Method for encrypting real-time data into product security codes

A data encryption and anti-counterfeiting code technology, applied in the field of anti-counterfeiting, can solve the problems of large amounts of data, slow query process, hidden dangers of database load, etc., and achieve the effects of wide application, cost reduction and query speed improvement

Inactive Publication Date: 2012-01-25
贵州卓霖科技有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the information is managed through the database, each product needs to occupy at least one database capacity. When the output of the product reaches a certain level, a large amount of data will be generated, which will not only cause a large hidden danger to the database load, but also the query process will be very slow.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting real-time data into product security codes
  • Method for encrypting real-time data into product security codes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0015] Example 1. The application of the present invention on a one-time anti-counterfeit combination lock.

[0016] For products equipped with disposable anti-counterfeiting combination locks, consumers need to inquire about the unlocking password of the one-time anti-counterfeiting combination locks before they can open the packaging of the products. Set the unlock password of the one-time anti-counterfeiting combination lock to instant data D, and encrypt the unlocking password of the one-time anti-counterfeiting combination lock in the anti-counterfeiting code according to the following steps:

[0017] (1) Set the product basic code A according to the product information. Product basic code A is generated according to the requirements of the enterprise, and can be composed of manufacturer code, product serial number or production date, such as 20072800110001, where manufacturer code: 0011, serial number: 0001, date: February 8, 2007. It can also be various codes containi...

Embodiment 2

[0027] Example 2. The application of the present invention in logistics anti-fleeing goods.

[0028] Fleeing goods is to sell the products distributed across regions. Fleeing goods will cause market crowding, price confusion, and seriously affect the reputation of manufacturers. The invention can be used to prevent channeling. Set the dealer (arrival place) code as real-time data D, and follow the steps below to encrypt the product dealer code in the anti-counterfeiting code:

[0029] (1) Set the product basic code A according to the product information. Product basic code A is generated according to the requirements of the enterprise, and can be composed of manufacturer code, product serial number or production date, such as 20072800110001, where manufacturer code: 0011, serial number: 0001, date: February 8, 2007. It can also be various codes containing other information.

[0030] (2) The basic anti-counterfeiting code B is generated by encrypting the product basic code...

Embodiment 3

[0036] Example 3. The application of the present invention in the monitoring of product validity period.

[0037]The production date is generally printed on the product packaging so that consumers can identify whether the product is within the validity period. However, some unscrupulous distributors maliciously alter the production date of expired products or products that are about to expire in order to seek profits, seriously infringing on the rights and interests of consumers. Especially for food and pharmaceutical products, the act of altering the production date will directly pose a threat to the health and life of consumers. The invention can load the production date of the product into the anti-counterfeit code, not only can identify the authenticity of the product, but also can directly identify the production time of the product from the inquired code information, preventing dealers from changing the production date maliciously.

[0038] Set the product production d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for encrypting real-time data into product security codes, which comprises the following steps that: firstly, product basic codes A are set according to product information, then, the product basic codes A are encrypted through an encryption formula key1, and basic security codes B are generated; and then, the real-time data D is encrypted through a randomly selected encryption algorithm key2, encryption data minD is generated, feature codes E are generated through the randomly selected encryption algorithm key2, finally, the basic security codes B, the feature codes E and the midD are ranged again according to the desequencing rule F corresponding to the feature codes E, and final codes C are obtained. The encryption and decryption processes of the method completely get out from the management of a database, the database support is not needed, the management of data with unlimited number is supported, the cost is reduced, the inquire speed optimization is realized, and the functions of anti-counterfeiting, reviewing, management and the like of products are realized.

Description

technical field [0001] The invention relates to an anti-counterfeit technology, in particular to a method for encrypting real-time data in an anti-counterfeit code, and belongs to the field of anti-counterfeit technology. Background technique [0002] With the continuous emergence of counterfeiting techniques and means of counterfeiting, counterfeiting is becoming increasingly rampant. The appearance of counterfeit products not only violates the interests of consumers, disrupts the normal market order, but also brings huge economic losses to manufacturers. In today's highly integrated anti-counterfeiting technology, in order to strengthen the monitoring and management of products, in addition to setting anti-counterfeiting codes to identify the authenticity of products, companies often need to combine product anti-counterfeiting codes with logistics codes, bottle opening passwords, dealer codes, etc. in real time. The combination of information can not only realize the high...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K5/00
CPCH04L9/32
Inventor 周军陶燕杨飚刘新桥
Owner 贵州卓霖科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products