Data protection method and system with anti-theft function

A data protection and functional technology, applied in the field of information authentication, can solve problems such as inconsistency between verification products and verification information, and achieve the effect of improving immutability, authenticity and uncertainty, and reducing the possibility of imitation

Pending Publication Date: 2021-09-21
庄定善
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a data protection method and system with an anti-theft function to solve the problem that the verification information corresponding to the verification information does not match the verification information due to imitation of the verification information. The technical solution adopted is as follows:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method and system with anti-theft function
  • Data protection method and system with anti-theft function
  • Data protection method and system with anti-theft function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] This embodiment proposes a data protection method with anti-theft function, such as figure 1 As shown, the method includes:

[0054] S1. Set one or more sets of combined check information on the check information carrier, wherein each set of combined check information includes two different check information; and, in the check information The number corresponding to the verification information is set on the carrier, that is, the carrier display number; wherein, the carrier display codes are set on the carrier in a non-overlapping manner;

[0055] S2. When the user scans the verification information, scrape off any verification information in all the combined verification information to expose another verification information for scanning;

[0056] S3. After the user scans the verification information, the number corresponding to the scanned verification information is retrieved from the verification system, that is, the system provides the number; wherein, the verific...

Embodiment 2

[0068] In this embodiment, the scheme is added on the basis of Embodiment 1. Specifically, the method also includes:

[0069] Step 1. When multiple groups of combined verification information are set on the verification information carrier, when the user randomly scrapes off any one of the verification information in any group of combined verification information, the verification information carrier Immediately destroy the verification information of all other combined verification information that has not been scraped by the user;

[0070] Step 2. The user obtains another verification information in the same combined verification information corresponding to the scraped verification information according to the randomly selected scraped verification information, and scans it;

[0071] Step 3. After the user scans the verification information, the number corresponding to the scanned verification information is retrieved from the verification system, that is, the system provid...

Embodiment 3

[0076] This embodiment is a further limitation of the data protection method with an anti-theft function proposed in Embodiment 1, specifically, the number corresponding to the scanned verification information is retrieved from the verification system in S3, include:

[0077] S301. When multiple groups of combined verification information are set on the verification information carrier, the verification system stores a system display code corresponding to each verification information in each group of combined verification information;

[0078] S302. After the user selects and scans the verification information, the verification system extracts and displays the system display code corresponding to the verification information, and at the same time records the time when the system display code corresponding to the verification information is displayed for the first time;

[0079] S303. Lock the verification information carrier where the verification information corresponding to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data protection method and system with an anti-theft function. The method comprises the following steps: setting one or more groups of combined verification information on a verification information carrier, and when a user scans the verification information, scraping any one piece of verification information in all the combined verification information, and exposing the other piece of verification information for scanning; after a user scans verification information, calling a serial number corresponding to the scanned verification information from a verification system, that is, the system provides the serial number; enabling the user to compare the carrier display number with the system providing number, and if the carrier display number is consistent with the system providing number, indicating that the verification information is true; and if the carrier display number is inconsistent with the number provided by the system, indicating that the verification information is forged. The system comprises modules corresponding to the steps of the method.

Description

technical field [0001] The invention proposes a data protection method and system with an anti-theft function, belonging to the technical field of information authentication. Background technique [0002] In today's society, the most important thing for merchants to make their products occupy the market is to establish their own brands. However, counterfeit products inevitably appear in the market. In order to protect their own interests, merchants usually use anti-counterfeiting labels on their products to help consumers identify the authenticity of their products. However, anti-counterfeiting labels have also been embezzled and copied in large quantities for counterfeit goods in the process of circulation, which has damaged the brand image of merchants and seriously affected the interests of consumers. [0003] With the continuous development of science and technology, verification information has become a widely used method of information verification. However, when the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06Q30/00
CPCG06F21/64G06Q30/0185
Inventor 庄定善
Owner 庄定善
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products