Encoding method for condition code of false proof code

An encoding method and anti-counterfeiting code technology, applied in the field of anti-counterfeiting data storage, can solve the problems of loss of anti-counterfeiting digital anti-counterfeiting effect, increase system maintenance cost, affect system query speed, etc., to prevent data leakage, reduce operation and maintenance costs, and improve availability. Effect

Inactive Publication Date: 2005-06-29
BEIJING ZHONGLIAN ZHAOXIN NETWORK INFORMATION TECH
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (2) The verification system must store all the anti-counterfeiting numbers. The consequence of this is that when the system is attacked by hackers, all the anti-counterfeiting numbers of the system will be leaked to the intruder, thus losing the anti-counterfeiting effect of the anti-counterfeiting numbers
[0005] (3) Since each anti-counterfeiting code is stored in the system, with the gradual promotion of the system business, the capacity of the database will rapidly increase geometrically, which greatly affects the overall query speed of the system and increases the maintenance cost of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encoding method for condition code of false proof code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] 1. Anti-counterfeiting code coding

[0019] The encoding of the anti-counterfeit number is a number of 16-21 digits. Now take the encoding method of 16 digits as an example to illustrate as follows:

[0020]

[0021] The encoding structure is described as follows:

[0022] 1st to 3rd place: enterprise code, which can compile the codes of 1000 enterprises;

[0023] The 4th digit: product code, which can compile 10 kinds of product codes;

[0024] The 5th and 6th digits: batch code, not fixed, can be two digits, can be said to be three digits. Identify the batch number of each batch of anti-counterfeiting codes;

[0025] No. 7-16: serial number, indicating the serial number of each group of anti-counterfeiting numbers of each product;

[0026] According to the above encoding rules, a set of plaintext codes can be compiled for each product, and through the encryption of the encryption algorithm, the plaintext codes become irregular anti-counterfeiting numbers.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

It is a false proof character coding method, which comprises the following steps: first to code each product with clear code on batch; to turn the irregular false proof data though coding; the characteristic code generate a set of code according to the above code with sequence zero, which are the characteristic coded of the false proof codes; to turn these set o f codes into irregular codes; to store these coded in the computer database; to decode the characteristic codes into clear codes; the batch of false codes can be used in searching when this batch of codes are stored in the database.

Description

Technical field: [0001] The invention relates to a data storage method, in particular to an anti-counterfeiting data storage method encoded by a feature code. Background technique: [0002] The Chinese patent-password anti-counterfeiting marker (application number: 95203425.5) applied on February 7, 1995 is composed of an anti-counterfeiting information carrier layer, a printed code, a password (orientation information) printing layer and a cover layer; the code and the password form a code It is recorded and stored in the computer identification system database that provides consumers with verification password services. Consumers can enter codes into the computer identification system through telephone, fax, and the Internet to verify the authenticity of the product. It will identify the authenticity of the product. It is not easy to forge and easy to identify. The "National Code Telephone Anti-counterfeiting System Project" organized and promoted by the China Anti-counter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K5/00
Inventor 陈明晨
Owner BEIJING ZHONGLIAN ZHAOXIN NETWORK INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products