CN203338404U - A product anti-counterfeiting system based on machine vision and two-dimensional graphics - Google Patents
A product anti-counterfeiting system based on machine vision and two-dimensional graphics Download PDFInfo
- Publication number
- CN203338404U CN203338404U CN2013201805225U CN201320180522U CN203338404U CN 203338404 U CN203338404 U CN 203338404U CN 2013201805225 U CN2013201805225 U CN 2013201805225U CN 201320180522 U CN201320180522 U CN 201320180522U CN 203338404 U CN203338404 U CN 203338404U
- Authority
- CN
- China
- Prior art keywords
- counterfeiting
- product
- code
- query
- switch
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000010295 mobile communication Methods 0.000 claims abstract description 8
- 238000007726 management method Methods 0.000 claims description 48
- 238000012552 review Methods 0.000 claims description 15
- 238000012423 maintenance Methods 0.000 claims description 9
- 238000013523 data management Methods 0.000 claims description 2
- 238000005336 cracking Methods 0.000 abstract 1
- 238000000034 method Methods 0.000 description 20
- 238000005516 engineering process Methods 0.000 description 7
- 238000004806 packaging method and process Methods 0.000 description 5
- 238000013507 mapping Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000012216 screening Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000011248 coating agent Substances 0.000 description 1
- 238000000576 coating method Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000006748 scratching Methods 0.000 description 1
- 230000002393 scratching effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Landscapes
- Telephonic Communication Services (AREA)
Abstract
Description
技术领域technical field
本实用新型属于产品防伪技术领域,尤其涉及一种利用机器视觉和基于二维图形的产品防伪系统。The utility model belongs to the technical field of product anti-counterfeiting, in particular to a product anti-counterfeiting system based on machine vision and two-dimensional graphics.
背景技术Background technique
随着高科技的发展,假冒产品也随之出现,且层出不穷,市场上各种假冒、高仿产品的出现,不仅侵害了广大消费者的利益,也扰乱了正常的市场秩序,且给生产厂商带来了巨大的经济损失。伴随着假冒产品的出现,各种对抗假冒产品的技术也随之出现。虽然目前也有不少防伪方法的产生,但传统的防伪方法一般限于物理包装防伪和数码编码防伪这两种。物理包装防伪需专用的鉴别工具,相对于消费者来说要检验所购买的产品是否是真品比较困难,且一些不法分子会通过回收真品的包装,用真包装去装入假产品,这样,对于消费者来说从物理包装上就更难识别了。数码编码防伪的查询也有诸多不便,消费者真正使用的机会并不多。With the development of high technology, counterfeit products also appear, and emerge in endlessly. The emergence of various counterfeit and high-imitation products in the market not only infringes on the interests of consumers, but also disrupts the normal market order, and brings great harm to manufacturers. brought huge economic losses. Along with the appearance of counterfeit products, various technologies against counterfeit products have also emerged. Although many anti-counterfeiting methods are also produced at present, traditional anti-counterfeiting methods are generally limited to these two kinds of physical packaging anti-counterfeiting and digital coding anti-counterfeiting. Physical packaging anti-counterfeiting requires special identification tools. Compared with consumers, it is more difficult to verify whether the purchased product is genuine, and some criminals will recycle the genuine packaging and use the genuine packaging to load fake products. In this way, for It is even more difficult for consumers to identify from the physical packaging. The anti-counterfeiting inquiry of the digital coding also has many inconveniences, and the chance that the consumer really uses is not many.
现在已有基于物联网技术的产品防伪方法,是通过利用网络平台或者是电话平台进行查询防伪编码的真伪和获得密码锁的开锁密码,但此种方法消费者在使用的过程中还是不太方便,也不能及时的得知产品的真伪,与此同时防伪技术的防伪编码过长,在使用中会给生产厂商带来诸多不便。Now there is a product anti-counterfeiting method based on the Internet of Things technology, which is to use the network platform or the telephone platform to query the authenticity of the anti-counterfeiting code and obtain the unlocking password of the combination lock, but this method is not used by consumers. It is convenient, and the authenticity of the product cannot be known in time. At the same time, the anti-counterfeiting code of the anti-counterfeiting technology is too long, which will bring a lot of inconvenience to the manufacturer in use.
实用新型内容Utility model content
本实用新型所要解决的技术问题在于提供一种利用机器视觉和基于二维图形的产品防伪系统,旨在解决产品防伪技术的问题。通过机器视觉方式对真伪二维图形进行自动识别,通过客户端软件选择短信查询或网络查询方式发送防伪编码到产品防伪信息系统本地后台或者厂家后台数据库管理系统中,后台数据库反馈产品的真伪信息给用户,从而完成产品的真伪查询;用户需开启产品时,通过机器视觉方式对开锁二维图形进行自动识别,通过客户端软件选择短信查询或网络查询方式发送防伪编码到产品防伪信息系统本地后台或者厂家后台数据库管理系统中,后台数据库管理系统反馈开锁密码给用户,从而完成产品的开启。The technical problem to be solved by the utility model is to provide a product anti-counterfeiting system based on machine vision and two-dimensional graphics, aiming to solve the problem of product anti-counterfeiting technology. Automatic identification of true and false two-dimensional graphics through machine vision, and send anti-counterfeiting codes to the local background of the product anti-counterfeiting information system or the manufacturer's background database management system through the client software to select SMS query or network query, and the background database will feedback the authenticity of the product The information is sent to the user, so as to complete the authenticity query of the product; when the user needs to open the product, the two-dimensional figure for unlocking is automatically recognized through machine vision, and the anti-counterfeiting code is sent to the product anti-counterfeiting information system through the client software to select SMS query or network query In the local background or the manufacturer's background database management system, the background database management system feeds back the unlock password to the user, thereby completing the opening of the product.
本实用新型是这样实现的,一种利用机器视觉和基于二维图形的产品防伪系统,包括密码锁、客户端设备、电话网、移动通信网络、Internet网络、服务器端、防伪码查询及管理单元、交换机、订单管理模块、产品防伪码标签生成单元;The utility model is realized in this way, a product anti-counterfeiting system based on machine vision and two-dimensional graphics, including a password lock, client equipment, telephone network, mobile communication network, Internet network, server end, anti-counterfeiting code query and management unit , a switch, an order management module, and a product anti-counterfeiting code label generation unit;
所述服务器端用于放置网站主页、短信查询接口、网络查询接口;The server end is used to place the homepage of the website, the short message query interface, and the network query interface;
所述密码锁加在防伪产品的开口处;The combination lock is added to the opening of the anti-counterfeiting product;
所述客户端设备通过所述电话网、所述移动通信网络、所述Internet网络中的一个或多个与所述服务器端连接;The client device is connected to the server through one or more of the telephone network, the mobile communication network, and the Internet network;
所述交换机与所述服务器端连接,用于数据之间的交换;The switch is connected to the server for exchanging data;
所述防伪码查询及管理单元与所述交换机连接;The anti-counterfeiting code query and management unit is connected to the switch;
所述订单管理模块分别与所述交换机、所述产品防伪码标签生成单元相连,所述订单管理模块发送防伪码信息给所述产品防伪码标签生成单元,所述产品防伪码标签生成单元生成产品防伪码标签,所述产品防伪码标签包含有二维图形。The order management module is respectively connected with the switch and the product anti-counterfeiting code label generating unit, and the order management module sends anti-counterfeiting code information to the product anti-counterfeiting code label generating unit, and the product anti-counterfeiting code label generating unit generates a product An anti-counterfeit code label, the product anti-counterfeit code label contains two-dimensional graphics.
进一步地,所述客户端设备包括电话、手机、平板电脑、便携式电脑和PC机。Further, the client devices include phones, mobile phones, tablet computers, laptops and PCs.
进一步地,所述订单管理模块包括防伪码生成单元、订单与合同管理单元和扩展应用单元;Further, the order management module includes an anti-counterfeiting code generation unit, an order and contract management unit and an extended application unit;
所述防伪码生成单元与所述交换机相连,用于根据防伪码编码规则生成防伪码中的产品防伪查询码和产品开锁查询码并转换成二维图形;The anti-counterfeiting code generation unit is connected to the switch, and is used to generate the product anti-counterfeiting query code and the product unlocking query code in the anti-counterfeiting code according to the coding rules of the anti-counterfeiting code and convert them into two-dimensional graphics;
所述订单与合同管理单元与所述交换机相连,用于管理企业通过网页下载的订单并对企业上传的合同进行审查,审查合格后发送生产产品防伪码标签的指令;The order and contract management unit is connected to the switch, and is used to manage the orders downloaded by the enterprise through the webpage and review the contract uploaded by the enterprise, and send an instruction to produce a product anti-counterfeiting code label after passing the review;
所述扩展应用单元与所述交换机相连,用于扩展订单管理模块的功能。The extended application unit is connected to the switch and is used to expand the functions of the order management module.
进一步地,所述产品防伪系统还包括与所述交换机相连的系统管理与维护模块和产品数据库,所述系统管理与维护模块用于对数据进行管理与定期维护,所述产品数据库用于存储产品信息的数据。Further, the product anti-counterfeiting system also includes a system management and maintenance module and a product database connected to the switch, the system management and maintenance module is used to manage and regularly maintain data, and the product database is used to store product Informational data.
本实用新型与现有技术相比,有益效果在于本实用新型的产品防伪方法能有效打击市场产品造假,更好地保护消费者的合法权益,且充分结合了智能手机、平板电脑在产品防伪中的应用,同时解决了目前产品防伪技术因为防伪编码过长的技术性问题,集成了多种现代的高新技术的新型防伪技术。Compared with the prior art, the utility model has the beneficial effect that the product anti-counterfeiting method of the utility model can effectively combat product counterfeiting in the market, better protect the legitimate rights and interests of consumers, and fully combine smart phones and tablet computers in product anti-counterfeiting At the same time, it solves the technical problem of the current product anti-counterfeiting technology because the anti-counterfeiting code is too long, and integrates a variety of modern high-tech new anti-counterfeiting technologies.
附图说明Description of drawings
图1是本实用新型实施例提供的产品防伪系统结构图;Fig. 1 is the structural diagram of the product anti-counterfeiting system provided by the utility model embodiment;
图2是本实用新型实施例提供的产品防伪方法原理图。Fig. 2 is a schematic diagram of the product anti-counterfeiting method provided by the embodiment of the utility model.
具体实施方式Detailed ways
为了使本实用新型的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本实用新型进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本实用新型,并不用于限定本实用新型。In order to make the purpose, technical solution and advantages of the utility model clearer, the utility model will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the utility model, and are not intended to limit the utility model.
本实用新型的产品防伪方法结合物理加密装置和信息加密两重保护来达到防伪的目的。物理加密装置比如电子锁、机械锁等对每一个产品进行物理加密,达到第一层防伪的目的。物理加密也即利用加密装置对产品的开启进行封锁,只有当用户输入正确的密码才能实现产品的开启和关闭。例如,要对酒进行防伪,首先将传统的酒瓶盖做成带有机械密码锁的酒瓶盖,加装到酒瓶口,再设置机械密码,只有当从厂家处获得正确的开锁密码后才能打开酒瓶。The product anti-counterfeiting method of the utility model combines the double protection of the physical encryption device and the information encryption to achieve the purpose of anti-counterfeiting. Physical encryption devices such as electronic locks, mechanical locks, etc. physically encrypt each product to achieve the first layer of anti-counterfeiting. Physical encryption is to use the encryption device to block the opening of the product. Only when the user enters the correct password can the product be opened and closed. For example, to carry out anti-counterfeiting on wine, first make the traditional wine bottle cap into a wine bottle cap with a mechanical code lock, add it to the mouth of the wine bottle, and then set the mechanical code, only after obtaining the correct unlock code from the manufacturer to open the bottle.
信息加密是利用信息系统对每一个产品进行信息加密来达到第二层防伪的目的。制造商将出产的每一个产品的相关信息比如产品编码、产品类别、企业组织机构代码等一一映射到唯一的二维条码上,同时这些信息也被制造商提交到一个基于互联网的产品防伪查询信息系统。通过这个过程使得每个产品的物理信息与产品防伪信息系统中经过制造商认证的产品信息建立一一对应关系,并将这些信息通过电话、短消息、网络的方式提交到该防伪查询信息系统进行一一验证即可判断该产品的真伪从而达到防伪的目的。Information encryption is to use the information system to encrypt information for each product to achieve the second layer of anti-counterfeiting. The manufacturer maps the relevant information of each product produced, such as product code, product category, enterprise organization code, etc., to a unique two-dimensional barcode, and the information is also submitted by the manufacturer to an Internet-based product anti-counterfeiting inquiry Information system. Through this process, a one-to-one correspondence is established between the physical information of each product and the product information certified by the manufacturer in the product anti-counterfeiting information system, and the information is submitted to the anti-counterfeiting inquiry information system through telephone, short message, and network. One by one verification can judge the authenticity of the product so as to achieve the purpose of anti-counterfeiting.
如图1所示,一种利用机器视觉和基于二维图形的产品防伪系统,包括密码锁、客户端设备101、电话网102、移动通信网络103、Internet网络104、服务器端106、防伪码查询及管理单元105、交换机107、订单管理模块108、产品防伪码标签生成单元109。所述密码锁加在防伪产品的开口处;所述服务器端106用于放置网站主页、短信查询接口、网络查询接口。所述客户端设备101通过所述电话网102、所述移动通信网络103、所述Internet网络104中的一个或多个与所述服务器端106连接。所述防伪查询及管理单元105与所述交换机107连接。所述交换机107与所述服务器端106连接,用于数据之间的交换。所述订单管理模块108分别与所述交换机107、所述产品防伪码标签生成单元109相连,所述订单管理模块108发送防伪码信息给所述产品防伪码标签生成单元109,所述产品防伪码标签生成单元109生成产品防伪码标签112,所述产品防伪码标签112包含有二维图形。As shown in Figure 1, a product anti-counterfeiting system based on machine vision and two-dimensional graphics includes a password lock, a
进一步地,所述客户端设备101包括电话、手机、平板电脑、便携式电脑、PC机,优选地,所述手机为智能手机;所述智能手机、平板电脑、便携式电脑安装有摄像头。Further, the
进一步地,所述订单管理模块108包括防伪码生成单元、订单与合同管理单元和扩展应用单元。所述防伪码生成单元与所述交换机相连,用于根据防伪码编码规则生成产品防伪码标签中的产品防伪查询码和产品开锁查询码并转换成二维图形,并对生成的防伪码进行管理。所述订单与合同管理单元与所述交换机相连,用于管理企业通过网页下的订单并对企业上传的合同进行审查,审查合格后发送生产产品防伪码标签的指令。所述扩展应用单元与所述交换机相连,用于扩展订单管理模块108的功能。Further, the
所述利用机器视觉和基于二维图形的产品防伪系统还包括与所述交换机107相连的系统管理与维护模块110和产品数据库111,所述系统管理与维护模块110用于对数据进行管理与定期维护,所述产品数据库111用于存储产品信息的数据。The product anti-counterfeiting system based on machine vision and two-dimensional graphics also includes a system management and
如图2所示,本实用新型还提供一种利用机器视觉和基于二维图形的产品防伪方法,包括以下步骤:As shown in Figure 2, the utility model also provides a product anti-counterfeiting method based on machine vision and two-dimensional graphics, including the following steps:
步骤A、订单管理模块108将厂家提供的产品信息通过防伪码生成单元中的防伪码编码和加密软件产生防伪码,所述防伪码有包括产品防伪查询码和/或产品开锁查询码,并用数据加密算法对所述产品防伪查询码和/或产品开锁查询码进行加密,并转换成二维图形,并将所述二维图形的信息上传至产品数据库111,印刷有所述二维图形的产品防伪码标签112挂在产品或者密码锁上;Step A, the
步骤B、客户端设备101采集产品或者密码锁上的二维图形并识别,得到产品防伪码,并将得到的防伪码发送到防伪码查询及管理单元105,所述防伪码查询及管理单元105对防伪码进行解密后通过交换机107进入产品数据库111进行匹配,并将匹配结果返回给客户端设备101;Step B, the
在所述步骤B中,用户需验证产品真假时,通过下载系统开发的客户端软件并安装;打开客户端软件出现二维图形识别界面,用户将摄像头对着二维图形进行自动识别,识别后用户可以选择短信查询或者网络查询,防伪码会被发送到防伪码查询及管理单元105,所述防伪码查询及管理单元105对防伪码进行解密后通过交换机107进入产品数据库111进行匹配,如果找到对应的防伪码则通过短信或者网络的方式返回给用户;如果是产品防伪查询码则返回产品的真伪,如果是产品开锁查询码则返回对应产品的开锁密码,用户在得到开锁密码后根据标签上的说明开启密码锁即可。In said step B, when the user needs to verify the authenticity of the product, the client software developed by the system is downloaded and installed; the client software is opened and a two-dimensional graphic recognition interface appears, and the user automatically recognizes the two-dimensional graphic with the camera, and recognizes Afterwards, the user can select SMS inquiry or network inquiry, and anti-counterfeit code can be sent to anti-counterfeit code inquiry and
本实用新型所述的防伪码的生成及交易过程实现了自动化。企业通过网络定制防伪查询服务、定制密码锁、订单的管理服务,针对订单产生对应数量的防伪码并转换成二维图形、产品数据库、系统管理与维护、语音查询接口、网络查询接口、短信查询接口、数据库加密、防伪码编码规则、手机客户端二维图形软件。The generation of the anti-counterfeiting code and the transaction process described in the utility model realize automation. Enterprises customize anti-counterfeiting query services, custom password locks, and order management services through the network, generate a corresponding number of anti-counterfeiting codes for orders and convert them into two-dimensional graphics, product databases, system management and maintenance, voice query interfaces, network query interfaces, SMS queries Interface, database encryption, anti-counterfeiting code coding rules, two-dimensional graphics software for mobile client.
所述订单管理模块将厂家提供的产品信息通过防伪码生成单元中的防伪码编码和加密软件产生防伪码以及防伪码的交易包括以下步骤:Described order management module generates anti-counterfeit code and the transaction of anti-counterfeit code by anti-counterfeit code coding and encryption software in the anti-counterfeit code generation unit with the product information that manufacturer provides and comprises the following steps:
步骤1、企业通过登陆网页进行下单,管理员在通过订单与合同管理单元审核订单,审核合格后则允许企业用户通过服务器端106在网页上进行下载和上传已经签好的合同;Step 1. The enterprise places an order by logging on to the webpage. The administrator reviews the order through the order and contract management unit. After passing the review, the enterprise user is allowed to download and upload the signed contract on the webpage through the
步骤2、管理员通过订单与合同管理单元审核企业上传的合同,通过则企业需要根据定制的服务数量和服务年限缴纳相应的订金;Step 2. The administrator reviews the contract uploaded by the enterprise through the order and contract management unit. If the contract is passed, the enterprise needs to pay the corresponding deposit according to the customized service quantity and service period;
步骤3、管理员核实是否收到订金,是则开始根据企业用户提供的订单信息产生对应的防伪码并生成二维图形用产品防伪码标签生成单元109打印出来;所述防伪码的产生是按照一定的编码规则产生;所述防伪码采用加密算法加密,成为加密后的防伪码提供给企业用户;Step 3, the administrator checks whether the deposit is received, and if so, starts to generate a corresponding anti-counterfeiting code according to the order information provided by the enterprise user and generates a two-dimensional graphic to print out with the product anti-counterfeiting code
步骤4、二维图形标签与密码锁一起寄给企业用户手中,企业用户直接加在产品上;Step 4. The two-dimensional graphic label and the password lock are sent to the enterprise user together, and the enterprise user directly adds it to the product;
步骤5、系统管理员将电子版本的防伪码上传到产品数据库111中,系统管理员审核无误则防伪码可以开始启动查询服务,该订单的产品开始销售;Step 5, the system administrator uploads the electronic version of the anti-counterfeit code to the
步骤6、企业产品出售后,用户购买产品后,进行真伪查询和获取开锁密码;Step 6. After the company's products are sold, after the user purchases the product, conduct an authenticity inquiry and obtain the unlock password;
步骤7、产品出售后,用户根据刮开隐码涂层,得到开锁查询码,进行开锁查询。如果系统返回开锁密码直接开锁即可,如果返回的是开锁索引码则用户根据索引码在标签上找到对应的密码,比如X1Y1Z1Z2对应开锁密码是1478。系统返回给用户的是密码还是索引码是根据企业用户的要求来决定的。Step 7. After the product is sold, the user obtains the unlocking query code by scratching off the hidden code coating, and performs unlocking query. If the system returns the unlock password, it can be unlocked directly. If the unlock index code is returned, the user can find the corresponding password on the label according to the index code. For example, the corresponding unlock password of X1Y1Z1Z2 is 1478. Whether the system returns the password or the index code to the user is determined according to the requirements of the enterprise user.
所述步骤1、2和3提到的订单与合同管理单元主要用于管理防伪码的订单,可以实现对订单内容的审核、对不合格的订单进行批注、合同内容进行查看审核、对不合格的合同进行批注、查看订单详情、更改订单的状态。主要功能有订单的审核、合同审核、确定收款审核等状态显示。一切工作完成后开始进入查询阶段,企业要先开启服务,服务方开始服务后正式投入运营,当订单已经到期则状态改为服务停止,当停止的订单根据情况可以删除订单,产品数据库的开锁表和防伪码表也同时删除。所述订单与合同管理单元提供根据订单的状态来对订单进行分类,比如当选择提交订单等待审核,则出现的都会是提交订单等待审核的部分。The order and contract management unit mentioned in steps 1, 2 and 3 is mainly used to manage the orders of anti-counterfeiting codes, which can realize the review of order content, annotate unqualified orders, check and review contract content, and check unqualified Annotate the contract, view order details, and change the status of the order. The main functions include status display such as order review, contract review, and payment confirmation review. After all the work is completed, it enters the query stage. The enterprise must first start the service. The service provider will start the service and put it into operation. When the order has expired, the status will change to the service stop. When the stop order can be deleted according to the situation, the product database will be unlocked. Table and anti-counterfeiting code table are also deleted at the same time. The order and contract management unit provides to classify orders according to the status of the order. For example, when you choose to submit an order for review, the part that appears will be the part of submitting the order for review.
进一步地,所述步骤3中按照一定的编码规则如下:防伪码分为前、中、后三段,前段的编码为防伪码加密算法得到,中间段为系统产生的随机码,后段编码为产品编号;防伪码共31位,分别是前段码10位,中段码10位,后段码10位,效验码1位,产生对应的防伪码的步骤包括:Further, in the step 3, according to certain coding rules, the anti-counterfeiting code is divided into three sections: front, middle and back, the encoding of the front section is obtained by the encryption algorithm of the anti-counterfeiting code, the middle section is a random code generated by the system, and the back section is encoded as Product number; the anti-counterfeit code has a total of 31 digits, which are 10 digits in the front code, 10 digits in the middle code, 10 digits in the rear code, and 1 digit in the verification code. The steps to generate the corresponding anti-counterfeiting code include:
步骤301:前段码通过函数x=f(y)得到,y为中段码,x为前段码,均为10位数字,比如,y等于1234567890,取偶数位24680;Step 301: the previous code is obtained by the function x=f(y), y is the middle code, x is the previous code, both are 10-digit numbers, for example, y is equal to 1234567890, and the even digit is 24680;
步骤302:根据步骤31得到的y的偶数位在映射表中找到对应的值,并将在映射表中找到对应的值替换偶数位的数字,得到新的y,比如24680在映射表中对应的数为A8F4C,将A8F4C替换24680,则y等于1A385F749C;Step 302: Find the corresponding value in the mapping table according to the even-numbered digit of y obtained in step 31, and replace the even-numbered digit with the corresponding value in the mapping table to obtain a new y, such as 24680 corresponding to in the mapping table The number is A8F4C, replace 24680 with A8F4C, then y is equal to 1A385F749C;
映射表:Mapping table:
步骤303:将新的y转为二进制数,比如,1A385F749C转化为二进制等于1101000111000010111110111010010011100;Step 303: convert the new y into a binary number, for example, 1A385F749C is converted into a binary number equal to 1101000111000010111110111010010011100;
步骤304:所述二进制数奇数位和偶数位对调,比如,所举的例子的数奇数位和偶数位对调后为1110001011000001111101110101100011010;Step 304: Swap the odd and even bits of the binary number, for example, after swapping the odd and even bits of the given example, it is 1110001011000001111101110101100011010;
步骤305:偶数位和奇数位对换后再转成十进制,所得的十进制如果超过10位则取前10位,不超过10位则在前面补齐10位;Step 305: Swap even digits and odd digits and then convert to decimal. If the obtained decimal exceeds 10 digits, take the first 10 digits, and if it does not exceed 10 digits, fill in the front with 10 digits;
步骤306:效验码分别由前段码、中段码、后段码的中间两位数乘以密钥,然后除以10得到的余数,例如防伪码为7883137400-12345678936-0201208010-6。密钥为123456,则效验码等于(1*1+3*2+5*3+6*4+2*5+0*6)%10=6。Step 306: The verification code is the remainder obtained by multiplying the middle two digits of the front code, middle code, and rear code by the key, and then dividing by 10. For example, the anti-counterfeiting code is 7883137400-12345678936-0201208010-6. The key is 123456, and the verification code is equal to (1*1+3*2+5*3+6*4+2*5+0*6)%10=6.
所述步骤3提到的产生对应的防伪码并生成二维图形主要包括查找产品数据库等待生成防伪码的订单,找到订单后防伪码生成单元为该订单生成防伪码,并对生成的防伪码转换成对应的二维图形,并按顺序保存到word文档。主要功能是根据订单状态查找到需要生成防伪码的编号,第一步:订单根据前面提到的编码规则生成产品防伪码;第二步:根据步骤(1)得到的防伪码生成二维图形;第三步:把二维图形排版好按顺序保存到一个word里面。Said step 3 mentions generating corresponding anti-counterfeiting codes and generating two-dimensional graphics mainly including searching the product database and waiting to generate orders for anti-counterfeiting codes, after finding the order, the anti-counterfeiting code generating unit generates anti-counterfeiting codes for the order, and converts the generated anti-counterfeiting codes into corresponding two-dimensional graphics and save them in word documents in sequence. The main function is to find the number that needs to generate an anti-counterfeit code according to the order status. The first step: the order generates a product anti-counterfeit code according to the aforementioned coding rules; the second step: generates a two-dimensional graphic based on the anti-counterfeit code obtained in step (1); Step 3: Typeset the two-dimensional graphics and save them in a word in order.
所述步骤3中提到的加密算法定义如下:The encryption algorithm mentioned in the step 3 is defined as follows:
相关字符串定义:Relevant string definitions:
第一步:被加密字符串:Cn={c0c1c2c3…ci…cn-1}Step 1: Encrypted string: Cn={c0c1c2c3…ci…cn-1}
其中:i为Cn中字符的序号(取值范围0~n-1);Among them: i is the serial number of the character in Cn (value range 0~n-1);
N为Cn长度。N is the length of Cn.
第二步:已加密字符串:Dn={d0d1d2d3…di…dn-1}Step 2: Encrypted string: Dn={d0d1d2d3…di…dn-1}
其中:i为Dn中字符的序号(取值范围0~n-1);Among them: i is the serial number of the character in Dn (value range 0~n-1);
N为Dn长度。N is the length of Dn.
第三步:数据库表主键:Px={p0p1p2p3…pa…px-1}Step 3: Database table primary key: Px={p0p1p2p3...pa...px-1}
其中:i为Px中字符的序号(取值范围0~x-1);Among them: i is the serial number of the character in Px (value range 0~x-1);
x为Px长度。x is the length of Px.
第四步:密匙字符:KStep 4: Key character: K
算法定义:Algorithm definition:
K的生成算法:The generation algorithm of K:
设flag=(p1+p2+p3+…pa+…px+i)%4则Set flag=(p1+p2+p3+...pa+...px+i)%4 then
if flag=0,K=0x01;if flag=0, K=0x01;
if flag=1,K=0x02;if flag=1, K=0x02;
if flag=2,K=0x04;if flag=2, K=0x04;
if flag=3,K=0x08。if flag=3, K=0x08.
运算符%意义:C=A%B表示C为A除以B的余数。Operator% meaning: C=A%B means that C is the remainder of dividing A by B.
第二步中Dn的生成算法:The generation algorithm of Dn in the second step:
di=K^cidi=K^ci
运算符^意义:C=A^B表示C为A与B按位与或的结果。Significance of operator ^: C=A^B means that C is the result of bitwise AND or of A and B.
进一步地,所述步骤6中进行真伪查询和获取开锁密码有四种方法:Further, there are four methods for authenticity inquiry and obtaining unlocking password in said step 6:
方法一:用户以其他二维图形识别软件拍产品标签上方的二维图形得到本系统包含的手机客户端软件下载地址,通过访问网页下载客户端软件,下载安装完毕后打开拍真防伪软件,拍产品防伪码标签上的产品防伪查询码或者是产品开锁查询码,用户选择发送短信查询,则系统会将查询结果通过短信发送到用户手机,用户选择网络查询则结果直接返回到软件页面;Method 1: The user uses other two-dimensional graphic recognition software to take a picture of the two-dimensional graphic on the top of the product label to obtain the download address of the mobile client software included in the system, and download the client software by visiting the webpage. The product anti-counterfeiting query code or product unlocking query code on the product anti-counterfeiting code label, if the user chooses to send SMS query, the system will send the query result to the user's mobile phone through SMS, and the user will directly return the result to the software page if the user chooses network query;
方法二:发送标签上的产品防伪查询码或者是产品开锁查询码到标签上的号码,系统会将查询结果通过短信发送到用户手机;Method 2: Send the product anti-counterfeiting query code on the label or the product unlocking query code to the number on the label, and the system will send the query result to the user's mobile phone via SMS;
方法三:拨打热线电话根据语音导航进行查询,系统会将结果播报给用户;Method 3: Dial the hotline to inquire according to the voice navigation, and the system will broadcast the result to the user;
方法四:打开标签上的网站主页,输入产品防伪查询码或者是产品开锁查询码,系统会将结果直接通过对话框的方式显示。Method 4: Open the home page of the website on the label, enter the product anti-counterfeiting query code or product unlock query code, and the system will directly display the result in a dialog box.
所述步骤6中提到的客户端二维图形识别软件是充分利用智能手机、平板电脑的视觉系统并结合产品防伪系统开发的二维图形自动识别客户端软件,客户只需打开客户端软件对准印刷在产品防伪码标签上的防伪二维图形编码,客户端软件会自动完成二维图形识别,识别完成后客户端软件会弹出客户自动选择短信查询方式和网络查询方式,客户根据个人需求选择查询方式,系统就根据查询的内容进行对应的信息反馈。比如,查询产品真伪信息,系统就会反馈产品的真伪信息和产品生产公司;查询产品的开锁密码,系统就会反馈产品的开启密码服务信息;查询的不是本系统对应的防伪二维图形编码,系统就会反馈编码规则不正确,谨防假冒!The client two-dimensional pattern recognition software mentioned in the step 6 is a two-dimensional pattern automatic recognition client software developed by fully utilizing the visual system of smart phones and tablet computers and in conjunction with the product anti-counterfeiting system. The client only needs to open the client software to The anti-counterfeiting two-dimensional graphic code printed on the product anti-counterfeiting code label, the client software will automatically complete the two-dimensional graphic recognition, after the recognition is completed, the client software will pop up the customer to automatically select the SMS query method and the network query method, and the customer can choose according to individual needs In the query mode, the system will provide corresponding information feedback according to the content of the query. For example, if you inquire about the authenticity of a product, the system will feed back the authenticity information of the product and the product manufacturer; if you inquire about the unlock code of the product, the system will feed back the service information of the product’s unlock code; the query is not the anti-counterfeit two-dimensional graphic corresponding to the system Encoding, the system will feedback that the encoding rules are incorrect, beware of counterfeiting!
所述步骤6中涉及到的真伪查询过程,后台获取用户提供的防伪码后根据编码规则进行第一次的筛选,排除非本系统产生的防伪码。通过第一个筛选进入产品数据库查询,首先查看查询码或者IP地址是否被加入黑名单,所述黑名单主要针对恶意查询的用户,不在黑名单则查看是否符合查询条件,本系统在一个小时内同一个号码查询同一个账号只能查询一次,并且该产品还没有开锁。In the authenticity inquiry process involved in step 6, the background obtains the anti-counterfeit code provided by the user and performs the first screening according to the coding rules to exclude the anti-counterfeit codes not generated by the system. Through the first screening to enter the product database query, first check whether the query code or IP address has been added to the blacklist. The blacklist is mainly for users who inquire maliciously. If they are not in the blacklist, check whether they meet the query conditions. The same account number can only be queried once, and the product has not been unlocked.
所述步骤6中涉及到的获取开锁密码的过程,后台获取用户提供的查询码后,根据编码规则进行第一次的筛选,排除非本系统产生的防伪码。通过第一次筛选进入产品数据库查询,首先查看查询号码或者IP地址是否被加入黑名单,黑名单主要针对恶意查询的用户,不在黑名单则查看是否符合查询条件,产品是否开过锁,开过则检查本次查询的号码或者IP地址跟开锁的是否一致,一致则返回开锁索引码,不是则不返回结果,提示已经被开锁了。In the process of obtaining the unlock password involved in step 6, after the background obtains the query code provided by the user, the first screening is carried out according to the coding rules to exclude the anti-counterfeiting code not generated by the system. Through the first screening to enter the product database query, first check whether the query number or IP address has been added to the blacklist. The blacklist is mainly for malicious query users. If it is not in the blacklist, check whether it meets the query conditions and whether the product has been unlocked. Then check whether the number or IP address of this query is consistent with the unlocked one. If they are consistent, the unlocking index code will be returned. If not, no result will be returned, indicating that the lock has been unlocked.
所述步骤6中涉及到的语音查询系统主要是通过自助或者人工服务的方式对防伪码进行查询。自助的方式主要是通过拨打系统提供的热线电话进行根据语音导航实现真伪查询、开锁密码获取、转人工服务的功能。当接到人工服务电话时,在语音查询系统输入防伪码,点击查询即可得到查询结果,结果在编辑框下面显示。The voice query system involved in step 6 mainly queries the anti-counterfeiting code through self-service or manual service. The way of self-help is mainly to dial the hotline provided by the system to realize the functions of authenticity inquiry, unlock password acquisition and transfer to manual service according to voice navigation. When receiving a manual service call, enter the anti-counterfeiting code in the voice query system, click query to get the query result, and the result will be displayed below the edit box.
以上所述仅为本实用新型的较佳实施例而已,并不用以限制本实用新型,凡在本实用新型的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本实用新型的保护范围之内。The above descriptions are only preferred embodiments of the present utility model, and are not intended to limit the present utility model. Any modifications, equivalent replacements and improvements made within the spirit and principles of the present utility model shall be included in this utility model. within the scope of protection of utility models.
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013201805225U CN203338404U (en) | 2013-04-11 | 2013-04-11 | A product anti-counterfeiting system based on machine vision and two-dimensional graphics |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013201805225U CN203338404U (en) | 2013-04-11 | 2013-04-11 | A product anti-counterfeiting system based on machine vision and two-dimensional graphics |
Publications (1)
Publication Number | Publication Date |
---|---|
CN203338404U true CN203338404U (en) | 2013-12-11 |
Family
ID=49707068
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2013201805225U Expired - Lifetime CN203338404U (en) | 2013-04-11 | 2013-04-11 | A product anti-counterfeiting system based on machine vision and two-dimensional graphics |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN203338404U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103218723A (en) * | 2013-04-11 | 2013-07-24 | 深圳大学 | Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure |
CN110533122A (en) * | 2019-09-03 | 2019-12-03 | 程烨 | A kind of shoes antifalsification label preparation method, device, server and storage medium |
-
2013
- 2013-04-11 CN CN2013201805225U patent/CN203338404U/en not_active Expired - Lifetime
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103218723A (en) * | 2013-04-11 | 2013-07-24 | 深圳大学 | Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure |
CN103218723B (en) * | 2013-04-11 | 2017-02-01 | 深圳市诚品鲜智能科技股份有限公司 | Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure |
CN110533122A (en) * | 2019-09-03 | 2019-12-03 | 程烨 | A kind of shoes antifalsification label preparation method, device, server and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103218723A (en) | Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure | |
CN103729770B (en) | A kind of anti-fake traceability system and its method | |
WO2021175023A1 (en) | Electronic warehouse receipt source tracing method and apparatus, computer device, and storage medium | |
CN102779284B (en) | RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like | |
CN108520293A (en) | A kind of product false proof source tracing method, device, server and storage medium | |
CN103093361A (en) | Commodity double-layer anti-fake method based on technologies of internet of things | |
CN104704493A (en) | Searchable encrypted data | |
CN102202051A (en) | Credible two-dimensional code system and application method thereof | |
WO2014127551A1 (en) | Merchandise anti-counterfeiting identification method | |
US20190288845A1 (en) | Security systems and methods for electronic devices | |
WO2013075547A1 (en) | Product anti-forgery method and system, and product identity information generation method and device | |
CN102622624B (en) | A kind of commodity counterfeit prevention identification system and method | |
CN101447985A (en) | Digital credentials method based on notarization information | |
CN202854882U (en) | Merchandise anti-counterfeiting system based on internet of tings technology | |
WO2015035766A1 (en) | Anti-counterfeiting control method in sale | |
CN115185244A (en) | A product quality traceability system and method based on identification analysis technology | |
CN203338404U (en) | A product anti-counterfeiting system based on machine vision and two-dimensional graphics | |
CN103235995A (en) | Electronic anti-counterfeiting and logistics management system based on NFC (near field communication) mobile phone | |
CN106504007A (en) | A kind of commodity counterfeit prevention management system based on NFC electronic tags | |
CN102819801B (en) | A kind of antiforge system of testing for anti counterfeit appts | |
CN105427116A (en) | Network service platform based digital watermark anti-counterfeit system | |
EP2668606A2 (en) | System for checking the authenticity of articles | |
CN107437188A (en) | A kind of method that fake certification is quickly realized using bar code | |
US20220414946A1 (en) | Systems and Methods for Distributed Entity Tracking | |
CN101193099B (en) | Signing system with counterfeit-prevention function and interactive display function and its realization method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CX01 | Expiry of patent term |
Granted publication date: 20131211 |
|
CX01 | Expiry of patent term |