Article identification system and authorization method thereof

A technology of identification and items, applied in the field of identification, can solve problems such as the inability to really solve the anti-counterfeiting problem, the use of anti-counterfeiting numbers by counterfeiters, and the product inquiry rate of the telephone anti-counterfeiting system being less than 1%.

Inactive Publication Date: 2010-10-06
祝明敬
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this system, most users ignore the anti-counterfeiting authentication process and use it directly, so the anti-counterfeiting number on the item may be used by counterfeiters; only after the verification is completed, the anti-counterfeiting number may become invalid
According to the latest information from the China Anti-counterfeiting Industry Association, the commodity inquiry rate of the existing telephone anti-counterfeiting system is less than 1%.
[0012] 1. The existing anti-counterfeiting technology of markers is a cycle of creation and imitation, which cannot really solve the problem of anti-counterfeiting
[0013] 2. In the existing digital authentication anti-counterfeiting system, what is verified in the digital anti-counterfeiting system is actually not an item, but an anti-counterfeiting mark
[0014] 3. In the existing digital authentication anti-counterfeiting system, verification and use can also be separated, and even reminders cannot be done. The verification process is often ignored by users, resulting in an extremely low query rate
[0015] 4. At the same time, a large number of anti-counterfeiting methods are constantly emerging, which has caused great inconvenience to users, and even has "inertia" and is rarely used; there are as many anti-counterfeiting methods as fakes, which are neither easy to identify nor easy to use
[0016] 5. Due to the low query rate, many untested codes are used by counterfeiters, causing the codes originally used to protect genuine products to become the umbrella and pass for fake products

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Article identification system and authorization method thereof
  • Article identification system and authorization method thereof
  • Article identification system and authorization method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050]The technical side of the present invention has developed a brand-new anti-counterfeiting technology. The binding of the verified item with the password and the combination lock cannot or is not easy to separate. When using it, the identification of the authenticity of the item is realized while the item code is queried. , which revolutionized the way queries are done only on encodings.

[0051] The technical solutions of the present invention will be described in detail below with reference to the accompanying drawings and preferred embodiments.

[0052] Such as image 3 Shown is the principle diagram of the item identification system in the present invention. The structure of the item identification system includes: a code generation module 31 , a code generation and binding module 32 and a code code library 33 .

[0053] Wherein, the password generation module 31 is used to generate a password and carry out password setting to the combination lock, then, the passwor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an article identification system, comprising a password generation module, an encoding generation and binding module and an encoding password database, wherein the password generation module is used for generating passwords, setting a password for a coded lock, sending the password to the encoding password database, and sending the coded lock to the encoding generation and binding module, wherein the password is used for unlocking the coded lock; the encoding generation and binding module is used for generating an article code, receiving the coded lock, and binding the article code with the coded lock; and the encoding password database is used for receiving, matching and storing the password and article code or when received the article code, searching correspondent password based on the article code and feed the password back to a user. The invention also discloses an article identification authorization method. The invention provides a brand-new anti-forgery technology which can be widely applied to article identification, article anti-forgery, accreditation, etc.

Description

technical field [0001] The invention relates to an identification technology, in particular to an item identification system and an authorization method thereof. Background technique [0002] With the development of the market economy, commodity brands and service brands are showing more and more outstanding value. However, under the temptation of interests, counterfeit goods are prevalent, seriously infringing on the interests of legitimate consumers and users. [0003] In order to protect the legitimate rights and interests of legitimate consumers, anti-counterfeiting technology has emerged, mainly including traditional anti-counterfeiting markers and digital phone authentication anti-counterfeiting. The main idea of ​​traditional anti-counterfeiting technology is to strive to create an anti-counterfeiting identification that is not easy to be imitated; while the counterfeiter's idea is to try to make an imitation identification that is the same as the real one. In this w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q30/00E05B49/00
CPCG06F21/45H04L9/32
Inventor 祝明敬
Owner 祝明敬
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products