Product cipher anti-fake method
A product password and product technology, applied in the field of anti-counterfeiting, can solve the problems of fundamental anti-counterfeiting and inability to achieve anti-counterfeiting purposes, and achieve the effect of high confidentiality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Example Embodiment
[0009] Example 1: First, when the product is produced on the production line, a set of number 12345 is generated, and the product code AB corresponding to the product code is set in the anti-counterfeiting database according to the product code. The product code and password are stored in the anti-counterfeiting database for future reference. The management program is numbered, and the product password is a random garbled code generated artificially or randomly, and there is no necessary connection between the code and the password; then, mark the product code and the manufacturer’s anti-counterfeiting consultation telephone in a prominent position outside the product or product packaging Finally, mark the password of the product on the special accessory inside the product or product packaging, such as bottled products. The special accessory can be a plastic or metal membrane sealed at the bottle mouth, and the password is marked on the membrane. The diaphragm is damaged or discar...
Example Embodiment
[0010] Example 2: First, when the product is produced on the production line, a set of codes 123456 is generated, and the product code 0021 corresponding to the product code is set in the anti-counterfeiting database according to the product code. The product code and the code are stored in the anti-counterfeiting database for query, and the product code is A certain management procedure is used to number the product. The password is artificially or randomly generated, and there is no necessary connection between the code and the password; then, mark the product code and the manufacturer’s anti-counterfeiting consultation phone in a prominent position outside the product or product packaging Finally, mark the product’s password on the special accessory inside the product or product packaging, such as boxed products, the special accessory can be a piece of paper placed in the box, and the code is marked on the piece of paper. The paper was damaged or discarded when the product was ...
Example Embodiment
[0011] Example 3: First, a set of codes 1234567 is generated when the product is produced, and the product code B2C corresponding to the product code is set in the anti-counterfeiting database according to the product code. The product code and password are stored in the anti-counterfeiting database for future reference, and the product code is subject to certain management procedures Carry out the numbering, the product password is any garbled code generated artificially or randomly, and there is no necessary connection between the code and the password; then, mark the product code and the manufacturer's anti-counterfeiting consultation telephone in a prominent position outside the product or product packaging; Finally, mark the product code on the special accessory inside the product or product packaging. People check the authenticity of the product according to the code and the password. When the product is used, the special accessory with the password is destroyed or discarded...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap