Atomization system having double authentication mechanism

ABSTRACT

An atomizing system and device having a double authentication mechanism are provided. The system includes at least one atomizing drug container, an atomizing device and a user device. The at least one atomized medicine container associates with an authentication code carrier and contains the atomized medicine. The atomizing device includes an atomizing module, a power module, a control unit, a first communication module. The second communication module of the user device is configured to be paired with the first communication module and connected with a cloud server through the network, and the authentication module of the user device is configured to perform an authentication operation associated with the authentication code carrier to determine the authenticity of the at least one atomized medicine container or the atomized medicine through the cloud server and generate an authentication result signal correspondingly.

CROSS-REFERENCE TO RELATED PATENT APPLICATION

This application claims the benefit of priority to Taiwan PatentApplication No. 107108104, filed on Mar. 9, 2018. The entire content ofthe above identified application is incorporated herein by reference.

FIELD OF THE DISCLOSURE

The present invention relates to an atomization system and device, andin particular to an atomization system having a single authenticationmechanism.

BACKGROUND OF THE DISCLOSURE

Medical nebulizers are mainly used for administration via therespiratory system. The nebulizer atomizes the liquid into fineparticles with a certain particle size, and the medicament can bedelivered from the patient's mouth and nose to enter the respiratorysystem of the patient through breathing and achieve the therapeuticpurpose through the circulatory system.

However, due to the expensive prices of commercially availablemedicines, some unscrupulous businessmen are often attracted tocounterfeit medicines. Due to the fact that product fraud is easy andillegal income is high, the forgery of these medicines has never stoppedin the domestic and foreign markets.

For example, the main anti-counterfeiting methods for domestic andforeign pharmaceutical companies are to apply anti-counterfeit measuresupon the label or the outside of packaging of pharmaceuticals in orderto increase the difficulty of counterfeiting, and to try and preventcounterfeit medicine by increasing counterfeit costs, the measuresincluding one-dimensional/two-dimensional barcode labels, laser tags,anti-counterfeit bottle caps, and anti-counterfeit ink printings.However, due to the easiness in forgery of these anti-counterfeitingmeasures, counterfeiters can quickly develop or procure workaroundstherefor, so that counterfeit of such medicines cannot be completelyeradicated.

Moreover, counterfeit medicines may also cause physical harm toconsumers, resulting in loss of lives and properties. Therefore, thereis a need for an atomization system and devices that can improve theexisting anti-counterfeiting mechanisms and ensure that consumers do notuse counterfeit medicines.

SUMMARY OF THE DISCLOSURE

The present disclosure is to provide an atomization system and devicehaving a single authentication mechanism that can improve on the issuesassociated with the related art.

In order to solve the above technical problems, one technical solutionadopted by the present disclosure is to provide an atomization systemhaving a double authentication mechanism, which includes at least oneatomized medicine container, a atomization device and a user device. Theat least one atomized medicine container is associated with anauthentication code carrier, and contains an atomized medicine. Theatomization device includes an atomization module, a power module, acontrol unit, and a first communication module. The atomizing module hasan accommodating portion and an atomization element. The accommodatingportion is used for accommodating atomized medicine, and the atomizationelement is used for atomizing the atomized medicine when the atomizedmedicine is placed in the accommodating portion. The power moduleoutputs the driving voltage to directly drive the atomization module.The control unit is connected to the power module, and the control unitis used to control the power module to output the driving voltage. Thefirst communication module is connected to the control unit fortransmitting and receiving signals. The user device includes aprocessor, a second communication module, and an authentication module.The second communication module is connected to the processor,configured to pair with the first communication module, and connected tothe cloud server through the network. The authentication module isconnected to the processor and configured to perform an authenticationoperation related to the authentication code carrier to determine theauthenticity of at least one atomized medicine container or atomizedmedicine through the cloud server, and to generate an authenticationresult signal correspondingly. The authentication module is configuredto determine whether to control the second communication module throughthe processor to transmit an authentication success signal to the firstcommunication module according to the authentication result signal. Whenthe first communication module receives the authentication successsignal, the control unit is configured to control the power module tooutput the driving voltage according to the authentication successsignal.

In order to solve the above technical problems, another one technicalsolution adopted by the present disclosure is to provide an atomizationsystem having a double authentication mechanism, which includes at leastone atomized medicine container, an atomization device and a userdevice. The at least one atomized medicine container is associated withan authentication code carrier, and contains an atomized medicine. Theatomization device includes an atomization module, a power module, acontrol unit, and an antenna module. The atomizing module has anaccommodating portion and an atomization element. The accommodatingportion is used for accommodating atomized medicine, and the atomizationelement is used for atomizing the atomized medicine when the atomizedmedicine is placed in the accommodating portion. The power moduleoutputs the driving voltage to directly drive the atomization module.The control unit is connected to the power module, and the control unitis used to control the power module to output the driving voltage. Theantenna module is used for transmitting and receiving signals. The firstauthentication module respectively is connected to the control unit andthe antenna module. The user device includes a processor, acommunication module, and a second authentication module. Thecommunication module is connected to the processor, and is connected toa cloud server through a network. The second authentication module isconnected to the processor and configured to perform a firstauthentication operation related to the authentication code carrier todetermine the authenticity of the at least one atomized medicinecontainer or the atomized medicine through the cloud server, and togenerate the authentication result signal correspondingly. The secondauthentication module is configured to determine whether to generate awireless identification signal according to the authentication resultsignal. When the antenna module receives the wireless identificationsignal, the first authentication module is configured to perform asecond authentication operation related to the wireless identificationsignal, and to further determine whether to enable the control unit tocontrol the power module to output the driving voltage.

One of the advantages of the present disclosure is that the atomizationsystem and device having a double authentication mechanism provided bythe present disclosure may improve the anti-fake effect using theanti-counterfeit identification code and product history data throughthe technical solutions of “wireless identifier” and “wirelessidentification chip”.

Yet another one of the advantages of the present disclosure is that theatomization system having the double authentication mechanism providedby the present disclosure may improve the convenience of authenticationby obtaining the “authentication information” through the“authentication code input interface” and the “image capturing module”.

Yet another one of the advantages of the present disclosure is that theatomization system having a double authentication mechanism provided bythe present disclosure may improve the anti-fake effect using theanti-counterfeit identification code and product history data throughthe technical features of paring the “atomization device” and the “userdevice”, configuring the user device to perform an authenticationoperation associated with the authentication code carrier, anddetermining the authenticity of the atomized medicine or the atomizedmedicine container through the cloud server.

Yet another one of the advantages of the present disclosure is that theatomization system having a double authentication mechanism provided bythe present disclosure may ensure that the atomized medicine containerspurchased by users have not been used and faked through the technicalfeatures of “cloud server performs the comparison operation in thepassword database” and instantly updating the password database by thesupplier.

Yet another one of the advantages of the present disclosure is that theatomization system having a double authentication mechanism provided bythe present disclosure may greatly increase the difficulty ofcounterfeiting the authentication code carrier through the technicalfeatures of the “double authentication mechanism provided by the userdevice” and the “independent authentication mechanism provided by theatomization device”, so as to ensure the security of data transmission,such that the counterfeit goods are not able to be used by theatomization device even if they are sold in the market, and thusprotecting the lives and property of consumers.

For a better understanding of the features and technical content of thepresent invention, reference should be made to the following detaileddescription and drawings of the present invention, however, the drawingsare provided for the purpose of providing references and illustrationsonly, and are not intended to limit the present invention.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an atomization system with a singleauthentication mechanism according to a first embodiment of the presentinvention.

FIG. 2A is a block diagram of the authentication module, the antennamodule, and the authentication code carrier according to the firstembodiment of the present invention.

FIG. 2B is a functional diagram of the atomization system with thesingle authentication mechanism according to the first embodiment of thepresent invention.

FIG. 2C is another functional diagram of the atomization system with thesingle authentication mechanism according to the first embodiment of thepresent invention.

FIG. 2D is a block diagram of the value storing device and theauthentication code carrier according to a first embodiment of thepresent invention.

FIG. 3 is a block diagram of an atomization system with a singleauthentication mechanism according to a second embodiment of the presentinvention.

FIG. 4 is a block diagram of a second power module, an authenticationmodule, an antenna module, and an authentication code carrier accordingto a second embodiment of the present invention.

FIG. 5 is a functional diagram of an atomization system with a singleauthentication mechanism according to a second embodiment of the presentinvention.

FIG. 6 is a block diagram of an atomization system with a singleauthentication mechanism according to a third embodiment of the presentinvention.

FIG. 7 is a perspective view of an atomization system with a singleauthentication mechanism according to a third embodiment of the presentinvention.

FIG. 8 is a block diagram of an atomization system with a singleauthentication mechanism according to a fourth embodiment of the presentinvention.

FIG. 9 is a perspective view of an atomization system with a singleauthentication mechanism according to a fourth embodiment of the presentinvention.

FIG. 10 is a block diagram of an atomization system having a doubleauthentication mechanism according to a fifth embodiment of the presentinvention.

FIG. 11A is a block diagram of a user device, a cloud server, and anauthentication code carrier according to a fifth embodiment of thepresent invention.

FIG. 11B is a block diagram of a user device, a cloud server, anauthentication code carrier, and a value storing device according to afifth embodiment of the present invention.

FIG. 12 is a block diagram of an atomization system having a doubleauthentication mechanism according to a sixth embodiment of the presentinvention.

FIG. 13 is a block diagram of an atomization system having a doubleauthentication mechanism according to a seventh embodiment of thepresent invention.

FIG. 14 is a block diagram of an atomization system having a doubleauthentication mechanism according to an eighth embodiment of thepresent invention.

FIG. 15 is a block diagram of a first authentication module, an antennamodule, a user device, a cloud server, and an authentication codecarrier according to an eighth embodiment of the present invention.

FIG. 16 is a block diagram of an atomization system having a doubleauthentication mechanism according to a ninth embodiment of the presentinvention.

FIG. 17 is a perspective view of an atomization system having a doubleauthentication mechanism according to a ninth embodiment of the presentinvention.

FIG. 18 is a block diagram of an atomization system having a doubleauthentication mechanism according to a tenth embodiment of the presentinvention.

FIG. 19 is a flowchart of an atomization method having an authenticationmechanism according to an eleventh embodiment of the present invention.

FIG. 20A is a flowchart of an atomization method having anauthentication mechanism according to a twelfth embodiment of thepresent invention.

FIG. 20B is another flowchart of the atomization method having theauthentication mechanism according to the twelfth embodiment of thepresent invention.

FIG. 21 is a flowchart of an atomization method with an authenticationmechanism according to a thirteenth embodiment of the present invention.

FIG. 22 is a flowchart of an atomization method with an authenticationmechanism according to a fourteenth embodiment of the present invention.

FIG. 23 is a flowchart of an atomization method having an authenticationmechanism according to a fifteenth embodiment of the present invention.

FIG. 24A is a flowchart of an atomization method having anauthentication mechanism according to the sixteenth embodiment of thepresent invention.

FIG. 24B is another flowchart of the atomization method having theauthentication mechanism according to the sixteenth embodiment of thepresent invention.

FIG. 25 is a flowchart of an authentication operation of a seventeenthembodiment of the present invention.

FIG. 26 is a flowchart of an authentication operation of the eighteenthembodiment of the present invention.

FIG. 27 is a flowchart of an authentication operation of the nineteenthembodiment of the present invention.

FIG. 28 is a flowchart of an authentication operation of the twentiethembodiment of the present invention.

FIG. 29 is a flowchart of an atomization method having an authenticationmechanism according to a twenty-first embodiment of the presentinvention.

FIG. 30 is a flowchart of an authentication operation according to thetwenty-second embodiment of the present invention.

FIG. 31 is a flowchart of an authentication operation according to thetwenty-third embodiment of the present invention.

DETAILED DESCRIPTION OF THE EXEMPLARY EMBODIMENTS

The following is embodiments of the present invention disclosed inrelation to the “atomization system and method” through specificembodiments. Those skilled in the art can understand the advantages andeffects of the present invention according to the contents disclosed inthe present specification. The present invention may be implemented orapplied through other different specific embodiments. The details inthis specification may also be based on different viewpoints andapplications, and various modifications and changes may be made withoutdeparting from the concept of the present invention. In addition, thedrawings of the present invention are merely schematic illustrations andare not depicted by actual dimensions. The following embodiments willfurther describe related technical contents of the present invention indetail, but the disclosed contents are not intended to limit the scopeof the present invention.

It will be understood that although the terms first, second, third, etc.may be used herein to describe various elements or signals, however,these elements or signals should not be limited by these terms. Theseterms are mainly used to distinguish one element from another element,or one signal from another signal. In addition, the term “or” as usedherein, as appropriate, may include combinations of any one or more ofthe associated listed items.

To clarify, in some cases, the techniques of the present invention maybe presented as including separate functional blocks that includefunctional blocks, including devices, device elements, steps or routesin a method implemented in software, or a combination of hardware andsoftware.

In some embodiments, computer-readable storage devices, media, andmemory may include cables or wireless signals containing bitstreams,etc. However, when mentioned, non-transitory computer-readable storagemedia explicitly excludes media such as energy, carrier signals,electromagnetic waves, and signals themselves.

The method according to the above-described embodiments may beimplemented by using computer-executed instructions stored in orotherwise accessible from a computer-readable medium. Such instructionsmay include, for example, instructions and data that cause or otherwiseconfigure a general purpose computer, a special purpose computer, or aspecial purpose processing device to perform a certain function or setof functions. Parts of the computer resources used can be accessed viathe Internet. The computer executable instructions may be, for example,binary, intermediate format instructions such as assembly language,firmware, or source code. Examples of computer-readable media that maybe used to store instructions, information used, and/or informationcreated during a method in accordance with the described embodimentsinclude a magnetic or optical disk, flash memory, non-volatile memoryUSB memory devices, networked storage devices, and more.

Devices for implementing the methods provided by the present disclosuremay include hardware, firmware, and/or software, and may take any of avariety of configurations. Typical examples of such configurationsinclude laptops, smart phones, small personal computers, personaldigital assistants, and the like. The functions described herein mayalso be implemented in peripheral devices or built-in cards. By way offurther example, such functions may also be implemented on circuitboards executing different processes on different chips or on a singledevice.

The instructions, media for communicating such instructions, computingresources for performing the same or other structures for supportingsuch computing resources are used for providing means of thefunctionality described in this disclosure.

First Embodiment

Reference is now made to FIG. 1, which is a block diagram of anatomization system with a single authentication mechanism according to afirst embodiment of the present invention. As shown, the atomizationsystem 1 includes an atomized medicine container 10 and an atomizingdevice 12. The atomization medicine container 10 has an authenticationcode carrier 100, and the atomization medicine container 10 accommodatesthe atomized medicine 102. In general, the atomized medicine container10 may be a bottle container with a bottle rim, and the authenticationcode carrier 100 may be an electronic tag provided on the bottle cap tobe used separately from the bottle container, but the present inventionis not limited thereto, and the authentication code carrier 100 may alsobe an electronic tag detachably disposed outside the bottle container.

Referring to FIG. 1, the atomization device 12 includes an atomizationmodule 120, a first power module 122, a control unit 124, an antennamodule 126, and an authentication module 128. The atomization module 120has an accommodating portion 130 and an atomization element 132. Theaccommodating portion 130 can be used for being loaded with theaforesaid atomized medicine 102, and the atomization element 132 is usedfor atomizing the atomizing drug 102 when it is placed in theaccommodating portion 130. In addition, the control unit 124 iselectrically connected to the first power module 122, and the firstpower module 122 is electrically connected to the atomization module120.

In practice, the control unit 124 controls the first power module 122 tooutput the first driving voltage V11. The first driving voltage V11output by the first power module 122 is mainly used to directly drivethe atomization module 120. In detail, the control unit 124 may be, forexample, a control chip, a micro control chip, or a PWM control chip.The present embodiment does not limit the aspect of the control unit124. The control unit 124 has a plurality of built-in ports that canoutput pulse modulation signals, and can provide control signals withdifferent frequencies and duty cycles. The frequency adjustment rangemay be, for example, 10 Hz˜1 MHz, and the duty cycle adjustment rangemay be, for example 10% to 90%. In practice, the control unit 124 mayoutput one or more control signals. The control signal is used tocontrol the operation of the first power module 122.

The first power module 122 may be, for example, a driving circuitincluding one or more switches, one or more inductors, one or morecapacitors and diodes. The present embodiment does not limit the aspectof the first power module 122. The first power module 122 is configuredto receive the control signal output by the control unit 124. Inpractice, the first power module 122 provides the atomization module 120with the first driving voltage V11 that oscillates at the outputfrequency according to the control signal. The first driving voltage V11may be, for example, a pulsing DC voltage. The waveform of the firstdriving voltage V11 may be, for example, a sine wave, a triangular wave,or a square wave.

In the present invention, in order to achieve wireless authentication,the atomization device 12 is further equipped with an antenna module 126for transmitting and receiving signals. At the same time, theatomization device 12 also has an authentication module 128 connected tothe control unit 124 and the antenna module 126, respectively, theauthentication module 128 is configured to perform an authenticationoperation related to the authentication code carrier 100 to determine anauthenticity of the atomized medicine container 10 or the atomizedmedicine 102, and the authentication result signal S11 is generatedcorrespondingly. In this case, the control unit 124 is configured tocontrol the first power module 122 to output the first driving voltageV11 according to the authentication result signal S11.

Specifically, the authentication operation between the authenticationmodule 128 and the authentication code carrier 100 may utilize the radiofrequency identification (RFID), which is a non-contact, automaticidentification technology of the radio frequency identification system,and is mainly composed of radio frequency tag (RFID tag), reader orbarcode reader and related application system.

The tag structure of the RFID is formed by adding the coil on thehousing with a chip, and the RFID tag receives or transmits theinformation of the chip by receiving the energy of the reader throughthe metal wire of the coil, or through the power of the coil, so as toachieve the communication between the wireless RFID tag and the reader.

Radio frequency identification tags may also be substantially classifiedas an active type and a passive type. The active type of the RFID tagsmay be powered by an external power supply device (e.g., battery), andthe passive type of the wireless RFID tags may be directly powered bythe radio wave transmitted by an external reading/writing device.

Please further refer to FIG. 2A to FIG. 2D. FIG. 2A is a block diagramof the authentication module, the antenna module, and the authenticationcode carrier according to the first embodiment of the present invention,FIG. 2B is a functional diagram of the atomization system with thesingle authentication mechanism according to the first embodiment of thepresent invention, and FIG. 2C is another functional diagram of theatomization system with the single authentication mechanism according tothe first embodiment of the present invention. As shown in the figures,the authentication module 128 includes a wireless identifier 1280, anauthentication unit 1282, and a memory 1284, the authentication codecarrier 100 includes a wireless identification chip 1000 and an antenna1002 connected thereto. In this example, the authentication operationbetween the authentication module 128 and the authentication codecarrier 100 is mainly based on the passive RFID technology, which isdirectly powered by the wireless identifier 1280 through the radio wavestransmitted by the antenna module 126 to the radio frequencyidentification tag, that is, the wireless identification chip 1000itself, and the wireless identification chip 1000 further hasauthentication information 1004 written in advance. Here, theauthentication information 1004 may be an anti-counterfeitingidentification code having a specific coding sequence and producthistory data. In practice, the wireless identifier 1280 may be utilizedto read the authentication information 1004 previously written in thewireless identification chip 1000 so as to effect anti-fake improvementsusing the anti-counterfeit identification code and product history data.

In addition, the authentication unit 1282 may further process the readanti-counterfeit identification code with a specific coding sequence,and perform a specific authentication algorithm stored in the memory1284 to perform decryption to confirm the authenticity of theauthentication code carrier 100 having the authentication information1004. Another example of the processing operation performed by theauthentication unit 1282 may compare a part or all of the authenticationinformation 1004 with the data stored in the memory 1284 to confirmauthenticity of the authentication code carrier 100. If theauthenticating unit 1282 determines that the authenticating code carrier100 is true, it can be known that the corresponding atomized medicinecontainer 10 is not forged, such that the user can use it withconfidence.

After the above authentication operation, the authentication module 128may be configured to generate the authentication result signal S11correspondingly, and the control unit 124 may be further configured todetermine whether to control the first power module 122 to output thefirst driving voltage V11 according to the authentication result signalS11. Specifically, if the authentication unit 1282 determines that theauthentication code carrier 100 is true, the correspondingauthentication result signal S11 can enable the control unit 124 tocontrol the first power module 122 to output the first driving voltageV11 to drive the atomization element 132 of the atomization module 120,and to further atomize the atomized medicine 102. On the other hand, ifthe authentication unit 1282 determines that the authentication codecarrier 100 is fake, or the authentication unit 1282 cannot recognizethe authentication information 1004, then the corresponding outputauthentication result signal S11 may disable the control unit 124.

For practical applications, referring to FIG. 2B, the authenticationcode carrier 100 can be placed inside the atomization device 12 toperform authentication through the antenna module 126. On the otherhand, referring to FIG. 2C, the authentication code carrier 100 may alsobe authenticated by the antenna module 126 outside the atomizationdevice 12, and is not limited to these two configurations. Those skilledin the arts may make various possible modifications to the housing ofthe atomization device 12 without departing from the scope of thepresent invention, and the wireless sensing mechanism also increases theflexibility of the application.

Furthermore, the number of the atomized medicine container 10 may beplural in the present embodiment, and the plurality of atomized medicinecontainers 10 are associated with the authentication code carrier 100 ina many-to-one manner. Specifically, the authentication code carrier 100may be attached in the form of a card to a box containing a plurality ofatomized medicine containers 10, and the authentication code carrier 100further includes usage limit information 1005.

