TW200540718A - Method for verifying genuineness of object - Google Patents

Method for verifying genuineness of object Download PDF

Info

Publication number
TW200540718A
TW200540718A TW94103630A TW94103630A TW200540718A TW 200540718 A TW200540718 A TW 200540718A TW 94103630 A TW94103630 A TW 94103630A TW 94103630 A TW94103630 A TW 94103630A TW 200540718 A TW200540718 A TW 200540718A
Authority
TW
Taiwan
Prior art keywords
verification code
article
item
authenticity
verifying
Prior art date
Application number
TW94103630A
Other languages
Chinese (zh)
Other versions
TWI257578B (en
Inventor
Yin-Hong Ceng
Original Assignee
Userstar Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Userstar Information Co Ltd filed Critical Userstar Information Co Ltd
Priority to TW94103630A priority Critical patent/TWI257578B/en
Priority to US11/123,183 priority patent/US20060005027A1/en
Priority to MYPI20052054A priority patent/MY137667A/en
Priority to CA002507320A priority patent/CA2507320A1/en
Priority to AU2005202296A priority patent/AU2005202296B2/en
Priority to JP2005157151A priority patent/JP4342476B2/en
Priority to BR0502067-0A priority patent/BRPI0502067A/en
Publication of TW200540718A publication Critical patent/TW200540718A/en
Application granted granted Critical
Publication of TWI257578B publication Critical patent/TWI257578B/en

Links

Landscapes

  • Credit Cards Or The Like (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

There is provided a method for verifying genuineness of an object, which includes generating a variable value; generating a first verification code based on the variable value; generating a second verification code based on the variable value and a unique identification number of the object; generating a confirmation code based on any two of the first verification code, the second verification code and the identification number of the object; and confirming the object to be genuine when the confirmation code matches with the remaining one of the identification number of the object, the second verification code, and the first verification code.

Description

200540718 九、發明說明: 【發明所屬之技術領域】 本發明是有關於一種防偽太 戶白 > 摊w从口古 、法’特別是指一種能使用 戶自订辨別物σ口真偽的驗證物品真偽的方法。 【先如技術】 隨著經濟發展及消費型態改 ,^ ^ σ ^, 殳仿目。口日亦猖獗,且 ::品的仿冒程度幾乎是以假亂真,使消費者難以辨別。 1仿Γ冒品充斥著整個市場,已嚴重影響市場交易秩序 康及生命之虞。類商品’更有危害消費者健 :目前市面上普遍採用的防偽雷射標籤、或晶片、或 告第57則號之防偽辨識方法,雖然都可以辨視商 :口 2,卻必須透過特殊的辨識工具,因此,—般講買 ^的消費者根本無法制,而只能供廠商、或商店職員 再者,仿冒者也可利用高解析度的掃描及印刷技術 防偽雷射標籤,所以,防偽雷射標籤已 今的防偽需求。 【發明内容】 識物!此,本發明之目的,即在提供一種可供用戶自行辨 二。的真偽,及可重覆使用而不失效的驗證物品真偽的 万法。 ’ 於是, 客服端提供 驟:步驟一 本發明之驗證物品真偽的方法,主要是配合一 一查詢界面進行查詢,該防偽方法包含下列步 •產生一秘密的變動值,並依據該變動值產生 5 200540718 一第一驗證代碼,及依據該變動值與該物品一獨特的順序 號產生一第二驗證代碼。步驟二··依據該第一驗證代碼、 第二驗證代碼與該物品順序號其中兩者產生一證實代碼, 該證貫代碼是與該物品順序號、第二驗證代碼、第一驗證 代碼餘下的一者相互吻合。。 本發明的功效是能確實達到防偽的目的,而不會有失 效的情形。 【實施方式】 有關本發明之前述及其他技術内容、特點與功效,在 以下配合參考圖式之一個較佳實施例的詳細說明中,將可 清楚的呈現。 參閱圖1,本發明之驗證物品真偽的系統1 〇〇的較佳實 施例主要是貼附於一物品200上。 該物品200可以是市面上販售的任何物體、藝術創作 品、債券、證書…等等’並分別標示有一公開的順序號 (Serial No),如 “GU814567899”。 該系統100包含有一驗證碼產生器1及一用戶的查詢 界面2。該驗證碼產生器1包含一晶片丨丨、一啟動件12及 一顯示幕13。 該晶片11是能產生一可變動的秘密變動值,並依據該 變動值產生一第一驗證代碼(AC1),及依據該變動值與該物 品200的順序號(SN)產生第一驗證代碼(AC2),關於此點, 以下會有更詳細的敍述。 該晶片11在本實施例是一種無線射頻辨識標籤(RFID) 200540718 晶片碼(Chip 一 Code) Βθ /ί ,’003027033001029,,,該 a y ^ 曰 馬在本貫施例中是作為該物品 的辦識號。 該啟動件12是可啟動哕θ 勒系日日片11。該啟動件12可以是 一音控裝置、一觸控裝置、— 罝一按鍵裝置、一定時自動演算 裝置、無線傳輸裝置….等。 該顯示幕13在本實施例是與該晶片11連接,並可顯示 該第-驗證代碼(AC1)與該第二驗證代碼(AC2)。 在+例況明本發明防偽方法的步驟之前,先列舉七個 對照表,供說明使用:200540718 IX. Description of the invention: [Technical field to which the invention belongs] The present invention relates to a type of anti-counterfeiting wares >> From the ancient times, the law 'especially refers to a type of verification that enables users to customize the discriminator σ mouth. The method of authenticity of items. [Xueru Technology] With the economic development and consumption pattern change, ^ ^ σ ^, imitate the project. Oral life is also rampant, and the degree of counterfeiting of :: products is almost fake, making it difficult for consumers to distinguish. 1 The imitation of fake products floods the entire market and has seriously affected the order of market transactions. 'Class products' are more harmful to consumers' health: the anti-counterfeit laser tag, or chip, or the 57th anti-counterfeit identification method commonly used in the market, although they can all be identified by the quotient: port 2, but must pass through special Identification tools, so, generally speaking, consumers who buy ^ can't make it at all, and can only provide it to manufacturers or store staff. Counterfeiters can also use high-resolution scanning and printing technology to prevent false laser labels. Laser labels are now in demand for security. [Summary of the invention] Knowledge! Therefore, the object of the present invention is to provide a method that can be identified by the user. Authenticity, and methods to verify the authenticity of items that can be reused without lapse. 'Therefore, the customer service terminal provides a step: the method of verifying the authenticity of the article according to the present invention, which is mainly used in conjunction with the one-to-one query interface to perform an inquiry. The anti-counterfeiting method includes the following steps 5 200540718 A first verification code and a second verification code based on the change value and a unique sequence number of the item. Step Two: A verification code is generated based on the first verification code, the second verification code, and the article sequence number. The verification code is the remainder of the article sequence number, the second verification code, and the first verification code. One matched each other. . The effect of the present invention is that the purpose of anti-counterfeiting can be surely achieved, and there is no failure. [Embodiment] The foregoing and other technical contents, features, and effects of the present invention will be clearly presented in the following detailed description of a preferred embodiment with reference to the drawings. Referring to FIG. 1, a preferred embodiment of the system 100 for verifying the authenticity of an article of the present invention is mainly attached to an article 200. The article 200 may be any object, artistic creation, bond, certificate, etc., sold on the market, and is marked with a public serial number, such as "GU814567899". The system 100 includes a verification code generator 1 and a user's query interface 2. The verification code generator 1 includes a chip, a starter, and a display screen. The chip 11 is capable of generating a variable secret change value, generating a first verification code (AC1) based on the change value, and generating a first verification code based on the change value and the sequence number (SN) of the article 200 ( AC2), this point will be described in more detail below. The chip 11 in this embodiment is a radio frequency identification tag (RFID) 200540718 Chip-Code Βθ / ί, '003027033001029,', the ay ^ horse is used as the office of the article in this embodiment. Identification number. The starting member 12 is a Japanese-Japanese film 11 that can be activated. The activating member 12 may be a sound control device, a touch device, a one-button device, a certain time automatic calculation device, a wireless transmission device, etc. The display screen 13 is connected to the chip 11 in this embodiment, and can display the first authentication code (AC1) and the second authentication code (AC2). Before + examples illustrate the steps of the anti-counterfeiting method of the present invention, seven comparison tables are listed for illustrative purposes:

