Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system for user interactive IoT verification based on radio frequency tags

A radio frequency tag and interactive technology, applied in the field of radio frequency tags, can solve the problems of ineffective anti-counterfeiting system, failure to form an anti-counterfeiting system, and weak physical connection of chip tags to designated products.

Active Publication Date: 2019-10-08
SHANGHAI 55 INFORMATION TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. There is no interactive verification for users, only the seller writes specific data and content in the RFID tag chip, resulting in all data in the anti-counterfeiting verification system being unilaterally manipulated and tampered by the seller; 2. Not providing customers with every There is only one-to-one password verification program for chips. Even if some methods provide users with access to the account login password of tools (such as APP), they do not provide a password comparison verification program for each tag chip, resulting in chip writes. The input information can be opened and read by third parties under the general login authority, which increases the risk of information leakage and imitation; 3. The physical link of the chip label to the designated product is not strong: because about 80% of the area of ​​the label chip is a metal antenna, it is inevitable With a certain hardness and toughness, even the tear-resistant "fragile paper" chip labels specially made by radio frequency label manufacturers on the market can be completely peeled off and reused, which will cause the label chip to be unable to uniquely represent the designated product, resulting in the Anti-counterfeiting system is ineffective and all previous efforts have been wasted
These anti-counterfeiting features are easily manipulated by the seller and / or copied, stripped and replaced by a third party or reused in the process of commodity circulation, so that the predetermined anti-counterfeiting effect cannot be achieved
[0006] The existing RF chip anti-counterfeiting technologies are all committed to deepening the read-write algorithm and data encryption level, focusing on solving and improving a certain technical node; Effective anti-counterfeiting system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for user interactive IoT verification based on radio frequency tags
  • Method, device and system for user interactive IoT verification based on radio frequency tags
  • Method, device and system for user interactive IoT verification based on radio frequency tags

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0130] The application will be described in further detail below in conjunction with the accompanying drawings.

[0131] Before discussing the exemplary embodiments in more detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although the flowcharts describe operations as sequential processing, many of the operations may be performed in parallel, concurrently, or simultaneously. In addition, the order of operations can be rearranged. The process may be terminated when its operations are complete, but may also have additional steps not included in the figure. The processing may correspond to a method, function, procedure, subroutine, subroutine, or the like.

[0132] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0133] Memory may ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention aims to provide a user interactive Internet of Things verification method, device and system based on a radio frequency tag. Compared with the prior art, interaction with a user who orders a commodity is carried out to obain the user password which is set by a user or determined by network equipment and sent to the user; the user password and the chip feature information of the radiofrequency tag are verified together, the user password is introduced into the anti-counterfeiting verification of the radio frequency tag through the interaction with the user; a user can actively participate in commodity anti-counterfeiting; the platform party is prevented from operating the anti-counterfeiting system by a single party; an Internet of Things method and a server verification technology are utilized to ensure that the chip can uniquely refer to a specific commodity; the commodity anti-counterfeiting system is simple in structure and convenient to use, replacement and / or repeated use are / is avoided, even if a user password is leaked, a third party rewrites the same content by using a chip in the same format, or a chip label is replaced and repeatedly used, the scheme can bedirectly detected, and a commercial, complete and effective commodity anti-counterfeiting system is formed.

Description

technical field [0001] The present application relates to the technical field of radio frequency tags, in particular to a technology of user interactive IoT verification based on radio frequency tags. Background technique [0002] With the continuous development of e-commerce, it is necessary to ensure that commodities are not intercepted and exchanged in the process of circulation, so that the commodities received by users can be guaranteed to be authentic, and the circulation of counterfeit and forged commodities should be eliminated and stopped. [0003] Existing radio frequency tag anti-counterfeiting systems and technologies are implemented independently by sellers (such as manufacturers, platforms, etc.). Can read verification. The anti-counterfeiting design is mainly aimed at third-party tampering, copying, and reuse. [0004] However, these methods have the following disadvantages: [0005] 1. There is no interactive verification for users, only the seller writes ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K17/00
CPCG06K17/0029
Inventor 张辉
Owner SHANGHAI 55 INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products