Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for interactive testing and verifying instant mobile communication commodity cipher

A technology of interactive verification and mobile communication, which is applied in the field of devices for real-time mobile communication commodity password interactive verification, and realizes the above method, which can solve problems such as long busy time, difficult operation, counterfeiting, etc., to improve management security and optimize verification Moderate investment in systems and equipment

Inactive Publication Date: 2005-12-14
刘贺田
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The above method has the following disadvantages, namely: the consumer does not directly conduct real-time interactive verification with the manufacturer, so it cannot guarantee that the manufacturer’s commercial secrets will not be leaked to third parties, and the product data and anti-counterfeiting marks are easy to forge, and the security is poor; for example: Anti-counterfeiters can also establish a fake "anti-counterfeiting system" through professional anti-counterfeiting agencies, and can conduct anti-counterfeiting verification of their "products". Such an anti-counterfeiting system has low investment and is easy for counterfeiters to cheat in it; It is managed by a professional anti-counterfeiting agency, so the anti-counterfeiting phone is easy to get busy, it is very inconvenient to use, and the busy time for one verification is longer
[0004] At present, mobile communication systems are also used to send text messages for verification, but only for mobile phone-to-mobile phone verification. However, since only a few mobile phone numbers can be reserved on the same type of product, it is easy to cause line congestion. Specifically more difficult to operate
[0005] For the anti-counterfeiting system, there is also a larger system solution, that is, to use a special code reading device to read the closed password (which cannot be read by humans), and then transmit data through the Internet, and verify it in a special data center. Such a system has the following Disadvantages: The system is huge and the investment in equipment is large, because all sales outlets must have special code-reading equipment connected to the Internet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for interactive testing and verifying instant mobile communication commodity cipher
  • Method and apparatus for interactive testing and verifying instant mobile communication commodity cipher
  • Method and apparatus for interactive testing and verifying instant mobile communication commodity cipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] A kind of instant mobile communication commodity password interactive authentication method of the present invention, such as figure 1 As shown in the figure, A represents the password data, B represents the verification result data, the dotted line represents the wireless transmission, and the solid line represents the transmission through the wired network. The verification method includes the following steps in turn:

[0031] 1. The consumer sends a short message through the mobile phone 1, and sends the anti-counterfeiting password of the product to the short message relay station 2; the anti-counterfeiting password is a password generated by the manufacturer through a special calculation method, and the anti-counterfeiting password contains the manufacturer's password. code; the anti-counterfeiting password can be composed of 12 to 14 English characters;

[0032] 2. The short message relay station 2 first identifies the manufacturer's code represented by the anti-c...

Embodiment 2

[0040] Other conditions are identical with embodiment 1;

[0041] In order to do instant verification, such as figure 2 As shown, when the short message relay station 2 automatically diagnoses the failure of the wireless mode or the number of instantaneous calls exceeds the number of wireless short message transceiver modules through the analysis and diagnosis unit, it will automatically establish a connection with the Internet interface of the manufacturer, and send the password to the production through the network. The short message sending and receiving gateway 3 of producer, therefore, the 3rd step in embodiment 1, also can be:

[0042] 3. After the short message relay station 2 identifies the manufacturer's code, the short message relay station 2 forwards the password to the short message sending and receiving gateway 3 of the commodity manufacturer through the Internet.

[0043] Such as Figure 4 As shown, the encrypted data sent by the centralized control processor ...

Embodiment 3

[0045] Other conditions are identical with embodiment 1 and embodiment 2,

[0046] In order to do instant verification, such as image 3 As shown, when the verification result is transmitted to the short message sending and receiving gateway 3 by the product data center 4, when the centralized control processor 5 automatically diagnoses that the wireless mode is faulty, or when the number of instantaneous calls exceeds the number of wireless short message sending and receiving modules, the centralized control process Device 5 can also transmit verification result to short message relay station 2 through Internet, therefore, in the 5th step in embodiment 1 and embodiment 2, also can be:

[0047] 5. The result of verification is returned to the short message sending and receiving gateway 3, and the short message sending and receiving gateway 3 sends the result to the short message relay station 2 through the Internet, and then the short message relay station 2 sends the result t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention is real-time interactive commodity cipher verifying mobile communication method and equipment. The method includes: for the consumer to send short message of commodity anti-fake code to the short message relay station, for the short message relay station to identify the producer code and transfer the anti-fake cipher to the short message transceiving gateway of the producer, for the short message transceiving gateway to transmit the anti-fake cipher to the product data center, and for the product data center to verify the truth and transmit the verification result to the consumer. The interactive commodity cipher verifying method and equipment of the present invention may have short message relay station shared by several producers, so as to verify the truth of products fast and in real time.

Description

technical field [0001] The invention relates to a method for interactively verifying commodity passwords, in particular to a method for interactively verifying commodity passwords for instant mobile communication, and also relates to a device for realizing the above method. Background technique [0002] The common commodity password interactive verification method is mainly realized by the following method. First, the professional anti-counterfeiting organization prints the anti-counterfeiting mark on the product trademark or on the package, and stores the information of the anti-counterfeiting password in the database of the professional anti-counterfeiting organization. The trademark and packaging are provided to the manufacturer. After the product is put into the market, when the consumer purchases the product, he opens the anti-counterfeiting mark. The consumer connects with the professional anti-counterfeiting organization by dialing a phone, and transmits the password t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Inventor 刘贺田
Owner 刘贺田