CN216822164U - Lipstick - Google Patents

Lipstick Download PDF

Info

Publication number
CN216822164U
CN216822164U CN202022857022.3U CN202022857022U CN216822164U CN 216822164 U CN216822164 U CN 216822164U CN 202022857022 U CN202022857022 U CN 202022857022U CN 216822164 U CN216822164 U CN 216822164U
Authority
CN
China
Prior art keywords
personal
storage space
network storage
user
electronic chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202022857022.3U
Other languages
Chinese (zh)
Inventor
田乐鸿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Miwo Co ltd
Original Assignee
Miwo Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Miwo Co ltd filed Critical Miwo Co ltd
Priority to CN202022857022.3U priority Critical patent/CN216822164U/en
Application granted granted Critical
Publication of CN216822164U publication Critical patent/CN216822164U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present application relates to a lipstick for transferring data bearing personal mental information, comprising: a housing; the electronic chip is embedded in the shell, and the plastic cover is attached to the shell and covers the electronic chip; wherein the electronic chip is associated to a network storage space and to a first right for accessing the network storage space; and the first visitor can access the network storage space by using the first authority and upload personal data carrying personal mental information of the first visitor in the network storage space. The application solves the problems of firmly and privately associating, storing and transmitting personal articles and personal emotions and memories carried by the personal articles.

Description

Lipstick
Technical Field
The present application relates to a system for communicating personal mental information, and more particularly, to a lipstick for communicating data bearing personal mental information.
Background
People give gifts to their relatives and friends, and the gifts often contain personal emotions and have great commemorative significance. In the conventional method, people sandwich objects carrying personal emotion and memory, such as paper stripes or photos with hypaphores, in gifts. But these items may be lost during long term storage or may be placed in a different location than the gift and thus forgotten to contact the gift. Moreover, because of the physical form of the article, the way in which the article bears its own emotions and memory is also limited. With the development of information technology, people store photos in the form of electronic data, but the photos are often difficult to connect with specific gifts, and the privacy of the photos is often difficult to guarantee.
There is a need for a method of associating and storing gifts given and the personal emotions and memories carried thereon in a time long river correctly, securely, and in a private manner.
In the prior art, RFID and blockchain techniques are used to store some traceable information. For example, CN110288354A discloses a label tracing system based on a block chain technology, which manufactures an RFID anti-counterfeit label, establishes a block chain tracing system displayed by an intelligent terminal, and writes product information in the RFID anti-counterfeit label into the block chain tracing system; a user can input the automatically acquired private key into the intelligent terminal and access the block chain tracing system through the intelligent terminal, and the block chain system displays product source information, production information and other information needing to be traced; it traces data records to products with a blockchain network to ensure the authenticity and reliability of the information. Similar methods are also disclosed in CN110458585A, CN109377274A, CN110505239A and CN 110597841A. However, these still do not solve the problems previously posed.
Disclosure of Invention
The present application will address the above problems by providing a proper, secure, and private transfer of personal mental information carried on a personal item. Personal mental information in the sense of this application is information that can trigger the mind of an individual, such as information that evokes an emotion in the individual, evokes an recall from the individual, has a memorial meaning to the individual, or gives the individual some strong motivation.
According to one broad aspect of the present application, there is provided a method for communicating data carrying personal mental information, comprising the steps of:
associating a network storage space with an electronic chip embedded in a personal item belonging to a first person and associating the electronic chip with the first person and its first right to access the network storage space;
the first person accesses the network storage space by accessing the electronic chip, and uploads personal data bearing personal internal information of the first person to the network storage space;
the first person transfers the personal item to a second person who is related to the first person, and the first person grants a second access right to the network storage space to the second person; and
the network storage space is accessed by a second user by accessing the electronic chip and the personal data is obtained by a second person.
Preferably, the network storage space is a web page link.
Preferably, the second person is emotionally linked to the first person.
Preferably, the second person is related to the first person.
Preferably, the personal data also carries personal mental information of the second person.
Preferably, the personal data is meaningful information that the person utters that can emotionally touch the second person.
Preferably, when the first person transfers the personal item to the second person, ownership of the personal item is also transferred to the second person.
Preferably, the first access rights to the network storage space include uploading, modifying, reading and deleting data on the space.
Preferably, the first access right to the network storage space comprises an access right and an access password for setting data for other users.
Preferably, the second access right to the network storage space comprises reading data on the space.
Preferably, the second access right to the network storage space comprises setting an access password for the second person.
Preferably, the second access right is identical to the first access right.
Preferably, the second access rights to the network storage space are personalized according to the relationship of the first person to the second person.
Preferably, the personalized rights of the second person are set or approved by the first person.
Preferably, accessing the electronic chip comprises using a particular gesture to bring the electronic chip into proximity with the card reader.
Preferably, the particular gesture is a "tap" gesture
Preferably, the association of the network memory space with the electronic chip is stored in a block chain.
Preferably, the association of the electronic chip with the identity of the first person and its access rights is stored in a blockchain.
Preferably, the association of the electronic chip with the identity of the second person and its access rights is stored in a blockchain.
Preferably, the association of the electronic chip with the identity of the visitor and its access rights is stored in a blockchain.
Preferably, the association of the electronic chip with the identity of the visitor and its access rights is done before the visitor obtains the item in which the chip is embedded.
Preferably, the electronic chip is encrypted.
The present application also provides a method for transferring data bearing personal mental information, comprising the steps of:
associating a network storage space with an electronic chip embedded in a personal item belonging to a first person and associating the electronic chip with a first right to access the network storage space;
accessing the network storage space by using a first authority, and uploading personal data bearing the personal internal information of the first person to the network storage space;
granting a second right to access the network storage space and associating the electronic chip with the second right; and
and accessing the network storage space by using the second authority, and acquiring the personal data.
Preferably, the second right to access the network storage space is set by a first person.
