CN202815922U - System device for verifying fact or fiction - Google Patents
System device for verifying fact or fiction Download PDFInfo
- Publication number
- CN202815922U CN202815922U CN 201220398382 CN201220398382U CN202815922U CN 202815922 U CN202815922 U CN 202815922U CN 201220398382 CN201220398382 CN 201220398382 CN 201220398382 U CN201220398382 U CN 201220398382U CN 202815922 U CN202815922 U CN 202815922U
- Authority
- CN
- China
- Prior art keywords
- module
- security code
- code
- communication terminal
- product
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The utility model discloses a system device for verifying fact or fiction, which comprises verification module, a server side, a mobile communication terminal and an identification setting end, wherein the verification module is used for verifying an anti-counterfeiting code to confirm the fact or fiction, and the server side is used for sending a verification result to a feedback module of the mobile communication terminal. The identification setting end comprises a generating module, a combining module and a setting module, wherein the generating module is used for generating a unique anti-counterfeiting code, the combining module is used for covering the anti-counterfeiting code by a non-transparent coating and enabling the anti-counterfeiting code to be seen after the non-transparent coating is damaged, and the setting module is used for setting the anti-counterfeiting code covered by the non-transparent coating at the end of the verified product. The mobile communication terminal comprises a scanning module, a sending module and a receiving module, wherein the scanning module is used for scanning and acquiring the anti-counterfeiting code set on the end of the verified product, the sending module is used for sending the anti-counterfeiting code to the server side, and the receiving module is used for receiving the verification result of the server side. According to the utility model, possibility for copying and reusing a check code and an unexposed anti-counterfeiting code by fake makers can be effectively prevented, the verification complexity is greatly lowered, and anti-counterfeiting efficiency is improved.
Description
Technical field
The present invention relates to the application of electronic technology field, particularly relate to a kind of authenticity verification system and device.
Background technology
Society, for present domestic fraud, pirate movable rampant, although departments of government has strengthened hitting dynamics, production firm also constantly updates various anti-counterfeiting technologies, but the fraud activity still remains incessant after repeated prohibition, bring very large consumption hidden danger to consumers in general, bring very large interests loss for vast manufacturer.
Present existing a lot of anti-counterfeiting technologies, such as the laser color-changing anti-counterfeit, the technology such as hologram pattern is false proof, temperature discoloring is false proof, extraordinary version antiforge, because anti-counterfeiting technology randomness is relatively poor, do not possess uniqueness, and can not carry out anti-counterfeiting mark to single products, causes being copied by the fake producer easily; In addition, existing anti-counterfeiting technology is because its technology content is lower, very easily is cracked and grasps; Also have, existing anti-counterfeiting technology exists the fake certification program complicated usually, is not easy to the problems such as operation.As seen, existing anti-counterfeiting technology exists problems to cause antifalse effect relatively poor, and the fraud activity still remains incessant after repeated prohibition, and therefore, is badly in need of a kind of anti-counterfeiting technology of effective, convenient and easy operating to satisfy people to false proof demand.
Summary of the invention
The invention provides a kind of authenticity verification system and device, satisfy people to false proof demand so that a kind of anti-counterfeiting technology effective, convenient and easy operating to be provided.
For achieving the above object, the embodiment of the invention provides following scheme:
A kind of authenticity verification system and device comprises that service end, communication terminal and sign arrange end:
Described sign arranges end, comprising:
Generation module is used for generating unique security code;
Composite module is used for described security code is covered by opaque coating, so that described security code is destroyed as seen rear at described opaque coating;
Module is set, is used for to be located at by the security code that opaque coating covers being verified the product end;
Described communication terminal comprises,
Scan module is used for scanning to obtain being located at the described security code that is verified the product end;
Sending module is used for sending described security code to described service end;
Receiver module is for the result that receives described service end;
Described service end comprises:
Authentication module is used for security code is carried out the demonstration validation true and false;
Feedback module is used for the result is sent to described communication terminal.
Further, described authentication module also comprises:
The first matched sub-block is used at the described security code of database coupling;
First time number is judged submodule, and the matching result that is used for when described the first matched sub-block is when the match is successful, judges matching times;
First confirms submodule, and the matching result that is used for when described the first matched sub-block is when it fails to match, confirms as false product; When described first number judges that the judged result of submodule is first coupling, confirm as genuine piece.
Preferably, described sign arranges end and also comprises:
The first encrypting module is used for described security code is encrypted processing;
Described composite module is used for and will be covered by opaque coating through the security code of described encryption.
Further, described service end also comprises:
The first deciphering module is used for the security code of encrypting is decrypted processing.
Further, described generation module also is used for generating unique check code;
Described composite module also is used for described check code is printed in described opaque coating;
Described communication terminal also comprises receiver module, is used for receiving obtaining described check code;
Described sending module is used for sending described check code to described service end.
Preferably, described authentication module comprises:
The second matched sub-block is used at the database described check code of coupling and security code;
Second time number is judged submodule, and the matching result that is used for when described the second matched sub-block is when the match is successful, judges matching times;
Second confirms submodule, and the matching result that is used for when described the second matched sub-block is when it fails to match, confirms as false product; When described second number judges that the judged result of submodule is first coupling, confirm as genuine piece.
Further, described sign arranges end and also comprises:
The second encrypting module is used for check code and security code are encrypted processing;
Described composite module, concrete being used for will be covered by opaque coating through the security code of described encryption; To be printed in through the check code of described encryption on the described opaque coating.
Further, described service end also comprises: the second deciphering module is used for check code and the security code encrypted are decrypted processing.
The present invention is because the employing communication terminal carries out fake certification, thereby so that the more flexible facility of checking can be carried out authenticity verification whenever and wherever possible.And, in to the Product Validation process, need and will just can see security code after the opaque coating destruction, increased the difficulty of faking, thereby can prevent effectively that the fake producer from copying the possibility of recycling to not being exposed to outer security code.As seen, the embodiment of the invention greatly reduces the complicacy of checking, really accomplishes can verify whenever and wherever possible, thereby has improved false proof validity.
Secondly, can also be further in to the Product Validation process, adopt check code and two kinds of signs of security code to carry out particular combinations, so that security code only in the destroyed rear ability of check code as seen, check code can be destroyed during to Product Validation, destroyed check code will can not known by other people again, thereby further increase the difficulty of faking, further prevent the fake producer to check code and be not exposed to the possibility that outer security code copies recycling, improved false proof validity.
Again, the present invention can also generate unique security code and unique check code for respectively being verified product, can also be by determining whether first checking when authenticity verification, determine whether it is genuine piece, if be replicated personation, then fake products can't pass through authenticity verification, further improve antifalse effect.
In addition, the present invention can also be encrypted processing to security code and check code, whether, during checking also need adopt corresponding decipherment algorithm be decrypted processing after again by matching judgment be genuine piece, further improved the personation difficulty if the sign of the checking after encrypting being located at being verified the product end.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, the below will do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art, apparently, accompanying drawing in the following describes only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
A kind of authenticity verification system and device block diagram that Fig. 1 provides for the embodiment of the invention;
The another kind of authenticity verification system and device block diagram that Fig. 2 provides for the embodiment of the invention;
Fig. 3 is a kind of method flow diagram that among the present invention check code and security code is encrypted;
Fig. 4 is a kind of method flow diagram that among the present invention check code and security code is decrypted;
Fig. 5 is a kind of authenticity verification method flow diagram of the present invention;
Fig. 6 is another kind of authenticity verification method flow diagram of the present invention.
Embodiment
For purpose, the feature and advantage that make the embodiment of the invention can become apparent more, the present invention is further detailed explanation below in conjunction with the drawings and specific embodiments.
Referring to Fig. 1, the embodiment of the invention provides a kind of authenticity verification system, comprises that service end 100, communication terminal 200 and sign arrange end 300.
Described sign arranges end 300, comprising:
Described communication terminal 200 comprises,
Sending module 203 is used for sending described security code to described service end;
Described service end 100 comprises:
Need to prove, in actual applications, it can be production producer that sign arranges end 300, research and development of products producer, wherein at least one such as production marketing producer, in the embodiment of the invention, the generation of security code, combination and operation is set etc. can be undertaken by production producer, also can be undertaken by research and development of products producer, can also be undertaken etc. by production marketing producer, do not limit herein, as long as before the product final sales, which which namely need product carried out before the authenticity verification by certain main body it being finished to get final product, as for realizing jointly that by main body or main body the embodiment of the invention does not limit on earth.
Concrete, described authentication module 101 specifically comprises:
The first matched sub-block is used at the described security code of database coupling;
First time number is judged submodule, and the matching result that is used for when described the first matched sub-block is when the match is successful, judges matching times;
First confirms submodule, and the matching result that is used for when described the first matched sub-block is when it fails to match, confirms as false product; When described first number judges that the judged result of submodule is first coupling, confirm as genuine piece.
In another embodiment of the present invention, sign arranges and holds 300 can further include:
The first encrypting module is used for security code is encrypted processing.
Accordingly, composite module 302 is concrete for being covered by opaque coating through the security code of described encryption.
Concrete, the first encrypting module comprises:
Security code is encrypted submodule, is used for utilizing described default irreversible cryptographic algorithm security code to be encrypted computing, the security code that obtains encrypting.
Accordingly, service end 100 also comprises:
The first deciphering module is used for the security code of encrypting is decrypted processing.
Concrete, utilize the corresponding decipherment algorithm of above-mentioned default irreversible cryptographic algorithm that the security code of described encryption is decrypted computing, the security code that obtains deciphering.
Preferably, scan module 202 can be specially the image scanning module in actual applications, or the scan module of other form.
Need to prove that each functional module among the native system embodiment or each functional unit can referring to the associated description of each step principle of work and processing procedure in the above-mentioned embodiment of the method shown in Figure 5, repeat no more herein.
Using method of the present invention is:
S101: generate unique security code for respectively being verified product in advance, be located at after described security code is covered by opaque coating and be verified the product end.
The embodiment of the invention adopts unique security code to carry out false proof protection; and; security code is covered by opaque coating; be located at and be verified the product end, be verified on the product external packaging such as can directly being arranged at, or be arranged at be verified product originally with it; or be arranged at and be verified on the subsidiary data of product; such as instructions etc., as long as can find being verified the product end, as for set-up mode, setting position, the embodiment of the invention such as form are set this is not limited.
Need to prove that be to improve antifalse effect, the embodiment of the invention need to be carried out confidential treatment to security code so that security code can only cover on it the destroyed rear ability of opaque coating as seen.
For so that antifalse effect is better, the embodiment of the invention generates unique security code for respectively being verified the product end.Thereby, avoid to carry out anti-counterfeiting mark for single product in the existing anti-counterfeiting technology, provide the possibility of can batch duplicating copying to the imitator in the anti-pseudoprocess that causes, and in the embodiment of the invention, be verified the product end for each, corresponding unique unduplicated security codes all so that can verify for this uniqueness during checking, has improved antifalse effect greatly.
In the practical application, can have multiple for the mode that respectively is verified the unique security code of product end generation, below provide a kind of generating mode in order to explanation, those skilled in the art also can design under this thought (be verified the product end for each and generate respectively unique security code), and the embodiment of the invention does not limit this.
A kind of method of generating anti-counterfeiting code specifically comprises:
Generation is verified the product indication information; And, generate at random the unique identification information that is verified product;
With described indication information and unique identification information combination, obtain being verified the anti-counterfeiting mark of product.
Comprise two parts information in the security code, a part is used to indicate the relevant information of product, i.e. product indication information is such as being the information that is used to indicate Products Co., Ltd, being used to indicate the information such as batch number, the place of production, etc., a part is the product unique identification information that generates at random in addition.By with indication information and unique identification information combination, obtain unique unduplicated anti-counterfeiting mark.Here, the combined method of indication information and unique identification information can have multiple, such as directly connecting combination, embedding combination etc. by certain rule and all can.
Also need to prove in addition, in actual applications, the generation of security code, operation is set etc. can be undertaken by production producer, also can be undertaken by research and development of products producer, can also be undertaken by production marketing producer, etc., do not limit herein, as long as before the product final sales, namely need product carried out finishing before the authenticity verification to get final product, as for realizing jointly that by which main body or which main body the embodiment of the invention does not limit on earth.
In addition, preferred, the embodiment of the invention generates after unique security code, can also comprise: the step that security code is encrypted processing.Accordingly, the above-mentioned security code that is verified the product end of being located at is specially security code through described encryption.
Whether, during checking also need adopt corresponding decipherment algorithm be decrypted processing after again by matching judgment be genuine piece, further improved the personation difficulty if like this, the security code after encrypting being located at being verified the product end, promoted false proof validity.
Security code is encrypted processing can comprises various ways, the embodiment of the invention is seldom done at this and is given unnecessary details, and below provides a kind of encryption method and is elaborated.
Concrete, adopt default irreversible cryptographic algorithm y=f (x) that security code is encrypted processing, corresponding decipherment algorithm is y=g (x), decipherment algorithm is corresponding with cryptographic algorithm.B represents the unencrypted security code, the security code that the c representative is encrypted.That deposit in the service end database is unencrypted security code b, and that be verified the setting of product end is the security code c that encrypts.
The method that security code is encrypted processing is specially:
Utilize default irreversible cryptographic algorithm security code to be encrypted computing, the security code c=f (b) that obtains encrypting.
Here, reversible cryptographic algorithm refers to that specifically the cryptographic algorithm that adopts is to realize decryption processing by the decipherment algorithm corresponding with it, such as symmetric encipherment algorithm etc.
S102: communication terminal scanning is obtained and is located at the security code that is verified the product end.
What communication terminal was concrete can be mobile phone etc.
After the opaque coating destruction that covers on the security code, as seen security code exposes, and the security code of exposure is obtained in communication terminal scanning.
Communication terminal is built-in with the scan module of scanning security code function, utilizes this scan module to scan and obtain exposing visible security code.
Security code can be one dimension, also can be two-dimentional, or other form etc., and the built-in scan module of communication terminal can be set to scan at least a in one dimension, two dimension, other form security code function as required.
In actual applications, the scan module that is arranged at communication terminal specifically can be the image scanning functional module, and is first-class such as shooting.Perhaps, scan module also can adopt alternate manner to realize, as long as can and get access to communication terminal with security code identification, the embodiment of the invention does not limit this.
S103: communication terminal sends described security code to service end.
Communication terminal can be sent to service end with security code by network, and when being specially mobile phone such as communication terminal, mobile phone can pass through such as network and service end realization information interactions such as GSM or CDMA.
S104: service end is carried out the demonstration validation true and false to security code.
The method that service end is verified security code can be:
The described security code of coupling in database if it fails to match, is then confirmed as false product; Otherwise,
Judge matching times, when judged result was first coupling, checking was passed through, and confirms as genuine piece.
Concrete, in the service end database, store security code in advance, after service end receives the security code that communication terminal sends, whether search in its database has the security code that is complementary with it, when through searching, the security code that communication terminal sends can not mate, and then confirms as false product; When the security code of communication terminal transmission can mate, judge further whether the current matching number of times is first coupling, is then to confirm as genuine piece, and matching times is revised as non-first coupling, such as adding a processing etc.
In actual applications; because being confirmed to be the security code of genuine piece can be kept on user's the communication terminal (such as mobile phone) usually; might exist the situation of multiple authentication this moment; namely might this user or other people use this security code and again verify its true and false, therefore, when judged result for not being when mating for the first time; can provide the prompting of non-first checking; such as warning prompt (" beware of imitations " etc.), also can provide in the lump the information such as time that this genuine piece is verified for the first time, etc.
Preferably, when after the generating anti-counterfeiting code security code being encrypted processing among the step S101, then before this step, comprise that also service end is decrypted processing to the security code that receives.Security code for after the deciphering repeats above-mentioned verification step again.
For the cryptographic algorithm described in the above-mentioned steps S101, service end specifically comprises the method that security code is decrypted here:
Service end utilizes the corresponding decipherment algorithm y=g (x) of above-mentioned default irreversible cryptographic algorithm that the security code c of described encryption is decrypted computing, the security code b=g (c) that obtains deciphering.
Then, concrete in that the security code of deciphering is verified the true and false, the security code of the described deciphering of coupling in database if it fails to match, is then confirmed as false product; Otherwise, judge matching times, when judged result was first coupling, checking was passed through, and confirms as genuine piece.
S105: communication terminal receives the result of service end.
In the embodiment of the invention, owing to adopt communication terminal to carry out fake certification, thus so that checking is convenient more flexibly, can carry out authenticity verification whenever and wherever possible.And, in to the Product Validation process, need and will just can see security code after the opaque coating destruction, increased the difficulty of faking, thereby can prevent effectively that the fake producer from copying the possibility of recycling to not being exposed to outer security code.As seen, the embodiment of the invention greatly reduces the complicacy of checking, really accomplishes can verify whenever and wherever possible, thereby has improved false proof validity.
Again, in the embodiment of the invention, can also generate unique security code for respectively being verified product, can also be by determining whether first checking when authenticity verification, determine whether it is genuine piece, if be replicated personation, then fake products can't pass through authenticity verification, further improve antifalse effect.
In addition, in the embodiment of the invention, can also be encrypted processing to security code, the checking sign after encrypting is located at is verified the product end, whether be genuine piece by matching judgment again after also need adopting corresponding decipherment algorithm to be decrypted processing during checking, further improved the personation difficulty.
Referring to Fig. 2, the embodiment of the invention provides another kind of authenticity verification system, comprises that service end 10, communication terminal 20 and sign arrange end 30.
Described sign arranges end 30, comprising:
Described communication terminal 20 comprises,
Scan module 22 is used for scanning to obtain being located at the described security code that is verified the product end;
Sending module 23 is used for sending described check code and security code to described service end;
Described service end 10 comprises:
Authentication module 11 is used for check code and security code are carried out the demonstration validation true and false;
Feedback module 12 is used for the result is sent to described communication terminal.
Need to prove, in actual applications, it can be production producer that sign arranges end 30, research and development of products producer, wherein at least one such as production marketing producer, in the embodiment of the invention, the generation of check code and security code, combination and operation is set etc. can be undertaken by production producer, also can be undertaken by research and development of products producer, can also be undertaken etc. by production marketing producer, do not limit herein, as long as before the product final sales, which which namely need product carried out before the authenticity verification by certain main body it being finished to get final product, as for realizing jointly that by main body or main body the embodiment of the invention does not limit on earth.
Concrete, described authentication module 11 comprises:
The second matched sub-block is used at the database described check code of coupling and security code;
Second time number is judged submodule, and the matching result that is used for when described the second matched sub-block is when the match is successful, judges matching times;
Second confirms submodule, and the matching result that is used for when described the second matched sub-block is when it fails to match, confirms as false product; When described second number judges that the judged result of submodule is first coupling, confirm as genuine piece.
In another embodiment of the present invention, sign arranges and holds 30 can further include:
The second encrypting module is used for check code and security code are encrypted processing.
Accordingly, composite module 32 is concrete for being covered by opaque coating through the security code of described encryption; To be printed in through the check code of described encryption on the described opaque coating.
Concrete, the second encrypting module comprises:
Check code is encrypted submodule, is used for utilizing default irreversible cryptographic algorithm check code to be encrypted computing, the check code that obtains encrypting;
Security code is encrypted submodule, is used for utilizing described default irreversible cryptographic algorithm security code to be encrypted computing, the security code of once being encrypted; Recycle described default irreversible cryptographic algorithm the check code of described encryption and the security code once encrypted are encrypted computing, obtain the security code of superencipher.
Accordingly, service end 10 also comprises:
The second deciphering module is used for check code and the security code encrypted are decrypted processing.
Concrete, utilize the corresponding decipherment algorithm of above-mentioned default irreversible cryptographic algorithm that the check code of described encryption is decrypted computing, the check code that obtains deciphering; And, utilize described decipherment algorithm that the check code of described encryption and the security code of superencipher are decrypted computing, the security code of once being encrypted utilizes described decipherment algorithm that the described security code of once encrypting is decrypted computing, the security code that obtains deciphering again.
Preferably, scan module 22 can be specially the image scanning module in actual applications, or the scan module of other form.
Need to prove that each functional module among the native system embodiment or each functional unit can referring to the associated description of each step principle of work and processing procedure in the above-mentioned embodiment of the method shown in Figure 6, repeat no more herein.
In the embodiment of the invention, owing to adopt communication terminal to carry out fake certification, thus so that checking is convenient more flexibly, can carry out authenticity verification whenever and wherever possible.And, in to the Product Validation process, need and will just can see security code after the opaque coating destruction, increased the difficulty of faking, thereby can prevent effectively that the fake producer from copying the possibility of recycling to not being exposed to outer security code.As seen, the embodiment of the invention greatly reduces the complicacy of checking, really accomplishes can verify whenever and wherever possible, thereby has improved false proof validity.
Secondly, can also be further in to the Product Validation process, adopt check code and two kinds of signs of security code to carry out particular combinations, so that security code only in the destroyed rear ability of check code as seen, check code can be destroyed during to Product Validation, destroyed check code will can not known by other people again, thereby further increase the difficulty of faking, further prevent the fake producer to check code and be not exposed to the possibility that outer security code copies recycling, improved false proof validity.
Again, in the embodiment of the invention, can also generate unique security code and unique check code for respectively being verified product, can also be by determining whether first checking when authenticity verification, determine whether it is genuine piece, if be replicated personation, then fake products can't pass through authenticity verification, further improve antifalse effect.
In addition, in the embodiment of the invention, can also be encrypted processing to security code and check code, the checking sign after encrypting is located at is verified the product end, whether be genuine piece by matching judgment again after also need adopting corresponding decipherment algorithm to be decrypted processing during checking, further improved the personation difficulty.
Need to prove, in this article, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thereby not only comprise those key elements so that comprise process, method, article or the equipment of a series of key elements, but also comprise other key elements of clearly not listing, or also be included as the intrinsic key element of this process, method, article or equipment.Do not having in the situation of more restrictions, the key element that is limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment that comprises described key element and also have other identical element.
One of ordinary skill in the art will appreciate that all or part of step that realizes in above-described embodiment method is to come the relevant hardware of instruction to finish by program, described program can be stored in the embodied on computer readable Protector.Described Protector, as: ROM/RAM, magnetic disc, CD etc.
More than the present invention is described in detail, this paper has used specific case principle of the present invention and embodiment has been set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for persons skilled in the art, according to thought of the present invention, all will change in specific embodiments and applications.In sum, this description should not be construed as limitation of the present invention.
Claims (8)
1. an authenticity verification system and device comprises that service end, communication terminal and sign arrange end, it is characterized in that,
Described sign arranges end, comprising: the generation module that is used for generating unique security code;
Composite module is used for described security code is covered by opaque coating, so that described security code is destroyed as seen rear at described opaque coating;
Module is set, is used for to be located at by the security code that opaque coating covers being verified the product end;
Described communication terminal comprises,
Scan module is used for scanning to obtain being located at the described security code that is verified the product end;
Sending module is used for sending described security code to described service end;
Receiver module is for the result that receives described service end;
Described service end comprises:
Authentication module is used for security code is carried out the demonstration validation true and false;
Feedback module is used for the result is sent to described communication terminal.
2. system and device according to claim 1 is characterized in that, described authentication module also comprises:
The first matched sub-block is used at the described security code of database coupling;
First time number is judged submodule, and the matching result that is used for when described the first matched sub-block is when the match is successful, judges matching times;
First confirms submodule, and the matching result that is used for when described the first matched sub-block is when it fails to match, confirms as false product; When described first number judges that the judged result of submodule is first coupling, confirm as genuine piece.
3. system and device according to claim 1 is characterized in that, described sign arranges end and also comprises:
The first encrypting module is used for described security code is encrypted processing;
Described composite module is used for and will be covered by opaque coating through the security code of described encryption.
4. system and device according to claim 1 is characterized in that, described service end also comprises:
The first deciphering module is used for the security code of encrypting is decrypted processing.
5. system and device according to claim 1 is characterized in that,
Described generation module also is used for generating unique check code;
Described composite module also is used for described check code is printed in described opaque coating;
Described communication terminal also comprises receiver module, is used for receiving obtaining described check code;
Described sending module is used for sending described check code to described service end.
6. system and device according to claim 1 is characterized in that, described authentication module comprises:
The second matched sub-block is used at the database described check code of coupling and security code;
Second time number is judged submodule, and the matching result that is used for when described the second matched sub-block is when the match is successful, judges matching times;
Second confirms submodule, and the matching result that is used for when described the second matched sub-block is when it fails to match, confirms as false product; When described second number judges that the judged result of submodule is first coupling, confirm as genuine piece.
7. system and device according to claim 1 is characterized in that, described sign arranges end and also comprises:
The second encrypting module is used for check code and security code are encrypted processing;
Described composite module, concrete being used for will be covered by opaque coating through the security code of described encryption; To be printed in through the check code of described encryption on the described opaque coating.
8. system and device according to claim 1 is characterized in that, described service end also comprises:
The second deciphering module is used for check code and the security code encrypted are decrypted processing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201220398382 CN202815922U (en) | 2012-08-13 | 2012-08-13 | System device for verifying fact or fiction |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201220398382 CN202815922U (en) | 2012-08-13 | 2012-08-13 | System device for verifying fact or fiction |
Publications (1)
Publication Number | Publication Date |
---|---|
CN202815922U true CN202815922U (en) | 2013-03-20 |
Family
ID=47874770
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 201220398382 Expired - Fee Related CN202815922U (en) | 2012-08-13 | 2012-08-13 | System device for verifying fact or fiction |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN202815922U (en) |
-
2012
- 2012-08-13 CN CN 201220398382 patent/CN202815922U/en not_active Expired - Fee Related
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102385710B (en) | Method and system for verifying fact or fiction | |
CN105024824B (en) | The generation and verification method and system of credible label based on rivest, shamir, adelman | |
CN103198344B (en) | Tax control secure two-dimensional code coding, decoding processing method | |
CN107395581B (en) | Two-dimensional code generation and reading method, device, system, equipment and storage medium | |
CN1997953B (en) | Method and device for protecting digital content in mobile applications | |
CN108681909B (en) | Intelligent anti-counterfeiting device and source tracing anti-counterfeiting method based on block chain intelligent contract | |
CN112165382B (en) | Software authorization method and device, authorization server side and terminal equipment | |
KR101450291B1 (en) | Server for authenticating smart chips and method thereof | |
CN101770619A (en) | Multiple-factor authentication method for online payment and authentication system | |
CN103150655A (en) | Public key infrastructure (PKI)-based radio frequency identification (RFID) anti-counterfeiting system | |
CN104463016B (en) | Data safety storing method suitable for IC cards and two-dimension codes | |
JP6489464B2 (en) | Optical code, information transmission method, and authentication method | |
CN109635610A (en) | The read-write system and method for RFID tag data | |
CN102855577A (en) | Multiple merchandise anti-counterfeiting verification method based on cloud computing | |
US20130322619A1 (en) | Information processing apparatus, ic chip, and information processing method | |
CN114786160B (en) | NFC label key management system | |
CN104243164A (en) | Dynamic encryption non-contact type anti-counterfeit label and control method | |
KR101638787B1 (en) | Mobile ticket security system and method of based location information and terminal unique number | |
CN106161036A (en) | The mobile station (MS) state transition method of a kind of credit and system | |
Eldefrawy et al. | Banknote Validation through an Embedded RFID Chip and an NFC‐Enabled Smartphone | |
CN202815922U (en) | System device for verifying fact or fiction | |
KR20170050648A (en) | Encoded Package Manufacturing and Transmission System for E-training Contents | |
CN115203647A (en) | Stereoscopic model right protection and tracing method | |
CN101661573A (en) | Method for producing electronic seal and method for using electronic seal | |
KR20140071843A (en) | Method and system for providing a genuine certification service based on nfc tag |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20130320 Termination date: 20150813 |
|
EXPY | Termination of patent right or utility model |