INTERNET-BASED COMMODITY TURNOVER MONITORING METHOD Russian patent published in 2013 - IPC G06Q90/00 

Abstract RU 2485590 C1

FIELD: information technology.

SUBSTANCE: commodity turnover monitoring method includes the following operations: a computer system requesting a first group of data and a second group of data which are 13-digit decimal numbers, respectively, for processing; determining if the first group of data and the second group of data correspond to specific principles; performing an operation for encrypting two groups of data, respectively, according to specific coding principles using a commercial cryptographic algorithm with generation of a third group of data; bringing the first, second and third groups of data into conformity with one commodity; separating the first, second and third groups of data into three lines, and depositing said three lines onto the corresponding commodity; assigning the commodity a 6-digit tracking code; displaying the tracking code on a web page; and the computer system displaying the first and second groups of data and other information on the web page; entering the third group of data into an input window; performing a reverse encryption operation and control processing while displaying on a display window symbols "0" or "1" to signal correct or wrong information.

EFFECT: improved identification, authentication and tracking of product items.

3 cl, 10 dwg

Similar patents RU2485590C1

Title Year Author Number
SYSTEM ARCHITECTURE AND METHOD OF THE NETWORK SECURITY PROVISION 2015
  • Yuj Chzhi
RU2656813C2
METHOD AND SYSTEM FOR FORMING AND DISTRIBUTING INFORMATION ABOUT PRODUCTS VIA INTERNET NETWORK 2003
  • Ponomarev D.M.
  • Krylov V.V.
RU2265246C2
METHOD AND SYSTEM FOR PROTECTING INFORMATION FROM UNAUTHORISED USE (VERSIONS THEREOF) 2013
  • Rabinovich Il'Ja Samuilovich
RU2560810C2
IDENTIFICATION SYSTEM FOR CERTIFICATION OF AUTHENTICITY OF ELECTRONIC DEALS AND ELECTRONIC TRANSACTIONS WITHOUT USE OF IDENTIFICATION CARDS 1996
  • Khoffman Ned
  • Peha Dehvid F.
  • Li Dzhonatan A.
RU2263348C2
TECHNOLOGY FOR PROTECTION AGAINST COUNTERFEITING AND FALSIFICATION BY ENCODING, INTERNAL PLACEMENT OF UNIQUE CODES, AND RECOGNITION THEREOF 2020
  • Merkushev Mikhail Aleksandrovich
  • Kurashov Denis Aleksandrovich
  • Samodelkin Kirill Vladimirovich
  • Drozhzhachikh Andrej Valerevich
  • Zhuravlev Ivan Ivanovich
  • Ivanov Evgenij Nikolaevich
RU2755969C1
CARD WITH POSSIBILITY OF AUTHENTICATION 2006
  • Komatsu Nobuaki
  • Nandzo Sin-Itiro
RU2435218C2
METHOD AND SYSTEM FOR SELECTION OF PROPOSALS FOR A USER BASED ON ANALYSIS OF ACTIONS THEREOF 2018
  • Krestnikov Fedor Ivanovich
  • Melnikov Kirill Sergeevich
  • Panin Kirill Aleksandrovich
RU2693646C1
METHODS, DEVICES, AND SYSTEMS FOR SECURE PROVISIONING, TRANSMISSION AND AUTHENTICATION OF PAYMENT DATA 2015
  • Graylin William Wang
  • Huang Enyang
  • Wallner George
RU2648944C2
METHOD AND SYSTEM FOR MARKING USER ACTIONS FOR SUBSEQUENT ANALYSIS AND ACCUMULATION 2018
  • Krestnikov Fedor Ivanovich
  • Melnikov Kirill Sergeevich
  • Panin Kirill Aleksandrovich
RU2702275C1
METHOD AND SYSTEM FOR PROTECTED TRANSMITION OF REMOTE NOTIFY SERVICE MESSAGES TO MOBILE DEVICES WITHOUT PROTECTED ELEMENTS 2014
  • Kollinge Mekhdi
  • Uord Majkl Kristofer
  • Smets Patrik
  • Kejtlend Aksel Emil Zhan Charlz
  • Radu Kristian
RU2642821C2

RU 2 485 590 C1

Authors

Yu Zhi

Dates

2013-06-20Published

2010-04-07Filed