Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A digital anti-counterfeiting method for multiple security cigarettes

A digital and cigarette technology, applied in the field of multi-security cigarette digital anti-counterfeiting, can solve the problems of cigarette manufacturers such as catastrophic impact, difficulty in making timely response, inconsistent packaging, etc., to achieve mutual detection and custom upgrade or adjustment, elimination Invalidation of Cigarette Digital Anti-counterfeiting Query and Prevention of Sequential Exhaustive Attacks

Inactive Publication Date: 2011-12-07
CHINA TOBACCO HUNAN INDAL CORP
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. Due to the large amount of production information used for quality traceability (the production time must be accurate to the minute), the generated anti-counterfeiting codes have a large number of digits (such as the 18-digit anti-counterfeiting code for the Furongwang brand series), and it is not very convenient for consumers to inquire. It is easy to enter the wrong number in SMS or 400 phone inquiry
When the wrong content entered by the consumer just satisfies the encryption algorithm and the first query will prompt that the query is the correct number, but the prompted brand does not match the actual packaging, and consumers will misunderstand
[0006] 2. As a reversible encryption algorithm, generally speaking, it has the possibility of being cracked
The security of this type of digital anti-counterfeiting mode is based on the security of the encryption algorithm. Once the encryption algorithm or key is leaked, counterfeiters can generate anti-counterfeiting numbers that have never been checked, which will bring disaster to cigarette manufacturers. Impact and immeasurable loss
[0007] The digital anti-counterfeiting algorithm is closely coupled with the digital anti-counterfeiting system. Various subjective or non-subjective reasons may cause security risks such as leaks. Once a problem is found, it is difficult to respond in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A digital anti-counterfeiting method for multiple security cigarettes
  • A digital anti-counterfeiting method for multiple security cigarettes
  • A digital anti-counterfeiting method for multiple security cigarettes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] The method of the present invention strips off the digital anti-counterfeiting query from the whole digital anti-counterfeiting system, and adopts a modular design; the method has designed multiple security modules, each security module can be upgraded independently or corrective measures can be taken, and any security module fails (leaking secrets) ) will not affect the security of the entire digital anti-counterfeiting inquiry part. Such as figure 1 As shown, the anti-counterfeiting method is designed with four security modules: input verification module 01, encryption algorithm verification module 02, production information storage verification module 03, query storage verification module 04.

[0044] (1) Input verification module 01

[0045] The input checking module 01 of this embodiment is implemented by using redundancy checking. In communications, redundancy checks refer to data appended to messages for error detection and error correction. In this embodiment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a digital anti-counterfeiting method for multiple security cigarettes, which comprises four overlapping steps of input verification based on redundancy check, algorithm verification step, production information verification step and inquiry record verification step plus security verification steps. The multi-security cigarette digital anti-counterfeiting method has multiple anti-counterfeiting functions, and significantly reduces loopholes in the existing anti-counterfeiting technology. This method most likely eliminates the failure of the cigarette digital anti-counterfeiting query caused by the potential security loopholes in the digital query. At the same time, the method adopts a modular design and is embedded in the relevant digital anti-counterfeiting system. When some security verification modules fail, mutual detection and custom upgrade or adjustment can be realized to further enhance security.

Description

technical field [0001] The invention relates to a digital anti-counterfeiting method for multi-security cigarettes, which belongs to the technical field of digital anti-counterfeiting. Background technique [0002] Digital anti-counterfeiting technology is a high-tech anti-counterfeiting technology that comprehensively utilizes advanced digital coding, encryption, database, network and other technologies. Digital anti-counterfeiting verification is generally divided into two methods, namely algorithm verification and storage verification. Anti-counterfeiting numbers with autocorrelation generally verify their legitimacy through corresponding encryption algorithms; random anti-counterfeiting codes without autocorrelation generally check the anti-counterfeiting database to verify the existence of the corresponding anti-counterfeiting code and count the number of visits (denoted as c). When the code does not exist or c≥1, it prompts consumers to buy counterfeit products. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/00G06Q50/00G06F17/30
Inventor 吴高峰徐远兵叶献忠余军辛义定
Owner CHINA TOBACCO HUNAN INDAL CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products