Unlock instant, AI-driven research and patent intelligence for your innovation.

General anticounterfeiting method and system

A labeling and product technology, applied in the field of identifying the authenticity of products, can solve the problems that consumers are difficult to use, do not explore the actual use of public key encryption, and public key distribution.

Inactive Publication Date: 2008-08-06
彭枫 +2
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are several disadvantages in the existing system
First, except for RFID tags and tag readers, each product requires a unique serial number, which makes it difficult for manufacturers to implement the system for high-volume products
Second, the actual identification is done by the consumer, not the label reader, who has to manually and visually compare the reading to the number printed on the label
Given the large number of different types of goods, this method is difficult for consumers to use, and consumers may become overwhelmed
Third, the existing technology mentions but does not explore the actual use of public key encryption, which will be the core technology of the authentication system, but the existing technology does not provide how the manufacturer distributes the public key to consumers when selling s solution
Furthermore, there is no solution as to how the public key is distributed to consumers at the point of sale
Also, without other safeguards, the existing system is vulnerable and easily rendered ineffective by counterfeiting trademarks, labels and readers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • General anticounterfeiting method and system
  • General anticounterfeiting method and system
  • General anticounterfeiting method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] see now figure 1 , is a schematic diagram of an overall process of the system of the present invention, which consists of a central authority (CA) website and an internal database, RFID / smart card tags, RFID / smart card tag readers, and well-defined programs. The participants in the process are the vendor, the consumer, and the employees of the CA (a.k.a. the CA), and some innovations are implemented as steps in the process. The CA website 1.10 has three main functions: as a private key repository, as a portal for manufacturers to register and obtain their own private keys and sell product IDs, and as a label interpretation for consumers to authenticate their use the entrance of the device. CA website 1.10 must be an authorized organization, and its url must be fully disclosed and known to everyone. The internal database 1.13 is used to store all data such as private key sets and registration information of manufacturers.

[0035] RFID / smart card tags 1.11 are incorpo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Using digital signature of manufacturer, the invention discloses general type anti false system of possessing particular treatment process. Built in RFID / smart card tag of goods, the said digital signature is in use for validating truthfulness of the goods. Without need of complex installation and method, the system is only composed of unscrambler and tag. The procedure and method are so designed that manufacturers are allowed to prepare and configure tags by using own digital signature. The invention let purchaser verify truthfulness of goods easily and reliably. Moreover, before the first use, reliability of the unscrambler itself of tag is also checked up.

Description

technical field [0001] The present invention generally relates to a method and system for authenticating a product. In particular, the present invention describes a practical system with a unique process that is easy to configure, easy to use, and very effective and powerful against counterfeiters. Background technique [0002] Counterfeiting of goods is a serious problem these days, especially with the aid of new sophisticated techniques. Counterfeit goods can appear more authentic and come in greater numbers. Counterfeiters deprive manufacturers of brand names that may take years to build. They prey on consumers with fake, low-quality, and sometimes dangerous products such as pharmaceuticals. It is generally accepted that a good anti-counterfeiting system will benefit both the manufacturer and the consumer, and will be most effective if both the manufacturer and the consumer are involved in the anti-counterfeiting process. [0003] US Patent 6,226,619 by Halperin et al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K17/00H04L9/00
Inventor 彭枫韩绍平李力游
Owner 彭枫