Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of preventing counterfeit coin circulation

A coin, authenticity technology, applied to coin inspection, handling coins or valuable banknotes, instruments, etc., can solve the problem of difficult identification of counterfeit coins

Inactive Publication Date: 2017-06-09
北京云知科技有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The purpose of the present invention is to provide a method for preventing the circulation of counterfeit coins, in order to solve the problem of difficult identification of counterfeit coins in the existing coin anti-counterfeiting technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of preventing counterfeit coin circulation
  • Method of preventing counterfeit coin circulation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] The process of making coins and judging their authenticity, cf. figure 1 .

[0032] 1. Chips are embedded in coins when making coins, and each chip corresponds to a unique code;

[0033] 2. Allocate corresponding storage space for each code on the cloud server;

[0034] 3. The initial identification code is randomly set when the coin leaves the factory, and is stored in the corresponding storage space of the chip and cloud server chip code respectively;

[0035] 4. The mobile phone is connected to a special coin reader through the interface;

[0036] 5. The coin reader scans the coin to obtain the chip code and the identification code stored on the chip;

[0037] 6. Find the identification code under the chip code storage space on the cloud server;

[0038] 7. Compare the two: if they are inconsistent, it means that it is a counterfeit currency, and the transaction or circulation is stopped; if they are inconsistent, it cannot be proved that it is a counterfeit curr...

Embodiment 2

[0046] The process of writing and reading the identification code is as follows, refer to figure 2 .

[0047] 1. The plaintext is encrypted by the private key 1 of the coin reader to form ciphertext 1

[0048] 2. Issue a write request

[0049] 3. The chip is decrypted with the public key 1 of the coin reader

[0050] 4. Determine whether the identification code is successfully decrypted: if not, it means that the ciphertext is not credible, and the write request is rejected; if yes, follow-up operations

[0051] 5. Accept the write request and write the identification code

[0052] 6. Encrypt the identification code with the public key 2 in the coin chip to form ciphertext 2

[0053] 7. Transfer the ciphertext 2 to the cloud server

[0054] 8. Use the private key 2 stored on the cloud server to decrypt

[0055] 9. Restore the identification code stored in the chip

[0056] Among them, the public key and the private key are used in pairs, the ciphertext encrypted with t...

Embodiment 3

[0058] The process of writing the initial identification code is as follows:

[0059] 1. Store the public key 2 in the coin chip when leaving the factory, and store the private key in the cloud server;

[0060] 2. Encrypt the identification code with the public key 2 in the coin chip to form ciphertext 2;

[0061] 3. Transfer the ciphertext 2 to the cloud server;

[0062] 4. Decrypt with the private key 2 stored on the cloud server.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method of preventing counterfeit coin circulation. According to the present invention, when a coin is produced, a chip having a unique code is embedded in the coin, and an initial identification code is stored in the chip, so that the true and false identification of the coin can be finished by utilizing the one-to-one correspondence relation of the chip code and the identification code, and accordingly, the counterfeit difficulty of the coin is increased, and the counterfeit coin circulation is reduced.

Description

technical field [0001] The invention relates to the technical field of authenticity identification of coins, in particular to a processing method for preventing coin circulation. Background technique [0002] At present, the main coin identification methods include the following aspects: [0003] 1. Pattern: The real coin has a fine pattern, and the text of the pattern is complete, clear, and full, and the edges are evenly cleared. (refer to patent document 1) [0004] 2. The edge of the round frame: the real coin adopts the edge printing technology, and the edge thickness is uniform. (refer to patent document 2) [0005] 3. Material: genuine coins are uniform in quality, smooth and shiny, and have stable electromagnetic properties. Such as electrical conductivity, magnetic properties (refer to Patent Document 2) [0006] 4. Craftsmanship: genuine coins may include special anti-counterfeiting crafts such as miniature patterns, invisible engraving, silk-teeth rolling, ed...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07D5/00H04L29/06H04L29/08
CPCG07D5/00H04L63/0442H04L67/1097
Inventor 亓兵
Owner 北京云知科技有限公司