CN206961156U - The retrospect of jewelry identity monitors material evidence integrally false proof external member - Google Patents
The retrospect of jewelry identity monitors material evidence integrally false proof external member Download PDFInfo
- Publication number
- CN206961156U CN206961156U CN201720800001.3U CN201720800001U CN206961156U CN 206961156 U CN206961156 U CN 206961156U CN 201720800001 U CN201720800001 U CN 201720800001U CN 206961156 U CN206961156 U CN 206961156U
- Authority
- CN
- China
- Prior art keywords
- jewelry
- identity
- retrospect
- box
- fake
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The retrospect of jewelry identity monitors material evidence integrally false proof external member;Anti-fake box A covers (3) and anti-fake box B lids (4) mutually fasten and form anti-fake box or Carrier box, and sealing label (7) is pasted on gap is combined, RFID RF identification chips are installed on sealing label (7), show stand (10) mounted antennas (11), RFID RFID communications be present between show stand (10) and sealing label (7);Anti-fake box is equipped with unique corresponding jewelry identity traceability system tag card (12);Two-dimension identification code is printed with jewelry identity traceability system tag card (12), client rs PC/mobile phone logs in jewelry identity traceability system by reading two-dimension identification code.By being mutually related, multiple anti-fake structure is improved, and the material evidence one multidimensional binding of jewelry identity is effectively ensured, support is comprehensive to realize jewelry identity and retrospect, securely and reliably, is easy to show and carries.
Description
Technical field
The utility model belongs to anti-counterfeit recognition and the identity trace-back technique of a kind of jewelry product, and especially jewelry identity chases after
Trace back and monitor material evidence integrally false proof external member.
Background technology
For a long time, although jewelry is as important luxury goods, but existence information is opaque always for its industry, tax revenue
The bottleneck of development high, clearance is difficult, trading efficiency is low, financialization degree is low, credit and sincerity is not high, this phenomenon add to entity
Work, trade, stock is derivative and financial development causes serious resistance to hinder.Must professional knowledge and public's letter based on Gems testing
Appoint, conventional method generally provides certificate by the appraisal organization of specialty.
In jewellery sector, it is management precisely in place to be worth the major issue that expensive jewelry faces, and is entirely being flowed
The safety problem such as false proof, antitheft by journey and during holding.To solve the above problems, the sector is taken inventory in jewelry piece in recent years
Wireless radio frequency discrimination RFID (Radio Frequency Identification) technology, also known as RFID electronics is introduced in management
Label, it is a kind of wireless communication technology, specific objective can be identified by radio signal and read and write related data.Match somebody with somebody to jewelry piece
RFID is put, as the identity of identification jewelry piece, due to the uniqueness of ID identification codes, passes through reading electronic labels
The read write line and information management server of information complete jewelry piece take inventory and in-out-storehouse management.In view of the foregoing, exist at present
Problems be present in jewelry piece management, collection and intermediate links:(1) in jewelry piece management, although applying RFID electronics marks
Label, but RFID with jewelry piece is linked together using readily removable, delicate materials such as paper string, plastic ties or cotton ropes,
Its drawback is due to the free part that RFID is independently of outside jewelry piece, easily produces jewelry because of artificial mistake
The friendship of part mixes, and easily exchanges;(2) in addition, the packing box that existing jewelry piece uses can be opened and closed repeatedly, jewelry piece exists in addition
Without identity label in sales process, so, in mailing process, such as there are package failure, article abnormal conditions, the fact can not be argued out
And trigger the dispute of businessman and client;After selling, jewelry holder collects process in jewelry piece, it is also difficult to which guarantee such as is stealthily substituted at the meaning
Outside, or even it is not that original also has no way of finding;The jewelry piece enters back into market and carries out second-circulation process in the future, same because nothing
Identity label, and Authenticate afresh is needed, the genuine piece of script is also faced the complicated process for debating the true and false again.How the pipe of jewelry piece is solved
Manage mistake, anti-pseudo problem, reduce dispute, realize management, marketing scientific and precise and promotes article second-circulation, be client with
To facilitate, turn into industry concerned issue.
Utility model content
The purpose of this utility model is to provide jewelry identity retrospect monitoring material evidence integrally false proof external member, in management, sale, receives
It is easy to confirm the article true and false during Tibetan, to promote the circulation of article to provide facility.
The purpose of this utility model will be realized by following technical measures:Anti-fake box A is covered and anti-fake box B lids mutually fasten
Anti-fake box or Carrier box are formed, and sealing label is pasted on gap is combined, is signed in sealing mark and the knowledge of RFID radio frequencies is installed
Other chip, for anti-fake box socket in the rack slot on the upside of base, anti-fake box at least has transparency window on one side, and base is placed in displaying
Above platform, show stand mounted antennas, RFID RFID communications be present between show stand and sealing label;Anti-fake box is equipped with only
Jewelry identity traceability system tag card corresponding to one;Two-dimension identification code, client are printed with jewelry identity traceability system tag card
End PC/ mobile phones log in jewelry identity traceability system by reading two-dimension identification code.
Especially, jewelry identity traceability system framework includes front end layer, application layer, cushion, service layer and data Layer, its
Middle service layer is further divided into business service and the part of infrastructure service two, and data Layer is further divided into type and the part of content two;
Corresponding implementation is respectively Html5css3 modularizations JS, SpringMVC framework, Redis clusters, trade center internet
Development Framework;Further, front end layer client relies on the carry out Http request/responses of PC/ mobile phones, and application layer carries out parametric solution
Analysis/session management/Webservice interface communications, cushion rely on Redis and carry out session/ data dictionaries/menu/authority
Operation, service layer relies on micro services registration center or unification monitor supervision platform carries out customer analysis/content analysis, commercial analysis/number
According to service, activity analysis/planning engine service, index analysis/monitoring service, order analyzing/information service, data Layer, which relies on, to close
It is that database accesses order data, access business datum and basic data by Mysql;Jewelry identity traceability system is in system network
In network logical relation, data Layer is formed by least two Mysql-cluster, further, it is upwardly through at least one
Nginx LB-M connect front end layer WEB with an at least Nginx LB-S, and front end layer WEB is upwards further by Nginx LB-M
Client User is connected by internet with Nginx LB-S.
Especially, jewelry and bracket are disposed in anti-fake box.
Especially, monitoring sensor is installed on base or show stand.
Especially, anti-fake box A lids and relative two inwalls of anti-fake box B lids be correspondingly arranged along faying face block tongue, card key and
Corresponding keyway, wherein card key are that outer wall is embedded in location structure entirely, and block tongue 5 is that at least one side outer wall opens the positioning knot exposed
Structure.
Especially, base is in circular cone shape, and rack slot has been downwardly concaved angular groove face.
Especially, radio-frequency recognition system of the installation connection including antenna, radio-frequency recognition system are read automatically on show stand
The RFID on sealing label and jewelry identity traceability system tag card is taken, wherein, radio-frequency recognition system connects with database equipment
Connect.
Especially, installation retrospect identification certificate, the identification certificate use Mifare on jewelry identity traceability system tag card
Card, capacity is 1K positions EEPROM, is divided into 16 sectors, and each sector is 4 pieces, every piece of 16 bytes, using block as access unit.Often
There are one group of independent password and access control in individual sector.Every card has unique 32 TID sequence numbers.
The advantages of the utility model and effect:By being mutually related, multiple anti-fake structure is improved, and jewelry body is effectively ensured
Part material evidence one multidimensional binding, support it is comprehensive realizes jewelry identity and retrospect, be easy to jewelry physics fidelity mark and
Jewelry physical bodies safeguard protection, false proof whole process management and control of tracing to the source is carried out to the Life cycle of product, avoids being scattered or obscures, have
Beneficial to preventing to go wrong in process of exchange, it is easy to found the abnormal situation in time.Securely and reliably, it is easy to show and carry.
Brief description of the drawings
Fig. 1 is the system physical view of the utility model embodiment 1.
Fig. 2 is the grid logical view of the utility model embodiment 1.
Fig. 3 is the show stand and anti-fake box external member schematic diagram in the utility model embodiment 1.
Fig. 4 is the anti-fake box open mode structural representation in the utility model embodiment 1.
Fig. 5 is the understructure schematic diagram in the utility model embodiment 1.
Reference includes:
Base 1, rack slot 2, anti-fake box A lids 3, anti-fake box B lids 4, block tongue 5, transparency window 6, sealing label 7, jewelry and bracket
8th, card key 9, show stand 10, antenna 11, jewelry identity traceability system tag card 12.
Embodiment
The utility model includes:Jewelry identity traceability system, client rs PC/mobile phone, sealing label 7, show stand 10 and pearl
Precious identity traceability system tag card 12.
For gem and jade finished product, semi-finished product or naked stone jewelry, jewelry or with its inseparable accessory or anti-fake box,
Anti-fake box is placed on show stand 10, sealing label 7 is pasted in anti-fake box aperture slots, between show stand 10 and sealing label 7
Identification and distance change sensing monitoring judgement relation are established, meanwhile, jewelry or it is placed in its inseparable accessory anti-
In pseudo- box, jewelry or unique corresponding jewelry identity traceability system tag card 12 is equipped with its inseparable accessory, sealed
RFID RF identification chips are installed on label 7, two-dimension identification code, client are printed with jewelry identity traceability system tag card 12
End PC/ mobile phones directly read jewelry product identity information or login pearl by reading RFID RF identification chips and two-dimension identification code
Precious identity traceability system verification.
The utility model is described in further detail with reference to the accompanying drawings and examples.
Embodiment 1:As shown in Figure 1, jewelry identity traceability system framework includes front end layer, application layer, cushion, service
Layer and data Layer, wherein service layer are further divided into business service and the part of infrastructure service two, and data Layer is further divided into type
With the part of content two;Corresponding implementation be respectively Html5css3 modularizations JS, SpringMVC framework, Redis clusters, mutually
Networking Development Framework;Further, front end layer client relies on the carry out Http request/responses of PC/ mobile phones, and application layer is joined
Number parsing/session management/Webservice interface communications, cushion dependence Redis progress session/ data dictionaries/menu/
Authority is run, and service layer relies on micro services registration center or unification monitor supervision platform carries out customer analysis/content analysis, commodity point
Analysis/data, services, activity analysis/planning engine service, index analysis/monitoring service, order analyzing/information service, data Layer
Dependence database accesses order data, access business datum and basic data by Mysql.
In foregoing, as shown in Figure 2, jewelry identity traceability system is in grid logical relation, by least two
Mysql-cluster forms data Layer, and further, it is upwardly through an at least Nginx LB-M and an at least Nginx
LB-S connections front end layer WEB, front end layer WEB are further connected by Nginx LB-M with Nginx LB-S by internet upwards
Client User.
In foregoing, as shown in Figure 3, anti-fake box A lids 3 and anti-fake box B lids 4 mutually fasten and form anti-fake box or Carrier box,
And sealing label 7 is pasted on gap is combined, anti-fake box socket is in the rack slot 2 of the upside of base 1, anti-fake box at least one side
On have a transparency window 6, base 1 is placed in the top of show stand 10, the mounted antennas 11 of show stand 10, show stand 10 and sealing label 7
Between RFID RFID communications be present.Jewelry and bracket 8 are disposed in anti-fake box.Anti-fake box is equipped with unique corresponding jewelry body
Part traceability system tag card 12.Further, monitoring sensor is installed on base 1 or show stand 10, monitor state is occurring
Abnormal alarm.
In foregoing, as shown in Figure 4, anti-fake box A lids 3 and anti-fake box B lids 4 are correspondingly arranged with respect to two inwalls along faying face
Block tongue 5, card key 9 and corresponding keyway, wherein card key 9 are that outer wall is embedded in location structure entirely, and block tongue 5 is that at least one side outer wall is opened
Put the location structure exposed.When anti-fake box A lids 3 and anti-fake box B lids 4 fasten relatively, sealing label 7 is pasted onto card key 9 and is embedded in
The anti-fake box A lids 3 and anti-fake box B lids 4 for positioning side are fastened on gap.Sealing label 7 is not being pasted or has torn off sealing label 7
Under conditions of, from the side can not damaged structure separation anti-fake box A lids 3 and anti-fake box B lids 4.
In foregoing, as shown in Figure 5, base 1 is in circular cone shape, and rack slot 2 has been downwardly concaved angular groove face.
In foregoing, seal in label 7 and include RFID chip, the RFID chip type:Philips I CODE SLI;Storage
Capacity 1024bit, 64bit unique ID sequence number;Working frequency 13.56MHz;2.5~10cm of reading/writing distance;Access time 1~
2ms;Operating temperature:- 20 DEG C~55 DEG C;Erasing and writing life>100,000 times;Data preserve>10 years;Appearance and size iso standard card
85.6x54x0.80mm;Encapsulating material is PVC, PET, PETG, 0.13mm copper cash;Execution standard ISO15693.
The read-write theory of sealing label 7 includes:The electric part of card is only made up of an antenna and ASIC.Antenna:Card
The antenna of piece includes at least two groups of coiled wire-wound coils, is suitably packaged in IS0 cards.ASIC:The ASIC of card is by a 106KB ripple
The high speed RF interfaces of special rate, a control unit and a 8K positions EEPROM composition operation principle:Read write line sends out one group to M1 cards
The electromagnetic wave of fixed frequency, there is a LC series resonant circuit in card, the frequency that its frequency writes device transmitting with news is identical, in electricity
Under the excitation of magnetic wave, LC resonance circuits produce resonance, so that there is electric charge in electric capacity, in the other end of this electric capacity, are connected to
The electronic pump of one one-way conduction, the electric charge in electric capacity is sent in another electric capacity and stored, when the electric charge accumulated reaches 2V
When, this electric capacity can provide operating voltage as power supply for other circuits, data in card be launched or accessed the number of read write line
According to.
Seal the service application scene citing of label 7:
Retrospect identity certificate includes two each several parts, and it is the frangible labels of adhesive sticker RFID that Part I, which seals label 7, the
Two parts are to fasten the naked stone Carrier box formed by anti-fake box A lids 3 and anti-fake box B lids 4.RFID label tag card sector is divided into
Reserved (reserved area), TID (mark identifier), EPC (electronic product code), the classes of USER (user) four, wherein TID are systems
Added during making, TID UID forgeries technical sophistication cost is larger, and default acquiescence TID is non-rewritable unique encodings.
The TID in RFID chip and the retrospect identification number in jewelry identity traceability system tag card 12 are bound on sealing label 7,
And retrospect identification number is write in RFID chip.When the NFC mobile phone using Installation Validation APP is verified, mobile phone
NFC function can identify sealing label 7RFID chips in TID numbering, inquire about and whether contain in the database of gem and jade
The TID numberings of the RFID, after confirming that TID numberings are present, then the retrospect identification number of the write-in in RFID chip is verified.When
When TID is numbered and corresponding retrospect identification number is consistent with the binding relationship in database, you can think that the retrospect identity certificate is
Very, and show that correspondence traces the tracing information of identification number;Naked stone Carrier box can be very good to preserve naked stone and do not influence to appreciate and
Detection, according to the different value of naked stone, can customize different size, the naked stone Carrier box of unlike material.When in use, first will be naked
Stone is placed in naked stone Carrier box, and anti-fake box A lids 3 and anti-fake box B are covered with the RFID frangible labels that sealing label 7 is adhesive sticker
4 fastening aperture slots seal, it is ensured that " thing one is demonstrate,proved " and " material evidence does not separate ";If tear to pieces sealing label 7, wherein RFID
Failure will be damaged;If destroying anti-fake box A lids 3 and anti-fake box B lids 4 using other modes, article also will and be demonstrate,proved in Carrier box
Book separates;Case above will all be identified as destroying the principle of " thing one is demonstrate,proved ", not ensure to trace effect.
In foregoing, radio-frequency recognition system of the installation connection including antenna 11 on show stand 10, radio-frequency recognition system is certainly
The dynamic RFID read on sealing label 7 and jewelry identity traceability system tag card 12, wherein, radio-frequency recognition system and database
Equipment connects.Antenna 11 is external base station circular polarisation microwave antenna, surface antenna structure, hand circular polarization mode, 8dbi gains, frequency
Rate 902-925MHz, using long feeder line N female cable connectors.
The radio-frequency recognition system is one-to-many identifying system, and the radio communication between system is using launching radio frequency letter
Number, realize that contactless information transmission completes identification process by Space Coupling.
Antenna in the radio-frequency recognition system is broadly divided into two classes:Label antenna and reading and writing device antenna.Label antenna is pacified
It is client on sealing label 7 and jewelry identity traceability system tag card 12, and reading and writing device antenna is installed in show stand
Antenna 11 on 10, to identify end.Because space of the label antenna on different identified objects is pointed to and can not fixed, therefore
It is required that reading and writing device antenna is circular polarized antenna, will not be due to polarization mismatch when the sensing of label antenna changes so as to realize
And it can not be identified.So, it can be encouraged as quantity, miscellaneous label antenna using linear polarization mode, reduce it
Cost and technical difficulty, increase service life.In engineer applied, because microstrip antenna is easy to process and design, therefore typically
It is used to realize reading and writing device antenna and label antenna;In addition, also there is the application using helical antenna as reading and writing device antenna, still
Because helical antenna size is big, the helical antenna of low section circular polarisation can be realized instead of conventional metals floor using EBG structures.
In foregoing, installation retrospect identification certificate, the identification certificate use on jewelry identity traceability system tag card 12
Mifare cards, capacity are 1K positions EEPROM, are divided into 16 sectors, and each sector is 4 pieces, every piece of 16 bytes, using block as access
Unit.There are one group of independent password and access control in each sector.Every card has unique 32 TID sequence numbers.With anti-collision
Mechanism, support more card operations.Non-transformer, antenna is carried, include control extension logical sum communication logic.Data retention period is
10 years, rewritable 100,000 times, read unlimited.Working frequency:13.56MHz communications protocol:ISO14443A, traffic rate:
106Kbps。
The read-write theory of jewelry identity traceability system tag card 12 includes:Electric part is made up of an antenna and ASIC.My god
Line is some groups of coiled wire-wound coils, is suitably packaged in IS0 cards.ASIC is by a 106KB baud rate high speed RF interface, a control
Unit processed and a 8K positions EEPROM composition;Read write line sends out the electromagnetic wave of one group of fixed frequency to M1 cards, has a LC in card
Series resonant circuit, the frequency that its frequency writes device transmitting with news is identical, and under the excitation of electromagnetic wave, LC resonance circuits produce altogether
Shake, so that there is electric charge in electric capacity, in the other end of this electric capacity, the electronic pump of an one-way conduction is connected to, by electric capacity
Electric charge be sent in another electric capacity and store, when the electric charge accumulated reaches 2V, this electric capacity can be other circuits as power supply
Operating voltage is provided, data in card are launched or accessed the data of read write line.
It is with tracing in tag card by the TID in RFID chip that jewelry identity traceability system tag card 12, which traces identity certificate,
Retrospect identification number bound, and will retrospect identification number write-in RFID chip in.When the NFC hands using Installation Validation APP
When machine is verified, the NFC function of mobile phone can be numbered with the TID in identification chip, be inquired about in the database of gem and jade
Whether the TID containing the RFID is numbered, and after confirming that TID numberings are present, then the retrospect identification number of the write-in in RFID chip is entered
Row verification.When TID numberings and corresponding retrospect identification number consistent with the binding relationship in database, you can think the retrospect mark
It is true to know certificate, and shows the tracing information of corresponding retrospect identification number.
In the present embodiment, naked stone Carrier box application can be used as after anti-fake box A lids 3 and the fastening of anti-fake box B lids 4.
In the utility model embodiment, base 1 is in frustum, mean outside diameter 47.6mm, high 15mm, rack slot 2 long 28mm, wide
20mm.Anti-fake box A lids 3 and anti-fake box B 4 appearance and sizes of lid are identical, and high into square flask shape, i.e. length of side 70mm, the inner chamber length of side is wide
62mm, wall thickness 4mm, block tongue 5 long 24mm, high 5mm, thick 2mm;Card key 9 long 12mm, high 1.8mm, thick 1.2mm, corresponding card key flute length
12mm, wide 1.2mm, deep 3.0mm.10 square mesa-shaped of show stand, the length of side 255mm, high 31mm.
In this application new embodiment, above-mentioned size more needs to carry out scaling;Material scope covers common modeling
Material, ABS plastic, wooden, metal etc.;Transparent window materials need all-transparent, and possess good firmness.
In the utility model, by be mutually related multiple anti-fake identification combine be effectively ensured jewelry identity retrospect and
Material evidence is integrally bound, comprehensive to realize jewelry identity, jewelry physics fidelity mark and jewelry physical bodies safeguard protection:1) remember
It is loaded in gem and jade certificate true and false discrimination on sealing label 7 and jewelry identity traceability system tag card 12;2) adhesive sticker of label 7 is sealed
The frangible Tag Radio Frequencies of RFID are distinguish true from false discrimination;3) the adhesive sticker RFID of label 7 frangible label, anti-fake box A lids 3 and anti-fake box are sealed
B lids 4 fasten integrality discrimination;4) impressing pattern and the naked stone of jewelry in anti-fake box are direct on jewelry identity traceability system tag card 12
Visual verification, and, seal physical label on label 7 and jewelry identity traceability system tag card 12 including Quick Response Code including with
Mobile phone is verified;5) the fastening anti-fake box A lids 3 of sealing label 7 are sealed up and the RFID between anti-fake box B lids 4 and show stand 10 is read
Identify, make an inventory automatically, away from alarm and safeguard protection.
It is described above, only it is preferred embodiment of the present utility model, not the technical solution of the utility model is made any
Formal limitation.Every any simple modification made according to the technical essence of the utility model to above example, it is equal
Change and modification, in the range of still falling within technical solutions of the utility model.
Claims (7)
1. the retrospect of jewelry identity monitors material evidence integrally false proof external member;Characterized in that, anti-fake box A lids (3) and anti-fake box B lids (4)
Mutually fasten and form anti-fake box or Carrier box, and sealing label (7) is pasted on gap is combined, pacify on sealing label (7)
Equipped with RFID RF identification chips, in rack slot (2) of the anti-fake box socket on the upside of base (1), anti-fake box at least has on one side
Transparency window (6), base (1) are placed in above show stand (10), show stand (10) mounted antennas (11), show stand (10) and envelope
RFID RFID communications be present between mouth label (7);Anti-fake box is equipped with unique corresponding jewelry identity traceability system tag card
(12);Two-dimension identification code is printed with jewelry identity traceability system tag card (12), client rs PC/mobile phone is known by reading two dimension
Other code logs in jewelry identity traceability system.
2. jewelry identity retrospect as claimed in claim 1 monitors material evidence integrally false proof external member, it is characterised in that jewelry identity chases after
System architecture of tracing back includes front end layer, application layer, cushion, service layer and data Layer, and wherein service layer is further divided into business clothes
Business and the part of infrastructure service two, data Layer are further divided into type and the part of content two;Corresponding implementation is respectively
Html5css3 modularizations JS, SpringMVC framework, Redis clusters, internet Development Framework;Further, front end layer client
End relies on the carry out Http request/responses of PC/ mobile phones, and application layer carries out Parameter analysis of electrochemical/session management/Webservice interfaces and led to
News, cushion rely on Redis and carry out session/ data dictionaries/menu/authority operation, and service layer relies on micro services registration center
Or unification monitor supervision platform carry out customer analysis/content analysis, commercial analysis/data, services, activity analysis/planning engine service,
Index analysis/monitoring service, order analyzing/information service, data Layer dependence database access order numbers by Mysql
According to, access business datum and basic data;Jewelry identity traceability system is in grid logical relation, by least two
Mysql-cluster forms data Layer, and further, it is upwardly through an at least Nginx LB-M and an at least Nginx
LB-S connections front end layer WEB, front end layer WEB are further connected by Nginx LB-M with Nginx LB-S by internet upwards
Client User.
3. jewelry identity retrospect as claimed in claim 1 monitors material evidence integrally false proof external member, it is characterised in that in anti-fake box
Dispose jewelry and bracket (8).
4. jewelry identity retrospect as claimed in claim 1 monitors material evidence integrally false proof external member, it is characterised in that in base (1)
Or monitoring sensor is installed on show stand (10).
5. jewelry identity retrospect as claimed in claim 1 monitors material evidence integrally false proof external member, it is characterised in that anti-fake box A is covered
(3) and anti-fake box B lids (4) are correspondingly arranged block tongue (5), card key (9) and corresponding keyway along faying face with respect to two inwalls, its
Middle card key (9) is that outer wall is embedded in location structure entirely, and block tongue (5) is that at least one side outer wall opens the location structure exposed.
6. the integral false proof external member of jewelry identity as claimed in claim 1 retrospect monitoring material evidence, it is characterised in that base (1) is in
Circular cone shape, rack slot (2) have been downwardly concaved angular groove face.
7. jewelry identity retrospect as claimed in claim 1 monitors material evidence integrally false proof external member, it is characterised in that show stand (10)
Radio-frequency recognition system of the upper installation connection including antenna (11), radio-frequency recognition system read sealing label (7) and pearl automatically
RFID on precious identity traceability system tag card (12), wherein, radio-frequency recognition system is connected with database equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720800001.3U CN206961156U (en) | 2017-07-04 | 2017-07-04 | The retrospect of jewelry identity monitors material evidence integrally false proof external member |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720800001.3U CN206961156U (en) | 2017-07-04 | 2017-07-04 | The retrospect of jewelry identity monitors material evidence integrally false proof external member |
Publications (1)
Publication Number | Publication Date |
---|---|
CN206961156U true CN206961156U (en) | 2018-02-02 |
Family
ID=61384147
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201720800001.3U Active CN206961156U (en) | 2017-07-04 | 2017-07-04 | The retrospect of jewelry identity monitors material evidence integrally false proof external member |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN206961156U (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109377246A (en) * | 2018-10-29 | 2019-02-22 | 江苏茴香豆网络科技有限公司 | A kind of jewelry certificate false proof intelligent identifying system |
IT201800005739A1 (en) * | 2018-05-25 | 2019-11-25 | Recognition system for jewels and precious objects | |
WO2021074026A1 (en) * | 2019-10-16 | 2021-04-22 | Giovanni Baggio | System and computer program for the management of objects |
-
2017
- 2017-07-04 CN CN201720800001.3U patent/CN206961156U/en active Active
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IT201800005739A1 (en) * | 2018-05-25 | 2019-11-25 | Recognition system for jewels and precious objects | |
CN109377246A (en) * | 2018-10-29 | 2019-02-22 | 江苏茴香豆网络科技有限公司 | A kind of jewelry certificate false proof intelligent identifying system |
CN109377246B (en) * | 2018-10-29 | 2022-08-26 | 江苏茴香豆网络科技有限公司 | Intelligent jewelry certificate anti-counterfeiting identification system |
WO2021074026A1 (en) * | 2019-10-16 | 2021-04-22 | Giovanni Baggio | System and computer program for the management of objects |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101089871B (en) | System and method for antiforge of article with certificate based on radio frequency technology | |
US20070109103A1 (en) | Commercial product activation and monitoring using radio frequency identification (RFID) technology | |
CN206961156U (en) | The retrospect of jewelry identity monitors material evidence integrally false proof external member | |
CN107316075B (en) | Jewelry identity traceability material evidence integrated multidimensional binding anti-counterfeiting method and jewelry identity traceability material evidence integrated multidimensional binding anti-counterfeiting kit | |
US20160027022A1 (en) | Consumer Authentication Systems and Methods | |
CN103473684A (en) | Barreled water anti-counterfeiting source tracing system | |
CN103136682A (en) | System using cover type label to achieve counterfeiting and method | |
CN106934639A (en) | A kind of false proof retroactive method of paper diaper based on RFID and Quick Response Code | |
CN100405394C (en) | Contactless type communication tag, portable tag reader, and its method | |
CN101499138A (en) | Anti-counterfeit apparatus and method for cigarette by passive radio frequency label | |
CN102208043A (en) | Wine anti-counterfeiting identification method based on electronic tag and product information association processing | |
CN202383722U (en) | Internet-connected stamp anti-counterfeiting system | |
KR20140079555A (en) | Check system of authenticity product | |
CN102219091A (en) | Intelligent anti-fake method of wine package | |
CN203573357U (en) | Artwork authenticity identification system | |
CN103455927A (en) | Dark-red enameled pottery anti-counterfeiting recognition system based on RFID | |
CN204631936U (en) | Calligraphy artwork Antiforge system | |
CN106485181A (en) | A kind of pair of label anti-counterfeit method | |
CN2662362Y (en) | Multifunctional false proof marker with radio frequency identification | |
CN203490738U (en) | RFID-based dark-red enameled pottery anti-counterfeiting recognition system | |
CN103150651A (en) | Individual commodity authentication and identification device, system and method | |
KR100497630B1 (en) | Portable RF-tag reader for verifying a genuine article | |
CN210348529U (en) | NFC anti-counterfeiting chip capable of achieving tamper-proof detection function through activatable power source | |
CN201845347U (en) | Cigarette anti-counterfeiting device | |
CN106599952A (en) | Method and device for acquiring article information based on electronic tag |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant |