Data processing method and data processing system for verification
A data processing system and data processing technology, applied in the field of commodity or logistics authenticity verification, can solve the problem that anti-counterfeiting objects cannot effectively verify the authenticity of anti-counterfeiting items, and achieve the effects of accurate and reliable detection results and simple and fast detection process.
Inactive Publication Date: 2010-07-21
郭榕涛
0 Cites 5 Cited by
AI-Extracted Technical Summary
Problems solved by technology
[0005] In order to overcome the technical problem that the existing anti-counterfeit products are not unique to authentic products, and are easily copied, imitated and placed on fake products for repeated use, resulting in th...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreMethod used
Commodity verification device and verification method with self-destruct protection function of the present invention have a wide range of applications, and are suitable for many kinds of commodities; and can be extended to the field of logistics, and the articles in the transportation process are kept safe, and the transportation process can be effectively prevented. The items in the product are exchanged; the ultra-micro power consumption microprocessor 1 adopted in the product authentication device 1000 with the self-destruct protection function of the present invention has a standby current of the order of nanoamperes, and the sealed battery life can reach several years as long as. With the advancement of science and technology, by adopting a microprocessor with lower power consumption and a battery with a larger capacity and smaller self-discharge, the retention time of the verification function of the verification device 1000 according to the present invention will also be greatly extended. Before the power of the battery 6 is about to run out, the power supply undervoltage trigger circuit 35 will also trigger the chip self-destruct boost circuit 4 to generate high voltage and destroy the program instructions and encryption keys in the microprocessor 1, thereby preventing The authenticity verification device 1000 is stolen or counterfeited after being stored for a long time or the battery 6 is artificially invalidated.
Design principle of the present invention is as follows: existing anti-counterfeit means is a lot on the market, but the anti-counterfeit effect that obtains is getting worse and worse, and root cause is that the disconnection on the production and sales chain between genuine product manufacturer and customer. The packaging materials and anti-counterfeit stickers, logos, signs, anti-counterfeit query code stickers, etc. of individual materials and structures used in the existing anti-counterfeiting methods are attached to the body of the anti-counterfeiting commodity. All present in front of counterfeiters are in a state of being counterfeit and out of control. Anti-counterfeiting objects cannot simultaneously have the three major elements of being unique to authentic products, cannot be copied or imitated, and cannot be reused after leaving the genuine product. loophole. Therefore, counterfeiters can easily copy or imitate the above-mentioned anti-counterfeit products based on the genuine products, package the fake products, or package the fake products by recycling the old packaging of the genuine products and sell them as genuine products. What's more serious is that the anti-counterfeiting object has no logical relationship with the product that needs to be anti-counterfeiting. The authenticity of the anti-counterfeiting object and the authenticity of the product itself do not constitute an inevitable causal relationship, which violates the three-paragraph axiom of bluntness in logic. Even if the anti-counterfeit is real, it cannot be judged that the product is real. An insurmountable barrier is left in the logical function. Faced with this situation, the best solution is for every customer to go directly to the genuine product manufacturer to purchase the product. This is logically feasible, but it is not feasible in reality. The present invention conceives: by introducing an authenticity verification device and an authenticity verification method with a self-destruction protection function, to realize the authenticity discrimination of commodities. In this way, the production and sales chain between the genuine product manufacturer and the customer can be fundamentally strengthened, and the production and sales...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreAbstract
The invention relates to a data processing method for verification, which is characterized by comprising the following steps of: a, storing data information codes in verification medium; b, identifying verification information codes form the data information codes by a verification device; c, encrypting the verification information codes by a microprocessor in the verification device to obtain verification true codes which have the unique corresponding relation with the verification medium; d, decoding the verification true codes by the microprocessor to obtain verification codes and outputting the verification codes. In the data processing method, the verification device which is sealed or fixedly connected with substance to be verified into a whole is tested through the verification medium, and the concrete steps are that the verification medium is placed in the verification device which is in a cooperative work state, a verification working part in the verification device distinguishes the verification information in the verification medium, performs encryption operation to obtain the verification codes, and a detecting result is output. By adopting the invention, commodities can be simply, conveniently, fast, accurately and reliably verified and inspected.
Application Domain
Technology Topic
Image
Examples
- Experimental program(1)
Example Embodiment
[0024] The present invention will be further described below with reference to the drawings and embodiments.
[0025] The conception principle of the present invention is as follows: There are many anti-counterfeiting methods available in the market, but the anti-counterfeiting effect obtained is getting worse and worse. The fundamental reason lies in the disconnection between the genuine product manufacturer and the customer in the production and sales chain. The existing anti-counterfeiting methods used in the packaging of individual materials and structures, anti-counterfeiting labels, logos, signs, anti-counterfeiting query code labels, etc., are attached to the body of the anti-counterfeiting product. All appear in front of counterfeiters, and they are all in a state of being out of control that can be counterfeited. Anti-counterfeit objects cannot have the three main elements that are unique to the authentic product, cannot be copied or imitated, and cannot be reused after being separated from the authentic product. There is a logical conception. Loopholes. Therefore, counterfeiters can conveniently copy or imitate the above-mentioned anti-counterfeiting objects based on the authentic products, package the counterfeit products, or recycle the old packaging of the authentic products to package the counterfeit products and sell them as genuine products. What's more serious is that there is no logical relationship between anti-counterfeit objects and products that need anti-counterfeiting. The authenticity of anti-counterfeit objects and the authenticity of the goods do not constitute an inevitable causal relationship, which violates the three straightforward axioms in logic. Even if the anti-counterfeit material is genuine, it cannot be determined that the product is genuine. An insurmountable obstacle was left in the logical function. In the face of this situation, the best solution is that every customer directly goes to the authentic manufacturer to purchase the goods. This is logically feasible, but in reality it is not feasible. The present invention envisages that by introducing an authenticity verification device with a self-destruction protection function and an authenticity verification method, the authenticity of commodities can be determined. This can fundamentally strengthen the production and sales chain between genuine manufacturers and customers, and block the production and sales chain between counterfeit products and customers. So as to obtain the same counterfeit effect as the customers go directly to the authentic manufacturer to purchase the goods. The core of the content of the present invention is that the authenticity verification device and the authenticity detection method used to achieve the fidelity purpose of the present invention simultaneously solve the technical problems that only genuine products are unique, cannot be copied or imitated, and cannot be reused after being separated from authentic products. Moreover, the authenticity of the authenticity verification device and the authenticity of the authentic product to be verified constitute an inevitable causal relationship, realizing the authenticity of the product in the true sense.
[0026] The specific working principle of the present invention is as follows: Provide an authenticity verification device that coexists with the authentic product to be inspected in a sealed coexistence or a fixed connection. The authenticity verification device and the authentic product to be inspected are sealed into a whole by vacuum and air pressure. The authenticity verification device is fixedly connected to the product to be verified as a whole, and the self-destruction protection circuit is driven by the introduction of a self-destruction trigger circuit, which fundamentally prevents the product authenticity verification device from being imitated and stealing from the microprocessor. The occurrence of problems such as procedures, instructions, and encryption keys. In the implementation process of the present invention, a credible professional organization distributes authenticity verification media to consumers and regulators. In this embodiment, the authenticity verification medium is an authenticity verification card; of course, the authenticity verification medium may also be in the form of other carriers, such as a mobile phone as the authenticity verification medium for authenticity verification, and the principle is also the same. And by combining the card with the authenticity detection device, the authenticity judgment of the commodity is realized. In order to prevent the information in the card from being stolen, a huge binary random data information code with sufficient word length is stored in the card, and the data code used as the fidelity information only accounts for a very small part of the random data information code. And it is scattered and hidden in the random data information code. The authenticity verification information code is not the original code of the authenticity verification code. Therefore, even if all the binary codes in the authenticity verification card are read out, they cannot be separated. The fidelity information code and the original code for further obtaining the fidelity code must pass the microprocessor in the authenticity verification device according to the program and instructions set in it, in order to identify the authenticity verification from the data code in the authenticity verification card Information code, the authentication information code is combined with the encryption key and after multiple encryption operations, the original authentication code unique to each card can be generated. After decoding, it will be displayed on the authentication device or played by voice. Real code. At this time, the authenticity verifier can compare whether this code matches the authenticity verification code unique to the authenticity verification card he holds to determine the authenticity of the product. Through such a design, the authenticity of the product can be accurately determined. Only the authenticity verification device that can encrypt the unique verification code on the card holder is the authenticity verification device, and the product that is inseparable from the authenticity verification device is the authenticity.
[0027] See figure 1 , The present invention has a self-destruction protection function of the authenticity verification device and a block diagram of the circuit structure of the self-destruction protection function of the authenticity verification device in the authenticity verification method, and combines figure 2 The schematic diagram of the cross-sectional structure of the authenticity verification device with self-destruct protection function installed in the carrier carrying the authentic substance to be verified and image 3. A schematic cross-sectional structure diagram of the authenticity verification device with self-destruction protection function and the anti-counterfeiting substance fixedly connected as a whole.
[0028] As shown in the figure, the present invention provides an authenticity verification device 1000 with a self-destruction protection function. The authenticity verification device 1000 is provided with a self-destruction protection work unit and a verification work unit that recognizes the substance to be inspected. The real device 1000 is used in conjunction with the real substance 1004 to be tested. In the patented technology of the present invention, the self-destruction protection working part adopts the design scheme of the self-destruction protection circuit 4, of course, other methods of self-destruction protection design can also be adopted, which will not be described in this embodiment. The authenticity inspection device 1000 and the authentic substance to be inspected 1004 are an integrated structure; the realization of the integrated structure is that the authenticity inspection device 1000 and the authentic substance to be inspected 1004 adopt an air pressure or depressurization In this way, the carrier 1003 is used to seal in one body, or the authenticity verification device 1000 and the authentic substance to be examined 1004 are fixedly connected into one body. The self-destruction protection working part is an air pressure change self-destruction protection working part or a separate self-destruction protection working part; wherein the activation method of the air pressure change self-destruction protection working part is to start by a change in air pressure in the sealing carrier 1003; The activation method of the separate self-destruct protection working part is activated by a change in the relative position of the authenticity verification device 1000 and the authentic substance to be verified 1004 after being fixedly connected.
[0029] Detailed description: The product authenticity verification device 1000 with self-destruction protection function of the present invention includes an external authenticity verification card 8 and a main body 1000 of the authenticity verification device. The main body 1000 of the authenticity verification device includes a microprocessor 1, a self-destruction protection circuit 4 connected to the microprocessor 1, a self-destruction trigger circuit 3 for controlling the operation of the self-destruction protection circuit 4, and a device for displaying inspection results. The display screen 4 or a voice device for playing the test results and a power supply device 6 for supplying power to the above-mentioned circuits and devices.
[0030] In this embodiment, the microprocessor 1 is an ultra-micro power consumption digital microprocessor chip, and its display output terminal 14 is connected to the display input terminal 52 of the display screen 5. The start-stop control terminal of the microprocessor 1 11 and 12 are connected with the start-stop control key 2, the inspection input end of the microprocessor 1 is connected with the authenticity verification card socket 16, and the output plug 81 on the external authenticity verification card 8 can be inserted into the microprocessor 1 Check the authenticity verification card socket 16 on the input end. Of course, the authenticity verification card 8 can also be designed to be a non-plug-in cooperation with the authenticity verification device 1000. The device 1000 performs cooperative work on the authenticity verification card 8. The self-destruction protection circuit adopts the chip self-destruction boost circuit 4 or the storage and registration information deletion circuit. In this embodiment, the chip self-destruction boost circuit is adopted. The self-destruct trigger circuit 3 includes: a package damage trigger circuit 31, a magnetic balance separation trigger circuit 32, a photosensitive trigger circuit 33, a disassembly trigger circuit 34, a power supply undervoltage trigger circuit 35 and limited use with the microprocessor 1 The output terminal 17 is connected, and the limited use trigger circuit 36 controlled by the microprocessor 1 is used for limited use. The high-voltage output terminal 42 of the chip self-destruct boost circuit is connected to the self-destruct input terminal 15 of the microprocessor 1. In the self-destruct trigger circuit 3, the package damage trigger circuit 31, the magnetic balance separation trigger circuit 32, the photosensitive trigger circuit 33, the disassembly trigger circuit 34, the power supply undervoltage trigger circuit 35, and the output terminal 312 of the limited use trigger circuit 36, 322, 332, 342, 352, and 362 are all connected to the controlled input terminal 43 of the chip self-destruct boost circuit 4. In the self-destruct trigger circuit 3, the package damage trigger circuit 31 includes the trigger switch 315 that is controlled by the change in air pressure in the carrier 1003 such as the packaging bag or container of the genuine product to be tested, and the magnetic balance separation trigger The circuit 32 includes a magnetic balance sensor composed of a magnetic substance 326 and the magnetic control switch 325, the photosensitive trigger circuit 33 includes a photosensitive device 335, the disassembly trigger circuit 34 includes an anti-disassembly switch 345, and the power supply undervoltage trigger circuit 35 and the limited use trigger circuit 36, the power input terminals 311, 321, 331, 341, 351, 361 of the trigger circuit and the power input terminal 41 of the chip self-destruct boost circuit 4, the microprocessor The power input terminal 13 of 1 and the power input terminal 51 of the display screen 5 are all connected to the power output terminal 61 of the battery 6.
[0031] See figure 2 And combine figure 1 As can be seen from the figure, the authenticity verification device 1000 is divided into a first working chamber 1001 and a second working chamber 1001 through a sealing diaphragm 316 that can be expanded or contracted according to the difference in air pressure on both sides. Working cavity 1002; wherein the second working cavity 1002 communicates with the carrier 1003 carrying the authentic product to be tested, and forms a sealed whole with the carrier 1003; the sealing diaphragm 316 is received in the second working cavity 1002 Air pressure change control to achieve expansion and contraction, so as to control the work of the self-destruction protection circuit 4, and realize the self-control of the programs, instructions and encryption keys set in the microprocessor 1 in the authenticity verification device 1000 Destruction protection.
[0032] In this embodiment, the product verification device 1000 with self-destruct protection function of the present invention seals the display screen 5 on the inner wall of the product packaging bag 1003 or the packaging container 1003 facing outward, and the display screen 5 is provided with the The transparent protective sheet 53 of the display screen 5, the authenticity verification device 1000 is divided into two upper and lower working chambers by a sealing diaphragm 316, the cavity above the sealing diaphragm 316 is defined as the first working cavity 1001, The first working chamber 1001 is in communication with the outside atmosphere through the vent hole 10 opened on the main panel of the authenticity verification device 1000, so that the air pressure in the first working chamber 1001 is the outside atmospheric pressure. The cavity below the sealing diaphragm 316 is defined as a second working cavity 1002. The second working cavity 1002 passes through the vent hole 11 opened in the lower part of the main body of the authenticator 1000 and the commodity packaging bag 1003 or the packaging The interior of the container 1003 is communicated, and the air pressure in the second working chamber 1002 and the commodity packaging bag 1003 or the packaging container 1003 is positive or negative with respect to the outside atmospheric pressure by adding or reducing air pressure. Whether the difference between the air pressure in the second working chamber 1002 and the outside atmospheric pressure is sufficient to cause the sealing diaphragm 316 to change in expansion and contraction. When the air pressure in the second working chamber 1002 and the commodity packaging bag 1003 or the packaging container 1003 is a negative pressure formed after evacuating, the sealing diaphragm 316 will shrink downward under the action of the negative pressure, and