Dual-code symmetric anti-faking method

A symmetric and anti-counterfeiting identification technology, applied in the field of data identification, can solve the problems such as the inability to continue to sell goods, consumers unable to verify the authenticity of goods, and affecting the normal sales of products.

Inactive Publication Date: 2005-06-29
BEIJING ZHONGLIAN ZHAOXIN NETWORK INFORMATION TECH
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (1) Consumers cannot verify the authenticity of the product before purchasing the product: the unique set of anti-counterfeiting numbers assigned to each product by the anti-counterfeiting system can only be effectively queried once. If you buy this product, the product will no longer be available for sale
[0009] (2) Enterprise personnel and government personnel cannot normally check the authenticity of products sold on the market: Since each set of anti-counterfeiting numbers can only be effectively queried once, enterprise personnel and government personnel cannot take the initiative to sample products sold on the market detection, otherwise it will affect the normal sales of the product
[0010] (3) Retailers and shopping malls cannot conduct sampling inspections on the commodities purchased by purchasing personnel
Due to the existence of the above-mentioned problems, products that adopt digital anti-counterfeiting can only rely on the inquiries of consumers after purchase to find problems, and enterprise personnel, government personnel, and sellers in the entire commodity circulation link cannot inspect the products. In addition, not every consumer will conduct anti-counterfeiting inquiries in practical applications. Counterfeiters take advantage of the above-mentioned loopholes to boldly copy anti-counterfeiting numbers in batches, even if the anti-counterfeiting numbers of some products are found to be counterfeit when consumers inquire. Copying digital, but other products that are also counterfeit and copied with anti-counterfeiting digital can still continue to be sold in the market

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dual-code symmetric anti-faking method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The dual-code symmetric anti-counterfeiting method includes the following operating procedures:

[0030] 1. Coding of symmetrical anti-counterfeiting digital

[0031] The code of symmetrical anti-counterfeiting digital is two groups of 16-21 digits. Now take the 16-bit coding method as an example to illustrate the following:

[0032]

[0033] The coding structure is explained as follows:

[0034] No. 1-3: Company code, which can compile the codes of 1000 companies;

[0035] No. 4: Product code, 10 kinds of product codes can be compiled;

[0036] Digits 5-6: Lot code, not fixed, it can be two digits or three digits. Identify the batch number of each batch of anti-counterfeiting codes;

[0037] Digits 7-15: Serial code, which indicates the serial number of each set of anti-counterfeiting numbers for each product;

[0038] The 16th digit: Code type, which indicates the type of each group of anti-counterfeiting numbers. When the code type is 1, the group of anti-counterfeitin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

It is a double-code symmetric false proof method with two sets of codes of sixteen to twenty-one bits, which has a structure of corporation codes, product codes, sequence codes, and code type. It comprises the following steps: to compile two sets of structure as above through code type change and to form irregular false proof codes through coding and to store the each product false proof codes into the computer database; one set of codes are covered with a coat and the other is printed in the proof marks without coat; when the mark is stuck to the product to use communication means such as telephone to inquire the proof codes information and identify the products.

Description

Technical field: [0001] The invention relates to a data identification method, in particular to an anti-counterfeiting method composed of a password. Background technique: [0002] As we all know, the illegal circulation of counterfeit and shoddy goods not only greatly damages the vital interests of manufacturers and consumers, endangers social security, but also disrupts market order, and maintains stability for the brand building of manufacturers and related industry management departments. The market order has brought extremely bad influences, increasing the resistance of manufacturers to market construction and the difficulty of management departments to regulate and purify the market. [0003] In order to protect genuine products, prevent counterfeiting, and crack down on counterfeiters, numerous anti-counterfeiting technologies have sprung up on the scene. Although good results have been achieved to a certain extent, "the road is one foot high, the magic is high", and count...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
Inventor 陈尚志
Owner BEIJING ZHONGLIAN ZHAOXIN NETWORK INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products