CN206961156U - The retrospect of jewelry identity monitors material evidence integrally false proof external member - Google Patents

The retrospect of jewelry identity monitors material evidence integrally false proof external member Download PDF

Info

Publication number
CN206961156U
CN206961156U CN201720800001.3U CN201720800001U CN206961156U CN 206961156 U CN206961156 U CN 206961156U CN 201720800001 U CN201720800001 U CN 201720800001U CN 206961156 U CN206961156 U CN 206961156U
Authority
CN
China
Prior art keywords
jewelry
identity
retrospect
box
fake
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201720800001.3U
Other languages
Chinese (zh)
Inventor
陈昱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Precious Jade Trading Center Co Ltd
Original Assignee
Shanghai Precious Jade Trading Center Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Precious Jade Trading Center Co Ltd filed Critical Shanghai Precious Jade Trading Center Co Ltd
Priority to CN201720800001.3U priority Critical patent/CN206961156U/en
Application granted granted Critical
Publication of CN206961156U publication Critical patent/CN206961156U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The retrospect of jewelry identity monitors material evidence integrally false proof external member;Anti-fake box A covers (3) and anti-fake box B lids (4) mutually fasten and form anti-fake box or Carrier box, and sealing label (7) is pasted on gap is combined, RFID RF identification chips are installed on sealing label (7), show stand (10) mounted antennas (11), RFID RFID communications be present between show stand (10) and sealing label (7);Anti-fake box is equipped with unique corresponding jewelry identity traceability system tag card (12);Two-dimension identification code is printed with jewelry identity traceability system tag card (12), client rs PC/mobile phone logs in jewelry identity traceability system by reading two-dimension identification code.By being mutually related, multiple anti-fake structure is improved, and the material evidence one multidimensional binding of jewelry identity is effectively ensured, support is comprehensive to realize jewelry identity and retrospect, securely and reliably, is easy to show and carries.

Description

The retrospect of jewelry identity monitors material evidence integrally false proof external member
Technical field
The utility model belongs to anti-counterfeit recognition and the identity trace-back technique of a kind of jewelry product, and especially jewelry identity chases after Trace back and monitor material evidence integrally false proof external member.
Background technology
For a long time, although jewelry is as important luxury goods, but existence information is opaque always for its industry, tax revenue The bottleneck of development high, clearance is difficult, trading efficiency is low, financialization degree is low, credit and sincerity is not high, this phenomenon add to entity Work, trade, stock is derivative and financial development causes serious resistance to hinder.Must professional knowledge and public's letter based on Gems testing Appoint, conventional method generally provides certificate by the appraisal organization of specialty.
In jewellery sector, it is management precisely in place to be worth the major issue that expensive jewelry faces, and is entirely being flowed The safety problem such as false proof, antitheft by journey and during holding.To solve the above problems, the sector is taken inventory in jewelry piece in recent years Wireless radio frequency discrimination RFID (Radio Frequency Identification) technology, also known as RFID electronics is introduced in management Label, it is a kind of wireless communication technology, specific objective can be identified by radio signal and read and write related data.Match somebody with somebody to jewelry piece RFID is put, as the identity of identification jewelry piece, due to the uniqueness of ID identification codes, passes through reading electronic labels The read write line and information management server of information complete jewelry piece take inventory and in-out-storehouse management.In view of the foregoing, exist at present Problems be present in jewelry piece management, collection and intermediate links:(1) in jewelry piece management, although applying RFID electronics marks Label, but RFID with jewelry piece is linked together using readily removable, delicate materials such as paper string, plastic ties or cotton ropes, Its drawback is due to the free part that RFID is independently of outside jewelry piece, easily produces jewelry because of artificial mistake The friendship of part mixes, and easily exchanges;(2) in addition, the packing box that existing jewelry piece uses can be opened and closed repeatedly, jewelry piece exists in addition Without identity label in sales process, so, in mailing process, such as there are package failure, article abnormal conditions, the fact can not be argued out And trigger the dispute of businessman and client;After selling, jewelry holder collects process in jewelry piece, it is also difficult to which guarantee such as is stealthily substituted at the meaning Outside, or even it is not that original also has no way of finding;The jewelry piece enters back into market and carries out second-circulation process in the future, same because nothing Identity label, and Authenticate afresh is needed, the genuine piece of script is also faced the complicated process for debating the true and false again.How the pipe of jewelry piece is solved Manage mistake, anti-pseudo problem, reduce dispute, realize management, marketing scientific and precise and promotes article second-circulation, be client with To facilitate, turn into industry concerned issue.
Utility model content
The purpose of this utility model is to provide jewelry identity retrospect monitoring material evidence integrally false proof external member, in management, sale, receives It is easy to confirm the article true and false during Tibetan, to promote the circulation of article to provide facility.
The purpose of this utility model will be realized by following technical measures:Anti-fake box A is covered and anti-fake box B lids mutually fasten Anti-fake box or Carrier box are formed, and sealing label is pasted on gap is combined, is signed in sealing mark and the knowledge of RFID radio frequencies is installed Other chip, for anti-fake box socket in the rack slot on the upside of base, anti-fake box at least has transparency window on one side, and base is placed in displaying Above platform, show stand mounted antennas, RFID RFID communications be present between show stand and sealing label;Anti-fake box is equipped with only Jewelry identity traceability system tag card corresponding to one;Two-dimension identification code, client are printed with jewelry identity traceability system tag card End PC/ mobile phones log in jewelry identity traceability system by reading two-dimension identification code.
Especially, jewelry identity traceability system framework includes front end layer, application layer, cushion, service layer and data Layer, its Middle service layer is further divided into business service and the part of infrastructure service two, and data Layer is further divided into type and the part of content two; Corresponding implementation is respectively Html5css3 modularizations JS, SpringMVC framework, Redis clusters, trade center internet Development Framework;Further, front end layer client relies on the carry out Http request/responses of PC/ mobile phones, and application layer carries out parametric solution Analysis/session management/Webservice interface communications, cushion rely on Redis and carry out session/ data dictionaries/menu/authority Operation, service layer relies on micro services registration center or unification monitor supervision platform carries out customer analysis/content analysis, commercial analysis/number According to service, activity analysis/planning engine service, index analysis/monitoring service, order analyzing/information service, data Layer, which relies on, to close It is that database accesses order data, access business datum and basic data by Mysql;Jewelry identity traceability system is in system network In network logical relation, data Layer is formed by least two Mysql-cluster, further, it is upwardly through at least one Nginx LB-M connect front end layer WEB with an at least Nginx LB-S, and front end layer WEB is upwards further by Nginx LB-M Client User is connected by internet with Nginx LB-S.
Especially, jewelry and bracket are disposed in anti-fake box.
Especially, monitoring sensor is installed on base or show stand.
Especially, anti-fake box A lids and relative two inwalls of anti-fake box B lids be correspondingly arranged along faying face block tongue, card key and Corresponding keyway, wherein card key are that outer wall is embedded in location structure entirely, and block tongue 5 is that at least one side outer wall opens the positioning knot exposed Structure.
Especially, base is in circular cone shape, and rack slot has been downwardly concaved angular groove face.
Especially, radio-frequency recognition system of the installation connection including antenna, radio-frequency recognition system are read automatically on show stand The RFID on sealing label and jewelry identity traceability system tag card is taken, wherein, radio-frequency recognition system connects with database equipment Connect.
Especially, installation retrospect identification certificate, the identification certificate use Mifare on jewelry identity traceability system tag card Card, capacity is 1K positions EEPROM, is divided into 16 sectors, and each sector is 4 pieces, every piece of 16 bytes, using block as access unit.Often There are one group of independent password and access control in individual sector.Every card has unique 32 TID sequence numbers.
The advantages of the utility model and effect:By being mutually related, multiple anti-fake structure is improved, and jewelry body is effectively ensured Part material evidence one multidimensional binding, support it is comprehensive realizes jewelry identity and retrospect, be easy to jewelry physics fidelity mark and Jewelry physical bodies safeguard protection, false proof whole process management and control of tracing to the source is carried out to the Life cycle of product, avoids being scattered or obscures, have Beneficial to preventing to go wrong in process of exchange, it is easy to found the abnormal situation in time.Securely and reliably, it is easy to show and carry.
Brief description of the drawings
Fig. 1 is the system physical view of the utility model embodiment 1.
Fig. 2 is the grid logical view of the utility model embodiment 1.
Fig. 3 is the show stand and anti-fake box external member schematic diagram in the utility model embodiment 1.
Fig. 4 is the anti-fake box open mode structural representation in the utility model embodiment 1.
Fig. 5 is the understructure schematic diagram in the utility model embodiment 1.
Reference includes:
Base 1, rack slot 2, anti-fake box A lids 3, anti-fake box B lids 4, block tongue 5, transparency window 6, sealing label 7, jewelry and bracket 8th, card key 9, show stand 10, antenna 11, jewelry identity traceability system tag card 12.
Embodiment
The utility model includes:Jewelry identity traceability system, client rs PC/mobile phone, sealing label 7, show stand 10 and pearl Precious identity traceability system tag card 12.
For gem and jade finished product, semi-finished product or naked stone jewelry, jewelry or with its inseparable accessory or anti-fake box, Anti-fake box is placed on show stand 10, sealing label 7 is pasted in anti-fake box aperture slots, between show stand 10 and sealing label 7 Identification and distance change sensing monitoring judgement relation are established, meanwhile, jewelry or it is placed in its inseparable accessory anti- In pseudo- box, jewelry or unique corresponding jewelry identity traceability system tag card 12 is equipped with its inseparable accessory, sealed RFID RF identification chips are installed on label 7, two-dimension identification code, client are printed with jewelry identity traceability system tag card 12 End PC/ mobile phones directly read jewelry product identity information or login pearl by reading RFID RF identification chips and two-dimension identification code Precious identity traceability system verification.
The utility model is described in further detail with reference to the accompanying drawings and examples.
Embodiment 1:As shown in Figure 1, jewelry identity traceability system framework includes front end layer, application layer, cushion, service Layer and data Layer, wherein service layer are further divided into business service and the part of infrastructure service two, and data Layer is further divided into type With the part of content two;Corresponding implementation be respectively Html5css3 modularizations JS, SpringMVC framework, Redis clusters, mutually Networking Development Framework;Further, front end layer client relies on the carry out Http request/responses of PC/ mobile phones, and application layer is joined Number parsing/session management/Webservice interface communications, cushion dependence Redis progress session/ data dictionaries/menu/ Authority is run, and service layer relies on micro services registration center or unification monitor supervision platform carries out customer analysis/content analysis, commodity point Analysis/data, services, activity analysis/planning engine service, index analysis/monitoring service, order analyzing/information service, data Layer Dependence database accesses order data, access business datum and basic data by Mysql.
In foregoing, as shown in Figure 2, jewelry identity traceability system is in grid logical relation, by least two Mysql-cluster forms data Layer, and further, it is upwardly through an at least Nginx LB-M and an at least Nginx LB-S connections front end layer WEB, front end layer WEB are further connected by Nginx LB-M with Nginx LB-S by internet upwards Client User.
In foregoing, as shown in Figure 3, anti-fake box A lids 3 and anti-fake box B lids 4 mutually fasten and form anti-fake box or Carrier box, And sealing label 7 is pasted on gap is combined, anti-fake box socket is in the rack slot 2 of the upside of base 1, anti-fake box at least one side On have a transparency window 6, base 1 is placed in the top of show stand 10, the mounted antennas 11 of show stand 10, show stand 10 and sealing label 7 Between RFID RFID communications be present.Jewelry and bracket 8 are disposed in anti-fake box.Anti-fake box is equipped with unique corresponding jewelry body Part traceability system tag card 12.Further, monitoring sensor is installed on base 1 or show stand 10, monitor state is occurring Abnormal alarm.
In foregoing, as shown in Figure 4, anti-fake box A lids 3 and anti-fake box B lids 4 are correspondingly arranged with respect to two inwalls along faying face Block tongue 5, card key 9 and corresponding keyway, wherein card key 9 are that outer wall is embedded in location structure entirely, and block tongue 5 is that at least one side outer wall is opened Put the location structure exposed.When anti-fake box A lids 3 and anti-fake box B lids 4 fasten relatively, sealing label 7 is pasted onto card key 9 and is embedded in The anti-fake box A lids 3 and anti-fake box B lids 4 for positioning side are fastened on gap.Sealing label 7 is not being pasted or has torn off sealing label 7 Under conditions of, from the side can not damaged structure separation anti-fake box A lids 3 and anti-fake box B lids 4.
In foregoing, as shown in Figure 5, base 1 is in circular cone shape, and rack slot 2 has been downwardly concaved angular groove face.
In foregoing, seal in label 7 and include RFID chip, the RFID chip type:Philips I CODE SLI;Storage Capacity 1024bit, 64bit unique ID sequence number;Working frequency 13.56MHz;2.5~10cm of reading/writing distance;Access time 1~ 2ms;Operating temperature:- 20 DEG C~55 DEG C;Erasing and writing life>100,000 times;Data preserve>10 years;Appearance and size iso standard card 85.6x54x0.80mm;Encapsulating material is PVC, PET, PETG, 0.13mm copper cash;Execution standard ISO15693.
The read-write theory of sealing label 7 includes:The electric part of card is only made up of an antenna and ASIC.Antenna:Card The antenna of piece includes at least two groups of coiled wire-wound coils, is suitably packaged in IS0 cards.ASIC:The ASIC of card is by a 106KB ripple The high speed RF interfaces of special rate, a control unit and a 8K positions EEPROM composition operation principle:Read write line sends out one group to M1 cards The electromagnetic wave of fixed frequency, there is a LC series resonant circuit in card, the frequency that its frequency writes device transmitting with news is identical, in electricity Under the excitation of magnetic wave, LC resonance circuits produce resonance, so that there is electric charge in electric capacity, in the other end of this electric capacity, are connected to The electronic pump of one one-way conduction, the electric charge in electric capacity is sent in another electric capacity and stored, when the electric charge accumulated reaches 2V When, this electric capacity can provide operating voltage as power supply for other circuits, data in card be launched or accessed the number of read write line According to.
Seal the service application scene citing of label 7:
Retrospect identity certificate includes two each several parts, and it is the frangible labels of adhesive sticker RFID that Part I, which seals label 7, the Two parts are to fasten the naked stone Carrier box formed by anti-fake box A lids 3 and anti-fake box B lids 4.RFID label tag card sector is divided into Reserved (reserved area), TID (mark identifier), EPC (electronic product code), the classes of USER (user) four, wherein TID are systems Added during making, TID UID forgeries technical sophistication cost is larger, and default acquiescence TID is non-rewritable unique encodings. The TID in RFID chip and the retrospect identification number in jewelry identity traceability system tag card 12 are bound on sealing label 7, And retrospect identification number is write in RFID chip.When the NFC mobile phone using Installation Validation APP is verified, mobile phone NFC function can identify sealing label 7RFID chips in TID numbering, inquire about and whether contain in the database of gem and jade The TID numberings of the RFID, after confirming that TID numberings are present, then the retrospect identification number of the write-in in RFID chip is verified.When When TID is numbered and corresponding retrospect identification number is consistent with the binding relationship in database, you can think that the retrospect identity certificate is Very, and show that correspondence traces the tracing information of identification number;Naked stone Carrier box can be very good to preserve naked stone and do not influence to appreciate and Detection, according to the different value of naked stone, can customize different size, the naked stone Carrier box of unlike material.When in use, first will be naked Stone is placed in naked stone Carrier box, and anti-fake box A lids 3 and anti-fake box B are covered with the RFID frangible labels that sealing label 7 is adhesive sticker 4 fastening aperture slots seal, it is ensured that " thing one is demonstrate,proved " and " material evidence does not separate ";If tear to pieces sealing label 7, wherein RFID Failure will be damaged;If destroying anti-fake box A lids 3 and anti-fake box B lids 4 using other modes, article also will and be demonstrate,proved in Carrier box Book separates;Case above will all be identified as destroying the principle of " thing one is demonstrate,proved ", not ensure to trace effect.
In foregoing, radio-frequency recognition system of the installation connection including antenna 11 on show stand 10, radio-frequency recognition system is certainly The dynamic RFID read on sealing label 7 and jewelry identity traceability system tag card 12, wherein, radio-frequency recognition system and database Equipment connects.Antenna 11 is external base station circular polarisation microwave antenna, surface antenna structure, hand circular polarization mode, 8dbi gains, frequency Rate 902-925MHz, using long feeder line N female cable connectors.
The radio-frequency recognition system is one-to-many identifying system, and the radio communication between system is using launching radio frequency letter Number, realize that contactless information transmission completes identification process by Space Coupling.
Antenna in the radio-frequency recognition system is broadly divided into two classes:Label antenna and reading and writing device antenna.Label antenna is pacified It is client on sealing label 7 and jewelry identity traceability system tag card 12, and reading and writing device antenna is installed in show stand Antenna 11 on 10, to identify end.Because space of the label antenna on different identified objects is pointed to and can not fixed, therefore It is required that reading and writing device antenna is circular polarized antenna, will not be due to polarization mismatch when the sensing of label antenna changes so as to realize And it can not be identified.So, it can be encouraged as quantity, miscellaneous label antenna using linear polarization mode, reduce it Cost and technical difficulty, increase service life.In engineer applied, because microstrip antenna is easy to process and design, therefore typically It is used to realize reading and writing device antenna and label antenna;In addition, also there is the application using helical antenna as reading and writing device antenna, still Because helical antenna size is big, the helical antenna of low section circular polarisation can be realized instead of conventional metals floor using EBG structures.
In foregoing, installation retrospect identification certificate, the identification certificate use on jewelry identity traceability system tag card 12 Mifare cards, capacity are 1K positions EEPROM, are divided into 16 sectors, and each sector is 4 pieces, every piece of 16 bytes, using block as access Unit.There are one group of independent password and access control in each sector.Every card has unique 32 TID sequence numbers.With anti-collision Mechanism, support more card operations.Non-transformer, antenna is carried, include control extension logical sum communication logic.Data retention period is 10 years, rewritable 100,000 times, read unlimited.Working frequency:13.56MHz communications protocol:ISO14443A, traffic rate: 106Kbps。
The read-write theory of jewelry identity traceability system tag card 12 includes:Electric part is made up of an antenna and ASIC.My god Line is some groups of coiled wire-wound coils, is suitably packaged in IS0 cards.ASIC is by a 106KB baud rate high speed RF interface, a control Unit processed and a 8K positions EEPROM composition;Read write line sends out the electromagnetic wave of one group of fixed frequency to M1 cards, has a LC in card Series resonant circuit, the frequency that its frequency writes device transmitting with news is identical, and under the excitation of electromagnetic wave, LC resonance circuits produce altogether Shake, so that there is electric charge in electric capacity, in the other end of this electric capacity, the electronic pump of an one-way conduction is connected to, by electric capacity Electric charge be sent in another electric capacity and store, when the electric charge accumulated reaches 2V, this electric capacity can be other circuits as power supply Operating voltage is provided, data in card are launched or accessed the data of read write line.
It is with tracing in tag card by the TID in RFID chip that jewelry identity traceability system tag card 12, which traces identity certificate, Retrospect identification number bound, and will retrospect identification number write-in RFID chip in.When the NFC hands using Installation Validation APP When machine is verified, the NFC function of mobile phone can be numbered with the TID in identification chip, be inquired about in the database of gem and jade Whether the TID containing the RFID is numbered, and after confirming that TID numberings are present, then the retrospect identification number of the write-in in RFID chip is entered Row verification.When TID numberings and corresponding retrospect identification number consistent with the binding relationship in database, you can think the retrospect mark It is true to know certificate, and shows the tracing information of corresponding retrospect identification number.
In the present embodiment, naked stone Carrier box application can be used as after anti-fake box A lids 3 and the fastening of anti-fake box B lids 4.
In the utility model embodiment, base 1 is in frustum, mean outside diameter 47.6mm, high 15mm, rack slot 2 long 28mm, wide 20mm.Anti-fake box A lids 3 and anti-fake box B 4 appearance and sizes of lid are identical, and high into square flask shape, i.e. length of side 70mm, the inner chamber length of side is wide 62mm, wall thickness 4mm, block tongue 5 long 24mm, high 5mm, thick 2mm;Card key 9 long 12mm, high 1.8mm, thick 1.2mm, corresponding card key flute length 12mm, wide 1.2mm, deep 3.0mm.10 square mesa-shaped of show stand, the length of side 255mm, high 31mm.
In this application new embodiment, above-mentioned size more needs to carry out scaling;Material scope covers common modeling Material, ABS plastic, wooden, metal etc.;Transparent window materials need all-transparent, and possess good firmness.
In the utility model, by be mutually related multiple anti-fake identification combine be effectively ensured jewelry identity retrospect and Material evidence is integrally bound, comprehensive to realize jewelry identity, jewelry physics fidelity mark and jewelry physical bodies safeguard protection:1) remember It is loaded in gem and jade certificate true and false discrimination on sealing label 7 and jewelry identity traceability system tag card 12;2) adhesive sticker of label 7 is sealed The frangible Tag Radio Frequencies of RFID are distinguish true from false discrimination;3) the adhesive sticker RFID of label 7 frangible label, anti-fake box A lids 3 and anti-fake box are sealed B lids 4 fasten integrality discrimination;4) impressing pattern and the naked stone of jewelry in anti-fake box are direct on jewelry identity traceability system tag card 12 Visual verification, and, seal physical label on label 7 and jewelry identity traceability system tag card 12 including Quick Response Code including with Mobile phone is verified;5) the fastening anti-fake box A lids 3 of sealing label 7 are sealed up and the RFID between anti-fake box B lids 4 and show stand 10 is read Identify, make an inventory automatically, away from alarm and safeguard protection.
It is described above, only it is preferred embodiment of the present utility model, not the technical solution of the utility model is made any Formal limitation.Every any simple modification made according to the technical essence of the utility model to above example, it is equal Change and modification, in the range of still falling within technical solutions of the utility model.

Claims (7)

1. the retrospect of jewelry identity monitors material evidence integrally false proof external member;Characterized in that, anti-fake box A lids (3) and anti-fake box B lids (4) Mutually fasten and form anti-fake box or Carrier box, and sealing label (7) is pasted on gap is combined, pacify on sealing label (7) Equipped with RFID RF identification chips, in rack slot (2) of the anti-fake box socket on the upside of base (1), anti-fake box at least has on one side Transparency window (6), base (1) are placed in above show stand (10), show stand (10) mounted antennas (11), show stand (10) and envelope RFID RFID communications be present between mouth label (7);Anti-fake box is equipped with unique corresponding jewelry identity traceability system tag card (12);Two-dimension identification code is printed with jewelry identity traceability system tag card (12), client rs PC/mobile phone is known by reading two dimension Other code logs in jewelry identity traceability system.
2. jewelry identity retrospect as claimed in claim 1 monitors material evidence integrally false proof external member, it is characterised in that jewelry identity chases after System architecture of tracing back includes front end layer, application layer, cushion, service layer and data Layer, and wherein service layer is further divided into business clothes Business and the part of infrastructure service two, data Layer are further divided into type and the part of content two;Corresponding implementation is respectively Html5css3 modularizations JS, SpringMVC framework, Redis clusters, internet Development Framework;Further, front end layer client End relies on the carry out Http request/responses of PC/ mobile phones, and application layer carries out Parameter analysis of electrochemical/session management/Webservice interfaces and led to News, cushion rely on Redis and carry out session/ data dictionaries/menu/authority operation, and service layer relies on micro services registration center Or unification monitor supervision platform carry out customer analysis/content analysis, commercial analysis/data, services, activity analysis/planning engine service, Index analysis/monitoring service, order analyzing/information service, data Layer dependence database access order numbers by Mysql According to, access business datum and basic data;Jewelry identity traceability system is in grid logical relation, by least two Mysql-cluster forms data Layer, and further, it is upwardly through an at least Nginx LB-M and an at least Nginx LB-S connections front end layer WEB, front end layer WEB are further connected by Nginx LB-M with Nginx LB-S by internet upwards Client User.
3. jewelry identity retrospect as claimed in claim 1 monitors material evidence integrally false proof external member, it is characterised in that in anti-fake box Dispose jewelry and bracket (8).
4. jewelry identity retrospect as claimed in claim 1 monitors material evidence integrally false proof external member, it is characterised in that in base (1) Or monitoring sensor is installed on show stand (10).
5. jewelry identity retrospect as claimed in claim 1 monitors material evidence integrally false proof external member, it is characterised in that anti-fake box A is covered (3) and anti-fake box B lids (4) are correspondingly arranged block tongue (5), card key (9) and corresponding keyway along faying face with respect to two inwalls, its Middle card key (9) is that outer wall is embedded in location structure entirely, and block tongue (5) is that at least one side outer wall opens the location structure exposed.
6. the integral false proof external member of jewelry identity as claimed in claim 1 retrospect monitoring material evidence, it is characterised in that base (1) is in Circular cone shape, rack slot (2) have been downwardly concaved angular groove face.
7. jewelry identity retrospect as claimed in claim 1 monitors material evidence integrally false proof external member, it is characterised in that show stand (10) Radio-frequency recognition system of the upper installation connection including antenna (11), radio-frequency recognition system read sealing label (7) and pearl automatically RFID on precious identity traceability system tag card (12), wherein, radio-frequency recognition system is connected with database equipment.
CN201720800001.3U 2017-07-04 2017-07-04 The retrospect of jewelry identity monitors material evidence integrally false proof external member Active CN206961156U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201720800001.3U CN206961156U (en) 2017-07-04 2017-07-04 The retrospect of jewelry identity monitors material evidence integrally false proof external member

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201720800001.3U CN206961156U (en) 2017-07-04 2017-07-04 The retrospect of jewelry identity monitors material evidence integrally false proof external member

Publications (1)

Publication Number Publication Date
CN206961156U true CN206961156U (en) 2018-02-02

Family

ID=61384147

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201720800001.3U Active CN206961156U (en) 2017-07-04 2017-07-04 The retrospect of jewelry identity monitors material evidence integrally false proof external member

Country Status (1)

Country Link
CN (1) CN206961156U (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109377246A (en) * 2018-10-29 2019-02-22 江苏茴香豆网络科技有限公司 A kind of jewelry certificate false proof intelligent identifying system
IT201800005739A1 (en) * 2018-05-25 2019-11-25 Recognition system for jewels and precious objects
WO2021074026A1 (en) * 2019-10-16 2021-04-22 Giovanni Baggio System and computer program for the management of objects

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IT201800005739A1 (en) * 2018-05-25 2019-11-25 Recognition system for jewels and precious objects
CN109377246A (en) * 2018-10-29 2019-02-22 江苏茴香豆网络科技有限公司 A kind of jewelry certificate false proof intelligent identifying system
CN109377246B (en) * 2018-10-29 2022-08-26 江苏茴香豆网络科技有限公司 Intelligent jewelry certificate anti-counterfeiting identification system
WO2021074026A1 (en) * 2019-10-16 2021-04-22 Giovanni Baggio System and computer program for the management of objects

Similar Documents

Publication Publication Date Title
CN101089871B (en) System and method for antiforge of article with certificate based on radio frequency technology
US20070109103A1 (en) Commercial product activation and monitoring using radio frequency identification (RFID) technology
CN206961156U (en) The retrospect of jewelry identity monitors material evidence integrally false proof external member
CN107316075B (en) Jewelry identity traceability material evidence integrated multidimensional binding anti-counterfeiting method and jewelry identity traceability material evidence integrated multidimensional binding anti-counterfeiting kit
US20160027022A1 (en) Consumer Authentication Systems and Methods
CN103473684A (en) Barreled water anti-counterfeiting source tracing system
CN103136682A (en) System using cover type label to achieve counterfeiting and method
CN106934639A (en) A kind of false proof retroactive method of paper diaper based on RFID and Quick Response Code
CN100405394C (en) Contactless type communication tag, portable tag reader, and its method
CN101499138A (en) Anti-counterfeit apparatus and method for cigarette by passive radio frequency label
CN102208043A (en) Wine anti-counterfeiting identification method based on electronic tag and product information association processing
CN202383722U (en) Internet-connected stamp anti-counterfeiting system
KR20140079555A (en) Check system of authenticity product
CN102219091A (en) Intelligent anti-fake method of wine package
CN203573357U (en) Artwork authenticity identification system
CN103455927A (en) Dark-red enameled pottery anti-counterfeiting recognition system based on RFID
CN204631936U (en) Calligraphy artwork Antiforge system
CN106485181A (en) A kind of pair of label anti-counterfeit method
CN2662362Y (en) Multifunctional false proof marker with radio frequency identification
CN203490738U (en) RFID-based dark-red enameled pottery anti-counterfeiting recognition system
CN103150651A (en) Individual commodity authentication and identification device, system and method
KR100497630B1 (en) Portable RF-tag reader for verifying a genuine article
CN210348529U (en) NFC anti-counterfeiting chip capable of achieving tamper-proof detection function through activatable power source
CN201845347U (en) Cigarette anti-counterfeiting device
CN106599952A (en) Method and device for acquiring article information based on electronic tag

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant