Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Automatic identification device for combined address identification

A technology for automatic authentication and verification of devices, which is applied in the fields of collaborative devices, special data processing applications, instruments, etc., and can solve the problems of counterfeiting methods, increasing consumer burden, and failing to inquire about certification.

Inactive Publication Date: 2005-11-23
刘小鹏
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The current personalized password query anti-counterfeiting authentication is to pre-generate the commodity identity password (expression forms include numbers, patterns, textures, etc.), and write this password into the commodity packaging and query database at the same time. Consumers can press the password written on the commodity. Explain the path to query in the database. If there is any, it will be false. It is the oldest method for passwords. It is currently widely used, but its flaws are also very prominent: the method itself can be counterfeited, such as counterfeiters in the above method. The identity passwords are written into the product packaging and the counterfeiter’s database, and the consumers follow the route to query according to the instructions. These passwords must also be in the counterfeiter’s database; According to the current query rate of less than 1%, get the real password in 99% of the products that are not inquired, then copy it 100 times, and write it on the package of the fake product. After the consumer gets the fake product, write it twice Enter the password and route query, the password must also exist in the genuine product database
[0005] Whether it is physical or personalized anti-counterfeit password query anti-counterfeiting certification, especially password query anti-counterfeiting certification, it is applied to commodity anti-counterfeiting certification. The responsibility for authenticity should be the seller, not the consumer, and the responsibility of the seller should be passed on to the consumer; at the same time, the current anti-counterfeiting certification is for consumers to conduct anti-counterfeiting inquiries after purchasing the product. Complaints increase the burden on consumers; there is only one set of passwords for anti-counterfeiting authentication, which is generated once. Once the anti-counterfeiting passwords are stolen or damaged in product packaging, sales (such as supermarkets and other open sales environments), and transportation, the products will not work normally. sales, and stolen passwords can be used for counterfeit goods; authenticity query and authentication are only carried out between consumers and databases, and have nothing to do with sellers, so that sellers cannot be supervised, making them escape from checking the goods The obligation of proof of authenticity also facilitates its participation in the production and sale of counterfeit goods; due to the extremely low inquiry rate, the manufacturer cannot fully grasp the information and sales status of consumers; any network terminal (such as telephone, PC), Anti-counterfeiting authentication query can be realized in any place, which objectively provides convenience for counterfeiters; in specific query operation, in order to ensure the uniqueness and non-repetition of the password, the password needs to reach a certain number of digits, generally about 16 digits , Consumers need to enter a password to inquire about authentication. Due to the long number of passwords, mistakes are often made. Some consumers find it troublesome and refuse to inquire about authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic identification device for combined address identification
  • Automatic identification device for combined address identification
  • Automatic identification device for combined address identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] The structure of the co-location authentication system of the embodiment is as follows: figure 1 shown. The system includes:

[0074] At least one authentication device 1 and address 11 are connected with the following access addressing device 3 and verification device 2 through the network 9. The authentication device 1 includes: processor, network card, network address, network information receiving and output device, information and address input and receiving device, display, interface, power supply, for inputting or receiving the authentication code in the identity code in the commodity identification and the address 21 of the purchase verification party verification device 2, and send it to the access addressing device 3, with To receive and display the commodity information and sales information sent by the access co-location device 3; the authentication device 1 can use existing network equipment, such as telephones, mobile phones, and PCs, and can also refit o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an auto quotation device used to do amalgamating address quotation. It receives commodity ID quotation code of commodity tag by the auto receiving device and receives quotation device address by network interface card and network device; it sends the quotation code and supervising device address to switch-in amalgamating address device; switch-in amalgamating address device compounds quotation code and quotation device address to generate new quotation code and compares it with quotation code of quotation server, then outputs the result to auto quotation device and buyer's supervising device to assure commodity property and receives commodity information and sale information of quotation commodity which is sent from switch-in amalgamating address device.

Description

technical field [0001] The invention relates to an automatic authentication device for on-site authentication, which belongs to the technical field of commodity identity anti-counterfeiting authentication, and is suitable for telecommunication value-added service providers and commodity producers and sellers, and provides automatic authentication devices for on-site authentication to their on-site authentication systems. An authentication device; it is also applicable to network terminal equipment manufacturers to manufacture automatic authentication devices for on-site authentication services and improve the efficiency of on-site authentication. Background technique [0002] With the development of the market economy, counterfeit goods occur from time to time, and the authenticity authentication and anti-counterfeiting of the identities of the commodities in circulation are more and more valued by commodity producers and sellers; Establish some form of customer organization...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K17/00
Inventor 刘小鹏
Owner 刘小鹏
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products