Product cipher anti-fake method

A product password and product technology, applied in the field of anti-counterfeiting, can solve the problems of fundamental anti-counterfeiting and inability to achieve anti-counterfeiting purposes, and achieve the effect of high confidentiality

Inactive Publication Date: 2008-03-26
史继光
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This anti-counterfeiting method cannot be fundamentally anti-counterfeiting, because counterfeiters can collect unchecked passwords on the old packaging of genuine goods, reproduce fake labels

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0009] Example 1: First, when the product is produced on the production line, a set of number 12345 is generated, and the product code AB corresponding to the product code is set in the anti-counterfeiting database according to the product code. The product code and password are stored in the anti-counterfeiting database for future reference. The management program is numbered, and the product password is a random garbled code generated artificially or randomly, and there is no necessary connection between the code and the password; then, mark the product code and the manufacturer’s anti-counterfeiting consultation telephone in a prominent position outside the product or product packaging Finally, mark the password of the product on the special accessory inside the product or product packaging, such as bottled products. The special accessory can be a plastic or metal membrane sealed at the bottle mouth, and the password is marked on the membrane. The diaphragm is damaged or discar...

Example Embodiment

[0010] Example 2: First, when the product is produced on the production line, a set of codes 123456 is generated, and the product code 0021 corresponding to the product code is set in the anti-counterfeiting database according to the product code. The product code and the code are stored in the anti-counterfeiting database for query, and the product code is A certain management procedure is used to number the product. The password is artificially or randomly generated, and there is no necessary connection between the code and the password; then, mark the product code and the manufacturer’s anti-counterfeiting consultation phone in a prominent position outside the product or product packaging Finally, mark the product’s password on the special accessory inside the product or product packaging, such as boxed products, the special accessory can be a piece of paper placed in the box, and the code is marked on the piece of paper. The paper was damaged or discarded when the product was ...

Example Embodiment

[0011] Example 3: First, a set of codes 1234567 is generated when the product is produced, and the product code B2C corresponding to the product code is set in the anti-counterfeiting database according to the product code. The product code and password are stored in the anti-counterfeiting database for future reference, and the product code is subject to certain management procedures Carry out the numbering, the product password is any garbled code generated artificially or randomly, and there is no necessary connection between the code and the password; then, mark the product code and the manufacturer's anti-counterfeiting consultation telephone in a prominent position outside the product or product packaging; Finally, mark the product code on the special accessory inside the product or product packaging. People check the authenticity of the product according to the code and the password. When the product is used, the special accessory with the password is destroyed or discarded...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The counterfeiting method for products by cipher includes: producing a group of codes while a product is on the production line; setting corresponding ciphers in a counterfeiting database according to the codes; storing the ciphers and codes in a counterfeiting database to be inquired( the ciphers are man-made or random produced arbitrary mess codes, there is no certain relation between the codes and the ciphers, which are in number or letter or number and letter); labeling the code and the factory's consulting telephone number onto an eye-catching position of the product or the external package of the product and labeling the cipher onto a special annex in the package of the product.

Description

technical field [0001] The invention relates to anti-counterfeiting technology, in particular to a product password anti-counterfeiting method. Background technique [0002] At present, the commonly used product anti-counterfeiting method is: first set a unique password for each product, store the password in the anti-counterfeiting database, and then stamp the password on the outside of the product, and the password is covered by a silver coating to become an anti-counterfeiting confidential label; Finally, after purchasing the product, the consumer checks the authenticity of the product by telephone and password. This anti-counterfeiting method cannot be fundamentally anti-counterfeiting, because counterfeiters can collect unchecked passwords on the old packaging of genuine goods, reproduce fake labels and paste them on counterfeit goods. When such goods are sold and checked, the password database thinks they are The real and effective ones cannot achieve the real anti-co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G09F3/02
Inventor 史继光
Owner 史继光
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products