Personal identification system and method

An identification and radio frequency identification technology, applied in the field of identification and anti-counterfeiting, can solve the problems of unguaranteed security, unguaranteed repeatability of identification, failure, etc. Effect

Inactive Publication Date: 2008-10-01
张卫强
View PDF2 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, various anti-counterfeiting technologies such as identification numbers, laser tags, special marks or magnetic cards have been used to identify objects in the market. Since the information of these anti-counterfeiting technologies is completely open and easily copied, its security cannot be guaranteed. Guarantee; Among them, the magnetic card anti-counterfeiting technology is also very easy to lose part of the information due to magnetic field interference, and its anti-counterfeiting reliability is not guaranteed
[0004] The invention patent "smart card anti-counterfeiting method and a kind of anti-counterfeiting bottle cap" (CN1160668) published on October 1, 1997 in China discloses a kind of smart card anti-counterfeiting method. After a certain number of inspections, the smart card will be destroyed by itself, and the packaging can no longer be used, which effectively achieves the purpose of anti-counterfeiting. However, this method must rely on a contact reading device, and the smart card must be removed from the identification object before reading. When taking out the card, the integrity of the identification object will be destroyed to varying degrees, and the repeatability of the identification cannot be guaranteed.
[0005] On May 21, 2003, the invention patent "radio frequency electronic tag data encryption anti-counterfeiting method" (CN1419213) disclosed a radio frequency electronic tag data encryption anti-counterfeiting method, which is read in the read-only memory in the existing radio frequency electronic tag Take out the UID identification code, generate new data after logical operation, and write it into the readable and writable user memory; use the uniqueness and unchangeability of the unique identification code UID in the tag, and generate encrypted data through logical encryption operation Write into the readable and writable user memory of the tag, so that the user memory that can be rewritten and the UID that cannot be rewritten form an agreed logical relationship; although illegal users can read and write encrypted data, they cannot change the UID code of the tag to achieve For the purpose of anti-counterfeiting, but the electronic tag identification and data in the user memory used by this method are still public, and there is no limit to the number of reads; in addition, this method is not only easy to be copied and cause anti-counterfeiting failure, but also can be illegally Illegally reused

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personal identification system and method
  • Personal identification system and method
  • Personal identification system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Embodiment one: if figure 1 and figure 2 As shown, an identification system includes a customized radio frequency identification chip 1b for storing the unique identity code of the identified object and an identification device 1a matched with the radio frequency identification chip 1b. The identification device 1a is provided with a first power supply module 11 that provides working power for the identification device 1a, a first antenna interface module 12, a first receiving buffer module 13, a first password verification module 14, a reading information module 15, a display An interface module 16 , a shutdown control module 17 and a first sending buffer module 18 . The first antenna interface module 12 is provided with a first antenna coil 121, the first power supply module 11 is connected with a start switch 111, one end of the start switch 111 is connected with a battery 112, the start switch 111 is turned on to provide working power for the identification device...

Embodiment 2

[0035] Embodiment two: the structure of this embodiment is basically the same as the structure of embodiment one, the only difference is that a code writing module can be set between the second password verification module 24 and the identity coding module 261 of the radio frequency identification chip 1b according to actual needs 241, such as image 3 As shown, the second password verification module 24 , the code writing module 241 , the identity coding module 261 and the reading code module 26 are sequentially connected, and the identity code can be written into the identity coding module 261 through the code writing module 241 .

[0036] based on figure 1 and figure 2 The identity recognition system of the first embodiment shown, Figure 4 An identification method is provided, which includes the following steps:

[0037] a. Press the start switch to provide working power for the identification device through the first power module, and the identification device is powe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a identity identifying system and method, characterized in that the identity identifying system confirms the unique identify of the object to be identified in cooperation with an identifying device via an unique identity number of the object to be identified stored in a RF (radio frequency) identifying chip and a high-frequency electromagnetic wave signal, effectively approaching the anti-counterfeiting goal; since the unique identify number is completely sealed in the RF identifying chip which can only be read by the identifying device, the security of object to be identified can be effectively ensured, also the identification information can be prevented from being lost by virtue of environment problems. Being base on wireless RF technology, the RF identifying chip can be embedded inside the object to be identified, in order to avoid the defect of publishing identification information in existing anti-counterfeiting technology; the limited read counting number in the method according to the invention is a variable value, thus the value of the limited read counting number can be set according to requirement of the object to be identified so that the RF identifying chip could automatically fail when the set value is surpassed, in order to prevent the RF identifying chip from being illegally recollected for repeated usage.

Description

technical field [0001] The invention relates to an identity identification anti-counterfeiting technology, in particular to an identity identification system and an identification method. Background technique [0002] With the continuous development of the commodity economy, the increasing popularity of brand campaigns and the increasing complexity of social relations, the setting and identification of the unique identity of branded goods (identification objects) has attracted more and more attention. [0003] At present, various anti-counterfeiting technologies such as identification numbers, laser tags, special marks or magnetic cards have been used to identify objects in the market. Since the information of these anti-counterfeiting technologies is completely open and easily copied, its security cannot be guaranteed. Guarantee; Among them, the magnetic card anti-counterfeiting technology is also very easy to lose part of the information due to magnetic field interference,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/08G06K7/00
Inventor 张卫强汪文平
Owner 张卫强
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products