Method for anti-forgery, identification and management by mobile telephone
The method includes the following steps: the identification code on false proof identification article is transmitted to the appointed inquiry mechanism by the user through wire or wireless means, the appointed inquiry mechanism which receives the identification code identifies the legality of recei...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | LIANJIE TANG |
description | The method includes the following steps: the identification code on false proof identification article is transmitted to the appointed inquiry mechanism by the user through wire or wireless means, the appointed inquiry mechanism which receives the identification code identifies the legality of received identification code through inquiry system of the user and provides a group of user cipher to the user, the intelligent card which is opened with the user cipher is placed into the mobile phone so the readable correct product information and relative information is displayed on the mobile phone screen for the user. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN1270561CC</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN1270561CC</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN1270561CC3</originalsourceid><addsrcrecordid>eNrjZPDyTS3JyE9RSMsvUkjMK8nUBTLSU4sqdRQyU1KB_LTM5MSSzPw8oGSKQm5iXmJ6ai5QXCGpUiE3PykzJ1WhJDUntSAjPy-Vh4E1LTGnOJUXSnMzKLi5hjh76KYW5MenFhckJqfmpZbEO_sZGpkbmJoZOjsbE6EEALN1NME</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Method for anti-forgery, identification and management by mobile telephone</title><source>esp@cenet</source><creator>LIANJIE TANG</creator><creatorcontrib>LIANJIE TANG</creatorcontrib><description>The method includes the following steps: the identification code on false proof identification article is transmitted to the appointed inquiry mechanism by the user through wire or wireless means, the appointed inquiry mechanism which receives the identification code identifies the legality of received identification code through inquiry system of the user and provides a group of user cipher to the user, the intelligent card which is opened with the user cipher is placed into the mobile phone so the readable correct product information and relative information is displayed on the mobile phone screen for the user.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TELEPHONIC COMMUNICATION</subject><creationdate>2006</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20060816&DB=EPODOC&CC=CN&NR=1270561C$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20060816&DB=EPODOC&CC=CN&NR=1270561C$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>LIANJIE TANG</creatorcontrib><title>Method for anti-forgery, identification and management by mobile telephone</title><description>The method includes the following steps: the identification code on false proof identification article is transmitted to the appointed inquiry mechanism by the user through wire or wireless means, the appointed inquiry mechanism which receives the identification code identifies the legality of received identification code through inquiry system of the user and provides a group of user cipher to the user, the intelligent card which is opened with the user cipher is placed into the mobile phone so the readable correct product information and relative information is displayed on the mobile phone screen for the user.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TELEPHONIC COMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2006</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPDyTS3JyE9RSMsvUkjMK8nUBTLSU4sqdRQyU1KB_LTM5MSSzPw8oGSKQm5iXmJ6ai5QXCGpUiE3PykzJ1WhJDUntSAjPy-Vh4E1LTGnOJUXSnMzKLi5hjh76KYW5MenFhckJqfmpZbEO_sZGpkbmJoZOjsbE6EEALN1NME</recordid><startdate>20060816</startdate><enddate>20060816</enddate><creator>LIANJIE TANG</creator><scope>EVB</scope></search><sort><creationdate>20060816</creationdate><title>Method for anti-forgery, identification and management by mobile telephone</title><author>LIANJIE TANG</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN1270561CC3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2006</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TELEPHONIC COMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>LIANJIE TANG</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>LIANJIE TANG</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Method for anti-forgery, identification and management by mobile telephone</title><date>2006-08-16</date><risdate>2006</risdate><abstract>The method includes the following steps: the identification code on false proof identification article is transmitted to the appointed inquiry mechanism by the user through wire or wireless means, the appointed inquiry mechanism which receives the identification code identifies the legality of received identification code through inquiry system of the user and provides a group of user cipher to the user, the intelligent card which is opened with the user cipher is placed into the mobile phone so the readable correct product information and relative information is displayed on the mobile phone screen for the user.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_CN1270561CC |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TELEPHONIC COMMUNICATION |
title | Method for anti-forgery, identification and management by mobile telephone |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T05%3A44%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=LIANJIE%20TANG&rft.date=2006-08-16&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN1270561CC%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |