CN107316075A - Jewelry identity reviews the integral multidimensional binding method for anti-counterfeit of material evidence and external member - Google Patents
Jewelry identity reviews the integral multidimensional binding method for anti-counterfeit of material evidence and external member Download PDFInfo
- Publication number
- CN107316075A CN107316075A CN201710539179.1A CN201710539179A CN107316075A CN 107316075 A CN107316075 A CN 107316075A CN 201710539179 A CN201710539179 A CN 201710539179A CN 107316075 A CN107316075 A CN 107316075A
- Authority
- CN
- China
- Prior art keywords
- jewelry
- identity
- identification
- card
- box
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
- G06K19/0772—Physical layout of the record carrier
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Credit Cards Or The Like (AREA)
Abstract
Jewelry identity reviews the integral multidimensional binding method for anti-counterfeit of material evidence;Jewelry or with its inseparable accessory or anti-fake box, paste or fixed sealing label (7), RFID RF identification chips are installed on sealing label (7), jewelry identification certificate described in the RFID chip, jewelry is equipped with unique corresponding jewelry identity traceability system tag card (12) with its inseparable accessory, two-dimension identification code is printed with jewelry identity traceability system tag card (12), client rs PC/mobile phone directly reads jewelry product identity information or logs in jewelry identity traceability system and investigate by reading RFID RF identification chips and two-dimension identification code.Pass through the multiple anti-fake identification combination that is mutually related, jewelry identity is effectively ensured to review and the integral multidimensional binding of material evidence, Life cycle to product carries out false proof whole process management and control of tracing to the source, and the abundant method of identification identity information channel is convenient, and remote system logs in identity and reviews rapidly and efficiently safety.
Description
Technical field
The invention belongs to the anti-counterfeit recognition of jewelry product and identity trace-back technique field, it is related to multiple skills in IPC classification
Art field, includes the treatment technology of the identification of G06K data and record carrier;G06Q is specially adapted for administrative, business, finance, pipe
The data handling system or method of reason, supervision or prediction purpose;G06K19/067 carries conductive mark, printed circuit or semiconductor
Structure improved technology of record carrier such as identification card of circuit element etc., especially jewelry identity review the integral multidimensional binding of material evidence
Method for anti-counterfeit and external member.
Background technology
For a long time, although jewelry is as important luxury goods, but existence information is opaque always for its industry, tax revenue
Height, clearance hardly possible, the bottleneck of low trading efficiency, low financialization degree, credit and sincere not high development, this phenomenon add to entity
Work, trade, stock is derivative and financial development causes serious resistance to hinder.
By taking jade as an example, common beautiful plant of in the market has emerald, Khotan jade, Xiuyan Jade, agate, Dongling stone, opal, brave eyeball
Stone, turquoise, lapis lazuli, white marble etc., some businessmans are asymmetric using the knowledge of consumer, the nephrite of some low values
Sold as emerald, even forge quality certificate to obtain sudden huge profits, only with regard to this about ten kinds of jades, consumer will identify it at a glance
Quality and the true and false, nor a nothing the matter, some bad retailers are in order to try to gain juice, the general treasured of some quality
Stone is handled, such as dyes, burns red, pickling etc.;Or pretend to be the gem and jade of top grade with low-grade gem and jade, such as
Ruby is pretended to be to sell with spinelle.By the jewel of artificial treatment, physics, chemical property are changed, such as through acid
The B goods emeralds washed, its internal fiber hands over woven structure by destruction, it is easy to fragmentation.
Based on the necessary professional knowledge of Gems testing and public trust, conventional method generally passes through the appraisal organization of specialty
Provide certificate.
In face of in the market, also there is the present situation palmed off in some Identification of Jades mechanisms now, professional institution's prompting can by with
Lower method differentiates:
A, see inspection body.There is strict recognition of qulifications in country to jewels and jade Quality Identification mechanism, only by assert,
The assay certificate issued is just effective.There is CMA word style and patterns, i.e. national quality technology on its Gems testing certificate provided
Just effective, a particularly first mark CMA in the mark or CAL, CNACL of surveillance authority's CMA, these letters,
It is the certification mark of national legal requirements." CMA " is china metrology Accreditation/accreditation (China Metrology
Accreditation english abbreviation).It is the regulation according to the Measurement Law of the People's Republic of China, by people's civil administration above the provincial level
A kind of comprehensive certification and evaluation that mansion administrative department of measurement is carried out to the detectability and reliability of testing agency.The mark is only
It is the unit evaluated by CMA to refer to the mechanism, is all prerequisite money of any unit for providing gemstone testing certificate
Matter.The survey report for having " CMA " to mark can be used for Product Quality Evaluation, achievement and judicial expertise, with legal effect.
B, the special projects such as detection content, including ornaments title, color, cleanliness, total quality, density, refractive index are seen, recognized in country
These item-tests of the jewels and jade testing agency of card are all very strict.Confirm the jewels and jade chosen whether with described by certificate
Sample it is consistent, including:The weight in weight and certificate, the outward appearance of ornaments on the photo of sample, label and description whether one
One correspondence.Photo is to discriminate between the positive evidence of different jewels and jades, and assay certificate apparent is accurate, can greatly increase forgery
Difficulty.But in some cases, because bullion style is identical, photo eigen is similar, it is difficult to distinguish.When this, accurately
Weight be exactly valid data that another can be verified.Except photo and weight, assay certificate, which can also provide some, spy
The fried sugar of the appearance characteristics of color, such as jadeware, hand cun of bracelet etc..In addition, other all kinds of jewelry also have it is corresponding false proof
Certificate.Set diamond grading certificate:It should most be concerned with the color rank and cleanliness rank of diamond, some certificates also having diamond
Cut ratio.Precious metal jewelry purity check certificate:The species and its content of most important certainly noble metal.Jewels and jade reflects
Determine certificate:Check conclusion is most important.According to national Specification, natural jewels and jade no longer indicates " natural " two word, and passes through
Artificial treatment or artificial synthesized jewel must be expressed, such as:Conclusion is " ruby ", and it is pure natural production to illustrate this ruby
Go out;" ruby (processing) " is to have indicated specific processing method, and it is natural gemstone to show this ruby, but to improve outside it
See the artificial treatment that have passed through some way;" synthetic ruby " then represents non-natural output ruby, but pure artificial reality
Test room composite.
C, see assessor sign.It is just effective that assay certificate needs two identification teacher's signatures to confirm.One is assessor, another
It is check person.
D, see seal.To prevent appraisal organization certificate to be counterfeited, unit official seal must be stamped on assay certificate, red official seal is made
It is frequently not integrally to be printed with certificate for check tag, is the seal being capped after examining.Strict should be steel seal, and on
The font in face can be with clearly recognizable.
E, see numbering.There is the numbering of this certificate at the assay certificate back side, to paste call number with the back side in kind consistent.
F, large-scale evaluator can carry out multiple anti-fake, such as it is new that Xinjiang Yan Kuang gem and jades quality inspection station was enabled in 2007
In version certificate, online query function is also increased newly.Input batch validation code and enterprise verification code are needed during inquiry, allows consumer can use
Easily mode is examined, and the relevant information for purchasing jewels and jade is understood in online enquiries.There is query site on some certificates
Or can be with message search.In addition, although, the assay certificate of possible authority's appraisal organization can be different, but most important
800 anti-counterfeiting phones be that each genuine assay certificate is due.
G, standard of perfection.The establishing criteria of Gems testing differentiation, existing country can be also marked on general assay certificate
Standard specifically has:The jewels and jade titles of GB/T 16552;The Gems testings of GB/T 16553;The diamond gradings of GB/T 16554;
The lossless detection method x ray fluorescence spectrometry of the noble metal jewelry contents of GB/T 18043;The jewellery Purity of Noble Metals of GB 11887
Regulation and naming method.
H, understanding jewelry ABC.The explanation of nouns for the inspection project being frequently seen on gemstone testing certificate:1) color
Colour colors are the sensations that eyeground optic nerve is produced in the brain to the sensing of light wave (visible ray 390nm to 780nm).Can
Light is seen after object selective absorbing, and the color being blended to produce of its remaining light wave is the color of the object.2) photosensitiveness is special
Optical character are levied, the direction and the direction of propagation for referring to material on incident light are had an effect, and the various phenomenons produced,
The features such as homogenieity, anisotropism, the axle of heterogeneous body and positive negative optics including material.3) photosensitiveness isotropic body
Isotropic material, refer to the material that optical property goes up all same in all fields, abbreviation isotropic body.Isometric system and non-
The material of crystalloid is photosensitiveness isotropic body.4) photosensitiveness heterogeneous body anisotropic material, refer to optical property in each side
To different materials, abbreviation heterogeneous body.It is photosensitiveness heterogeneous body in addition to isometric system and amorphous material.Finger has
Two particular orientations (two optical axises), birefringent crystal does not occur when parallel light two directions are incident.Orthorhombic system, list
Oblique system, the crystal of anorthic system are biaxial crystal.5) refractive index, birefringence refractive index,
Birefringence, the ratio of light spread speed in air (or vacuum) and in diamond material is refractive index, also referred to as refractive power
Rate.Maximum difference between the principal refractive index of two or three in heterogeneous body is birefringence, refractive index of also weighing (or refractive power again
Rate).6) absorption spectrum absorption spectrum, when referring to the light irradiation jewels and jade material of continuous spectrum, are chosen to absorb
And the spectrum produced.The spectrum for referring to produce due to selective absorbing in the range of visible ray (700-400nm) of narrow sense,
The phenomenon of black-tape or black line is shown as on spectrogram.7) gloss luster, the ability and feature of material surface reflected light.By gloss
Power be divided into:Metallic luster (metallic luster), semimetallic lustre (submetallic luster), adamantine luster
And glassy lustre (vitreous luster) (adamantine);Had as the special gloss caused by aggregate or surface characteristics:
Greasy luster (greasy luster), wax-like gloss (waxy luster), pearly luster (pearly luster), tiffany light
Damp (silky luster) etc..8) transparency transparency, refers to the degree of jewels and jade material printing opacity.It can be divided into:
Transparent (transparent), sub- transparent (semitransparent), translucent (translucent), sub-translucent
(semitranslucent) it is and opaque (opaque).9) Ultraluminescence ultraviolet fluorescence, refer to ultraviolet
The visible light wave produced during light irradiation jewels and jade.It is divided into by luminous power:By force, in, weak, nothing.10) dispersion values fire,
Dispersion value, when white light is to transparent facet jewel, make jewel that showing for spectrum chromatic flicker is presented because of dispersion
As being referred to as fire color.Dispersion values are the physical quantitys of reflecting material dispersion intensity (i.e. fire is color strong and weak).In theory with the material relative to
The refractive index of feux rouges (B=686.7nm) represents that difference is bigger, dispersion with the difference of the refractive index of purple light (G=430.8nm)
Intensity is bigger (fire is color stronger).11) density d ensity, the density of jewel refers to the quality of unit volume material.Unit is g/
cm3.12) hardness hardness, hardness refers to the ability that diamond material resists the mechanisms such as external delineation, press-in or grinding.
Jewel hardness uses the mohs hardness in mineralogy to represent.13) cleavage, fracture, rift cleavage, fracture,
Parting, cleavage refers to that crystal splits the property in smooth flat along certain crystallization direction under external force.Cleavage is divided into
It is extremely complete, complete, medium, incomplete.Fracture refers to that crystal produces the property in ruptile face under external force.It is common disconnected
Mouth type has:Uneven shape, zigzag, conchoidal etc..Rift is crystal under external force along certain crystallization direction (such as twin crystal
Faying face) produce the property ruptured.14) internal feature internal character, refer in diamond material contained solid phase,
Liquid phase, Gaseous inclusions, the inclusion enclave of specific type is (such as:Negative crystal) and the phenomenon relevant with the crystal structure of jewel.Such as:Growth
Line, colour band, twin crystal line, cleavage, rift etc..15) surface external character, surface is divided into the outer of crystal
Portion's feature and the surface for cutting jewel, the surface of crystal refers in addition to crystalline form, color, transparency and gloss, with crystalline substance
The relevant phenomenon of body structure, such as crystal face band, longitudinal grin, twin crystal line, growth pit and etch-figure, molten mound phenomenon.Cut treasured
The surface of stone refers to the phenomenon left in polishing process is cut, such as:Scratch, polishing line (trace), micro- breach, cavity, damage
Wound, burn mark, hit trace, must the phenomenon such as shape girdle, additional facet, crest line be sharp or round and smooth.16) optimization processing enhancement,
In addition to cutting and polishing, outward appearance (color, cleanliness or special optical effect), durability or available for improving jewels and jade
All methods of property.It is divided into two classes of optimization and processing.17) optimize enhancing, it is traditional, accepted extensively by people, make pearl
The optimized treatment method that the potential U.S.A of gem and jade shows.18) treating is handled, it is unconventional, be not accepted still
Optimized treatment method.Common optimized treatment method, optimization method:Heat treatment, bleaching, waxdip, leaching colorless oil, dyeing (calcedony,
Agate class).Processing method:Be soaked with color oil, filling (glass filled, plastics filling or the filling of the hard material such as other polymers),
Waxdip (turquoise), dyeing, irradiation, laser drill, overlay film, diffusion, high temperature high pressure process.
Jewelry or gem and jade are constantly shown based on the sincere value reviewed, and the circulation in gem and jade market will be with finance opening not
Disconnected formation is made a concerted effort, and provides the consumption of novelty and the product of investment type assets for society, gem and jade mark and is reviewed for this wound
Make basic environment in new markets.In terms of cultural consumption, gem and jade mark will also promote the confidence of gem and jade cultural consumption.
The existing jewelry anti-fake distinguishing system workflow based on network support includes:
A, preparatory stage;
1) login systems;
2) creates some empty identification codes;
3) exports bullion identity card;
4) prints bullion identity card and adhesive sticker Quick Response Code;
5) obtains inventory;
The live stage;
1) confirms that member's reviews application;
2) confirms merchandise news and verification inventory;
3) pastes mark Quick Response Code on commodity bundle pack/certificate and encloses bullion identity card;
4) collects customs declaration, duty receipt and checks and approves single copy;
5) goods for completing to review is returned client by;
Follow-up phase;
1) login systems;
2) passes through list input system in merchandise news;
3) is completed after typing, and the identification code to be activated is selected in the page to be activated, carries out bulk activation.
Generation gem and jade identity card is that by one jewel article of Quick Response Code unique mark, but Quick Response Code exists by not in itself
Method molecule replicates, carried out the possibility of gem and jade identity card forgery.So, generation gem and jade identity card has what is be replicated and usurp
May.
Be correspondingly improved in the prior art document technology disclose it is less.Chinese patent application 201220134823.X is related to
A kind of jewelry anti-counterfeit package box, it is characterised in that including cup dolly, center provided with the polygon jewelry for being embedded in jewelry piece groove
Saddle, with saddle cage plate, cylindrical shape box body, the transparent glass sheet with the polygonal through hole of polygon jewelry saddle form fit
Lid and frangible RFID tag, the vertical threaded post that the jewelry saddle is set by bottom side are threaded in cup dolly center
On the vertical thread bush set, frangible RFID tag is wound and fixed on the outside of threaded post and thread bush, cylindrical shape box body spiral shell
Line is connected on cup dolly, and saddle cage plate is sleeved on the outside of jewelry saddle and is fixedly connected with inboard wall of cartridge, clear glass film magazine
Lid is fixedly mounted at the top of box body;Lid pastes seal with connecting portion at the top of box body, and transparent glass sheet lid is zero diopter glass
Piece lid.
Chinese patent application 201520486571.0 provide a kind of jewelry identification system, including jewellery body, with
And the chip of data interaction can be carried out with terminal device, the chip is arranged on the jewellery body.Pass through jewel interplantation
Enter small chip, identity information is read by mobile phone A PP, to long-range cloud platform inquiry identity information, grown place, material, mirror
Determine the information such as mechanism, it is convenient, fast, efficient so as to quickly identify jewellery.It is additionally included in the appearance of jewellery body 1
Face sets Quick Response Code, and the Quick Response Code is micro two-dimensional code, and Quick Response Code is arranged at the jewellery by printing or laser engraving mode
The outer surface of body 1.The purpose of jewellery identification can also be realized by professional barcode scanning device scan micro two-dimensional code.Can be with
Chip 2 is read by the APP or professional equipment of mobile phone, and chip 2 also has payment function, function of swiping card, entered with terminal
Interactive function of row etc..
Chinese patent application 201510609234.0 provides a kind of method for anti-counterfeit, false proof device and Antiforge system.It is described
Method for anti-counterfeit includes:Terminal device reads the validation value in NFC electronic tags;The validation value read is sent to by terminal device
Server;Server judges that received validation value whether there is in database;If it is present being sent to terminal device
Commodity are the information and the corresponding commodity archive information of validation value of genuine piece;Terminal device receives and shows judged result.By this
Method for anti-counterfeit, false proof device and the Antiforge system provided is provided, can effectively improve the anti-fake code or false proof of certified products commodity
Pattern be replicated cause consumer can not identifying true or false of commodity the problem of.
Chinese patent application 201410442932.1 is related to Anti-fake electronic label and method for anti-counterfeit, the Anti-fake electronic label bag
The antenna and chip for including the substrate of non frangible and being attached on substrate, the antenna are made up of Part I and Part II,
Part I is connected with chip, and the subregion of the substrate sets release layer, and the Part I and chip of antenna directly adhere to
In the surface of substrate and substrate strong bonded, the Part II of antenna is bonded in the release layer.The method for anti-counterfeit is:Using upper
Anti-fake electronic label is stated, by surface where the release layer of the label and commodity secure bond, when peeling off the label from the commodity
When, the Part I of antenna is peeled, and Part II is stayed on the commodity and can not removed, and the label can not be reused in it
Its commodity, so as to reach false proof purpose.
Chinese patent application 201310078956.9 is related to false proof RFID tag of fragile paper and preparation method thereof, the label bag
The RFID tag layer using fragile paper as base material is included, the back side of the RFID tag layer sets PUR, and front sets frangible paper substrate
Temperature becomes false proof layer, and the temperature that the temperature that the frangible paper substrate temperature becomes in false proof layer becomes material becomes the fusing point that threshold values is not more than the PUR
The lower limit of temperature;When temperature reaches that the temperature becomes the temperature change threshold values of material, the frangible paper substrate temperature becomes false proof layer at least
Irreversible change can occur for the color of subregion.The preparation method includes:Prepare the temperature served as a contrast with gum and strippable paper
Become Anti-counterfeiting frangible paper, cross cutting shaping is standby;Prepare frangible paper substrate RFID tag;By after cross cutting temperature become Anti-counterfeiting frangible paper peel off from
Shape paper gasket, contraposition is fitted in the front of frangible paper substrate RFID tag, and the false proof RFID tag of fragile paper is made.
Chinese patent application 201611168198.X discloses a kind of false proof source tracing method based on overall control and system, should
Method really weighs information by the product source provided by root to be protected according to monitoring party, carries out the product population control of side itself to be protected
System, and the product information of its actual product population is included by direction monitoring party to be protected offer, afterwards, when direction product to be protected
Associate after security code, monitoring party verifies the product information after side's binding security code to be protected using above-mentioned product information as foundation
Legitimacy, and the product after binding security code is detected, final detection activates the identifying code of product after passing through, to support base
False proof trace to the source is carried out to product in identifying code.
In jewellery sector, the major issue that the expensive jewelry of value faces is management precisely in place, and is entirely being flowed
The safety problem such as false proof, antitheft by journey and during holding.To solve the above problems, the sector is taken inventory in jewelry piece in recent years
Wireless radio frequency discrimination RFID (Radio Frequency Identification) technology, also known as RFID electronics is introduced in management
Label, is a kind of wireless communication technology, can recognize specific objective by radio signal and read and write related data.Match somebody with somebody to jewelry piece
RFID is put, as the identity of identification jewelry piece, due to the uniqueness of ID identification codes, passes through reading electronic labels
The read write line and information management server of information complete taking inventory and in-out-storehouse management for jewelry piece.But enter city's field flow in jewelry piece
RFID is not just reconfigured at after logical link.In view of the foregoing, deposited at present in jewelry piece management, collection and intermediate links
In problems with:(1) in jewelry piece management, although apply RFID, but RFID is with jewelry piece
Using paper string, plastic ties or cotton rope etc. be readily removable, delicate materials link together, its drawback is due to that RFID is only
The free part stood on outside jewelry piece, the friendship that jewelry piece is easily produced because of artificial mistake is mixed, and is easily exchanged;(2) this
Outside, the packing box that existing jewelry piece is used can be opened and closed repeatedly, in addition jewelry piece in sales process without identity label, so,
In mailing process, such as there are package failure, article abnormal conditions, it is impossible to argue out true and trigger businessman and the dispute of client;Sell
After going out, jewelry holder collects process in jewelry piece, it is also difficult to which guarantee, which is stealthily substituted, waits unexpected, or even has not been that original also has no way of sending out
It is existing;The jewelry piece enters back into market and carries out second-circulation process in the future, same because without identity label, and needs Authenticate afresh, makes
The genuine piece of script also faces the complicated process for debating the true and false again.How the administrative errors of jewelry piece, anti-pseudo problem are solved, and reduction is entangled
Confusingly, realize management, marketing scientific and precise and promotes article second-circulation, is that client offers convenience, asked as industry concern
Topic.
The content of the invention
Review the integral multidimensional binding method for anti-counterfeit of material evidence and external member it is an object of the invention to provide jewelry identity, management,
It is easy to confirm the article true and false during sale, collection, to promote the circulation of article to provide facility.
The purpose of the present invention will be realized by following technical measures:For gem and jade finished product, semi-finished product or naked stone jewelry,
In jewelry or with its inseparable accessory or anti-fake box, pasting or fixing sealing label, sign and be provided with sealing mark
RFID RF identification chips, jewelry identification certificate described in the RFID chip, it is ensured that material evidence is unified;Meanwhile, jewelry or with
Its inseparable accessory is equipped with unique corresponding jewelry identity traceability system tag card, jewelry identity traceability system tag card
Two-dimension identification code is printed with, client rs PC/mobile phone directly reads pearl by reading RFID RF identification chips and two-dimension identification code
Precious product identification information logs in the verification of jewelry identity traceability system.
Especially, sample is extracted on jewelry article using nanometer technology and is fixed on jewelry identity traceability system tag card
On, relevant information is documented in sealing label and jewelry identity traceability system database.
Especially, for gem and jade finished product, semi-finished product or naked stone jewelry, jewelry or with its inseparable accessory or anti-
On pseudo- box, anti-fake box is placed on show stand, sealing label is pasted in anti-fake box aperture slots, between show stand and sealing label
Set up identification and distance change sensing judgement relation.
Especially, jewelry identity traceability system framework includes front end layer, application layer, cushion, service layer and data Layer, its
Middle service layer is further divided into business service and the part of infrastructure service two, and data Layer is further divided into type and the part of content two;
Corresponding implementation is respectively Html5css3 modularizations JS, SpringMVC framework, Redis clusters, internet Development Framework;
Further, front end layer client relies on the carry out Http request/responses of PC/ mobile phones, and application layer carries out Parameter analysis of electrochemical/session pipe
Reason/Webservice interface communications, cushion relies on Redis and carries out session/ data dictionaries/menu/authority operation, service
Layer relies on micro services registration center or unification monitor supervision platform carries out customer analysis/content analysis, commercial analysis/data, services, work
Dynamic analysis/planning engine service, index analysis/monitoring service, order analyzing/information service, data Layer are accessed according to by Mysql
Order data, access business datum and basic data.
In jewelry identity traceability system cellular logic relation, data Layer is constituted by least two Mysql-cluster, its to
Upper connection at least includes three respectively by least two Basecenter, two Usercenter and two Goodscenter structures
Into subdivision ZooKeeper service layers, further, it is upwardly through at least one Nginx LB-M and at least one
Nginx LB-S connections front end layer WEB, front end layer WEB are further upwards to pass through interconnection by Nginx LB-M and Nginx LB-S
Net connection client User.
Especially, anti-fake box or Carrier box are mutually fastened and constituted by anti-fake box A lids and anti-fake box B lids, and in bonding crack
Sealing label is pasted in gap, anti-fake box socket has transparency window, base in the rack slot on the upside of base on anti-fake box at least one side
It is placed in above show stand, show stand mounted antennas, there is RFID RFID communications between show stand and sealing label.
Placement jewelry and bracket in anti-fake box.Anti-fake box is equipped with unique corresponding jewelry identity traceability system tag card.Further, exist
Erection weight sensor on base or show stand, alarm is increased or decreased there is gravimetric anomaly.Or, further,
The range sensor bound with anti-fake box is installed, it is alarm to depart from extremely in anti-fake box on base or show stand.Anti-fake box A cover and
Relative two inwalls of anti-fake box B lids are correspondingly arranged block tongue, card key and corresponding keyway along along faying face, and wherein card key is that outer wall is complete
Embedded location structure, block tongue is that at least one side outer wall opens the location structure exposed.It is relative in anti-fake box A lids and anti-fake box B lids
During fastening, sealing label is pasted onto on the anti-fake box A lids and anti-fake box B cover buckle joint close gaps of card key insertion positioning side.Do not gluing
Seal mouth label or torn off sealing label under conditions of, from the side can not damaged structure separation anti-fake box A lid and it is false proof
Box B is covered.
Especially, radio-frequency recognition system of the connection including antenna is installed, radio-frequency recognition system is read automatically on show stand
The RFID on sealing label and jewelry identity traceability system tag card is taken, wherein, radio-frequency recognition system is reviewed with jewelry identity is
Database equipment of uniting connection.
Especially, RFID chip, the RFID chip type are included in sealing label:Philips I CODE SLI;Storage
Capacity 1024bit, 64bit unique ID sequence number;Working frequency 13.56MHz;2.5~10cm of reading/writing distance;Access time 1~
2ms;Operating temperature:- 20 DEG C~55 DEG C;Erasing and writing life>100,000 times;Data are preserved>10 years;Appearance and size iso standard card
85.6x54x0.80mm;Encapsulating material is PVC, PET, PETG, 0.13mm copper cash;Execution standard ISO15693.Jewelry identity is chased after
It is that the identification number of reviewing by the TID in RFID chip with reviewing in tag card is tied up that the system banner card 12 that traces back, which reviews identity certificate,
It is fixed, and will review in identification number write-in RFID chip.Installed on jewelry identity traceability system tag card 12 and review identification certificate, should
Recognize that certificate uses Mifare cards, capacity is 1K EEPROM, be divided into 16 sectors, each sector is 4 pieces, every piece of 16 words
Section, using block as access unit.There are independent one group of password and access control in each sector.Every card has unique 32 TID sequences
Number.With anti-collision mechanism, many card operations are supported.Non-transformer, carries antenna, includes control extension logical sum communication logic electricity
Road.Data retention period is 10 years, rewritable 100,000 times, reads unlimited.Working frequency:13.56MHz, communications protocol:
ISO14443A, traffic rate:106Kbps.
Advantages of the present invention and effect:By the multiple anti-fake identification combination that is mutually related, jewelry identity is effectively ensured and chases after
Trace back and the integral multidimensional binding of material evidence, it is comprehensive to realize jewelry identity, jewelry physics fidelity mark and jewelry physical bodies peace
Full guard carries out false proof whole process management and control of tracing to the source to the Life cycle of product, it is to avoid is scattered or obscures, by reading electronics mark
Label information can review monitoring at any time, prevent to go wrong in process of exchange, be easy to found the abnormal situation in time.Meanwhile, pass through inspection
The intact of jewelry piece can be confirmed by surveying RFID tag, distinguish very false proof, promote article second-circulation, realize scientific and precise marketing pipe
Reason, with excellent reliability and anti-metastatic.Recognize that the abundant method of identity information channel is convenient, remote system logs in identity and chased after
Trace back rapidly and efficiently safe.
Brief description of the drawings
Fig. 1 is the system physical view of the embodiment of the present invention 1.
Fig. 2 is the grid logical view of the embodiment of the present invention 1.
Fig. 3 is the system interface of the embodiment of the present invention 1.
Fig. 4 logs in and counted surface chart for the system background of the embodiment of the present invention 1.
Fig. 5 is the jewelry identity traceability system tag card front schematic view of the embodiment of the present invention 1.
Fig. 6 is the jewelry identity traceability system tag card reverse side schematic diagram of the embodiment of the present invention 1.
Fig. 7 shows surface chart for the background system information of the embodiment of the present invention 1.
Fig. 8 browses one of Examples of information for foreground client in the embodiment of the present invention 1.
Fig. 9 browses the two of Examples of information for foreground client in the embodiment of the present invention 1.
Figure 10 is the show stand and anti-fake box external member schematic diagram in the embodiment of the present invention 1.
Figure 11 is the anti-fake box open mode structural representation in the embodiment of the present invention 1.
Figure 12 is the understructure schematic diagram in the embodiment of the present invention 1.
Figure 13 is the gem and jade nanometer technology collecting sample and Nanoparticle labeling schematic diagram of the embodiment of the present invention 1.
Reference includes:
Base 1, rack slot 2, anti-fake box A lids 3, anti-fake box B lids 4, block tongue 5, transparency window 6, sealing label 7, jewelry and bracket
8th, card key 9, show stand 10, antenna 11, jewelry identity traceability system tag card 12.
Embodiment
The important composition part of the Research foundation of the present invention is generation gem and jade identity card technical scheme, including:By micro-
Believe end barcode scanning, display of commodity is declared and certificate information.The middle achievement researched and developed as improved technology, two generation gem and jade identity card skills
Art exploitation is made that a series of discussions and experiment effort.It is substantially better than original technology using object and advantage.
The implementation main contents of two generation gem and jade identity card technologies include:By being embedded in gem and jade identity card
RFID chip, by RFID chip, can precisely bind gem and jade identity card correspondence gem and jade includes inspection certificate information and sea
Close all authoritative information including declaration information etc..RFID chip includes TID information and data field, and TID information possesses
The whole world is unique and can not distort characteristic, and data zone content is encrypted by double Key encryption mechanisms, also possesses the safety that can not be distorted
Property.All RFID informations are carried out backstage storage and managed in our backstage cloud services, and cloud service uses the service of being based on
Framework SOA the Technical Architectures a set of internet gem and jade identity card and traceability system built, it is ensured that the RFID information of archive exists
Security and high availability in cloud storage.Two generation gem and jade identity card technologies possess unparalleled characteristic, it is ensured that gem and jade
The gem and jade identity card of trade center distribution possesses absolute uniqueness, the authenticity of information announcing and authority.
The present patent application is on the basis of foregoing correlative study, it is further proposed that the generation ID technology of gem and jade three, its is main
Content includes:
1), it is necessary to further solve after two generation gem and jade identity cards solve the authenticity and authority of identity card itself
Certainly so-called material evidence separation is the problem of article is separated with certificate, and article and its corresponding detection certificate are also true that, but can not
Ensure that current gem and jade identity card and current item establish unique corresponding relation, such as two sets real gem and jade identity cards,
Two sets of real articles and corresponding detection certificate, but can not be truly right with article in the presence of two sets of gem and jade identity cards or certificate
The possibility answered, such as article profile is more similar, and mistake is taken in management or in logistics, mispairing causes.
2), three generations's gem and jade identity card technology, can solve gem and jade identity card and article and related detection certificate material evidence
The problem of unification.
3), for having the gem and jade finished product or semi-finished product of accessory, on the accessory of article, paste or fixed a kind of easy
Broken RFID chip tag.Frangible RFID tag is fixed in such as ring care of ring, in this case, only RFID in ring care
Label is intact, and the information that just can prove that homologue product and gem and jade identity card machine inspection certificate is true and reliable, it is ensured that
Material evidence is unified;If it find that RFID tag disappears and damaged, then there is the possibility for being exchanged and changing in the corresponding information of article.It is right
In some naked stones, it is necessary to which using a kind of special packing box, naked stone is packaged with similar transparent freshness protection package in the middle of it, then
Naked stone is fixed in box, in the sealing of box, sticks frangible RFID tag, the only intact nothing of packing box and RFID tag
Damage, the information that just can prove that homologue product and gem and jade identity card machine inspection certificate is true and reliable, it is ensured that material evidence is unified.Such as
Fruit packing box is destroyed or RFID tag is damaged, then the corresponding information of article has the possibility for being exchanged and changing.For height
Commodity are worth, three generation ID material evidences are integral, once material evidence is separated, certificate is to be destroyed.
In addition, as shown in Figure 13, three generations's gem and jade identity card technology supports gem and jade identity to know using DNA identification technologies
Not.Broken through as colour jewel trace-back technique, the thinking compared according to DNA- is above carried using nanometer technology in colour jewel
Originally, the sample can be in any stage decoding of industrial chain, searching genetic connection for sampling.Nanometer technology collecting sample is in mine from coloured silk
Extracted on color jewel blank.Because the sampling of nanometer correlation technique is few, the outward appearance of jewel is not interfered with, therefore can be precious in finished product
Sampled on stone.
The present invention includes:Jewelry identity traceability system, client rs PC/mobile phone, sealing label 7, show stand 10 and jewelry body
Part traceability system tag card 12.
For gem and jade finished product, semi-finished product or naked stone jewelry, jewelry or with its inseparable accessory or anti-fake box,
Anti-fake box is placed on show stand 10, sealing label 7 is pasted in anti-fake box aperture slots, between show stand 10 and sealing label 7
Identification and distance change sensing judgement relation are set up, meanwhile, jewelry or it is placed in anti-fake box with its inseparable accessory
In, jewelry or unique corresponding jewelry identity traceability system tag card 12 is equipped with its inseparable accessory, in sealing label 7
On be provided with RFID RF identification chips, jewelry identity traceability system tag card 12 and be printed with two-dimension identification code, client rs PC/
Mobile phone directly reads jewelry product identity information or login jewelry body by reading RFID RF identification chips and two-dimension identification code
Part traceability system verification.
The invention will be further described with reference to the accompanying drawings and examples.
Embodiment 1:As shown in Figure 1, jewelry identity traceability system framework includes front end layer, application layer, cushion, service
Layer and data Layer, wherein service layer are further divided into business service and the part of infrastructure service two, and data Layer is further divided into type
With the part of content two;Corresponding implementation be respectively Html5css3 modularizations JS, SpringMVC framework, Redis clusters, mutually
Networking Development Framework;Further, front end layer client relies on the carry out Http request/responses of PC/ mobile phones, and application layer is relied on
TOMCAT carries out Parameter analysis of electrochemical/session management/Webservice interface communications, and cushion relies on Redis and carried out
Session/ data dictionaries/menu/authority operation, service layer relies on micro services registration center or unification monitor supervision platform
Carry out customer analysis/content analysis, commercial analysis/data, services, activity analysis/planning engine service, index analysis/monitoring clothes
Business, order analyzing/information service, data Layer access order data, access business datum and basic data by Mysql.
In foregoing, as shown in Figure 2, jewelry identity traceability system is in grid logical relation, by least two
Mysql-cluster constitute data Layer, its connect up at least include three respectively by least two Basecenter, two
The ZooKeeper service layers for the subdivision that Usercenter and two Goodscenter is constituted, further, its upwardly through
At least one Nginx LB-M and at least one Nginx LB-S connections front end layer WEB, front end layer WEB upwards it is further by
Nginx LB-M and Nginx LB-S connect client User by internet, wherein, front end layer WEB includes at least two
The Tomcat-user of Tomcat-www, at least two and at least two Tomcat-mall.
In foregoing, as shown in Figure 3, jewelry identity traceability system browser interface homepage include mark management, certificate query,
Coded identifier is treated, identification code, mark to be activated is created, inquires about mark, mark printing record, batch importing record and represent
Lock reord column, wherein the operation note page include accumulative endowed, accumulative activation, activity ratio, measurement period class mark statistics
Content.
In foregoing, as shown in Figure 4, jewelry identity traceability system backstage is logged in includes account and password window with statistical circles face
Mouth class logs in content.
In foregoing, as depicted in figures 5 and 6, Quick Response Code is printed on jewelry identity traceability system tag card 12.Should by scanning
Quick Response Code can log in jewelry identity traceability system and inquire about endowed information.
In foregoing, as shown in Figure 7, jewelry identity traceability system background system information displaying interface includes merchandise news column
Mesh, customs information column and certificate information column, wherein, merchandise news column includes commodity classification, trade name, commodity production
Ground, color, shape, mark client, cleanliness, weight, cut and commodity picture;Customs information column includes currency type, declaration
Odd numbers, outlet unit price and approval odd numbers;Certificate information column includes certificate type, certificate number and laser code.
In foregoing, as shown in figs. 8 and 9, read by sealing Direct Recognition in label 7, or product introduction explanation is direct
The foreground client of reading, which browses information, to be included:Product picture, identification information, commodity declare information or certificate information;Wherein, identify
Information includes title, identification code and activationary time;It is single including the place of production, specification, commodity classification, metering that commodity declare information
Position, weight, trade name, naked stone/original stone and tag number, or, classification, cleanliness, color, cut, weight and shape;Certificate
Information includes integer type and numbering.
In foregoing, as shown in Figure 10, anti-fake box A lids 3 and anti-fake box B lids 4 mutually fasten and constitute anti-fake box or Carrier box,
And sealing label 7 is pasted on gap is combined, anti-fake box socket is in the rack slot 2 of the upside of base 1, anti-fake box at least one side
On have a transparency window 6, base 1 is placed in the top of show stand 10, the mounted antennas 11 of show stand 10, show stand 10 and sealing label 7
Between there is RFID RFID communications.Jewelry and bracket 8 are disposed in anti-fake box.Anti-fake box is equipped with unique corresponding jewelry body
Part traceability system tag card 12.Further, is there is gravimetric anomaly in the erection weight sensor on base 1 or show stand 10
Increase or decrease alarm.Or, further, the Distance-sensing bound with anti-fake box is installed on base 1 or show stand 10
Device, it is alarm to depart from extremely in anti-fake box.
In foregoing, as shown in Figure 11, the correspondence along along faying face is set with respect to two inwalls for anti-fake box A lids 3 and anti-fake box B lids 4
Block tongue 5, card key 9 and corresponding keyway are put, wherein card key 9 is that outer wall is embedded in location structure entirely, and block tongue 5 is at least one side outer wall
The open location structure exposed.When anti-fake box A lids 3 and anti-fake box B lids 4 are fastened relatively, it is embedding that sealing label 7 is pasted onto card key 9
The anti-fake box A lids 3 and anti-fake box B lids 4 for entering to position side are fastened on gap.Sealing label 7 is not being pasted or has torn off sealing mark
Label 7 under conditions of, from the side can not damaged structure separation anti-fake box A lids 3 and anti-fake box B lids 4.
In foregoing, as shown in Figure 12, base 1 is in circular cone shape, and rack slot 2 has been downwardly concaved angular groove face.
In foregoing, RFID chip, the RFID chip type are included in sealing label 7:Philips I CODE SLI;Storage
Capacity 1024bit, 64bit unique ID sequence number;Working frequency 13.56MHz;2.5~10cm of reading/writing distance;Access time 1~
2ms;Operating temperature:- 20 DEG C~55 DEG C;Erasing and writing life>100,000 times;Data are preserved>10 years;Appearance and size iso standard card
85.6x54x0.80mm;Encapsulating material is PVC, PET, PETG, 0.13mm copper cash;Execution standard ISO15693.
The read-write theory of sealing label 7 includes:The electric part of card is only made up of an antenna and ASIC.Antenna:Card
The antenna of piece includes at least two groups coiled wire-wound coils, is suitably packaged in IS0 cards.ASIC:The ASIC of card is by a 106KB ripple
The high speed RF interfaces of special rate, a control unit and a 8K EEPROM composition operation principle:Read write line sends out one group to M1 cards
There is a LC series resonant circuit in the electromagnetic wave of fixed frequency, card, its frequency is identical with the frequency that news write device transmitting, in electricity
Under the excitation of magnetic wave, LC resonance circuits produce resonance, so that there is electric charge in electric capacity, in the other end of this electric capacity, are connected to
The electronic pump of one one-way conduction, the electric charge in electric capacity is sent in another electric capacity and stored, when the electric charge accumulated reaches 2V
When, this electric capacity for other circuits can provide operating voltage as power supply, data in card be launched or accessed the number of read write line
According to.
Seal the service application scene citing of label 7:
Review identity certificate and include two each several parts, Part I is that sealing label 7 is the frangible labels of adhesive sticker RFID, the
Two parts are to fasten the naked stone Carrier box constituted by anti-fake box A lids 3 and anti-fake box B lids 4.RFID tag card sector is divided into
Reserved (reserved area), TID (mark identifier), EPC (electronic product code), the classes of USER (user) four, wherein TID are systems
Added during making, TID UID forgeries technical sophistication cost is larger, default acquiescence TID is non-rewritable unique encodings.
The TID in RFID chip is bound with the identification number of reviewing in jewelry identity traceability system tag card 12 on sealing label 7,
And will review in identification number write-in RFID chip.When the NFC mobile phone using Installation Validation APP is verified, mobile phone
NFC function can recognize sealing label 7RFID chips in TID numbering, inquire about and whether contain in the database of gem and jade
The TID numberings of the RFID, after confirming that TID numberings are present, then are verified to the identification number of reviewing of the write-in in RFID chip.When
TID number and it is corresponding review identification number it is consistent with the binding relationship in database when, you can think that this is reviewed identity certificate and is
Very, and show that correspondence reviews the tracing information of identification number;Naked stone Carrier box can be very good to preserve naked stone and do not influence to appreciate and
Detection, according to the different value of naked stone, can customize different size, the naked stone Carrier box of unlike material.When in use, first will be naked
Stone is placed in naked stone Carrier box, and anti-fake box A lids 3 and anti-fake box B are covered with the RFID frangible labels that sealing label 7 is adhesive sticker
4 fastening aperture slots are sealed, it is ensured that " thing one is demonstrate,proved " and " material evidence is not separated ";If tearing to pieces sealing label 7, wherein RFID
Failure will be damaged;If destroying article in anti-fake box A lids 3 and anti-fake box B lids 4, Carrier box using other modes also will and to demonstrate,prove
Book is separated;Case above will all be identified as destroying the principle of " thing one is demonstrate,proved ", not ensure to review effect.
Radio-frequency recognition system of the connection including antenna 11 is installed, radio-frequency recognition system is certainly in foregoing, on show stand 10
The dynamic RFID read on sealing label 7 and jewelry identity traceability system tag card 12, wherein, radio-frequency recognition system and database
Equipment is connected.Antenna 11 is external base station circular polarisation microwave antenna, surface antenna structure, hand circular polarization mode, 8dbi gains, frequency
Rate 902-925MHz, using long feeder line N female cable connectors.
The radio-frequency recognition system is that the radio communication between one-to-many identifying system, system is believed using radio frequency is launched
Number, realize that contactless information transmission completes identification process by Space Coupling.
Antenna in the radio-frequency recognition system is broadly divided into two classes:Label antenna and reading and writing device antenna.Label antenna is pacified
It is client on sealing label 7 and jewelry identity traceability system tag card 12, and reading and writing device antenna is installed in show stand
Antenna 11 on 10, for identification end.Because space of the label antenna on different identified objects is pointed to and can not fixed, therefore
It is required that reading and writing device antenna is circular polarized antenna, so that realize will not be due to polarization mismatch when the sensing of label antenna changes
And can not be identified.So, it can be encouraged as quantity, miscellaneous label antenna using linear polarization mode, reduce it
Cost and technical difficulty, increase service life.In engineer applied, because microstrip antenna is easy to process and design, therefore typically
It is used to realize reading and writing device antenna and label antenna;In addition, also having the application for using helical antenna as reading and writing device antenna, still
Because helical antenna size is big, conventional metals floor is replaced to realize the helical antenna of low section circular polarisation using EBG structures.
Installed in foregoing, on jewelry identity traceability system tag card 12 and review identification certificate, the identification certificate is used
Mifare cards, capacity is 1K EEPROM, is divided into 16 sectors, and each sector is 4 pieces, every piece of 16 bytes, using block as access
Unit.There are independent one group of password and access control in each sector.Every card has unique 32 TID sequence numbers.With anti-collision
Mechanism, supports many card operations.Non-transformer, carries antenna, includes control extension logical sum communication logic.Data retention period is
10 years, rewritable 100,000 times, read unlimited.Working frequency:13.56MHz, communications protocol:ISO14443A, traffic rate:
106Kbps。
The read-write theory of jewelry identity traceability system tag card 12 includes:Electric part is made up of an antenna and ASIC.My god
Line is some groups of coiled wire-wound coils, is suitably packaged in IS0 cards.ASIC is by a 106KB baud rate high speed RF interface, a control
Unit processed and a 8K EEPROM composition;Read write line, which is sent out to M1 cards in the electromagnetic wave of one group of fixed frequency, card, a LC
Series resonant circuit, its frequency is identical with the frequency that news write device transmitting, under the excitation of electromagnetic wave, and LC resonance circuits are produced altogether
Shake, so that there is electric charge in electric capacity, in the other end of this electric capacity, the electronic pump of an one-way conduction is connected to, by electric capacity
Electric charge be sent to storage in another electric capacity, when the electric charge accumulated reaches 2V, this electric capacity can be other circuits as power supply
Operating voltage is provided, data in card are launched or accessed the data of read write line.
Jewelry identity traceability system tag card 12, which reviews identity certificate, to be by the TID in RFID chip and reviews in tag card
Identification number of reviewing bound, and will review identification number write-in RFID chip in.When the NFC hands using Installation Validation APP
When machine is verified, the NFC function of mobile phone can be numbered with the TID in identification chip, be inquired about in the database of gem and jade
Whether the TID containing the RFID is numbered, and after confirming that TID numberings are present, then the identification number of reviewing of the write-in in RFID chip is entered
Row verification.When TID numbering and it is corresponding review identification number it is consistent with the binding relationship in database when, you can think that this reviews mark
It is true to know certificate, and shows that correspondence reviews the tracing information of identification number.
In the present embodiment, naked stone Carrier box application can be used as after anti-fake box A lids 3 and the fastening of anti-fake box B lids 4.
In the embodiment of the present invention, base 1 is in frustum, mean outside diameter 47.6mm, high 15mm, rack slot 2 long 28mm, wide
20mm.Anti-fake box A lids 3 are identical with anti-fake box B 4 appearance and sizes of lid, into square flask shape, i.e. length of side 70mm, high, and the inner chamber length of side is wide
62mm, wall thickness 4mm, block tongue 5 long 24mm, high 5mm, thick 2mm;Card key 9 long 12mm, high 1.8mm, thick 1.2mm, correspondence card key flute length
12mm, wide 1.2mm, deep 3.0mm.The square mesa-shaped of show stand 10, the length of side 255mm, high 31mm.
Above-mentioned size carries out the different sizes based on the naked stone of gem and jade and finished product appropriate amplification in proportion;Relevant materials
Difference based on jewelry, will take ABS plastic, timber, metal etc.;Thin-film material firmness with have consistent height in transparency
Quality requirement.
In the present invention, jewelry identity is effectively ensured by the multiple anti-fake identification combination that is mutually related to review and material evidence
One binding, it is comprehensive to realize jewelry identity, jewelry physics fidelity mark and jewelry physical bodies safeguard protection:1) it is recorded in
Seal gem and jade certificate true and false discrimination on label 7 and jewelry identity traceability system tag card 12;2) sealing label 7 adhesive sticker RFID
Frangible Tag Radio Frequency is distinguish true from false discrimination;3) the sealing label 7 frangible labels of adhesive sticker RFID, anti-fake box A lids 3 and anti-fake box B lids 4
Fasten integrality discrimination;4) impressing pattern and the naked stone direct vision of jewelry in anti-fake box on jewelry identity traceability system tag card 12
Checking, and, physical label and mobile phone on sealing label 7 and jewelry identity traceability system tag card 12 including Quick Response Code
Checking;5) seal up sealing label 7 fastenings anti-fake box A lids 3 and RFID between anti-fake box B lids 4 and show stand 10 read recognize,
Automatically make an inventory, away from alarm and safeguard protection.
It is related to nanometer technology in the embodiment of the present invention and refers to nanoscale (0.1-100nm) material, design, manufacture, measurement, control
The technology of system and product.Nanometer technology mainly includes:Nanometer measurement technology:The detection skill of nanoscale top layer physical and mechanical property
Art:Nano-processing Technology;The technology of preparing of nano-particle;Nano material;Nanobiotechnology;Assembling of Nanoparticles etc..
Because interatomic distance is 0.1 1 0.3nm, the essence of nanoprocessing seeks to cut off interatomic combination, realize atom or
Required energy is combined between the removal of molecule, cut-out atom, inevitable requirement exceedes the Cohesive Energy of the material, that is, broadcast
Energy density be very big.With traditional cutting, grinding processing method carries out photoelectric elements to realize.
When beamwriter lithography (UGA technologies) processes super large-scale integration, the processing of 0.1 μm of line width can be achieved:Ion
The removal of micron order and nanoscale skin-material can be achieved in etching:Technique of scan tunnel microscope can realize single atom removal,
Turn round and move, increase restructuring with atom.
Assembling of Nanoparticles is exactly the method by machinery, physics, chemistry or biology, and atom, molecule or molecule are gathered
Collective is assembled, and forms functional construction unit.Package technique includes molecular assembly package technique, scanning probe atom,
Molecule moves technology and biological package technique.Molecular assembly assembling be by the physically or chemically interaction between molecule,
Form orderly two dimension or three-dimensional molecular system.Now, what molecular assembly package technique and its application study aspect were obtained is newest
Progress is mainly the research of LB films and about the discovery of characteristic.
Based on the hidden bar code of the unique hot property of nano-particle, in security and anti-counterfeit field, especially track, verify and
Pursue in terms of various object origins, be seen as very promising new method.Massachusetts, United States Wu Site science and engineerings
The research team of institute, develops a kind of new hidden bar code system based on nano particle, this system can be by using nanometer
Unique fusing point of particle distinguishes article, and these nano particle bar codes can be added in the medicine of solid-state or liquid, protects
Keep steady and determine and do not show obvious toxic-side effects.
After the present invention is implemented, the information sharing network of gem and jade identity card formation can promote the interdepartmental information of government public
Open, and individual and mechanism the credit information of the transaction for further promoting the system of reviewing to be related to is disclosed.
It is described above, only it is the preferred embodiments of the present invention, not makees any formal to technical scheme
Limitation.Any simple modification, equivalent variations and modification that every technical spirit according to the present invention is made to above example,
In the range of still falling within technical solution of the present invention.
Claims (7)
1. jewelry identity reviews the integral multidimensional binding method for anti-counterfeit of material evidence;Characterized in that, for gem and jade finished product, semi-finished product or
Naked stone jewelry, in jewelry or with its inseparable accessory or anti-fake box, pasting or fixing sealing label (7), in sealing
Label is provided with RFID RF identification chips on (7), jewelry identification certificate described in the RFID chip, it is ensured that material evidence is closed
One;Meanwhile, jewelry or it is equipped with unique corresponding jewelry identity traceability system tag card (12), jewelry with its inseparable accessory
Two-dimension identification code is printed with identity traceability system tag card (12), client rs PC/mobile phone is by reading RFID radio frequency identification cores
Piece and two-dimension identification code directly read jewelry product identity information or log in the verification of jewelry identity traceability system.
2. jewelry identity as claimed in claim 1 reviews the integral multidimensional binding method for anti-counterfeit of material evidence, it is characterised in that uses and receives
Rice technology is extracted sample on jewelry article and is fixed on jewelry identity traceability system tag card (12), and relevant information is documented in
Seal in label (7) and jewelry identity traceability system database.
3. jewelry identity as claimed in claim 1 reviews the integral multidimensional binding method for anti-counterfeit of material evidence, it is characterised in that for treasured
Jade finished product, semi-finished product or naked stone jewelry, jewelry or with its inseparable accessory or anti-fake box, anti-fake box is placed in exhibition
Show on platform (10), sealing label (7) is pasted in anti-fake box aperture slots, body is set up between show stand (10) and sealing label (7)
Part identification and distance change sense judgement relation.
4. jewelry identity as claimed in claim 1 reviews the integral multidimensional binding method for anti-counterfeit of material evidence, it is characterised in that jewelry body
Part traceability system framework includes front end layer, application layer, cushion, service layer and data Layer, and wherein service layer is further divided into industry
Business service and the part of infrastructure service two, data Layer are further divided into type and the part of content two;Corresponding implementation is respectively
Html5css3 modularizations JS, SpringMVC framework, Redis clusters, internet Development Framework;Further, front end layer client
End relies on the carry out Http request/responses of PC/ mobile phones, and application layer carries out Parameter analysis of electrochemical/session management/Webservice interfaces and led to
News, cushion relies on Redis and carries out session/ data dictionaries/menu/authority operation, and service layer relies on micro services registration center
Or unification monitor supervision platform carry out customer analysis/content analysis, commercial analysis/data, services, activity analysis/planning engine service,
Index analysis/monitoring service, order analyzing/information service, data Layer access order data, access business datum by Mysql
And basic data;
In jewelry identity traceability system cellular logic relation, data Layer is constituted by least two Mysql-cluster, it connects upwards
It is connected to and is made up of respectively at least two Basecenter, two Usercenter and two Goodscenter including three less
The ZooKeeper service layers of subdivision, further, it is upwardly through at least one Nginx LB-M and at least one Nginx
LB-S connections front end layer WEB, front end layer WEB are further connected by Nginx LB-M and Nginx LB-S by internet upwards
Client User.
5. a kind of jewelry identity reviews the integral multidimensional of material evidence and binds false proof external member, it is characterised in that anti-fake box or Carrier box are by preventing
Pseudo- box A lids (3) and anti-fake box B cover (4) and mutually fasten composition, and the stickup sealing label (7) on gap is combined, and anti-fake box is inserted
Seat has transparency window (6), base (1) is placed in show stand in the rack slot (2) on the upside of base (1) on anti-fake box at least one side
(10) there is RFID radio frequency identifications between show stand (10) and sealing label 7 and lead in top, show stand (10) mounted antennas (11)
News;Jewelry and bracket (8) are disposed in anti-fake box;Further, erection weight is sensed on base (1) or show stand (10)
Device, or, further, the range sensor bound with anti-fake box is installed on base (1) or show stand (10);Anti-fake box A
Lid (3) and anti-fake box B lids (4) are correspondingly arranged block tongue (5), card key (9) and corresponding keyway along along faying face with respect to two inwalls,
Wherein card key (9) is that outer wall is embedded in location structure entirely, and block tongue (5) is that at least one side outer wall opens the location structure exposed.
6. jewelry identity as claimed in claim 5 reviews the integral multidimensional of material evidence and binds false proof external member, it is characterised in that show stand
(10) radio-frequency recognition system of the connection including antenna (11), radio-frequency recognition system and jewelry identity traceability system number are installed on
Connected according to library facilities.
7. jewelry identity as claimed in claim 1 reviews the integral multidimensional binding method for anti-counterfeit of material evidence and external member, it is characterised in that
Seal and RFID chip, the RFID chip type are included in label (7):Philips I CODE SLI;Memory capacity 1024bit,
64bit unique ID sequences number;Working frequency 13.56MHz;2.5~10cm of reading/writing distance;1~2ms of access time;Work temperature
Degree:- 20 DEG C~55 DEG C;Erasing and writing life>100,000 times;Data are preserved>10 years;Appearance and size iso standard card
85.6x54x0.80mm;Encapsulating material is PVC, PET, PETG, 0.13mm copper cash;Execution standard ISO15693;Jewelry identity is chased after
It is to carry out the TID in RFID chip and the identification number of reviewing reviewed in tag card that the system banner card (12) that traces back, which reviews identity certificate,
Binding, and will review in identification number write-in RFID chip;Installed on jewelry identity traceability system tag card (12) and review permit identification
Book, the identification certificate uses Mifare cards, and capacity is 1K EEPROM, is divided into 16 sectors, and each sector is 4 pieces, every piece 16
Individual byte, using block as access unit;There are independent one group of password and access control in each sector;Every card has unique 32 TID
Sequence number.With anti-collision mechanism, many card operations are supported;Non-transformer, carries antenna, includes control extension logical sum communication logic
Circuit;Data retention period is 10 years, rewritable 100,000 times, reads unlimited;Working frequency:13.56MHz, communications protocol:
ISO14443A, traffic rate:106Kbps.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710539179.1A CN107316075B (en) | 2017-07-04 | 2017-07-04 | Jewelry identity traceability material evidence integrated multidimensional binding anti-counterfeiting method and jewelry identity traceability material evidence integrated multidimensional binding anti-counterfeiting kit |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710539179.1A CN107316075B (en) | 2017-07-04 | 2017-07-04 | Jewelry identity traceability material evidence integrated multidimensional binding anti-counterfeiting method and jewelry identity traceability material evidence integrated multidimensional binding anti-counterfeiting kit |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN107316075A true CN107316075A (en) | 2017-11-03 |
| CN107316075B CN107316075B (en) | 2023-05-26 |
Family
ID=60180014
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201710539179.1A Active CN107316075B (en) | 2017-07-04 | 2017-07-04 | Jewelry identity traceability material evidence integrated multidimensional binding anti-counterfeiting method and jewelry identity traceability material evidence integrated multidimensional binding anti-counterfeiting kit |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN107316075B (en) |
Cited By (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| RU186860U1 (en) * | 2018-08-08 | 2019-02-06 | Сергей Юрьевич Пынзарь | Product Identification System |
| CN109377246A (en) * | 2018-10-29 | 2019-02-22 | 江苏茴香豆网络科技有限公司 | A jewelry certificate anti-counterfeiting intelligent identification system |
| CN110009067A (en) * | 2018-01-04 | 2019-07-12 | 青岛海尔洗衣机有限公司 | A kind of article information management system and its control method |
| CN110263900A (en) * | 2019-06-21 | 2019-09-20 | 上海奇奇塑料有限公司 | A kind of casing mesh belt storing information |
| WO2021074026A1 (en) * | 2019-10-16 | 2021-04-22 | Giovanni Baggio | System and computer program for the management of objects |
| CN115017524A (en) * | 2022-04-28 | 2022-09-06 | 深圳市连卡佛珠宝有限公司 | A method and system for encrypting and decrypting identification information of digital jewelry |
| CN115375337A (en) * | 2022-10-25 | 2022-11-22 | 中国(上海)宝玉石交易中心有限公司 | Gem and jade tracing method and system based on material evidence integration |
| CN115860037A (en) * | 2023-02-24 | 2023-03-28 | 中国(上海)宝玉石交易中心有限公司 | Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting component for gemstones and jades |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070199988A1 (en) * | 2005-09-23 | 2007-08-30 | Labgold Marc R | Method and means for detection of counterfeit items and prevention of counterfeiting activities |
| CN103530684A (en) * | 2013-10-30 | 2014-01-22 | 武汉华大清源物联有限公司 | Multiple anti-counterfeiting mechanisms based on RFID (radio frequency identification) |
| CN104766109A (en) * | 2015-03-30 | 2015-07-08 | 山东泰宝防伪制品有限公司 | Intelligent anti-counterfeiting traceable drug packing box |
| CN205050179U (en) * | 2015-10-21 | 2016-02-24 | 青岛量谷无线科技有限公司 | Novel jewelry electronic tags |
| CN105403297A (en) * | 2015-04-15 | 2016-03-16 | 田小平 | Tracing distribution system and method |
-
2017
- 2017-07-04 CN CN201710539179.1A patent/CN107316075B/en active Active
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070199988A1 (en) * | 2005-09-23 | 2007-08-30 | Labgold Marc R | Method and means for detection of counterfeit items and prevention of counterfeiting activities |
| CN103530684A (en) * | 2013-10-30 | 2014-01-22 | 武汉华大清源物联有限公司 | Multiple anti-counterfeiting mechanisms based on RFID (radio frequency identification) |
| CN104766109A (en) * | 2015-03-30 | 2015-07-08 | 山东泰宝防伪制品有限公司 | Intelligent anti-counterfeiting traceable drug packing box |
| CN105403297A (en) * | 2015-04-15 | 2016-03-16 | 田小平 | Tracing distribution system and method |
| CN205050179U (en) * | 2015-10-21 | 2016-02-24 | 青岛量谷无线科技有限公司 | Novel jewelry electronic tags |
Non-Patent Citations (2)
| Title |
|---|
| 何飞;马纪丰;梁浩;崔哲;: "基于RFID技术的酒类溯源防伪系统研究与应用" * |
| 张勇;: "二维码在珠宝贵金属鉴定证书中的应用前景" * |
Cited By (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110009067A (en) * | 2018-01-04 | 2019-07-12 | 青岛海尔洗衣机有限公司 | A kind of article information management system and its control method |
| CN110009067B (en) * | 2018-01-04 | 2022-04-26 | 青岛胶南海尔洗衣机有限公司 | Article information management system and control method thereof |
| RU186860U1 (en) * | 2018-08-08 | 2019-02-06 | Сергей Юрьевич Пынзарь | Product Identification System |
| CN109377246A (en) * | 2018-10-29 | 2019-02-22 | 江苏茴香豆网络科技有限公司 | A jewelry certificate anti-counterfeiting intelligent identification system |
| CN109377246B (en) * | 2018-10-29 | 2022-08-26 | 江苏茴香豆网络科技有限公司 | Intelligent jewelry certificate anti-counterfeiting identification system |
| CN110263900A (en) * | 2019-06-21 | 2019-09-20 | 上海奇奇塑料有限公司 | A kind of casing mesh belt storing information |
| CN114556403A (en) * | 2019-10-16 | 2022-05-27 | 巴焦乔瓦尼公司 | Systems and computer programs for managing objects |
| WO2021074026A1 (en) * | 2019-10-16 | 2021-04-22 | Giovanni Baggio | System and computer program for the management of objects |
| US12165159B2 (en) | 2019-10-16 | 2024-12-10 | Vtcg S.R.L. | System and computer program for the management of objects |
| CN114556403B (en) * | 2019-10-16 | 2025-07-25 | 维特西格有限公司 | System and computer program for managing objects |
| CN115017524A (en) * | 2022-04-28 | 2022-09-06 | 深圳市连卡佛珠宝有限公司 | A method and system for encrypting and decrypting identification information of digital jewelry |
| CN115375337A (en) * | 2022-10-25 | 2022-11-22 | 中国(上海)宝玉石交易中心有限公司 | Gem and jade tracing method and system based on material evidence integration |
| CN115860037A (en) * | 2023-02-24 | 2023-03-28 | 中国(上海)宝玉石交易中心有限公司 | Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting component for gemstones and jades |
| CN115860037B (en) * | 2023-02-24 | 2023-06-06 | 中国(上海)宝玉石交易中心有限公司 | Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting assembly for precious stones |
Also Published As
| Publication number | Publication date |
|---|---|
| CN107316075B (en) | 2023-05-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN107316075A (en) | Jewelry identity reviews the integral multidimensional binding method for anti-counterfeit of material evidence and external member | |
| US11864642B1 (en) | Secure diamond smart cards and exchange systems therefor | |
| CN201698475U (en) | Radio frequency identification label | |
| US20110031139A1 (en) | Protection, authentication, identification device for a physical object specimen | |
| US20160027022A1 (en) | Consumer Authentication Systems and Methods | |
| CN101882277A (en) | Wine anti-counterfeit method and system thereof | |
| EP1618538A1 (en) | Method for tracking and tracing marked articles | |
| CN1589457A (en) | Sheet material and devices and methods for the production and treatment of the sheet material | |
| CN109146024A (en) | Art work Anti-fake electronic label System and method for based on block chain | |
| CN102930316A (en) | Three-dimensional commodity bar code information system | |
| WO2020125863A1 (en) | Physical payment means | |
| CN113454635A (en) | Anti-counterfeiting system and method | |
| US20050103840A1 (en) | Anti-fraud apparatus and method for protecting valuables | |
| CN110310130B (en) | A kind of anti-counterfeiting method and system | |
| CN107004149A (en) | Verification System | |
| CN206097287U (en) | Intelligent vending machine who has two -dimensional code recognition function based on internet of things | |
| TW202234271A (en) | Devices, systems, and methods using microtransponders | |
| CN103136682A (en) | System using cover type label to achieve counterfeiting and method | |
| Kshetri | Blockchain and the economics of customer satisfaction | |
| CN104239928A (en) | Anti-counterfeiting printed matter and corresponding anti-counterfeiting method | |
| CN102663961B (en) | Fabrication method for anti-counterfeiting film, tag of anti-counterfeiting film, anti-counterfeiting tag and anti-counterfeiting system | |
| US20170091782A1 (en) | Security Feature Against Forgery, in Particular for High-Value Products, Product Authentication Method and Product Authentication System | |
| CN206961156U (en) | The retrospect of jewelry identity monitors material evidence integrally false proof external member | |
| CN104091263A (en) | NFC (near field communication) payment method and system | |
| CN102314619A (en) | A valuables identification system and identification and management method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |