Share:

With the improvement of people health consciousness and the upgrading of consumption concept, the products of water purifier and air purifier have gradually entered ordinary people homes from large construction sites, and become one of demands of family life consumption. These products are different from traditional household appliances. They mainly rely on filters, filter elements, which need to be replaced frequently to maintain the purification function, and the decontamination effect of pollutants is not visible to eye. This is for a lot of bad businessmen profit-making important gap.



At present, 70% of the water purifiers on the market mainly use RO reverse osmosis technology, usually using the combination of PP cotton, pre-activated carbon reverse osmosis membrane and post-activated carbon 4-5 stage filtration..

The working principle and filtering accuracy of different filter elements are different, and the consumption progress will be different according to the source water quality and water value of different regions and even different residential areas. Most of the water purifiers currently on sale provide users with regular replacement services ranging from 6 to 36 months per filter or by placing timers in the machine to remind them that the filter expires.

Manual door-to-door records need to rely on a strong after-sales service system and accurate data transmission, even traditional brands of old household appliances are difficult to achieve timely and accurate. There is no need to say much about the secondary pollution caused by the excessive service of the filter element, while some other businesses frequently remind the user to change the filter element by taking advantage of consumersundefined panic about the water quality. Selling products at low prices, selling filters at high frequencies and making profits from manual door-to-door services have become a common trick for many small water purifiers.

The huge profit of this kind of consumables market also makes it become the target of the illegal elements, which causes the market to appear: under the false goods, the brand reputation is seriously damaged, the fake goods are difficult to distinguish between the genuine and the fake goods, and the consumersundefined interests are damaged. Directly leads to the reduction of consumer loyalty, directly affects the interests of enterprises and disrupts the market pattern.

The application of the Internet of things technology has brought the possibility for the product innovation, solves the product anti-counterfeiting, the distribution and the after-sale question, but the concrete realization of the purification effect, needs the profound specialized experience and the huge industry data.



The difficulty of UID pseudo-clone is low, and it needs to connect to product database, so it can not realize the encryption data of offline verification and single key once the key is stolen. If the key loss is serious and the key is easy to be duplicated by the enterprise to control the market, how to deal with the above problems? The following is the focus of today push-secure RFID tag chip!



On the left is the traditional RFID tag chip structure, including a UID security password user data, there are security vulnerabilities. On the right is the password security RFID tag chip structure diagram. The biggest difference is that each tag has a key. This key, is written by the user, that is, the brand manufacturer, each chip key is different, can not be read out. Through the authentication algorithm, the identity of the label is determined to ensure that the label can not be copied. The cryptographic security algorithm gives RFID a security lock. At the same time, the key of the security lock is controlled by the manufacturer. Even if the label chip supplier can not break and copy the label after issuing the key. Brand manufacturers fully grasp the initiative of traceability.

Application mode of filter element anti-counterfeiting

1.  reader is installed on the water purifier mainframe
2, and the electronic label is installed on the filter core
3. When the filter element is replaced, the host reader verifies the filter element
(1) the filter element is identified as true, The water purifier works normally and records the working time of the filter element. According to the application market, the user is reminded to replace the filter element
(2) and the filter element is identified as false in time. The water purifier alerts the user to replace the genuine filter element. To ensure the safety of drinking water and the working safety of water purifier as ordinary consumers, NFC mobile phone can be used to check the filter element online and effectively protect the rights and interests of ordinary consumers.

One product one core, one core one dense, completely eliminate fake and inferior products


1. Using the bidirectional authentication mechanism based on algorithm, one core and one density, never to be read out, ensure that the RFID tag can not be cloned
2, no need to connect to the background database, easy to achieve off-line anti-counterfeiting authentication, The key to the security and anti-counterfeiting scheme is in the hands of the user. Even the supplier of the scheme can not clone it, so as to reduce the risk of the user application.


Case 2 practical application of printer drum management

Consumer products as a huge market in life, its sales of vital anti-counterfeiting, distribution management or after-sales, etc., the use of RFID to these links, improve product safety and quality, but also save costs, And it helps solve two of the biggest problems in retail: goods running out and wear-outs-products lost by theft and disruptions in the supply chain. Hereundefineds an example of printer drum management:


1. Selenoid built-in RFID tag, by a special card issuer to write authorization information
2. Printer installed on a specific part of the RFID card reader, when replacing the drum, can only use the built-in RFID authorized label, otherwise the printer will not work properly.
3. RFID tag has unique UID and large capacity user data area, has independent management key, can trace the source of goods and find out the specific provider correctly, and can also seek after service quickly when the product breaks down.
4. Can prevent suppliers or distributors in different regions from each other. Can protect and maintain the good integrity of the product brand effect


 

Inquiry
+ 86 755 84649797
TOP