Target authentication method based on mobile device and authentication center

A mobile device and authentication center technology, applied in the field of authentication system of integrated identity discrimination technology, to achieve the effect of saving manufacturing costs

Inactive Publication Date: 2014-02-26
王旭东
View PDF7 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These methods usually require the use of professional equipment and are used by pro

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Target authentication method based on mobile device and authentication center
  • Target authentication method based on mobile device and authentication center
  • Target authentication method based on mobile device and authentication center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] Use this method to authenticate items such as products and invoices. A mobile device and network-based method for target authentication through authentication identification and authentication behavior, comprising:

[0071] 1. Certification center

[0072] 2. The certification center generates unique identification information A;

[0073] 3. On the certification target (certified item), use the printed QR code to record the unique identification information B:

[0074] 4. The authenticator uses the camera of the mobile device (mobile phone, tablet, wearable smart device, etc.) to take pictures of the QR code printed on the authentication target (certified item) and read the unique identification information B;

[0075] 5. Send unique identification information B, authentication equipment information, and authentication process information to the authentication center;

[0076] 6. The certification center receives the information;

[0077] 7. The certification center...

Embodiment 2

[0085] This method is used to authenticate objects such as personnel. A mobile device and network-based method for target authentication through authentication identification and authentication behavior, comprising:

[0086] 1. Certification center

[0087] 2. The certification center generates unique identification information A;

[0088] 3. On the jewelry worn by the authentication target (certified person), use the NFC (near field communication technology) tag to record the unique identification information B, and the tag is implanted on the wearable jewelry. Can include but not limited to: mobile phones, bracelets, necklaces, rings, NFC cards, etc.;

[0089] 4. The authenticator uses the NFC (Near Field Communication Technology) device of the mobile device (mobile phone, tablet, wearable smart device, etc.) to read the jewelry worn by the authentication target (the authenticated person);

[0090] 5. The mobile device used for authentication transmits the read unique ide...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for authentication of a unique identification label of a target (a person or an object) by means of a mobile device (a mobile phone, a tablet computer, a wearable mobile device and the like). According to the method, comprehensive judgment is carried out on the unique identification label of the authentication target and the authentication action of an authentication executor through a rear-end authentication center, the authenticity of the identity of the target can be confirmed, and the action information of a counterfeiter can be tracked. According to the method, the unique identification information is arranged on the authentication target (the object or person to be authenticated) firstly through the authentication center, wherein the information can be barcodes, two-dimension codes, near field communication (NFC) labels and the like. During authentication, a user conducts identification information recognition with the mobile device, and then the recognized identification information, the device number of an authentication device (the international mobile device identification recognition number IMEI or a program imbedded identification code), geographic position information and the like are transmitted to the authentication center together through the Internet.

Description

technical field [0001] The present invention relates to mobile device identification technology, network communication technology, and authentication center technology, especially an authentication system and method based on unique identification identification and identification process and comprehensive identification technology of identification equipment, so as to effectively carry out the target identification of people and objects. Authentication and identification. Background technique [0002] Existing identification technologies usually use various methods such as physical methods and biological information methods, and usually use methods with high processing difficulty or complicated manufacturing technology to perform authentication on the authentication target (the authenticated item or the authenticated person). Anti-counterfeiting treatment. However, these methods usually require the use of professional equipment and are used by professionals in order to accu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06F17/30
Inventor 王旭东
Owner 王旭东
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products