共查询到20条相似文献,搜索用时 46 毫秒
1.
论述当前商品包装存在的问题,很多冒伪省商品的出现,是真实商品包装的防伪包装民伪 防伪能力不足,除法制的不全餐,很多企业及商品生产感受有应自己特有的防伪包装来保护自己的商品2,在此提出的防为技术为企业提供一定的思路和技巧。 相似文献
2.
3.
卷烟的几种包装防伪技术 总被引:1,自引:0,他引:1
1.薄膜防伪技术 在卷烟生产中综合利用薄膜和其他的一些安全措施,就可以起到防伪的目的。例如印刷薄膜就很难仿造。世界著名的卷烟包装材料公司——UCB公司总裁托里先生说:印刷薄膜在欧洲已使用了数年,起到了促销和吸引消费者的目的。印刷薄膜的工艺愈完善、质量愈高,仿造者就很难仿造出与正品卷烟完全一样的卷烟用包装薄膜。 相似文献
4.
防伪技术分类及复合密码引论 总被引:3,自引:0,他引:3
防伪与仿造是一场集智慧、财富、科学技术、伦理道德、法律于一身的较量,较量的一方是千方百计使人无法仿造,另一方则尽其所能使其制造出来。斗争越来越向高、精、尖方向发展,但总有一天会随着法律的健全、物质财富的极大丰富、人类素质的提高而自行消亡。从防伪技术或... 相似文献
5.
6.
7.
8.
9.
10.
八、声纹防伪技术 人的语言产生是人体语言中枢与发音器官之间的一个复杂的生物物理过程。每个人的语音声学特征有相对的稳定性。每个人由于发声器官的解剖、生理以及病理形态与发声习惯、方法不同,各有不同的频率范围,即便是声音十分相似的一对孪生子的声 相似文献
11.
Hyper-connectivity in Industry 4.0 has resulted in not only a rapid increase in the amount of information, but also the expansion of areas and assets to be protected. In terms of information security, it has led to an enormous economic cost due to the various and numerous security solutions used in protecting the increased assets. Also, it has caused difficulties in managing those issues due to reasons such as mutual interference, countless security events and logs’ data, etc. Within this security environment, an organization should identify and classify assets based on the value of data and their security perspective, and then apply appropriate protection measures according to the assets’ security classification for effective security management. But there are still difficulties stemming from the need to manage numerous security solutions in order to protect the classified assets. In this paper, we propose an information classification management service based on blockchain, which presents and uses a model of the value of data and the security perspective. It records transactions of classifying assets and managing assets by each class in a distributed ledger of blockchain. The proposed service reduces assets to be protected and security solutions to be applied, and provides security measures at the platform level rather than individual security solutions, by using blockchain. In the rapidly changing security environment of Industry 4.0, this proposed service enables economic security, provides a new integrated security platform, and demonstrates service value. 相似文献
12.
13.
目的编制城市居民安全感问卷,为了解城市居民的安全感提供量化工具。方法根据理论构想并结合访谈和开放式问卷,编制城市居民安全感问卷,对824名城市居民进行测试和信度效度检验。结果城市居民安全感由社会稳定、家庭安全、公共安全、社区安全、职业安全和身体安全6个因子构成,具有良好的内部一致性信度、内容效度和效标效度。结论城市居民安全感问卷具有良好的信效度,可以作为测查城市居民安全感的有效工具。 相似文献
14.
WLAN 802.11/11b数据加密机制的安全分析 总被引:1,自引:0,他引:1
在802.11标准中的加密采用WEP协议,用于提供链路层数据传输的安全保护。目前,在原有EP的基础上提出了一些改进方案,能提高WEP的安全性能,但理论上缺少严密的安全分析。笔者通过数学模型对这些解决方案以及原有WEP协议进行量化分析,推导出机制内各模块与整个安全机制间安全性能的对应函数关系,并比较了这些方案间安全性能的差异,证明这些安全机制可以提高原有WEP的安全性能,在理论上为用户提供如何构造满足所需安全性能的WLAN数据加密增强机制。 相似文献
15.
Shi-Cho Cha Chuang-Ming Shiung Wen-Wei Li Chun-Neng Peng Yi-Hsuan Hung Kuo-Hui Yeh 《计算机、材料和连续体(英文)》2022,73(2):2731-2755
As permissioned blockchain becomes a common foundation of blockchain-based circumstances for current organizations, related stakeholders need a means to assess the trustworthiness of the applications involved within. It is extremely important to consider the potential impact brought by the Blockchain technology in terms of security and privacy. Therefore, this study proposes a rigorous security risk management framework for permissioned blockchain-enabled applications. The framework divides itself into different implementation domains, i.e., organization security, application security, consensus mechanism security, node management and network security, host security and perimeter security, and simultaneously provides guidelines to control the security risks of permissioned blockchain applications with respect to these security domains. In addition, a case study, including a security testing and risk evaluation on each stack of a specific organization, is demonstrated as an implementation instruction of our proposed risk management framework. According to the best of our knowledge, this study is one of the pioneer researches that provide a means to evaluate the security risks of permissioned blockchain applications from a holistic point of view. If users can trust the applications that adopted this framework, this study can contribute to the adoption of permissioned blockchain-enabled technologies. Furthermore, application providers can use the framework to perform gap analysis on their existing systems and controls and understand the risks of their applications. 相似文献
16.
安全底纹设计系统是成本最低、防伪效果极好的一种防伪印刷技术.阐述了安全底纹设计系统的特点,详细介绍了用方正超线进行设计包装产品的方法.设计作品并与印刷工艺结合,可以达到较好的包装防伪效果. 相似文献
17.
18.
通过任务分析法对用户使用碎枝机过程进行分解,分析了现有产品在使用各环节中存在的安全隐患。论述了园艺碎枝机的安全性涉及功能安全、操作安全、心理安全以及环境安全4个方面,并依据奥卡姆剃刀原理和设计中的包容原则等理论,提出了精简设计提升功能安全,包容设计增强操作安全,多感官体验设计完善心理安全,以及低碳设计致力于环境安全的解决方法。 相似文献
19.
一种机场安全风险灰色多层次评价方法研究 总被引:4,自引:1,他引:3
针对民用机场安全评估方法中存在的不足,综合运用灰色聚类方法和AHP法,并根据系统工程的理论,建立起由民航机场飞行保障系统、空防保障系统、机坪保障系统、运行指挥系统、安全管理系统等评价指标体系构建的民航机场安全风险多层次灰色评价模型。并结合实例进行了计算。结果表明该方法能有效地利用评价指标的信息,科学合理地综合评价民航机场的安全状况,具有更好的可操作性和实用性。 相似文献