Produc identification label coding and authentication method
A technology of identity marking and coding method, applied in the fields of instruments, data processing applications, computing, etc., can solve the problems that the coding scheme cannot realize the authentic identity marking code, there is no mature matching coding technology, and the cost of the chip is high.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 2
[0061] Example 2 uses the resident identity card of the applicant of the present invention as an example. Refer to the 64-bit structure and the vector and code tables given above, the structure code of the legal ticket layer should be: 01, and the item structure code is the ID code: 000001. According to the agreement with the Ministry of Public Security, the name of the public security sub-bureau that issued the certificate and the four Chinese characters "Qiaoxi Sub-bureau" are the codes of "QXFJ": 11000, 10111, 00101, 01001. The brand position is: 0, which means it is an unregistered trademark. The geographical division of the subject of the authentic product should be Shijiazhuang code: 0000011. According to the corresponding ethnic Chinese and gender male code: 1000001. If a 26-bit individual sequence code is used, a capacity of more than 60 million can be guaranteed, which is enough for male citizens in the Qiaoxi area of Shijiazhuang. Therefore, the 72-bit structure code i...
Embodiment 4
[0067] Embodiment 4 Others are reserved for the unforeseen emergence of authentic identity categories. This kind of demand may arise when the address of the virtual world such as the network world will appear. Using 11000000 to represent the secondary classification code of the network world, using four Chinese character codes plus a 4-digit check code to determine the identity of the subject of the network world, and directly leaving the 32-bit IP address as the identity code of the virtual subject is a simple and feasible method , Also in line with the basic technical idea of the present invention.
[0068] The authentication method matching this coding method has been given above. In order to further improve the method, a database of obsolete one-time-use logo codes can be set up in the specific storage area of the server of the dedicated website of the certification subject, fast search index and certification priority logo can be set, and then the claim 6 can be transferr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More