Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

62results about How to "Non-reproducible" patented technology

Construction verification method and device capable of verifying security two-dimensional code offline

Embodiments of the invention provide a construction verification method and device capable of verifying a security two-dimensional code offline. The method comprises the following steps of inputting information that needs coding and type information, carrying out digital signature operation and encryption operation on the input information according to an information release type, constructing combination information, and encoding to generate a security two-dimensional code which can be verified off-line according to a two-dimensional code coding rule; inputting the information of the security two-dimensional code and identifying included combination information and type information, analyzing and decoding the combination information to obtain independent sub-information according to the type information of the two-dimensional code, and verifying digital certificate effectiveness information, a digital signature of the input information and an effective time limit of the input information; and if all verifications pass, showing that the offline verification of the security two-dimensional code is correct and the coding information source of the security two-dimensional code is credible, otherwise showing that the information release source of the security two-dimensional code is incredible. The method and the device have the beneficial effects that the security two-dimensional code cannot be tampered, counterfeited and denied, the public or private information can be released, and the integrity of the information of the security two-dimensional code and the authenticity of the source can be verified offline without a network connection.
Owner:王栋

Commodity anti-counterfeiting verification method

ActiveCN103295143ASolve the disadvantages of taking pictures and copyingTo achieve the purpose of real anti-counterfeitingCommerceValidation methodsComputer engineering
The invention discloses a commodity anti-counterfeiting verification method which includes: scanning two-dimensional codes, and opening an ink layer to obtain random ciphers; enabling a background verification server to judge whether the random ciphers and the two-dimensional codes correspond to the same commodity, judging the commodity to be fake if the random ciphers and the two-dimensional codes do not correspond to the same commodity and ending the verification, and otherwise entering the next step; enabling the background verification server to generate random numbers, referring to contrast data, dark patterns and secret keys and transmitting to an intelligent terminal; reminding the intelligent terminal to be close to an anti-counterfeiting label; after that, enabling the intelligent terminal to visit verification data in a sector area corresponding to the random numbers based on sector area ciphers calculated according to the dark patterns and the secret keys; judging the commodity to be fake if the intelligent terminal did not receive the data, ending the verification, and otherwise entering the next step; enabling the background verification server to compare the verification data with the contrast data, judging the commodity to be authentic if the verification data are in accordance with the contrast data, and otherwise judging the commodity to be fake and ending the verification. By means of the commodity anti-counterfeiting verification method, the actual anti-counterfeiting aim can be achieved through combination of various anti-counterfeiting technologies, and non-replicability, safety and reliability can be achieved.
Owner:重庆汉朗精工科技有限公司

Three-dimensional graphic anti-counterfeit label and method for making same

The invention discloses a three-dimensional graphic anti-counterfeit label and a method for making the same. The method comprising making an upper layer frame and a lower layer frame; mixing upper layer filling particles into an upper layer filler, and mixing lower layer filling particles into a lower layer filler; printing a graph layer, coating a back glue layer, and attaching protective paper to the lower surface of the back glue layer; injecting the upper layer filler containing the upper layer filling particles into a chamber of the upper frame to solidify, injecting the lower layer filler containing the lower layer filling particles into a chamber of the lower frame to solidify after putting into an inserting structure; bonding flat top surfaces of the upper layer frame and the lower layer frame by glue layers; adhering the graph layer, the back glue layer and the side having the graph layer of the protective paper to one side where an opening is of the lower layer frame of the combination of the upper and lower frames. Accordingly, the three-dimensional graphic anti-counterfeit label is made. Problems in the prior art that a present graphic label is easy to copy, forge and transfer, the recognition is tedious and a high-quality users are needed can be solved by adopting the three-dimensional anti-counterfeit label.
Owner:HANGZHOU WOPUWULIAN SCI & TECH

Multi-wavelength fluorescent quantum dot anti-counterfeiting method

The invention discloses a multi-wavelength fluorescent quantum dot anti-counterfeiting method, comprising the following steps of (1) selecting a plurality of fluorescent quantum dots with various grain diameter types, wherein the fluorescence emission spectrums of the fluorescent quantum dots are evenly distributed within a near-infrared area; moreover, no wave bands overlap; and the type of the selected quantum dots is in a number equal to that of the ink boxes of a selected printer, and further is corresponding to the ink boxes of the selected printer one to one; (2) coding a plurality of fluorescent quantum dots of various types in each black bar according to bar codes through the utilization of the presence or absence of the fluorescence peaks of the fluorescent quantum dots of various type within a given wave band; (3) evenly mixing the quantum dots with ink in the corresponding printer ink box; and (4) printing an anti-counterfeiting marker with the ink containing the quantum dots in the step (3) so as to realize the highly anti-counterfeiting of commodities. The anti-counterfeiting marker made by such an anti-counterfeiting method has the advantages of high precision, good hiddenness and large information capacity, and further can be set and assigned by a manufacturer.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

FPGA-based multi-algorithm security encryption authentication system and method

The invention belongs to the technical field of data encryption authentication, and discloses an FPGA-based multi-algorithm security encryption authentication system and method. The FPGA-based multi-algorithm security encryption authentication system comprises: an FPGA terminal, i.e., an encryption authentication chip, used for encryption authentication; a transmission module used for transmittinginstructions and data through a serial port protocol; and a host end used for configuring and verifying the encryption authentication chip. According to the security encryption authentication system,multiple different encryption algorithms can be selected during identity authentication, and compared with a single algorithm authentication system, the security encryption authentication system hasthe advantages that the cracking difficulty is increased, and the security coefficient is improved. According to the invention, the RO PUF is constructed by utilizing random difference generated during manufacturing of an integrated circuit to generate a chip key, so that the chip key cannot be re-etched, and is safer than a key stored in a nonvolatile memory. According to the method, the value ofeach bit of the PUF is generated and compared for many times to confirm the final value, so that the stability of the PUF value is improved.
Owner:HUBEI UNIV

Labor service big data management system based on finger vein recognition and application method thereof

The present invention discloses a labor service big data management system based on finger vein recognition and an application method thereof, belonging to the computer information management field. The system comprises a plurality of finger vein collection terminals, a manpower management cloud platform and a plurality of mobile management terminals; the finger vein collection terminals are configured to perform primary collection of work basic information for forming a primary archive and perform subsequent collection of the worker work attendance case and the construction period completion condition for forming a subsequent archive; the manpower management cloud platform is arranged in a background cloud server and is configured to store the primary archives and the subsequent archives uploaded by all the finger vein collection terminals so as to establish a labor service big database; and the mobile management terminals are arranged on a mobile device and are configured to obtain work basic information in the labor service big database to realize remote construction management. The labor service big data management system based on finger vein recognition and the application method thereof realize sharing of worker basic information with no need for repeatedly recording worker basic information, the permission setting allows the labor service data to be more safe, and the system can perform assessment of the construction period to help managers to perform human resource analysis.
Owner:上海荷福人工智能科技(集团)有限公司 +1

Anti-counterfeiting certificate capable of distinguishing truth and falsity through checking micro image codes and verification codes

The invention relates to an anti-counterfeiting certificate capable of distinguishing truth and falsity through checking micro image codes and verification codes. The verification codes for verifying the truth and the falsity of articles to be verified and the micro image codes corresponding to the verification codes are printed on the surface of the anti-counterfeiting certificate; each micro image code comprises a content data part and a header part and consists of a plurality of micro image units, the different micro image codes are distinguished in a combined manner of the plurality of micro image units in each micro image code, and the combination of the micro image units forms a small graph incapable of being distinguished by human eyes; and the micro image codes can obtain information codes uniquely corresponding to the micro image codes through being decoded. The anti-counterfeiting certificate adopts a manner of directly reading the micro image codes printed on the surface of the anti-counterfeiting certificate to verify, therefore, the distinguishing speed is quick, and the verification work of a large quantity of articles to the verified can be finished within a shorter time.
Owner:AIGO DIGITAL TECHNOLOGY CO LTD

Vein authentication wrist wireless positioning tracker

The invention provides a vein authentication wrist wireless positioning tracker. The vein authentication wrist wireless positioning tracker comprises a wrist positioning tracker terminal, a first connection network, an application server, a second connection network and a supervision operation terminal. The wrist positioning tracker terminal is connected with the application server through the first connection network, and the application server is connected with the supervision operation terminal through the second connection network. According to the vein authentication wrist wireless positioning tracker, GPS satellite positioning signals can be received, position information can be obtained through a GPRS wireless data network, vein information of a monitored object can be acquired by use of a vein sensor authentication sensor, and the vein information is transmitted to the application server through the wireless data network, and identity authentication is carried out on the monitored object through a vein authentication subprogram. The defect is solved that only objects are recognized and humans are not recognized in conventional wireless positioning, and the vein authentication wrist wireless positioning tracker can be widely applied to the field of monitoring of enterprise mobile work personnel and service personnel.
Owner:无锡优辰电子信息科技有限公司

Novel method for security verification of commodities

InactiveCN108921578ASolve the disadvantages of taking pictures and copyingTo achieve the purpose of real anti-counterfeitingMemory record carrier reading problemsCommercePasswordCiphertext
The invention discloses a novel method for security verification of commodities. The method comprises the following steps of: scanning a two-dimensional code and scraping an ink layer to obtain a random password; judging whether the random password and two-dimensional code correspond to a same commodity or not by a background verification server, if the judging result is negative, judging the commodity as a fake commodity and ending the verification, and otherwise, entering the next step; generating a random number by the background verification server, searching comparison data, a ciphertextand a secret key, and sending the comparison data, the ciphertext and the secret key to an intelligent terminal; prompting the intelligent terminal to approach to an anti-fake label; after approachingto the anti-fake label, accessing verification data in a sector corresponding to the access number by the intelligent terminal on the basis of a sector password calculated by the ciphertext and the secret key; if the intelligent terminal does not receive the data, judging the commodity as a fake commodity and ending the verification, and otherwise, entering the next step; and comparing the verification data with the comparison data by the background verification server, if the verification data is consistent with the comparison data, judging the commodity as a non-fake commodity, and otherwise, judging the commodity as a fake commodity and ending the verification.
Owner:HEFEI LANGJIN ANTI COUNTERFEITING TECH CO LTD

Rock polarizing sheet base material storage medium as well as manufacturing method and application thereof

The invention provides a rock polarizing sheet base material storage medium and a manufacturing method and application thereof. The rock polarizing sheet base material storage medium comprises a storage medium and jewelry which are manufactured by using gem and jade leftover materials and part of rock specimen sheets in a geology research process as raw materials, and a manufacturing method and application thereof. Rotation discoloration of jewelry in polarized light is achieved through the first polaroid, the fixing layer, the bearing, the rock slice, the second polaroid and other components,data storage is achieved through a laser etching method, and comprehensive utilization of rock leftover materials is achieved. Moreover, no two identical rocks exist in the world, so that the productprovided by the invention cannot be counterfeited; the polarized jewelry disclosed by the invention can be used for identity recognition without additionally implanting electronic equipment into thejewelry, and an unexpected identity recognition effect is generated on the basis of the decoration effect of the jewelry. When used as a black box or a space detector storage medium, the storage medium can be more resistant to high temperature, corrosion and radiation than a conventional storage medium.
Owner:INST OF GEOCHEM CHINESE ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products