CN2404159Y - Antifaking device for code - Google Patents
Antifaking device for code Download PDFInfo
- Publication number
- CN2404159Y CN2404159Y CN 00200486 CN00200486U CN2404159Y CN 2404159 Y CN2404159 Y CN 2404159Y CN 00200486 CN00200486 CN 00200486 CN 00200486 U CN00200486 U CN 00200486U CN 2404159 Y CN2404159 Y CN 2404159Y
- Authority
- CN
- China
- Prior art keywords
- code
- computer
- utility
- model
- loudspeaker
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Abstract
The utility model relates to an anti-counterfeiting device which uses a novel electric code to identify whether a commodity is true or false. The utility model is an anti-counterfeiting device which is based on a complex computer method and a simple identification mode. The utility model has low investment cost, high enquiring efficiency and strong decoding prevention. The utility model is composed of a machine housing, a voice interface, a computer, a display, a common telephone, a loudspeaker, a keyboard, an optical disk drive, a magnetic disk drive, etc., wherein, the voice interface is connected with the computer. The computer is respectively connected with the display, the common telephone, the loudspeaker, the keyboard, the optical disk drive and the magnetic disk drive. A computer software which is provided with a novel electric-code arithmetic expression and a voice identifying program is stored in the computer. When a user enquires through the voice interface, the user's voice is calculated and identified by the computer, and feedback, communication and record are completed by the common telephone, the display and the loudspeaker.
Description
The utility model relates to a kind of false proof device, particularly a kind of false proof device that utilizes the novel code recognition value true and false.
At present, upset the economic order of society for preventing fake products, protection business and consumer's legitimate rights and interests have been invented multiple anti-counterfeiting technology in succession.Wherein, the anti-counterfeiting technology that extensively adopts generally has following a few class:
One, vision anti-counterfeiting technology: as multiple laser anti-counterfeit, one dimension, two-dimensional bar are false proof, fluorescence falsification preventing, and alternating temperature is false proof, and watermark is false proof etc.Because the limitation of people's visual capacity, and this anti-counterfeiting mark is with low content of technology, and textural association is very easily decoded, and has certain special technique and prescription is a prerequisite with the fabricator, a large amount of forgery packing and product will occur in case leak.
Two, electronic recognition anti-counterfeiting technology: as the magnetic card record, anti-counterfeiting marks such as IC-card because counterfeit and shoddy goods can't enter computer management system, have therefore played good anti-fake effect.But this anti-counterfeiting mark need use specialized equipment to inquire about, and just can only just might inquire about under given conditions, thereby limit user's usable range, and popularization is restricted.
Three, code telephone service technology: this anti-counterfeiting technology is to produce one or a pair of numeral as false proof code word with a kind of algorithm, then these numbers are stored in the database, the user is when the true and false is inquired about with the false proof code word on the product, should false proof code word input database, compare with the value in the numerical value storehouse and to check.Correctly be very if check, if the mistake of checking is personation.This method for anti-counterfeit has following shortcoming;
A, since product produce in a large number, user's continuous increase, it is hundreds billion of that the data in the database must reach, even tens of trillion storage, therefore, during inquiry the time longer, each time the inquiry can reach nearly ten seconds even longer.
B, along with product and user's continuous increase, the maintenance and management of huge database will become increasingly complex, difficulty.
Any destruction of c, database all can influence the result of inquiry, all great influence can be arranged to the operation of client, businessman, Antiforge system.
D, because the hardware investment of Antiforge system, software investment and telecommunication fee are huge, the investment of total system will exceedance ten million yuan.
The security of e, security code is difficult to ensure that the random number code security that utilizes random generator to produce can not ensure that the danger that is decrypted is arranged.
The capacity of f, database has certain restriction, and the quantity of security code is limited.
The utility model aims to provide a kind of novel code anti-fake device, and it is based on the novel code anti-fake device of complicated computing method and simple identification mode, compares with existing code telephone service technology, and cost of investment is low, the search efficiency height, and preventing decryption is strong.
The utility model comprises: parts such as casing, speech interface, computing machine, display, plain old telephone, loudspeaker, keyboard, CD drive, disc driver, wherein speech interface links to each other with computing machine, and computing machine links to each other respectively with display, plain old telephone, loudspeaker, keyboard, CD drive, disc driver.Display, computing machine join by ups power and external power supply, as Fig. 1, Fig. 2, shown in Figure 3.Contain the arithmetic expression of novel code and the computer software of speech recognition program at calculator memory.
Fig. 1 is the utility model synoptic diagram;
Fig. 2 is the utility model front cut-away view;
Fig. 3 is the utility model back side cut-away view
Among the figure: 1 casing, 2 displays, 3 keyboards, 4 disc drivers, 5 CD drive, 6 loudspeakers, 7 computing machines, 8UPS power supply, 9 speech interfaces, 10 plain old telephones.
Operation principle of the present utility model is:
1, the novel code that relates to of the utility model derives from the generation system of novel code. Its generation Novel code comprise two parts; The one, the numbering of product, this numbering can be numeral or text; Two The numbering and the Anti-fake digital that are the false proof data product of the high-intensity encryption algorithm generation of employing are unique Corresponding, namely a production code member can only produce unique Anti-fake digital, thereby forms unique novel Code.
The production process of novel code is as follows:
If x is the numbering of a product, f is an arithmetic expression, and this arithmetic expression is an one-way function, y be by production code member through the f result calculated, be false proof number, i.e. y=f (x).
Novel code has two kinds of forms, and a kind of x of being and the y composition that connects together is 10 figure places as x, and y is 12 figure places, and then novel code is 22 figure places.Another kind of mode is the sequence number of x as product, and y is divided into two parts by sequence number and security code and forms novel code as security code.
Arithmetic expression f is an one-way function, has enough complicacy, and it can guarantee, when knowing x and y, can not infer the funtcional relationship (being f) between x and the y.When knowing y, also be difficult to infer x.When x is 10 figure places, when y was 12 figure places, the numeral that the fake producer draws up was 10 with the probability that novel code coincide just
-10, promptly the number of Zao Jiaing only has 10
-10Successful possibility, and when y increases one digit number, its security will increase an order of magnitude.Therefore, this novel code has extremely strong preventing decryption.
This novel code has great capacity, and when production code member x increases one digit number, its product number that can number will increase an order of magnitude, and along with the increase of x figure place, the product capacity that can number is very big, can satisfy the needs of the product of any output.
2, use the process of the utility model to the identification process employing antiforge inquiry-and calculation of novel code, its operating process is as follows:
At first, with softwares such as the arithmetic expression (being f) of novel code and speech recognition program input computing machine, the utility model begins to enable by input ports such as keyboard, CD drive, disc drivers.When the user makes a phone call to inquire about, the number of user prompt enters computing machine by speech interface, start speech recognition software and calculation procedure, the arithmetic expression that meets y=f (x) as the number of user's input, then be very novel code, sign has the product of this novel code for true, as do not meet y=f (x) arithmetic expression, should number not novel code then, be " novel digital " of faking, indicate that this digital product is a fake products, through the calculating of computing machine, identification, its result can pass through display, loudspeaker, the user of plain old telephone and speech interface end feeds back, can with user communication, and with outcome record.Adopt above method, the utility model also can be in order to accept user's complaint, to resist the circulation of fake products.
Because the complicated calculations mode when the utility model generates based on novel code therefore have high preventing decryption and capacity, and the identification mode is simple, as long as it is digital from the speech interface input, can start speech recognition program, obtain feedback information, confirm the true and false.Because in the process of identification process employing antiforge inquiry-and calculation, " the searching " with in the general code telephone service technology becomes " calculating ", therefore, need in huge database, not seek one by one, greatly improved response speed and efficient.Response time can reach in 0.1 second in the ordinary course of things.Comparatively speaking, cost of investment of the present utility model will greatly reduce.
Therefore, the utility model is compared with general code telephone service technology, and cost of investment is low, the search efficiency height, and preventing decryption is strong.
Embodiment:
For the producer of a medium scale, if it is false proof to use present anti-counterfeiting technology to crack down on counterfeit goods, the millions of approximately units of its year investment, but still can not play good effect.Use novel code anti-fake technology and novel code anti-fake device, its cost of investment then can reduce tens of/one, and, any fake products will in time be found, the user can complain personation and the quality problems found, the information of complaining can in time be grasped for producer, and can give law enforcement agency rapidly and handle.From search efficiency, can improve 100 times, come from security, encryption algorithm is depended in the security of novel code, and encryption algorithm is to have strict theory to guarantee, even the public algorithm principle, anyone wants to utilize existing every means to decode all is very difficult.And encryption algorithm can be protected with the means of encrypting.And the security code of data base querying mode all is saved in the database, and any destruction of database all produces catastrophic consequence to the meeting system.From capacity, the length of false proof number and sequence code all can change, so the extendability of system and dirigibility meeting strengthen greatly.
Claims (1)
1. the false proof device of a novel code, comprise parts such as casing, speech interface, computing machine, display, plain old telephone, loudspeaker, keyboard, CD drive, disc driver, it is characterized in that, speech interface links to each other with computing machine, computing machine links to each other respectively with display, plain old telephone, loudspeaker, keyboard, CD drive, disc driver, contains the computer software of novel code arithmetic expression and speech recognition program at calculator memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 00200486 CN2404159Y (en) | 2000-01-13 | 2000-01-13 | Antifaking device for code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 00200486 CN2404159Y (en) | 2000-01-13 | 2000-01-13 | Antifaking device for code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN2404159Y true CN2404159Y (en) | 2000-11-01 |
Family
ID=33569954
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 00200486 Expired - Fee Related CN2404159Y (en) | 2000-01-13 | 2000-01-13 | Antifaking device for code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN2404159Y (en) |
-
2000
- 2000-01-13 CN CN 00200486 patent/CN2404159Y/en not_active Expired - Fee Related
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6016480A (en) | Merchandise return fraud prevention system and method | |
CN102004965B (en) | Double ant-counterfeiting method and system of product | |
CN101847225B (en) | A kind of method based on CN39 code managing commodity circulation | |
CN101110667B (en) | User authentication method and user authentication system | |
CN105096143A (en) | Anti-counterfeiting method, anti-counterfeiting system, server and intelligent terminal | |
WO2008086715A1 (en) | Sanhe code for identifying merchandises | |
CN103886469A (en) | Product two-dimension code generation and query system | |
CN1708772A (en) | Method and apparatus for secure identity authentication with audible tones | |
KR20150009962A (en) | Merchandise anti-counterfeiting identification method | |
CN110310130B (en) | Anti-counterfeiting method and system | |
CN102779284A (en) | RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like | |
CN2404159Y (en) | Antifaking device for code | |
CN1283829A (en) | Method for checking antiforge bar code of commodities over network | |
CN2435789Y (en) | Portable scanning decipher identification reader | |
CN101483686A (en) | Digital anticounterfeiting system and method based on IP telephone operation system | |
CN1290913A (en) | Cipher anti-fake method of high security | |
CN105701435A (en) | Multi-code association coding method capable of realizing self-verification and decoding method | |
CN1567327A (en) | Credit card data processing method based on cryptogram | |
TWI518598B (en) | A barcode tamper-proofing system and method thereof | |
CN1086027A (en) | A kind of true and false commodity are differentiated technology and equipment and antifalsification label | |
CN1299110A (en) | Method for recognizing identity cards including IC card | |
CN1380633A (en) | Commodity antifalse method by using mobile telephone short message and computer random coding process | |
CN103440582A (en) | Digital anti-counterfeiting code label system | |
CN1261188A (en) | Bill (receipt) verification method and system based on electronic signature | |
CN1142516C (en) | Three-dimensional anti-fake identification card and its anti-fake method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C19 | Lapse of patent right due to non-payment of the annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |