TWI257578B - Method for confirming truth of object - Google Patents

Method for confirming truth of object Download PDF

Info

Publication number
TWI257578B
TWI257578B TW94103630A TW94103630A TWI257578B TW I257578 B TWI257578 B TW I257578B TW 94103630 A TW94103630 A TW 94103630A TW 94103630 A TW94103630 A TW 94103630A TW I257578 B TWI257578 B TW I257578B
Authority
TW
Taiwan
Prior art keywords
verification code
item
authenticity
verification
verifying
Prior art date
Application number
TW94103630A
Other languages
Chinese (zh)
Other versions
TW200540718A (en
Inventor
Yin-Hung Tseng
Original Assignee
Userstar Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Userstar Information Co Ltd filed Critical Userstar Information Co Ltd
Priority to TW94103630A priority Critical patent/TWI257578B/en
Priority to US11/123,183 priority patent/US20060005027A1/en
Priority to MYPI20052054A priority patent/MY137667A/en
Priority to CA002507320A priority patent/CA2507320A1/en
Priority to AU2005202296A priority patent/AU2005202296B2/en
Priority to BR0502067-0A priority patent/BRPI0502067A/en
Priority to JP2005157151A priority patent/JP4342476B2/en
Publication of TW200540718A publication Critical patent/TW200540718A/en
Application granted granted Critical
Publication of TWI257578B publication Critical patent/TWI257578B/en

Links

Abstract

A method for confirming truth of an object includes steps of: generating a variable private key, a first authentication code based on the variable private key, and a second authentication code based on the original identification number of the object and the variable private key; and generating a confirmation code which can be matched to remaining one of the first authentication code, the second authentication code and the original identification number of the object for confirming the truth of the object based on two of the first identification code, the second authentication code and the original identification number of the object.

Description

1257578 九、發明說明: 【發明所屬之技術領域】 本發明是有關於一種防偽方法,特別是指一種能使用 戶自仃辨別物品真偽的驗證物品真偽的方法。 【先前技術】 仿冒品日亦猖獗,且 使消費者難以辨別。 重影響市場交易秩序 ’更有危害消費者健1257578 IX. Description of the invention: [Technical field to which the invention pertains] The present invention relates to an anti-counterfeiting method, and more particularly to a method for authenticating an authenticated item that can be used by a user to identify the authenticity of an item. [Prior Art] Counterfeit goods are also rampant and difficult for consumers to distinguish. Re-influence of market trading order ‘more harmful to consumer health

隨著經濟發展及消費型態改變, 仿s 口口的仿冒程度幾乎是以假亂真, 因此,仿冒品充斥著整個市場,已嚴 ,而仿冒的煙、酒、藥、食品類商品 康及生命之虞。 而目别市面上普遍採用的防偽雷射標藏、或晶片、或 台灣公告第57則號之防偽辨識方法,雖然都可以辨視商 品的真偽,卻必須透過特殊的辨識工具,因此,一般賭買 商品的消費者根本無法判別,而只能供廠商、或商店職員 使用。再者1冒者也可利用高解析度的掃描及印刷技術 ,仿製防偽雷射標籤,所以,防偽雷射標籤已無法符合現 今的防偽需求。 【發明内容】 因此,本發明之目的,即在提供一種可供用戶自行辨 識物品的真偽,及可重覆使用而不失效的驗證物品真偽的 方法。 / 於是,本發明之驗證物品真偽的方法,主要是配合一 客服端提供一查詢界面進行查詢,該防偽方法包含下列步 驟··步驟—··產生—秘密的變動值,並依據該變動值產生 5 1257578 一第一驗證代碼,及依據該變動值與該物品一獨特的順序 號產生一第二驗證代碼。步驟二:依據該第一驗證代碼、 第二驗證代碼與該物品順序號其中兩者產生一證實代碼, 該證實代碼是與該物品順序號、第二驗證代碼、第一驗證 代碼餘下的一者相互吻合。。 本發明的功效是能確實達到防偽的目的,而不會有失 效的情形。 【實施方式】 有關本發明之前述及其他技術内容、特點與功效,在 以下配合參考圖式之一個較佳實施例的詳細說明中,將可 清楚的呈現。 參閱圖1,本發明之驗證物品真偽的系統100的較佳實 施例主要是貼附於一物品2〇〇上。 該物品200可以是市面上販售的任何物體、藝術創作 品、債券、證書…等等,並分別標示有一公開的順序號 (Serial No),如 “GU814567899”。 該系統100包含有一驗證碼產生器1及一用戶的查詢 界面2。該驗證碼產生器1包含一晶片u、一啟動件12及 一顯示幕13。 該晶片11是能產生一可變動的秘密變動值,並依據該 變動值產生一第一驗證代碼(AC1),及依據該變動值與該物 品200的順序號(SN)產生第一驗證代碼(AC2),關於此點, 以下會有更詳細的敍述。 該晶片11在本實施例是一種無線射頻辨識標籤(RFID) 6 1257578 晶 片 晶片碼(Chip—Code) 亚具有唯一 ”003027033001029”,該晶片碼在本實施例中是作為該物品 的辦識號。 該啟動件12是可啟動該晶片丨丨。該啟動件ι2可以是 曰控裝置、一觸控裝置、一按鍵裝置、一定時自動演算 裝置、無線傳輸裝置....等。 該顯示幕13在本實施例是與該晶片U連接,並可顯示 該第一驗證代碼(AC1)與該第二驗證代碼(AC2)。 在舉例說明本發明防偽方法的步驟之前,先列舉七個 對照表,供說明使用: 仟 位 年 仟 位 年 1 2 3 4 5 6 7 8 9 10 隨 機 組 A B C D E F G H I J 碼 組 K L Μ N 0 P Q R S T 組 取 三 組 U V W X Y Z 0 1 2 3 對照表一 佰 位 年 佰位年(例:2004年之004),可以『二碼』代表, 以26英文字母及6個數字共32字,依32進位法 ,2數字值,足可得1024個值,足以代表999之 佰位年值。 '二碼} 位年 代 表As the economy develops and the consumption pattern changes, the degree of counterfeiting of the imitation mouth is almost false. Therefore, the counterfeit goods are full of the whole market, and the counterfeit cigarettes, alcohol, medicines, food products and life are the most important. . However, the anti-counterfeit laser tags or wafers commonly used in the market, or the anti-counterfeiting identification method of Taiwan No. 57, although they can all distinguish the authenticity of goods, must pass special identification tools. Consumers who gamble on goods can't be judged at all, but only for manufacturers, or store employees. In addition, one can also use high-resolution scanning and printing technology to copy anti-counterfeit laser labels. Therefore, anti-counterfeit laser labels cannot meet the current anti-counterfeiting requirements. SUMMARY OF THE INVENTION Accordingly, it is an object of the present invention to provide a method for verifying the authenticity of an item by itself and for verifying the authenticity of the item without repeated use. / Thus, the method for verifying the authenticity of the present invention is mainly to provide a query interface for querying with a customer service terminal, the anti-counterfeiting method comprising the following steps: - generating a secret change value, and according to the change value Generating a first verification code of 5 1257578, and generating a second verification code according to the variable value and a unique sequence number of the item. Step 2: generating a verification code according to the first verification code, the second verification code, and the item sequence number, the verification code being the remaining one of the item sequence number, the second verification code, and the first verification code Match each other. . The effect of the present invention is to achieve the purpose of anti-counterfeiting without any failure. The above and other technical contents, features, and advantages of the present invention will be apparent from the following detailed description of the preferred embodiments. Referring to Figure 1, a preferred embodiment of the system 100 for verifying the authenticity of an article of the present invention is primarily attached to an article. The article 200 can be any object, art creation, bond, certificate, etc. sold on the market, and is labeled with a public serial number (Serial No), such as "GU814567899". The system 100 includes a verification code generator 1 and a user's query interface 2. The verification code generator 1 includes a wafer u, a starter 12, and a display screen 13. The wafer 11 is capable of generating a variable secret variation value, and generates a first verification code (AC1) according to the variation value, and generates a first verification code according to the variation value and the sequence number (SN) of the article 200 ( AC2), in this regard, the following will be described in more detail. In the present embodiment, the wafer 11 is a radio frequency identification tag (RFID) 6 1257578. The chip code (Chip-Code) has a unique "003027033001029", which in this embodiment is the identification number of the article. The actuator 12 is operable to activate the wafer cassette. The activation component ι2 may be a control device, a touch device, a button device, a time-time automatic calculation device, a wireless transmission device, and the like. The display screen 13 is connected to the wafer U in this embodiment, and can display the first verification code (AC1) and the second verification code (AC2). Before exemplifying the steps of the anti-counterfeiting method of the present invention, seven comparison tables are listed for illustrative use: 仟位年仟位年1 2 3 4 5 6 7 8 9 10 Random group ABCDEFGHIJ code group KL Μ N 0 PQRST Three sets of UVWXYZ 0 1 2 3 comparison table one year of the year of the year (example: 004 in 2004), can be represented by "two yards", with 26 letters of English and 6 numbers of 32 words, according to the 32-digit method, 2 The numerical value is enough to obtain 1024 values, which is enough to represent the annual value of 999. 'Two yards}

AAAA

ABAB

ACAC

ADAD

AEAE

AF A1 A2 A3 A4 A5 A6AF A1 A2 A3 A4 A5 A6

BA 對照表二 7 1257578BA comparison table 2 7 1257578

月 碼 月 別 0 1 02 03 04 05 06 07 08 09 10 11 12 隨 機 組 取 組 A Β C D Ε F G Η I J Κ L 組 Μ Ν 0 Ρ Q R S Υ υ V W X 組 Υ Ζ 1 2 3 4 5 6 7 8 9 0 對照表三 01 02 03 04 05 06 07 08 09 10 曰 1 2 3 4 5 6 7 8 9 0 11 12 13 14 15 16 17 18 19 20 碼 A B C D Ε F G Η I J 21 22 23 24 25 26 27 28 29 30 3 1 K L Μ Ν 0 Ρ Q R S Τ υ 對照表四 時 1 2 3 4 5 6 7 8 9 10 11 12 A Β C D Ε F G Η I J κ L 碼 13 14 15 16 17 18 19 20 2 1 22 23 24 Μ Ν 0 Ρ Q R S Τ υ V W X 對照表五 代碼 排列法 記憶碼 A 1-3-2-4-5-6-7 B-QAE-UI 3 - 0 2 4 -A Β 5-1-2-3-4-7-6 1 -BAE-QU 3 - 0 2 4 -B C 5-6-7-1-2-3-4 1 - 3 0 2 - 4BA-EQU-C D 2-3-4-7-6-1-5 A-EQU-234-0B1-D … … • · · 對照表六 8 1257578Month code month 0 1 02 03 04 05 06 07 08 09 10 11 12 Random group take group A Β CD Ε FG Η IJ Κ L group Μ Ν 0 Ρ QRS Υ υ VWX group Υ Ζ 1 2 3 4 5 6 7 8 9 0 Comparison Table 03 02 03 04 05 06 07 08 09 10 曰1 2 3 4 5 6 7 8 9 0 11 12 13 14 15 16 17 18 19 20 Code ABCD Ε FG Η IJ 21 22 23 24 25 26 27 28 29 30 3 1 KL Μ Ν 0 Ρ QRS Τ 对照 Comparison Table 4:1 2 3 4 5 6 7 8 9 10 11 12 A Β CD Ε FG Η IJ κ L Code 13 14 15 16 17 18 19 20 2 1 22 23 24 Μ Ν 0 Ρ QRS Τ υ VWX Comparison Table Five Code Arrangement Memory Code A 1-3-2-4-5-6-7 B-QAE-UI 3 - 0 2 4 -A Β 5-1-2-3- 4-7-6 1 -BAE-QU 3 - 0 2 4 -BC 5-6-7-1-2-3-4 1 - 3 0 2 - 4BA-EQU-C D 2-3-4-7- 6-1-5 A-EQU-234-0B1-D ... ... • · · Comparison Table 6 8 1257578

代碼 — A 排列法 —1234Code — A Arrangement — 1234

_ 記憶碼_ADAlBAABA^nQ^n24 A_ Memory code_ADAlBAABA^nQ^n24 A

~C 1324 Ϊ243 ADA1A309BAAB3024 B ADA1BAAB3Q24 A309 C~C 1324 Ϊ243 ADA1A309BAAB3024 B ADA1BAAB3Q24 A309 C

參圖2,以下即針對本發明防偽方法的步驟結合實施例 說明如后:Referring to Figure 2, the following steps for the anti-counterfeiting method of the present invention are described in conjunction with the embodiments as follows:

步驟31 :觸控該啟動件12,使該驗證碼產生器i的晶片u 產生一秘密的變動值。在本實施例中,該變動值 的產生疋取決於日期和時間,例如,用戶在 年5月31日上午9點30分24秒觸控該啟動件 12,該驗證碼產生器丨的晶片u產生的變動值為 ”20040531093024,,。 步驟32 :該驗證碼產生器i的晶片u會將變動值劃分為7 個小組,例如,該變動值,,2〇〇4〇531〇93〇24,,中的 弟小組對應到2 ,第二小組對應到,第 二小組對應到"05",第四小組對應到”3丨”,第五 小組對應到”09",第六小組對應到”3〇”,並且第 七小組對應到"24,,。 步驟33 :該驗證碼產生器丨的晶片n會依據前述對照表一 至對照表五中配置的符號代碼對應轉換每一個變 動值中第一至第五小組的數值,並保留第六、第 七小組的數值而不改變。值得注意的是,參對照 表一,第一小組(如"2")有三個對應的符號代碼(如 B ' L、V) ’參對照表三,第三小組(如"〇5")也有 9 1257578 三個對應的符號代碼(如E、Q、3),因此,該轉 換後的變動值有九種組合,其中之一是 ,,BAEQUI3024,,。 步驟34 :然後,該驗證碼產生器1的晶片11會依據對照表 六交換變動值中七個小組的排列順序並儲存記憶 ,由對照表六中可以發現共有四萬五千三百六十 種的變化,如”AEQU2430BI” 。 步驟35 :該晶片11會依據對照表六選擇變動值交換順序的 符號代碼,使變動值交換排列順序後,獲得第一 驗證代碼(AC1),參對照表六,如選擇符號代碼為 ’,D,,,則第一驗證代碼(AC1)為ΠAEQU2430BIDΠ。 值得一提的是,該第一驗證代碼(AC1)可直接以’’ 變動值π替代,也可以由步驟32〜步驟35產生。 步驟36 :將晶片11的晶片碼如”003027033001029”,劃分 成,,003,,、,,027’,、,,033,,、'丨001,’、,,029,,等五小組 ,並參對照表二轉換成”ADn、”Α1Π、ΠΒΑΠ、ΠΑΒ” 、,’A3,,。 值得注意的是,該物品200的順序號(SN)也可以同時 寫入該晶片11中,則該步驟36中,可以直接以該順序號 (SN)取代該晶片碼,且同樣將該順序號(SN)劃分成四小組 ,並參對照表二轉換。 步驟37 ··該晶片11產生該第二驗證代碼(AC2)的演算步驟 之一是,將步驟36中轉換後的晶片碼’’AD"、 ”A1”、”BA,f、”ABff、ΠΑ3”重組成十碼呈現,例以 10 1257578 ADA1BAABA3 代表 003027033001029。 步驟38 :該晶片11產生該第二驗證代碼(AC2)的演算步驟 之二是,以變動值如”20040530093024"中取時、 分、秒,獲得”093024”。 步驟39:該晶片11會以步驟37的”ADA1BAABA3’’ +步驟 38 的,,093024,,獲得”ADA1BAABA3093024,,。 步驟40:該晶片 11 會將步驟 39 獲得之” ADA1BAABA3093024”每四碼為一組,劃分為四 個組。第一組為’’ ADA1”,第二組為"BAAB”, 第 三組為” A309",並且第四組為"3024” 。 步驟41:該晶片11會依據對照表七交換步驟40中四個組 的排列順序並儲存記憶,由對照表七中可以發現 共有二十四種變化,如”ADA1BAABA3093024” 〇 步驟42 :該晶片11會依據對照表七選擇交換順序的符號代 碼,獲得第二驗證代碼(AC2),參對照表七,如選 擇符號代碼為"B”,則第二驗證代碼(AC2)為π ADA1A309BAAB3024B,,。 步驟43 :在本實施例,該用戶的查詢界面2是建構在一電 腦系統,且用戶是透過網際網路與該查詢界面2 取得聯繫,參圖3,關於用戶聯繫該查詢界面2 的步驟如下: 值得注意的是,該物品200的順序號(SN)是對應於該 晶片1的晶片碼,且該晶片碼與該物品200順序號的對應 11 1257578 關係,及對應於该晶片碼之弟一驗證代碼(AC 1)盘第二驗證 代碼(AC2)的正反向演算公式是被記錄於該用戶查詢界面2 的儲存媒體(圖未示)中。 步驟5 1 :於該查詢界面2輸入該物品的順序號(SN)如 "GU814567899,,後,若再輸入該晶片11獲得的第 一驗證代碼(AC 1 ),則進行步驟52,若否,則進 行步驟61。 v驟52 ·该查詢界面2會由步驟51中輸入的順序號(SN)找 到對應該晶片11的晶片石馬。 步驟53 ··該查詢界面2會依據步驟51輸入的第一驗證代碼 (AC1)反向執行步驟31至步驟35,並獲得該變動 值。 步驟54 :該查詢界面2會依據步驟52的晶片碼,及步驟 53的變動值執行步驟36至步驟42產生並顯示一 證實代碼(VC)。 當步驟54產生的證實代碼(vc)與該晶片丨丨產生的第 二驗證代碼(AC2)相同,則確定該物品2〇〇是真品,若不相 同,則確定該物品200是偽品。 步驟61 :於該查詢界面2輸入該物品的順序號(SN)後,若 再輸入该晶片11獲得的第二驗證代碼(AC2),則 進行步驟62,若否,則進行步驟71。 步驟62 ··該查詢界面2會由步驟51中輸入的順序號(SN)找 到對應該晶片11的晶片碼。 步驟63 ··該查詢界面2會依據步驟61輸入的第二驗證代碼 12 1257578 (AC2)反向執行步驟36至步驟42,並獲得該變動 值。 步驟64 ·•該查詢界面2會依據步驟63變動值執行步驟3 1 至步驟35,產生並顯示一證實代碼(VC)。 當步驟64產生的證實代碼(vc)與該晶片11產生的第 一驗證代碼(AC 1)相同,則確定該物品2〇〇是真品,若不相 同’則確定該物品200是偽品。Step 31: Touch the initiator 12 to generate a secret variation value of the chip u of the verification code generator i. In this embodiment, the generation of the variation value depends on the date and time. For example, the user touches the activation component 12 at 9:30:24 AM on May 31 of the year, and the verification code generator 丨The generated variation value is "20040531093024,". Step 32: The chip u of the verification code generator i divides the variation value into 7 groups, for example, the variation value, 2〇〇4〇531〇93〇24, The middle group corresponds to 2, the second group corresponds to, the second group corresponds to "05", the fourth group corresponds to "3丨", the fifth group corresponds to "09", the sixth group corresponds to" 3〇", and the seventh group corresponds to "24,. Step 33: The chip n of the verification code generator 转换 converts the values of the first to fifth groups in each variation value according to the symbol codes configured in the foregoing comparison table 1 to the comparison table 5, and retains the sixth and seventh groups. The value does not change. It is worth noting that, in the first table, the first group (such as "2") has three corresponding symbol codes (such as B 'L, V) 'see Table 3, the third group (such as "〇5" There are also 9 1257578 three corresponding symbol codes (such as E, Q, 3), so there are nine combinations of the converted values, one of which is, BAEQUI3024,,. Step 34: Then, the wafer 11 of the verification code generator 1 exchanges the memory according to the arrangement order of the seven groups in the change value according to the comparison table 6. A total of 45,360 kinds can be found in the comparison table 6. Changes such as "AEQU2430BI". Step 35: The wafer 11 selects the symbol code of the change value exchange order according to the comparison table 6. After the change value is exchanged, the first verification code (AC1) is obtained, and the reference table 6 is selected. If the selected symbol code is ', D ,,, then the first verification code (AC1) is ΠAEQU2430BIDΠ. It is worth mentioning that the first verification code (AC1) can be directly replaced by the ''variation value π, or can be generated by steps 32 to 35. Step 36: Divide the wafer code of the wafer 11 such as "003027033001029" into five groups of , 003,,,,, 027',,, 033,,, '丨001,',,, 029, and so on, and Refer to Table 2 to convert to "ADn," Α1Π, ΠΒΑΠ, ΠΑΒ",, 'A3,.. It is worth noting that the sequence number (SN) of the article 200 can also be written into the wafer 11, the step In 36, the chip code can be directly replaced by the sequence number (SN), and the sequence number (SN) is also divided into four groups, and the conversion is performed in accordance with Table 2. Step 37 · The wafer 11 generates the second verification One of the calculation steps of the code (AC2) is to recombine the converted wafer code ''AD", 'A1', 'BA, f, 'ABff, ΠΑ3') in step 36 into ten yards, for example, 10 1257578 ADA1BAABA3 Representative 003027033001029. Step 38: The second calculation step of the second verification code (AC2) of the wafer 11 is to obtain "093024" by a variation value such as "20040530093024" in hours, minutes, and seconds. Step 39: The wafer 11 will be Step 37 of "ADA1BAABA3"' + step 38, 093024, obtain "ADA1BAABA3093024,. Step 40: The wafer 11 will obtain the "ADA1BAABA3093024" in step 39 every four yards into a group, divided into four groups. The first group is '' ADA1', the second group is "BAAB, the third group is "A309", and the fourth group is "3024". Step 41: The wafer 11 will exchange step 40 according to the comparison table VII. The order of the four groups is stored and the memory is stored. A total of twenty-four variations can be found in the comparison table 7, such as "ADA1BAABA3093024". Step 42: The wafer 11 will select the symbol code of the exchange order according to the comparison table seven, and obtain the first Second verification code (AC2), refer to Table 7. If the selected symbol code is "B, then the second verification code (AC2) is π ADA1A309BAAB3024B,,. Step 43: In this embodiment, the user's query interface 2 is constructed in a computer system, and the user contacts the query interface 2 through the Internet. Referring to FIG. 3, the steps for the user to contact the query interface 2 are as follows: It is noted that the sequence number (SN) of the article 200 is a wafer code corresponding to the wafer 1, and the wafer code has a relationship with the sequence number of the article 200, 11 1257578, and a brother corresponding to the chip code. The forward and reverse calculation formula of the verification code (AC 1) disk second verification code (AC2) is recorded in the storage medium (not shown) of the user inquiry interface 2. Step 5: Enter the sequence number (SN) of the item, such as "GU814567899, in the query interface 2, and then, if the first verification code (AC 1 ) obtained by the wafer 11 is input, proceed to step 52, if no Then proceed to step 61. v. 52. The inquiry interface 2 finds the wafer stone corresponding to the wafer 11 from the sequence number (SN) input in step 51. Step 53: The query interface 2 performs step 31 to step 35 in reverse according to the first verification code (AC1) input in step 51, and obtains the change value. Step 54: The query interface 2 performs step 36 to step 42 to generate and display a verification code (VC) according to the chip code of step 52 and the variation value of step 53. When the verification code (vc) generated in step 54 is the same as the second verification code (AC2) generated by the wafer defect, it is determined that the item 2 is genuine, and if not, it is determined that the item 200 is a fake. Step 61: After inputting the sequence number (SN) of the item on the query interface 2, if the second verification code (AC2) obtained by the wafer 11 is input, the process proceeds to step 62. If not, the process proceeds to step 71. Step 62 · The inquiry interface 2 finds the wafer code corresponding to the wafer 11 from the sequence number (SN) input in step 51. Step 63 · The query interface 2 performs step 36 to step 42 in reverse according to the second verification code 12 1257578 (AC2) input in step 61, and obtains the change value. Step 64 • The query interface 2 performs step 3 1 to step 35 according to the change value of step 63, and generates and displays a verification code (VC). When the verification code (vc) generated in step 64 is identical to the first verification code (AC 1) generated by the wafer 11, it is determined that the item 2 is genuine, and if not the same, the item 200 is determined to be a counterfeit.

步驟71:於該用戶的查詢界面2輸入由該晶片丨丨產生的第 一驗證代碼(AC1)與第二驗證代碼(AC2)後,則進 行步驟72,若否,則進行步驟51。 步驟72 ··該查詢界面2會依據步驟71輸入的第一、第二驗 證代碼(AC1、AC2)反向執行步驟31至步驟35, 並獲得該變動值。 步驟73·該查詢界面2會依據步驟72的變動值及步驟71 的第一驗證代碼(AC1)反向執行步驟36至步驟42 ,獲得該晶片11的晶片碼。 步驟74·•該查詢界面2會依據該晶片u的晶片碼,找到對 應的順序號(SN)。 當步驟74獲得的順序號(SN)與該物品2〇〇的順序號 (SN)相同’則確定該物品200是真品,若不相同,則確定° 該物品200是偽品。 是基於該啟動 值得注意的是,由於該變動值的產生, 件12啟動該晶片U運算功能的日期和時間m第 一、第二驗證代碼(AC1、AC2)會隨著日期和時間變化而乂不 13 1257578 同’不但不需要額外的檢驗設備,且任何人都可以藉由連 接到網際網路簡單地驗證該物品200的真偽。 /驗也碼產生态1疋藉由精密的線路設計結合於該 ,品200咳何未經批准的卸離動作,都會使該驗證瑪產生 益1失效而無法運作,能防止任何人從該物口口口·取下或 分離該驗證碼產生器丨,而使用在其它仿冒品上。 另外,該顯示幕13也可以與該驗證碼產生器丨分離, 並=合^電子裝置(圖未示)上,該電子裝置與該驗證碼產 生器1是透過無線通訊技術與該晶片u傳送並顯示第一、 第二驗證代碼(AC1、AC2),而該電子裝置可以是電腦、個 人數位助理(PDA)、行動電話、軟性電子產品其中一種。 據上所述可知,本發明之驗證物品真偽的方法具有下 列優點及功效: 1·由於該辨別真偽的方式及裝置可以重複多次使用,因 此,任何經售該該物品200的大盤商、中盤商、小盤商乃 至於用戶,都可以自行進入查詢界面2查核該物品的真偽 ,在使用上更具實用性及方便性。 2·且由於該變動值的產生,是基於該啟動件12啟動該 晶片11運算功能的日期和時間,因此,該第一、第二驗證 代碼(AC1、AC2)會隨著日期和時間變化而不同,藉此,能 完全杜絕仿冒的情形發生,使物品的販售更具有保障。 3.且該驗證碼產生器〗任何未經批准的卸離動作,都會 使該驗證碼產生器1失效而無法運作,能防止任何人從該 物a口 200取下或分離該驗證碼產生器i,而使用在其它仿冒 14 1257578 品上,使本發明更具實用性。 惟以上所述者,僅為本發明之較佳實施例而已,當不 能以此限定本發明實施之範圍,即大凡依本發明申請專利 範圍及發明說明内容所作之簡單的等效變化與修飾,皆仍 屬本發明專利涵蓋之範圍内。Step 71: After inputting the first verification code (AC1) and the second verification code (AC2) generated by the chip 该 to the inquiry interface 2 of the user, proceed to step 72, and if no, proceed to step 51. Step 72: The query interface 2 performs step 31 to step 35 in reverse according to the first and second verification codes (AC1, AC2) input in step 71, and obtains the variation value. Step 73: The query interface 2 performs step 36 to step 42 in reverse according to the variation value of step 72 and the first verification code (AC1) of step 71 to obtain the chip code of the wafer 11. Step 74·• The query interface 2 finds the corresponding sequence number (SN) according to the chip code of the chip u. When the sequence number (SN) obtained in step 74 is the same as the sequence number (SN) of the item 2', it is determined that the item 200 is genuine, and if not, it is determined that the item 200 is a fake. It is worth noting that, based on the activation, the date and time m at which the device 12 initiates the wafer U operation function due to the generation of the variation value, the first and second verification codes (AC1, AC2) will change with the date and time. No 13 1257578 with 'not only does not require additional testing equipment, and anyone can simply verify the authenticity of the item 200 by connecting to the Internet. / 验 也 产生 产生 产生 疋 疋 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密 精密Oral port · Remove or separate the captcha generator and use it on other counterfeit goods. In addition, the display screen 13 can also be separated from the verification code generator, and is connected to an electronic device (not shown). The electronic device and the verification code generator 1 are transmitted through the wireless communication technology and the chip u. The first and second verification codes (AC1, AC2) are displayed, and the electronic device can be one of a computer, a personal digital assistant (PDA), a mobile phone, and a soft electronic product. According to the above description, the method for verifying the authenticity of the present invention has the following advantages and effects: 1. Since the method and device for authenticating the authenticity can be repeatedly used multiple times, any large-scale dealer who sells the article 200 The middle disc dealer, the small disc dealer and even the user can enter the inquiry interface 2 to check the authenticity of the item, which is more practical and convenient in use. 2. And because the variation value is generated based on the date and time when the activation member 12 starts the calculation function of the wafer 11, the first and second verification codes (AC1, AC2) may change with the date and time. Differently, this can completely eliminate the occurrence of counterfeiting and make the sale of goods more secure. 3. And the verification code generator 〖any unauthorised detachment action will invalidate the verification code generator 1 and prevent any person from removing or separating the verification code generator from the object a port 200. i, and used on other counterfeit 14 1257578, making the invention more practical. The above is only the preferred embodiment of the present invention, and the scope of the invention is not limited thereto, that is, the simple equivalent changes and modifications made by the scope of the invention and the description of the invention are All remain within the scope of the invention patent.

15 1257578 【圖式簡單說明】 圖1是一正視圖,說明本發明驗證物品真偽的系統的 一較佳實施例,· 哗上疋 W丨工间巩咧該較佳實施例中產生一第一驗 證代碼與一第二驗證代媽的流程;及 圖3是一流程圖,說 士 兄月與该較佳實施例中驗證一物品 真偽的流程。15 1257578 BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a front elevational view showing a preferred embodiment of a system for verifying the authenticity of an article according to the present invention, which is produced in the preferred embodiment. A verification code and a second verification process are performed; and FIG. 3 is a flow chart showing the process of verifying the authenticity of an item in the preferred embodiment.

16 1257578 【主要元件符號說明】 100 ……系統 1…… …驗證碼產生器 11 …晶片 1 2 …啟動件 13 "“" …顯示幕 200… …物品 AC1 …第一驗證代碼 AC2 …第二驗證代碼16 1257578 [Description of main component symbols] 100 ... System 1 ... ... Verification code generator 11 ... Wafer 1 2 ... Starter 13 """ ...Display screen 200... Item AC1 ... First verification code AC2 ... Two verification code

1717

Claims (1)

1257578 十、申請專利範圍: 1,一種驗證物品真偽的方法,包含下列步驟: 步驟一:產生一變動值,並依據該變動值產生一第 一驗證代碼,及依據該變動值與該物品一獨特的辨識號 產生一第二驗證代碼; 步驟二:依據該第一驗證代碼、第二驗證代碼與該 物品辨識號其中任二項產生一證實代碼,當該證實代碼 與前述物品辨識號、第二驗證代碼、第一驗證代碼餘下 的一項相互吻合時,該物品確認為真品。 2_依據申請專利範圍第丨項所述之驗證物品真偽的方法, 其中,該步驟一會傳送該第一、第二驗證代碼給一用戶 〇 3.依據申请專利範圍第1項所述之驗證物品真偽的方法, 其中,該步驟一中的第一、第二驗證代碼是由附屬於該 物品的一驗證碼產生器產生。 4 ·依據申请專利範圍第3項所述之驗證物品真偽的方法, 其中,該驗證碼產生器具有一晶片,該物品的辨識號是 該晶片的唯一晶片碼,在步驟一中,該第二驗證代碼是 依據δ亥晶片的晶片碼與該變動值產生。 5·依據申請專利範圍第3項所述之驗證物品真偽的方法, 其中’該驗證碼產生器具有一晶片,該辨識號是該物品 公開的一順序號,在步驟一中,該順序號是寫入該晶片 中,ό亥弟一驗證代碼是依據該順序號與該變動值產生。 6·依據申請專利範圍第1項所述之驗證物品真偽的方法, 18 1257578 其中,該步驟二是透過一用戶的查詢界面執行。 7.依據申請專利範圍第6項所述之驗證物品真偽的方法 其中,該用戶的查詢界面是建構在一電腦系統。 8 · —種驗證物品真偽的系統,包含: 一驗證碼產生器,是附屬於一物品,並呈古一曰 有一晶片 ,該晶片是產生一變動值,並依據該變動值產生一第一 驗證代碼,及依據該變動值與該物品一獨特的辨識號產 生一第二驗證代碼; 〜1257578 X. Patent application scope: 1. A method for verifying the authenticity of an item, comprising the following steps: Step 1: generating a change value, and generating a first verification code according to the change value, and the item according to the change value The unique identification number generates a second verification code; Step 2: generating a verification code according to the first verification code, the second verification code and the item identification number, when the verification code and the item identification number, When the verification code and the remaining one of the first verification code match each other, the item is confirmed as genuine. 2_ The method for verifying the authenticity of the article according to the scope of the patent application scope, wherein the step of transmitting the first and second verification codes to a user 〇 3. According to the scope of claim 1 A method for verifying the authenticity of an item, wherein the first and second verification codes in the first step are generated by a verification code generator attached to the item. 4. The method according to claim 3, wherein the verification code generator has a wafer, the identification number of the item is a unique chip code of the wafer, and in the first step, the second The verification code is generated based on the chip code of the δ ray wafer and the variation value. 5. The method for verifying the authenticity of an article according to claim 3, wherein 'the verification code generator has a wafer, the identification number is a sequence number disclosed by the article, and in the first step, the sequence number is Write into the wafer, and the verification code is generated based on the sequence number and the variation value. 6. The method for verifying the authenticity of the article according to the scope of claim 1 is 18 1257578, wherein the second step is performed through a query interface of a user. 7. The method for verifying the authenticity of an item according to the scope of claim 6 wherein the user's query interface is constructed in a computer system. 8 - a system for verifying the authenticity of an item, comprising: a verification code generator attached to an item and having a chip, the chip generating a variation value and generating a first value according to the variation value Verification code, and generating a second verification code according to the variable value and a unique identification number of the item; 依據該第-驗證代碼、第二驗證代碼與該物品辨識 號其中任二項產生一證實代碼,當該證實代碼與前述物 品辨識號、苐一驗證代碼、第一驗證代碼餘下的一項相 互吻合時,該物品確認為真品。 9·依據申請專利範圍第8項所述之驗證物品真偽的系統, 其中’ a亥5登實代碼是透過一用戶的查詢界面顯示。 10.依據申請專利範圍第9項所述之驗證物品真偽的系統, 其中,該用戶的查詢界面是建構在一電腦系統。 11 ·依據申請專利範圍第8項所述之驗證物品真偽的系、统, 其中,該辨識號是該晶片的唯一晶片碼,該物品具有與 該晶片碼相對應的一順序號,且該晶片碼與該順序號的 對應關係被記錄於一儲存媒體。 12.依據申請專利範圍第8項所述之驗證物品真偽的系統, 其中,該辨識號是該物品公開的一順序號,該順序號是 寫入該晶片中。 13·依據申請專利範圍第8項所述之驗證物品真偽的系統, 19 1257578 其中,3亥驗證碼產生器更具有與該晶片結合的一啟動件 ’該啟動件是能觸發產生該變動值、該第_驗證代碼及 該第二驗證代碼。 μ•依射請專利範圍第13項所述之驗證物品真偽的系統, 其中,該啟動件可以是一音控裝置、一觸控裝置、一按 鍵裝置、一定時自動演算裝置其中一種。 女 15·依射請專利範圍第8項所述之驗證物品真偽的系統, 其中,该驗證碼產生器更具有與該晶片結合且能顯八上 第一、第二驗證代碼的一顯示幕。 、八4 16.依據申請專利範圍第15項所述之驗證物品真偽的 其中,该顯不幕是透過無線通訊技術與該晶片連通、。先 17·依據申請專利範圍第8項所述之驗證物品真偽的二么 其中,該驗證碼產生器的晶片是一種無線 二 (RFID)。 取‘纖 20Generating a verification code according to any one of the first verification code, the second verification code and the item identification number, and the verification code is consistent with the remaining item identification number, the first verification code, and the first verification code. When the item is confirmed to be genuine. 9. The system for verifying the authenticity of an item according to item 8 of the patent application scope, wherein the 'a Hai 5' real code is displayed through a user's inquiry interface. 10. The system for verifying the authenticity of an item according to claim 9 of the patent application, wherein the user's inquiry interface is constructed in a computer system. 11. The system of verifying the authenticity of the article according to claim 8 of the patent application, wherein the identification number is a unique chip code of the wafer, the article having a sequence number corresponding to the chip code, and the The correspondence between the chip code and the sequence number is recorded on a storage medium. 12. A system for verifying the authenticity of an article as set forth in claim 8 wherein the identification number is a sequence number disclosed by the article, the sequence number being written to the wafer. 13. The system for verifying the authenticity of an article according to claim 8 of the patent application, 19 1257578, wherein the 3H verification code generator further has an activation member coupled to the wafer. The activation member can trigger the generation of the variation value. The first verification code and the second verification code. μ• According to the system of claim 13, the authenticity of the verification item may be a sound control device, a touch device, a button device, and a certain time automatic calculation device. The system for verifying the authenticity of the article described in the eighth aspect of the patent, wherein the verification code generator further has a display screen combined with the chip and capable of displaying the first and second verification codes. . VIII.4. According to the authenticity of the verification item mentioned in item 15 of the patent application scope, the display is connected to the wafer through wireless communication technology. First, according to the authenticity of the verification item described in claim 8 of the patent application scope, the chip of the verification code generator is a wireless binary (RFID). Take ‘fiber 20
TW94103630A 2004-06-15 2005-02-04 Method for confirming truth of object TWI257578B (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
TW94103630A TWI257578B (en) 2004-06-15 2005-02-04 Method for confirming truth of object
US11/123,183 US20060005027A1 (en) 2004-06-15 2005-05-06 Method and system for verifying authenticity of an object
MYPI20052054A MY137667A (en) 2004-06-15 2005-05-09 Method and system for verifying authenticity of an object
CA002507320A CA2507320A1 (en) 2004-06-15 2005-05-13 Method and system for verifying authenticity of an object
AU2005202296A AU2005202296B2 (en) 2004-06-15 2005-05-26 Method and system for verifying authenticity of an object
BR0502067-0A BRPI0502067A (en) 2004-06-15 2005-05-30 Method and system for confirming the authenticity of an object having an unmistakable identification number
JP2005157151A JP4342476B2 (en) 2004-06-15 2005-05-30 Method and system for verifying authenticity of an object

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
TW93117157 2004-06-15
TW93127320 2004-09-09
TW93135098 2004-11-16
TW94103630A TWI257578B (en) 2004-06-15 2005-02-04 Method for confirming truth of object

Publications (2)

Publication Number Publication Date
TW200540718A TW200540718A (en) 2005-12-16
TWI257578B true TWI257578B (en) 2006-07-01

Family

ID=37764199

Family Applications (1)

Application Number Title Priority Date Filing Date
TW94103630A TWI257578B (en) 2004-06-15 2005-02-04 Method for confirming truth of object

Country Status (1)

Country Link
TW (1) TWI257578B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI392788B (en) * 2009-03-24 2013-04-11 Icm Inc The method used to check the serial number of the data gateway
TWI455067B (en) * 2007-05-14 2014-10-01 Internat Frontier Tech Lab Inc Authenticity authentication object, authenticity authentication wafer reading device, authenticity identification method, and pattern reading method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI455067B (en) * 2007-05-14 2014-10-01 Internat Frontier Tech Lab Inc Authenticity authentication object, authenticity authentication wafer reading device, authenticity identification method, and pattern reading method
TWI392788B (en) * 2009-03-24 2013-04-11 Icm Inc The method used to check the serial number of the data gateway

Also Published As

Publication number Publication date
TW200540718A (en) 2005-12-16

Similar Documents

Publication Publication Date Title
US11240021B2 (en) Multi-address population based on single address
US20200351098A1 (en) Methods and systems for utilizing hardware-secured receptacle devices
RU2414001C2 (en) Method and apparatus for checking authenticity or rights using one-time transaction codes
US8856533B2 (en) Device, system and method for determining authenticity of an item
US5193114A (en) Consumer oriented smart card system and authentication techniques
Taherdoost et al. Smart card security; Technology and adoption
US20130042110A1 (en) Centralized authentication system with safe private data storage and method
WO2010099714A1 (en) Product identity digital identification apparatus, inspection apparatus, product and anti-counterfeiting inspection method
TWI228901B (en) Information processing system, information processing method, information recording medium and program-providing medium
CN102932148A (en) System and method for preventing safety two-dimensional code counterfeiting on basis of combination of public key (CPK) authentication
WO2008086715A1 (en) Sanhe code for identifying merchandises
JP2006524011A (en) Mobile communication terminal having tag reading function and authentic authentication service providing method
WO2009122730A1 (en) Goods processing method
WO2009019298A1 (en) Information system and method of identifying a user by an application server
CN207517037U (en) A kind of digital code anti-false zipper button
CN101689236A (en) Secure login protocol
TW200805204A (en) Method and apparatus for safely processing sensitive information
TWI257578B (en) Method for confirming truth of object
CN203753614U (en) Anti-counterfeit packing box
US11516014B2 (en) Methods, systems, and apparatuses for cryptographic wireless detection and authentication of fluids
CN1614620A (en) Portable card readers and method thereof
US20230121749A1 (en) Customizable cryptocurrency card
CN101661561A (en) Product information query system with remote data server and product information query method
TWI323858B (en)
CN101424142B (en) Lock, unlocking method thereof, lock administrative center and control method thereof

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees