Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

132results about How to "Anti-counterfeiting" patented technology

Equipment and facility safety inspection intelligent patrolling operation system and application method thereof

The invention discloses an equipment and facility safety inspection intelligent patrolling operation system and an application method thereof. The system consists of a handheld wireless interconnection security patrolling device, a radio frequency identification (RFID) label card reader module and a central server, wherein a passive RFID label is distributed on a security facility in a closed space; the label number and three-dimensional (3D) virtual digital modeling data of the closed space are input into a computer system and/or a server by utilizing a global information system (GIS); when an inspector enters the closed space to inspect by carrying the handheld wireless interconnection security patrolling device; and identification codes stored in the passive RFID label, use informationof related security facility and equipment and location information thereof, and to-be-collected data which are collected by the security equipment through manual and automatic wireless sensing and collected by manual artificial detection are uploaded to the central server or transmitted to the computer system by the handheld wireless interconnection security patrolling device automatically, and are determined by the central server or the computer system. The system prompts and monitors the inspectors to maintain the security facility and equipment in time, so that the safety, effectiveness and reliability of the security facility and equipment can be improved.
Owner:新疆中睿电子科技有限公司 +1

Document encryption/decryption method and apparatus based on iris recognition and authentication

The present invention proposes a document encryption/decryption method and apparatus based on iris recognition and authentication. The method comprises: collecting an iris image of a user, generating iris feature data after analyzing and processing the iris image, and registering the iris feature data into an iris information feature library; encrypting a document by using the iris feature data as a key; and after it is detected that the document is requested to be decrypted, determining whether a living body iris image is collected, if so, carrying out feature extraction on the living body iris image, acquiring iris feature data corresponding to the living body iris image, comparing the iris feature data of the living body iris image with the iris feature data corresponding to the document in the iris information feature library, and if iris feature data of the living body iris image are consistent with the iris feature data corresponding to the document, then decrypting the document, otherwise, prompting that the decryption fails. According to the document encryption/decryption method and apparatus based on iris recognition and authentication, the iris image with uniqueness can be used to carry out identity recognition, thereby triggering an encryption and decryption algorithm to realize security management for the document. The entire encryption/decryption process is simple, convenient and free of potential security hazards.
Owner:南京以太安全技术有限公司

Encoding graph block and method and device for forming lattice graph through encoding graph block

The invention provides an encoding graph block. The encoding graph block is composed of a direction sequence encoding unit block, CRC bits and a plurality of data encoding unit blocks. The direction sequence encoding unit block comprises a direction characteristic lattice sequence, and each data encoding unit block comprises data code points and data reference points. A method for forming a lattice graph through the encoding graph includes the steps that the style of the direction characteristic lattice sequence is defined; the number of the data encoding unit blocks and the distribution mode of the data reference points and the data code points are defined; the number of CRC blocks and the position relation between the CRC blocks are defined; decimal digits are converted into the data code points implanted into the code point bits; the encoding storage amount contained in the lattice graph is calculated. A device for implementing the method comprises a direction sequence definition module, a data encoding unit definition module, a CRC bit definition module, a data code point forming module and an encoding storage amount calculation module. The encoding graph block can store a large amount of data information and has the anti-fake function.
Owner:CHINA COMMERCE NETWORKS SHANGHAI

Digitalized antitheft compression-resistant reusable packaging box

The invention provides a digitalized antitheft compression-resistant reusable packaging box and relates to the technical field of packaging, aiming at solving the problems of the prior art that a packaging box cannot be reused, is relatively poor in safety and lacks digitalized application. The digitalized antitheft compression-resistant reusable packaging box comprises a box body, wherein the box body comprises a top cover part, a lateral side part, a bottom board part and a reinforcing board; the top cover part comprises an upper-layer top cover, a middle-layer top cover and a bottom-layer top cover; the upper-layer top cover is provided with a first double-wing insertion tongue and comprises a first tearing strip and a first adhesive area, a first insertion hole is formed at the connected part of the upper-layer top cover and a first side face; the reinforcing board is provided with two second double-wing insertion tongues; and the outer surface of the box body is provided with a two-dimension code, bar code and augmented reality recognition area. The digitalized antitheft compression-resistant reusable packaging box is high in safety performance, convenient to use, large in tensile strength, reusable and anti-counterfeiting, and is added with digitalized application, so that the user experience is higher.
Owner:SHENZHEN YUTO PACKAGING TECH

Visual three-dimensional code touch screen compiler and programming technique

The invention discloses a visual three-dimensional code touch screen compiler product and its programming technique. According to the invention, visual geometric programming and three-dimensional code programming are realized; a programmer can finish programming work by one-hand or two-hand touch screen operation, therefore the workload of the programmer is greatly reduced; and the programming work is driven to humanized and intelligentized development. The built-in technologies of the new type geometric decoder and three-dimensional compiler of the invention comprise: generating a code plate and selecting a code element, coding a rule, information expression, hexadecimal number expression, conversion of digital and geometric codes, plane code to three-dimensional code, and so on; the functions of the compiler comprise: a touch screen function, program three-dimensional coding, a three-dimensional code paraphrasing function, an intelligent detection function, an automatic code storage function, an automatic connection function of three-dimensional code chains, and so on. According to the invention, the program code is converted into a shape code; a new pattern is provided for the security operation of the program; each code chain is not divided, so there is no leak for an external virus program to implant; the program is effectively prevented from being tampered and attached; and the program security is improved.
Owner:JIANGSU FIGURE CODE INFORMATION TECH LTD

Electronic certificate security management method and system

The invention discloses an electronic certificate security management method and system. The electronic certificate security management method comprises the following steps: issuing electronic certificate signing and issuing application; authenticating the receiving end, generating the electronic certificate, and issuing the electronic certificate and the signing and issuing information to the security basic module of electronic certificate; obtaining the electronic certificate and the electronic certificate signing and issuing results from the electronic certificate security basic module; issuing the electronic certificate authentication application to the electronic certificate security basic module; authenticating the receiving end by means of the electronic certificate security basic module, issuing the authentication confirmation information to the electronic certificate security basic module, and waiting for the receiver to confirm; confirming the authentication confirmation information by the receiving end; and obtaining the authentication results of the electronic certificate from the electronic certificate security basic module. By means of the scheme disclosed by the invention, the defects of the electronic certificate issuing, authentication and supervision platform in the prior art in the aspects of cost, safety and convenience can be solved.
Owner:北京明朝万达科技股份有限公司

Trusted communication system and method

The invention discloses a trusted communication system and method. The system comprises a governance service center, a trusted communication service platform, a certificate issuing mechanism, the security module and a trusted identity terminal. The method comprises the following steps: S1, generating an identity token while a calling terminal makes a video initiating request; S2, transmitting theidentity token of the calling terminal to a called trusted identity APP video terminal; S3, the called terminal obtaining the identity token of the calling party from the 5G network slice for decryption, and obtaining a certificate; S4, the called terminal pushing the certificate to the trusted communication service platform for certificate verification through a 5G network slicing technology; andS5, selecting answering, and performing video call between the calling terminal and the called terminal. The trusted communication system and method provided by the invention comprise a certificate authentication mechanism, a reliable protection effect is provided for identity authentication, and a virtual network URLLC channel of a 5G network slicing technology is used, so that the low time delay of identity authentication can be ensured, and the security of a video call is also ensured.
Owner:WEIWEI SHANGHAI NETWORK TECH CO LTD

Anti-leakage sealing bottleneck structure for canned water

The invention relates to an anti-leakage sealing bottle structure for canned water, comprising a bottleneck (2). The anti-leakage sealing bottle structure is characterized in that the upper part or the middle part of the inner side wall (2-1) of the bottleneck (2) is provided with an arc-shaped concave ring (2-1-1); the joint part of the inner side wall (2-1) and the top part of the bottleneck (2) is shaped like an R arc-shaped ring (R1); the joint part of the outer side wall (2-2) and the top part of the bottleneck (2) is shaped like an R arc-shaped ring (R2); the upper part or the middle part of the outer side wall (2-2) of the bottleneck (2) is provided with an R arc-shaped ring (R3); an R arc-shaped convex ring (2-3) is formed between the R arc-shaped ring (R1) and the R arc-shaped ring (R3); and the lower part of the R arc-shaped ring (R3) is provided with a concave ring (2-4). The anti-leakage sealing bottle structure has the effects of double sealing, anti-leakage, anti-counterfeit and long shelf life, reduces the weight and volume of a bottle body, reduces the use amount and loss of raw materials, saves the energy and protects the environment. The anti-leakage sealing bottle structure for canned water is widely applicable to canned water with five-gallon specification and other various specifications.
Owner:DONG GUAN JIN FU IND CO LTD

Encoding pattern and method and device for forming lattice graph through encoding pattern

The invention provides an encoding pattern. The encoding pattern comprises a plurality of encoding unit blocks, a direction characteristic lattice sequence, CRC bits, data reference points and code points. A method for forming a lattice graph through the encoding pattern includes the steps that decimal digits are converted into multi-bit binary digits; the multi-bit binary digits are combined into a plurality of binary arrays in sequence; the binary arrays are converted into digits with the scale with the number same as the number of code point bits; code points are implanted into the code point bits corresponding to the digits of the scale; decimal digits corresponding to the CRC bits are acquired and converted into binary digits; the binary digits are split, and a value is given to each CRC bit; whether the code points can be implanted into the CRC bits or not is distinguished. A device for implementing the method comprises an encoding pattern definition module, a conversion module a, a binary array forming module, a conversion module b, a code point implanting module, an operation module, a splitting module and a code point definition module. The encoding pattern can store a large amount of data information and has the anti-fake function.
Owner:上海在赢端智能科技有限公司

Gravure electronic mechanical carving method with anti-fake function

The invention discloses a gravure electronic mechanical carving method with an anti-fake effect. The gravure electronic mechanical carving method comprises the following steps of (1) determining the size of a rhombus ink cell according to the required printed image, and determining an ink cell arrangement angle theta of the whole gravure; (2) selecting at least one straight line section as an anti-fake identification part, wherein the selected straight line section can meet the following conditions that the angular difference between an extending angle alpha of the straight line section and the ink cell arrangement angle theta of the whole gravure is 10 degrees-30 degrees; (3) revising the design value of the partial ink cell arrangement angle of the straight line section of the anti-fake identification part again, enabling the partial ink cell arrangement angle of the straight line section to be just be equal to the extending angle alpha of the straight line section, and recording the position of the straight line section; and (4) according to the design result, carrying out ink cell carving by adopting an electronic machine carving method to obtain a gravure with an anti-fake effect. The gravure electronic machine carving method provided by the invention has the advantages that the image printed by the carving gravure has the anti-fake effect, the identification is easy, the copy is hard, and the fabricating cost is also not increased.
Owner:SHANTOU KAIJIA MOLD

Food label unique code publishing and circulation traceability method based on block chain main and auxiliary chain technology

PendingCN110335051ASmall amount of calculationLighten the burden on hardwareCommerceBlockchainTimestamp
The invention discloses a food label unique code publishing and circulation traceability method based on a block chain main and auxiliary chain technology. The commodity label unique code informationblock chain technology based on public and private key pairing verification is adopted. Main chain and auxiliary chain information counterfeiting prevention, tampering prevention and replay preventionare achieved, food label unique code network propagation and independent chaining and rapid tracing of single piece of food information can be achieved, and a user comprises a third-party mechanism,manufacturers at all levels, a dealer and a consumer which are connected with the Internet. Server databases of the third-party mechanism, manufacturers and dealers at all levels store food label information block chain account books in server databases, new legal verification data issued by other parties is received in real time, local account books are updated in time, new data blocks are hookedaccording to food transfer conditions, and new block chain data are issued; and a consumer obtains the latest timestamp block chain from a plurality of enterprise servers during code scanning, and calculates and obtains the food traceability information chain by comparing the latest timestamp block chain.
Owner:烟台市同翔网络科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products