Active Variable Authentication

google_play

Download our anti-counterfeiting APP

 

Variable Code

  • Every time the code is different, you can copy of them, but all of them will be expired in minutes.
  • General NFC tags are relatively easy to replicate, so many laboratories had discovered reverse engineering techniques to extract data from passive NFC tags, which makes those tags vulnerable. To solve this problem, our company, UserStar, developed a variable method in order to avoid being replicated. We employed an active variable method that changes its encryption code every time other devices attempted to access the tags, which ensures the tag are unable to be replicated.

Unpacking Detection

  • You will know the bottle or package is not opened or not. Once you unpack it, you can still read information from tags. You can also trace the sources if provided.
  • If the bottle was unpacked, the pass page will indicates the change from sealed to opened.

Anyone Capable

  • You don’t need to send products back to the manufacturer, or find a professor or laboratory to examine it. You can do it with a simple tap.
  • How an ordinary people like us can recognize authenticity of goods from numerous fake goods? We are always counting on our luck or send the product back to genuine manufacturer  for examination. If a product can be recognized by ourselves easily, we will not worry about what we bought is true or not. NFC is a promising wireless communication technology which has been adopted widely nowadays, especially on payment. We can build an ID on a product, and use NFC-enable phone to verify the product immediately.

Flow Chart

solution_step1

  • 1.Tap NFC mobile phone on sense area of a product.

solution_step2

  • 2.You will get a code (X), product’s UID and even data.You can tap it again, and you will receive a various code (X).

solution_step3

  • 3.Your mobile phone will transfer code (x), UID and event data to global servce. The data will forward to manufacturer’s decode center, your mobile phone won’t join decode authentication.

solution_step4

  • 4. The manufacturer will generate code (Y) with UID and event data.

solution_step5

  • 5.Once code x=y, this would forward a result: It’s genuine!

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s