CN2404159Y - Antifaking device for code - Google Patents

Antifaking device for code Download PDF

Info

Publication number
CN2404159Y
CN2404159Y CN 00200486 CN00200486U CN2404159Y CN 2404159 Y CN2404159 Y CN 2404159Y CN 00200486 CN00200486 CN 00200486 CN 00200486 U CN00200486 U CN 00200486U CN 2404159 Y CN2404159 Y CN 2404159Y
Authority
CN
China
Prior art keywords
code
computer
utility
model
loudspeaker
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 00200486
Other languages
Chinese (zh)
Inventor
杨义先
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUORUI DIGITAL SAFETY SYSTEM CO Ltd TIANJIN
Original Assignee
GUORUI DIGITAL SAFETY SYSTEM CO Ltd TIANJIN
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUORUI DIGITAL SAFETY SYSTEM CO Ltd TIANJIN filed Critical GUORUI DIGITAL SAFETY SYSTEM CO Ltd TIANJIN
Priority to CN 00200486 priority Critical patent/CN2404159Y/en
Application granted granted Critical
Publication of CN2404159Y publication Critical patent/CN2404159Y/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The utility model relates to an anti-counterfeiting device which uses a novel electric code to identify whether a commodity is true or false. The utility model is an anti-counterfeiting device which is based on a complex computer method and a simple identification mode. The utility model has low investment cost, high enquiring efficiency and strong decoding prevention. The utility model is composed of a machine housing, a voice interface, a computer, a display, a common telephone, a loudspeaker, a keyboard, an optical disk drive, a magnetic disk drive, etc., wherein, the voice interface is connected with the computer. The computer is respectively connected with the display, the common telephone, the loudspeaker, the keyboard, the optical disk drive and the magnetic disk drive. A computer software which is provided with a novel electric-code arithmetic expression and a voice identifying program is stored in the computer. When a user enquires through the voice interface, the user's voice is calculated and identified by the computer, and feedback, communication and record are completed by the common telephone, the display and the loudspeaker.

Description

The false proof device of novel code
The utility model relates to a kind of false proof device, particularly a kind of false proof device that utilizes the novel code recognition value true and false.
At present, upset the economic order of society for preventing fake products, protection business and consumer's legitimate rights and interests have been invented multiple anti-counterfeiting technology in succession.Wherein, the anti-counterfeiting technology that extensively adopts generally has following a few class:
One, vision anti-counterfeiting technology: as multiple laser anti-counterfeit, one dimension, two-dimensional bar are false proof, fluorescence falsification preventing, and alternating temperature is false proof, and watermark is false proof etc.Because the limitation of people's visual capacity, and this anti-counterfeiting mark is with low content of technology, and textural association is very easily decoded, and has certain special technique and prescription is a prerequisite with the fabricator, a large amount of forgery packing and product will occur in case leak.
Two, electronic recognition anti-counterfeiting technology: as the magnetic card record, anti-counterfeiting marks such as IC-card because counterfeit and shoddy goods can't enter computer management system, have therefore played good anti-fake effect.But this anti-counterfeiting mark need use specialized equipment to inquire about, and just can only just might inquire about under given conditions, thereby limit user's usable range, and popularization is restricted.
Three, code telephone service technology: this anti-counterfeiting technology is to produce one or a pair of numeral as false proof code word with a kind of algorithm, then these numbers are stored in the database, the user is when the true and false is inquired about with the false proof code word on the product, should false proof code word input database, compare with the value in the numerical value storehouse and to check.Correctly be very if check, if the mistake of checking is personation.This method for anti-counterfeit has following shortcoming;
A, since product produce in a large number, user's continuous increase, it is hundreds billion of that the data in the database must reach, even tens of trillion storage, therefore, during inquiry the time longer, each time the inquiry can reach nearly ten seconds even longer.
B, along with product and user's continuous increase, the maintenance and management of huge database will become increasingly complex, difficulty.
Any destruction of c, database all can influence the result of inquiry, all great influence can be arranged to the operation of client, businessman, Antiforge system.
D, because the hardware investment of Antiforge system, software investment and telecommunication fee are huge, the investment of total system will exceedance ten million yuan.
The security of e, security code is difficult to ensure that the random number code security that utilizes random generator to produce can not ensure that the danger that is decrypted is arranged.
The capacity of f, database has certain restriction, and the quantity of security code is limited.
The utility model aims to provide a kind of novel code anti-fake device, and it is based on the novel code anti-fake device of complicated computing method and simple identification mode, compares with existing code telephone service technology, and cost of investment is low, the search efficiency height, and preventing decryption is strong.
The utility model comprises: parts such as casing, speech interface, computing machine, display, plain old telephone, loudspeaker, keyboard, CD drive, disc driver, wherein speech interface links to each other with computing machine, and computing machine links to each other respectively with display, plain old telephone, loudspeaker, keyboard, CD drive, disc driver.Display, computing machine join by ups power and external power supply, as Fig. 1, Fig. 2, shown in Figure 3.Contain the arithmetic expression of novel code and the computer software of speech recognition program at calculator memory.
Fig. 1 is the utility model synoptic diagram;
Fig. 2 is the utility model front cut-away view;
Fig. 3 is the utility model back side cut-away view
Among the figure: 1 casing, 2 displays, 3 keyboards, 4 disc drivers, 5 CD drive, 6 loudspeakers, 7 computing machines, 8UPS power supply, 9 speech interfaces, 10 plain old telephones.
Operation principle of the present utility model is:
1, the novel code that relates to of the utility model derives from the generation system of novel code. Its generation Novel code comprise two parts; The one, the numbering of product, this numbering can be numeral or text; Two The numbering and the Anti-fake digital that are the false proof data product of the high-intensity encryption algorithm generation of employing are unique Corresponding, namely a production code member can only produce unique Anti-fake digital, thereby forms unique novel Code.
The production process of novel code is as follows:
If x is the numbering of a product, f is an arithmetic expression, and this arithmetic expression is an one-way function, y be by production code member through the f result calculated, be false proof number, i.e. y=f (x).
Novel code has two kinds of forms, and a kind of x of being and the y composition that connects together is 10 figure places as x, and y is 12 figure places, and then novel code is 22 figure places.Another kind of mode is the sequence number of x as product, and y is divided into two parts by sequence number and security code and forms novel code as security code.
Arithmetic expression f is an one-way function, has enough complicacy, and it can guarantee, when knowing x and y, can not infer the funtcional relationship (being f) between x and the y.When knowing y, also be difficult to infer x.When x is 10 figure places, when y was 12 figure places, the numeral that the fake producer draws up was 10 with the probability that novel code coincide just -10, promptly the number of Zao Jiaing only has 10 -10Successful possibility, and when y increases one digit number, its security will increase an order of magnitude.Therefore, this novel code has extremely strong preventing decryption.
This novel code has great capacity, and when production code member x increases one digit number, its product number that can number will increase an order of magnitude, and along with the increase of x figure place, the product capacity that can number is very big, can satisfy the needs of the product of any output.
2, use the process of the utility model to the identification process employing antiforge inquiry-and calculation of novel code, its operating process is as follows:
At first, with softwares such as the arithmetic expression (being f) of novel code and speech recognition program input computing machine, the utility model begins to enable by input ports such as keyboard, CD drive, disc drivers.When the user makes a phone call to inquire about, the number of user prompt enters computing machine by speech interface, start speech recognition software and calculation procedure, the arithmetic expression that meets y=f (x) as the number of user's input, then be very novel code, sign has the product of this novel code for true, as do not meet y=f (x) arithmetic expression, should number not novel code then, be " novel digital " of faking, indicate that this digital product is a fake products, through the calculating of computing machine, identification, its result can pass through display, loudspeaker, the user of plain old telephone and speech interface end feeds back, can with user communication, and with outcome record.Adopt above method, the utility model also can be in order to accept user's complaint, to resist the circulation of fake products.
Because the complicated calculations mode when the utility model generates based on novel code therefore have high preventing decryption and capacity, and the identification mode is simple, as long as it is digital from the speech interface input, can start speech recognition program, obtain feedback information, confirm the true and false.Because in the process of identification process employing antiforge inquiry-and calculation, " the searching " with in the general code telephone service technology becomes " calculating ", therefore, need in huge database, not seek one by one, greatly improved response speed and efficient.Response time can reach in 0.1 second in the ordinary course of things.Comparatively speaking, cost of investment of the present utility model will greatly reduce.
Therefore, the utility model is compared with general code telephone service technology, and cost of investment is low, the search efficiency height, and preventing decryption is strong.
Embodiment:
For the producer of a medium scale, if it is false proof to use present anti-counterfeiting technology to crack down on counterfeit goods, the millions of approximately units of its year investment, but still can not play good effect.Use novel code anti-fake technology and novel code anti-fake device, its cost of investment then can reduce tens of/one, and, any fake products will in time be found, the user can complain personation and the quality problems found, the information of complaining can in time be grasped for producer, and can give law enforcement agency rapidly and handle.From search efficiency, can improve 100 times, come from security, encryption algorithm is depended in the security of novel code, and encryption algorithm is to have strict theory to guarantee, even the public algorithm principle, anyone wants to utilize existing every means to decode all is very difficult.And encryption algorithm can be protected with the means of encrypting.And the security code of data base querying mode all is saved in the database, and any destruction of database all produces catastrophic consequence to the meeting system.From capacity, the length of false proof number and sequence code all can change, so the extendability of system and dirigibility meeting strengthen greatly.

Claims (1)

1. the false proof device of a novel code, comprise parts such as casing, speech interface, computing machine, display, plain old telephone, loudspeaker, keyboard, CD drive, disc driver, it is characterized in that, speech interface links to each other with computing machine, computing machine links to each other respectively with display, plain old telephone, loudspeaker, keyboard, CD drive, disc driver, contains the computer software of novel code arithmetic expression and speech recognition program at calculator memory.
CN 00200486 2000-01-13 2000-01-13 Antifaking device for code Expired - Fee Related CN2404159Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 00200486 CN2404159Y (en) 2000-01-13 2000-01-13 Antifaking device for code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 00200486 CN2404159Y (en) 2000-01-13 2000-01-13 Antifaking device for code

Publications (1)

Publication Number Publication Date
CN2404159Y true CN2404159Y (en) 2000-11-01

Family

ID=33569954

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 00200486 Expired - Fee Related CN2404159Y (en) 2000-01-13 2000-01-13 Antifaking device for code

Country Status (1)

Country Link
CN (1) CN2404159Y (en)

Similar Documents

Publication Publication Date Title
US6016480A (en) Merchandise return fraud prevention system and method
CN102004965B (en) Double ant-counterfeiting method and system of product
CN101847225B (en) A kind of method based on CN39 code managing commodity circulation
CN101110667B (en) User authentication method and user authentication system
CN105096143A (en) Anti-counterfeiting method, anti-counterfeiting system, server and intelligent terminal
WO2008086715A1 (en) Sanhe code for identifying merchandises
CN103886469A (en) Product two-dimension code generation and query system
CN1708772A (en) Method and apparatus for secure identity authentication with audible tones
KR20150009962A (en) Merchandise anti-counterfeiting identification method
CN110310130B (en) Anti-counterfeiting method and system
CN102779284A (en) RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like
CN2404159Y (en) Antifaking device for code
CN1283829A (en) Method for checking antiforge bar code of commodities over network
CN2435789Y (en) Portable scanning decipher identification reader
CN101483686A (en) Digital anticounterfeiting system and method based on IP telephone operation system
CN1290913A (en) Cipher anti-fake method of high security
CN105701435A (en) Multi-code association coding method capable of realizing self-verification and decoding method
CN1567327A (en) Credit card data processing method based on cryptogram
TWI518598B (en) A barcode tamper-proofing system and method thereof
CN1086027A (en) A kind of true and false commodity are differentiated technology and equipment and antifalsification label
CN1299110A (en) Method for recognizing identity cards including IC card
CN1380633A (en) Commodity antifalse method by using mobile telephone short message and computer random coding process
CN103440582A (en) Digital anti-counterfeiting code label system
CN1261188A (en) Bill (receipt) verification method and system based on electronic signature
CN1142516C (en) Three-dimensional anti-fake identification card and its anti-fake method

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee