CN112800794A - Method and system for opening seal - Google Patents
Method and system for opening seal Download PDFInfo
- Publication number
- CN112800794A CN112800794A CN202110097002.7A CN202110097002A CN112800794A CN 112800794 A CN112800794 A CN 112800794A CN 202110097002 A CN202110097002 A CN 202110097002A CN 112800794 A CN112800794 A CN 112800794A
- Authority
- CN
- China
- Prior art keywords
- product
- identification
- module
- identification code
- seal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000004891 communication Methods 0.000 claims abstract description 15
- 238000007789 sealing Methods 0.000 claims abstract description 14
- 238000012795 verification Methods 0.000 claims description 25
- 230000007246 mechanism Effects 0.000 claims description 15
- 230000008569 process Effects 0.000 claims description 7
- 230000003287 optical effect Effects 0.000 claims description 5
- 230000000694 effects Effects 0.000 abstract description 5
- 230000006870 function Effects 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 6
- 235000019504 cigarettes Nutrition 0.000 description 4
- 239000003814 drug Substances 0.000 description 4
- 238000013473 artificial intelligence Methods 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 241001122767 Theaceae Species 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 239000005022 packaging material Substances 0.000 description 2
- 238000012856 packing Methods 0.000 description 2
- 238000009450 smart packaging Methods 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000005674 electromagnetic induction Effects 0.000 description 1
- 230000001939 inductive effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
- 230000001755 vocal effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Lock And Its Accessories (AREA)
Abstract
The embodiment of the application discloses a method and a system for opening a seal, wherein a lock module can be arranged on the seal and can be used for locking the seal; the seal opening method may include: scanning and identifying an identification code of a product to be opened and sealed through a terminal; after the identification code is successfully identified, an identification effective instruction is sent through a Near Field Communication (NFC) function in the terminal; and acquiring the identification effective instruction through an NFC module arranged on the product, and controlling the lock module to unlock according to the identification effective instruction so as to open the seal. This embodiment scheme combines together through the NFC module with setting up on the identification code of product and the product, jointly unblock the lock module of department of sealing, improves the unblock degree of difficulty, and the corresponding imitation cost that has improved the product that seals the place has strengthened the anti-fake effect of product to the protection dynamics to the product has been improved.
Description
Technical Field
The present invention relates to anti-fake technology, and is especially method and system for opening seal.
Background
Most current products have packages or closures (such as bottle caps, box covers and the like), but the current product packages and closures do not have any protection measures, and can be opened by any person or are simple and are easy to consider to be copied, so that the opportunity is provided for lawless persons to counterfeit regular products. Moreover, if no or few protective measures are taken, the protection is correspondingly reduced for important or precious products.
Disclosure of Invention
The embodiment of the application provides a method and a system for opening a seal, which can improve the unlocking difficulty, correspondingly improve the imitation cost of a product where the seal is located, enhance the anti-counterfeiting effect of the product and improve the protection of the product.
The embodiment of the application provides a seal opening method, wherein a lock module can be arranged on a seal and can be used for locking the seal; the method may include:
scanning and identifying an identification code of a product to be opened and sealed through a terminal;
after the identification code is successfully identified, an identification effective instruction is sent through a Near Field Communication (NFC) function in the terminal;
and acquiring the identification effective instruction through an NFC module arranged on the product, and controlling the lock module to unlock according to the identification effective instruction so as to open the seal.
In an exemplary embodiment of the present application, the scanning and identifying, by the terminal, the identification code of the product to be unsealed may include:
scanning the identification code through an identification module preset on the terminal;
identifying the scanned image of the identification code through the identification module;
and when the scanned image is successfully identified, determining that the identification code is successfully identified, and generating the identification valid instruction.
In an exemplary embodiment of the present application, the identification valid instruction may be a radio frequency identification, RFID, instruction; the NFC module that passes through set up on the product acquires the effective instruction of discernment to according to the effective instruction control of discernment lock module unblanks, include:
receiving an RFID instruction in an NFC magnetic field of the terminal through the NFC module;
the NFC module starts a verification process of the RFID label stored in the NFC module according to the RFID instruction;
when the RFID tag passes verification, the NFC module sends an unlocking signal;
and the lock module unlocks according to the unlocking signal.
In an exemplary embodiment of the present application, the method may further include:
when the identification code fails to be identified, sending reminding information of the identification failure on the terminal; and/or the presence of a gas in the gas,
and when the RFID tag fails in verification, sending out reminding information of the failure in verification on the terminal.
In an exemplary embodiment of the present application, the method may further include: binding a product and information of an identification code, an RFID tag and a lock module corresponding to the product in advance, and storing the binding information into the identification module and the NFC module.
In an exemplary embodiment of the present application, the lock module may include: the unlocking device comprises an unlocking signal receiver, an unlocking control circuit, an electric structure and a lock mechanism; the unlocking signal receiver, the unlocking control circuit, the electric structure and the lock mechanism are sequentially connected;
the unlocking signal receiver can be used for receiving an unlocking signal;
the unlocking control circuit can be set to control the electric structure to operate according to the unlocking signal;
the electric mechanism can be set to drive the lock mechanism to move to realize unlocking.
In an exemplary embodiment of the present application, the unlocking signal may include: an optical signal;
the unlocking signal receiver can be a photosensitive element;
the electrically powered structure may be a micro-motor.
In an exemplary embodiment of the present application, the method may further include: the identification code of each product is arranged on the corresponding product in advance, or the identification code of the product is provided for a product purchaser after the product is sold;
when the identification code of each product is arranged on the corresponding product, the lock module is a disposable lock module; when the identification code of the product is provided to the product purchaser after the product is sold, the lock module is a disposable lock module or a non-disposable lock module.
In an exemplary embodiment of the present application, the closure may include: a seal for a product package and/or a seal for a product container; wherein the closure of the product container comprises a bottle cap;
the identification code may comprise any one or more of: one-dimensional bar codes, two-dimensional codes, three-dimensional structure codes and custom codes; the custom code comprises any one or more of: dots, lines, numbers, text, graphics, and images.
An embodiment of the present application further provides a closure opening system, which may include: the NFC lock comprises an identification module, a Near Field Communication (NFC) module and a lock module; the lock module can be arranged on the product seal and is arranged to lock the seal; the NFC module can be arranged on a product, and the identification module can be arranged on a terminal;
the identification module can be set to scan and identify the identification code of the product to be opened and sealed;
the identification module can also be set to send an identification effective instruction through a Near Field Communication (NFC) function in the terminal after the identification code is successfully identified;
the NFC module can be set to acquire the identification effective instruction and control a lock module arranged at the sealing position of the product to unlock according to the identification effective instruction so as to open the sealing.
Compared with the related art, the seal of the embodiment of the application can be provided with the lock module, and the lock module can be used for locking the seal; the seal opening method may include: scanning and identifying an identification code of a product to be opened and sealed through a terminal; after the identification code is successfully identified, an identification effective instruction is sent through a Near Field Communication (NFC) function in the terminal; and acquiring the identification effective instruction through an NFC module arranged on the product, and controlling the lock module to unlock according to the identification effective instruction so as to open the seal. This embodiment scheme combines together through the NFC module with setting up on the identification code of product and the product, jointly unblock the lock module of department of sealing, improves the unblock degree of difficulty, and the corresponding imitation cost that has improved the product that seals the place has strengthened the anti-fake effect of product to the protection dynamics to the product has been improved.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the application. Other advantages of the present application may be realized and attained by the instrumentalities and combinations particularly pointed out in the specification and the drawings.
Drawings
The accompanying drawings are included to provide an understanding of the present disclosure and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the examples serve to explain the principles of the disclosure and not to limit the disclosure.
Fig. 1 is a flowchart illustrating a method for opening a seal according to an embodiment of the present disclosure;
FIG. 2 is a schematic view of a method for opening a seal according to an embodiment of the present application;
FIG. 3 is a schematic structural diagram of a lock module according to an embodiment of the present application;
fig. 4 is a block diagram of a seal opening system according to an embodiment of the present application.
Detailed Description
The present application describes embodiments, but the description is illustrative rather than limiting and it will be apparent to those of ordinary skill in the art that many more embodiments and implementations are possible within the scope of the embodiments described herein. Although many possible combinations of features are shown in the drawings and discussed in the detailed description, many other combinations of the disclosed features are possible. Any feature or element of any embodiment may be used in combination with or instead of any other feature or element in any other embodiment, unless expressly limited otherwise.
The present application includes and contemplates combinations of features and elements known to those of ordinary skill in the art. The embodiments, features and elements disclosed in this application may also be combined with any conventional features or elements to form a unique inventive concept as defined by the claims. Any feature or element of any embodiment may also be combined with features or elements from other inventive aspects to form yet another unique inventive aspect, as defined by the claims. Thus, it should be understood that any of the features shown and/or discussed in this application may be implemented alone or in any suitable combination. Accordingly, the embodiments are not limited except as by the appended claims and their equivalents. Furthermore, various modifications and changes may be made within the scope of the appended claims.
Further, in describing representative embodiments, the specification may have presented the method and/or process as a particular sequence of steps. However, to the extent that the method or process does not rely on the particular order of steps set forth herein, the method or process should not be limited to the particular sequence of steps described. Other orders of steps are possible as will be understood by those of ordinary skill in the art. Therefore, the particular order of the steps set forth in the specification should not be construed as limitations on the claims. Further, the claims directed to the method and/or process should not be limited to the performance of their steps in the order written, and one skilled in the art can readily appreciate that the sequences may be varied and still remain within the spirit and scope of the embodiments of the present application.
The embodiment of the application provides a seal opening method, wherein a lock module can be arranged on a seal and can be used for locking the seal; as shown in fig. 1 and fig. 2, the method may include steps S101 to S103:
s101, scanning and identifying an identification code of a product to be opened through a terminal;
s102, after the identification code is successfully identified, an identification effective instruction is sent through a Near Field Communication (NFC) function in the terminal;
s103, the identification effective instruction is obtained through an NFC module arranged on the product, and the lock module is controlled to be unlocked according to the identification effective instruction so as to open the seal.
In the exemplary embodiment of the application, with the development of the national big data internet of things, the urgent need of the traditional enterprises for applying the internet of things to the intelligent packaging and realizing the big data layout for production, sales and marketing comes along. The scheme of the embodiment integrates the technologies in multiple fields such as identification codes (such as structural three-dimensional codes), Artificial Intelligence (AI) identification, Radio Frequency Identification (RFID), radio frequency technology and coded locks into the intelligent packaging of the Internet of things, and realizes multi-industry cross-border application from anti-counterfeiting to the Internet of things and from the coded locks to product packaging.
In an exemplary embodiment of the present application, the terminal may include, but is not limited to, a smart robot, a smart phone, a computer, a tablet, a smart wearable device (such as including but not limited to a smart bracelet, a smart necklace, smart glasses, a smart watch, a smart helmet, etc.), and the like.
In an exemplary embodiment of the present application, the closure may include: a seal for a product package and/or a seal for a product container; wherein the closure of the product container may include a bottle cap;
in exemplary embodiments of the present invention, the product package may include, but is not limited to: packages, cases, films, etc., such as wine boxes, cigarette boxes, tea boxes, medicine boxes, safes, etc., so the seal can be a joint or seal of the wine box, cigarette box, tea box, medicine box, safe, etc.
In exemplary embodiments of the present invention, the product container may include, but is not limited to: the closure can be a bottle cap, a box cover, a pull ring of a pop can, and the like.
In exemplary embodiments of the present application, the identification code may include, but is not limited to, any one or more of the following: one-dimensional bar codes, two-dimensional codes, three-dimensional structure codes and custom codes; the custom code comprises any one or more of: dots, lines, numbers, text, graphics (e.g., animated graphics, geometric graphics), and images (e.g., portrait, landscape portrait). The three-dimensional structure code may include any one or more of: point structures, line structures, number structures, text structures, graphic structures, image structures, and the like.
In the exemplary embodiments of the present application, any one identification code may carry anti-counterfeiting identification information, and/or a plurality of identification codes may carry anti-counterfeiting identification information after being combined.
In the exemplary embodiment of the present application, when the terminal scans and identifies the identification code of the product to be opened, the terminal may directly complete scanning and identification, or may complete scanning only by the terminal, and the terminal may complete identification by another device or a service platform, and return the result to the terminal. An embodiment in which the scanning and the identification are directly performed by the terminal is given below.
In an exemplary embodiment of the present application, the scanning and identifying, by the terminal, the identification code of the product to be unsealed may include:
scanning the identification code through an identification module preset on the terminal;
identifying the scanned image of the identification code through the identification module;
and when the scanned image is successfully identified, determining that the identification code is successfully identified, and generating the identification valid instruction.
In the exemplary embodiments of the present application, any software, hardware or a combination of both having identifiability and transferability and capable of data interaction and exchange through mobile internet information technology based on a communication network may constitute the identification module of the embodiments of the present application.
In an exemplary embodiment of the present application, the identification module may be formed by a scanning camera in the terminal in combination with a product identification platform in the terminal. The product identification platform may include, but is not limited to: product identification web pages, websites, applets, applications APP, etc.
In an exemplary embodiment of the present application, when the identification code is a structural three-dimensional code, identifying, by the identification module, the scanned image of the identification code may include:
detecting whether the scanned identification code is of a three-dimensional structure;
when the identification code is of a three-dimensional structure, comparing the scanned image with a pre-stored structure three-dimensional code image of the current product, and judging whether the similarity between the scanned image and the structure three-dimensional code image is greater than or equal to a preset similarity threshold value or not;
when the similarity between the scanned image and the structural three-dimensional code image is greater than or equal to a preset similarity threshold value, determining that the scanned image is successfully identified; and when the similarity between the scanned image and the structural three-dimensional code image is smaller than the similarity threshold value, determining that the scanned image identification fails.
In an exemplary embodiment of the present application, the detecting whether the scanned identification code is a three-dimensional structure includes:
sending a three-dimensional structure detection prompt to provide a terminal user to verify whether the scanned identification code is in a three-dimensional structure in a manual verification mode, and confirming a verification result according to feedback information of the terminal user; or,
detecting whether one or more image lines in the scanned image have shadow areas around, and judging that the identification code is not in a three-dimensional structure when all the image lines in the scanned image have no shadow areas around; and when one or more image lines in the scanned image have shadow areas around the image lines, judging that the identification code is a three-dimensional structure.
In an exemplary embodiment of the present application, the detection of the shadow area may be implemented by detecting a brightness value of a preset area, so as to determine whether the preset area is the shadow area according to the brightness value.
In an exemplary embodiment of the present application, the identification valid instruction may be a radio frequency identification, RFID, instruction; the obtaining of the identification effective instruction through the NFC module provided on the product, and controlling the lock module to unlock according to the identification effective instruction may include:
receiving an RFID instruction in an NFC magnetic field of the terminal through the NFC module;
the NFC module starts a verification process of the RFID label stored in the NFC module according to the RFID instruction;
when the RFID tag passes verification, the NFC module sends an unlocking signal;
and the lock module unlocks according to the unlocking signal.
In an exemplary embodiment of the application, when the scanned image is successfully identified, it is determined that the identification code is successfully identified, the valid identification instruction may be generated and sent through an NFC function in the terminal, and when an NFC module in a product is in an NFC magnetic field of the terminal, the valid identification instruction may be received and used as a verification start instruction of an RFID tag stored in the NFC module in the product.
In an exemplary embodiment of the present application, the method may further include: binding a product and information of an identification code, an RFID tag and a lock module corresponding to the product in advance, and storing the binding information into the identification module and the NFC module.
In an exemplary embodiment of the present application, product information (e.g., a unique code, a name, a picture, a place of manufacture, a date of manufacture, a component, etc.) of a current product may be associated with code information (e.g., a barcode, a two-dimensional code, an image of a structural three-dimensional code, etc.) of an identification code uniquely corresponding to the product, tag information (e.g., a tag unique identification code) of an RFID tag, and lock module information (e.g., a lock type, a setting position, a setting structure, a setting time, a lock password, a lock picture, etc.), so as to bind the product with the identification code, the RFID tag, and the lock module corresponding to the product, and the binding information may include the above-mentioned product information, code information, tag information, and lock module information.
In an exemplary embodiment of the present application, verifying the RFID tag may include: and detecting whether the RFID label stored by the NFC module is consistent with the label information of the RFID label stored in the binding information about the current product stored in the NFC module.
In an exemplary embodiment of the present application, when the aforementioned scanned image of the identification code is identified by the identification module, it may also be configured to detect whether the scanned image is consistent with code information stored in binding information about a current product stored in the identification module.
In an exemplary embodiment of the present application, the method may further include:
when the identification code fails to be identified, sending reminding information of the identification failure on the terminal; and/or the presence of a gas in the gas,
and when the RFID tag fails in verification, sending out reminding information of the failure in verification on the terminal.
In the exemplary embodiment of the present application, the end user may be notified of the current identification result and the verification result through the reminding message, so as to re-verify, or confirm whether the obtained identification code is wrong, or detect whether the product is a counterfeit product.
In the exemplary embodiment of the present application, the unlocking signal may include, but is not limited to, an optical signal (visible light and/or invisible light) having a definite information instruction meaning, an electronic signal, an electronic coupling signal, an inductive coupling signal, a radio frequency signal, an electromagnetic induction signal, a vocal sound signal, a voltage signal, a graphic and text signal, and the like.
In an exemplary embodiment of the present application, a light emitting device, such as a light emitting diode, may be disposed in the NFC module, and when the RFID tag passes the verification, the light emitting diode may be controlled to emit a light signal as the unlocking signal.
In the exemplary embodiments of the present application, any manner, method, information structure, software, hardware, and any one or more of the above in which a meaning of an information instruction can be transmitted may constitute the NFC module.
In exemplary embodiments of the present application, the lock module may be a fastener including, but not limited to, a key or combination (e.g., combination mechanism, time mechanism, automatic release switch, magnetic solenoid, etc.) that is placed on a device that can be opened and closed. The key or combination may include, but is not limited to, a physical key, an electronic key, a push switch, and the like, physical or electronic structure.
In an exemplary embodiment of the present application, as shown in fig. 3, the lock module may include: the device comprises an unlocking signal receiver 1, an unlocking control circuit 2, an electric structure 3 and a lock mechanism 4; the unlocking signal receiver 1, the unlocking control circuit 2, the electric structure 3 and the lock mechanism 4 are connected in sequence;
the unlocking signal receiver 1 can be configured to receive an unlocking signal;
the unlocking control circuit 2 can be set to control the electric structure to operate according to the unlocking signal;
the electric mechanism 3 can be set to drive the lock mechanism 4 to move to realize unlocking.
In an exemplary embodiment of the present application, when the lock module is disposed on a sealing opening of a sealing cover (such as a bottle cap, a box cover, etc.), the lock module may be manually or automatically ejected to open the sealing cover after unlocking, and when the lock module is disposed at a sealing opening of a packaging material such as a packing box, the lock module may be manually or automatically ejected to open the sealing opening of the packaging material after unlocking.
In an exemplary embodiment of the present application, the lock module may further include: an indicator light, for example, a light emitting diode LED, may be turned on when the unlocking signal receiver 1 receives the unlocking signal to indicate that the signal reception is successful.
In an exemplary embodiment of the present application, the unlocking signal may include: an optical signal;
the unlocking signal receiver can be a photosensitive element;
the electric structure can be a micro motor, and the micro motor can rotate the gear tooth box to realize unlocking.
In an exemplary embodiment of the present application, the method may further include: an identification code of each product is set on a corresponding product in advance, or the identification code of the product is provided for a product purchaser after the product is sold (an object or information containing the identification code independent of the product can be provided, for example, an identification code label, an identification card, a password card and the like are provided, or the identification code is acquired by scanning another information code by the purchaser, or a login account for acquiring the identification code is provided and the like);
when the identification code of each product is arranged on the corresponding product, the lock module is a disposable lock module; when the identification code of the product is provided to the product purchaser after the product is sold, the lock module is a disposable lock module or a non-disposable lock module.
In the exemplary embodiment of the application, the identification code and the lock module are combined in the scheme of the embodiment of the application, so that the safety of the product is improved, the counterfeiting complexity is improved, the anti-counterfeiting effect is improved, and the intelligence of the product is improved. However, when the identification code of each product is set on the corresponding product, if the set lock module can be used repeatedly, a product counterfeiter may combine the anti-counterfeiting code on the product with the lock module for multiple uses, so that the package or the seal of the genuine product is applied to the counterfeit product, and the set identification code and the lock module cannot achieve the anti-counterfeiting effect. Therefore, in order to avoid the above situation, when the identification code of each product is set on the corresponding product, the lock module on the corresponding product can be set as a disposable lock module, that is, the lock module can be destroyed after being used once and cannot be used again. When the identification code of the product is provided for the product purchaser after the product is sold, since the lawbreaker cannot obtain the identification code of the product and the product corresponds to the identification code one by one, even if the lawbreaker only obtains the genuine product package or seal with the lock module, the lawbreaker cannot reuse the lock module, i.e., the package or seal with the lock module cannot be reused, even if the lock module is a non-disposable lock module, therefore, the lock module in this case may be a disposable lock module or a non-disposable lock module.
In an exemplary embodiment of the application, according to an embodiment of the application, the lock module can be an intelligent electronic lock, and the lock module can be arranged on a bottle cap of a product, so that a structural three-dimensional code smart bottle cap with an intelligent lock can be provided.
In the exemplary embodiment of the present application, the present application provides a scheme for opening a seal of a product by identifying, verifying and sending an instruction to open a lock structure based on a communication network. The scheme relates to an identification module (or called AI identification module), an NFC module (or called RFID Internet of things instruction module), and a lock module (or electronic lock module), wherein a user can transmit verification information to the identification module (the identification module can be arranged in a terminal or can be a verification server arranged outside the terminal) through a recognition device (namely the terminal or called verification client), the current terminal only provides a scanning camera, the verification server can return a recognition result to the terminal after the identification of an identification code is completed, namely the verification server sends the verification information to the recognition device after AI identification, then the recognition device sends an identification effective instruction to the NFC module, an unlocking signal is sent after the verification instruction of the NFC module, or called opening instruction (for example, a key or a secret code) is sent to the lock module, and the lock module performs opening and closing operation on a seal on a package or a seal cover according to the opening instruction, thereby achieving the functions of opening and closing the packing and sealing the cover. Compared with the prior art, the scheme of the embodiment has the advantages of high reliability, strong applicability, safety, density, comprehensiveness and the like.
In an exemplary embodiment of the application, the identification module, the NFC module, or the preset data center and the like may record unlocking information each time, for example, identification, verification, and unlocking time, place, result and the like each time, and a user may query the unlocking information of a product each time through a preset unlocking record item, so as to facilitate tracing. On one hand, whether the current product is a genuine product or a secondhand product or not can be identified through the scheme of the embodiment, the use times of the current product can be monitored, and the use condition of the product can be remotely monitored, for example, whether a family steals or drinks (the lock module is arranged on a bottle cap), smokes (the lock module is arranged on a cigarette case or a cabinet body for storing cigarettes), drinks (the lock module is arranged on a bottle cap or a pull ring of a pop can) can be remotely monitored; monitoring whether the patient takes the medicine on time (the lock module is arranged on the bottle cap of the medicine bottle); supervising whether the student starts the game machine (the lock module is arranged on a storage box of the game machine); supervising whether a file box or the like is opened, whether a file is compromised (a lock module is provided on the file box), and the like.
An embodiment of the present application further provides a seal opening system a, as shown in fig. 4, the system may include: an identification module a1, a near field communication NFC module a2 and a lock module A3; the lock module a3 may be disposed on a product closure, configured to lock the closure; the NFC module a2 may be disposed on a product, and the identification module a1 may be disposed on a terminal;
the identification module A1 can be set to scan and identify the identification code of the product to be opened;
the identification module a1 may be further configured to send an identification valid instruction through a near field communication NFC function in the terminal after the identification code is successfully identified;
the NFC module A2 can be set to acquire the identification effective instruction and control the lock module A3 arranged at the sealing position of the product to unlock according to the identification effective instruction so as to open the sealing.
In the exemplary embodiment of the present application, any of the above method embodiments is applicable to the system embodiment, and details are not repeated here.
In the exemplary embodiment of the present application, the closure opening system a may be applied to opening operation of a closure of a package and a cover of any article, and may also be applied to opening of any box (such as a suitcase, a safe, a file box, etc.), a cabinet, a box body, and a cover, for example, the lock module a3 may be configured as a lock mechanism of the box and the cabinet.
In the exemplary embodiment of the present application, the identification module a1 and/or the NFC module a2 (may not be limited to these two modules) records unlocking information each time, and performs history query through the record, thereby realizing supervision of the use condition of the locked article.
It will be understood by those of ordinary skill in the art that all or some of the steps of the methods, systems, functional modules/units in the devices disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the components may be implemented as software executed by a processor, such as a digital signal processor or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
Claims (10)
1. A seal opening method is characterized in that a lock module is arranged on a seal and used for locking the seal; the method comprises the following steps:
scanning and identifying an identification code of a product to be opened and sealed through a terminal;
after the identification code is successfully identified, an identification effective instruction is sent through a Near Field Communication (NFC) function in the terminal;
and acquiring the identification effective instruction through an NFC module arranged on the product, and controlling the lock module to unlock according to the identification effective instruction so as to open the seal.
2. The closure opening method of claim 1, wherein the scanning and identifying, by the terminal, the identification code of the product to be opened includes:
scanning the identification code through an identification module preset on the terminal;
identifying the scanned image of the identification code through the identification module;
and when the scanned image is successfully identified, determining that the identification code is successfully identified, and generating the identification valid instruction.
3. The seal opening method according to claim 2, wherein the identification valid command is a Radio Frequency Identification (RFID) command; the NFC module that passes through set up on the product acquires the effective instruction of discernment to according to the effective instruction control of discernment lock module unblanks, include:
receiving an RFID instruction in an NFC magnetic field of the terminal through the NFC module;
the NFC module starts a verification process of the RFID label stored in the NFC module according to the RFID instruction;
when the RFID tag passes verification, the NFC module sends an unlocking signal;
and the lock module unlocks according to the unlocking signal.
4. The method of opening a closure of claim 3, further comprising:
when the identification code fails to be identified, sending reminding information of the identification failure on the terminal; and/or the presence of a gas in the gas,
and when the RFID tag fails in verification, sending out reminding information of the failure in verification on the terminal.
5. The method of opening a closure of claim 3, further comprising: binding a product and information of an identification code, an RFID tag and a lock module corresponding to the product in advance, and storing the binding information into the identification module and the NFC module.
6. A method of opening a closure according to any of claims 1 to 5, wherein the lock module comprises: the unlocking device comprises an unlocking signal receiver, an unlocking control circuit, an electric structure and a lock mechanism; the unlocking signal receiver, the unlocking control circuit, the electric structure and the lock mechanism are sequentially connected;
the unlocking signal receiver is used for receiving an unlocking signal;
the unlocking control circuit is used for controlling the electric structure to operate according to the unlocking signal;
the electric mechanism is arranged to drive the lock mechanism to move to realize unlocking.
7. The closure opening method of claim 6,
the unlocking signal includes: an optical signal;
the unlocking signal receiver is a photosensitive element;
the electric structure is a micromotor.
8. The method of opening a closure of any of claims 1-5, further comprising: the identification code of each product is arranged on the corresponding product in advance, or the identification code of the product is provided for a product purchaser after the product is sold;
when the identification code of each product is arranged on the corresponding product, the lock module is a disposable lock module; when the identification code of the product is provided to the product purchaser after the product is sold, the lock module is a disposable lock module or a non-disposable lock module.
9. The closure opening method of any one of claims 1 to 5,
the seal includes: a seal for a product package and/or a seal for a product container; wherein the closure of the product container comprises a bottle cap;
the identification code comprises any one or more of the following: one-dimensional bar codes, two-dimensional codes, three-dimensional structure codes and custom codes; the custom code comprises any one or more of: dots, lines, numbers, text, graphics, and images.
10. A closure opening system, the system comprising: the NFC lock comprises an identification module, a Near Field Communication (NFC) module and a lock module; the lock module is arranged on the product seal and is arranged as a locking seal; the NFC module is arranged on a product, and the identification module is arranged on a terminal;
the identification module is used for scanning and identifying the identification code of the product to be opened and sealed;
the identification module is further configured to send an identification valid instruction through a Near Field Communication (NFC) function in the terminal after the identification code is successfully identified;
and the NFC module is set to acquire the identification effective instruction and controls a lock module arranged at the sealing position of the product to unlock according to the identification effective instruction so as to open the sealing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110097002.7A CN112800794A (en) | 2021-01-25 | 2021-01-25 | Method and system for opening seal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110097002.7A CN112800794A (en) | 2021-01-25 | 2021-01-25 | Method and system for opening seal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112800794A true CN112800794A (en) | 2021-05-14 |
Family
ID=75811559
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110097002.7A Pending CN112800794A (en) | 2021-01-25 | 2021-01-25 | Method and system for opening seal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112800794A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113327351A (en) * | 2021-05-24 | 2021-08-31 | 李峰 | Unlocking method and system for locking closure |
CN113879694A (en) * | 2021-11-16 | 2022-01-04 | 西安亿力通网络科技有限公司 | Dynamic password bottle cap and management platform |
CN114463021A (en) * | 2022-01-21 | 2022-05-10 | 四川刨根科技有限公司 | Product anti-counterfeiting system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102946484A (en) * | 2012-11-16 | 2013-02-27 | Tcl通讯(宁波)有限公司 | Method for unlocking mobile terminal by near-filed communication and system |
CN105788046A (en) * | 2016-03-09 | 2016-07-20 | 宁波萨瑞通讯有限公司 | Unlocking and door opening system and method based on mobile phone LED light |
CN106355717A (en) * | 2016-09-05 | 2017-01-25 | 惠州Tcl移动通信有限公司 | Mobile terminal unlocking method and system based on fingerprint recognition and NFC (near field communication) |
CN106600790A (en) * | 2016-12-27 | 2017-04-26 | 北京群菱能源科技有限公司 | RFID electronic lock and unlocking method |
CN108961583A (en) * | 2018-06-15 | 2018-12-07 | 杭州后博科技有限公司 | A kind of shared bicycle based on account authentication borrows returning method and system |
CN110282229A (en) * | 2019-07-17 | 2019-09-27 | 中钞实业有限公司 | A kind of circulating package box and recycling method based on Internet of Things |
CN211418184U (en) * | 2019-10-22 | 2020-09-04 | 四川富亿联信息科技有限公司 | Opening-proof sealing structure for wooden packaging gift box |
-
2021
- 2021-01-25 CN CN202110097002.7A patent/CN112800794A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102946484A (en) * | 2012-11-16 | 2013-02-27 | Tcl通讯(宁波)有限公司 | Method for unlocking mobile terminal by near-filed communication and system |
CN105788046A (en) * | 2016-03-09 | 2016-07-20 | 宁波萨瑞通讯有限公司 | Unlocking and door opening system and method based on mobile phone LED light |
CN106355717A (en) * | 2016-09-05 | 2017-01-25 | 惠州Tcl移动通信有限公司 | Mobile terminal unlocking method and system based on fingerprint recognition and NFC (near field communication) |
CN106600790A (en) * | 2016-12-27 | 2017-04-26 | 北京群菱能源科技有限公司 | RFID electronic lock and unlocking method |
CN108961583A (en) * | 2018-06-15 | 2018-12-07 | 杭州后博科技有限公司 | A kind of shared bicycle based on account authentication borrows returning method and system |
CN110282229A (en) * | 2019-07-17 | 2019-09-27 | 中钞实业有限公司 | A kind of circulating package box and recycling method based on Internet of Things |
CN211418184U (en) * | 2019-10-22 | 2020-09-04 | 四川富亿联信息科技有限公司 | Opening-proof sealing structure for wooden packaging gift box |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113327351A (en) * | 2021-05-24 | 2021-08-31 | 李峰 | Unlocking method and system for locking closure |
CN113879694A (en) * | 2021-11-16 | 2022-01-04 | 西安亿力通网络科技有限公司 | Dynamic password bottle cap and management platform |
CN114463021A (en) * | 2022-01-21 | 2022-05-10 | 四川刨根科技有限公司 | Product anti-counterfeiting system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112800794A (en) | Method and system for opening seal | |
US20180108024A1 (en) | Open registry for provenance and tracking of goods in the supply chain | |
Glover et al. | RFID essentials | |
US7438237B2 (en) | Method for identification and authenticating without specific reader an identifier | |
US7860268B2 (en) | Object authentication using encoded images digitally stored on the object | |
US20180032759A1 (en) | Open registry for human identification | |
CN101516635B (en) | Anti-counterfeit mark, anti-counterfeit packaging and method for detecting counterfeit product | |
CN107924468A (en) | The simple authentication of element in blister package | |
CN103577780B (en) | System and method for managing protected article | |
US12335736B2 (en) | Devices, systems, and methods using microtransponders | |
WO2018075403A1 (en) | Open registry for provenance and tracking of goods in the supply chain | |
CN103771018A (en) | IOT anti-counterfeiting wine bottle and using method thereof | |
US20200074130A1 (en) | Item identification | |
JP7578307B2 (en) | Package with radio frequency identification sticker | |
HU217539B (en) | Arrangement for protecting documents or objects closed into container provided with protection | |
CN108446917A (en) | A kind of packing material system and method based on block chain | |
CN103489106B (en) | Chip label anti-counterfeiting method and system matched with positioning | |
CN215827410U (en) | Seal lock, product packaging material, product container and bottle cap | |
CN108764434A (en) | Using the antifalsification label of identification code | |
CN110503437A (en) | Based on the article anti-counterfeit method more identified and its system | |
TWM454594U (en) | The mating positioning chip tag anti-fake system | |
WO2012147029A1 (en) | Anti-counterfeit labeling system | |
US11790378B2 (en) | Method for provisioning a container with food | |
US20250190737A1 (en) | Authentication system for consumer products | |
CN120317889A (en) | A product verification system, verification method and application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210514 |
|
RJ01 | Rejection of invention patent application after publication |