Combined address identification system and method, and automatic identification device

An authentication device and authentication system technology, applied in the field of automatic authentication devices, can solve the problems of those who cannot sell, escape the obligation of proof, and cannot sell normally.

Inactive Publication Date: 2008-07-02
刘小鹏
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The current personalized password query anti-counterfeiting authentication is to pre-generate the commodity identity password (expression forms include numbers, patterns, textures, etc.), and write this password into the commodity packaging and query database at the same time. Consumers can press the password written on the commodity. Explain the path to query in the database. If there is any, it will be false. It is the oldest method for passwords. It is currently widely used, but its flaws are also very prominent: the method itself can be counterfeited, such as counterfeiters in the above method. The identity passwords are written into the product packaging and the counterfeiter’s database, and the consumers follow the route to query according to the instructions. These passwords must also be in the counterfeiter’s database; According to the current query rate of less than 1%, get the real password in 99% of the products that are not inquired, then copy it 100 times, and write it on the package of the fake product. After the consumer gets the fake product, write it twice Enter the password and route query, the password must also exist in the genuine product database
[0005] Whether it is physical or personalized anti-counterfeit password query anti-counterfeiting certification, especially password query anti-counterfeiting certification, it is applied to commodity anti-counterfeiting certification. The responsibility for authenticity should be the seller, not the consumer, and the responsibility of the seller should be passed on to the consumer; at the same time, the current anti-counterfeiting certification is for consumers to conduct anti-counterfeiting inquiries after purchasing the product. Complaints increase the burden on consumers; there is only one set of passwords for anti-counterfeiting authentication, which is generated once. Once the anti-counterfeiting passwords are stolen or damaged in product packaging, sales (such as supermarkets and other open sales environments), and transportation, the products will not work normally. sales, and stolen passwords can be used for counterfeit goods; authenticity query and authentication are only carried out between consumers and databases, and have nothing to do with sellers, so that sellers cannot be supervised, making them escape from checking the goods The obligation of proof of authenticity also facilitates its participation in the production and sale of counterfeit goods; due to the extremely low inquiry rate, the manufacturer cannot fully grasp the information and sales status of consumers; any network terminal (such as telephone, PC), Anti-counterfeiting authentication query can be realized in any place, which objectively provides convenience for counterfeiters; in specific query operation, in order to ensure the uniqueness and non-repetition of the password, the password needs to reach a certain number of digits, generally about 16 digits , Consumers need to enter a password to inquire about authentication. Due to the long number of passwords, mistakes are often made. Some consumers find it troublesome and refuse to inquire about authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Combined address identification system and method, and automatic identification device
  • Combined address identification system and method, and automatic identification device
  • Combined address identification system and method, and automatic identification device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] The structure of the co-location authentication system in the embodiment of the present invention is as follows: figure 1 shown. The system includes:

[0078]At least one authentication device 1 and address 11 are connected with the accessing location device 3 and the verification device 2 through the network 9. The authentication device 1 includes: a processor, a network card, a network address, a network information receiving and output device, Information and address input and receiving device, display, interface, power supply, used to input or receive the authentication code in the identity code in the commodity mark and the address 21 of the verification party verification device 2, and send it to the accessing device 3, with To receive and display the commodity information and sales information sent by the access co-location device 3; the authentication device 1 can use existing network equipment, such as telephones, mobile phones, and PCs, and can also refit or ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an amalgamating address quotation system and method and auto quotation device. Commodity sales send quotation code and supervising device address to switch-in amalgamating address device by quotation device; switch-in amalgamating address device compounds quotation code and quotation device address to generate new quotation code and compares it with quotation code of quotation server, then outputs the result to quotation device and supervising device to assure commodity property; Commodity sales send commodity supervising code to switch-in amalgamating address device by supervising device; switch-in amalgamating address device compounds supervising code and supervising device address to generate new supervising code and compares it with supervising code of supervising server to assure commodity property; commodity producer receives buyer's supervising device address by quotation device, and writes sale information to engage in commodity sales.

Description

technical field [0001] The invention relates to a co-location authentication system and method and an automatic authentication device, which belong to the technical field of commodity identity anti-counterfeiting authentication, and are applicable to telecom value-added service providers who build a co-location authentication system on their telecommunication network value-added platform to provide commodity production and sales It is also applicable to product manufacturers and sellers who build their own site certification system to conduct site certification on product identity attributes, product sales status, and buyer addresses; it is also applicable to network terminal equipment manufacturers to manufacture Automatic authentication device; especially suitable for wireless mobile network value-added service providers and telephone manufacturers, building on-site authentication systems and providing on-site authentication services on their wireless mobile network value-add...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K17/00G06Q30/00
CPCG06Q30/06
Inventor 刘小鹏
Owner 刘小鹏
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products