Method of preventing counterfeit coin circulation
A coin, authenticity technology, applied to coin inspection, handling coins or valuable banknotes, instruments, etc., can solve the problem of difficult identification of counterfeit coins
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0031] The process of making coins and judging their authenticity, cf. figure 1 .
[0032] 1. Chips are embedded in coins when making coins, and each chip corresponds to a unique code;
[0033] 2. Allocate corresponding storage space for each code on the cloud server;
[0034] 3. The initial identification code is randomly set when the coin leaves the factory, and is stored in the corresponding storage space of the chip and cloud server chip code respectively;
[0035] 4. The mobile phone is connected to a special coin reader through the interface;
[0036] 5. The coin reader scans the coin to obtain the chip code and the identification code stored on the chip;
[0037] 6. Find the identification code under the chip code storage space on the cloud server;
[0038] 7. Compare the two: if they are inconsistent, it means that it is a counterfeit currency, and the transaction or circulation is stopped; if they are inconsistent, it cannot be proved that it is a counterfeit curr...
Embodiment 2
[0046] The process of writing and reading the identification code is as follows, refer to figure 2 .
[0047] 1. The plaintext is encrypted by the private key 1 of the coin reader to form ciphertext 1
[0048] 2. Issue a write request
[0049] 3. The chip is decrypted with the public key 1 of the coin reader
[0050] 4. Determine whether the identification code is successfully decrypted: if not, it means that the ciphertext is not credible, and the write request is rejected; if yes, follow-up operations
[0051] 5. Accept the write request and write the identification code
[0052] 6. Encrypt the identification code with the public key 2 in the coin chip to form ciphertext 2
[0053] 7. Transfer the ciphertext 2 to the cloud server
[0054] 8. Use the private key 2 stored on the cloud server to decrypt
[0055] 9. Restore the identification code stored in the chip
[0056] Among them, the public key and the private key are used in pairs, the ciphertext encrypted with t...
Embodiment 3
[0058] The process of writing the initial identification code is as follows:
[0059] 1. Store the public key 2 in the coin chip when leaving the factory, and store the private key in the cloud server;
[0060] 2. Encrypt the identification code with the public key 2 in the coin chip to form ciphertext 2;
[0061] 3. Transfer the ciphertext 2 to the cloud server;
[0062] 4. Decrypt with the private key 2 stored on the cloud server.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

