Object trusted identity secure coding method
A security coding and identity technology, applied in the field of trusted identity security coding of things, can solve the problems of counterfeiting, forgery, tampering, and increasing security risks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0021] The present invention will be further described below. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.
[0022] Assume that the original code of the object is M, the name code of the manufacturer is N, the production date is P, and the production batch is Q. (M+N+P+Q) forms a complete description of the properties (or attributes) of the thing. We first define the summary of the information of the manufacturer of the object as H, that is: H=N+P+Q, if it is expected to use this method for security protection, then construct the security protection coding formula H'=f(x, H), x is the variable factor parameter, and f is the coding logic. M is the original information of the user, including the affiliated unit, scope of use, control level, etc., which are coded according to the coding rules of the user. Similarly, use the above method to construc...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com