A method for remote identification or anti-counterfeiting of a mobile phone with NFC function

A feature phone and identity technology, which is applied in the field of commodity identity identification and anti-counterfeiting applications, can solve the problems of inability to perform anti-counterfeiting identification, remember phone numbers, and waste resources, so as to improve reliability, security, and convenience And practicality, the effect of improving safety

Active Publication Date: 2016-01-13
黄志军
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. The cost of packaging anti-counterfeiting is too high, and sometimes the value of packaging anti-counterfeiting is as high as or even higher than the commodity itself (such as tobacco, alcohol, etc.), which is a waste of resources and does not meet the current requirements of building a conservation-oriented society;
[0005] 2. In the telephone password anti-counterfeiting method, due to the wide variety of commodities, the telephone numbers used for anti-counterfeiting are not easy to be remembered by people, and it is impossible for people to remember the various anti-counterfeiting telephone numbers of all commodities; The phone number and password are often those used by the infringing manufacturers, and such methods cannot play the role of anti-counterfeiting identification at all;
[0006] 3. If the anti-counterfeiting laser label is copied by the infringing manufacturer and pasted on the counterfeit product, the anti-counterfeiting laser label cannot undertake the anti-counterfeiting function, and the cost of the anti-counterfeiting laser label is relatively high;
[0007] 4. Among the above three methods, because the copying method is relatively easy, the infringing manufacturers can apply the anti-counterfeiting measures of the above-mentioned genuine products to counterfeit products, so in fact, the existing methods cannot achieve effective anti-counterfeiting functions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for remote identification or anti-counterfeiting of a mobile phone with NFC function
  • A method for remote identification or anti-counterfeiting of a mobile phone with NFC function
  • A method for remote identification or anti-counterfeiting of a mobile phone with NFC function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] The security component (SE) placed in the SIM card is connected to the non-contact front-end circuit (CLF) in the mobile phone via the single-wire protocol (SWP) data line as an example of an NFC mobile phone (see attached figure 2 ).

[0069] The security component (SE) placed in the SIM card is connected to the non-contact front-end circuit (CLF) in the mobile phone through the single-wire protocol (SWP) data line. The NFC mobile phone means that the mobile phone integrates the non-contact front-end circuit (CLF) and antenna, which will be safe The components are integrated into the SIM card, and pin C6 of the contact feet of the SIM card (see attached image 3 ) Is made as a single-wire protocol (SWP) data communication pin SWIO.

[0070] The security component (SE) placed in the SIM card is connected to the non-contact front-end circuit (CLF) in the mobile phone through the single-wire protocol (SWP) data line. The method for remote identification or anti-counterfeiting ...

Embodiment 2

[0109] Take the security component (SE) placed in the MicroSD card connected to the non-contact front-end circuit (CLF) in the mobile phone via the single-wire protocol (SWP) data line as an example (see attached figure 2 ).

[0110] The security component (SE) placed in the MicroSD card is connected to the non-contact front-end circuit (CLF) in the mobile phone through the single-wire protocol (SWP) data line. The NFC mobile phone means that the mobile phone integrates the non-contact front-end circuit (CLF) and antenna, which will be safe The components are integrated into the MicroSD card, and the 9th and 10th pins are added to the 8 pins of the MicroSD card (see attached Figure 4 ), where the 9th pin is made as the single-wire protocol (SWP) data communication pin SWIO, and the 10th pin is the supply voltage pin SEVCC from the non-contact front-end circuit (CLF) of the mobile phone.

[0111] The security component (SE) placed in the MicroSD card is connected to the non-contact...

Embodiment 3

[0151] Take a mobile phone with an NFC-enabled MicroSD card as an example (see attached Figure 5 ).

[0152] A MicroSD card with NFC function refers to a MicroSD card integrated with a non-contact chip and a security component (SE); a mobile phone with an NFC-enabled MicroSD card has NFC function.

[0153] The following are the methods for remote identification or anti-counterfeiting of mobile phones with NFC-enabled MicroSD cards:

[0154] A method for automatically connecting to a server with a designated IP address for a specific commodity includes the following steps:

[0155] 1. The microprocessor (MCU) of the mobile phone initializes the MicroSD card with NFC function;

[0156] 2. Enter the mobile phone identification menu to activate the identification function;

[0157] 3. The microprocessor (MCU) of the mobile phone sends an identification request command to the non-contact front-end circuit (CLF) in the MicroSD card with NFC function through the MicroSD card interface;

[0158]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a remote identity identification or security method which utilizes a mobile phone with a near field communication (NFC) function to read encryption identity information transmitted by a non-contact label. According to commodity brand information, the mobile phone with the NFC function performs search and is automatically connected to an internet protocol (IP) address server system appointed by a specific commodity brand, or the mobile phone with the NFC function is manually connected to the IP address server system appointed by the specific commodity brand to perform decryption operation on the encryption identity information to obtain commodity identity information and perform identification according to the commodity identity information, so that remote identity identification or security can be performed on different kinds of commodities.

Description

Technical field [0001] The invention belongs to the technical field of commodity identity verification and anti-counterfeiting applications, and particularly uses a mobile phone with NFC function to communicate with a designated IP address server system in GPRS or 3G mode to realize remote identity verification or anti-counterfeiting methods. Background technique [0002] At present, commodity identification generally adopts methods such as packaging anti-counterfeiting, telephone password anti-counterfeiting, and laser label anti-counterfeiting. [0003] However, the current traditional identification or anti-counterfeiting identification methods mainly have the following defects: [0004] 1. The cost of packaging anti-counterfeiting is too high. Sometimes the value of packaging anti-counterfeiting is as high as or even higher than the product itself (such as tobacco, alcohol, etc.). This is a waste of resources and does not meet the current requirements of building a conservation-o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06Q30/00
Inventor 黄志军
Owner 黄志军
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products