Anti-counterfeiting authentication method based on NFC tag

An authentication method and label technology, applied in the field of anti-counterfeiting authentication based on NFC tags, can solve the problems of long verification time, low cost of counterfeiting, and inability to realize anti-counterfeiting, etc., achieve high security, improve user experience, and convenient and quick query means Effect

Inactive Publication Date: 2017-01-25
YILIAN BEIJING INTERNET OF NETWORK TECH CO LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This kind of anti-counterfeiting technology is easy to copy, and the effect is not ideal;
[0004] 2. In the SMS center, add an anti-counterfeiting code or password lock to each bottle of wine (now hairy crabs are also useful), and consumers can send short messages to verify. The problem is that counterfeiters can still copy this set of things, and the verification time is longer. Consumers are skeptical about this
[0005] 3. On the rise, the use of RFID for production, circulation, and anti-counterfeiting management has played a very good role in production management and circulation management, but the dilemma is that RFID and read-write equipment (dedicated) are only closed systems for manufacturers and distributors , has nothing to do with consumers, and becomes "talking about itself", which cannot solve consumers' anti-counterfeiting needs;
[0006] The current anti-counterfeiting methods can only be counted as fake anti-counterfeiting, none of which can achieve real anti-counterfeiting, and are easy to copy. The cost of anti-counterfeiting is too low, so traditional anti-counterfeiting technology can no longer effectively stop counterfeiting.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be further described below in conjunction with specific embodiments, and the advantages and characteristics of the present invention will become clearer along with the description. However, these embodiments are only exemplary and do not constitute any limitation to the scope of the present invention. Those skilled in the art should understand that the details and forms of the technical solutions of the present invention can be modified or replaced without departing from the spirit and scope of the present invention, but these modifications and replacements all fall within the protection scope of the present invention.

[0037] The present invention relates to a kind of anti-counterfeiting authentication method based on NFC tag, comprising the following steps,

[0038] Step 1, the manufacturer processes the NFC tag on the outer packaging of the product to be opened;

[0039] Step 2, after the product is put on the shelves, the customer scans ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an anti-counterfeiting authentication method based on NFC tag. The method comprises the following steps: 1. The manufacturer puts the NFC tag to the outer packaging of a commodity to be opened. 2. After the commodity is shelved, the customer who scan the NFC tag with a NFC-enabled phone can view commodity details and determine the authenticity of the commodity; 3. After the commodity is selected, paid, used and opened by the customer, the NFC tag of the commodity is destroyed, and can no longer be scanned for the details of the commodity. The advantages of the method are as follows: 1. High security: a NFC tag has a UID which cannot be copied; 2. Convenient consumer query: as the NFC smart phone goes mainstream, users no longer need to install app to complete commodity verification, which can enhance the consumers' user experience; 3. Better meeting the needs of immediate verification of commodity.

Description

technical field [0001] The invention relates to an anti-counterfeit authentication method based on an NFC tag. Background technique [0002] At present, there are mainly the following anti-counterfeiting methods for high-end commodities such as wine, cigarettes, cosmetics, health care products, digital products, and artworks: [0003] 1. Traditional anti-counterfeiting technologies, such as holographic anti-counterfeiting printing marks, special printing, two-dimensional codes, grating recognition, non-recoverable package transfer and other technologies. This kind of anti-counterfeiting technology is easy to copy, and the effect is not ideal; [0004] 2. In the SMS center, add an anti-counterfeiting code or password lock to each bottle of wine (now hairy crabs are also useful), and consumers can send short messages to verify. The problem is that counterfeiters can still copy this set of things, and the verification time is longer. Consumers are also dubious about this. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/00G06K7/00
CPCG06Q30/0185G06K7/00
Inventor 赵宁易志中王启祥刘峰
Owner YILIAN BEIJING INTERNET OF NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products