Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

135results about How to "Not easy to forge" patented technology

Full-circulation type two-dimensional code anti-counterfeiting system and realization method thereof

The invention discloses a full-circulation type two-dimensional code anti-counterfeiting system and a realization method thereof. The system comprises an anti-counterfeiting platform, a consumer scanning terminal and a trade company scanning terminal. The anti-counterfeiting platform comprises an anti-counterfeiting platform registration module, an anti-counterfeiting platform mechanism management module, an anti-counterfeiting platform two-dimensional code generation module, an anti-counterfeiting platform anti-counterfeiting query module and an anti-counterfeiting replaced goods anti-counterfeiting query module. The consumer scanning terminal comprises a consumer registration module, a consumer anti-counterfeiting query module and a consumer transfer verification module. The trade company scanning terminal comprises a trade company replaced goods anti-counterfeiting query module. According to the invention, through mutual association and cooperation of each subsystem, an anti-counterfeiting cycle from registration of the anti-counterfeiting platform by production enterprises and trade companies, generation of goods two-dimensional codes and replaced goods anti-counterfeiting queries of the trade companies to verification of the authenticity of goods by consumers and assignees through scanning the two-dimensional codes is realized, the two-dimensional codes can be effectively prohibited from modifications and forgeries, the benefits of the production enterprises, the trade companies and the consumers are protected, and the goods can also be well circulated.
Owner:刘洋

Anti-counterfeit label and anti-counterfeit method based on combination of two-dimension codes and RFID chips

ActiveCN104166871AAnti-counterfeiting advantageGood anti-counterfeiting featuresRecord carriers used with machinesDigital signaturePassword
The invention relates to an anti-counterfeit label based on the combination of two-dimension codes and RFID chips. The data area of the two-dimension codes and the data area of the RFID chips are respectively divided into a non-secrecy zone and a secrecy zone, each secrecy zone is divided into multiple secrecy zone bodies, two-dimension code label codes are stored in the non-secrecy zone of the two-dimension codes, and the secrecy zone of the two-dimension codes is divided into a first two-dimension code secrecy zone body for storing protected data needed by a user; RFID label codes are stored in the non-secrecy zone of the RFID chips, and the secrecy zone of the RFID chips is divided into the RFID user secrecy zone body and the RFID password secrecy zone body; in the verification process, access to the RFID password secrecy zone body is achieved firstly to obtain a decoding password of the two-dimension code secrecy zone body, the needed data are obtained from the two-dimension codes, the data, including a digital signature, of the RFID user secrecy zone body are read, the digital signature is regenerated, and two digital digests are verified to finally obtain a result whether to be true or counterfeit or a result whether to be legal or illegal. The defects of a traditional anti-counterfeit technology can be overcome well, and the anti-counterfeit label is difficult to counterfeit.
Owner:SHANGHAI QUANRAY ELECTRONICS

Manufacturing method of paper-plastic composite packaging bag

The invention provides a manufacturing method of a paper-plastic composite packaging bag. The manufacturing method sequentially comprises steps as follows: (1) raw materials are prepared; (2) a film blowing procedure is performed, and a PE (polyethylene) film is produced by resin particles through the film blowing procedure; (3) a printing procedure is performed, and a printing film is produced by a substrate film through the printing procedure; (4) labelling and composition procedures are performed and comprise a labelling procedure, a first composition procedure and a second composition procedure, a labelling film is produced on the printing film through the labelling procedure to form a printing and labelling film, then, first composition of industrial printing paper and the PE film is performed through the first composition procedure, second composition of the printing and labelling film and a first composite film is performed after spontaneous curing of the first composition, and spontaneous curing is performed after the second composition; and (5) a slitting procedure is performed, the spontaneously cured product is slit through the slitting procedure, and a finished product is put in storage. The manufacturing method is simple in technique, the anti-fake capacity is higher, the solvent-free composition strength is high, and the product is environment-friendly.
Owner:HUBEI YUNHE SALT IND PACKAGE

Security certification method, system and equipment for internet access

The invention discloses a security certification method, a system and equipment for internet access, which is applied in high-speed traffic tools. The security certification method comprises the following steps: a MNMS (mobile-customer IP network management server) generates a public key and a private key for each HMG (high-speed mobile gate); the public key is issued to an AP (access point); each private key is issued to the corresponding HMG; the MNMS generates a first signature for related information of the HMG by using the private key and the AP, and issues the generated first signature and the related information of the AP for the HMG to the corresponding AP; the AP carries out certification on the first signature in the issued information by using the public key, if the certification is passed, the related information in the information is extracted for storage, and a broadcast notice is sent to a coverage range; the HMG judges whether the AP is legally accessed, if so, the HMG utilizes the private key and the AP to generate a second signature for the related information of the HMG, and sends a certification request containing the second signature and the HMG identification to the broadcast AP; and the AP carries out certification on the second signature in the certification request by using the public key.
Owner:CHINA TELECOM CORP LTD

Outpatient and emergency transfusion management system based on RFID (Radio Frequency Identification Devices) technology

The invention relates to an outpatient and emergency transfusion management system based on RFID (Radio Frequency Identification Device) technology, wherein a hospital information system and a digitalized transfusion chamber are seamlessly linked together by combining an outpatient and emergency transfusion management intellectualized system based on the RFID technology with a wireless network technology; and a discrete distribution management is updated to be a methodic digitalized management; Compared with the conventional transfusion mode, the outpatient and emergency transfusion management system has the advantages that by the reconfirmation on patients and transfusion medicines of the RFID radiofrequency non-contact function and the wireless transmission system of a therapy vehicle, the possible medical errors can be further reduced. A more reliable guarantee is provided for therapy and nursing for transfusion patients; and by the system integration integrating software functions and hardware functions such as identity authentication and therapeutic treatment and rescue, a more comprehensive management mode is provided for therapy for the transfusion patients in a hospital, and a solution scheme which is advanced in technology, safe, reliable and feasible is provided for transfusion management.
Owner:SHANGHAI PUDONG NEW AREA PEOPLES HOSPITAL

Application process of fingerprint identification technology on POS machine, imprinter and cash dispenser

An application process of fingerprint identification technology on a POS machine, an imprinter and a cash dispenser mainly comprises fingerprinting, fingerprint image preprocessing, characteristic point extraction, characteristic point storage, integrates the characteristics of individual fingerprints into the information of the individual data of a credit card so as to bind with the information of the individual data. The fingerprint comparison comprises fingerprint collection, fingerprint image preprocessing, and characteristic point extraction, carries out feather matching on the extracted characteristic points and the stored characteristic points, and finally outputs and shows the comparison results. The invention has the advantages that the fingerprint identification technology is applied to the POS machine, the imprinter and the cash dispenser, has two major functions of fingerprint registration and fingerprint comparison, the individual fingerprint identification technology and the image conversion technology are used for realizing the transmission process of the image data and ensuring the non-losing and non-damaging of the characteristic information of the fingerprint; the implicative information is more obvious, is difficult to be forgotten or lost, forged or stolen, and carried about, is safe, convenient and fast in utilization.
Owner:FUSHUN JINDAO TECH

Work-piece crack detection method based on an RFID (Radio Frequency Identification Device)

The invention discloses a work-piece crack detection method based on an RFID (Radio Frequency Identification Device). The work-piece crack detection method comprises the following steps: installing a fragile RFID electronic tag at a crack position to be detected of a detected work-piece in advance, so that the fragile RFID electronic tag is respectively connected and fixed with two sides of the crack position to be detected on the detected work-piece; and reading the installed fragile RFID electronic tag at the crack position to be detected on the detected work-piece by adopting an RFID electronic tag reader in need of detecting the crack of the detected work-piece, if reading successfully, judging that the crack is not generated at the crack position to be detected on the detected work-piece, and if not, judging that the crack is generated at the crack position to be detected. According to the invention, a work-piece is unnecessary to take down from equipment; and the work-piece crack detection method has the advantages of being rapid in identification speed, wide in identification range, easy to operate and control, simple, practical, small in equipment volume, flexible in shape, convenient in data format updating, good in safety and wide in application range and is capable of realizing penetrability and non-barrier detection.
Owner:ZHUZHOU CSR TIMES ELECTRIC CO LTD

Admittance identity authentication system based on image identification

The invention discloses an admittance identity authentication system based on image identification. According to the system, an acquisition terminal acquires character information and image information, so as to generate acquired data; a server stores the acquired data in corresponding region classification databases according to regional attributions of the acquired data; an authentication terminal acquires data to be authenticated from the regional attributions; the server compares the data to be authenticated with the acquired data, judges whether the regional attributions are matched with the region classification databases, where the corresponding acquired data are located, or not, generates authentication information according to matching results and sends the authentication information to the authentication terminal, the authentication terminal judges whether authentication permissions can be obtained or not, and then, whether the data to be authenticated pass through the admittance authentication of the regional attributions or not is acquired. The system has the advantages that the anti-counterfeiting performance is good, forgery and theft are difficult, convenience is brought for the arrangement of various types of field services, the admittance efficiency is increased, the staff setting is simplified, then, the effect of getting twice the result with half the effort is achieved, the identity check and authentication among different regional attributions can be prevented, and thus, the confidentiality of identity authentication is improved.
Owner:福建省智慧物联网研究院有限责任公司

Specific personnel behavior supervision system and method based on blockchain and smart contract

ActiveCN109194710AHas a supervisory functionImprove securityTransmissionComputer terminalEngineering
The present invention relates to a specific personnel behavior supervision system and method based on a blockchain and smart contract which is designed aiming at the problems that the data is prone totampering, counterfeiting and hostile attack risks and an intelligent terminal is lack in range, pressure bearing and electric quantity monitoring in the current similar method. The user terminal ofthe system is an intelligent terminal worn on a special person, the special person position information and the device operation state information of the carrying intelligent terminal are uploaded into a blockchain, and the behavior criterion smart contract codes are written in the blockchain to perform specification for the special person's behaviors; when the special person is out of the activity range set by a manager, or is out of the pressure range of the intelligent terminal, the device electric quantity is lower than the safety electric quantity range and the charging is not performed,a contract execution sub module automatically operate the smart contract codes and emits alarm to prompt the manager to the illegal behaviors of the person such as out of the activity range or viciousdamaging of the device and not charging deliberately.
Owner:广州华创物联科技股份有限公司

Process for producing antibacterial food packaging bag having anti-counterfeiting function

The invention discloses a process for producing an antibacterial food packaging bag having an anti-counterfeiting function. The process comprises the following steps of preparation of an antibacterialfilm: weighing raw material soybean fiber, potassium permanganate powder, nano silica powder, paraffin, polyethylene resin, polyhydroxyalkanoate, gelatin and plasticizer, melting and evenly mixing the paraffin, the polyethylene resin, the polyhydroxyalkanoate and the gelatin, and standing to make a mixed material; evenly mixing the soybean fiber, the potassium permanganate powder, the nano silicapowder and the plasticizer to obtain a mixture; adding the mixture into the mixed material, and performing melt blending to obtain a blended material; performing hot pressing on the blended material;performing cold press molding after hot pressing, and obtaining the antibacterial film. The preparation of the antibacterial packaging bag includes performing printing on a reverse side of the antibacterial film; performing spray printing of an anti-counterfeiting code on the reverse side; and compositing a PE film below the well printed antibacterial film, to form a composite film; curing the composite film; performing spray printing of an anti-counterfeiting image layer on the front of the composite film, and after code spraying, performing slitting to manufacture an independent packaging bag. According to the process, the antibacterial food packaging bag can kill various harmful bacteria and have a bacteriostasis effect and strong anti-counterfeiting performances.
Owner:益阳市鸿利来彩印包装有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products