release Switch 315. For example, in the state of releasing the switch 315, the package damage trigger circuit 31 is set to be in a standby working state. If the authenticity verification device 1000 and the authentic product to be verified are separated, once the packaging bag 1003 or the packaging container 1003 is damaged, the outside atmosphere will enter the second working chamber 1002 along with the damaged part. At this time, the negative pressure in the second working chamber 1002 will disappear and become equal to the outside atmospheric pressure. The sealing diaphragm 316 will also expand from the contracted state under the action of negative pressure to return to the normal state of the sealing diaphragm 316, to withstand the control switch 315, so that the control switch 315 is switched from one state to another. State, so that the packaging damage trigger circuit 31 is triggered, and the trigger signal is transmitted to the chip self-destruction boost circuit 4, and the chip self-destruct boost circuit 4 releases high voltage to connect the authenticity verification device 1000 The programs, instructions and encryption keys set in the microprocessor 1 are all destroyed. In the same way, the air pressure in the second working cavity 1002 and the commodity packaging bag 1003 or the packaging container 1003 can also be set to a positive pressure formed by adding air pressure, and the sealing diaphragm 316 will be affected by the positive pressure. Extend, against the switch 315. For example, in the state of holding the switch 315, the package damage trigger circuit 31 is set to the standby working state, if the authenticity verification device 1000 and the authentic product 1004 to be verified are separated, once the package is If the bag 1003 or the packaging container 1003 is damaged, the positive pressure inside will be released through the damaged part. At this time, the positive pressure in the second working chamber 1002 will disappear and be equal to the outside atmospheric pressure. The sealing diaphragm 316 It will contract from the stretched state and return to the normal state of the sealing diaphragm 316, and release the control switch 315, so that the control switch 315 will switch from one state to another state, so that the package breaks the trigger circuit 31 is triggered, and the trigger signal is transmitted to the chip self-destruction boost circuit 4, and the high voltage is released through the chip self-destruction boost circuit 4, and the program, instruction and encryption key set in the microprocessor 1 Destroy all.
[0033] See image 3 And combine figure 1 As can be seen from the figure, the authenticity verification device 1000 provided with the separate self-destruct protection working part is provided with a magnetic substance 326, which is in a magnetic field balance with the magnetic substance 326 provided on the authentic product 1004 to be verified State, the authenticity verification device 1000 is fixedly connected to the authentic product 1004 to be verified, and a magnetic control switch 325 is arranged between the two magnetic substances 326. The magnetic control switch 325 is due to the authenticity verification device 1000 The change of the relative position after being fixedly connected with the authentic product 1004 to be tested causes the magnetic field balance state to change, and the state is switched from one state to another state, thereby controlling the activation of the separate self-destruct protection working part. In this embodiment, the permanent magnetic substance 326 installed in the authenticity verification device 1000 and the permanent magnetic substance 326 installed on the authentic product 1004 to be verified have the same magnetic field strength and are opposite to each other, and the magnetic control switch The 325 is located at the center of the balance magnetic field formed by the two permanent magnetic materials 326. The two permanent magnetic substances 326 and the magnetic control switch 325 together form a magnetic balance sensor, and the magnetic control switch 325 is a reed switch. The starting method of the separate self-destruct protection working part is to start by changing the relative position after the authenticity verification device 1000 is fixedly connected to the authentic product 1004 to be verified, so as to realize the setting of the microprocessor 1 in the authenticity verification device 1000 The self-destruct protection of the procedures, instructions and encryption keys of the
[0034] In addition, in the embodiment of the present invention, the photosensitive trigger circuit 33 is when the authenticity verification device 1000 is artificially disassembled, because the photosensitive device 335 is exposed to light, its resistance value will change from infinity in the dark state. When it becomes very small, the photosensitive trigger circuit 33 is triggered to work. The trigger switch 35 for disassembling the movement is connected in series by an array set on the circuit board 7 and connected to it through the metal end 3452 of the fastener under the tight pressing position of the fastener end 3452 of the circuit board 7 The anti-disassembly contact 3451 and the fastener 3452 are formed. Once any one of the fasteners 3452 fixing the circuit board 7 is loosened, the trigger switch 345 of the detachment movement connected in series will be closed. The state changes to the disconnected state, and the disassembly trigger circuit 34 is triggered. The battery undervoltage trigger circuit 35 is a voltage comparison circuit. When the voltage of the battery 6 set in the authenticity verification device 1000 drops to a set value, the circuit will be triggered immediately; the limited use trigger The working principle of the circuit 36 is: after the microprocessor 1 is used for a set number of times, it will immediately output a signal from the limited use signal output terminal 17 to the trigger input of the limited use trigger circuit 36 The terminal 363 immediately triggers the limited-time trigger circuit 36. In the above trigger circuits, as long as at least one of them is triggered, the molded chip self-destruction boost circuit 4 will immediately start to output a high voltage at the high-voltage output terminal 42 to the self-destruct input terminal 15 of the microprocessor 1, and The microprocessor 1 is broken down and damaged in an instant, so that the programs, instructions, and encryption keys in the microprocessor 1 are all destroyed, and the authenticity verification device 1000 is permanently invalidated.
[0035] In order to prevent the microprocessor 1 from being self-destructed during the assembly and debugging process of the authenticity verification device 1000, the power input 41 or the high-voltage output 42 of the chip self-destruction boost circuit 4 can be used. An insulating soft tape (not shown in the figure) is placed in the path of, to prevent the microprocessor 1 from being self-destructed during the assembly and debugging of the authenticator 1000. When the authenticity verification device 1000 is assembled and debugged, the number of starts is cleared to "0", and the authentic product to be verified is evacuated or gasified through the sealed bag 1003 or the sealed container 1004 After the packaging process, the insulating soft tape is pulled out from the panel of the authenticity verification device 1000, and the chip self-destructing booster circuit 4 is turned on. The insulating tape uses a small, thin, and soft insulating material. After being drawn out, it cannot be put back into the already-packaged authenticity verification device 1000.
[0036] For the authenticity inspection process of the present invention, please refer to Figure 4 , As can be seen from the figure, in the process of authenticating the authentic product to be inspected, it is first judged whether the tightness of the product is invalid. If it is not invalid, the inspector needs to verify the authenticity of the product. The card 8 is inserted into the authenticity verification card socket 16 of the authenticity verification device 1000. If a radio frequency identification card is used, it is only necessary to bring the radio frequency identification card close to the authenticity verification device 1000, and press the start-stop key 2 to start the authenticity verification device 1000, and it can also determine whether the authentic product to be verified is in The effective protection state of the authenticity verification device 1000. If the authenticity verification device 1000 cannot be activated, it is proved that the authenticity verification device 1000 has self-destructed and failed, and the following inspection cannot be performed. If the authentic product to be verified is still in the effective protection state of the authenticity verification device 1000 , The following verification steps are automatically performed: firstly, the verification information code is recognized, and the verification device 1000 performs a fixed address reading of the huge data information code in the verification card 8 according to the set program and instruction. Extracting and arranging the authentication information codes scattered and hidden therein; secondly, performing multiple encryption operations on the authentication information codes using the encryption key. First, the authenticity verification device 1000 calculates the authenticity verification information code into its complement, one's complement, end-to-end inversion, and misalignment code according to the set program and instruction, and then selects any set program and instruction from these codes. At least one of the codes is selected, combined with the encryption key set in the microprocessor 1 in the authenticity verification device 1000, and includes full addition (with carry) and half addition (without carry) The single-step encryption operation or multi-step comprehensive encryption operation in the operation method including mixed addition and subtraction, multiplication and division, including bitwise full addition and half addition, obtains the original verification code completely different from the verification information code . However, this original verification code is not a verification code for the verifier to recognize; the microprocessor 1 in the verification device 1000 will perform the binary/decimal or binary/binary verification code obtained in the previous step. Hexadecimal decoding is used to obtain the authenticity verification code for display or playback; at the same time, the microprocessor 1 in the authenticity verification device 1000 sends the translated authenticity verification code to the authenticity verification device 1000 The display screen 5 in, displays or sends to the voice circuit for playback, and simultaneously displays the authenticity prompt characters, images, or plays voice prompt information and the authenticity verification device 1000 has accumulated inspection times. The authenticator compares the unique authentication code of the card with the authentication code displayed or heard on the display screen, and judges whether the two codes match, and realizes the authenticity judgment of the authentic product; The authenticity person can press the start-stop button 2 on the control panel of the authenticity verification device 1000 to shut down or automatically shut down the work of the authenticity verification device when the set shutdown time is reached, and the authenticity verification card 8 Pull out from the authenticity verification device 1000.
[0037] For the identification and encryption process of the data information code in the authenticity verification card 8 by the authenticity verification device 1000, refer to the description of the following embodiments:
[0038] The authenticity verification information code in the authenticity verification card 8 randomly arranges random binary codes into data information code groups. In the following table, the authenticity information codes are arranged in groups of four in a large number of random data codes. in;
[0039] card
[0040] The verification information codes are identified and arranged according to the addresses corresponding to the verification information codes in the verification card 8 through the programs and instructions set in the microprocessor 1. In this embodiment, the authenticity verification information codes are set to six groups, which are respectively stored in addresses 1050, 3680, 15606, 23168, 57860, and 153686 in the authenticity verification card 8;
[0041] Card 1
[0042] After the microprocessor 1 obtains the above-mentioned authenticity information code, the microprocessor 1 calculates the complement of the authenticity information code, and the obtained complement is then set or written in and stored in the microprocessor 1 Perform a full addition operation on a set of said encryption keys in the device 1 to obtain the original verification code;
[0043]
[0044]
[0045] The binary authenticity verification original code is decoded in hexadecimal notation to obtain the authenticity verification code. In this embodiment, in addition to the ten Arabic numerals from 0 to 9, the weights of H, L, P, C, F, and E are respectively set to 10, 11, 12, 13, 14 and 15.
[0046] Card 1
[0047] Of course, there are many ways to identify, arrange, encrypt, and decode the data information codes in the authenticity card 8 through the programs, instructions, and keys set in the microprocessor 1. The above embodiments are only among them. Kind of.
[0048] Using this verification technology, a huge fidelity network can be formed. During the operation, you can proceed in two ways. The first aspect is to produce and issue authenticity verification cards8 by a special authority. The second aspect is to admit manufacturers of branded products that require fidelity into the fidelity system. The manufacturer of the designated authenticity verification device 1000 provides the authenticity verification device to the brand manufacturer, and the brand product manufacturer seals the authenticity verification device 1000 on the authentic product to be verified by vacuuming or adding air pressure to the authenticity verification device The sealed bag 1003 or the sealed container 1003 forms an inseparable whole with the authentic product to be inspected, or the authenticity verification device 1000 and the authentic product 1004 are sealed into an inseparable whole for sale. The fidelity network is constituted by issuing as many authenticity verification cards 8 as possible and absorbing as many brand product manufacturers as possible using the technology of the present invention. Gradually build a huge fidelity network from small to large. By using this accurate and efficient fidelity technology, counterfeit goods can be eliminated within the scope of fidelity products, and the rights and interests of brands and consumers can be protected to the greatest extent.
[0049] The specific effects of the present invention are detailed as follows:
[0050] First: Since the microprocessor 1 of the authenticity verification device 1000 is provided with a fully functional self-destruction protection circuit, the authenticity verification device 1000 can only be implemented on the premise that the product packaging is not damaged. Draw the test conclusion. Ensuring that the authenticity verification device 1000 is unique to the authentic product is achieved through two measures: one is that the verification program instructions and encryption keys set in the microprocessor 1 in the authenticity verification device 1000 are in During the manufacturing process of the microprocessor chip, it is set through a mask or written after the self-destruction protection takes effect, and cannot be read from the outside. It is unknown during the entire assembly, debugging and use process of the authenticity verification device 1000. Very strong confidentiality; secondly, when the authenticity verification device 1000 and the authentic product 1004 to be tested are sealed into one body by vacuum or pressurization, once the package of the authentic product to be tested is damaged, even if it only appears A small pinhole will cause the vacuum or air pressure state in the second working cavity 1002 of the authenticity verification device 1000 and the package of the authentic product to be tested to disappear immediately, and the authenticity verification device 1000 will trigger when the package is damaged. Under the action of the circuit 31, the chip self-destruction boost circuit 4 is started, and the high voltage is output to the self-destruction input terminal 15 of the microprocessor 1, and the verification program instructions and the encryption key in the microprocessor 1 Destroy all. The magnetic substance 326 is provided in the authenticity verification device 1000 provided with the separate self-destruct protection working part, and it forms a magnetic field equilibrium state with the magnetic substance 326 provided on the authentic product 1004 to be verified. The authenticity verification device 1000 is fixedly connected to the authentic product 1004 to be verified. The magnetic control switch 325 is arranged between the two magnetic substances 326. The authentic product 1004 to be verified is fixedly connected and is in a balanced magnetic field. Once the authenticity verification device 1000 and the authentic product 1004 have a relative displacement, the magnetic switch reed switch 325 is no longer in the balanced magnetic field. The magnetic control switch 325 will generate a state transition to control the start of the separate self-destruct protection work unit, and output a high voltage to the self-destruct input terminal 15 of the microprocessor 1, and the microprocessor 1 All the verification procedures, instructions and encryption keys in the are destroyed. In this way, only the authentic product can encrypt the authenticity verification code used to confirm the authenticity of the product on the premise that the authenticity verification device 1000 has the authenticity verification device 1000 that is not self-destructive. The authenticity verification device 1000 is unique to the authentic product.
[0051] Second, the authenticity verification device 1000 cannot be copied or imitated. Duplication needs a matrix, and imitation also needs a model. Although all hardware can be imitated based on principles and functions, the authenticity verification program, instructions, and encryption keys set in the microprocessor 1 in the authenticity verification device 1000 of the present invention cannot be stolen except , It is also protected by a complete self-destruct protection circuit, when the packaging bag 1003 or the packaging container 1003 of the authenticity verification device 1000 and the authentic product 1004 to be verified is sealed, leaks, or the The authenticity verification device 1000 is separated from the authentic product 1004 or the structural components of the authenticity verification device 1000 are pried, the screws 3452 of the fixed circuit board 7 are removed, and the power supply 6 is about to be exhausted or the number of inspections When the number of allowed authentication times set by the microprocessor 1 is reached, as long as at least one of the conditions occurs, the corresponding trigger circuit in the authentication device 1000 will trigger the chip self-destruction boost circuit 4 to generate a high voltage. The programs, instructions and encryption keys set in the microprocessor 1 are immediately destroyed. The authenticity verification device 1000 is protected by being unable to pirate reading and adopting a self-destructing protection circuit with perfect functions, so that counterfeiters are not provided with fake matrices and templates, so that the authenticity verification device 1000 cannot be copied or imitated.
[0052] Third, the authenticity verification device 1000 cannot be reused after being separated from the authentic product. As mentioned above, as long as the authenticity verification device 1000 is separated from the authentic product, the programs, instructions and encryption keys set in the microprocessor 1 will be immediately destroyed, and the authenticity verification device 1000 no longer has any functions. It is realized that once the authenticity verification device 1000 leaves the authentic product, it cannot be reused.
[0053] Fourth, the authenticity verification card 8 with special functions. Since the authenticity verification card 8 is used to store the random data information code, the authenticity verification card 8 needs to read the data information code stored in the card during use, and the authenticity verification card 8 will There is a problem of stolen reading. Since the stolen reading cannot be avoided, it is necessary to solve the problem of whether the authenticity verification card 8 can be identified and arranged to display the authenticity verification code after the verification card 8 is stolen. The present invention solves this problem by adopting the following measures: First, the useful authentication information code in the authentication card 8 only accounts for a very small part of the random data information code stored in the card, and is scattered and hidden in the random data information code In, after the counterfeiter reads all the data information codes stored in the authenticity verification card 8, since they cannot obtain the program instructions for the identification and arrangement of the authenticity verification information codes, they cannot solve the huge data stream in the card. Identify useful verification information codes. Second, all the binary data information codes stored in the authenticity verification card 8 are randomly compiled, and even the coder does not know what kind of data information code stream will be automatically and randomly compiled by the next card. However, after a large amount of random data information codes are written in the authenticity verification card 8, it can be read by a card reader with the same program, instructions and encryption keys set in the authenticity verification device 1000 in the hands of the encoder. The authenticity verification code unique to the card is printed or sealed on the authenticity verification card 8 for the cardholder to verify the authenticity as the only basis for authenticity judgment. This measure prevents counterfeiters from tracking the coding process. Third, after the authenticity verification card 8 is connected to the authenticity verification device 1000 and the authenticity verification is started, only the authenticity verification device 1000 can quickly perform the verification on the authenticity verification card 8 according to the set procedures and instructions. The huge data information code is read at a fixed address, and the authentication information codes scattered and hidden therein are extracted to realize the identification and arrangement of the authentication information codes. Fourth, the authenticity verification information code may or may not be the original code of the authenticity verification code. If the authenticity verification information code is not the original authenticity verification code, it must go through the authenticity verification device 1000 according to the set procedure , The instruction calculates the verification information code into its complement, one's complement, end-to-end code, and error code, and then select at least one of these codes according to any set program and instruction, and set it in the verification The encryption keys in the microprocessor 1 in the real device 1000 are combined and perform mixed addition and subtraction, multiplication, and multiplication, including full addition (with carry), half addition (without carry), and bitwise full addition and half addition. The single-step operation or multi-step integrated operation in the operation method of the division results in the original verification code completely different from the verification information code. The microprocessor 1 in the authenticity verification device 1000 will further decode the binary/decimal or binary/hexadecimal code obtained in the previous step, and the decoded decimal or hexadecimal After the base code is displayed on the display screen of the authenticity verification device 1000, it is the authenticity verification code for comparison by the authenticity verifier. The displayed code is essentially different from the data information code in the verification card 8. To obtain the authenticity verification original code, the authenticity verification device 1000 must perform identification, arrangement, and weighting operations on the data stream in the authenticity verification card 8 according to a preset program and instructions. In this way, even if the counterfeiter reads the original data information code stored in the authenticity verification card 8, it is impossible to compare or infer what kind of program, instruction and encryption method the authenticity verification device 1000 uses to verify the information. The original data information code in the authenticity verification card 8 is identified, arranged and encrypted.
[0054] Fifth, counterfeiters will not copy or imitate the authenticity verification card 8. If the counterfeiter copies the random data code stored in the authenticity verification card 8 as it is, the counterfeit product will never be verified as a genuine product. This is for the authenticity of the card, and the counterfeiter will not implement it; It is copied by reprogramming a set of codes and storing it in the card. When this kind of fake card encounters the authenticity verification device 1000, the authenticity verification device 1000 cannot identify, arrange, and encrypt the verification information code from the fake card. The original code of the authentic code will immediately expose the fake card, and the counterfeiter cannot track and obtain the authenticity verification code unique to each card that has been compiled by the authentic verification card. In addition, because the cards forged by counterfeiters cannot enter the regular distribution channels, they are not issued by specially designated institutions, and no one will accept them.
[0055] Sixth, in the actual application process of the present invention, in order to enable the technology to exert a good fidelity effect for a long time, if necessary, the authenticity verification code can be automatically upgraded at any time. When upgrading, only the programs, instructions, and encryption keys set by the microprocessor 1 in the authenticity verification device 1000 need to be modified, and the authenticity verification code can be increased or reduced. Card 8 can not be changed. Cardholders only need to re-read the card at the card issuer or read the card on the upgraded product, and the cardholder can write down his own unique upgraded version of the verification code for easy implementation upgrade. During the upgrade transition period, the old version of the authenticity verification device and the upgraded version of the authenticity verification device can be used in parallel.
[0056] The product authenticity verification device with self-destruction protection function and the authenticity verification method of the present invention have a wide range of application fields and are applicable to many types of goods; and can be extended to the logistics field, fidelity of goods during transportation, and can effectively prevent goods during transportation Replaced; the ultra-micro power consumption microprocessor 1 used in the commercial authenticity verification device 1000 with self-destruction protection function of the present invention has a standby current in the order of nanoamperes, and the battery life of the enclosed battery can reach several years. With the advancement of science and technology, the use of a microprocessor with lower power consumption and a battery with larger capacity and smaller self-discharge will also greatly extend the retention time of the authenticity verification device 1000 of the present invention. Before the power of the battery 6 is almost exhausted, the power undervoltage trigger circuit 35 will also trigger the chip self-destruction boost circuit 4 to generate high voltage and destroy the program instructions and encryption keys in the microprocessor 1, thereby preventing The authenticity verification device 1000 is stolen or counterfeited after being stored for a long time or artificially causing the battery 6 to fail.
[0057] In this embodiment, the sealing diaphragm 316 in the product authenticator 1000 with self-destruct protection function that can expand and contract according to changes in air pressure is a spherical elastic rubber film. Of course, the diaphragm 316 can also be A sealing diaphragm of any shape and structure designed to achieve expansion or contraction when positive pressure or negative pressure is applied to one side of the sealing diaphragm, and to return to the normal form after the positive pressure or negative pressure disappears. Under the condition that the trigger self-destruction can be realized, in addition to the package damage trigger circuit 31 or the magnetic balance separation trigger circuit 32, the photosensitive trigger circuit 33 can also be used in the authenticity verification device 1000 of the present invention. One or more of the other four trigger circuits of the disassembled movement trigger circuit 34, the under-voltage trigger circuit 35, and the limited-time use trigger circuit 36; for some special products or on customer requirements, It is also possible to use a voice notification method instead of a display screen to indicate the verification conclusion. For example, when the authenticity verification device 1000 is completed, the sound device on the authenticity verification device 1000 will immediately encrypt the authenticity verification code Wait for the information to be read out for the verifier to judge. At this time, just change the original verification code for display to a voice prompt signal, and change the display circuit and display to a power amplifier circuit and a micro-power electroacoustic device; start the manual button 2 of the authenticity verification device 1000 It can also be changed to a touch switch in the authenticity verification card socket 16 in the authenticity verification device 1000, and when the authenticity verification card 8 is inserted into the socket 16, the authenticity verification device 1000 can be activated synchronously, and After the authentication card 8 is pulled out at the end of authentication, the authentication device 1000 is automatically closed; the air pressure in the first working chamber 1001 in the authentication device 1000 can also be non-atmospheric pressure, as long as the When the air pressure in the second working chamber 1002 changes, the sealing diaphragm 316 can be extended and contracted, and the package damage trigger circuit 31 can be activated.
[0058] In this embodiment, a display device for authenticity verification results can also be set on the authenticity verification card 8, so that the authenticity verification results are displayed on the authenticity verification device 1000 and the authenticity verification card 8 separately or on the authenticity verification card 8. The authenticity verification device 1000 and the authenticity verification card 8 are displayed simultaneously.
[0059] The above detailed description is only exemplary description, and those skilled in the art can design various implementation manners according to different actual needs without departing from the scope and spirit of the present invention.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more Similar technology patents
Intelligent real-time detection system and real-time detection method thereof
PendingCN107563463AEliminate data entry stepsThe detection process is simple and fastCo-operative working arrangementsTransmissionInternet of ThingsReal-time computing
Owner:SHANGHAI UPPER BIO TECH PHARMA
Array substrate, testing method and device, forming method and device and display panel forming method
ActiveCN109817135AThe detection process is simple and fastElectronic circuit testingStatic indicating devicesEngineeringElectrical and Electronics engineering
Owner:YUNGU GUAN TECH CO LTD
Prognosis kit for lymphoma
InactiveCN110951876AThe test results are accurate and reliableEasy to operateMicrobiological testing/measurementDNA/RNA fragmentationT-LymphoblastBiopsy
Owner:蔡清清
Method, device and system for carrying out function detection on hardware-in-loop device
InactiveCN109975032AThe test results are accurate and reliableEasy to findVehicle testingLoop deviceHardware-in-the-loop simulation
Owner:GUANGZHOU XIAOPENG MOTORS TECH CO LTD
Rapid detection method and detection kit for number of bacteria in food
PendingCN114836510AThe detection process is simple and fastShort timeMicrobiological testing/measurementBiological material analysisColor reactionLiquid food
Owner:WUHAN TEXTILE UNIV
Classification and recommendation of technical efficacy words
- The detection process is simple and fast
- The test results are accurate and reliable
Intelligent real-time detection system and real-time detection method thereof
PendingCN107563463AEliminate data entry stepsThe detection process is simple and fastCo-operative working arrangementsTransmissionInternet of ThingsReal-time computing
Owner:SHANGHAI UPPER BIO TECH PHARMA
Array substrate, testing method and device, forming method and device and display panel forming method
ActiveCN109817135AThe detection process is simple and fastElectronic circuit testingStatic indicating devicesEngineeringElectrical and Electronics engineering
Owner:YUNGU GUAN TECH CO LTD
Rapid detection method and detection kit for number of bacteria in food
PendingCN114836510AThe detection process is simple and fastShort timeMicrobiological testing/measurementBiological material analysisColor reactionLiquid food
Owner:WUHAN TEXTILE UNIV
Kinect-based call making and answering monitoring method of driver
InactiveCN105469073AImprove stabilityThe test results are accurate and reliableCharacter and pattern recognitionBase callingDriving safety
Owner:ANHUI CREARO TECH
Rock tensile test device under confining pressure effect and test method thereof
ActiveCN106546488AThe test results are accurate and reliableEasy to operateMaterial strength using tensile/compressive forcesCOMPONENT IIPull force
Owner:HEBEI UNIV OF TECH
Paddy rice yield genotyping primer set based on KASP technology and use thereof
ActiveCN106939349AThe test results are accurate and reliableEasy to operateMicrobiological testing/measurementDNA/RNA fragmentationAgricultural scienceFunctional allele
Owner:广州固德生物技术有限公司
Sample production apparatus and sample production method of layered rock-soil body sample
InactiveCN105115794AThe test results are accurate and reliablePreparing sample for investigationPhysicsFreeze thaw cycling
Owner:HOHAI UNIV