According to another aspect of the present application, there is provided a method for communicating data carrying personal mental information, comprising the steps of:
the first person accesses the network storage space and uploads personal data carrying personal internal information of the first person to the network storage space;
associating a network storage space with an electronic chip embedded in a personal item belonging to a first person and associating the electronic chip with the first person and its first right to access the network storage space;
the first person transfers the personal item to a second person related to the first person, and the first person grants a second access right to the network storage space to the second person; and
the network storage space is accessed by a second user by accessing the electronic chip and the personal data is obtained by a second person.
According to yet another aspect of the present application, there is provided a method for communicating data carrying personal mental information, comprising the steps of:
accessing the network storage space by a first person, and uploading personal data carrying personal mental information of the first person to the network storage space by the first person;
associating a network storage space with an electronic chip embedded in a personal item belonging to a first person and associating the electronic chip with the first person and its first right to access the network storage space;
the first person transferring the personal item to a second person having a relationship with the first person; and
the network storage space is accessed by a second user by accessing the electronic chip and the personal data is obtained by a second person.
According to another aspect of the present application, there is provided a system for communicating data carrying personal mental information, comprising:
an article with a memorial significance is provided,
an electronic chip embedded in a personal item,
a network storage space associated with the electronic chip, an
A first right for accessing the network storage space
Wherein the electronic chip is associated with a first right to access the network storage space; and the first visitor can access the network storage space by using the first authority and upload personal data carrying personal mental information of the first visitor in the network storage space.
Preferably, the system further comprises personal data carrying personal mental information uploaded to the network storage space using the first right.
Preferably, the system further comprises a second right for accessing the network storage space, and the electronic chip is further associated with the second right.
Preferably, the second visitor can access the network storage space using the second right and obtain the personal data.
According to yet another aspect of the present application, there is provided a lipstick for transferring data bearing personal mental information, comprising:
shell body
An electronic chip embedded in the housing, and
a plastic cover attached to the housing and covering the electronic chip;
wherein the content of the first and second substances,
the electronic chip is associated with a network storage space and a first right for accessing the network storage space; and the first visitor can access the network storage space with the first right and upload personal data carrying personal mental information of the first visitor in the network storage space.
Preferably, the electronic chip is an NFC tag.
Preferably, the housing comprises a bottom housing and an upper housing, the upper housing being mounted on the bottom housing in the form of a screw thread or a snap fit.
Preferably, a plastic cap is provided on the upper case near the middle section of the lipstick.
Preferably, the plastic cover is circular.
Preferably, the housing is metal and there is a slit under the plastic cover.
Preferably, the slit extends to the lower end of the upper housing.
According to the present application, the problem of associating gifts with the personal emotions and memories carried thereon, and to be kept and delivered securely and privately for long periods of time, is solved.
Drawings
The foregoing summary, as well as the following detailed description, will be better understood when read in conjunction with the appended drawings. For the purpose of illustration, certain embodiments of the disclosure are shown in the drawings. It should be understood, however, that the application is not limited to the precise arrangements and instrumentalities shown. The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate implementations of systems and apparatus according to the present application and, together with the description, serve to explain advantages and principles according to the present application.
Wherein the content of the first and second substances,
FIG. 1 schematically shows a method of communicating data bearing personal emotions according to one embodiment of the present application.
FIG. 2 schematically illustrates a lipstick according to a preferred embodiment of the present application.
Detailed Description
Before explaining at least one embodiment of the application in detail, it is to be understood that the application is not limited in its application to the details of construction and to the arrangements of the components set forth in the following description or illustrated in the drawings. The drawings and written description are provided to guide those skilled in the art in making and using the present application for which patent protection is sought. The application is capable of other embodiments and of being practiced and carried out in various ways. Those skilled in the art will appreciate that not all features of a commercial embodiment are shown for the sake of clarity and understanding. Those skilled in the art will also appreciate that the development of an actual commercial embodiment incorporating aspects of the present application will require numerous implementation-specific decisions to achieve the developer's ultimate goal of the commercial embodiment. While these efforts may be complex and time consuming, these efforts will be a routine undertaking for those of ordinary skill in the art having the benefit of this disclosure.
Also, it is to be understood that the phraseology and terminology employed herein is for the purpose of description and should not be regarded as limiting. For example, use of singular terms, such as "a," "an," and "the" is not intended to limit the number of items. Additionally, the use of relational terms, such as, but not limited to, "top," "bottom," "left," "right," "upper," "lower," "down," "up," "side," and the like are used in the present description with specific reference to the figures for clarity and are not intended to limit the scope of the present application or the appended claims. Further, it should be understood that any of the features of the present application may be used alone or in combination with other features. Other systems, methods, features and advantages of the present application will be, or will become, apparent to one with skill in the art upon examination of the following figures and detailed description. It is intended that all such additional systems, methods, features and advantages be included within this description, be within the scope of the present application, and be protected by the accompanying claims.
Embodiments of the subject matter described in this specification and the functional operations can alternatively be implemented in digital electronic circuitry, computer software, firmware, hardware, including the structures disclosed in this specification and their equivalents, or in combinations of one or more of them. Embodiments of the subject matter described in this specification can, for example, be implemented in one or more computer program products, such as one or more modules of computer instructions, encoded in computer-readable media for execution by, or to control the operation of, data processing apparatus.
FIG. 1 schematically shows a method of communicating data bearing personal emotions according to one embodiment of the present application.
In general terms, the method 100 essentially comprises several steps: firstly, in step 101, an electronic chip embedded in a personal article belonging to a first user is associated with a network storage space, and the first user and the authority of the first user to access the network storage space are associated with the electronic chip; secondly, in step 102, the first user accesses the network space and uploads the data bearing the personal emotion of the first user; third, in step 103, the first user transfers the item to the second user and gives the second user access to the cyber space; finally, in step 104, the second user accesses the web space and obtains data bearing the personal emotion of the first user. The method of the present application will be described in more specific form hereinafter.
An electronic chip, e.g. an NFC/RFID chip (see below for details), is embedded in an item, which is preferably a gift, such as any consumer product, e.g. a lipstick. The chip is preferably implanted at the surface of the article. Preferably, the chip is sealed with a plastic cap on the surface of the article to prevent it from falling off or leaking water, while also ensuring wireless reading of the chip. The chip is associated with some network storage space, e.g. with some http network address (or web page link).
The first user, after purchasing the gift for example, obtains access to the electronic chip and thus to the network storage space. The authority includes uploading, modifying and deleting data to the network storage space, and setting access authority, access password and the like to the data. The first user can record the feelings of her/his purchase or use of the item, or other emotions desired to be expressed, in video, audio, text or other form, as data and upload in the cyberspace. The recording or uploading action can be operated by a mobile phone, for example, an APP, and the management of data (for example, the right to read, write, read and write, etc.) can also be operated by the mobile phone.
The first user may "give" the gift to the second user. Of course, the meaning of "give" is broad and may include selling, renting, and even in a gifted manner. The second user may only have access to the gift and not ownership. While "sending", the first user may also open or transfer the access rights of the chip to the second user. Along with the opening or transfer of the chip access right, the access right of the network storage space can also be opened or transferred to the second user. Of course, it should be understood that in some embodiments, the chip may be associated with multiple network storage spaces, and that not all of the network storage spaces may have their access rights opened or transferred to the second user.
The second user does not necessarily have as much rights to the data in the network storage space as the first user does. In general, it may have only read-only rights. In a preferred embodiment, a personal customization authority can be set for the second user according to the relationship between the second user and the first user, so that the data which is stored by the first user and bears personal emotion and/or recall can be acquired in a personal customization mode when the user uses the system. The second user's access to the network storage space and the data therein may also be operated via a handset. Such personalized rights may be obtained through a personalized key or through authentication of the person. Preferably, the second user's customized rights are formulated or approved by the first user.
It should be appreciated that due to the relationship of the second user to the first user, it is likely that the data stored by the first user that carries his personal emotion and/or recall will also trigger the personal emotion and/or recall of the second user. From this perspective, the data also carries the personal emotion and/or recall of the second user.
In other embodiments, the first user may obtain access to the network storage space prior to purchase. After it purchases the gift, the electronic chip in the gift is associated with the network storage space. After the first user obtains the gift, the first user obtains access to the electronic chip, but may still not access the network storage space by accessing the electronic chip. However, preferably, when the first user "gives" the gift to the second user, it is still set that the access right of the chip is opened or transferred to the second user, and along with the opening or transfer of the access right of the chip, the access right of the network storage space is also opened or transferred to the second user. Of course, in some examples, the access rights of the chip and/or the network storage space may also be set open to any second user, such that the second user may access the network storage space without special rights.
In a preferred embodiment of the application, the electronic chip is selected from an NFC (near-field communication) tag having a chipset and an antenna. And the NFC card reader is integrated in the smart phone on a large scale, so that the chip in the gift can be accessed conveniently through the smart phone. The NFC tag can send a readable signal within a short distance (typically within 10cm, preferably less than 2 cm). For reading NFC, the reader only needs to be moved to a close distance from NFC to acquire a signal. But generally requires the use of a special "tap" gesture to bring the tag and the reader on the handset into proximity. In a preferred embodiment, the object is also provided with a more personal emotion by means of this specific gesture. Of course, this also avoids undesired reading in close range.
Specifically, the present application preferably employs NFC chipsets of NXP corporation: NTAG213 or SLIX 2. These chipsets have more than 1000 bits of user memory. It also enables the application to utilize block chain techniques, such as the block chain protocol provided by VeChain corporation (see below for details). The overall tag, including the dimensions of the antenna portion, in the preferred embodiment of the present application, is configured to conform to the shape of the article (e.g., lipstick) previously described. For example, a label is selected that fits within a circle of 10mm in diameter. This dimension ensures that the design of the article itself is not compromised, while also ensuring good signal read power.
In a preferred embodiment, lipstick is used as a gift. The label may be secured to the lipstick in any suitable manner. Preferably, the label is embedded in a plastic part which may be further clipped to the lipstick case body, or the label may be affixed to an internal part of the case body facing the plastic part which may be further clipped to the lipstick case body. Thus, the strength of the label signal can be ensured no matter what material is adopted for the main body part of the lipstick case. This is particularly effective in situations where the product material is likely to attenuate/shield the antenna signal (e.g., metal). In another preferred embodiment, the label may also be adhered to the surface of the main body of the lipstick case. In addition, if the surface of the composite is metallic, a protective substance (e.g., ferrite) may be used between the metallic surface and the label.
Referring to fig. 2, there is shown a lipstick 2 of a preferred embodiment having a two-part housing with a base housing 21 and an upper housing 22, the upper housing 22 being secured to the base housing 21 by screwing or snapping. On the upper case 22, near the middle section of the lipstick, there is a circular plastic cover 23, and the NFC tag (not shown) is mounted on the upper case 22 and covered by the plastic cover 23. A slit 24 is also provided below the plastic cover 23 and extends to the lower end of the upper housing 22. This slit 24 is advantageous for enhancing the signal strength of the NFC tag. Of course, it should be understood that the slit may not be required in other embodiments.
The tool enabling the user to upload content may be any smart device (cell phone, tablet, computer, etc.). The human machine interface may be a website, a native APP, or any "front-end" program. In a preferred embodiment, a WeChat environment (applet, public number) is used. Preferably, once an item is purchased in the WeChat applet, the purchaser can produce/upload content (text, video, photos, audio, etc.) and associate the content with the item; the association of the content with the item is preferably done before the item is assembled for shipment. And the item and its embedded NFC chipset are ID-bearing and associated with the back-end purchase order/customer. Of course, the association of the item and the ID of the NFC chipset with the user identity may be performed after the user receives the item; and the production and uploading of the content can also be performed after the association.
To ensure correct acquisition of the product rights, various ways may be used, such as encryption hardware other than NFC. In a preferred embodiment, a block chain technique is used, for example, the block chain technique of VeChain corporation. The NFC chipsets are preprogrammed by VeChain and each is assigned a unique ID, called VID. In a preferred approach, the contact of the product owner (purchaser) with the VID is written in the blockchain.
The authorisation procedure according to the VeChain protocol involves the use of a specific APP downloaded to the user's handset. The APP grants the user permission, such as through a WeChat account number, a mobile phone number and the like. The APP emulates an NFC reader and reads the NFC of the product. It is then verified on the blockchain whether the product is original (VID verification) and whether the user is the product owner. Once authorization is complete, the user obtains new access rights; for example, certain content (text, pictures, video, audio … …) is uploaded and only obtained after authorization. Preferably, the user is allowed to protect private information to prevent any person scanning the NFC tag from reading private data.
For the VeChain blockchain, each NFC will set an id (vid) in encrypted form. The presence of the VID is recorded in the blockchain. For example, when preparing for purchase, the VID (encrypted in NFC, which in turn is embedded in the item) is associated with both the order and the identity (e.g., name) of the purchaser prior to shipment. This association is also recorded in the blockchain. Because it is not changeable, the association of VID/product and buyer/owner is written in the blockchain as proof of ownership. This makes it possible to check the rights of the item with the encrypted VID. The NFC reader (e.g., a mobile phone) is also used to obtain information (including VID) in NFC and check in the blockchain whether the VID exists and what rights the corresponding VID has.
In other embodiments, the VID may not be encrypted in the NFC chip, but may be registered with VeChain by the user's mobile phone (e.g., APP). The VID is then associated with the identity information (e.g., name) of the user and with the rights of the user after the user obtains the corresponding rights.
It will be appreciated by those skilled in the art that changes could be made to the embodiments described above without departing from the broad inventive concept thereof. It is understood, therefore, that this application is not limited to the particular embodiments disclosed, but it is intended to cover modifications within the spirit and scope of the present application as defined by the appended claims. In addition, even if the spirit and scope of the present application as defined in the appended claims is to be read in light of the examples disclosed in the present application, the applicant should not be given an exclusive use of the principle of donation to give a trade-off to the spirit and scope of the present application unless specifically stated otherwise by the applicant.

Claims (4)

1. A lipstick, comprising:
a shell body, a plurality of first connecting rods and a plurality of second connecting rods,
an electronic chip embedded in the housing, and
a plastic cover attached to the housing and covering the electronic chip;
it is characterized in that the preparation method is characterized in that,
the shell comprises a bottom shell and an upper shell, and the upper shell is mounted on the bottom shell in a threaded or buckled mode;
the shell is made of metal, and a slit is arranged below the plastic cover;
the slit extends to a lower end of the upper housing.
2. The lipstick according to claim 1, wherein said electronic chip is an NFC tag.
3. The lipstick according to claim 1 wherein said plastic cap is disposed on said upper housing proximate a mid-section of said lipstick.
4. The lipstick according to claim 1 wherein said plastic cap is circular.
CN202022857022.3U 2020-12-02 2020-12-02 Lipstick Active CN216822164U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202022857022.3U CN216822164U (en) 2020-12-02 2020-12-02 Lipstick

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202022857022.3U CN216822164U (en) 2020-12-02 2020-12-02 Lipstick

Publications (1)

Publication Number Publication Date
CN216822164U true CN216822164U (en) 2022-06-28

Family

ID=82082588

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202022857022.3U Active CN216822164U (en) 2020-12-02 2020-12-02 Lipstick

Country Status (1)

Country Link
CN (1) CN216822164U (en)

Similar Documents

Publication Publication Date Title
US9489671B2 (en) Systems and methods for mobile application, wearable application, transactional messaging, calling, digital multimedia capture and payment transactions
US11100740B2 (en) Wearable data transmission device and method
CA2881463C (en) System and method for providing smart electronic wallet and reconfigurable transaction card thereof
US8011593B2 (en) Smart apparatus for making secure transactions
US9076142B2 (en) Smart electronic wallet or smart e-wallet
US20130317848A1 (en) Electronic Medical Record Process
BR112013000494B1 (en) method, unit of payments and system for conducting payments with electronic credits
US9330235B2 (en) System and method for providing access to electronically stored medical information
KR101208081B1 (en) Personal privacy protection method in service based on electronic tag
CN216822164U (en) Lipstick
TW202014918A (en) Certification system and smart phone case used therefor
US20180181740A1 (en) Fingerprint Emulator
CN114581253A (en) Method and system for transmitting personal mental information
US20040117317A1 (en) Apparatus and methods for a united states postal service smart card system
TWI840765B (en) Method for transferring personal inner message
JP2020009280A (en) Nfc tag with qr code and nfc-tagged article with qr code
US9965661B2 (en) Sensory totem badge capable of transmitting individualized information
TW202336649A (en) System of designing integrated circuit device,integrated circuit device and operating method thereof
US20230054936A1 (en) Dated or undated diary and method of connecting to a dedicated web page
US20050205678A1 (en) Data carrier
US20170318464A1 (en) Induction type ornament with private message transmission
US20170091396A1 (en) System and method for providing access to electronically stored medical information
KR100734841B1 (en) Fancy sticker-type RFID tag, privacy-secured on/off-line linking method, using the same and terminal device therefor
CN205485778U (en) Protective housing of built -in card reader
TR201600471A2 (en) NFC BASED ANIMAL PASSPORT

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant