Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-fake verification method

A verification method and verification key technology, which is applied in business, equipment, digital data authentication, etc., can solve the problems of inability to perform repeated verification, inconvenience for consumers, and inability to truly prevent the circulation of counterfeit products, so as to ensure uniqueness and Identity determinability, ease of use, and the effect of expanding application scenarios

Inactive Publication Date: 2015-06-10
矩众合能(天津)科技发展有限公司
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the prior art, the anti-counterfeiting method through the two-dimensional code or the RFID label is relatively passive, and only the relevant information of the article or logistics can be obtained through the two-dimensional code and the RFID label, and the two-dimensional code and the RFID label on the package can be detected. Copying and counterfeiting, when querying a copied QR code or RFID tag, you will also get the result that the product is genuine, so it is impossible to really prevent the circulation of counterfeit products; The verification method is changed to one-time verification, that is, the relevant records of the QR code will be cleared after one verification, and repeated verification cannot be performed, which will easily cause inconvenience to consumers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-fake verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The present invention will be described in detail below with reference to the drawings and examples.

[0013] like figure 1 As shown, in the anti-counterfeiting verification method of the present invention, the terminal intermittently performs data connection with the remote monitoring center through the network. When the terminal disconnects from the network connection, some applications can be closed to increase battery life. Activate, when activated, exchange data with the monitoring center, and store the verification key representing its identity in the terminal. The verification key is in the data form of a two-dimensional code, which is generated by the monitoring center and obtained spontaneously by the terminal when it is connected. And the monitoring center will update and transform it in real time, and the monitoring center will record the relevant information of each terminal obtaining the key; when the user activates the terminal, the terminal will connect t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided is an anti-fake verification method, wherein a terminal is discontinuously in a data connection with a remote monitoring center through a network. A verification key for representing an identity of the terminal is stored inside the terminal. In the format of a quick response code, the verification key is updated and changed at real time by the monitoring center; and related information about acquiring the key by the terminal every time is recorded by the monitoring center. When the terminal establishes a network connection again with the monitoring center, the monitoring center verifies whether the quick response code stored in the terminal and acquired at the last time of connecting with the monitoring center fits to that of the record; allowing the verification to pass if the quick response code stored in the terminal and acquired at the last time of connecting with the monitoring center fits to that of the record, i.e., the corresponding terminal is true, then a new quick response code is obtained from the monitoring center to replace the original quick response code. Being a piece of dynamic information, the verification key for representing the identity of the terminal is not installed locally at the terminal. The terminal only takes effect of storing, with the information unable to be simply duplicated and used by counterfeiters; accordingly, a terminal being able to pass the verification of the monitoring center cannot be counterfeited, thereby guaranteeing the uniqueness and the identity confirmability of the terminal.

Description

technical field [0001] The invention relates to the technical field of anti-counterfeiting, in particular to an anti-counterfeiting checking method. Background technique [0002] With the development of the Internet of Things technology, various anti-counterfeiting technologies based on the Internet of Things have emerged, and related anti-counterfeiting technologies have also been gradually applied to various industries. The usual practice in the prior art is to set a two-dimensional code or RFID tag on the outer packaging of the product, and use relevant mobile devices to read the two-dimensional code information or the content recorded in the RFID tag to trace and supervise the items in the package . [0003] However, in the prior art, the anti-counterfeiting method through the two-dimensional code or the RFID label is relatively passive, and only the relevant information of the article or logistics can be obtained through the two-dimensional code and the RFID label, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/00G06F21/31
Inventor 史鸣雷胡滨耿耿
Owner 矩众合能(天津)科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products