first screening, at first check whether inquiry code or IP address are added into blacklist, described blacklist is mainly for the user of malice inquiry, at blacklist, do not check whether meet querying condition, native system same account of same number inquiry in hour can only be inquired about once, and this product is not also unblanked.
The process of obtaining unlocking cipher related in described step 6, primary screening is carried out according to coding rule after obtaining the inquiry code that the user provides in backstage, gets rid of the security code that non-native system produces.Enter the product data library inquiry by screening for the first time, at first check whether enquiry number or IP address are added into blacklist, blacklist is mainly for the user of malice inquiry, at blacklist, do not check whether meet querying condition, whether product drove lock, opened the number or the IP address that check this inquiry and followed unblank whether consistent, unanimously returned to the index code of unblanking, be not not return results, prompting has been unblanked.
The voice inquiry system related in described step 6 is inquired about security code by the mode of self-service or manual service.Self-service mode is mainly that the hotline by dialing system and providing carries out realizing that according to Voice Navigation true and false inquiry, unlocking cipher obtain, turn the function of manual service.When receiving the manual service phone, at voice inquiry system input security code, to click inquiry and can obtain Query Result, result shows below edit box.
The foregoing is only preferred embodiment of the present utility model; not in order to limit the utility model; all any modifications of doing within spirit of the present utility model and principle, be equal to and replace and improvement etc., within all should being included in protection domain of the present utility model.

Claims (4)

1. one kind is utilized machine vision and the product anti-fake system based on X-Y scheme, it is characterized in that, comprise coded lock, client device, telephone network, mobile communications network, Internet network, server end, security code inquiry and administrative unit, switch, order management module, product false proof code label generation unit;
Described server end is for placing site home page, message search interface, network inquiry interface;
Described coded lock is added in the opening part of anti-fake product;
Described client device is connected by the one or more and described server end in described telephone network, described mobile communications network, described Internet network;
Described switch is connected with described server end, for the exchange between data;
Described security code inquiry and administrative unit are connected with described switch;
Described order management module is connected with described switch, described product false proof code label generation unit respectively, described order management module sends security code information to described product false proof code label generation unit, described product false proof code label generation unit generates product false proof code label, and described product false proof code label includes X-Y scheme.
2. product anti-fake system as claimed in claim 1, is characterized in that, described client device comprises phone, mobile phone, panel computer, portable computer and PC.
3. product anti-fake system as claimed in claim 1, is characterized in that, described order management module comprises security code generation unit, order and contract management unit and expanded application unit;
Described security code generation unit is connected with described switch, for unblank inquiry code convert X-Y scheme to of the product false proof inquiry code according to security code coding rule generating anti-counterfeiting code and product;
Described order is connected with described switch with the contract management unit, for management enterprise, by the order of page download contract that enterprise is uploaded, is examined, and examines the instruction of qualified rear transmission production product false proof code label;
Described expanded application unit is connected with described switch, for expanding the function of order management module.
4. product anti-fake system as claimed in claim 1, it is characterized in that, also comprise the system management and maintenance module and the product database that are connected with described switch, described system management and maintenance module are for data are managed and periodic maintenance, and described product database is for the data of storage products information.
CN2013201805225U 2013-04-11 2013-04-11 Product anti-counterfeiting system employing machine vision and based on two dimensional drawing Expired - Lifetime CN203338404U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013201805225U CN203338404U (en) 2013-04-11 2013-04-11 Product anti-counterfeiting system employing machine vision and based on two dimensional drawing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013201805225U CN203338404U (en) 2013-04-11 2013-04-11 Product anti-counterfeiting system employing machine vision and based on two dimensional drawing

Publications (1)

Publication Number Publication Date
CN203338404U true CN203338404U (en) 2013-12-11

Family

ID=49707068

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013201805225U Expired - Lifetime CN203338404U (en) 2013-04-11 2013-04-11 Product anti-counterfeiting system employing machine vision and based on two dimensional drawing

Country Status (1)

Country Link
CN (1) CN203338404U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103218723A (en) * 2013-04-11 2013-07-24 深圳大学 Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure
CN110533122A (en) * 2019-09-03 2019-12-03 程烨 A kind of shoes antifalsification label preparation method, device, server and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103218723A (en) * 2013-04-11 2013-07-24 深圳大学 Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure
CN103218723B (en) * 2013-04-11 2017-02-01 深圳市诚品鲜智能科技股份有限公司 Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure
CN110533122A (en) * 2019-09-03 2019-12-03 程烨 A kind of shoes antifalsification label preparation method, device, server and storage medium

Similar Documents

Publication Publication Date Title
CN103218723B (en) Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure
CN108520293A (en) A kind of product false proof source tracing method, device, server and storage medium
CN102779284B (en) RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like
CN108964905A (en) A kind of safe and efficient block chain implementation method
CN101247532B (en) Electrical wiring schedule information management system
CN106779527A (en) Commodity circulation information inquiry system and method based on block chain
CN101771541B (en) Secret key certificate generating method and system for home gateway
CN100531365C (en) IPTV authentication and authorization method, server and system
CN110473078A (en) Information processing method, device, gateway server and medium in invoice issuing
CN112085417A (en) Industrial Internet identification distribution and data management method based on block chain
CN107133777A (en) A kind of establishment of electronic contract, signature method and system
CN104618334A (en) Method and system for generating and verifying dynamic two-dimensional code
CN105930892A (en) Variable logo two-dimensional code anti-counterfeiting method and system
CN104125230B (en) A kind of short message certification service system and authentication method
WO2011026326A1 (en) Tracing and recalling system for managing commodity circulation based on internet
CN102571355B (en) Method and device for importing secret key without landing
CN107453874A (en) Digital sealing and its generation method, service request and offer method and electronic equipment
CN107992759A (en) Realize device, method and the computer-readable recording medium of E-seal
CN102984260A (en) Internet account number and password information management method and system
CN102708184A (en) Method for inquiring anti-fake two-dimension code of coded lock
CN203338404U (en) Product anti-counterfeiting system employing machine vision and based on two dimensional drawing
CN102891841B (en) The method of a kind of Web bank Account lockout, device and system
CN106504007A (en) A kind of commodity counterfeit prevention management system based on NFC electronic tags
CN112906067A (en) Block chain data preservation method based on e-mail transfer mode
CN107437188A (en) A kind of method that fake certification is quickly realized using bar code

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20131211