對照表一Comparison table one

佰 位 年 /^N 碼 紹: 以 ,2 佰子 江年(例· 2004年之〇〇4),可以『二碼』代表, 26 1文字母及6個數字共32字,依32進位法 數字值,足可得1024個值,足以代表g99之 ίι年值。 白 位 年 000 001 002 003 004 005 … 027 028 029 030 031 032 033 代 表 AA AB AC AD AE AF A1 A2 A3 A4 A5 A6 BA 對照表二 200540718 月 別 0 1 02 03 04 05 06 07 08 09 10 11 12 隨 月 組 A Β C D Ε F G Η I J Κ L 機 碼 組 Μ Ν 0 Ρ Q R S Υ υ V W X 組 取 組 Υ Ζ 1 2 3 4 5 6 7 8 9 0 對照表三 01 02 03 04 05 06 07 08 09 10 曰 1 2 3 4 5 6 7 8 9 0 11 12 13 14 15 16 17 18 19 20 石馬 A B C D Ε F G Η I J 21 22 一2 3 24 2 5 26 27 28 29 30 31 K L Μ Ν 0 Ρ Q R S T U 1Hundred-digit year / ^ N code description: Take 2 Hundred Years of Jiangxi (for example, 2004; 2004), which can be represented by "two-code", 26 1-letter letters and 6 digits totaling 32 words, according to the 32-round method The numerical value is enough to get 1024 values, which is enough to represent the year value of g99. Year of the white 000 000 001 002 003 004 005… 027 028 029 030 031 032 033 stands for AA AB AC AD AE AF A1 A2 A3 A4 A5 A6 BA Month group A Β CD Ε FG Η IJ Κ L machine code group Μ Ν 0 Ρ QRS Υ υ VWX group take group Υ ZO 1 2 3 4 5 6 7 8 9 0 Table 3 01 02 03 04 05 06 07 08 09 1 2 3 4 5 6 7 8 9 0 11 12 13 14 15 16 17 18 19 20 Shima ABCD Ε FG Η IJ 21 22 1 2 3 24 2 5 26 27 28 29 30 31 KL Μ Ν 0 Ρ QRSTU 1

對照表四Table 4

時 1 2 3 4 5 6 7 8 9 10 11 12 A B C D E F G H I J K L 碼 13 14 15 16 17 18 TT r20^ 2 1 22 23 24 M N 0 P Q R S T U V W X 對照表五 代碼 排列法 記憶碼 A 1-3-2-4-5-6-7 B-QAE-UI3-024-A B 5-1-2-3-4-7-6 1-BAE-QU3-024-B C 5_6-7-1-2-3-4 1-302-4BA-EQU-C D 2-3-4-7-6 - 1 - 5 A-EQU- 2 3 4 - 0 B1 -D • · · … … 對照表六 2005407181 2 3 4 5 6 7 8 9 10 11 12 ABCDEFGHIJKL code 13 14 15 16 17 18 TT r20 ^ 2 1 22 23 24 MN 0 PQRSTUVWX lookup table five code arrangement method memory code A 1-3-2-4-5 -6-7 B-QAE-UI3-024-AB 5-1-2-3-4-7-6 1-BAE-QU3-024-BC 5_6-7-1-2-3-4 1-302- 4BA-EQU-C D 2-3-4-7-6-1-5 A-EQU- 2 3 4-0 B1 -D • · ·…… Table 6 200540718

~^^ΤΒΑΑΒΑλ00λ074 A" 1324Ϊ243~ ^^ ΤΒΑΑΒΑλ00λ074 A " 1324Ϊ243

ADA1A309BAAR^024 B C ADA1BAAB3024 A309 CADA1A309BAAR ^ 024 B C ADA1BAAB3024 A309 C

對照表七 參圖2,以下即針對本發明防偽方法的步驟結合實施例 說明如后:Comparison Table 7 Referring to FIG. 2, the following describes the steps of the anti-counterfeiting method of the present invention in combination with the embodiment, as follows:

步驟31 ·觸控邊啟動件12,使該驗證碼產生器i的晶片u 產生一秘密的變動值。在本實施例中,該變動值 的產生疋取決於日期和時間,例如,用戶在2〇〇4 年5月31日上午9點30分24秒觸控該啟動件 12,該驗證碼產生器i的晶片u產生的變動值為 ,丨20040531093024,,。 步驟32 :該驗證碼產生器i的晶片u會將變動值劃分為7 個小紐’例如,該變動值” 20040531093024,,中的 第一小組對應到"2”,第二小組對應到”〇〇4",第 二小組對應到"05”,第四小組對應到”3 1 ”,第五 小組對應到"09",第六小組對應到,,30",並且第 七小組對應到”24,,。 步驟33 :該驗證碼產生器丨的晶片u會依據前述對照表一 至對照表五中配置的符號代碼對應轉換每一個變 動值中第一至第五小組的數值,並保留第六、第 七小組的數值而不改變。值得注意的是,參對照 表一,第一小組(如”2")有三個對應的符號代碼(如 B、L、V),參對照表三,第三小組(如”05”)也有 200540718 三個對應的符號代碼(如E、Q、3),因此,該轉 換後的變動值有九種組合,其中之一是 nBAEQUI3024,f 。 步驟34 :然後,該驗證碼產生器1的晶片11會依據對照表 六交換變動值中七個小組的排列順序並儲存記憶 ,由對照表六中可以發現共有四萬五千三百六十 種的變化,如”AEQU2430Br 。 步驟35 :該晶片11會依據對照表六選擇變動值交換順序的 _ 符號代碼,使變動值交換排列順序後,獲得第一 ’ 驗證代碼(AC1),參對照表六,如選擇符號代碼為 nDn,則第一驗證代碼(ACl)g nAEQU2430BIDn。 值得一提的是,該第一驗證代碼(AC1)可直接以’’ 變動值”替代,也可以由步驟32〜步驟35產生。 步驟36 :將晶片11的晶片碼如π003027033001029π,劃分 成,’003,’、π027π、,’033’,、’’00Γ、,’029,’等五小組 ,並參對照表二轉換成’’八0,’、’’Α1”、”ΒΑΠ、ΠΑΒ” • 、,’A3’,。 值得注意的是,該物品200的順序號(SN)也可以同時 寫入該晶片11中,則該步驟36中,可以直接以該順序號 (SN)取代該晶片碼,且同樣將該順序號(SN)劃分成四小組 ,並參對照表二轉換。 步驟37 :該晶片11產生該第二驗證代碼(AC2)的演算步驟 之一是,將步驟36中轉換後的晶片碼"AD”、 ”Α1”、”ΒΑΠ、ΠΑΒΠ、ΠΑ3Π重組成十碼呈現,例以 10 200540718 ADA1BAABA3 代表 003027033001029。 步驟38 ··該晶片11產生該第二驗證代碼(AC2)的演算步驟 之二是,以變動值如”20040530093024"中取時、 分、秒,獲得”093024”。 步驟39:該晶片11會以步驟37的"ADA1BAABA3,,+步驟 38 的,,093024,’獲得,,ADA1BAABA3093024” 。 步驟40:該晶片 11 會將步驟 39 獲得之” ADA1BAABA3093024,,每四碼為一組,劃分為四 個組。第一組為"ADA1”,第二組為"BAAB”, 第 三組為π A3091’,並且第四組為"3024"。 步驟41 :該晶片11會依據對照表七交換步驟40中四個組 的排列順序並儲存記憶,由對照表七中可以發現 共有二十四種變化,如’fADAlBAABA3093024,, 〇 步驟42 :該晶片11會依據對照表七選擇交換順序的符號代 碼,獲得第二驗證代碼(AC2),參對照表七,如選 擇符號代碼為"B”,則第二驗證代碼(AC2)為” ADA1A309BAAB3024B”。 步驟43 :在本實施例,該用戶的查詢界面2是建構在一電 腦系統,且用戶是透過網際網路與該查詢界面2 取得聯繫,參圖3,關於用戶聯繫該查詢界面2 的步驟如下: 值得注意的是,該物品200的順序號(SN)是對應於該 晶片1的晶片碼,且該晶片碼與該物品200順序號的對應 11 200540718 關係,及對應於該晶片碼之第一驗證代碼(AC1)與第二驗證 代碼(AC2)的正反向演算公式是被記錄於該用戶查詢界面2 的儲存媒體(圖未示)中。 步驟5 1 :於該查詢界面2輸入該物品的順序號(SN)如 ,fGU814567899”後,若再輸入該晶片U獲得的第 一驗證代碼(AC1),則進行步驟52,若否,則進 行步驟61。 步驟52 :該查詢界面2會由步驟51中輸入的順序號(SN)找 到對應該晶片11的晶片碼。 步驟53 :該查詢界面2會依據步驟51輸入的第一驗證代碼 (AC1)反向執行步驟31至步驟35,並獲得該變動 值。 步驟54:該查詢界面2會依據步驟52的晶片碼,及步驟 53的變動值執行步驟36至步驟42產生並顯示一 證實代碼(VC)。 當步驟54產生的證實代碼(vc)與該晶片u產生的第 二驗證代碼(AC2)相同,則確定該物品2〇〇是真品,若不相 同’則確定該物品200是偽品。 步驟61 :於該查詢界面2輸入該物品的順序號(SN)後,若 再輸入該晶片11獲得的第二驗證代碼(AC2),則 進行步驟62,若否,則進行步驟71。 步驟62 :該查詢界面2會由步驟51中輸入的順序號(SN)找 到對應該晶片11的晶片碼。 步驟63 :該查詢界面2會依據步驟61輸入的第二驗證代碼 12 200540718 (AC2)反向執行步驟36至步驟42,並獲得該變動 值。 步驟64 ·•該查詢界面2會依據步驟63變動值執行步驟31 至步驟35,產生並顯示一證實代碼(vc)。 當步驟64產生的證實代碼(vc)與該晶片丨丨產生的第 一驗證代碼(AC1)相同,則確定該物品2〇〇是真品,若不相 同,則確定該物品200是偽品。 步驟71:於該用戶的查詢界面2輸入由該晶片丨丨產生的第 一驗證代碼(AC1)與第二驗證代碼(AC2)後,則進 行步驟72,若否,則進行步驟5 J。 步驟72 :該查詢界面2會依據步驟71輪入的第一、第二驗 證代碼(AC1、AC2)反向執行步驟31至步驟35, 並獲得該變動值。 步驟73 :該查詢界面2會依據步驟72的變動值及步驟71 的第一驗證代碼(AC1)反向執行步驟36至步驟42 11的晶片碼,找到對 ,獲得該晶片11的晶片碼。 步驟74 :該查詢界面2會依據該晶片 應的順序號(SN)。 當步驟74獲得的順序號(SN)鱼讀t Λλ ., .Step 31. The touch-side activation element 12 causes the chip u of the verification code generator i to generate a secret variation value. In this embodiment, the generation of the variation value depends on the date and time. For example, the user touches the activation member 12 at 9:30:24 on May 31, 2004, and the verification code generator The variation value of the chip u of i is, 20040531093024,. Step 32: The chip u of the verification code generator i divides the change value into 7 small buttons. For example, the change value "20040531093024", the first group corresponds to " 2 ", and the second group corresponds to" " 〇〇4 ", the second group corresponds to " 05 ", the fourth group corresponds to " 3 1 ", the fifth group corresponds to " 09 ", the sixth group corresponds to, " 30 ", and the seventh group corresponds to Go to "24". Step 33: The chip u of the verification code generator 丨 will convert the values of the first to fifth subgroups of each change value according to the symbol codes configured in the aforementioned comparison table 1 to comparison table 5, and retain them The values of the sixth and seventh groups are not changed. It is worth noting that, refer to Table 1, the first group (such as "2 ") has three corresponding symbol codes (such as B, L, V), and refer to Table 3. The third group (such as "05") also has 200540718 three corresponding symbol codes (such as E, Q, 3). Therefore, there are nine combinations of changes in the converted value, one of which is nBAEQUI3024, f. Step 34: Then, the chip 11 of the verification code generator 1 will exchange the arrangement order of the seven groups in the change value according to the comparison table 6 and store the memory. From the comparison table 6, a total of 45,360 types can be found. Change, such as "AEQU2430Br." Step 35: The chip 11 will select the _ symbol code of the change value exchange order according to the comparison table VI. After the change value exchange order, the first 'verification code (AC1) is obtained. If the selected symbol code is nDn, the first verification code (ACl) g nAEQU2430BIDn. It is worth mentioning that the first verification code (AC1) can be directly replaced by a `` change value '', or it can be performed by steps 32 ~ step 35 produced. Step 36: Divide the wafer code of wafer 11 such as π003027033001029π into five groups, such as '003,', π027π,, '033', and `` 00Γ ,, '029,', and refer to Table 2 to convert to '' 80, ',' Α1 ',' ΒΑΠ, ΠΑΒ '•,' A3 '. It is worth noting that the sequence number (SN) of the article 200 can also be written into the wafer 11 at the same time, then this step In 36, the serial number (SN) may be directly substituted for the chip code, and the serial number (SN) is also divided into four groups, and converted by referring to Table 2. Step 37: The chip 11 generates the second verification code. (AC2) One of the calculation steps is to reconstruct the chip codes " AD "," Α1 "," ΒΑΠ, ΠΑΒΠ, ΠΑ3Π "in step 36 into ten codes, for example, 10 200540718 ADA1BAABA3 represents 003027033001029. Step 38 · The second calculation step for generating the second verification code (AC2) by the chip 11 is to obtain "093024" by taking a change value such as "20040530093024". Step 39: The chip 11 will receive "ADA1BAABA3" in step 37, + 093024, 'Get, ADA1BAABA3093024 "in step 38. Step 40: The chip 11 will obtain" ADA1BAABA3093024 "in step 39, every four yards As a group, divided into four groups. The first group is " ADA1 ", the second group is " BAAB", the third group is π A3091 ', and the fourth group is " 3024 ". Step 41: The chip 11 will exchange the arrangement order of the four groups in step 40 according to the comparison table 7 and store the memory. There can be found a total of twenty-four changes in the comparison table 7, such as 'fADAlBAABA3093024,' Step 42: the chip 11 will choose the symbol code of the exchange order according to the comparison table 7 to obtain the second verification code (AC2). Refer to the comparison table 7. If the symbol code is " B ", the second verification code (AC2) is" ADA1A309BAAB3024B ". Step 43: In this embodiment, the user's query interface 2 is constructed in a computer system, and the user contacts the query interface 2 through the Internet. Referring to FIG. 3, the steps for the user to contact the query interface 2 are as follows: It is worth noting that the sequence number (SN) of the article 200 is the wafer code corresponding to the wafer 1, and the correspondence between the wafer code and the article 200 sequence number is 11 200540718, and the first corresponding to the wafer code The forward and reverse calculation formulas of the verification code (AC1) and the second verification code (AC2) are recorded in the storage medium (not shown) of the user inquiry interface 2. Step 5 1: In the inquiry After the surface 2 of the article input sequence number (SN), such as, fGU814567899 ", if more enter the first authentication code (ACl) U of the wafer obtained, step 52, and if not, step 61 proceed. Step 52: The query interface 2 will find the wafer code corresponding to the wafer 11 by the sequence number (SN) entered in step 51. Step 53: The query interface 2 performs steps 31 to 35 in reverse according to the first verification code (AC1) input in step 51, and obtains the change value. Step 54: The query interface 2 executes steps 36 to 42 to generate and display a verification code (VC) based on the chip code of step 52 and the changed value of step 53. When the verification code (vc) generated in step 54 is the same as the second verification code (AC2) generated by the chip u, it is determined that the article 200 is genuine, and if it is not the same, it is determined that the article 200 is a fake. Step 61: After inputting the serial number (SN) of the item in the query interface 2, if the second verification code (AC2) obtained by the wafer 11 is input, proceed to step 62, and if not, proceed to step 71. Step 62: The query interface 2 will find the wafer code corresponding to the wafer 11 by the sequence number (SN) entered in step 51. Step 63: The query interface 2 will perform steps 36 to 42 in reverse according to the second verification code 12 200540718 (AC2) entered in step 61, and obtain the change value. Step 64 · • The query interface 2 will execute Step 31 to Step 35 according to the changed value of Step 63 to generate and display a confirmation code (vc). When the verification code (vc) generated in step 64 is the same as the first verification code (AC1) generated by the chip, it is determined that the article 200 is genuine, and if it is not the same, it is determined that the article 200 is a fake. Step 71: After inputting the first verification code (AC1) and the second verification code (AC2) generated by the chip on the user's query interface 2, go to step 72, and if not, go to step 5J. Step 72: The query interface 2 performs steps 31 to 35 in reverse according to the first and second verification codes (AC1, AC2) entered in step 71, and obtains the change value. Step 73: The query interface 2 reversely executes the wafer code of steps 36 to 42 11 according to the change value of step 72 and the first verification code (AC1) of step 71, finds the pair, and obtains the wafer code of the wafer 11. Step 74: The query interface 2 will be based on the sequence number (SN) of the chip. When the sequence number (SN) obtained in step 74 is read t Λλ.,.

13 200540718 同,不但不需要額外的檢驗設#,且任何人都可以藉由連 接到網際網路簡單地驗證該物品2〇〇的真偽。 且该驗證碼產生器1是藉由精密的線路設計結合於該 物印200任何未經批准的卸離動作,都會使該驗證螞產生 器1失效而無法運作,能防止任何人從該物品2⑼取下或 分離該驗證碼產生器1,而使用在其它仿冒品上。 另外,該顯示幕13也可以與該驗證碼產生器丨分離, 並、、Ό 口於電子裝置(圖未示)上,該電子裝置與該驗證碼產 生器1疋透過無線通訊技術與該晶片11傳送並顯示第一、 第二驗證代碼(AC1、AC2),而該電子裝置可以是電腦、個 人數位助理(PDA)、行動電話、軟性電子產品其中一種。 據上所述可知,本發明之驗證物品真偽的方法具有下 列優點及功效: 1_由於邊辨別真偽的方式及裝置可以重複多次使用,因 此,任何經售該該物品200的大盤商、中盤商、小盤商乃 至於用戶’都可以自行進入查詢界面2查核該物品的真偽 在使用上更具貫用性及方便性。 2·且由於該變動值的產生,是基於該啟動件a啟動該 晶片11運算功能的日期和時間,因此,該第一、第二驗證 代碼(AC1、AC2)會隨著曰期和時間變化而不同,藉此,能 完全杜絕仿冒的情形發生,使物品的販售更具有保障。 3 ·且該驗證碼產生器1任何未經批准的卸離動作,都會 使该驗證碼產生器1失效而無法運作,能防止任何人從該 物品200取下或分離該驗證碼產生器1,而使用在其它仿冒 14 200540718 品上,使本發明更具實用性。 惟以上所述者,僅為本發明之較佳實施例而已” 定本發明實施之範圍,即大凡依本發明申請專利 明說明内容所作之簡單的等 屬本發明專利涵蓋之範圍内。 白仍 15 200540718 【圖式簡單說明】 圖1是一正視圖,說明本發明驗證物品真偽的系統的 一較佳實施例; 圖2是一流程圖,說明該較佳實施例中產生一第一驗 證代碼與一第二驗證代碼的流程;及 圖3是一流程圖,說明與該較佳實施例中驗證一物品 真偽的流程。13 200540718 In the same way, not only does not need an additional inspection device, and anyone can simply verify the authenticity of the item by connecting to the Internet. And the verification code generator 1 is combined with any unauthorised detachment of the object mark 200 through a precise circuit design, which will make the verification generator 1 invalid and unable to operate, and prevent anyone from getting the item 2⑼ The verification code generator 1 is removed or separated and used for other counterfeit goods. In addition, the display screen 13 can also be separated from the verification code generator, and can be connected to an electronic device (not shown). The electronic device and the verification code generator 1 can communicate with the chip through wireless communication technology. 11 transmits and displays the first and second verification codes (AC1, AC2), and the electronic device may be one of a computer, a personal digital assistant (PDA), a mobile phone, and a soft electronic product. According to the above, it can be known that the method for verifying the authenticity of an article of the present invention has the following advantages and effects: 1_ As the method and device for discriminating authenticity can be used repeatedly, therefore, any large marketer who sells the article 200 , Mid-cap dealers, small-cap dealers, and even users' can enter the query interface 2 to check the authenticity of the item more consistently and conveniently in use. 2. And because the change value is generated based on the date and time when the computing function of the chip 11 is activated by the starter a, the first and second verification codes (AC1, AC2) will change with the date and time On the contrary, by this, counterfeiting can be completely prevented, and the sales of articles can be more guaranteed. 3 · Any unauthorized removal of the verification code generator 1 will invalidate the verification code generator 1 and make it inoperable, preventing anyone from removing or separating the verification code generator 1 from the item 200, And it is used on other counterfeit products, making the invention more practical. However, the above are only the preferred embodiments of the present invention, and "the scope of implementation of the present invention is determined, that is, the simple things made in accordance with the content of the patent application of the present invention are covered by the patent of the present invention. White Still 15 200540718 [Schematic description] Figure 1 is a front view illustrating a preferred embodiment of the system for verifying the authenticity of an article of the present invention; Figure 2 is a flowchart illustrating the generation of a first verification code in the preferred embodiment And a second verification code flow; and FIG. 3 is a flowchart illustrating a flow for verifying the authenticity of an item in the preferred embodiment.

16 200540718 【主要元件符號說明】 100… …·系統 13…… …顯示幕 卜…· •…驗證碼產生器 200… 物口口 11 …·♦ 0S片 AC1… …第一驗證代碼 12 ·… •…啟動件 AC2… …第二驗證代碼 1716 200540718 [Description of main component symbols] 100…… · System 13 ……… Display screen… •• Verification code generator 200… Material port 11… · ♦ 0S chip AC1…… First verification code 12 ·… • … Starter AC2…… second verification code 17

Claims (1)

200540718 十、申請專利範圍: 1 _ 一種驗證物品真偽的方法,包含下列步驟: 步驟一:產生一變動值,並依據該變動值產生一第 一驗證代碼,及依據該變動值與該物品一獨特的辨識號 產生一第二驗證代碼; 步驟二:依據該第一驗證代碼、第二驗證代碼與該 物品辨識號其中任二項產生一證實代碼,當該證實代碼 與前述物品辨識號、第二驗證代碼、第一驗證代碼餘下 I 的一項相互吻合時,該物品確認為真品。 -2_依據申請專利範圍第1項所述之驗證物品真偽的方法, 其中,該步驟一會傳送該第一、第二驗證代碼給一用戶 〇 3·依據申請專利範圍第丨項所述之驗證物品真偽的方法, 其中,該步驟一中的第一、第二驗證代碼是由附屬於該 物品的一驗證碼產生器產生。 4·依據申請專利範圍第3項所述之驗證物品真偽的方法, 參 /、中11亥驗也碼產生器具有一晶片,該物品的辨識號是 _ 該晶片的唯一晶片碼,在步驟一中,該第二驗證代碼是 依據該晶片的晶片碼與該變動值產生。 5. 依據申請專利範圍第3項所述之驗證物品真偽的方法, 其中,該驗證碼產生器具有一晶片,該辨識號是該物品 公開的-順序號’在步驟一中,該順序號是寫入該晶片 中,該第二驗證代碼是依據該順序號與該變動值產生。 6. 依據申請專利範圍第丨項所述之驗證物品真偽的方法, 18 200540718 其中,該步驟二是透過一用戶的查詢界面執行。 7·依據申請專利範圍第6項所述之驗證物品真偽的方、去 其中’該用戶的查詢界面是建構在一電腦系統。 8. —種驗證物品真偽的系統,包含: 驗證碼產生器’是附屬於一物品,並目古 二 、’ ^、有一晶片 ,該晶片是產生一變動值,並依據該變動值產生一第 驗證代碼,及依據該變動值與該物品一獨特的辨識號產 生一第二驗證代碼; 鲁依據該第一驗證代碼、第二驗證代碼與該物品辨識 - 號其中任二項產生一證實代碼,當該證實代碼與前述物 品辨識號、第二驗證代碼、第一驗證代碼餘下的一項相 互吻合時,該物品確認為真品。 9·依據申請專利範圍第8項所述之驗證物品真偽的系統, 其中’該證實代碼是透過一用戶的查詢界面顯示。 10·依據申請專利範圍第9項所述之驗證物品真偽的系統, 其中,該用戶的查詢界面是建構在一電腦系統。 春 11 ·依據申清專利範圍第8項所述之驗證物品真偽的系統, 其中,該辨識號是該晶片的唯一晶片碼,該物品具有與 該晶片碼相對應的一順序號,且該晶片碼與該順序號的 對應關係被記錄於一儲存媒體。 12·依據申請專利範圍第8項所述之驗證物品真偽的系統, 其中,該辨識號是該物品公開的一順序號,該順序號是 寫入$亥晶片中。 13·依據申請專利範圍第8項所述之驗證物品真偽的系統 19 200540718 其中,該驗證碼產生器更具有與該晶片結合的一啟動件 ^該啟動件是能觸發產生該變動值、該第-驗證代瑪及 垓第二驗證代碼。 14=據中請專利範圍第13項所述之驗證物品真偽的系統, “中,該啟動件可以是一音控裝置、一觸控裝置、一按 鍵裝置、一定時自動演算裝置其中一種。 A依據申請專利範圍第8項所述之驗證物品真偽的系統, :中,該驗證碼產生器更具有與該晶片結合且能顯示該 第一、第二驗證代碼的一顯示幕。 16.依據申請專利範圍第15項所述之驗證物品真偽的系統 其中,該顯示幕是透過無線通訊技術與該晶片連通。 17·依據申請專利範圍第8項所述之驗證物品真偽的系矣 其中,該驗證碼產生器的晶片是一種無線射辦4 (RFID) 〇 辦職榡籤200540718 X. Scope of patent application: 1 _ A method for verifying the authenticity of an article, including the following steps: Step 1: Generate a change value, and generate a first verification code based on the change value, and according to the change value and the article A unique identification number generates a second verification code. Step 2: Generate a verification code based on any one of the first verification code, the second verification code, and the article identification number. When the verification code and the aforementioned article identification number, the first When the remaining one of the two verification codes and the first verification code match, the item is confirmed as genuine. -2_ The method for verifying the authenticity of an article according to item 1 of the scope of patent application, wherein in this step, the first and second verification codes are transmitted to a user. A method for verifying the authenticity of an article, wherein the first and second verification codes in the first step are generated by a verification code generator attached to the article. 4. According to the method for verifying the authenticity of an article described in item 3 of the scope of the patent application, the reference code generator in the 11/11 inspection has a wafer, and the identification number of the article is _ the unique wafer code of the wafer, in step one The second verification code is generated based on the wafer code of the wafer and the variation value. 5. The method for verifying the authenticity of an article according to item 3 of the scope of the patent application, wherein the verification code generator has a chip, and the identification number is disclosed by the article-sequence number. In step one, the sequence number is Written into the chip, the second verification code is generated based on the sequence number and the change value. 6. According to the method for verifying the authenticity of an article as described in item 丨 of the patent application scope, 18 200540718, where the second step is performed through a user's query interface. 7. According to the method of verifying the authenticity of an article as described in item 6 of the scope of the patent application, where ‘the user ’s query interface is built on a computer system. 8. —A system for verifying the authenticity of an article, including: a verification code generator 'is attached to an article, and the second,' ^, has a chip, the chip generates a change value, and generates a change value based on the change value A first verification code, and a second verification code based on the change value and a unique identification number of the item; Lu generates a verification code based on any of the first verification code, the second verification code, and the item identification-number When the verification code and the remaining one of the aforementioned article identification number, the second verification code, and the first verification code are mutually matched, the article is confirmed to be genuine. 9. The system for verifying the authenticity of an article according to item 8 of the scope of the patent application, wherein 'the verification code is displayed through a user's query interface. 10. The system for verifying the authenticity of an article according to item 9 of the scope of the patent application, wherein the user's query interface is constructed in a computer system. Spring 11 · The system for verifying the authenticity of an article according to item 8 of the scope of the patent application, wherein the identification number is the unique wafer code of the wafer, the article has a sequence number corresponding to the wafer code, and the The correspondence between the chip code and the sequence number is recorded on a storage medium. 12. The system for verifying the authenticity of an article according to item 8 of the scope of the patent application, wherein the identification number is a sequence number disclosed by the article, and the sequence number is written in the $ 191 chip. 13. According to the system for verifying the authenticity of an article as described in item 8 of the scope of the patent application 19 200540718, wherein the verification code generator further has an activation element combined with the chip ^ The activation element can trigger the variation value, the The first verification code and the second verification code. 14 = According to the system for verifying the authenticity of an article as described in Item 13 of the Chinese Patent Application, "In this case, the activation member may be one of a sound control device, a touch device, a button device, and a certain time automatic calculation device. A According to the system for verifying the authenticity of an article according to item 8 of the scope of the patent application, the verification code generator has a display screen that is combined with the chip and can display the first and second verification codes. The system for verifying the authenticity of an article according to item 15 of the scope of patent application, wherein the display screen communicates with the chip through wireless communication technology. 17. The system for verifying the authenticity of an item according to item 8 of the scope of patent application Among them, the chip of the verification code generator is a kind of wireless shooting office 4 (RFID). 2020
TW94103630A 2004-06-15 2005-02-04 Method for confirming truth of object TWI257578B (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
TW94103630A TWI257578B (en) 2004-06-15 2005-02-04 Method for confirming truth of object
US11/123,183 US20060005027A1 (en) 2004-06-15 2005-05-06 Method and system for verifying authenticity of an object
MYPI20052054A MY137667A (en) 2004-06-15 2005-05-09 Method and system for verifying authenticity of an object
CA002507320A CA2507320A1 (en) 2004-06-15 2005-05-13 Method and system for verifying authenticity of an object
AU2005202296A AU2005202296B2 (en) 2004-06-15 2005-05-26 Method and system for verifying authenticity of an object
JP2005157151A JP4342476B2 (en) 2004-06-15 2005-05-30 Method and system for verifying authenticity of an object
BR0502067-0A BRPI0502067A (en) 2004-06-15 2005-05-30 Method and system for confirming the authenticity of an object having an unmistakable identification number

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
TW93117157 2004-06-15
TW93127320 2004-09-09
TW93135098 2004-11-16
TW94103630A TWI257578B (en) 2004-06-15 2005-02-04 Method for confirming truth of object

Publications (2)

Publication Number Publication Date
TW200540718A true TW200540718A (en) 2005-12-16
TWI257578B TWI257578B (en) 2006-07-01

Family

ID=37764199

Family Applications (1)

Application Number Title Priority Date Filing Date
TW94103630A TWI257578B (en) 2004-06-15 2005-02-04 Method for confirming truth of object

Country Status (1)

Country Link
TW (1) TWI257578B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008143087A1 (en) * 2007-05-14 2008-11-27 International Frontier Technology Laboratory, Inc. Authenticity validation subject, authenticity validation chip reader, and authenticity judging method
TWI392788B (en) * 2009-03-24 2013-04-11 Icm Inc The method used to check the serial number of the data gateway

Also Published As

Publication number Publication date
TWI257578B (en) 2006-07-01

Similar Documents

Publication Publication Date Title
US11240021B2 (en) Multi-address population based on single address
JP4944109B2 (en) Product item with encoded data that identifies the layout
WO2010099714A1 (en) Product identity digital identification apparatus, inspection apparatus, product and anti-counterfeiting inspection method
US20090106042A1 (en) System for product authentication by mobile phone
WO2009122730A1 (en) Goods processing method
WO2014139386A1 (en) Anti-counterfeiting system and method thereof for tag forming, embedding, interpreting, authenticating and ownership changing
US20090204417A1 (en) System for product authentication using covert codes
CN203753614U (en) Anti-counterfeit packing box
JP2022137088A (en) Mountable authentication device using thermal image
TW201405503A (en) Random embossment tactile feeling counterfeiting method
TW200540718A (en) Method for verifying genuineness of object
CN106683564A (en) Multilayer anti-false label
US20230121749A1 (en) Customizable cryptocurrency card
CN1614620A (en) Portable card readers and method thereof
US20180018671A1 (en) System and methods for generating, recording, managing and redeeming gift certificates that securely retain their unused balance over multiple partial uses
JP2023015252A (en) Token with transfer restriction function, authentication token, and token changeover method
TWI323858B (en)
CN103366210A (en) Anti-fake three-dimensional printed product and manufacturing method thereof
CN101882195A (en) Method for manufacturing identity document and false-identifying device thereof
WO2013091270A1 (en) Picture network verification and anti-counterfeiting system
TWI303386B (en) Contactless type communication tag, portable tag reader for verifying a genuine article, and method for providing information of whether an article is genuine or not
RU2615311C1 (en) Method of personal exchange of audiovisual information and digital key for the implementation of the method
CN103699998A (en) Commodity estimation fingerprint stamp anti-counterfeit technology
TWI294595B (en) Mobile communication terminal having a function of reading out information from contactless type communication tag and method for managing product authentication service
CN116503234A (en) Trademark anti-counterfeiting method based on cryptography

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees