CN1350265A - Coded figure recognizing anti-fake method and its anti-fake label - Google Patents

Coded figure recognizing anti-fake method and its anti-fake label Download PDF

Info

Publication number
CN1350265A
CN1350265A CN 00117522 CN00117522A CN1350265A CN 1350265 A CN1350265 A CN 1350265A CN 00117522 CN00117522 CN 00117522 CN 00117522 A CN00117522 A CN 00117522A CN 1350265 A CN1350265 A CN 1350265A
Authority
CN
China
Prior art keywords
code
authentication code
byte
authentication
commodity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 00117522
Other languages
Chinese (zh)
Inventor
周敬之
李耀波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHONGKUI INDUSTRY Co Ltd SHENZHEN
Original Assignee
ZHONGKUI INDUSTRY Co Ltd SHENZHEN
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHONGKUI INDUSTRY Co Ltd SHENZHEN filed Critical ZHONGKUI INDUSTRY Co Ltd SHENZHEN
Priority to CN 00117522 priority Critical patent/CN1350265A/en
Publication of CN1350265A publication Critical patent/CN1350265A/en
Pending legal-status Critical Current

Links

Abstract

The computer network system based coded pattern anti-counterfeit identification method and its label adopts the following steps: authenticating commodity authenticatino code produced by central server, enciphering, sending by means of network; receiving commodity authentication code by code-printing system, dividing it into three groups and printing out chevron coded pattern on the anti-counterfeit label; fetching said authentication code from the described commodity coded pattern by means of scanner of checking system, transferring it to authentication centre to distinguish the true from the false. Its anti-counterfeit label pattern is formed by coded three parts, its coded pattern is novel and beautiful, and can beautify external package of commodity, and its security is strong and its anti-counterfeit effect is good.

Description

Coded graphics Antiforge recognizing method and anti-fake label thereof
The present invention relates to field of anti-counterfeit technology, specifically be based on a kind of coded graphics Antiforge recognizing method and the anti-fake label thereof of computer network communication system.
At present anti-counterfeiting technology comprise mainly that the tearing broken type of cheque paper and anti-counterfeit printing, anti-forgery ink, laser hologram, magnetic card and IC-card, machinery or physics formula is false proof, encode false-proof etc.Applying of these anti-counterfeiting technologies and anti-fake product thereof effectively hit fake and forged phenomenon to a certain extent, safeguarded the order of the market economy.But; develop rapidly along with science and technology; the personation crime of commodity also develops to the direction of high-tech, intellectuality, scale, grouping of the world economy; make traditional anti-counterfeiting technology expose its limitation gradually; exist cost too high; not easy to identify, thousands of like product can only be with an identical anti-fake identification mark, as long as can carry out the imitated on a large scale deficiency that waits just break through one.
The encode false-proof of following new and high technologies such as computing machine, network to occur becomes a reality.Encode false-proof is given unique false proof number of every commodity, makes commodity have an I.D., by network, and the true and false that the anti-fake code of input commodity just can be checked commodity.But because commodity is of a great variety, enormous amount will give each part commodity unique numbering, must make the coding figure place of commodity become very long.The commodity code figure place is long, and the position that coding takies is big, has not only brought difficulty to beating sign indicating number, and the input identification difficulty of coding is increased greatly.
The objective of the invention is to overcome the above-mentioned deficiency of prior art, for manufacturer provides a kind of coded graphics Antiforge recognizing method based on computer network communication system, and the anti-fake label of making of the coded graphics Antiforge recognizing method that constitutes by coding pattern.
The coded graphics Antiforge recognizing method based on computer network communication system that the present invention proposes is characterized in that taking following steps:
A, make code system main frame login authentication central server, the authentication code that application needs; Authentication center's server generates the plain code of stipulating according to the authentication code create-rule, generates private mark by plain code and key again, forms the authentication code that contains plain code and private mark, stores described authentication code in central database;
The request that b, basis are made the code system main frame, central server takes out authentication code from database in batches, encrypts, and sends by data network;
C, beat the authentication code that the code system main frame receive to be encrypted, deciphering is added the date of manufacture and is formed full authentication code; Divide three groups with described full authentication code, and produce separately error correcting code and row even parity check sign indicating number, make its coder print the respective coding pattern to commodity automatically by beating code controller;
When d, examination, checking system reads full authentication code by scanner in the described coded graphics of commodity, peel off the date, encrypt, be transferred to authentication center's server, in central database, search corresponding key according to its plain code, by plain code and the newly-generated private mark of key reconsul, form new authentication code, and whether the former authentication code of newer authentication code and database is consistent, check the number of times that this authentication code is inquired about simultaneously, at last check result is returned the inquiry system terminal.
The anti-fake label that above-mentioned coded graphics Antiforge recognizing method is made comprises the thin layer carrier, it is characterized in that: be printed on the herringbone coding pattern of being made up of coding on the described thin layer carrier.
The present invention is further described below in conjunction with accompanying drawing.
Fig. 1 is the anti-fake label synoptic diagram of invention;
Fig. 2 is a system principle diagram of the present invention.
The system that realizes coded graphics Antiforge recognizing method of the present invention as shown in Figure 2.It comprises: authentication center's server, database, backup database, some acting servers and beat code system and checking system by what communication network connected.
The core technology of native system is the generation of authentication code, is not stolen for the core technology of protection system, and the authentication center that is created on of authentication code finishes.No matter how high the Cipher Strength of a cryptographic algorithm is, and the just problem of time is cracked.In order to improve the security of native system, system has adopted the measure of three aspects:
1, increase the length of key, the length of key is long more, and it is also just long more to crack the required time.
2, the content of change key at random, the growth key makes and cracks the required time lengthening of key, but might be cracked eventually.In order to make provision against emergencies, our irregular replacing key, like this, even the anti-person of emitting has cracked a key, because each cipher key application is in very little a collection of authentication code, the counterfeiter can't be large batch of counterfeit, thereby improved counterfeit cost greatly.
3, the number of times of checking authentication code to be inquired about, in order to prevent that the counterfeiter from plagiarizing the large batch of then production of authentication code, we have put down in writing the number of times that each authentication code is inquired about in authentication center, if the number of times that certain authentication code is inquired about is too much, we have just produced suspection to the true and false of this product, tell the consumer: these commodity have been inquired about too much number of times, may be that the intermediate links of counterfeit product or process are too much.
4, because cryptographic algorithm is the core of system, must be placed on authentication center; And key belongs to confidential data, also must depositing in authentication center; For the access times of each authentication code, authentication center is necessary record.So just determined that authentication center is the data storage center and the enciphering/deciphering processing enter of system.
Authentication center mainly finishes following work: the management of system security management, manufacturer information, checking system are disposed at the verification of the generation of management, commodity authentication code of the terminal of each examination point and storage, commodity and systems network administration etc.; The management of grid mainly comprises the test of beating code system, checking system running status, the distribution of online agent's platform number, system clock synchronously
The described code system of beating is made up of the code controller of beating of beating sign indicating number proxy and at least one band coder.Beat the authentication code that code system main frame receiving center server sends by network, divide three groups, automatically commodity are printed the respective coding pattern by coder with authentication code.
Beat code system application authentication sign indicating number and be divided into three phases:
Manufacturer should declare the demand of authentication code in advance to authentication center, examined by authentication center.Consider the hard drive space of dozen code system and the bandwidth of network service, after authentication center's examination and approval, immediately authentication code is not sent to and beat code system, ask for to authentication center but need to beat code system in batches, these functions are cooperatively interacted by the program of beating code system and authentication center and finish automatically.
Beat the situation that expends of the regular detection system authentication code of code system, and a period of time (can set) is asked for the next group authentication code to authentication center in advance in the progress control module.
Consider the restriction of playing the code system configuration and, beat code system and only preserve the nearest a collection of authentication code of applying for, be used for control in real time and beat a yard terminal commodity are beaten sign indicating number for the consideration of security of system.
Because date of manufacture of the commodity of authentication code correspondence can't be known in authentication center, so do not contain date of manufacture information in the authentication code that the center generates, the authentication code stem is added the date of manufacture beating code system, packet transaction prints on the commodity then.This partial function can be controlled coder and finished by the sign indicating number control terminal of beating of our company's independent development, and coder is contactless, beats yard speed of control terminal induced flow waterline and controls the coding pattern that coder prints commodity.
The checking of authentication code is an important step of system, is used to read the commodity authentication code, the authentication verification sign indicating number true and false.Consider the security of the vital strategic secrets-authentication code generating algorithm of system, the checking of authentication code is finished by authentication center's server.Checking system is made up of examination proxy and at least one check terminal; Its described check terminal has adopted the scanner of energy recognition coding pattern, this scanner adopts the scanning of laser multi-angle, can scan the coding stick of different directions, the coding of three block encoding sticks is synthesized one group of complete data, peel off the date, encrypt, be transferred to authentication center, verify by authentication center's server, will verify that at last the result returns the inquiry system terminal and shows.
The compilation principles of commodity authentication code of the present invention is as follows:
Uniqueness: the authentication code that each commodity is corresponding unique.According to the heterogeneity of commodity, as: production unit numbering, date of manufacture, production serial number or the like, give different commodity authentication codes.
Permanent: the commodity authentication code is just no longer changed, and is lifelong once distribution.When this kind commodity were no longer produced, its corresponding commodity authentication code can only have shelved, and must not repeat to reinstate reallocation and give other commodity.
The property looked into: each authentication code can both inquire weight, packing, specification, smell, color, shape of the basic condition of production unit, address, date of manufacture, merchandise classification, production unit of this product and product or the like in data center, and the anti-fake certificate sign indicating number.
The diagrammatic representation of commodity authentication code of the present invention is:
A numeral point matrix representation, coloured expression 1, the expression 0 of no color, the size of each point is 0.33 * 0.33.Each row has 10 points, represents a byte, and its structure is as follows:
The start bit D7 ?D6 ?D5 ?D4 ?D3 ?D2 ?D1 ?D0 Odd parity bit
Start bit always 1, D7, D6, D5, D4, D3, D2, D1, D0 are data bit, odd parity bit is the odd check of start bit and data bit.Chevron shaped pattern vertical bar piece has 30 row, i.e. 30 bytes, and lower-left stick and bottom right stick respectively have 20 row, i.e. each 20 bytes, totally 70 bytes.
The content of herringbone pattern comprises: beginning byte, date of manufacture, plain code, private mark, error correcting code and row even parity check.
1, beginning byte
The data of vertical bar piece first line display of chevron pattern, numerical value is 1111111111, i.e. 1 joint.
2, the date of manufacture
Date of manufacture is 4 bytes, and the data layout of date of manufacture is as follows:
Year (16) The moon (8) Day (8)
The The data decimal system of date, data of per four bit representations.As 2000, the data of expression were 00100000,00000000; As September, the data of expression are 00001001; As 22 days, the data of expression were 00100010;
3, plain code
Data length is 34 bytes.
4, private mark
Data length is 16 bytes.
5, error correcting code
The error correcting code that 4 bytes are respectively arranged in the data of three sticks of herringbone pattern, the error correcting code of per 4 bytes can any 2 bytes of error correction mistake.Always have the error correcting code of 12 bytes in three sticks.
6, row even parity check byte
The data that the next line of three sticks of chevron pattern is represented, D7-D0 is the even check sign indicating number of these each row of data above pattern, totally 3 bytes.
The commodity authentication code is stored in the database, and its storage organization is:
Version number The merchandise classification numbering The production unit numbering The key lot number The scope of production serial number Term of life The commodity authentication code date of formation
The commodity authentication code is regularly deleted, and the deletion cycle is one month, and the deletion condition is commodity authentication code date of formation, term of life and the additional year sum current time less than system.
Anti-fake label of the present invention as shown in Figure 1, wherein each several part is: thin layer carrier (1), vertical bar piece (2), lower-left stick (3) and the bottom right stick (4) be made up of some codings.Described vertical bar piece (2), lower-left stick (3) and bottom right stick (4) are formed the herringbone coding pattern.Described thin layer carrier (1) can be paper or plastic foil etc.
What the herringbone coding pattern was comprised on the commodity counterfeit prevention labeling thes contents are as follows:
The corresponding authentication code of each commodity.Authentication code is made up of plain code and private mark two parts, and private mark is produced by plain code.
The data layout of the vertical bar piece above the herringbone pattern is as follows:
The beginning byte Date of manufacture 20 byte plain codes Error correcting code Be listed as even effect
Its error correcting code is produced by beginning byte, date of manufacture, 20 byte plain codes.
The data layout of the lower-left stick of chevron pattern is as follows:
14 byte plain codes 1 byte private mark Error correcting code Be listed as even effect
Its error correcting code is produced by 14 byte plain codes and 1 byte private mark.
The data layout of the bottom right stick of chevron pattern is as follows:
15 byte private marks Error correcting code Be listed as even effect
Its error correcting code is produced by 15 byte plain codes.
The content of above-mentioned plain code comprises:
(1) version number
16 of length, scope: 0-65535, if annual edition upgrading 12 times then can be upgraded 5461, version is again since 0 then.
(2) merchandise classification numbering
24 of length, scope: 0-16777215 sorts out 16777215 classes to all commodity.
(3) production unit numbering
32 of length, scope: 0-4294967295, if company of average 2 people, number in the world has 8,600,000,000.
(4) key lot number
56 of length, scope: 0-720575940379279935, corresponding each one day the product batch number of unit of key lot number.4294967295 units produced batch in average one day
720575940379279936/4294967295=16777216 batch.
(5) production serial number
128 of length, scope: 0-3.4e+38 is the production number of each batch of production unit.
(6) term of life
Term of life is the term of validity of every commodity, if the term of validity of commodity mistake, the data of this authentication code are deletion automatically from database.On data terminal, show during examination " counterfeit goods, commodity had lost efficacy or middle Kui trade mark is damaged ".
The unit of term of life is the moon, and data length is 16.I.e. 2 bytes.
The commodity plain code is produced by data center according to the production schedule number of production unit application, and the basic condition of production unit and this product is stored in the central database.
Key is produced by 128 digit counters.Principle is the continuous cycle count of counter, and computing machine irregularly reads the data of counter, and with computing machine in key store data relatively, if identical data are arranged, then read the data of counter again, otherwise these data are recorded on date of manufacture and the corresponding position of key lot number.
128 of the length of key.The number of key is 3.4e+38.If a collection of product of every production, a corresponding key.If each batch produces 100,000,000 products, produced 1.8 hundred million hundred million batches in one day, can work 5000, after 5000 again since 0.
The storage organization of key in database is:
The commodity authentication code generates the phase The key lot number Key
Key can regularly be deleted, and the deletion cycle is one month, and when the record of the commodity authentication code of this key lot number was deleted, the record of corresponding key was deleted.
Private mark is generated by data bit.Private mark length is 128.The private mark algorithm has two relevant functions under normal conditions, and one is used for encrypting, and one is used for deciphering.If the confidentiality of algorithm is based on the secret that keeps algorithm, this algorithm is called restricted algorithm.Their confidentiality is nowhere near, and must use key.The security of all these algorithms is all based on the security of key, rather than based on the security of the details of algorithm.This just means that algorithm can disclose, also can be analyzed, can produce the product that uses algorithm in a large number.
The generation of private mark is that each product is produced a unique encoding.Its coding is made up of two parts, i.e. plain code and private mark, and private mark is produced by plain code.
The data bit of private mark is by the circulation generation of tabling look-up.If key M, plain code A, table Tab, private mark C, private mark length n, computing formula is as follows:
C[j]=Tab[M[j]]A[j]C[j-1]j=0,1,2,…n-1
As mentioned above, error correcting code is got its some bytes generations in date of manufacture, plain code and private mark three.Totally 96 of its length.
The calculating of error-detecting and error correcting code word is according to the GB/T17172-1997 GB, adopt the Reed-Solomon cyclic error correcting code, be called for short the RS sign indicating number, it is a class nonbinary BCH code, (n, k) in the RS sign indicating number, input signal is divided into one group of k*m bit, every group comprises k byte, and each byte is made up of m bit.
1, cataloged procedure
Form code word data by date of manufacture, plain code and private mark.
The first step: set up the symbol data polynomial expression
d(x)=d n-1x n-1+d n-2x n-2+...+d 1x+d 0
In the formula, polynomial coefficient is made up of code word data.
Second step: set up the generator polynomial of correcting code word
For a length is n=2 m-1 RS sign indicating number, each byte can be regarded Galois field as
GF (2 m) in an element.Minor increment is the RS sign indicating number of d, and its generator polynomial has following form: g ( x ) = Π i = 1 d - 1 ( x + a i )
α in the formula iBe GF (2 m) in an element.Its error correcting capability (being the error correction number) is t=(d-1)/2.
Polynomial expansion:
g(x)=(x-α)(x-α 2)...(x-α d-1)
The 3rd step: the calculating of error correcting code word
To one group of given code word data, the error correcting code word is symbol data polynomial expression d (x)
Multiply by x D-1, then divided by generator polynomial g (x), the complement of each coefficient of gained residue.
2, decode procedure
Raw data is v (x)=v 0+ v 1X+v 2x 2+ ...+v N-1x N-1
Receiving data is r (x)=r 0+ r 1X+r 2x 2+ ...+r N-1x N-1
Then error message is e (x)=v (x)-r (x)
=e 0+e 1x+e 2x 2+...+e n-1x n-1
Be provided with m mistake at x J1, x J2..., x Jm
Definition error position β 1JlL=1,2 ..., m
Mistake: S 1=r (α)=e J1β 1+ e J2β 2+ ...+e Jmβ m
S 2=r(α 2)=e j1β 1 2+e j2β 2 2+...+e jmβm 2
S i=r(x)/(x+α i)
Definition error position polynomial expression
δ(x)=(1+β 1x)(1+β 2x)...(1+β mx)
=1+δ 1x+δ 2x 2+…+δ mx m
Advantage of the present invention is as follows compared with the prior art:
The present invention is based on the coded graphics Antiforge recognizing method of computer network communication system, its authentication center The affair device generates the authentication code of commodity, encrypts, and sends by network; Beat code system and receive the commodity authentication code, add Add date of manufacture, check code, it is divided into three groups prints the herringbone coding pattern at anti-fake label, know Other system reads its authentication code by scanner from the coding pattern of described commodity, encrypts, and is sent in the authentication The heart is searched corresponding key according to its plain code, by plain code and the newly-generated private mark of key reconsul, forms new authentication Code, and whether the former authentication code of newer authentication code and database is consistent, verifies the true and false of commodity. Its Thoroughly solved the anti-fake code figure place long bring beat the code difficulty, the input recognition difficulty is big and can not Machine is the difficult problem of identification automatically.
The authentication code of its each commodity is unique, and the generation of the various codings of authentication code, combination are by system Different piece finish, authentication code transmits between transmitting terminal and receiving terminal and has all carried out encryption, deciphering place Reason, security performance is good, and deciphering and the difficulty of copying are big.
The pattern of its anti-fake label divides three sections by coding and forms, and has greatly reduced area occupied, and coding pattern is new Clever, attractive in appearance, increased the aesthetic feeling of commodity external packings.
Its recognition system is equipped with special-purpose high-precision graphic scanner, but multi-angle scanning different directions The coding stick, the resolution ratio height, easy to use, quick.
Client can be by being installed in market, community special-purpose terminal or portable terminal or the website of inquiry system Etc. multiple means, whenever and wherever possible commodity are verified.

Claims (7)

1, a kind of coded graphics Antiforge recognizing method is characterized in that taking following steps:
A, make code system main frame login authentication central server, the authentication code that application needs; Authentication center's server generates the plain code of stipulating according to the authentication code create-rule, generates private mark by plain code and key again, forms the authentication code that contains plain code and private mark, stores described authentication code in central database;
The request that b, basis are made the code system main frame, central server takes out authentication code from database in batches, encrypts, and sends by data network;
C, beat the authentication code that the code system main frame receive to be encrypted, deciphering is added the date of manufacture and is formed full authentication code; Divide three groups with described full authentication code, and produce separately error correcting code and row even parity check sign indicating number, make its coder print the respective coding pattern to commodity automatically by beating code controller;
When d, examination, checking system reads full authentication code by scanner in the described coding pattern of commodity, peel off the date, encrypt, be transferred to authentication center's server, in central database, search corresponding key according to its plain code, by plain code and the newly-generated private mark of key reconsul, form new authentication code, and whether the former authentication code of newer authentication code and database is consistent, at last check result returned the inquiry system terminal.
2, coded graphics Antiforge recognizing method according to claim 1 is characterized in that described authentication code comprises: 272 plain codes and 128 private marks.
3, coded graphics Antiforge recognizing method according to claim 3, it is characterized in that: the plain code of described authentication code is by 16 version numbers, and 24 merchandise classifications are numbered, 32 production units numberings, 56 key lot numbers, and 128 production serial numbers are formed.
4, coded graphics Antiforge recognizing method according to claim 3, it is characterized in that: the key of the plain code of described authentication code is produced by 128 hyperchannel counters, the clock frequency of each passage is all different, the continuous cycle count of counter, computing machine irregularly reads the data of counter, and with computing machine in key store data relatively, if identical data are arranged, then read the data of counter again, otherwise these data are recorded on the corresponding position of key lot number.
5, the anti-fake label of making according to the described coded graphics Antiforge recognizing method of claim 1 comprises the thin layer carrier, it is characterized in that: be printed on the herringbone coding pattern of being made up of coding on the described thin layer carrier.
6, anti-fake label according to claim 5 is characterized in that: have 1 byte to begin byte on the vertical bar piece of described herringbone coding pattern, 4 byte dates of manufacture, 20 byte plain codes, 4 byte error correcting codes and 1 byte stream even parity check sign indicating number; 14 byte plain codes are arranged, 1 byte private mark, 4 byte error correcting codes and 1 byte stream even parity check sign indicating number on the lower-left stick of herringbone coded graphics; 15 byte private marks are arranged, 4 byte error correcting codes and 1 byte stream even parity check sign indicating number on the bottom right stick of herringbone coded graphics.
7, anti-fake label according to claim 5 is characterized in that: described thin layer carrier is paper or plastic foil.
CN 00117522 2000-10-24 2000-10-24 Coded figure recognizing anti-fake method and its anti-fake label Pending CN1350265A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 00117522 CN1350265A (en) 2000-10-24 2000-10-24 Coded figure recognizing anti-fake method and its anti-fake label

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 00117522 CN1350265A (en) 2000-10-24 2000-10-24 Coded figure recognizing anti-fake method and its anti-fake label

Publications (1)

Publication Number Publication Date
CN1350265A true CN1350265A (en) 2002-05-22

Family

ID=4586885

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 00117522 Pending CN1350265A (en) 2000-10-24 2000-10-24 Coded figure recognizing anti-fake method and its anti-fake label

Country Status (1)

Country Link
CN (1) CN1350265A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101212548B (en) * 2006-12-31 2010-05-19 北京爱国者妙笔数码科技有限责任公司 System for operating TV set-top box with a contact sensing control device
US7909239B2 (en) 2007-09-07 2011-03-22 Yottamark, Inc. Attributing harvest information with unique identifiers
US7992772B2 (en) 2005-02-03 2011-08-09 Yottamark, Inc. Method and system for deterring product counterfeiting, diversion and piracy on a single system
US8152063B1 (en) 2009-05-22 2012-04-10 Yottamark, Inc. Case labeling for field-packed produce
US8155313B2 (en) 2005-02-03 2012-04-10 Yottamark, Inc. Systems and methods for employing duo codes for product authentication
US8196827B1 (en) 2009-05-22 2012-06-12 Yottamark, Inc. Case labeling for field-packed produce
US8210430B1 (en) 2011-02-24 2012-07-03 Yottamark, Inc. Methods for assigning traceability information to and retrieving traceability information from a store shelf
US8240564B2 (en) 2008-07-11 2012-08-14 Yottamark, Inc. Mobile table for implementing clamshell-to-case association
US8300806B2 (en) 2005-02-03 2012-10-30 Yottamark, Inc. Duo codes for product authentication
US8342393B2 (en) 2007-09-07 2013-01-01 Yottamark, Inc. Attributing harvest information with unique identifiers
US8428773B1 (en) 2008-02-12 2013-04-23 Yottamark, Inc. Systems and methods of associating individual packages with harvest crates
US8649512B2 (en) 2005-02-03 2014-02-11 Yottamark, Inc. Duo codes for product authentication
US8887990B2 (en) 2007-09-07 2014-11-18 Yottamark, Inc. Attributing harvest information with unique identifiers
TWI617989B (en) * 2017-04-21 2018-03-11 南亞塑膠工業股份有限公司 Anti-fake analyzing method
CN111814937A (en) * 2020-06-28 2020-10-23 宁波心维标签制品有限公司 Anti-counterfeit label generation and printing method

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103093359A (en) * 2005-02-03 2013-05-08 尧德品牌保护公司 Method and system for deterring product counterfeiting, diversion and piracy
CN101501680B (en) * 2005-02-03 2013-02-20 尧德品牌保护公司 Method and system for deterring product counterfeiting, diversion and piracy
US7992772B2 (en) 2005-02-03 2011-08-09 Yottamark, Inc. Method and system for deterring product counterfeiting, diversion and piracy on a single system
CN103093359B (en) * 2005-02-03 2017-04-12 天宝导航有限公司 Method and system for deterring product counterfeiting, diversion and piracy
US8155313B2 (en) 2005-02-03 2012-04-10 Yottamark, Inc. Systems and methods for employing duo codes for product authentication
US8300806B2 (en) 2005-02-03 2012-10-30 Yottamark, Inc. Duo codes for product authentication
US8500015B2 (en) 2005-02-03 2013-08-06 Yottamark, Inc. Method and system for deterring product counterfeiting, diversion and piracy
US8649512B2 (en) 2005-02-03 2014-02-11 Yottamark, Inc. Duo codes for product authentication
US8245927B2 (en) 2005-02-03 2012-08-21 Yottamark, Inc. Method and system for deterring product counterfeiting, diversion and piracy
CN101212548B (en) * 2006-12-31 2010-05-19 北京爱国者妙笔数码科技有限责任公司 System for operating TV set-top box with a contact sensing control device
US8825516B2 (en) 2007-09-07 2014-09-02 Yottamark, Inc. Methods for correlating first mile and last mile product data
US8887990B2 (en) 2007-09-07 2014-11-18 Yottamark, Inc. Attributing harvest information with unique identifiers
US8342393B2 (en) 2007-09-07 2013-01-01 Yottamark, Inc. Attributing harvest information with unique identifiers
US7909239B2 (en) 2007-09-07 2011-03-22 Yottamark, Inc. Attributing harvest information with unique identifiers
US8428773B1 (en) 2008-02-12 2013-04-23 Yottamark, Inc. Systems and methods of associating individual packages with harvest crates
US8573476B2 (en) 2008-07-11 2013-11-05 Yottamark, Inc. Mobile table for implementing clamshell-to-case association
US8261973B2 (en) 2008-07-11 2012-09-11 Yottamark, Inc. Mobile table for implementing clamshell-to-case association
US8240564B2 (en) 2008-07-11 2012-08-14 Yottamark, Inc. Mobile table for implementing clamshell-to-case association
US8286869B1 (en) 2009-05-22 2012-10-16 Yottamark, Inc. Case labeling for field-packed produce
US8196827B1 (en) 2009-05-22 2012-06-12 Yottamark, Inc. Case labeling for field-packed produce
US8152063B1 (en) 2009-05-22 2012-04-10 Yottamark, Inc. Case labeling for field-packed produce
US8474714B1 (en) 2011-02-24 2013-07-02 Yottamark, Inc. Methods for assigning traceability information to and retrieving traceability information from a store shelf
US8210430B1 (en) 2011-02-24 2012-07-03 Yottamark, Inc. Methods for assigning traceability information to and retrieving traceability information from a store shelf
US9384460B1 (en) 2011-02-24 2016-07-05 Trimble Navigation Limited Methods for assigning traceability information to and retrieving traceability information from a store shelf
TWI617989B (en) * 2017-04-21 2018-03-11 南亞塑膠工業股份有限公司 Anti-fake analyzing method
CN108734476A (en) * 2017-04-21 2018-11-02 南亚塑胶工业股份有限公司 Anti-counterfeiting identification analysis method
CN111814937A (en) * 2020-06-28 2020-10-23 宁波心维标签制品有限公司 Anti-counterfeit label generation and printing method

Similar Documents

Publication Publication Date Title
CN1350265A (en) Coded figure recognizing anti-fake method and its anti-fake label
JP7093352B2 (en) Composite 2D barcodes, digital certificate media, generators, readers and methods
CN101006454B (en) Authentication of an object using a signature encoded in a number of data portions
EP3311336B1 (en) Authentication feature in a barcode
CN201716765U (en) Wine counterfeiting tracing system based on two-dimensional bar codes
CN109377244A (en) A kind of quick traceability system of food and method based on multichain interconnection block chain network
CN103646331B (en) Wine anti-counterfeit source tracing method based on enciphered bar code mark
US6772342B1 (en) Document or message security arrangements using a numerical hash function
CN101847225A (en) Tracking recalling system for managing commodity circulation based on internet
CN106408065A (en) Two-dimensional code encoding method and apparatus
CN102842053B (en) A kind of false proof figure code label and manufacture method thereof
JP2022535764A (en) certified text document
CN104836817A (en) Architecture and method for ensuring network information safety
CN1664836A (en) Merchandise multiple digitalized false proof technology
US9477853B2 (en) Generating an incremental information object
CN112217627B (en) Layered encrypted commodity anti-counterfeiting code generation method
CN111881482B (en) User identity privacy encryption method based on block chain technology
CN112101962A (en) Data security anti-counterfeiting control method
US20140027515A1 (en) Grayscale Incremental Information Object
CN103824102A (en) Two-dimensional code anti-fake encryption method
EP2661719B1 (en) Dual deterrent incremental information object
CN112668017B (en) Construction method, decryption method and device of self-explanatory encryption card
CN201302785Y (en) Digital pattern anti-counterfeiting mark
CN1458608A (en) Random grain anti-fake method
CN110706007B (en) Data anti-counterfeiting method and product certificate verification method

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication