CN106803052A - The device and method of buried pipeline position is obtained based on ciphering two-dimension code identification - Google Patents
The device and method of buried pipeline position is obtained based on ciphering two-dimension code identification Download PDFInfo
- Publication number
- CN106803052A CN106803052A CN201611071174.2A CN201611071174A CN106803052A CN 106803052 A CN106803052 A CN 106803052A CN 201611071174 A CN201611071174 A CN 201611071174A CN 106803052 A CN106803052 A CN 106803052A
- Authority
- CN
- China
- Prior art keywords
- pipeline
- ciphering
- dimension code
- metal coating
- quick response
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
- G06K19/06159—Constructional details the marking being relief type, e.g. three-dimensional bar codes engraved in a support
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Electromagnetism (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Pipeline Systems (AREA)
Abstract
The invention belongs to buried pipeline detection technique field; specifically related to a kind of device and method that buried pipeline position is obtained based on ciphering two-dimension code identification; the device includes Quick Response Code carrier, the metal coating shell and metal coating lid that are set in the Quick Response Code carrier outer layer; ciphering two-dimension code pattern is engraved in the Quick Response Code carrier upper surface; the positional information of buried pipeline is stored in ciphering two-dimension code pattern, can effective guarantee buried pipeline data security and crypticity;The information content that can be stored using Quick Response Code in the present invention is very big, and in the case where bar code part is damaged, still reducible storage information, it is ensured that the integrality of Underground Pipeline Data;Quick Response Code long service life, can move with carrier, and can depart from database and computer network is used;Therefore the acquisition accurate data information during looking for easily and fast.
Description
Technical field
The invention belongs to buried pipeline detection technique field, and in particular to one kind obtains buried based on ciphering two-dimension code identification
The device and method of pipeline position.
Background technology
With the fast development of domestic economy level, social public service facility increasingly tends to perfect, from now in city
The underground engineering construction of more Huimins will be carried out, for carry out existing pipeline protected working and underground engineering operation it is normal
Carry out, verify the underground utilities in engineering location(Natural gas tube, water pipe, fulgurite)The particular location and distribution situation of buried depth for
Such engineering project is particularly important.But because the pipeline depth of burying is at tens centimetres to several meters, buried depth is for up to several
Year even decades, in addition the administrative power of pipeline be under the jurisdiction of different departments, cause the data such as design drawing originally largely to be lost,
And once there is buried pipeline position and fail to understand and cause Important Project accident in China's multiple city, the underground space is reused
Cause many potential safety hazards.Therefore, quick, the accurate burial place and spatial situation for determining buried pipeline is Urban Underground
Important technological problems urgently to be resolved hurrily during space development.
At present, determine that traditional detection means has 3 for old buried pipeline burial place and spatial situation
Kind:1st, understand the drawing data of original pipeline buried depth data and correlation to owner and supervisor's consulting, and carried out according to drawing
Exploration on the spot obtains the accurate information of legacy data;2nd, surface exploration is carried out by electromagnetic induction principle using metal detector,
The electromagnetic wave signal of analyzer tube line reflection determines the embedding information of pipeline.3rd, earth's surface spy is carried out using detection radar, geological radar
Survey, the distribution situation of underground utilities is inferred by the radar image for obtaining.
But the drawbacks of above method has certain, such as because of each buried pipeline function difference, it is subordinate to different management departments
Door, is related to unit or department numerous, and buried pipeline many engineering times are more long, it is impossible to ensure accurately obtain comprehensive data;And
In using the detecting devices detection process such as metal detector, detection radar, geological radar, easily by underground non-targeted pipeline
Interference, meanwhile, measuring instrument complex operation, underground utilities are buried for a long time, may result in the be detected performance of pipeline
Reduce, influence Effect on Detecting, cause the error of result of detection larger, and a large amount of manpower financial capacities need to be expended.Additionally, with buried
Number of lines and feature increase, and maintaining to pipeline, accident maintenance propose more tests, it is desirable to it should quickly process,
Real-time response, and traditional hunting scheme will necessarily extreme influence its practice of construction.
Therefore, a kind of identity device that can quickly, accurately determine buried pipeline burial place and spatial is developed, it is convenient
Field engineer or emergency rescue personnel determine and processing relevant information in time, by with important realistic function and long-range meaning
Justice.
The content of the invention
In order to solve the above-mentioned problems in the prior art, obtained based on ciphering two-dimension code identification the invention provides one kind
Take the device and method of buried pipeline position.
The technical problem to be solved in the present invention is achieved through the following technical solutions:
The device of buried pipeline position is obtained based on Quick Response Code identification, wherein, including Quick Response Code carrier, in the Quick Response Code carrier
Ciphering two-dimension code pattern, institute are engraved in metal coating shell and metal coating lid that outer layer is set, the Quick Response Code carrier upper surface
State and store the positional information of buried pipeline in ciphering two-dimension code pattern.
Further illustrated as of the invention, the positional information includes that described identification based on ciphering two-dimension code obtains buried
The warps of multiple points on the latitude and longitude information of the device of pipeline position, pipeline buried depth, pipeline diameter, pipeline purposes and pipeline circuit
Latitude information.
Further illustrated as of the invention, the cylinder that the Quick Response Code carrier is made for PVC material, a diameter of 10-
12cm, is highly 15-18cm.
Further illustrated as of the invention, the metal coating shell and metal coating lid are connected through a screw thread.
Further illustrated as of the invention, the metal coating cap upper surface edge is provided with multiple symmetrical recessed
Groove.
Further illustrated as of the invention, the engraving for ciphering two-dimension code pattern is beaten using laser engraving or laser
Calibration method, and abrasion-resistant clear material is applied to ciphering two-dimension code patterned surfaces, carry out anti-wear treatment.
Further illustrated as of the invention, rubber is provided between the Quick Response Code carrier upper surface and metal coating lid
Interlayer.
Further illustrated as of the invention, the metal coating shell and metal coating exterior surface do rust resistance and corrosion resistance
Treatment.
The method that described device obtains buried pipeline position, comprises the following steps:
Step one, top at least one described device of arrangement in arrangement pipeline inflection point and bypass line node, described device gold
The upper surface for belonging to protection cap is concordant with ground;
Step 2, when pipeline position is found, any flex point or the pipeline forking node opening gold in pipeline target region
Category protection cap, and the ciphering two-dimension code pattern is distinguished with special decryption software, obtain at the flex point or pipeline forking node
Positional information;
The positional information includes latitude and longitude information, pipeline buried depth, pipeline diameter, the pipe at the flex point or pipeline forking node
The latitude and longitude information of multiple points in line purposes and pipeline circuit.
Step 3, the arbitrfary point latitude and longitude information in the positional information for obtaining, phase is determined by GPS location instrument
The position of adjoint point;
Step 4, the position is found, repeat step two and step 3 obtain the positional information of whole piece pipeline, really by that analogy
Determine whole piece pipeline position.
Compared with prior art, the beneficial effect of present invention acquirement is:
1st, the information content that Quick Response Code can be stored is very big, and in the case where bar code part is damaged, still reducible storage letter
Breath, it is ensured that the integrality of Underground Pipeline Data;Quick Response Code long service life, can move, and can depart from database with carrier
Used with computer network;Therefore the acquisition accurate data information during looking for easily and fast.
2nd, management unit can independently carry out Quick Response Code generation and encryption, and the decryption program with recognizer is corresponding.Core is encrypted
Data message is independently grasped, and security performance is high,.
3rd, the device be easy to make, it is easy to use;Underground Pipeline Data high input speed, equipment are simple.The device is whole
During body running, pipeline detection and the operating efficiency looked for can be improved, greatly reduce the input of manpower, material resources and financial resources.
The present invention is described in further details below with reference to drawings and Examples.
Brief description of the drawings
Fig. 1 is the device overall structure diagram that buried pipeline position is obtained based on ciphering two-dimension code identification of the invention.
Fig. 2 is the device profile that buried pipeline position is obtained based on ciphering two-dimension code identification of the invention.
In figure:1st, Quick Response Code carrier;2nd, metal coating shell;3rd, metal coating lid;4th, ciphering two-dimension code pattern;5th, groove;
6th, channel rubber.
Specific embodiment
Technological means and effect that predetermined purpose is taken are reached for the present invention is expanded on further, below in conjunction with accompanying drawing and reality
Example is applied to specific embodiment of the invention, architectural feature and its effect, is described in detail as follows.
Embodiment 1:
As depicted in figs. 1 and 2, the device overall structure for obtaining buried pipeline position based on ciphering two-dimension code identification of the invention is shown
It is intended to and sectional view, wherein, including Quick Response Code carrier 1, the metal coating shell 2 in the setting of the outer layer of Quick Response Code carrier 1 and metal guarantor
Ciphering two-dimension code pattern 4 has been engraved in protecting cover 3, the upper surface of Quick Response Code carrier 1, and buried pipeline is included in ciphering two-dimension code pattern 4
Positional information, the positional information includes the latitude and longitude information, pipeline buried depth, pipeline diameter, pipeline purposes and pipeline circuit
The latitude and longitude information of upper multiple points, multiple points herein refer in particular to pipeline inflection point and pipeline forking node, according to the multiple spot information
The position of whole piece pipeline can accurately be determined, facilitate maintenance maintenance.
Preferably, the cylinder that Quick Response Code carrier 1 is made for PVC material, a diameter of 10-12cm is highly 15-18cm,
And can voluntarily adjust size according to the actual conditions of pipeline.
PVC material is acidproof, alkaline-resisting, high temperature resistant, insulation and waterproof, can preserve for a long time and indeformable or damage, use the material
Material can make to preserve the positional information in ciphering two-dimension code pattern 4 for a long time as Quick Response Code carrier 1, and Quick Response Code can be stored up
Bulk information is deposited, even if partial destruction can also reduce storage information, can also be moved with carrier, can be conveniently and quick
Obtain data message.
Preferably, ciphering two-dimension code pattern 4 is encrypted by professional method, when needing to obtain 2 D code information, is needed
Want related personnel to be scanned using the decryption software of matching, to obtain the positional information stored in Quick Response Code, can so have
Effect avoids passing through the ordinary two dimensional code identification software of the mobile terminals such as mobile phone, flat board installation, arbitrarily scanning acquisition information, Neng Gouti
The security and crypticity of buried pipeline data high.
Above-mentioned ciphering two-dimension code pattern 4 is encrypted using PBE algorithms, is input into cleartext information first, encrypted ones, see by
Cleartext information carries out data analysis and data encoding operation by Quick Response Code coding, forms plaintext bit stream;Then plaintext bit stream is turned
Byte stream is changed to, and is grouped and is filled, formation is suitable to the message groups of encryption;Encrypted ones are generated into encryption key, according to
The symmetric encipherment algorithm of setting, is encrypted with key to message, generates cipher-text message group;Finally cipher-text message group is sequentially inserted
Enter in coded information stream, " Error Correction of Coding " and subsequent treatment, generation ciphering two-dimension code are carried out to coded information stream.When need obtain
During the information stored in Quick Response Code, using specific decryption software, it is decrypted by the algorithm for inversion of PBE, obtains cleartext information.
PBE algorithms are a kind of AESs based on password, are characterized in instead of key using password, and password by with
Family is administered oneself, and the security of data is ensured using methods such as random number hash multi-encipherings.PBE algorithms in ciphering process simultaneously
It is not directly to be encrypted using password, but the key of encryption, by password generated, after key generation, PBE algorithms are added using symmetrical
Close algorithm is encrypted to data.The Quick Response Code encrypted by the method need to be distinguished using corresponding decryption software, commonly
Two-dimensional code scanning software cannot correctly recognize that and encrypted ones are simple, flexibly, and password is administered by user, is improve
Stored security is stored up in Quick Response Code.
Embodiment 2:
On the basis of embodiment 1, metal coating shell 2 and metal coating lid 3 are connected through a screw thread, the upper surface of metal coating lid 3
Edge is provided with multiple symmetrical grooves 5, and the upper surface of metal coating lid 3 can record the Business Name of the affiliated company of pipeline
With the information such as telephone number, the convenient personnel for finding that pipeline breaks down contact relevant staff and take measures in time.
Metal coating lid 3 needs staff to use professional tool, and fit 5 rotates metal coating lid 3, so as to open
Metal coating lid 3, obtains the positional information in ciphering two-dimension code pattern 4, it is ensured that the security of data message, and the groove 5
Multiple is provided with, as shown in Fig. 2 eight grooves 5 are provided with metal coating lid 3, even if there is Individual grooves 5 in use
Damage, metal coating lid 3 can also be opened by other intact grooves 5, it is to avoid because groove 5 weares and teares and caused by metal coating
The situation that lid 3 cannot be opened.
By above-mentioned metal coating lid 3 can effectively anti-locking apparatus arbitrarily opened, and coordinate the encryption measures of Quick Response Code,
The security and crypticity of buried pipeline information is further improved, be conducive to the long-term preservation of buried pipeline information.
Embodiment 3:
On the basis of above-described embodiment, the method engraved using laser engraving or laser marking of ciphering two-dimension code pattern 4,
And abrasion-resistant clear material is applied to ciphering two-dimension code pattern 4 surface, anti-wear treatment is carried out, it is ensured that relevant information is deep for a long time
Without damaging under buried.
Channel rubber 6 is provided between the upper surface of Quick Response Code carrier 1 and metal coating lid 3, it is to avoid the upper table of Quick Response Code carrier 1
Phase mutual friction between face and metal coating lid 3, causes ciphering two-dimension code pattern 4 to wear and tear.
Rust resistance and corrosion resistance treatment is done in metal coating shell 2 and the outer surface of metal coating lid 3, it is to avoid because external environment reason is made
It is corroded into metal coating shell 2 and metal coating lid 3.
Embodiment 4:
On the basis of above-described embodiment, the method that the device obtains buried pipeline position, flex point and shunting in arrangement pipeline
Point pipeline top at least one device of arrangement, the upper surface and ground for making device metal protection cap 3 maintains an equal level;Finding pipeline position
When putting, metal coating lid 3 is opened by professional tool in pipeline arbitrfary point, and Quick Response Code is distinguished by the decryption software for matching,
Obtain the positional information of the point, including the latitude and longitude information, pipeline buried depth, pipeline diameter, pipeline purposes and pipeline circuit
The latitude and longitude information of upper multiple point, other multiple points first 2 points at least including the point and latter 2 points;Further according to latitude and longitude information,
The position of the point for determining to need by GPS location instrument;Find this and put and obtain the position letter stored in the ciphering two-dimension code of this point
Breath, obtains the information of whole piece pipeline by that analogy.
If necessary to a certain section of pipeline position, then wherein one can be found on the road surface of the approximate location of pipeline installation
The individual position that sets up an office, metal coating lid 3 is opened by professional tool, obtains positional information therein, you can obtain the information and
The latitude and longitude information of other multiple points, by that analogy, can fast and accurately obtain the positional information of pipe string, even if some
The device of point is damaged, it is impossible to is obtained information, but the multiple latitude and longitude informations put by being preserved on each device, can still be obtained
Round the position of bar pipeline.
The method can accurately obtain pipeline information in pipeline detection work, especially continuous in buried pipeline quantity
In the case of increased, maintaining, accident maintenance for pipeline are only accurate to determine pipeline burial place, could locate in time
Reason, it is to avoid cause unnecessary loss, the Quick Response Code encrypted by the metal coating lid 3 and professional encryption method of special processing,
The security and crypticity of pipeline information can be improved, it is to avoid the leakage of pipeline information, while pipeline information can also be ensured
Long-term accurate preservation.
Above content is to combine specific preferred embodiment further description made for the present invention, it is impossible to assert
Specific implementation of the invention is confined to these explanations.For general technical staff of the technical field of the invention,
On the premise of not departing from present inventive concept, some simple deduction or replace can also be made, should be all considered as belonging to of the invention
Protection domain.
Claims (9)
1. the device of buried pipeline position is obtained based on ciphering two-dimension code identification, it is characterised in that:Including Quick Response Code carrier(1)、
In the Quick Response Code carrier(1)The metal coating shell that outer layer is set(2)With metal coating lid(3), the Quick Response Code carrier(1)On
Ciphering two-dimension code pattern is engraved in surface(4), the ciphering two-dimension code pattern(4)In store the positional information of buried pipeline.
It is 2. according to claim 1 that the device for obtaining buried pipeline position is recognized based on ciphering two-dimension code, it is characterised in that:
The positional information includes latitude and longitude information, the pipeline of the device that buried pipeline position is obtained based on ciphering two-dimension code identification
The latitude and longitude information of multiple points on buried depth, pipeline diameter, pipeline purposes and pipeline circuit.
It is 3. according to claim 1 that the device for obtaining buried pipeline position is recognized based on ciphering two-dimension code, it is characterised in that:
The Quick Response Code carrier(1)It is the cylinder that PVC material is made, a diameter of 10-12cm is highly 15-18cm.
It is 4. according to claim 1 that the device for obtaining buried pipeline position is recognized based on ciphering two-dimension code, it is characterised in that:
The metal coating shell(2)With metal coating lid(3)It is connected through a screw thread.
5. the device for obtaining buried pipeline position is recognized based on ciphering two-dimension code according to claim any one of 1-4, its
It is characterised by:The metal coating lid(3)Top surface edge is provided with multiple symmetrical grooves(5).
6. the device for obtaining buried pipeline position is recognized based on ciphering two-dimension code according to claim any one of 1-4, its
It is characterised by:The ciphering two-dimension code pattern(4)Engrave using the method for laser engraving or laser marking, and to described
Ciphering two-dimension code pattern(4)Surface applies abrasion-resistant clear material, carries out anti-wear treatment.
7. the device for obtaining buried pipeline position is recognized based on ciphering two-dimension code according to claim any one of 1-4, its
It is characterised by:The Quick Response Code carrier(1)Upper surface and metal coating lid(3)Between be provided with channel rubber(6).
8. the device for obtaining buried pipeline position is recognized based on ciphering two-dimension code according to claim any one of 1-4, its
It is characterised by:The metal coating shell(2)With metal coating lid(3)Do rust resistance and corrosion resistance treatment in outer surface.
9. a kind of device for obtaining buried pipeline position based on ciphering two-dimension code identification by described in claim 1 obtains buried
The method of pipeline position, it is characterised in that:Comprise the following steps:
Step one, top at least one described device of arrangement in arrangement pipeline inflection point and bypass line node, described device gold
Category protection cap(3)Upper surface it is concordant with ground;
Step 2, when pipeline position is found, any flex point or the pipeline forking node opening gold in pipeline target region
Category protection cap(3), and distinguish the ciphering two-dimension code pattern with special decryption software(4), obtain the flex point or pipeline shunting
Positional information at node;
The positional information includes latitude and longitude information, pipeline buried depth, pipeline diameter, the pipe at the flex point or pipeline forking node
The latitude and longitude information of multiple points in line purposes and pipeline circuit;
Step 3, the arbitrfary point latitude and longitude information in the positional information for obtaining, consecutive points are determined by GPS location instrument
Position;
Step 4, the position is found, repeat step two and step 3 obtain the positional information of whole piece pipeline, really by that analogy
Determine whole piece pipeline position.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611071174.2A CN106803052B (en) | 2016-11-29 | 2016-11-29 | The device for obtaining buried pipeline position is identified based on ciphering two-dimension code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611071174.2A CN106803052B (en) | 2016-11-29 | 2016-11-29 | The device for obtaining buried pipeline position is identified based on ciphering two-dimension code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106803052A true CN106803052A (en) | 2017-06-06 |
CN106803052B CN106803052B (en) | 2019-09-10 |
Family
ID=58984882
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611071174.2A Active CN106803052B (en) | 2016-11-29 | 2016-11-29 | The device for obtaining buried pipeline position is identified based on ciphering two-dimension code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106803052B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108089188A (en) * | 2017-12-16 | 2018-05-29 | 深圳市中正测绘科技有限公司 | A kind of rangefinder and underground utilities mapping method |
CN112233243A (en) * | 2020-10-21 | 2021-01-15 | 南京奇趣数字科技有限公司 | Building pipeline 3D visualization method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103793789A (en) * | 2014-01-28 | 2014-05-14 | 上海市政建设有限公司 | Pipe-jacking construction information management system and method based on two-dimensional bar codes |
CN204624149U (en) * | 2015-04-28 | 2015-09-09 | 广西天海信息科技有限公司 | A kind of packing jar that can block Quick Response Code |
CN105202371A (en) * | 2015-10-08 | 2015-12-30 | 湖南大麓科技有限公司 | Underground pipeline inspecting and maintaining system |
US9306944B2 (en) * | 2012-10-18 | 2016-04-05 | Dell Products L.P. | Secure information handling system matrix bar code |
CN105469699A (en) * | 2015-12-29 | 2016-04-06 | 浙江省水利水电勘测设计院 | Anti-counterfeiting two-dimensional code identification and laying method thereof |
CN205541639U (en) * | 2016-04-01 | 2016-08-31 | 张浩然 | Electron sign marker peg |
-
2016
- 2016-11-29 CN CN201611071174.2A patent/CN106803052B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9306944B2 (en) * | 2012-10-18 | 2016-04-05 | Dell Products L.P. | Secure information handling system matrix bar code |
CN103793789A (en) * | 2014-01-28 | 2014-05-14 | 上海市政建设有限公司 | Pipe-jacking construction information management system and method based on two-dimensional bar codes |
CN204624149U (en) * | 2015-04-28 | 2015-09-09 | 广西天海信息科技有限公司 | A kind of packing jar that can block Quick Response Code |
CN105202371A (en) * | 2015-10-08 | 2015-12-30 | 湖南大麓科技有限公司 | Underground pipeline inspecting and maintaining system |
CN105469699A (en) * | 2015-12-29 | 2016-04-06 | 浙江省水利水电勘测设计院 | Anti-counterfeiting two-dimensional code identification and laying method thereof |
CN205541639U (en) * | 2016-04-01 | 2016-08-31 | 张浩然 | Electron sign marker peg |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108089188A (en) * | 2017-12-16 | 2018-05-29 | 深圳市中正测绘科技有限公司 | A kind of rangefinder and underground utilities mapping method |
CN112233243A (en) * | 2020-10-21 | 2021-01-15 | 南京奇趣数字科技有限公司 | Building pipeline 3D visualization method |
Also Published As
Publication number | Publication date |
---|---|
CN106803052B (en) | 2019-09-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Smith et al. | Measuring historical coastal change using GIS and the change polygon approach | |
Abubahia et al. | Advancements in GIS map copyright protection schemes-a critical review | |
Feng et al. | A novel semi-fragile digital watermarking scheme for scrambled image authentication and restoration | |
CN106780287B (en) | Lossless watermarking method based on vector geographic line data organization characteristics | |
CN116385250B (en) | Track data double watermarking method based on robust watermarking and fragile watermarking | |
Ren et al. | Selective authentication algorithm based on semi-fragile watermarking for vector geographical data | |
CN105469699A (en) | Anti-counterfeiting two-dimensional code identification and laying method thereof | |
CN106803052B (en) | The device for obtaining buried pipeline position is identified based on ciphering two-dimension code | |
Xun et al. | A robust zero-watermarking algorithm for vector digital maps based on statistical characteristics | |
CN103955634A (en) | Copyright protecting method based on digital watermark technology and aiming at tile remote sensing data | |
CN103377455B (en) | A kind of three-dimensional geographical pattern number word water mark method towards copyright protection service | |
Xun et al. | A robust zero-watermarking algorithm for 2D vector digital maps | |
US11983789B1 (en) | Generation method, detection method, generation device, and detection device of zero watermarking for trajectory data, and storage medium | |
CN103377320B (en) | A kind of vector geographic data selectivity certification semi-fragile watermarking method | |
CN103903217A (en) | Vector map integrity authentication method based on vertex insertion | |
Wang et al. | RST invariant fragile watermarking for 2D vector map authentication | |
Li et al. | Copyright authentication of digital vector maps based on spatial autocorrelation indices | |
Chen et al. | Identifying urban villages from city-wide satellite imagery leveraging mask R-CNN | |
CN105426710A (en) | Method for accurately authenticating vector geographic data based on spatial domain sequencing | |
CN106772619B (en) | A kind of identity device and method of quick determining buried pipeline position | |
Wang et al. | 2D vector map fragile watermarking with region location | |
CN102682246B (en) | Vector geographic data digital watermark method based on data point positioning | |
CN108599940A (en) | The safety management system and method for underground utilities | |
CN104866737B (en) | A kind of DEM fragile watermark completeness certification methods for taking features of terrain into account | |
CN103903218A (en) | Robust geographic data watermarking method for public ownership verification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |