Identifying and tracing system with unique identity and method

An identity identification, unique technology, applied in the field of digital signature authentication and encryption and decryption, can solve the problems of not forming a closed-loop system, unable to achieve anti-counterfeiting, unable to effectively adapt to different industries, etc., to achieve high system security and security management Simple and reliable effects

Inactive Publication Date: 2014-10-08
北京信长城技术研究院
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the inflexible design of its logical anti-counterfeiting technology, the focus of anti-counterfeiting lies in the physical structure of the technology, and each product is technically anti-counterfeited by the product issuer.
In this way, the anti-counterfeiting technology of each product is independent, consumers cannot easily verify its authenticity, and the verification threshold is relatively high, which is not suitable for the daily application of ordinary consumers, which limits its large-scale popularization
In addition, once the labels of these existing anti-counterfeiting technologies are stolen, they are easy to reuse and copy, or the label information is directly tampered with. They have not formed a closed-loop system, so that they cannot achieve fundamental anti-counterfeiting. Logically, they only do When it comes to passive defense, it cannot effectively suppress counterfeiting
Most of the existing anti-counterfeiting technical means are based on a certain technology and label type. There is no systematic and systematic authentication and anti-counterfeiting system, which cannot effectively adapt to the anti-counterfeiting needs of different industries, different enterprises, and different types of commodities.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identifying and tracing system with unique identity and method
  • Identifying and tracing system with unique identity and method
  • Identifying and tracing system with unique identity and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to further explain the technical means and beneficial effects adopted by the present invention to achieve its purpose, and to implement the present invention according to the detailed introduction of this specification, the specific implementation of the present invention will be described below in conjunction with the accompanying drawings and preferred embodiments of the present invention. The method is described in detail below.

[0043] The present invention discloses a product authenticity and traceability system based on combined public key cryptosystem identification authentication technology, such as figure 1 As shown, the system includes: logo authentication key production management system, enterprise commodity logo authentication production management system, enterprise commodity logo authentication information traceability data system, enterprise commodity logo authentication authenticity and traceability system.

[0044] see figure 1 , the identif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identifying and tracing system with unique identity and a method. Through combination of combined public key cryptography system and an identity authentication technology, the closed-loop commodity identifying and tracing system based on unique identity IDs and label information of commodities is built; as a unique identity ID issuing system of the enterprise commodities is designed, uniqueness of the identity of the enterprise commodities in the circulation domain is ensured, and then electronic information label carriers and the enterprise commodities are correlated and bound to set up an enterprise commodity tracing information database system. According to the system and the method, as a terminal verification procedure module is disclosed, different enterprises and the different types of commodities can be incorporated into the identifying and tracing system, a common consumer can identify and trace the enterprise commodities conveniently, fast and efficiently through a handheld terminal, and the enterprises can effectively manage and efficiently circulate the commodities produced by the enterprises.

Description

technical field [0001] The invention relates to digital signature authentication and encryption and decryption technology based on combined key cryptosystem. It further involves the identification authentication technology, the unique identification ID of commodities based on identification authentication and the automatic issuance system technology of identification, electronic information label technology, large-scale database system technology, and the association and binding technology of electronic information label and commodity. Background technique [0002] Common anti-counterfeiting products and technologies in the domestic market include: holographic patterns, color-changing inks, hidden marks on products and packaging, and electronic information labels. These existing technologies do not possess uniqueness and exclusivity, and are easy to be copied and tampered with, so that they cannot play a real anti-counterfeiting role. [0003] At present, the trend of anti-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/00
Inventor 罗燕京
Owner 北京信长城技术研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products