Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Product cipher anti-fake method

A product password and product technology, applied in the field of anti-counterfeiting, can solve the problems of fundamental anti-counterfeiting and inability to achieve anti-counterfeiting purposes, and achieve the effect of high confidentiality

Inactive Publication Date: 2008-03-26
史继光
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This anti-counterfeiting method cannot be fundamentally anti-counterfeiting, because counterfeiters can collect unchecked passwords on the old packaging of genuine goods, reproduce fake labels and paste them on counterfeit goods. When such goods are sold and checked, the password database thinks they are Authentic and effective, cannot serve the purpose of real anti-counterfeiting

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0009] Example 1: First, when the product is produced on the production line, a set of serial numbers 12345 is generated. In the anti-counterfeiting database, the product password AB corresponding to the product code is set according to the product code, and the product code and password are stored in the anti-counterfeiting database for future reference. The management program is numbered, and the product password is an arbitrary garbled code generated artificially or randomly, and there is no necessary connection between the code and the password; then, mark the product code and the manufacturer's anti-counterfeiting consultation telephone number on a conspicuous position outside the product or product packaging Finally, mark the password of the product on the special accessories inside the product or product packaging, such as bottled products, the special accessories can be plastic or metal diaphragms sealed at the mouth of the bottle, and the passwords are marked on the dia...

example 2

[0010] Example 2: First, a set of code 123456 is generated when the product is produced on the production line, and the product code 0021 corresponding to the product code is set in the anti-counterfeit database according to the product number, and the code and password of the product are stored in the anti-counterfeit database for query. A certain management program is used to carry out numbering. The product password is an arbitrary garbled code generated artificially or randomly, and there is no necessary connection between the code and the password; then, mark the product code and the manufacturer's anti-counterfeiting consultation telephone number on a conspicuous position outside the product or product packaging Finally, mark the password of the product on the special accessories inside the product or product packaging, such as boxed products, the special accessories can be a piece of paper placed in the box, and the password is marked on the piece of paper. Paper pieces ...

example 3

[0011] Example 3: First, the product generates a set of codes 1234567 during production, and the product code B2C corresponding to the product code is set in the anti-counterfeiting database according to the product code, and the product code and password are stored together in the anti-counterfeiting database for future reference. Carry out numbering, the product password is arbitrary garbled codes generated artificially or randomly, and there is no necessary connection between the code and the password; then, mark the product code and the manufacturer's anti-counterfeiting consultation telephone number on a conspicuous position outside the product or product packaging; Finally, mark the password of the product on the special accessory inside the product or product packaging. People check the authenticity of the product according to the code and password, and when the product is used, the special attachment attached to the password is destroyed or discarded.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The counterfeiting method for products by cipher includes: producing a group of codes while a product is on the production line; setting corresponding ciphers in a counterfeiting database according to the codes; storing the ciphers and codes in a counterfeiting database to be inquired( the ciphers are man-made or random produced arbitrary mess codes, there is no certain relation between the codes and the ciphers, which are in number or letter or number and letter); labeling the code and the factory's consulting telephone number onto an eye-catching position of the product or the external package of the product and labeling the cipher onto a special annex in the package of the product.

Description

technical field [0001] The invention relates to anti-counterfeiting technology, in particular to a product password anti-counterfeiting method. Background technique [0002] At present, the commonly used product anti-counterfeiting method is: first set a unique password for each product, store the password in the anti-counterfeiting database, and then stamp the password on the outside of the product, and the password is covered by a silver coating to become an anti-counterfeiting confidential label; Finally, after purchasing the product, the consumer checks the authenticity of the product by telephone and password. This anti-counterfeiting method cannot be fundamentally anti-counterfeiting, because counterfeiters can collect unchecked passwords on the old packaging of genuine goods, reproduce fake labels and paste them on counterfeit goods. When such goods are sold and checked, the password database thinks they are The real and effective ones cannot achieve the real anti-co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G09F3/02
Inventor 史继光
Owner 史继光
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More