Security RFID consumables anti-counterfeiting traceability solution

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

With the continuous improvement of people’s health awareness and the upgrading of consumption concepts, products such as water purifiers and air purifiers have gradually entered the homes of ordinary people from large-scale construction sites, becoming one of the secondary needs of family life consumption. These products are different from traditional home appliances. They mainly rely on filters and filter elements that need to be replaced frequently to maintain their purification function, and the purification effect of pollutants is not visible to the naked eye, which is an important gap for many unscrupulous businesses to profit from.

At present, 70% of the water purifiers on the market are based on RO reverse osmosis technology, usually using a combination of PP cotton, pre-activated carbon, RO reverse osmosis membrane and post-activated carbon combined with 4-5 levels of filtration.

The working principle and filtration accuracy of each level of filter element are different, and the consumption progress will also vary according to the source water quality and water use value of different regions or even different communities. Most of the water purifier products currently on sale provide users with regular replacement services ranging from 6 to 36 months for each filter element through manual recording, or by placing a timer in the machine. Remind that the filter element is due.

Manual door-to-door recording needs to rely on a strong after-sales service system and accurate data transmission, even for traditional old-brand household appliances brands, it is difficult to be timely and accurate. Naturally, the secondary pollution caused by the filter element’s overdue service does not need to be said. Other businesses use consumers’ panic about water quality to frequently remind users to replace the filter element. Selling products at low prices, high-frequency sales of filter elements and manual door-to-door services to earn profits has become a common tactic of many small water purifier manufacturers.

The huge profits of this type of consumables market also make it a target of fraud by criminals, leading to the emergence of the market: counterfeit goods are rampant, brand reputation is severely damaged; fake goods are difficult to distinguish between authentic and fake products, and consumers’ interests are damaged by seizing the authenticity market; directly This leads to a reduction in consumer loyalty, which directly affects corporate interests and disrupts the market structure.

The application of the Internet of Things technology brings the possibility of product innovation, solving product anti-counterfeiting, distribution and after-sales problems, and the realization of the purification effect requires deep professional experience and huge industry data.

It is understood that many pioneering companies have begun to use RFID for product anti-counterfeiting, but general-purpose RFID products are far from meeting the needs of the Chinese market for anti-counterfeiting:

UID verification cloning is low in difficulty, and it needs to be connected to the product database, so offline verification cannot be achieved

Single key encryption data once the key is stolen, the loss is serious and the key is easy to be copied

Enterprises have poor control over the market

In view of the above problems, how to break? No, the following is the focus of Xiao New today-the security RFID tag chip!

  ▲Comparative difference between general RFID tag chip and security RFID tag chip

 Security chip carrier

 Introduction to Security RFID Technology

On the left is the traditional RFID tag chip structure diagram, including a UID + security password + user data, there are security loopholes.

On the right is the structure diagram of a password-secure RFID tag chip. The biggest difference is that each tag has a key. This key is written by the user, that is, the brand manufacturer. The key of each chip is different. Can be read. Through the authentication algorithm, the uniqueness of the tag’s identity is determined, and the tag cannot be copied. The password security algorithm puts a security lock on the RFID. At the same time, the key of the security lock is controlled by the manufacturer. The label after the manufacturer has issued the key cannot be cracked and copied even by the label chip supplier. Brand manufacturers fully grasp the initiative of traceability.

  Product features-anti-cloning (identity authentication)

The reader performs key-based identity authentication on the tag to realize anti-cloning

1. One-way identity authentication of the tag by the reader (online)

2. Two-way identity authentication between reader and tag (offline)

3. The key is not transmitted during the authentication process

  Case 1: Practical application of water purifier

  ▲Filter element anti-counterfeiting application mode

1. The reader is installed on the host of the water purifier

2. The electronic label is installed on the filter element of the water purifier

3. When replacing the filter element, the host reader/writer will verify the anti-counterfeiting of the filter element

(1) The filter element is identified as true, the water purifier is working normally and the working time of the filter element is recorded, according to the application market, the user is reminded to replace the filter element in time

(2) If the filter element is identified as false, the water purifier will give an alarm, prompting the user to replace the genuine filter element to ensure the user’s drinking water safety and the working safety of the water purifier

As an ordinary consumer, NFC mobile phones can be used to verify the filter element online, effectively protecting the rights and interests of ordinary consumers.

  Solution application mode

 One product one core, one core one secret, completely eliminate counterfeit and shoddy products

1. Using algorithm-based two-way authentication mechanism, one core and one secret, which can never be read, to ensure that RFID tags cannot be cloned

2. There is no need to connect to the back-end database, easily realize offline anti-counterfeiting identification, and complete the filter element verification

3. The key to the security and anti-counterfeiting solution is in the hands of the user, even the solution provider cannot clone it, reducing the user’s application risk

 Case 2: Practical application of printer cartridge management

Consumer products are a huge market in life. The use of RFID in the sales of important anti-counterfeiting, distribution management or after-sales, etc., is applied to these links, which improves product safety and quality, while also saving costs and helping To solve two major problems in the retail industry: out of stock and wastage-products lost due to theft and disrupted supply chain. The following takes printer cartridge management as an example:

1. There is a built-in RFID tag on the toner cartridge, and a special card issuer writes the authorization matching information

2. Install an RFID card reader on a specific part of the printer. When replacing the toner cartridge, only use tags with RFID authorization built in, otherwise the printer will not work normally.

3. The RFID tag has a unique UID and a large-capacity user data area, and has an independent management key, which can trace the source of the item and correctly find a specific provider. When the product fails, you can quickly seek after-sales service.

4. It can prevent suppliers or distributors in different regions from collaborating with each other

5. It can protect and maintain the good integrity brand effect of the product

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare