CN101034985A - Method and system for the anti-counterfeit of the mobile phone with the dynamic code - Google Patents
Method and system for the anti-counterfeit of the mobile phone with the dynamic code Download PDFInfo
- Publication number
- CN101034985A CN101034985A CN 200710051512 CN200710051512A CN101034985A CN 101034985 A CN101034985 A CN 101034985A CN 200710051512 CN200710051512 CN 200710051512 CN 200710051512 A CN200710051512 A CN 200710051512A CN 101034985 A CN101034985 A CN 101034985A
- Authority
- CN
- China
- Prior art keywords
- authentication
- identification code
- mobile phone
- module
- certificate server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a method and system for cellphone anticounterfeiting by dynamic code, belonging to the field of mobile communication application technique. And the system comprises client ends and authentication server end interconnected through network, where the client end comprises authentication identification code generating module and client end network transmission module; the authentication server end comprises authentication identification verification code generating module, authentication server-end network transmission module and authentication module, where the authentication module compares whether the client-end transmitted authentication identification code generated by the authentication identification code generating module is identical with one of a group of authentication identification verification codes generated by the authentication identification verification code generating module so as to determine whether a cellphone is true or false. And the invention can take time-varying dynamic code as authentication identification code, thus assuring a cellphone has different serial numbers at different times, and making an illegal person difficult to track and crack, thus achieving the anticounterfeiting purpose; besides, making a client able to make anticounterfeiting inquiry in the field of purchasing cellphone, i.e. inquiring first and purchasing then.
Description
Technical field
The invention belongs to the applied technical field of mobile communication, relate to the identity identifying technology in communication network and the computer system, be a kind ofly to utilize dynamic sign indicating number to carry out the false proof method and system of mobile phone, can help the consumer when buying mobile phone, to discern the true and false of mobile phone at the scene effectively.
Background technology
Along with developing rapidly of mobile communication technology, cellphone subscriber's quantity is also in quick growth, little by little become one of instrument indispensable in people's daily life and the work as the mobile phone of one of informationized society sign.The importance of mobile phone in people's daily life is self-evident, but because legal system is still unsound, market is lack of standardization, and some lawless persons are in order to seek exorbitant profit counterfeit mobile phone both at home and abroad, adulterate, mix the spurious with the genuine, formed certain personation mobile phone market, the height of the output value of the annual mobile phone of being palmed off on the mobile phone market, seriously upset social economic order, damaged mobile phone manufacturer and consumer's interests.In recent years, mobile phone manufacturer and consumers in general with the struggle of fake and forged mobile phone in sense of self-protection strengthen gradually, how to carry out the false proof of mobile phone and how to forbid the focus that the circulation of fake and forged mobile phone has become mobile phone manufacturer and consumer to pay close attention to.
Be that at present, general mobile phone anti-counterfeiting technology is verification hand-set host fuselage number (ESN of the IMEI number of GSM mobile handset and CDMA mobile phone number) and a Marks of Network-entry License described in the patent documentation of CN1581189A as publication number.The place one's entire reliance upon reliability of changeless handset number and Marks of Network-entry License of the reliability of this method for anti-counterfeit, when they were forged, this method for anti-counterfeit will lose efficacy.Current, the instrument that is used to revise fuselage number is more and more, and the phenomenon of forging Marks of Network-entry License without permission is also increasing, therefore, is being faced with increasing challenge based on the reliability of the mobile phone method for anti-counterfeit of hand-set host fuselage number and Marks of Network-entry License.
In addition, can being used for the method for mobile phone on false proof, publication number is arranged is the digital network anti-fake technology (also being the inquiry anti-counterfeiting technology) described in the patent documentation of CN1617495A, its principle is to use the digital coding identification product, in central database, preserve the regular coding of every product, use modern coding and printing complex technique, be printed on coding on the product and covered, the consumer opens the coding top layer, by network, phone or mobile phone, coding is delivered to central database discern, just can differentiate the true and false of commodity quickly and easily.The coding of this method produces at random, and each commodity cipher does not repeat, and therefore can not fake in enormous quantities simply.In addition, this method criterion of identification is clear and definite, and the consumer does not need to be grasped specific sign identification method, just can directly inquire about the true and false of commodity to manufacturer, and with low cost, adapts to wide.But it also has significant disadvantages, as:
---coding is fixing, and figure case is many, and management expectancy makes things convenient for by phone, network or mobile phone short message enquiry inadequately than higher in making, storing process;
---if the only corresponding coding of every commodity, inquiry is once promptly cancelled so, identifies hiddenly, is difficult to look into afterwards earlier buy; If the corresponding a plurality of codings of every commodity, then buy a certified products after, other that is printed thereon not a plurality of codings of usefulness all may be collected and be used for faking;
---outward appearance is not distinct, and technology is fairly simple, is forged easily, and the fake producer can be printed on from establishing network and telephone service center from random coded and inquire address, a complete set of personation.
Therefore be sought after more reliable, advantages of simplicity and high efficiency method for anti-counterfeit more.
Publication number is to have introduced the false proof system and method with the statistics sales information of a kind of mobile phone based on note in the patent documentation of CN1581189A.In this system, handset number and anti-forge cipher are corresponding one by one; System implanted mobile phone with the program that sends false-proof short message automatically before every mobile phone is sold; Should automatically send the false-proof short message program has start self-starting, timing, extraction fuselage number and anti-forge cipher, sends false-proof short message automatically after the mobile phone power-on duration surpasses the setting-up time thresholding first, judges whether this false-proof short message sends success and whether close, stop or continue to send the function of this false-proof short message automatically according to sending result's decision.The weak point of this method is:
On the one hand, handset number and anti-forge cipher are corresponding one by one, and promptly password is constant, thereby have a large amount of effective old sign indicating numbers to be collected to be used for faking;
On the other hand, note is to send automatically, and the consumer can not affirm whether note really sends to regular cell phone manufacturer there, and the fake producer can be in random coded, inquire address, a complete set of personation from aspects such as establishing network and telephone service center;
Again on the one hand, because the restriction of time threshold makes the consumer not carry out Antiforge inquiry at the scene of buying mobile phone, promptly can't look into afterwards earlier and buy.
In recent years, introduced encryption technology in the commodity counterfeit prevention field, the method that is used for encryption anti-counterfeiting at present has the branch of fixed password mode and dynamic password mode.The password that the fixed password mode produces is constant, and the lawless person carries out anti-fake certificate as long as intercept and capture password with regard to this password being recycled and reused on other any mobile phone, reaches the purpose of imitation; And the password that the dynamic encryption mode produces is not changeless.
Publication number is to have introduced a kind of anti-counterfeiting technology based on dynamic password in the patent documentation of CN1617495A, and it is false proof that this technology also can be used for mobile phone.This technology is characterised in that: enterprise is that product is determined personal sign and is equipped with the device (dynamic password generating apparatus) that produces the authentication sign by application system, the user submits to Verification System to authenticate by communication network with personal sign with by the authentication sign that said apparatus generates, with the true and false of identification product.The every use of dynamic password generating apparatus once all can generate a new dynamic password according to the individual information (comprising personal sign) of certain cryptographic algorithm, key and object, and show; After Verification System receives the personal sign and dynamic password thereof of the needs identification that application system transmits, to in database, search out the corresponding individual information of realizing storage according to personal sign, calculate an authentication password according to these information with same algorithm, key and the synchrodata of dynamic password generating apparatus then, by checking the matching of this authentication password and the dynamic password that is identified, determine the true and false of product.Each authentication success, Verification System will be adjusted automatically synchrodata and upgrade according to this authentication password.This method and the digital network anti-fake technology of introducing above have similar defective, that is: utilize the dynamic password generating apparatus can generate a plurality of passwords, do not send to a plurality of passwords that Verification System authenticates in these passwords and all may be collected and be used for faking.Remove in addition, its weak point also shows as follows:
Because the every use of dynamic password generating apparatus once, the capital generates a new dynamic password according to the individual information (comprising personal sign) of certain cryptographic algorithm, key and object, and Verification System is then adjusted automatically synchrodata according to authentication password behind each authentication success and upgraded.When anti-fake certificate, Verification System need know that the dynamic password generating apparatus is which time generates new dynamic password, if new dynamic password of dynamic password generating apparatus generation and Verification System are adjusted automatically synchrodata and are upgraded so that produce authentication password next time inconsistent, as: mistake appears in the Network Transmission, more new data is asynchronous then can to cause authentication end and client, thereby can't reach the purpose of correct authentication, promptly can't reach the purpose of anti-fake certificate.
Summary of the invention
The object of the present invention is to provide and a kind ofly utilize dynamic sign indicating number to carry out the false proof method of mobile phone, this method can help the consumer to discern the true and false of mobile phone at the scene effectively when buying mobile phone, promptly can look into afterwards earlier and buy, solve simultaneously the problem that above-mentioned existing method exists preferably, reached false proof purpose; The present invention also aims to provide the realization system of said method.
The false proof method of mobile phone is carried out in utilization provided by the invention dynamically sign indicating number, at mobile phone and certificate server authentication identification code generating module and authentication sign identifying code generation module are set respectively, wherein authenticating identification code generating module utilizes function f to produce unique authentication identification code f (x), authentication sign identifying code generation module utilizes function f to produce one group of authentication sign identifying code: f (y-m), f (y-(m-1)), f (y-2), f (y-1), f (y), f (y+1), f (y+2), f (y+n), wherein, x is for producing the clock data of authentication identification code f (x), y is the clock data of certificate server when receiving this authentication identification code f (x), m, n is nonnegative number, satisfies-m≤x-y≤n; The process that mobile phone authenticates is:
(1) user utilizes the authentication identification code generating module that is equipped with in the mobile phone to generate the authentication identification code, and by mobile phone it is shown to the user;
(2) user is sent to certificate server with shown authentication identification code by communication network, requires authentication;
(3) certificate server receives after user side comprises the message of requirement authentication of authentication identification code f (x), relatively in one group of authentication sign identifying code whether producing during for y with the certificate server clock data of this authentication identification code is identical, if then judge mobile phone to be certified is certified products, otherwise judges that mobile phone to be certified is a counterfeit;
(4) certificate server sends authentication result to user by communication network.
Realize system for carrying out said process, comprise by certificate server that is connected by communication network and client, wherein: client comprises authentication identification code generating module and client network transport module; Certificate server comprises authentication sign identifying code generation module, certificate server network transmission module and authentication module.
The authentication identification code generating module is used for producing the authentication identification code; The client network transport module be used to finish client the reception task and with the message transmission of certificate server; Authentication sign identifying code generation module is used to produce one group of authentication sign identifying code; The certificate server network transmission module be used to finish certificate server the reception task and with the message transmission of client; Whether the authentication identification code that the comparison client that is used for authentication module transmits is identical with one group of of authenticating the sign identifying code of certificate server authentication sign identifying code generation module generation, judges the true and false of mobile phone with this.
The present invention make a mobile phone that numerous sequence code can be arranged with the authentication sign of the dynamic sign indicating number that can change with clock as mobile phone, has both realized and can repeatedly authenticate, again can not replica code sequence, print one yard more, and can avoid fraud in enormous quantities effectively.Because clock is constantly to change, dynamically sign indicating number utilizes the Data Source of clock as its generation, has guaranteed same mobile phone in the corresponding constantly sequence code difference that produces of difference, and, no matter whether authentication is successful, authentication sign and authentication sign identifying code all can upgrade according to clock synchronously.Give like this to duplicate and crack and be provided with high barrier, make illegal person be difficult to follow the tracks of, crack, to reach false proof purpose, having solved above-mentioned because client and authentication simultaneously holds new data more asynchronous and can't reach the problem of the purpose of correct authentication, and make the consumer to carry out Antiforge inquiry at the scene of buying mobile phone, promptly can look into afterwards earlier and buy.
Description of drawings
Fig. 1 is the structural representation of system of the present invention;
Fig. 2 requires for embodiment of the invention certificate server receives behind the false-proof short message of authentication its operating procedure flow chart that authenticates and handle.
Embodiment
The present invention is further detailed explanation below in conjunction with accompanying drawing and example.
The inventive method may further comprise the steps:
(1) authentication identification code generating module and authentication sign identifying code generation module are set respectively in mobile phone and certificate server, wherein authenticating identification code generating module is that parameter utilizes function f to produce the authentication identification code with the clock data, authenticate identification code as adopting to produce based on the dynamic encrypting method of clock with based on the random number sequence method of the generationing scheduling algorithm of clock, this authentication identification code has dynamic.
Authentication sign identifying code generation module produces one group of authentication sign identifying code according to the identical function f of authentication identification code generating module, wherein has an authentication sign identifying code identical with above-mentioned authentication identification code.
The method that the authentication identification code generating module produces the authentication identification code is: the clock data when the setting authentication identification code generating module produces the authentication identification code is x, utilizes function f to produce unique authentication identification code (sequence code) f (x).Here function f can produce by many different modes, as: based on the dynamic encrypting method of clock and based on random number sequence generation method of clock etc.Wherein, dynamic encrypting method based on clock is to be used for encrypted secret key data the source language message data the cipher-text information data (password) through digital operation generate encryption after encrypted with needs, wherein several bit data that we get the cipher-text information data show as sequence code, wherein, clock data x also can be used as the part of encryption key or encryption key as the part of the source language message data or the source language message data; Random number sequence generation method based on clock is that random number sequence and time data that randomizer produces are made exponent arithmetic, we get the exponent arithmetic result wherein several show as sequence code, wherein, clock data is as index or as the part of index.
The method that authentication sign identifying code generation module produces one group of authentication sign identifying code is: the clock data when setting authentication sign identifying code generation module produces one group of authentication sign identifying code is y, authentication sign identifying code generation module produces one group of authentication sign identifying code: f (y-m) according to the function f same with authenticating identification code generating module, f (y-(m-1)), f (y-2), f (y-1), f (y), f (y+1), f (y+2), f (y+n), (m, n is nonnegative number), wherein, the choosing of m and n is decided by the time error that allows, promptly the authentication identification code generating module that causes owing to the reasons such as network delay in user's operating time and the data transmission procedure produce the authentication sign time x and authentication sign identifying code generation module produce error between the time y that one group of authentication identifies identifying code, need assurance-m≤x-y≤n.
The authentication identification code generating module is stored in the chip for cell phone, and chip for cell phone is solidificated in (as burn-back) in the mobile phone by certain technology, has guaranteed the not reproducible of function f, has reached the purpose of maintaining secrecy.Because the time is constantly to change, so the authentication identification code also is time dependent, therefore even same mobile phone also will produce different sequence code (be that sequence code is dynamic change in time---dynamically yard) in the different moment, and, it is extremely difficult finding the rule that produces sequence code by the known array sign indicating number, and promptly knowing the back by inference according to part known array sign indicating number is extremely difficult constantly with the sequence code that produces.
(2) user utilizes the authentication identification code generating module that is equipped with in the mobile phone to generate authentication identification code (sequence code), and by mobile phone it is shown to the user.
(3) user is sent to certificate server with shown authentication identification code by communication network, requires authentication.
Communication network can be wired or wireless computer network, also can be communication systems such as fax, phone, SMS.
(4) certificate server receives after user side comprises the message of requirement authentication of authentication identification code f (x), relatively in one group of authentication sign identifying code whether producing during for y with the certificate server clock data of this authentication identification code is identical, if determine that then mobile phone to be certified is a certified products, otherwise determine that mobile phone to be certified is a counterfeit.
(5) certificate server sends authentication result to user by communication network.
As shown in Figure 1, the present invention is a kind of utilizes dynamic sign indicating number to carry out the false proof system of mobile phone to be made up of certificate server 1 that is connected by communication network 3 and client 2.Client 2 comprises authentication identification code generating module 21 and client network transport module 22; Certificate server 1 comprises authentication sign identifying code generation module 11, certificate server network transmission module 12 and authentication module 13.
Authentication identification code generating module 21 is used for producing the authentication identification code, is to be equipped with the function f that can produce the authentication identification code in mobile phone; Client network transport module 22 be used to finish client 2 the reception task and with the message transmission of certificate server 1; Authentication sign identifying code generation module 11 is used to produce one group of authentication sign identifying code, is to be equipped with and the same function f of client 2 authentication identification code generating module 21 at certificate server 1; Certificate server network transmission module 12 be used to finish certificate server 1 the reception task and with the message transmission of client 2; Whether the authentication identification code that the comparison client 2 that is used for authentication module 13 transmits is identical with one group of of authenticating the sign identifying code of certificate server 1 authentication sign identifying code generation module 11 generations, judges the true and false of mobile phone with this; Communication network 3 is used for linking to each other with client network transport module 22 with certificate server network transmission module 12, realize the communication between certificate server 1 and the client 2, can be wired or wireless computer network, also can be communication systems such as fax, phone, SMS.
When needing the authentication mobile phone true and false, the user only need produce authentication identification code (sequence code) by authentication identification code generating module 21, and it is shown to the user by mobile phone, the user should authenticate identification code by communication network 3, and to send to certificate server 1 etc. to be certified, certificate server 1 by its authentication module 13 relatively the authentication identification code that transmits of client 2 whether with one group of authentication sign identifying code that authentication sign identifying code generation module 11 produces in one identical, judge the true and false of mobile phone with this, and send authentication result to user by communication network 3.
Embodiment:
The example of buying certain brand mobile phone with the existing desire of a consumer comes enforcement of the present invention is described in further detail below.Be solidified with the function f that can produce the authentication identification code in this chip for cell phone that the existing desire of consumer is bought; Certificate server be equipped with mobile phone in be equipped with the same function f can produce the authentication identification code.Because the feature of authentication identification code is satisfied in utilization based on the password of the dynamic encrypting method generation of clock, so, here authenticate the dynamic encrypting method of the generation utilization of identification code based on clock, its basic principle is to be used for the encrypted secret key data cipher-text information data (password) of the source language message data after digital operation generates encryption encrypted with needs.Wherein, the source language message data are real-time time " 200701221921 " (representing 19: 21 on the 22nd January in 2007), encrypt and adopt the RSA public-key encryptosystem, after the encryption, the mobile phone per minute is corresponding different from 25 long passwords, and we get the 20th of this password and show as sequence code to the 25th.Wherein, the generation of authentication identification code is based on clock, promptly changes with clock.Clock data can be used as the part of the source language message data or the source language message data, also can be used as the part of encryption key or encryption key, certainly, also can adopt other mode that clock data is used in this dynamic encrypting method.In concrete the enforcement available cryptographic algorithm, the source language message data etc. be not limited to above we adopted.
The course of work of this Antiforge inquiry system is:
(1) user starts mobile phone to be certified (start);
(2) user's simple operations handset-selected " generating dynamically sign indicating number " to be certified function, mobile phone to be certified promptly selects to utilize its function f that can produce the authentication identification code to produce sequence code (authentication identification code) " 420165 " according to the user, and it is shown to the user;
(3) user utilizes an other mobile phone of having opened that the authentication identification code that (2) produce is required authentication by the certificate server that the Antiforge inquiry note sends to desire purchase participants in a bridge game machine, the actual content of this note is " #420165# " (form of Antiforge inquiry note is " # authentication identification code # "), also can send the information that requires authentication by modes such as fax, network, phones here;
(4) certificate server authenticates and handles it after receiving the false-proof short message of above-mentioned requirements authentication, below in conjunction with Fig. 2 its concrete steps is described as follows:
(4.1) find that this note meets the form of Antiforge inquiry note, therefrom extract authentication identification code " 420165 ";
(4.2) utilize with mobile phone in be equipped with the same function f that can produce the authentication identification code and calculate one group of authentication sign identifying code " 496465,684597,420165,494581,894654 ", what we calculated here is the time that certificate server receives false-proof short message, with and front 3 minutes, back 1 minute, 5 different sequence codes in totally 5 fens clock times;
(4.3) retrieving this group authentication sign identifying code, find that the 3rd authentication sign identifying code " 420165 " is identical with the authentication identification code that client transmits in this group authentication sign identifying code, is of an established trade mark so judge mobile phone to be certified.
(5) certificate server feeds back to the user with authentication result by note, and short message content is " sequence code that you inquired about is of an established trade mark for the mobile phone of " 420165 " ".
Claims (3)
1, a kind ofly utilize dynamic sign indicating number to carry out the false proof method of mobile phone, at mobile phone and certificate server authentication identification code generating module and authentication sign identifying code generation module are set respectively, wherein authenticating identification code generating module utilizes function f to produce unique authentication identification code f (x), authentication sign identifying code generation module utilizes function f to produce one group of authentication sign identifying code: f (y-m), f (y-(m-1)), f (y-2), f (y-1), f (y), f (y+1), f (y+2), f (y+n), wherein, x is for producing the clock data of authentication identification code f (x), y is the clock data of certificate server when receiving this authentication identification code f (x), m, n is nonnegative number, satisfies-m≤x-y≤n;
The process that mobile phone authenticates is:
(1) user utilizes the authentication identification code generating module that is equipped with in the mobile phone to generate the authentication identification code, and by mobile phone it is shown to the user;
(2) user is sent to certificate server with shown authentication identification code by communication network, requires authentication;
(3) certificate server receives after user side comprises the message of requirement authentication of authentication identification code f (x), relatively in one group of authentication sign identifying code whether producing during for y with the certificate server clock data of this authentication identification code is identical, if then judge mobile phone to be certified is certified products, otherwise judges that mobile phone to be certified is a counterfeit;
(4) certificate server sends authentication result to user by communication network.
2, method according to claim 1 is characterized in that: authentication identification code generating module utilization generates the authentication identification code based on the dynamic encrypting method of clock or based on the random number sequence generation method of clock.
3, a kind of system that realizes the described method of claim 1, it is characterized in that: this system is made up of certificate server (1) that is connected by communication network (3) and client (2), and client (2) comprises authentication identification code generating module (21) and client network transport module (22);
Authentication identification code generating module (21) is that parameter utilizes function f to produce the authentication identification code with the clock data, client network transport module (22) be used to finish client (2) the reception task and with the message transmission of certificate server (1);
Certificate server (1) comprises authentication sign identifying code generation module (11), certificate server network transmission module (12) and authentication module (13);
Authentication sign identifying code generation module (11) produces one group of authentication sign identifying code according to the identical function f of authentication identification code generating module, wherein has an authentication sign identifying code identical with above-mentioned authentication identification code;
Certificate server network transmission module (12) be used to finish certificate server (1) the reception task and with the message transmission of client (2);
One of the authentication sign identifying code whether the authentication identification code that the comparison client (2) that is used for authentication module (13) transmits produces with authentication sign identifying code generation module (11) is identical, judges the true and false of mobile phone with this.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200710051512 CN101034985A (en) | 2007-02-09 | 2007-02-09 | Method and system for the anti-counterfeit of the mobile phone with the dynamic code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200710051512 CN101034985A (en) | 2007-02-09 | 2007-02-09 | Method and system for the anti-counterfeit of the mobile phone with the dynamic code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101034985A true CN101034985A (en) | 2007-09-12 |
Family
ID=38731305
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200710051512 Pending CN101034985A (en) | 2007-02-09 | 2007-02-09 | Method and system for the anti-counterfeit of the mobile phone with the dynamic code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101034985A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101895554A (en) * | 2010-07-26 | 2010-11-24 | 贵阳高新华美龙技术有限公司 | Dynamic code anti-counterfeiting method and system |
CN101982989A (en) * | 2010-10-29 | 2011-03-02 | 蒋晴琴 | Encryption system based on coating anti-counterfeit technology |
CN101730276B (en) * | 2008-10-31 | 2012-05-30 | Tcl集团股份有限公司 | Anti-counterfeiting method for network terminal device |
CN103136678A (en) * | 2013-03-04 | 2013-06-05 | 北京奇虎科技有限公司 | Identification method and device of intelligent terminal, processing method and device of identification information and identification system |
CN103873259A (en) * | 2014-03-28 | 2014-06-18 | 徐永君 | Method and system for anti-fake authentication of dynamic code based on time factors |
CN104698919A (en) * | 2014-12-30 | 2015-06-10 | 北京奇虎科技有限公司 | Method and device for inspecting intelligent terminal |
WO2015161514A1 (en) * | 2014-04-24 | 2015-10-29 | 吉瑞高新科技股份有限公司 | Information interaction system and information interaction method applied to electronic cigarette |
US9426130B2 (en) | 2014-07-21 | 2016-08-23 | Xiaomi Inc. | Methods, devices and systems for anti-counterfeiting authentication |
CN106815734A (en) * | 2015-11-27 | 2017-06-09 | 方正国际软件(北京)有限公司 | A kind of information transferring method and device |
CN112100983A (en) * | 2020-08-14 | 2020-12-18 | 许继集团有限公司 | Identification code used in system and generation method of identification code |
-
2007
- 2007-02-09 CN CN 200710051512 patent/CN101034985A/en active Pending
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101730276B (en) * | 2008-10-31 | 2012-05-30 | Tcl集团股份有限公司 | Anti-counterfeiting method for network terminal device |
CN101895554A (en) * | 2010-07-26 | 2010-11-24 | 贵阳高新华美龙技术有限公司 | Dynamic code anti-counterfeiting method and system |
CN101982989A (en) * | 2010-10-29 | 2011-03-02 | 蒋晴琴 | Encryption system based on coating anti-counterfeit technology |
CN103136678A (en) * | 2013-03-04 | 2013-06-05 | 北京奇虎科技有限公司 | Identification method and device of intelligent terminal, processing method and device of identification information and identification system |
CN103873259A (en) * | 2014-03-28 | 2014-06-18 | 徐永君 | Method and system for anti-fake authentication of dynamic code based on time factors |
WO2015161514A1 (en) * | 2014-04-24 | 2015-10-29 | 吉瑞高新科技股份有限公司 | Information interaction system and information interaction method applied to electronic cigarette |
US9426130B2 (en) | 2014-07-21 | 2016-08-23 | Xiaomi Inc. | Methods, devices and systems for anti-counterfeiting authentication |
CN104698919A (en) * | 2014-12-30 | 2015-06-10 | 北京奇虎科技有限公司 | Method and device for inspecting intelligent terminal |
CN106815734A (en) * | 2015-11-27 | 2017-06-09 | 方正国际软件(北京)有限公司 | A kind of information transferring method and device |
CN106815734B (en) * | 2015-11-27 | 2022-02-08 | 方正国际软件(北京)有限公司 | Information transmission method and device |
CN112100983A (en) * | 2020-08-14 | 2020-12-18 | 许继集团有限公司 | Identification code used in system and generation method of identification code |
CN112100983B (en) * | 2020-08-14 | 2024-05-10 | 许继集团有限公司 | Identification code used in system and generation method of identification code |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101034985A (en) | Method and system for the anti-counterfeit of the mobile phone with the dynamic code | |
CN108876332B (en) | Block chain safe transaction method and device based on biometric feature mark authentication | |
CN1302407C (en) | Equipment identifying system | |
CN1281608A (en) | Cryptographic key generation using biometric data | |
CN102045367A (en) | Registration method and authentication server of real-name authentication | |
CN1588386A (en) | System and method for realizing article information detection by radio frequency identification and mobile communication combination | |
CN103679436A (en) | Electronic contract security system and method based on biological information identification | |
JP2005010826A (en) | Authentication terminal device, biometrics information authentication system and biometrics information acquisition system | |
MY139673A (en) | Data communication system, agent system server, computer program, and data communication method | |
CN101076165A (en) | Mobile antifogery method and system based on cell phone | |
CN1713571A (en) | Double-path pre-approval authentication method | |
CN1934823A (en) | Anonymous authentication method | |
CN1831865A (en) | Electronic bank safety authorization system and method based on CPK | |
CN112000933B (en) | Application software activation method and device, electronic equipment and storage medium | |
CN1750462A (en) | Method for realizing identity identification by mobile terminal | |
CN1494686A (en) | User identification with improved password input method | |
CN1321950A (en) | Content sender machine, content receiver machine, authorizing method and system | |
CN110474766B (en) | Random password generation method and device and identity authentication method | |
KR20130085492A (en) | Authentication system and method by use of non-fixed user id | |
CN112270636A (en) | Block chain-based consignment logistics management method, device, terminal and storage medium | |
CN110084329A (en) | The set code method of centre letter code | |
CN113947462A (en) | Method and system for matching bank flow data with ceramic industry platform order | |
CN108876367B (en) | Identity authentication method and device based on virtual number | |
CN101290645A (en) | Method for enhancing information safety equipment verification safety | |
WO2018002621A1 (en) | Authentication method & apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20070912 |