CN108952337A - A kind of coded lock password setting method and its coded lock authentication system - Google Patents
A kind of coded lock password setting method and its coded lock authentication system Download PDFInfo
- Publication number
- CN108952337A CN108952337A CN201710365086.1A CN201710365086A CN108952337A CN 108952337 A CN108952337 A CN 108952337A CN 201710365086 A CN201710365086 A CN 201710365086A CN 108952337 A CN108952337 A CN 108952337A
- Authority
- CN
- China
- Prior art keywords
- coded lock
- code
- unlocking
- lock
- drop
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B37/00—Permutation or combination locks; Puzzle locks
- E05B37/0003—Permutation or combination locks; Puzzle locks preventing detection of the combination
- E05B37/0006—Permutation or combination locks; Puzzle locks preventing detection of the combination by avoiding unauthorized viewing of the combination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Abstract
The main object of the present invention is to provide a kind of coded lock password setting method and its coded lock authentication system, makes the simpler convenience of the password setting of coded lock, and can carry out more efficiently authentication to commodity.This method includes generating data, production drop, assembling coded lock, setting unlocking code, cryptographic verification, dialling lock and examine and load in mixture, the relevant operation of same unlocking code divides in each step carries out in same batch, the relevant operation of different unlocking codes all divides to be carried out in different batches, it improves work efficiency, and effectively reduces error probability.The system is provided with authentication protection, and can effectively prevent the criminal to play tricks can not cheat consumer by the identification label of large batch of duplication certified products.
Description
Technical field
The present invention relates to coded lock technology field, in particular to a kind of coded lock password setting method and its coded lock identity
Verifying system.
Background technique
As the improvement of people's living standards, the demand of drinks especially high-grade for drinks is more and more vigorous.However, existing
In market, fake wine is more and more, causes user to there is the drinks of many brands and queries.In existing market, many commodity personations are pseudo-
Bad phenomenon is on a rampage, remains incessant after repeated prohibition.Personation mode is also that style is numerous, is emerged one after another.Such as with the used packet of genuine certified products
Dress or imitated genuine packaging cause to be difficult to differentiate the true and false since the majority of consumers are limited to identity validation technology understanding.Manufacturer is general
Time way be locked by coded lock bottle bottleneck carry out authentication.Coded lock needs a password during to code
A corresponding identifying code, namely one identifying code of scanning, one password of corresponding input.Using pair of the corresponding identifying code of a password
Code method, it is troublesome in the production process of the password authentification of coded lock, it is unfavorable for quickly producing.
Identification password lock bottle cap is a kind of novel authentication mode, and consumer compiles the authentication on bottle cap
Code is sent to inquiry system by modes such as network barcode scanning, phone or short messages, so that it may distinguish the true from the false and inquire opening for bottle cap
Lock cipher opens bottle cap with that can open coded lock after unlocking cipher.But how by bottle cap authentication coding with
The unlocking cipher of bottle cap is bound, this is a technical problem.
In existing patent " 201110262041.4 ", be referred to a kind of coded lock anti-counterfeiting bottle cap to code production method.Though
It so solves and how to bind the unlocking cipher of anti-fake code and bottle cap on bottle cap, but the production process ten of this method
It is point cumbersome, it takes time and effort.In the case where nowadays cost of human resources is high, it is necessary to improve a kind of more time saving and energy saving side
Method, to produce a new technical problem again.
Summary of the invention
The main object of the present invention is to provide a kind of coded lock password setting method and its coded lock authentication system, makes
The simpler convenience of the production of coded lock, and more efficiently authentication can be carried out to commodity.
In order to achieve the above object, the present invention provides a kind of coded lock password setting method, comprising the following steps:
1) generate data: system is generated using Encryption Algorithm and the matched identification label of unlocking code, and imports data to number
According to management platform;
2) it makes drop: identification label is added on drop, and addition is identified that the drop after label is packaged, it is same
The drop of unlocking code is placed on same packet, and unlocking code is marked in packaging;
3) it assembles coded lock: drop is mounted on coded lock, the corresponding coded lock of the drop of the same unlocking code is placed
Unlocking code is marked in same transferring box, and in outer container;
4) unlocking code is set: setting the unlocking code of the coded lock in each case to the unlocking code of outer container mark;
5) cryptographic verification: the identification label on drop on scanning coded lock, after checkout scanning from data management platform
Whether consistent with the unlocking code of the coded lock get unlocking code;
6) it dials lock to examine: dialling the lock collar of random coded lock, examine whether coded lock can be locked, it is impossible to the coded lock locked
Cancel, the lock collar for the coded lock that can be locked reversed into unlocking pin position, examines whether coded lock can normally unlock, it is impossible to
The coded lock normally unlocked cancels, and the lock collar for the coded lock that can normally unlock is dialled unrest again;
7) it loads in mixture: the coded lock of different unlocking codes is loaded in mixture in the same packing case.
The present invention also provides a kind of authentication systems applied to above-mentioned coded lock, including one or more password
Lock, barcode scanning tool and data management platform, the coded lock are provided with identification label, and the identification label has A code and B
Code.
Preferably, the A code is used to inquire the unlocking cipher of the coded lock.For inquiring the quotient using the coded lock
The true and false of product.
Preferably, the A code is bar code and/or two dimensional code.
Preferably, the B code is used to inquire the true and false of the commodity using the coded lock.
Preferably, the B code is authentication code.
Preferably, it is coated on B code region on the identification label and scrapes silver coating.
Preferably, the data management platform protects B code setting authentication, when being that B code setting one is effective
Long, the authentication protection is opened after B code is scanned for the first time, and B code cancels after the effective time.
Preferably, the effective time is set as 0-7 days.
The present invention compared with the existing technology, have following advantages and effects
1) effectively the unlocking cipher of identification label and coded lock on coded lock can be bound, and simple easy
Row, accuracy is high, good reliability, it is not easy to malfunction, efficiently solve current product identification verifying problem, ensured consumer
Interests with the production firm of certified products commodity are not by the illegal infringement of criminal.
2), it can be achieved that a unlocking code corresponds to multiple identification labels and during production, it then follows batch production
Principle, the relevant operation of same unlocking code divides in each step carries out in the same period, the relevant operation of different unlocking codes
All divide and carried out in different periods, is improved work efficiency, and effectively reduce error probability.
3) when queried, the A code on identification label can be sent to by way of network barcode scanning, phone or short message
Inquiry system, inquiry system provide the unlocking cipher of coded lock for inquiry, B code are sent to inquiry system, inquiry system is
Inquiry provides commodity true and false information.Data management platform is opened authentication to the B code and is protected after B code is inquired for the first time
Shield, the B code cancels after effective time, and inquiry cannot inquire any information by the B code again.Therefore, it plays tricks
Criminal can not cheat consumer by the identification label of large batch of duplication certified products.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, in conjunction with following accompanying drawings to this hair
Bright further explanation.
Fig. 1 is the flow chart of production method of the present invention.
Fig. 2 is the schematic diagram of present invention identification label.
Specific embodiment
In order to facilitate the understanding of those skilled in the art, the present invention is made further specifically with reference to the accompanying drawings and embodiments
It is bright.
Referring to Fig.1, in embodiments of the present invention, the coded lock password setting method the following steps are included:
Step S1: data are generated, system is generated using Encryption Algorithm and the matched identification label of unlocking code, and data are led
Enter data management platform.
String number is set as unlocking code, then generates the string number and this string of numbers by Encryption Algorithm system
The matched identification label of word, wherein string number generates multiple and different identification labels, and both multiple and different identification labels was corresponding
Same string number, finally by unlocking code importing data management platform corresponding with the identification label after generation.
Step S2: identification label is added on drop by production drop, and addition is identified that the drop after label is packaged,
The drop of the same password is placed on same packet, and unlocking code is marked in packaging.
The identification label that step S1 is generated is added on drop by modes such as printings, corresponds to same unlocking code according to having
Identification label drop as same group of drop, according to the principle of batch production, after one group of drop of every completion, by this group of drop
It is packaged, and marks unlocking code in packaging, in the production for carrying out next group of drop, completed until all drops produce.
Same group of drop of batch production in the step can make drop production further increase efficiency, and be not easy
Confusion reigned in process of production.
Step S3: drop is mounted on coded lock, the corresponding coded lock of the drop of the same password is put by assembling coded lock
It sets in same transferring box, and marks unlocking code in outer container.
It combines step S2 packed drop with the coded lock for not setting unlocking code, according to the principle of batch production, often
After one group of drop is combined with the coded lock that a batch does not set unlocking code, then completes next group of drop and do not set unlocking code with another batch
Coded lock combination, every a collection of coded lock after combination is placed on same transferring box, and in transferring box outer container mark and its password
Lock the unlocking code on combined drop.
Step S4: setting unlocking code sets the unlocking code of the coded lock in each case to the unlocking code of outer container mark.
Unlocking code is set for the coded lock in each case of step S3, which is the unlocking code of outer container mark.
Because the unlocking code that the needs of the coded lock in each case are arranged be it is identical, setting coded lock unlocking
During code, the operator set only needs to set coded lock to same unlocking code, does not allow to be also easy to produce think of in this way
Dimension is chaotic, working efficiency can be improved, and reduce the probability that wrong unlocking code is arranged.
It is divided to the reason of carrying out for two steps to be that operator can be made only to need as one step S3 and step S4
Duty, the personnel for being responsible for assembling coded lock assemble coded lock, and unlocking cipher is arranged in the personnel for being responsible for setting unlocking cipher, can be improved
Working efficiency, and reduce error probability.Certainly, step S3 can merge progress with step S4.
Step S5: cryptographic verification scans the identification label on the drop on coded lock, puts down after checkout scanning from data management
It is whether consistent with the unlocking code of the coded lock that unlocking code is got in platform.
Inspection is scanned to the identification label of each coded lock of each case coded lock for completing step S4, checks number
Whether the unlocking code according to management platform feedback is consistent with the unlocking code marked on transferring box, and the inconsistent coded lock of code of unlocking is made
It is useless.It is of course possible to which staff makes a fault when there is mark unlocking code, unlocking code marking error will be marked, at this point, such as
In the case that the unlocking code marked on the unlocking code and transferring box that fruit provides there are data management platform is inconsistent, and data pipe
Platform continuously provides same identical unlocking code, which is the unlocking code of coded lock on the transferring box, and in transfer
Again unlocking code is marked on case.
Step S6: dialling lock and examine, and dials the lock collar of random coded lock, examines whether coded lock can be locked, it is impossible to lock
Coded lock cancels, and the lock collar for the coded lock that can be locked is reversed unlocking pin position, examines whether coded lock can normally unlock,
The coded lock that cannot normally unlock is cancelled, the lock collar for the coded lock that can normally unlock is dialled into unrest again.
Whether step S6 carries out physical examination to coded lock, examine coded lock will be close when whether breaking down or carry out step S4
Mistake is arranged in code lock unlocking code, the coded lock calcellation of abnormal unlocking is handled, the lock collar of normal coded lock dials unrest again.
Step S1-S6 follows the principle of batch production, and the relevant operation of same unlocking code divides in each step
Same batch carries out, and the relevant operation of different unlocking codes all divides to be carried out in different batches, improves work efficiency, and effective
Reduce error probability.
Step S7: loading in mixture, and the coded lock of different unlocking codes is loaded in mixture in the same packing case.
The more case coded locks for completing step S6 are upset, the coded lock after upsetting loads in mixture in the same packing case.
Referring to Fig. 2, a kind of authentication system applied to above-mentioned coded lock, including one or more coded lock, sweep
Code tool and data management platform, the coded lock are provided with identification label 3, and the identification label has A code 1 and B code 2.
The A code 1 is used to inquire the unlocking code of the coded lock, and the A code 1 is bar code 11 and/or two dimensional code 12.
The B code 2 is used to inquire the true and false of the commodity using the coded lock, and the B code 2 is authentication code 21.Institute
It states to be coated on 2 region of B code on identification label 3 and scrapes silver coating 22.
The data management platform protects the B code 2 setting authentication, sets an effective time for B code 2, works as B
Authentication protection is opened after code 2 is scanned for the first time, the calcellation of B code 2 after the effective time.The effective time
It is set as 0-7 days.
When queried, the A code 1 on identification label can be sent to by way of network barcode scanning, phone or short message
Inquiry system, inquiry system provide the unlocking cipher of coded lock for inquiry, B code 2 are sent to inquiry system, inquiry system is
Inquiry provides commodity true and false information.Data management platform is opened authentication to the B code 2 and is protected after B code 2 is inquired for the first time
Shield, the B code 2 cancels after effective time, and inquiry cannot inquire any information by the B code 2 again.Therefore, it plays tricks
Criminal can not pass through it is large batch of duplication certified products identification label cheat consumer.
Above-mentioned specific embodiment is the preferred embodiment of the present invention, can not be limited the invention, and others are appointed
The change or other equivalent substitute modes what is made without departing from technical solution of the present invention, are included in protection of the invention
Within the scope of.
Claims (9)
1. a kind of coded lock password setting method, it is characterised in that: include the following steps,
1) generate data: system is generated using Encryption Algorithm and the matched identification label of unlocking code, and imports data to data pipe
Platform;
2) it makes drop: identification label is added on drop, and addition is identified that the drop after label is packaged, the same unlocking
The drop of code is placed on same packet, and unlocking code is marked in packaging;
3) it assembles coded lock: drop being mounted on coded lock, the corresponding coded lock of drop of the same unlocking code is placed on together
One transferring box, and unlocking code is marked in outer container;
4) unlocking code is set: setting the unlocking code of the coded lock in each case to the unlocking code of outer container mark;
5) cryptographic verification: the identification label on the drop on coded lock is scanned, is obtained from data management platform after checkout scanning
It is whether consistent with the unlocking code of the coded lock to unlocking code;
6) it dials lock to examine: dialling the lock collar of random coded lock, examine whether coded lock can be locked, it is impossible to which the coded lock locked is made
It is useless, the lock collar for the coded lock that can be locked is reversed into unlocking pin position, examines whether coded lock can normally unlock, it is impossible to just
The coded lock of normally opened lock cancels, and the lock collar for the coded lock that can normally unlock is dialled unrest again;
7) it loads in mixture: the coded lock of different unlocking codes is loaded in mixture in the same packing case.
2. a kind of authentication system of the coded lock applied to the manufacture of claim 1 the method, it is characterised in that: including one
A or multiple coded locks, barcode scanning tool and data management platform, the identification label have A code and B code.
3. a kind of coded lock authentication system according to claim 2, it is characterised in that: the A code is for inquiring institute
State the unlocking code of coded lock.
4. a kind of coded lock authentication system according to claim 2 or 3, it is characterised in that: the A code is bar code
And/or two dimensional code.
5. a kind of coded lock authentication system according to claim 2, it is characterised in that: the B code makes for inquiring
With the true and false of the commodity of the coded lock.
6. a kind of coded lock authentication system according to claim 2 or 5, it is characterised in that: the B code is tested for identity
Demonstrate,prove code.
7. a kind of coded lock authentication system according to claim 2 or 5, it is characterised in that: B on the identification label
It is coated on code region and scrapes silver coating.
8. a kind of coded lock authentication system according to claim 2, it is characterised in that: the data management platform pair
The B code setting authentication is protected, and sets an effective time, authentication after B code is scanned for the first time for B code
Protection is opened, and B code cancels after the effective time.
9. a kind of coded lock authentication system according to claim 8, it is characterised in that: the effective time is set as
0-7 days.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710365086.1A CN108952337A (en) | 2017-05-22 | 2017-05-22 | A kind of coded lock password setting method and its coded lock authentication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710365086.1A CN108952337A (en) | 2017-05-22 | 2017-05-22 | A kind of coded lock password setting method and its coded lock authentication system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108952337A true CN108952337A (en) | 2018-12-07 |
Family
ID=64463076
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710365086.1A Pending CN108952337A (en) | 2017-05-22 | 2017-05-22 | A kind of coded lock password setting method and its coded lock authentication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108952337A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040230843A1 (en) * | 2003-08-20 | 2004-11-18 | Wayne Jansen | System and method for authenticating users using image selection |
CN102446273A (en) * | 2011-09-06 | 2012-05-09 | 贵州卓霖防伪科技有限公司 | Method for producing pair code of code-locked anti-counterfeit bottle cap |
CN105550622A (en) * | 2016-01-14 | 2016-05-04 | 深圳市感知华美龙物联网有限公司 | Code matching method and code matching system of coded lock |
CN105667984A (en) * | 2016-03-08 | 2016-06-15 | 四川省绵竹剑南春酒类经营有限公司 | Anti-counterfeit bottle cap with inside and outside multiple information codes and manufacturing method of anti-counterfeit bottle cap |
-
2017
- 2017-05-22 CN CN201710365086.1A patent/CN108952337A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040230843A1 (en) * | 2003-08-20 | 2004-11-18 | Wayne Jansen | System and method for authenticating users using image selection |
CN102446273A (en) * | 2011-09-06 | 2012-05-09 | 贵州卓霖防伪科技有限公司 | Method for producing pair code of code-locked anti-counterfeit bottle cap |
CN105550622A (en) * | 2016-01-14 | 2016-05-04 | 深圳市感知华美龙物联网有限公司 | Code matching method and code matching system of coded lock |
CN105667984A (en) * | 2016-03-08 | 2016-06-15 | 四川省绵竹剑南春酒类经营有限公司 | Anti-counterfeit bottle cap with inside and outside multiple information codes and manufacturing method of anti-counterfeit bottle cap |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2019264274B2 (en) | Methods and systems for automatic object recognition and authentication | |
CN110062940B (en) | PUF-based composite security markings for protection against counterfeiting | |
CN110073430B (en) | PUF-based composite security mark for anti-counterfeiting | |
US7786866B2 (en) | Radio frequency identification (RFID) system that meets data protection requirements through owner-controlled RFID tag functionality | |
US8791794B2 (en) | Method and device for obtaining item information using RFID tags | |
CN113574913A (en) | Method and system for preparing and performing object authentication | |
CN107292629A (en) | Anti-counterfeit tracking verification method based on block chain and the device using this method | |
CN102088375B (en) | The artificial immune system of protection privacy | |
CN104992335A (en) | Full-circulation type two-dimensional code anti-counterfeiting system and realization method thereof | |
CN111639729B (en) | RFID and blockchain-based anti-counterfeiting tracing method | |
JP2016522948A (en) | Product authentication system and product authentication method | |
CN101388086A (en) | Digital coding method for products anti-counterfeiting physical distribution monitoring system | |
RU2216776C2 (en) | Method and system for identifying and accounting marked objects | |
CN106971311A (en) | A kind of false proof traceability system of logistics Means of Agricultural Production and method | |
CN102622624B (en) | A kind of commodity counterfeit prevention identification system and method | |
CN100501779C (en) | Data protective radio-frequency identification (RFID) system by means of an owner controlled RFID-tag functionality | |
CN106339888A (en) | RFID wine product all-round anti-fake monitoring method | |
US9495570B2 (en) | Method for authenticating an RFID tag | |
CN108108780A (en) | A kind of commodity packaging and its dimension code anti-counterfeit method | |
CN107563768A (en) | A kind of digital anti-counterfeiting coding method with universality high strength characteristics | |
CN108952337A (en) | A kind of coded lock password setting method and its coded lock authentication system | |
CN206757700U (en) | A kind of false proof traceability system of logistics Means of Agricultural Production | |
CN110503437A (en) | Based on the article anti-counterfeit method more identified and its system | |
CN102332066B (en) | Authentication management system and method of code jumping chip identification codes | |
Bilal | Addressing security and privacy issues in low-cost RFID systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181207 |
|
RJ01 | Rejection of invention patent application after publication |