Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for authenticating information medium

A medium and feature information technology, applied in the Internet field, can solve the problems of accuracy and low accuracy.

Active Publication Date: 2017-10-10
北京创享合一管理咨询有限公司
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the above solution, the verification of online shopping products is only carried out by the customer through the key information of the ordered product. The key information is obtained by decrypting the QR code on the product through the random code received by the customer. The accuracy of the verification depends on Based on the customer's personal judgment, the accuracy is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for authenticating information medium
  • Method and device for authenticating information medium
  • Method and device for authenticating information medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0038] The terms "first", "second", "third" and "fourth" (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects without necessarily using Used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein can be practiced in sequences other than those ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for authenticating an information medium. The method comprises the following steps: receiving at least one piece of characteristic information of the information medium from a first terminal; generating an identifier associated with the at least one piece of characteristic information; sending the identifier to the first terminal so as to be applied to the information medium; receiving one or more verification requests on relevance of the identifier and the at least one piece of characteristic information from one or more second terminals in at least one piece of second terminal equipment; and verifying each of the one or more verification requests and at least determining an authenticated estimation value of the information medium according to one or more verification results. The method provided by the invention can more accurately and efficiently verify network transaction articles and can bring a technical scheme with better experience to a user.

Description

technical field [0001] The invention relates to Internet technology, in particular to a method and device for authenticating information media. Background technique [0002] With the rapid development of network, communication and information technology, e-commerce has become increasingly popular and has become an indispensable part of people's life and work. E-commerce conducts transaction activities and related service activities in the form of electronic transactions based on the network, which makes transactions more convenient, but also puts forward higher requirements for transaction security. For example, the verification of items traded online is an urgent technical problem to be solved in e-commerce. Failure to effectively identify the authenticity of transaction items will directly lead to e-commerce participants losing confidence in transaction security. [0003] Chinese patent application "A System and Method for Online Shopping Commodity Tracking and Verificat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K17/00
CPCG06K17/0022
Inventor 苗燕民
Owner 北京创享合一管理咨询有限公司