Anti-fake method using non-symmetric cipher technology
An asymmetric cryptography and asymmetric key technology, which is applied to the record carrier used by the machine, the usage of multiple keys/algorithms, and the devices that work together to achieve the effect of facilitating identification, ensuring security, and improving security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0068] In order to further explain the technical means and effects that the present invention adopts to achieve the intended purpose of the invention, the specific implementation methods, The methods, steps and equipment used are described in detail below.
[0069] see figure 1 As shown, it is a flow chart of the anti-counterfeiting method using asymmetric cryptography in the present invention. see figure 2 As shown, it is a flow chart of the steps of inputting protected object information in the present invention. see image 3 As shown, it is a flow chart of key application steps in the present invention. see Figure 4 As shown, it is a flow chart of the production steps of the anti-counterfeit label in the present invention. see Figure 5 As shown, it is a flow chart of the anti-counterfeiting label identification steps in the present invention.
[0070] Such as figure 1 As shown, a kind of anti-counterfeiting method utilizing asymmetric cryptography proposed by th...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com