General anticounterfeiting method and system
A label and product technology, applied in the field of product authenticity identification, can solve problems such as failure, failure to explore the actual use of public key encryption, and consumers at a loss.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] Referring now to FIG. 1 , a schematic diagram of an overall process of the system of the present invention consists of a central authority (CA) website and an internal database, RFID / smart card tags, RFID / smart card tag readers, and well-defined programs. The participants in the process are the vendor, the consumer, and the employees of the CA (a.k.a. the CA), and some innovations are implemented as steps in the process. The CA website 1.10 has three main functions: as a private key repository, as a portal for manufacturers to register and obtain their own private keys and sell product IDs, and as a label interpretation for consumers to authenticate their use the entrance of the device. CA website 1.10 must be an authorized organization, and its url must be fully disclosed and known to everyone. The internal database 1.13 is used to store all data such as private key sets and registration information of manufacturers.
[0035] RFID / smart card tags 1.11 are incorporate...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


