Unlock instant, AI-driven research and patent intelligence for your innovation.

Produc identification label coding and authentication method

A technology of identity marking and coding method, applied in the fields of instruments, data processing applications, computing, etc., can solve the problems that the coding scheme cannot realize the authentic identity marking code, there is no mature matching coding technology, and the cost of the chip is high.

Inactive Publication Date: 2006-10-25
徐超英
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, although there are some standards on the classification of articles in the world, the coding schemes designed with the help of these standards cannot realize the connotation represented by the authentic identification code, so although the carrier technology for coding has changed from barcode technology, magnetic card technology, IC chip technology has developed to a relatively advanced Rfid technology, but it still cannot stop the confusion of genuine and counterfeit products
Radio frequency tag technology is one of the most advanced identification technologies today, but currently there is no unified digital classification rule that can be followed in the world; the use of this technology is mostly limited to logistics; resulting in relatively high chip costs
This technology is used in the authenticity confirmation technology of items, and no mature supporting coding technology has yet appeared.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0061] Example 2 uses the resident identity card of the applicant of the present invention as an example. Refer to the 64-bit structure and the vector and code tables given above, the structure code of the legal ticket layer should be: 01, and the item structure code is the ID code: 000001. According to the agreement with the Ministry of Public Security, the name of the public security sub-bureau that issued the certificate and the four Chinese characters "Qiaoxi Sub-bureau" are the codes of "QXFJ": 11000, 10111, 00101, 01001. The brand position is: 0, which means it is an unregistered trademark. The geographical division of the subject of the authentic product should be Shijiazhuang code: 0000011. According to the corresponding ethnic Chinese and gender male code: 1000001. If a 26-bit individual sequence code is used, a capacity of more than 60 million can be guaranteed, which is enough for male citizens in the Qiaoxi area of ​​Shijiazhuang. Therefore, the 72-bit structure code i...

Embodiment 4

[0067] Embodiment 4 Others are reserved for the unforeseen emergence of authentic identity categories. This kind of demand may arise when the address of the virtual world such as the network world will appear. Using 11000000 to represent the secondary classification code of the network world, using four Chinese character codes plus a 4-digit check code to determine the identity of the subject of the network world, and directly leaving the 32-bit IP address as the identity code of the virtual subject is a simple and feasible method , Also in line with the basic technical idea of ​​the present invention.

[0068] The authentication method matching this coding method has been given above. In order to further improve the method, a database of obsolete one-time-use logo codes can be set up in the specific storage area of ​​the server of the dedicated website of the certification subject, fast search index and certification priority logo can be set, and then the claim 6 can be transferr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a trueness article identity flag code encoding and authenticating method. Said code uses binary Number formed series encoding individual trueness article identity. The matched authenticating method includes setting-up profession web site and dedicated server, adopting special reader reading and then sending to dedicated servers confirming, the confirmed information fed back to reader, according to said code structural feature designing authenticating management program and step, according to standard vector code table to proceed partitioning, section check authenticating and secondary authenticating combination, to raise authenticating accuracy.

Description

Technical field [0001] The present invention relates to a technology for the compilation and authentication of information passwords, specifically to a method for the compilation and authentication of codes used to indicate the smallest individual identity of genuine products. Background technique [0002] Genuine product is a term with a broad and rich connotation. It can be a designated product, or a service representing an organization or brand, or a legal and valid certificate, photo, ticket, or evidence with a certain actual value, or a real event with a wide range of content. There are two commonalities in the connotation represented by the authentic product. One is the only subject that indicates the manufacture or legal possession of the authentic product, and the other is the only object that indicates the smallest unit of authenticity that has the legal status. The two uniquenesses determine the uniqueness of the genuine product on a global scale, and at the same time, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q90/00G06Q50/00
Inventor 徐超英王斌曹瑜
Owner 徐超英