CN2389392Y - Identification instrument for evident code and hiden code used in anti-counterfeit - Google Patents

Identification instrument for evident code and hiden code used in anti-counterfeit Download PDF

Info

Publication number
CN2389392Y
CN2389392Y CN 99229313 CN99229313U CN2389392Y CN 2389392 Y CN2389392 Y CN 2389392Y CN 99229313 CN99229313 CN 99229313 CN 99229313 U CN99229313 U CN 99229313U CN 2389392 Y CN2389392 Y CN 2389392Y
Authority
CN
China
Prior art keywords
code
utility
model
data
evident
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 99229313
Other languages
Chinese (zh)
Inventor
汪银海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHONGDING ELECTRONIC CO Ltd HEFEI
Original Assignee
ZHONGDING ELECTRONIC CO Ltd HEFEI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHONGDING ELECTRONIC CO Ltd HEFEI filed Critical ZHONGDING ELECTRONIC CO Ltd HEFEI
Priority to CN 99229313 priority Critical patent/CN2389392Y/en
Application granted granted Critical
Publication of CN2389392Y publication Critical patent/CN2389392Y/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model relates to a special identifying instrument for the counterfeiting prevention of an evident code and a hidden code. The utility model is characterized in that the utility model is composed of a monolithic computer circuit DS with functions of sleep and wake, an inner sleep sustaining power supply E2, an outer working power supply E1, an evident code input keyboard KB or a bar code scanning device TS, a hidden code displaying liquid crystal module YJ. The utility model is provided with an IC card seat opening KZ which is used for receiving the data of the evident and the hidden code in a CPU data card and an unified secret key group. When a machine shell which is arranged in the utility model is disassembled, a single chip computer is triggered to start a switch FK which clears ciphers and prevents the data program from disassembling. The utility model is applied to the anti-counterfeiting technique of the evident code and the hidden code, and a consumer can directly identify realness and falseness on the utility model to enhance the operability of the anti-counterfeiting technique of the evident code and the hidden code with strong anti-counterfeiting strength.

Description

The false proof special-purpose identifier of light and shade sign indicating number
The utility model relates to false proof utensil.More particularly, be a kind of being applied in the light and shade sign indicating number anti-counterfeiting technology, set plain code is discerned, to judge the false proof special-purpose identifier of light and shade sign indicating number of the true and false.
Light and shade sign indicating number anti-counterfeiting technology is used widely on commodity market, and it is the telephone code anti-counterfeiting technology that its typical case uses.Concrete grammar is that one group of plain code and private mark are set on each part Commercial goods labels, and these are bright, private mark deposit data is in each giant brain database, after the consumer buys commodity, with the light and shade sign indicating number on telephone set to this data base querying, to distinguish true from false.Though this method for anti-counterfeit cost is low, it is simple to make, in the practical application, because problems such as costs of use, most consumers does not go to make a phone call to discern.The problem of thereupon bringing is: the first, and the consumer does not inquire about, and the database sign indicating number that just can not disappear accumulates over a long period, and database certainly will be increasing, causes confusion at last.The second, because the consumer do not inquire about, data are trapped in the database, thereby give the another machine of taking advantage of of making of fake producer, not only can make a collection of counterfeit that true sign indicating number is arranged equally, also can true plain code from the phone free call on sb. else's expense through illegal means cause and obscure with the sign indicating number that disappears.The 3rd, the mechanism that cracks down on counterfeit goods is not easy to crack down on counterfeit goods by Help by Phone.
The purpose of this utility model is to avoid above-mentioned weak point of the prior art, a kind of computer data that replaces is provided, the false proof special-purpose identifier of light and shade sign indicating number of identification directly is provided for the consumer,, strengthens anti-counterfeiting power to improve the operability of light and shade sign indicating number anti-counterfeiting technology.
The purpose of this utility model is achieved through the following technical solutions.
Design feature of the present utility model is:
Keep by having the sleep and the single chip circuit DS of arousal function, inner sleep that power supply E2, operate outside power supply E1, plain code input keyboard KB or bar code sweep device TS, private mark demonstration Liquid Crystal Module YJ forms;
The IC-card seat mouth KZ of setting in order to receive the light and shade code data in the cpu data card and to receive unified set of cipher key.Described IC-card seat mouth KZ is made of two line sockets, and two end lines insert RA1 port and the ground wire of singlechip chip IC1 respectively.
When being arranged on casing and being disassembled, trigger single-chip microcomputer and start the breaking-proof switch FK that removes password and data program.
The utility model is by unified set of cipher key in light and shade code data in the IC-card seat mouth reception cpu data card and the Antiforge system, adopt this unified set of cipher key to carry out the crypto-operation transmission, a plurality of random numbers in addition in the transmittance process make digital signal present polytrope and dynamic.After clear data being imported Single Chip Microcomputer (SCM) system by keyboard or bar code, Single Chip Microcomputer (SCM) system at first has or not the existence of this plain code in the data query internal memory, and then find out corresponding preceding 10 private mark random number ciphertexts, calculate back 6 private marks according to 16 plain codes with distortion DES algorithm, and on Liquid Crystal Module, 16 private marks are shown, thereby discern.Eliminate the corresponding ciphertext random code simultaneously.Compared with the prior art, be applied in the light and shade sign indicating number anti-counterfeiting technology with the utility model, the consumer can directly carry out truth identification thereon, and the operability, the anti-counterfeiting power that have greatly improved the light and shade anti-counterfeiting technology are strong.
Fig. 1 is the utility model circuit block diagram.
Fig. 2 is the utility model circuit theory diagrams.
By the following examples, in conjunction with the accompanying drawings the utility model is further described.
Embodiment:
Referring to accompanying drawing 1,2, present embodiment keeps by having the sleep and the single chip circuit DS of arousal function, inner sleep that power supply E2, operate outside power supply E1, plain code input keyboard KB or bar code sweep device TS, private mark demonstration Liquid Crystal Module YJ forms;
The IC-card seat mouth KZ of setting in order to receive the light and shade code data in the cpu data card and to receive unified set of cipher key.Described IC-card seat mouth KZ is made of two line sockets, and two end lines insert RA1 port and the ground wire of singlechip chip IC1 respectively.
When being arranged on casing and being disassembled, trigger single-chip microcomputer and start the breaking-proof switch FK that removes password and data program.
As shown in Figure 2, in the present embodiment, adopt 8 single-chip microcomputer IC1 of PIC16C558IC type, data-carrier store IC3 adopts 24LC256.Deck mouth KZ is made of two line sockets, and two end lines insert RA1 port and the ground wire of singlechip chip IC1 respectively.Breaking-proof switch FK is by a plurality of microswitch FK1---the FK4 formation of connecting, an end ground connection, the RB0 port of other end order sheet machine chip IC1.Breaking-proof switch is distributed in instrument and closes lid up and down in conjunction with part.Under the normal condition, microswitch is connected, and port RB0 is a low level, in case illegally dismantle, microswitch promptly has open circuit, and single-chip microcomputer then starts relative program, removes the set of cipher key and the total data of preserving in it, and identifier lost efficacy, and reaches the purpose of tamper.Liquid Crystal Module YJ selects 16 sectional type liquid-crystalline glasses sheets for use, and its display driver adopts the HT1621 type, and display driver is that five lines are connected with single chip circuit, promptly select lines CS, data line DA, write line WR, power lead and ground wire.By comparer IC2; A constitutes inside and outside power supply comparator circuit, and its comparison output signal is connected to the RA0 port of singlechip chip IC1.As external power source E1 during greater than internal electric source E2, the RA0 mouth of single-chip microcomputer IC1 is a low level, and be duty this moment; As external power source E1 during less than internal electric source E2, the RA0 mouth is a high level, when Single Chip Microcomputer (SCM) program detects this high level, enters the sleep power down mode immediately, is difficult for losing with the code data of keeping single-chip data inside.Bar code input unit TS offers the RB1 port of IC1 with the form of serial digital signal.As shown, constitute keyboard KB scan matrix by RA3 end line, the RB1-RB7 end line of IC1.Keyboard comprises ten numerals and six function keys, and wherein, function key comprises shutdown, self check, password, identification, reception and bar code.In addition, also has reset key RS.Wherein, " shutdown " key makes Single Chip Microcomputer (SCM) system enter artificial sleep power down mode." self check " is used to differentiate the true and false of identifier self.Press this key, whether single-chip microcomputer is not searched this clear data in the internal memory, and only according to the clear data computing distortion DES that is keyed in, resulting six private mark numbers are in liquid crystal display, to show the true and false." password " key is in single-chip microcomputer IC1 and receives the password state.At this moment, the cipher control center passes to single-chip microcomputer IC1 with binary serial data signal by IC-card seat mouth KZ, IC1 deposits the data of receiving in card reading status, and with after the random number MS do distortion DES computing, by the oral instructions of KZ deck to the cpu data card, after the cpu data card solves this random data, with its as new password and in addition conversion pass to IC1 again and check, simultaneously, IC1 passes to the information of a correctness of cpu data card again, if correct information, the cpu data card will be a key with this MS, IC1 is passed in its light and shade code data encryption, and after the IC1 decoding, the light and shade code data promptly deposits in the memory IC 3 shown in the figure.After " identification " was used in the clear data key entry, the instruction relative program was searched and is had or not this plain code to exist in the memory IC 3, does not then send error message if do not exist; Then find out corresponding private mark in advance to show if exist, eliminate the corresponding ciphertext random code simultaneously.In the present embodiment, setting light and shade yardage bit length all is 16, and preceding 10 of its private mark is and the plain code random number corresponding that back 6 then obtain according to distortion DES algorithm.The private mark data that single-chip microcomputer IC1 will so handle show on Liquid Crystal Module, and do sound prompting.

Claims (4)

1, the false proof special-purpose identifier of light and shade sign indicating number is characterized in that:
Keep by having the sleep and the single chip circuit DS of arousal function, inner sleep that power supply E2, operate outside power supply E1, plain code input keyboard KB or bar code sweep device TS, private mark demonstration Liquid Crystal Module YJ forms;
The IC-card seat mouth KZ of setting in order to receive the light and shade code data in the cpu data card and to receive unified set of cipher key.Described IC-card seat mouth KZ is made of two line sockets, and two end lines insert RA1 port and the ground wire of singlechip chip IC1 respectively.
When being arranged on casing and being disassembled, trigger single-chip microcomputer and start the breaking-proof switch FK that removes password and data program.
2, the false proof special-purpose identifier of light and shade sign indicating number according to claim 1 is characterized in that described breaking-proof switch FK is by a plurality of microswitch FK1---the FK4 formation of connecting, an end ground connection, the RB0 port of other end order sheet machine chip IC1.
3, the false proof special-purpose identifier of light and shade sign indicating number according to claim 1, it is characterized in that described LCD MODULE YJ selects 16 sectional type liquid-crystalline glasses sheets for use, its display driver adopts the HT1621 type, described driver is that five lines are connected with single chip circuit, promptly select lines CS, data line DA, write line WR, power lead and ground wire.
4, the false proof special-purpose identifier of light and shade sign indicating number according to claim 1 is characterized in that inside and outside the power supply comparator circuit that is made of comparer IC2 is set, and its comparison output signal is connected to the RA0 port of singlechip chip IC1.
CN 99229313 1999-08-27 1999-08-27 Identification instrument for evident code and hiden code used in anti-counterfeit Expired - Fee Related CN2389392Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 99229313 CN2389392Y (en) 1999-08-27 1999-08-27 Identification instrument for evident code and hiden code used in anti-counterfeit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 99229313 CN2389392Y (en) 1999-08-27 1999-08-27 Identification instrument for evident code and hiden code used in anti-counterfeit

Publications (1)

Publication Number Publication Date
CN2389392Y true CN2389392Y (en) 2000-07-26

Family

ID=34018568

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 99229313 Expired - Fee Related CN2389392Y (en) 1999-08-27 1999-08-27 Identification instrument for evident code and hiden code used in anti-counterfeit

Country Status (1)

Country Link
CN (1) CN2389392Y (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100461137C (en) * 2006-12-21 2009-02-11 杭州东信金融技术服务有限公司 Hard enciphered cipher keyboard device
CN101916233A (en) * 2010-09-14 2010-12-15 湖南源科高新技术有限公司 Computer and data elimination method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100461137C (en) * 2006-12-21 2009-02-11 杭州东信金融技术服务有限公司 Hard enciphered cipher keyboard device
CN101916233A (en) * 2010-09-14 2010-12-15 湖南源科高新技术有限公司 Computer and data elimination method thereof

Similar Documents

Publication Publication Date Title
CN101074589A (en) Fingerprint safe, its controlling system and method
CN101626422A (en) Anti-theft method of mobile phone
CN202041965U (en) Swiping card magnetic head special for peripheral component interconnect (PCI) 3.0
CN105608779A (en) Electronic code lock system
CN202748833U (en) Bluetooth anti-counterfeiting system based on intelligent terminal
CN2389392Y (en) Identification instrument for evident code and hiden code used in anti-counterfeit
CN201381702Y (en) USB flash drive lock
CN2299712Y (en) Intelligent electronic anti-fake stamp
CN106437316A (en) Multifunctional intelligent door lock
CN101504749A (en) Anti-fake method based on third party credit system information
CN205334525U (en) Intelligence electron antifalsification label system
CN206726320U (en) A kind of recognition of face electronic password lock based on FPGA
CN2376519Y (en) Electronic permulation lock
CN205451091U (en) Anti -fake system of coin collection and coin collection
CN201593338U (en) Antitheft electronic code lock
CN204990476U (en) Take multinational appraisal of coinage identifier of worn coin detection
CN205722030U (en) A kind of electronic coding lock system
CN204112909U (en) Multi-functional safety door lock
EP0194782B1 (en) Telecommunications security device
CN2524297Y (en) Electronic anti-fake device
CN104929442B (en) Intelligent anti-theft lock
CN2563863Y (en) Intelligent plain code and secrete code telephone inquiry anti-fake system
CN2489407Y (en) Disposable IC card descriminator for distinguishing true or false of middle-high grade goods
CN211454685U (en) Entrance guard capable of being unlocked by swiping card and password
CN2292152Y (en) Electric controlled theft-proof device for door

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee