General anticounterfeiting method and system
A labeling and product technology, applied in the field of identifying the authenticity of products, can solve the problems that consumers are difficult to use, do not explore the actual use of public key encryption, and public key distribution.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] see now figure 1 , is a schematic diagram of an overall process of the system of the present invention, which consists of a central authority (CA) website and an internal database, RFID / smart card tags, RFID / smart card tag readers, and well-defined programs. The participants in the process are the vendor, the consumer, and the employees of the CA (a.k.a. the CA), and some innovations are implemented as steps in the process. The CA website 1.10 has three main functions: as a private key repository, as a portal for manufacturers to register and obtain their own private keys and sell product IDs, and as a label interpretation for consumers to authenticate their use the entrance of the device. CA website 1.10 must be an authorized organization, and its url must be fully disclosed and known to everyone. The internal database 1.13 is used to store all data such as private key sets and registration information of manufacturers.
[0035] RFID / smart card tags 1.11 are incorpo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 