Therefore, in the foregoing authentication operation, the authenticationunit 1282 of the authentication module 128 may be further configured todetermine whether the usage limit information 1005 reaches apredetermined limit amount. For example, if the authentication unit 1282determines that the authentication code carrier 100 is true, theauthentication unit 1282 may further obtain the usage limit information1005, which defines the usage limit of the authentication code carrier100, and the usage number corresponds to the number of atomized medicinecontainers 10 and decreases as the number of usage increases. In thisembodiment, the predetermined limit amount may be defined as 0, that is,the authentication unit 1282 of the authentication module 128 determineswhether the usage limit information 1005 has reached 0, and if yes, itrepresents that the user has exceeded the limit for times of usage, andthus the corresponding authentication result signal S11 is generated todisable the control unit 124.

In other words, if the authentication unit 1282 of the authenticationmodule 128 determines that the usage limit information 1005 has notreached 0, the authentication module 128 is then configured to updatethe usage limit information 1005, for example, to reduce the number ofuses of the authentication code carrier 100 by one, and theauthentication result signal S11 is generated to enable the control unit124 correspondingly.

Referring to FIG. 2D, FIG. 2D is a block diagram of the value storingdevice and the authentication code carrier according to a firstembodiment of the present invention. As shown, the atomization system 1having the single authentication mechanism further includes a valuestoring device 15. The value storing device 15 includes a wireless valuestoring module 151, a value storing processor 152, a database 154, and avalue storing interface 156.

In detail, the user may obtain the authentication code carrier 100corresponding to one or more atomized medicine containers 10 when theatomized medicine is purchased. The usage limit information 1005 of theauthentication code carrier 100 may be preset to 0, and when the usercompletes the purchase at the pharmacy counter, staffs of the pharmacymay operate the value storing interface 156 to update the usage limitinformation 1005 by the wireless module 151, for example, configuringthe value storing processor 152 to query or update the database 154according to the purchased barcode, and to update the usage limitinformation 1005 preset to 0 to the purchased quantity of theatomization medicine containers 10.

It is worth mentioning that the authentication code carrier 100 can bedisposable or reused, and after the usage limit information 1005 reaches0, the user may directly use the same authentication code carrier 100while purchasing a new medicine container 10 and updating the usagelimit information 1005.

With the above configuration, when the user purchases a specific numberof atomized medicine containers, it can ensure that the usage limitinformation corresponds to the number of atomized medicine containers,and the reliability of the authentication may be further increased.

Second Embodiment

Reference is now made to FIG. 3, which is a block diagram of anatomization system with a single authentication mechanism according to asecond embodiment of the present invention. In this embodiment, thereference numerals similar to the first embodiment designate similarelements and will not be further described. As shown in the figure, thesecond embodiment is different from the first embodiment in that theatomization system 1 further includes a second power module 134electrically connected to the control unit 124 for outputting a seconddriving voltage V12. The control unit 124 may output one or more controlsignals for controlling the operation of the second power module 134.

In addition, the atomization device 12 further includes a power supplyportion VOUT connected to the second power module 134, and theauthentication code carrier 100 further includes a power receivingportion VIN connected to the wireless identification chip 1000. Thesecond power module 134 is configured to output the second drivingvoltage V12 to enable the wireless identification chip 1000 when thepower supply portion VOUT is electrically connected to the powerreceiving portion VIN.

Specifically, the present embodiment mainly utilizes an active type ofwireless identification technology. In addition to the active type ofradio frequency identification technology mentioned above, the ISM(Industrial Scientific Medical) band radio frequency identificationtechnology such as Bluetooth wireless identification technology may beemployed, and the radio frequency identification may be performed in the2.4 GHz Industrial Scientific Medical band (ISM Band). What the twoconfigurations have in common is that both of them need to power thewireless identification chip to transmit the corresponding wirelesssignal through the antenna, and therefore are applicable to the presentinvention.

Reference is now made to FIG. 4, which is a block diagram of a secondpower module, an authentication module, an antenna module, and anauthentication code carrier according to a second embodiment of thepresent invention.

As shown in the figures, the authentication module 128 includes awireless identifier 1280, an authentication unit 1282, and a memory1284, the authentication code carrier 100 includes a wirelessidentification chip 1000, an antenna 1002 connected to the wirelessidentification chip 1000 and a power supply unit 1006. In this example,the authentication operation between the authentication module 128 andthe authentication code carrier 100 is mainly based on the active typeof the wireless identification technology, and it may use the activetype of the wireless RFID technology or the ISM (Industrial ScientificMedical) band radio frequency identification technology such asBluetooth wireless identification technology, and the radio frequencyidentification may be performed in the 2.4 GHz Industrial ScientificMedical band (ISM Band). The power supply unit 1006 has a powerreceiving terminal VIN, which receives a second driving voltage V12supplied from the power supply terminal VOUT of the second power module134. The power supply unit 1006 has a plurality of wires, resistors, orcapacitors to assign the power to the antenna 1002 and the wirelessidentification chip 1000 in an appropriate manner.

The wireless identification chip 1000 has authentication information1004 written in advance. Here, the authentication information 1004 maybe an anti-counterfeiting identification code having a specific codingsequence and product history data. In practice, the authenticationinformation 1004 previously written in the wireless identification chip1000 may be transmitted to the wireless identifier 1280 by the wirelessidentification chip 1000 with the wireless radio frequency signals orBluetooth identification signals, so as to effect anti-fake improvementsusing the anti-counterfeit identification code and product history data.

Functions of the authentication module 128 and authentication unit 1282may be implemented by using one or more processors. The processor may bea programmable unit, such as a microprocessor, microcontroller, digitalsignal processor (DSP) chip, a field programmable gate array(field-programmable gate array; FPGA) and the like. Functions of theprocessor may also be implemented by one or several electronic devicesor ICs. In other words, the functions performed by the processor may beimplemented in a hardware domain or a software domain or a combinationof the hardware domain and the software domain.

In addition, the authentication unit 1282 may further process thereceived anti-counterfeit identification code with a specific codingsequence, and perform a specific authentication algorithm stored in thememory 1284 for decryption, so as to confirm the authenticity of theauthentication code carrier 100 having the authentication information1004. Another example of the processing operation performed by theauthentication unit 1282 may compare a part or all of the authenticationinformation 1004 with the data stored in the memory 1284 to confirmauthenticity of the authentication code carrier 100. If theauthenticating unit 1282 determines that the authenticating code carrier100 is true, it can be known that the corresponding atomized medicinecontainer 10 is not forged, such that the user can use it withconfidence.

After the above authentication operation, the authentication module 128may be configured to generate the authentication result signal S11correspondingly, and the control unit 124 may be further configured todetermine whether to control the first power module 122 to output thefirst driving voltage V11 according to the authentication result signalS11. Specifically, if the authentication unit 1282 determines that theauthentication code carrier 100 is true, the correspondingauthentication result signal S11 can enable the control unit 124 tocontrol the first power module 122 to output the first driving voltageV11 to drive the atomization element 132 of the atomization module 120,and to further atomize the atomized medicine 102. On the other hand, ifthe authentication unit 1282 determines that the authentication codecarrier 100 is fake, or the authentication unit 1282 cannot recognizethe authentication information 1004, then the correspondingly outputauthentication result signal S11 may disable the control unit 124.

Combining the second power module 134 provided in the present embodimentwith the authentication code carrier 100 having the specificauthentication information 1004, the atomized medicine container 10 maybe prevented from being forged, and the security and anti-counterfeitingcapabilities thereof can be further improved.

Reference is now made to FIG. 5, which is a functional diagram of anatomization system with a single authentication mechanism according to asecond embodiment of the present invention. As shown, the receivingportion VIN of the authentication code carrier 100 may be a connectorwith a specific standard, and the atomization device 12 may be furtherprovided with an authentication code carrier accommodating portion 150at the position where the power supply portion VOUT is disposed. Afterthe power receiving terminal VIN is connected to the power supplyterminal VOUT, appropriate supporting forces may be provided tostabilize the authentication code carrier 100, and the authenticationcode carrier accommodating portion 150 may also be disposed at theoutside of the atomization device 12 corresponding to the antenna module126, which not only provides convenience for the user, but also ensuresthat the wireless identifier 1280 may be successfully sensed with thewireless identification chip 1000.

Third Embodiment

Reference is now made to FIGS. 6 and 7, which are a block diagram and aperspective view of an atomization system with a single authenticationmechanism according to a third embodiment of the present invention,respectively. As shown in the figures, in the atomization system 1 witha single authentication mechanism in the present embodiment, theatomization device 12 further includes an authentication code inputinterface 136 connected with the authentication module 128, which isconfigured for the user to input the authentication information 1004 ofthe authentication code carrier 100.

Specifically, the atomization device 12 is generally configured with auser interface 14, and the user interface 14 may include theauthentication code input interface 136 mentioned above and the displayscreen 140. The authentication code input interface 136 may utilizephysical keys or virtual keys displayed on the display screen 140, andthe present embodiment does not limit the implementation manners of theinterfaces. For example, the atomization device 12 may be configuredwith a power key B1 to control the atomization device 12 to be turned onor off. The authentication code input interface 136 may include numerickeys labeled with numbers 1-9, cancel, back, confirm or cross key. Theuser can select the authentication code to be input through the crosskey and confirm the input via the confirmation key.

More specifically, the authentication code carrier 100 may be directlyprinted with the authentication information 1004, for example, anauthentication code having a specific sequence code, and may be printedat a position where the authentication code carrier 100 is disposed, forexample, inside or outside of the bottle cap or the bottle body of theatomized medicine container 10. The user can directly input theauthentication code through the authentication code input interface 136,which can be correspondingly displayed on the display screen 140 for theuser to confirm.

After the user inputs the authentication information 1004, theauthentication module 128 may be further configured to determine theauthenticity of the atomized medicine container 10 or the atomizationmedicine 102 according to the authentication information 1004, and togenerate an authentication result signal S11 correspondingly. Inaddition, the authentication unit 1282 may further process theanti-counterfeit identification code with a specific coding sequenceinput by the user, and perform a specific authentication algorithmstored in the memory 1284 to perform decryption to confirm theauthenticity of the authentication code carrier 100 having theauthentication information 1004. Another example of the processingoperation performed by the authentication unit 1282 may compare a partor all of the authentication information 1004 with the data stored inthe memory 1284 to confirm authenticity of the authentication codecarrier 100. If the authenticating unit 1282 determines that theauthenticating code carrier 100 is true, it can be known that thecorresponding atomized medicine container 10 is not forged, such thatthe user can use it with confidence.

After the above authentication operation, the authentication module 128may be configured to generate the authentication result signal S11correspondingly, and the control unit 124 may be further configured todetermine whether to control the first power module 122 to output thefirst driving voltage V11 according to the authentication result signalS11. Specifically, if the authentication unit 1282 determines that theauthentication code carrier 100 is true, the correspondingauthentication result signal S11 can enable the control unit 124 tocontrol the first power module 122 to output the first driving voltageV11 to drive the atomization element 132 of the atomization module 120,and to further atomize the atomized medicine 102. On the other hand, ifthe authentication unit 1282 determines that the authentication codecarrier 100 is fake, or the authentication unit 1282 cannot recognizethe authentication information 1004, then the correspondingly outputauthentication result signal S11 may disable the control unit 124.

Fourth Embodiment

Reference is now made to FIGS. 8 and 9, which are a block diagram and aperspective view of an atomization system with a single authenticationmechanism according to a fourth embodiment of the present invention,respectively. As shown in the figures, the atomization device 12 furtherincludes a structural lock module 16 connected with the authenticationmodule 128, and the authentication code carrier 100 further includes astructural key 18. The structural lock module 16 includes a structurallock 160 and an electronic switch 162. When the structural lock 160 ofthe structural lock module 16 is successfully unlocked by the structuralkey 18, the electronic switch 162 of the structural lock module 16 isconfigured to transmit the enabling signal S12 to enable theauthentication module 128 to perform the authentication operation.

On the other hand, the structural lock module 16 may also be a digitalor optical authentication lock that includes a digital or analogmechanism. The structural key 18 has an unlocking sensing element, andthe structural lock module 16 includes a key sensing mechanism, ajudging mechanism, and a lock body actuation mechanism, the key sensingmechanism contacts and senses the unlocking sensing element by insertingthe unlocking sensing element of the structural key 18 into the keysensing mechanism, and when the judging mechanism judges that unlockingthe sensing element meets the preset unlocking condition, the lock bodyis actuated by the lock body actuation mechanism to be switched to theunlocked state.

As shown in FIG. 9, the present embodiment has a double safety mechanismin practice. First, when the user obtains the atomized medicinecontainer 10, a structural key 18 having a specific structure can beobtained, which can be disposed inside the bottle cap serving as theauthentication code carrier 100, the structural key 18 and thestructural lock 160 on the atomization device 12 provided by themanufacturer may be consistent in terms of commercial nature to providethe first level of security.

Secondly, after the user successfully unlocks the structural lock 160with the structural key 18, the electronic switch 162 will transmit astart up signal S12 to enable the authentication module 128. Preferably,the authentication code carrier 100 may have an authentication chip 1000provided for the wireless identification module 128 to perform theidentification, the authentication module 128 may further obtain theauthentication information 1004 through the antenna module 126, andperform the authentication operation according to the third embodiment.For example, comparing the authentication information 1004 with the datastored in the memory 1284, or the obtained authentication information1004 is an anti-counterfeiting identification code having a specificcoding sequence, and a specific algorithm stored in the memory 1284 maybe further executed for decryption to determine the authenticity of theatomized medicine container 10 or the atomized medicine 102. In thisway, a second level of security can be provided.

Therefore, this embodiment can provide double guarantees of thestructural key and the wireless identification, which not only ensuressafety, but also increases the difficulty of forging atomized medicinecontainers.

Fifth Embodiment

Reference is now made to FIG. 10, which is a block diagram of anatomization system having a double authentication mechanism according toa fifth embodiment of the present invention. As shown, the atomizationsystem 2 includes an atomized medicine container 20, an atomizationdevice 22, a user device 26, and a cloud server 29. The atomizedmedicine container 20 has an authentication code carrier 200, and theatomized medicine container 20 accommodates the atomized medicine 202.Similarly, the atomized medicine container 20 may be a bottle containerwith a bottle rim, and the authentication code carrier 200 may be anelectronic tag provided on the bottle cap to be used separately from thebottle container, but the present invention is not limited thereto, andthe authentication code carrier 200 may also be an electronic tagdetachably disposed outside the bottle container.

Referring to FIG. 10, the atomization device 22 includes an atomizationmodule 220, a power module 222, a control unit 224, and a firstcommunication module 227. The atomization module 220 has anaccommodating portion 230 and an atomization element 232. Theaccommodating portion 230 can be used for loading the aforesaid atomizedmedicine 202, and the atomization element 232 is used for atomizing theatomized medicine 202 when it is placed in the accommodating portion130. In addition, the control unit 224 is electrically connected to thepower module 222, and the power module 222 is electrically connected tothe atomization module 220.

In practice, the control unit 224 controls the power module 222 tooutput the first driving voltage V21. The first driving voltage V21output by the power module 222 is mainly used to directly drive theatomization module 220. In detail, the control unit 224 may be, forexample, a control chip, a micro control chip, or a PWM control chip.The present embodiment does not limit the aspect of the control unit224. The control unit 224 has a plurality of built-in ports that canoutput pulse modulation signals, and can provide control signals withdifferent frequencies and duty cycles. The frequency adjustment rangemay be, for example, 10 Hz˜1 MHz, and the duty cycle adjustment rangemay be, for example 10% to 90%. In practice, the control unit 224 mayoutput one or more control signals. The control signal is used tocontrol the operation of the power module 222.

The power module 222 may be, for example, a driving circuit includingone or more switches, one or more inductors, one or more capacitors anddiodes. The present embodiment does not limit the aspect of the powermodule 222. The power module 222 is configured to receive the controlsignal output by the control unit 224. In practice, the power module 222provides the atomization module 120 with the first driving voltage V21that oscillates at the output frequency according to the control signal.The first driving voltage V21 may be, for example, a pulsing DC voltage.The waveform of the first driving voltage V21 may be, for example, asine wave, a triangular wave, or a square wave.

In this embodiment, the authentication operation is mainly performed onthe user device 26 and the cloud server 29, and the atomization device22 may not need to be provided with an authentication module and itsrelated device or system, which can save the manufacturing costs. Theuser device 26 includes a processor 260, a second communication module262, and an authentication module 228. In the present invention,examples are not limited by the prerequisites of an embodiment, andfurther examples of various embodiments in a wide variety of operatingenvironments can include any number of applications that can be used tooperate one or more server computers, user computers or computingdevices. The user device 26 may include any number of general-purposepersonal computers running standard operating systems, such as laptop ornotebook, and mobile phones, wireless phones and hand-held devices thatexecute mobile software and are capable of supporting a large number ofInternet and messaging communication protocols. Such a system may alsoinclude a number of workstations, running any of a variety ofcommercially available operating systems for development and databasemanagement purposes, and other known applications. These devices mayalso include other electronic devices capable of communicating throughthe network, such as virtual terminals, host-clients, gaming systems,and other devices.

Functions of the processor 260 included in the user device 26 may beimplemented by using one or more processors. The processor may be aprogrammable unit, such as a microprocessor, microcontroller, digitalsignal processor (DSP) chip, a field programmable gate array(field-programmable gate array; FPGA) and the like. Functions of theprocessor may also be implemented by one or several electronic devicesor ICs. In other words, the functions performed by the processor 260 maybe implemented in a hardware domain or a software domain or acombination of the hardware domain and the software domain.

The user device 26 further has a second communication module 262, whichis connected to the processor 260, configured to pair with the firstcommunication module 227, and connected to the cloud server 29 throughthe network 28. The pairing of the first communication module 227 andthe second communication module 262 can be transmitted through thenear-end network, such as WIFI, Bluetooth, etc. More specifically, theuser device 26 can obtain administrator rights of the atomization device22 through the pairing operation, such that wireless controls andauthentication mechanisms may be achieved.

In addition, in the example using the cloud server 29, the cloud server29 can operate any of various servers or mid-tier applications includingHTTP servers, FTP servers, CGI servers, data servers, Java servers andbusiness application servers. The cloud server 29 may also executeprograms or scripts to respond to requests from the user devices. Forexample, by executing one or more web applications, it can beimplemented as one or more scripts written in any programming language,such as Java, C, C#, or C++ or any scripting language such as Perl,Python, or TCL and combinations thereof. The cloud server 29 may alsoinclude database servers, including but not limited to thosecommercially available from the open market.

As mentioned above, the cloud server 29 may include various data storingmemories, other memories and storage media. These can reside in avariety of locations, such as on a storage medium local to (and/orresident in) one or more of the computers or remote from any or all ofthe computers across the network. In a particular set of examples, theinformation can reside in a storage-area network (SAN) familiar to thoseskilled in the art. Similarly, any necessary files for performing thefunctions attributed to the computers, servers or other network devicescan be stored locally and/or remotely, as appropriate. Where a systemincludes computerized devices, each such device can include hardwareelements that can be electrically coupled via a bus, the elementsincluding, for example, at least one central processing unit (CPU), atleast one input device (e.g., a mouse, keyboard, controller,touch-sensitive display element or keypad) and at least one outputdevice (e.g., a display device, printer or speaker). Such a system canalso include one or more storage devices, such as disk drives, opticalstorage devices and solid-state storage devices such as random accessmemory (RAM) or read-only memory (ROM), as well as removable mediadevices, memory cards, flash cards, etc.

Such devices can also include a computer-readable storage media reader,a communications device (e.g., a modem, a network card (wireless orwired), an infrared computing device) and working memory as describedabove. The computer-readable storage media reader can be connected with,or configured to receive, a computer-readable storage mediumrepresenting remote, local, fixed and/or removable storage devices aswell as storage media for temporarily and/or more permanentlycontaining, storing, transmitting and retrieving computer-readableinformation. The system and various devices also typically will includea number of software applications, modules, services or other elementslocated within at least one working memory device, including anoperating system and application programs such as a client applicationor Web browser. It should be appreciated that alternate examples canhave numerous variations from that described above. For example,customized hardware might also be used and/or particular elements mightbe implemented in hardware, software (including portable software, suchas applets) or both. Further, connection to other computing devices suchas network input/output devices can be employed.

Storage media and computer readable media for containing code, orportions of code, can include any appropriate media known or used in theart, including storage media and computing media, such as but notlimited to volatile and non-volatile, removable and non-removable mediaimplemented in any method or technology for storage and/or transmissionof information such as computer readable instructions, data structures,program modules or other data, including RAM, ROM, EPROM, EEPROM, flashmemory or other memory technology, CD-ROM, digital versatile disk (DVD)or other optical storage, magnetic cassettes, magnetic tape, magneticdisk storage or other magnetic storage devices or any other medium whichcan be used to store the desired information and which can be accessedby a system device. Based on the technology and teachings providedherein, a person of ordinary skill in the art will appreciate other waysand/or methods to implement the various aspects of the presenttechnology.

The user device 26 further has an authentication module 228 connected tothe processor 260, which is configured to perform an authenticationoperation related to the authentication code carrier 200, and to furtherdetermine the authenticity of atomized medicine container 20 or theatomized medicine 202 through the cloud server 29, and to generate anauthentication result signal S21 correspondingly.

The authentication module 228 is configured to determine whether tocontrol the second communication module 262 through the processor 260 totransmit an authentication success signal S22 to the first communicationmodule 227 according to the authentication result signal S21. When thefirst communication module 227 receives the authentication successsignal S22, the control unit 224 controls the power module 222 to outputthe first driving voltage V21.

Specifically, the authentication operation between the authenticationmodule 228 and the authentication code carrier 200 may utilize the radiofrequency identification (RFID), which is mainly composed of radiofrequency tag (RFID tag), reader or barcode reader and relatedapplication system.

Reference is now made to FIGS. 11A and 11B, which are block diagrams ofa user device, a cloud server, and an authentication code carrieraccording to a fifth embodiment of the present invention. As shown inthe figures, the authentication module 228 includes a wirelessidentifier 2280, an authentication unit 2282, and a memory 2284, theauthentication code carrier 200 includes a wireless identification chip2000 and an antenna 2002 connected thereto. In this example, theauthentication operation between the authentication module 228 and theauthentication code carrier 200 is mainly based on the passive RFIDtechnology, which is directly powered by the wireless identifier 2280through the radio waves transmitted by the antenna module 226 to theradio frequency identification tag, that is, the wireless identificationchip 2000 itself, and the wireless identification chip 2000 further hasauthentication information 2004 written in advance. Here, theauthentication information 2004 may be an anti-counterfeitingidentification code having a specific coding sequence and producthistory data. In practice, the wireless identifier 2280 may be utilizedto read the authentication information 2004 previously written in thewireless identification chip 2000 so as to effect anti-fake improvementsusing the anti-counterfeit identification code and product history data.

However, unlike the foregoing embodiment, the authentication operationfor determining the authenticity of the authentication information 2004is mainly performed by the cloud server 29. After the authenticationunit 2282 reads the wireless identification chip 2000, theauthentication information 2004 may be obtained, which may be ananti-counterfeit identification code having a specific coding sequence,and is transmitted to the cloud server 29 through the secondcommunication module 262. The built-in processor of the cloud server 29can execute a specific decryption algorithm to confirm the authenticityof the authentication code carrier 200 having the authenticationinformation 2004. In addition, another example of the authenticationoperation performed by the cloud server 29 may compare a part or all ofthe authentication information 2004 with the data stored in the passworddatabase 290 to confirm the authenticity of the authentication codecarrier 200. If the cloud server 29 determines that the authenticatingcode carrier 200 is true, it can be known that the correspondingatomized medicine container 20 is not forged, such that the user can useit with confidence.

Specifically, the password database 290 may be pre-established accordingto a list of products sold by a pharmaceutical supplier, and thepassword database 290 may have a plurality of unique authenticationinformation 2004, and multiple and unique passwords corresponding to theauthentication information 2004. After the cloud server 29 receives theread authentication information 2004, the cloud server 29 then performsa comparison operation in the password database 290 according to theauthentication information 2004 to obtain password informationcorresponding to the authentication information 2004. Since the passworddatabase 290 may be instantly updated by the supplier, it may be ensuredthat the atomized medicine containers 20 purchased by users have notbeen used or faked.

After the above authentication operation, if the comparison operation ofthe cloud server 29 succeeds in obtaining the password information, theauthentication result signal S21 including the password information maybe transmitted back to the authentication module 228. The authenticationunit 2282 of the authentication module 228 may process theauthentication result signal S21 to control the second communicationmodule 262 to transmit the authentication success signal S22 to thefirst communication module 227 through the processor 260. In detail, thepassword information included in the authentication result signal S21can be used by the authentication unit 2282 for decryption, so as toconfirm that the authentication result signal S21 is indeed from thecloud server 29, or to identify the encrypted authentication resultsignal S21. These security mechanisms may also prevent persons ofinterest from intercepting, analyzing and cracking the signals. Afterbeing processed by the authentication unit 2282, the processor 260controls the second communication module 262 to transmit theauthentication success signal S22 to the first communication module 227.

When the first communication module 227 receives the authenticationsuccess signal S22, the control unit 224 is configured to control thepower module 222 to output the driving voltage V21 according to theauthentication success signal S22. Specifically, if the authenticationcode carrier 200 is determined to be true through the cloud server, thecorrespondingly obtained authentication success signal S22 may enablethe control unit 224, thereby controlling the power module 222 to outputthe driving voltage V21 to drive the atomization element 232 of theatomization module 220 for atomizing the atomized medicine 202. On theother hand, if the authentication unit 29 determines that theauthentication code carrier 200 is fake, or the authentication unit 2282cannot recognize the authentication result signal S21, then thecorrespondingly output authentication result signal may disable thecontrol unit 224.

The double authentication mechanism provided by the present embodimentmay greatly increase the difficulty of counterfeiting the authenticationcode carrier, so as to ensure the security of data transmission, suchthat the counterfeit goods are not able to be used by the atomizationdevice even if they are sold in the market, thus protecting the livesand property of consumers.

Reference is now made to FIG. 11B, which is a block diagram of a userdevice, a cloud server, an authentication code carrier, and a valuestoring device according to a fifth embodiment of the present invention.As shown, the atomization system 2 having the double authenticationmechanism further includes a value storing device 25. The value storingdevice 25 includes a wireless value storing module 251, a value storingprocessor 252, a database 254, and a value storing interface 256.

In the present embodiment, the number of the atomized medicine container20 may be plural, and the plurality of atomized medicine containers 20are associated with the authentication code carrier 200 in a many-to-onemanner. Specifically, the authentication code carrier 200 may beattached in the form of a card to a box containing a plurality ofatomized medicine containers 20, and the authentication code carrier 200further includes usage limit information 2005.

Therefore, in the foregoing authentication operation, the authenticationunit 2282 of the authentication module 228 may be further configured todetermine whether the usage limit information 2005 reaches apredetermined limit amount. For example, if the cloud server 29determines that the authentication code carrier 200 is true, the cloudserver 29 may further obtain the usage limit information 2005, whichdefines the usage limit of the authentication code carrier 200, and theusage number corresponds to the number of atomized medicine containers20 and decreases as the number of usage increases. In this embodiment,the predetermined limit amount may be defined as 0, that is, theauthentication unit 2282 of the authentication module 228 determineswhether the usage limit information 2005 has reached 0, and if yes, itrepresents that the user exceeds the usage limit of times, and thus thecorresponding authentication failure signal is generated to disable thecontrol unit 224.

In other words, if the authentication unit 2282 of the authenticationmodule 228 determines that the usage limit information 2005 has notreached 0, the authentication module 228 is then configured to updatethe usage limit information 2005, for example, to reduce the number ofuses of the authentication code carrier 200 by one, and theauthentication success signal S22 is generated to enable the controlunit 224 correspondingly.

On the other hand, the user may obtain the authentication code carrier200 corresponding to one or more atomized medicine containers 20 whenthe atomized medicine is purchased. The usage limit information 2005 ofthe authentication code carrier 200 may be preset to 0, when the usercompletes the purchase at the pharmacy counter, staffs of the pharmacymay operate the value storing interface 256 to update the usage limitinformation 2005 by the wireless module 251, for example, configuringthe value storing processor 252 to query or update the database 254according to the purchased barcode, and to update the usage limitinformation 2005 preset to 0 to the purchased quantity of theatomization medicine containers 20. It should be noted that the wirelessstored-value module 251 may have a configuration similar to the wirelessidentifier 2280, and the usage limit information 2005 may be updated.

Furthermore, the value storing device 25 can be further configured to beconnected to the cloud server 29 through the network 28. After the usercompletes the purchase procedure at the pharmacy counter, the pharmacycan register at the cloud server 29 through the value storing device 25at the same time, so as to synchronously update the information betweenthe sales side and the production side.

It is worth mentioning that the authentication code carrier 200 can bedisposable or reused, and after the usage limit information 2005 reaches0, the user may directly use the same authentication code carrier 200when purchasing a new medicine container 20 and updating the usage limitinformation 2005.

In addition, the value storing device 25 may directly store the usagelimit information 2005 in the user device 26 through the wireless valuestoring module 251 directly after the user completes the purchase at thepharmacy counter. For example, the user device 26 may communicate withthe wireless value storing module 25 through a radio frequencyidentification signal. The user device 26 may be a mobile electronicdevice having a near field communication (NFC) module, for simulatingthe operation of the RFID tag by using appropriate electronic circuitsand corresponding antennas. The user device 26 provides the RFIDfunction and may store a plurality of RFID tags, in other words, storethe data necessary for simulating such RFID tags, such as theabove-mentioned usage limit information 2005, or may directly transmitthe usage limit information 2005 to the user device 26 through thenetwork 28.

Therefore, in the foregoing authentication operation, the authenticationunit 2282 of the authentication module 228 may be further configured todirectly determine whether the usage limit information 2005 in the userdevice 26 reaches a predetermined limited amount. For example, if thecloud server 29 determines that the authentication code carrier 200 istrue, the authentication unit 2282 may directly read the usage limitinformation 2005 in the user device 26, the usage limit information 2005defines the usage limit of the authentication code carrier 200, and theusage number corresponds to the number of atomized medicine containers20 and decreases as the number of usage increases. In this embodiment,the predetermined limit amount may be defined as 0, that is, theauthentication unit 2282 of the authentication module 228 determineswhether the usage limit information 2005 has reached 0, and if yes, itrepresents that the user exceeds the usage limit of times, and thus thecorresponding authentication failure signal is generated to disable thecontrol unit 224.

In other words, if the authentication unit 2282 of the authenticationmodule 228 determines that the usage limit information 2005 has notreached 0, then the authentication module 228 is configured to updatethe usage limit information 2005, for example, to reduce the number ofuses of the authentication code carrier 200 by one, and theauthentication success signal S22 is generated to enable the controlunit 224 correspondingly.

With the above configuration, when the user purchases a specific numberof atomized medicine containers, it can ensure that the usage limitinformation corresponds to the number of atomized medicine containers,and the reliability of the authentication may be further increased.

Sixth Embodiment

Reference is now made to FIG. 12, which is a block diagram of anatomization system having a double authentication mechanism according toa sixth embodiment of the present invention. In this embodiment, thereference numerals similar to the fifth embodiment designate similarelements and will not be further described. As shown in the figure, thesixth embodiment is different from the fifth embodiment in that the userdevice 26 further includes an image capturing module 2286 connected tothe authentication unit 2282, and the authentication code carrier 200further includes a two-dimensional barcode 2006. The two-dimensionalbarcode 2006 of the authentication code carrier 200 may be directlyprinted at a position where the authentication code carrier 200 isdisposed, for example, inside or outside of the bottle cap or the bottlebody of the atomized medicine container 20.

The user may obtain the image of the 2D barcode 2006 through the imagecapturing module 2286, and analyze the 2D barcode 2006 through theauthentication unit 2282 to obtain the authentication information 2004.Specifically, this embodiment provides another implementation forobtaining the authentication information 2004, which utilizes a camerathat is commonly provided in an existing smart phone, and also improvesthe convenience of the authentication. The production costs may befurther reduced when compared with the previous embodiment in which thewireless identification chip is provided.

Similar to the fifth embodiment, the authentication information 2004 maybe an anti-counterfeit identification code having a specific codingsequence, and is transmitted to the cloud server 29 through the secondcommunication module 262. The built-in processor of the cloud server 29can execute a specific decryption algorithm to confirm the authenticityof the authentication code carrier 200 having the 2D barcode 2006. Inaddition, another example of the authentication operation performed bythe cloud server 29 may compare a part or all of the authenticationinformation 2004 with the data stored in the password database 290 toconfirm the authenticity of the authentication code carrier 200. If thecloud server 29 determines that the authenticating code carrier 200 istrue, it can be known that the corresponding atomized medicine container20 is not forged, such that the user can use it with confidence.

Similarly, after the cloud server 29 receives the read authenticationinformation 2004, the cloud server 29 then performs a comparisonoperation in the password database 290 according to the authenticationinformation 2004 to obtain password information corresponding to theauthentication information 2004. Since the password database 290 may beinstantly updated by the supplier, it can be ensured that the atomizedmedicine containers 20 purchased by users have not been used or faked.

Seventh Embodiment

Reference is now made to FIG. 13, which is a block diagram of anatomization system having a double authentication mechanism according toa seventh embodiment of the present invention. In this embodiment, thereference numerals similar to the fifth embodiment designate similarelements and will not be further described. As shown, the differencebetween the seventh embodiment and the fifth embodiment is that the userdevice 26 further includes an authentication code input interface 236connected with the authentication unit 2282.

Specifically, the user device 26 may include the above-mentionedauthentication code input interface 236 and a control interface for theuser to control the atomization module 220. For example, the user maycontrol the atomizing device 22 to be turned on or off, and the flowrate of the atomized medicine 202 through the control interface on theuser device 26 after the pairing operation. The authentication codeinput interface 236 may include numeric keys labeled with numbers 1-9,and cancel, back, and confirm keys.

On the other hand, the authentication information 2004 of theauthentication code carrier 200 may be printed at a position where theauthentication code carrier 200 is disposed, for example, inside oroutside of the bottle cap or the bottle body of the atomized medicinecontainer 20, the user can directly input the authentication code (i.e.,authentication information 2004) through the authentication code inputinterface 236, and the authentication code can be correspondinglydisplayed on the display screen 140 commonly provided in the user device26 for the user to confirm.

After the user inputs the authentication code (i.e., the authenticationinformation 2004) through the authentication code input interface 236,the authentication unit 2282 directly obtains the authenticationinformation 2004, or obtains the authentication information 2004 bydecrypting the authentication code. Specifically, this embodimentprovides another implementation for obtaining the authenticationinformation 2004, which utilizes a user interface that is commonlyprovided by the existing smart phone, and also improves the convenienceof the authentication. The production costs may be further reduced whencompared with the previous embodiment in which the wirelessidentification chip is provided.

Similar to the fifth embodiment, the authentication information 2004 maybe an anti-counterfeit identification code having a specific codingsequence, and is transmitted to the cloud server 29 through the secondcommunication module 262. The built-in processor of the cloud server 29can execute a specific decryption algorithm to confirm the authenticityof the authentication code carrier 200 having the authenticationinformation 2004. In addition, another example of the authenticationoperation performed by the cloud server 29 may compare a part or all ofthe authentication information 2004 with the data stored in the passworddatabase 290 to confirm the authenticity of the authentication codecarrier 200. If the cloud server 29 determines that the authenticatingcode carrier 200 is true, it can be known that the correspondingatomized medicine container 20 is not forged, such that the user can useit with confidence.

Similarly, after the cloud server 29 receives the read authenticationinformation 2004, the cloud server 29 then performs a comparisonoperation in the password database 290 according to the authenticationinformation 2004 to obtain password information corresponding to theauthentication information 2004. Since the password database 290 may beinstantly updated by the supplier, it can be ensured that the atomizedmedicine containers 20 purchased by users have not been used and faked.

Eighth Embodiment

Reference is now made to FIG. 14, which is a block diagram of anatomization system having a double authentication mechanism according toan eighth embodiment of the present invention. In this embodiment, thereference numerals similar to the fifth embodiment designate similarelements and will not be further described. As shown in the figures, thedifference between the eighth embodiment and the fifth embodiment isthat the atomization device 22 is configured with a first authenticationmodule 237 and an antenna module 226 connected to the firstauthentication module 237, and the user device 26 is configured with asecond authentication module 238 and a communication module 239.

In this embodiment, the authentication operation is not only performedon the user device 26 and the cloud server 29, another authenticationoperation is also performed on the atomization device 22.

It should be noted that the functions and characteristics of the secondauthentication module 238 are basically similar to those of theauthentication module 228 in the fifth embodiment, and the firstauthentication operation performed by the second authentication module238 interacts with the authentication code carrier 200, and theauthentication operation for determining the authenticity of theauthentication code carrier 200 through the cloud server 29 are also thesame, so that repeated descriptions are omitted herein. The differencewill be described in detail with reference to FIG. 15.

FIG. 15 is a block diagram of a first authentication module, an antennamodule, a user device, a cloud server, and an authentication codecarrier according to an eighth embodiment of the present invention. Asshown in the figure, the first authentication module 237 furtherincludes a first authentication unit 2370, a first wireless identifier2372, and a first memory 2374. The second authentication module 238further includes a second authentication unit 2380, a second wirelessidentifier 2382, and a second memory 2384. The authentication codecarrier 200 includes a wireless identification chip 2000 and an antenna2002 connected thereto. In this example, the first authenticationoperation between the second authentication module 238 and theauthentication code carrier 200 is mainly based on the passive RFIDtechnology, which is directly powered by second authentication module238 through the radio waves transmitted by the second wirelessidentifier 2382 to the radio frequency identification tag, that is, thewireless identification chip 2000 itself, and the wirelessidentification chip 2000 further has authentication information 2004written in advance. Here, the authentication information 2004 may be ananti-counterfeiting identification code having a specific codingsequence and product history data. In practice, the second wirelessidentifier 2382 may be utilized to read the authentication information2004 previously written in the wireless identification chip 2000 so asto effect anti-fake improvements using the anti-counterfeitidentification code and product history data.

After the second authentication unit 2380 reads the wirelessidentification chip 2000, the authentication information 2004 may beobtained, which may be an anti-counterfeit identification code having aspecific coding sequence, and is transmitted to the cloud server 29through the second communication module 262. The built-in processor ofthe cloud server 29 can execute a specific decryption algorithm toconfirm the authenticity of the authentication code carrier 200 havingthe authentication information 2004. In addition, another example of thefirst authentication operation performed by the cloud server 29 maycompare a part or all of the authentication information 2004 with thedata stored in the password database 290 to confirm the authenticity ofthe authentication code carrier 200. If the cloud server 29 determinesthat the authenticating code carrier 200 is true, it can be known thatthe corresponding atomized medicine container 20 is not forged, suchthat the user can use it with confidence.

Here, after the above authentication operation, if the comparisonoperation of the cloud server 29 succeeds in obtaining the passwordinformation, the authentication result signal S21 including the passwordinformation may be transmitted back to the second authentication module238. The second authentication unit 2380 of the second authenticationmodule 238 may process the authentication result signal S21 to determinewhether to generate a wireless identification signal S23. In detail, thepassword information included in the authentication result signal S21can be used by the second authentication unit 2380 for decryption, so asto confirm that the authentication result signal S21 is indeed from thecloud server 29, or to identify the encrypted authentication resultsignal S21. These security mechanisms may also prevent persons ofinterest from intercepting, analyzing or cracking the signals. After thesecond authentication unit 2380 is processed, a second authenticationoperation with the atomization device 22 is required.

Specifically, the second authentication operation between the userdevice 26 and the atomization device 22 may be performed through theradio frequency identification signal. The user device 26 may be amobile electronic device having a near field communication (NFC) modulefor simulating the operation of the RFID tag by using appropriateelectronic circuits and corresponding antennas. Such electronic circuitmay be integrated into the circuit of the mobile device, or may form apart of the electronic circuit. In these cases, the electronic circuitof the mobile device may provide RFID functionality. The mobile devicemay store a plurality of RFID tags, in other words, store the datanecessary for simulating such RFID tags. The emulation data includesdata defining the air interface properties, such as operating frequency,modulation, protocol and the like, and data defining the actual datapayload of the RFID tag. The data describing the RFID tag can then bemade available to an RFID tag interrogation device through an RFIDcircuit and corresponding antenna. Therefore, the RFID tags finallyconfigured by the NFC module may be available even when the mobileelectronic device is either powered down on purpose or when its energysupply is exhausted, e.g. by a long telephone call.

Therefore, in the present embodiment, the second authentication module238 may serve as a reader of the authentication code carrier 200, andmay also generate a radio frequency identification signal that can beread by the first authentication module 237. In addition, when the userneeds to continuously use a plurality of atomized medicine 202, the userdevice 26 may perform the first authentication operation on theplurality of authentication code carriers 200 in advance. After aplurality of corresponding authentication result signals S21 areobtained, the second authentication unit 2380 is configured to store theconfiguration for generating a plurality of wireless identificationsignals in the second memory 2384, respectively. The user can quicklyswitch and select the different atomized medicine 202 through the userdevice 26, so as to provide the user with more flexibility in the demandfor medication.

Moreover, when the antenna module 226 receives the wirelessidentification signal S23, the first authentication module 237 isconfigured to perform a second authentication operation related to thewireless identification signal S23, and to further determine whether toenable the control unit 224 to control the power module 222 to outputthe driving voltage V21. For example, when the antenna module 226receives the radio frequency identification signal generated by thesecond authentication module 238, the first wireless identifier 2372analyzes the radio frequency identification signal, and the firstauthentication unit 2370 process the radio frequency identificationsignal to confirm the correctness of the radio frequency identificationsignal. If the signal is determined to be correct, the power module 222is controlled by the control unit 224 to output the driving voltage V21to directly drive the atomization element 232 of the atomization module220 to atomize the atomized medicine 202 in the accommodating portion230.

Furthermore, in addition to the foregoing second authenticationoperation performed with the radio frequency identification signal, theBluetooth authentication signal may also be transmitted between thefirst authentication module 237 and the second authentication module238. When the wireless identification signal S23 generated by the secondauthentication module 238 is a Bluetooth identification signal, theantenna module 226 receives the Bluetooth identification signal, thefirst wireless identifier 2372 analyzes the Bluetooth identificationsignal, and the first authentication unit 2370 process the Bluetoothidentification signal to confirm the correctness of the radio frequencyidentification signal. If the signal is determined to be correct, thepower module 222 is controlled by the control unit 224 to output thedriving voltage V21 to directly drive the atomization element 232 of theatomization module 220 to atomize the atomized medicine 202 in theaccommodating portion 230.

On the other hand, if the first authentication unit 2370 determines thatthe wireless identification signal S23 is incorrect, for example, theauthentication unit 2282 cannot recognize the wireless radio frequencyidentification signal or the Bluetooth identification signal serving asthe wireless identification signal S23, then the correspondingly outputauthentication failure signal may disable the control unit 224.

In certain cases, the first authentication module 237 may also have thecapability of directly authenticating the authentication code carrier200. For example, after the user device 26 has performed the firstauthentication operation with the cloud server 29, the authenticationinformation 2004 of the wireless identification chip 2000 may berewritten so that the first wireless identifier 2372 may directlyperform the second authentication operation on the authenticationinformation 2004 of the wireless identification chip 2000, so as to savethe time for performing the first authentication operation through theuser device 26 and the cloud server 29 every time the user needs to usethe atomized medicine 202. On the other hand, when the user device 26 isoperated without network connection capability, or the user device 26 isdepleted of power, as long as the authentication code carrier 200 hasperformed the first authentication operation, the user may stilldirectly use the atomized medicine 202 through the atomization device22.

In this embodiment, in addition to providing a double authenticationmechanism at the user device 26, an independent authentication mechanismis provided at the atomization device 22, which greatly increases thedifficulty of counterfeiting the authentication code carrier whencompared with the previous embodiments, so as to ensure the security ofdata transmission, such that the counterfeit goods are not able to beused by the atomization device even if they are sold in the market, thusprotecting the lives and properties of consumers.

Ninth Embodiment

Reference is now made to FIGS. 16 and 17, which are a block diagram anda perspective view of an atomization system with a double authenticationmechanism according to a ninth embodiment of the present invention,respectively. In this embodiment, the reference numerals similar to theeighth embodiment designate similar elements and will not be furtherdescribed. As shown in the figure, the ninth embodiment is differentfrom the eighth embodiment in that the user device 26 further includesan image capturing module 2286 connected to the authentication unit2282, and the authentication code carrier 200 further includes atwo-dimensional barcode 2006.

The user may obtain the image of the 2D barcode 2006 through the imagecapturing module 2286, and analyze the 2D barcode 2006 through thesecond authentication unit 2282 to obtain the authentication information2004. Specifically, this embodiment provides another implementation forobtaining the authentication information 2004, which utilizes a camerathat is commonly provided in an existing smart phone, and also improvesthe convenience of the authentication. The production costs may befurther reduced when with the previous embodiment in which the wirelessidentification chip is provided.

Similar to the eighth embodiment, the authentication information 2004may be an anti-counterfeit identification code having a specific codingsequence, and is transmitted to the cloud server 29 through the secondcommunication module 262. The built-in processor of the cloud server 29can execute a specific decryption algorithm to confirm the authenticityof the authentication code carrier 200 having the authenticationinformation 2004. In addition, another example of the authenticationoperation performed by the cloud server 29 may compare a part or all ofthe authentication information 2004 with the data stored in the passworddatabase 290 to confirm the authenticity of the authentication codecarrier 200. If the cloud server 29 determines that the authenticatingcode carrier 200 is true, it can be known that the correspondingatomized medicine container 20 is not forged, such that the user can useit with confidence.

Similarly, after the cloud server 29 receives the read authenticationinformation 2004, the cloud server 29 then performs a comparisonoperation in the password database 290 according to the authenticationinformation 2004 to obtain password information corresponding to theauthentication information 2004. Since the password database 290 may beinstantly updated by the supplier, it can be ensured that the atomizedmedicine containers 20 purchased by users have not been used and faked.

Similar to FIG. 14, after the above first authentication operation, ifthe comparison operation of the cloud server 29 succeeds in obtainingthe password information, the authentication result signal S21 includingthe password information may be transmitted back to the secondauthentication module 238. The second authentication unit 2380 of thesecond authentication module 238 may process the authentication resultsignal S21 to determine whether to generate a wireless identificationsignal S23, and to perform the second authentication operation mentionedabove.

The first authentication module 237 and the second authentication module238 may also use radio frequency identification signals or Bluetoothidentification signals for transmission. When the wirelessidentification signal S23 generated by the second authentication module238 is a radio frequency identification signal or a Bluetoothidentification signal, the antenna module 226 receives the radiofrequency identification signal or the Bluetooth identification signal,the first wireless identifier 2372 analyzes the radio frequencyidentification signal or the Bluetooth identification signal, and thefirst authentication unit 2370 process the radio frequencyidentification signal or the Bluetooth identification signal to confirmthe correctness of the radio frequency identification signal. If thesignal is determined to be correct, the power module 222 is controlledby the control unit 224 to output the driving voltage V21 to directlydrive the atomization element 232 of the atomization module 220 toatomize the atomized medicine 202 in the accommodating portion 230.

On the other hand, if the first authentication unit 2370 determines thatthe wireless identification signal S23 is incorrect, for example, theauthentication unit 2282 cannot recognize the wireless radio frequencyidentification signal or the Bluetooth identification signal serving asthe wireless identification signal S23, then the correspondingly outputauthentication failure signal may disable the control unit 224.

Tenth Embodiment

Reference is now made to FIG. 18, which is a block diagram of anatomization system having a double authentication mechanism according toa tenth embodiment of the present invention. In this embodiment, thereference numerals similar to the eighth embodiment designate similarelements and will not be further described. As shown, the differencebetween the tenth embodiment and the eighth embodiment is that the userdevice 26 further includes an authentication code input interface 236connected with the second authentication unit 2380.

Specifically, the user device 26 may include the above-mentionedauthentication code input interface 236 and a control interface for theuser to control the atomization module 220. For example, the user maycontrol the atomizing device 22 to be turned on or off, and the flowrate of the atomized medicine 202 through the control interface on theuser device 26 after the pairing operation. The authentication codeinput interface 236 may include numeric keys labeled with numbers 1-9,and cancel, back, and confirm keys.

On the other hand, the authentication information 2004 of theauthentication code carrier 200 may be printed at a position where theauthentication code carrier 200 is disposed, for example, inside oroutside of the bottle cap or the bottle body of the atomized medicinecontainer 20, the user can directly input the authentication code (i.e.,authentication information 2004) through the authentication code inputinterface 236, and the authentication code can be correspondinglydisplayed on the display screen 140 commonly provided in the user device26 for the user to confirm.

After the user inputs the authentication code (i.e., the authenticationinformation 2004) through the authentication code input interface 236,the second authentication unit 2380 directly obtains the authenticationinformation 2004, or obtains the authentication information 2004 bydecrypting the authentication code. Specifically, this embodimentprovides another implementation for obtaining the authenticationinformation 2004, which utilizes a user interface that is commonlyprovided by the existing smart phone, and also improves the convenienceof the authentication.

Similar to the eighth embodiment, the authentication information 2004may be an anti-counterfeit identification code having a specific codingsequence, and is transmitted to the cloud server 29 through thecommunication module 239. The built-in processor of the cloud server 29can execute a specific decryption algorithm to confirm the authenticityof the authentication code carrier 200 having the authenticationinformation 2004. In addition, another example of the authenticationoperation performed by the cloud server 29 may compare a part or all ofthe authentication information 2004 with the data stored in the passworddatabase 290 to confirm the authenticity of the authentication codecarrier 200. If the cloud server 29 determines that the authenticatingcode carrier 200 is true, it can be known that the correspondingatomized medicine container 20 is not forged, such that the user can useit with confidence.

Similarly, after the cloud server 29 receives the read authenticationinformation 2004, the cloud server 29 then performs a comparisonoperation in the password database 290 according to the authenticationinformation 2004 to obtain password information corresponding to theauthentication information 2004. Since the password database 290 may beinstantly updated by the supplier, the atomized medicine containers 20purchased by users may be ensured that those have not been used andfaked.

Similarly, after the above authentication operation, if the comparisonoperation of the cloud server 29 succeeds in obtaining the passwordinformation, the authentication result signal S21 including the passwordinformation may be transmitted back to the second authentication module238. The second authentication unit 2380 of the second authenticationmodule 238 may process the authentication result signal S21 to determinewhether to generate a wireless identification signal S23. It should benoted that the second authentication operation between the user device26 and the atomization device 22 is the same as the secondauthentication operation described in the eighth embodiment. In order toavoid obscuring the emphasis of the present invention, the details arenot described herein.

Eleventh Embodiment

The atomization method with the authentication mechanism of the presentinvention will be described in detail hereinafter while making referenceto the accompanying drawings. In the present embodiment, the atomizationmethod with the authentication mechanism is mainly applicable to thefirst embodiment to the fourth embodiment, but is not limited thereto,and the present embodiment may be implemented in a manner or variouspossibilities that can be considered by those skilled in the arts. Themethod provided by the present embodiment may also applicable to any ofthe embodiments described above.

The method according to the above-described embodiments may beimplemented by using computer-executed instructions stored or otherwiseaccessible from a computer-readable medium. Such instructions mayinclude, for example, instructions and data that cause or otherwiseconfigure a general purpose computer, a special purpose computer, or aspecial purpose processing device to perform a certain function or setof functions. Parts of the computer resources used can be accessed viathe Internet. The computer executable instructions may be, for example,binary, intermediate format instructions such as assembly language,firmware, or source code. Examples of computer-readable media that maybe used to store instructions, information used, and/or informationcreated during a method in accordance with the described embodimentsinclude a magnetic or optical disk, flash memory, non-volatile memoryUSB memory devices, networked storage devices, and more.

In addition, devices for implementing the methods provided by thepresent disclosure may include hardware, firmware, and/or software, andmay take any of a variety of configurations. Typical examples of suchconfigurations include laptops, smart phones, small personal computers,personal digital assistants, and the like. The functions describedherein may also be implemented in peripheral devices or built-in cards.By way of further example, such functions may also be implemented oncircuit boards executing different processes on different chips or on asingle device.

Reference is now made to FIG. 19, which is a flowchart of an atomizationmethod having an authentication mechanism according to an eleventhembodiment of the present invention. As shown, the atomization methodhaving an authentication mechanism of the present embodiment includesfollowing steps:

Step S100: placing an atomized medicine contained in an atomizedmedicine container into a containing portion of an atomizing device;optionally, the user may first perform step S101 to obtain theauthentication code carrier of the atomized medicine container inadvance. The atomized medicine container may be a bottle container witha bottle rim, and the authentication code carrier may be an electronictag provided on the bottle cap to be used separately from the bottlecontainer, but the present invention is not limited thereto, and theauthentication code carrier may also be an electronic tag detachablydisposed outside the bottle container.

Step S102: configuring an authentication module of the atomizationdevice to perform an authentication operation related to anauthentication code carrier associated with the atomized medicinecontainer. FIG. 1 may be referred to for the specific configuration ofthe atomization device, which includes an atomization module, a firstpower module, a control unit, an antenna module, and an authenticationmodule. The related technical features are already described in theforegoing embodiment.

Step S103: configuring the authentication module to determine theauthenticity of the atomized medicine container or the atomizedmedicine, and generating an authentication result signalcorrespondingly. In more detail, the authentication module performs theauthentication operation related to the authentication code carrierbelonging to the atomized medicine container, and the authenticity ofthe at least one atomized medicine container or the atomized medicinemay be determined. The authentication operations include wirelessidentification, 2D barcode identification, authentication codeidentification, and structural lock mechanism, and the applicationmethod thereof will be described in detail hereinafter.

If the authentication module determines that the atomized medicinecontainer is true during the authentication operation, step S104 is thenexecuted: configuring the control unit to control the power module tooutput the driving voltage according to the authentication successsignal to directly drive a atomization element of the atomization moduleto atomize the atomized medicine. If the authentication moduledetermines that the atomized medicine container is fake during theauthentication operation, step S105 is then executed: generating thecorresponding authentication result signal, and disabling the firstpower module according to the authentication result signal by thecontrol unit.

Twelfth Embodiment

Reference is now made to FIG. 20A, which is a flowchart of anatomization method having an authentication mechanism according to atwelfth embodiment of the present invention. As shown, the atomizationmethod having an authentication mechanism of the present embodimentincludes the following steps:

Step S110: placing an atomized medicine contained in an atomizedmedicine container into a containing portion of an atomizing device;optionally, the user may first perform step S111 to sense theauthentication code carrier by the atomization device.

Step S112: configuring a wireless identifier of the authenticationmodule to perform the authentication operation for a wirelessidentification chip of the authentication code carrier. FIG. 2A can befurther referred to for the specific configuration of the atomizationdevice, and the authentication module includes a wireless identifier, anauthentication unit, and a memory, the authentication code carrierincludes a wireless identification chip and an antenna connectedthereto, and the related technical features have all been described inthe foregoing embodiments.

In this example, the authentication operation between the authenticationmodule and the authentication code carrier is mainly based on thepassive RFID technology, which is directly powered by the wirelessidentifier through the radio waves transmitted by the antenna module tothe radio frequency identification tag, that is, the wirelessidentification chip itself, and the wireless identification chip furtherhas authentication information 1004 written in advance.

Step S113: configuring the authentication module to determine theauthenticity of the atomized medicine container or the atomizedmedicine, and generate an authentication result signal correspondingly.In more detail, the authentication module performs the authenticationoperation related to the authentication code carrier belonging to theatomized medicine container through the wireless identification. Inpractice, the wireless identifier may be utilized to read theauthentication information previously written in the wirelessidentification chip. Here, the authentication information may be ananti-counterfeiting identification code having a specific codingsequence and product history data, and by utilizing the authenticationunit to perform the identification, anti-fake improvements using theanti-counterfeit identification code and product history data may beeffected, and the authenticity of the atomized medicine container or theatomized medicine may be determined.

If the authentication module determines that the atomized medicinecontainer is true during the authentication operation, step S114 is thenexecuted: configuring the control unit to control the power module tooutput the driving voltage according to the authentication successsignal to directly drive a atomization element of the atomization moduleto atomize the atomized medicine. If the authentication moduledetermines that the atomized medicine container is fake during theauthentication operation, step S115 is then executed: generating thecorresponding authentication result signal, and disabling the firstpower module according to the authentication result signal by thecontrol unit.

In addition, in step S113, the authentication unit may further processthe read anti-counterfeit identification code with a specific codingsequence, and perform a specific authentication algorithm stored in thememory to perform decryption to confirm the authenticity of theauthentication code carrier having the authentication information.Another example of the processing operation performed by theauthentication unit may compare a part or all of the authenticationinformation with the data stored in the memory to confirm authenticityof the authentication code carrier. If the authenticating unitdetermines that the authenticating code carrier is true, it can be knownthat the corresponding atomized medicine container is not forged, suchthat the user can use it with confidence.

Reference is now made to FIG. 20B, which is another flowchart of theatomization method having the authentication mechanism according to thetwelfth embodiment of the present invention. As shown, the atomizationmethod having an authentication mechanism of the present embodimentincludes following steps:

Step S110′: configuring a value storing device to update the usage limitinformation; As previously described in FIG. 2D, when the user completesthe purchase at pharmacy counter, staffs of the pharmacy may operate thevalue storing interface to update the usage limit information by thewireless module, for example, configuring the value storing processor toquery or update the database according to the purchased barcode, and toupdate the usage limit information to the purchased quantity of theatomization medicine containers.

Step S111′: placing an atomized medicine contained in an atomizedmedicine container into a containing portion of an atomizing device;optionally, the user may first perform step S112′ to sense theauthentication code carrier by the atomization device.

Step S113′: configuring a wireless identifier of the authenticationmodule to perform the authentication operation for a wirelessidentification chip of the authentication code carrier.

In this example, the authentication operation between the authenticationmodule and the authentication code carrier is mainly based on thepassive RFID technology, which is directly powered by the wirelessidentifier through the radio waves transmitted by the antenna module tothe radio frequency identification tag, that is, the wirelessidentification chip itself, and the wireless identification chip furtherhas authentication information written in advance.

Step S114′: configuring the authentication module to determine theauthenticity of the atomized medicine container or the atomizedmedicine, and generating an authentication result signalcorrespondingly. In more detail, the authentication module performs theauthentication operation related to the authentication code carrierbelonging to the atomized medicine container through the wirelessidentification. In practice, the wireless identifier may be utilized toread the authentication information previously written in the wirelessidentification chip. Here, the authentication information may be ananti-counterfeiting identification code having a specific codingsequence and product history data, and by utilizing the authenticationunit to perform the identification, anti-fake improvements using theanti-counterfeit identification code and product history data may beeffected, and the authenticity of the atomized medicine container or theatomized medicine may be determined.

If the authentication module determines that the atomized medicinecontainer is true during the authentication operation, step S115′ isthen executed: configuring the authentication module to determinewhether the usage limit information reaches a predetermined limitamount. For example, the authentication unit of the authenticationmodule may determine whether the usage limit information has reached 0,and if yes, step S116′ is executed, generating the correspondingauthentication result signal to disable the control unit.

If the authentication unit of the authentication module determines thatthe usage limit information has not reached the predetermined limitamount in step S115′, for example, more than 0 times, the methodproceeds to step S117′, configuring the authentication module to updatethe usage limit information. For example, reducing the number of uses ofthe authentication code carrier by one, and generating theauthentication result signal to enable the control unit correspondingly.

Step S118′: configuring the control unit to control the power module tooutput the driving voltage according to the authentication successsignal to directly drive a atomization element of the atomization moduleto atomize the atomized medicine.

In addition, if the authentication module determines that the atomizedmedicine container is fake, the step S116′ is similarly executed,generating the corresponding authentication result signal to disable thecontrol unit.

With the above configuration, when the user purchases a specific numberof atomized medicine containers, it can ensure that the usage limitinformation corresponds to the number of atomized medicine containers,and the reliability of the authentication may be further increased.

Thirteenth Embodiment

Reference is now made to FIG. 21, which is a flowchart of an atomizationmethod with an authentication mechanism according to a thirteenthembodiment of the present invention. As shown, the atomization methodhaving an authentication mechanism of the present embodiment includesfollowing steps:

Step S120: placing an atomized medicine contained in an atomizedmedicine container into a containing portion of an atomizing device;Optionally, the user may first perform step S121, placing theauthentication code carrier into the authentication code carrieraccommodation portion, which may provide appropriate support forsecuring the authentication code carrier.

In this embodiment, further reference may be made to the atomizationsystem of FIGS. 3, 4 and 5. The atomization system further includes asecond power module connected to the control unit for outputting asecond driving voltage. The control unit may output one or more controlsignals for controlling the operation of the second power module. Inaddition, the atomization device further includes a power supply portionconnected to the second power module, and the authentication codecarrier further includes a power receiving portion connected to thewireless identification chip.

Step S122: coupling a power supply portion of the second power module toa power receiving portion of the wireless identification chip. Asdescribed in the previous embodiments, the second power module isconfigured to output the second driving voltage to enable the wirelessidentification chip when the power supply portion is electricallycoupled to the power receiving portion.

Specifically, the present embodiment mainly utilizes an active type ofwireless identification technology. In addition to the active type ofradio frequency identification technology mentioned above, the ISM(Industrial Scientific Medical) band radio frequency identificationtechnology such as Bluetooth wireless identification technology may beemployed, and the radio frequency identification may be performed in the2.4 GHz Industrial Scientific Medical band (ISM Band).

Furthermore, the receiving portion of the authentication code carriermay be a connector with a specific standard, and the atomization devicemay be further provided with an authentication code carrieraccommodating portion at the position where the power supply portiondisposed, and after the power receiving terminal is connected to thepower supply terminal, appropriate supporting forces may be provided tostabilize the authentication code carrier, and the authentication codecarrier accommodating portion may also be disposed at the outside of theatomization device corresponding to the antenna module, not onlyproviding convenience for the user, but also ensuring that the wirelessidentifier may be successfully sensed with the wireless identificationchip.

Step S123: configuring the second power module to output a seconddriving voltage to enable the wireless identification chip to transmitthe wireless identification signal. In this example, the authenticationoperation between the authentication module 128 and the authenticationcode carrier 100 is mainly based on the active type of the wirelessidentification technology, and it may use the active type of thewireless RFID technology or the ISM (Industrial Scientific Medical) bandradio frequency identification technology such as Bluetooth wirelessidentification technology, and the radio frequency identification may beperformed in the 2.4 GHz Industrial Scientific Medical band (ISM Band).The user can select the appropriate authentication operation accordingto practical requirements or transmission distance. For example, themethod may proceed to step S124, configuring the wireless identificationchip to transmit the Bluetooth identification signal to theauthentication module, or the method may proceed to step S125,configuring the wireless identification chip to transmit the wireless RFidentification signal to the authentication module. In practice, theauthentication information previously written in the wirelessidentification chip may be transmitted to the wireless identifier by thewireless identification chip with the wireless radio frequency signalsor Bluetooth identification signals, so as to effect anti-fakeimprovements using the anti-counterfeit identification code and producthistory data.

Step S126: configuring a wireless identifier of the authenticationmodule to receive the wireless identification signal, and to perform theauthentication operation for a wireless identification chip of theauthentication code carrier. As described in the previous embodiments,the wireless identifier may analyze the wireless radio frequencyidentification signal or the Bluetooth identification signal, and theauthentication unit may be configured to judge the authenticationinformation therein. Optionally, the authentication unit may furtherprocess the received anti-counterfeit identification code having thespecific coding sequence, and the method may proceed to step S127,performing a decryption by using the specific authentication algorithmstored in the memory, so as to confirm the authenticity of theauthentication code carrier having the authentication information. Inaddition, the method may proceed to step S128, configuring theauthentication unit to compare a part or all of the authenticationinformation with the data stored in the memory to confirm authenticityof the authentication code carrier.

Step S129: configuring the authentication module to determine theauthenticity of the atomized medicine container or the atomizedmedicine, and generate an authentication result signal correspondingly.This step mainly generates the corresponding authentication resultsignal according to the authentication step of step S126, S127 or S128.

If the authentication module determines that the atomized medicinecontainer is true during the authentication operation, step S129-1 isthen executed: configuring the control unit to control the power moduleto output the driving voltage according to the authentication successsignal to directly drive a atomization element of the atomization moduleto atomize the atomized medicine. If the authentication moduledetermines that the atomized medicine container is fake during theauthentication operation, step S129-2 is then executed: generating thecorresponding authentication result signal, and disabling the firstpower module according to the authentication result signal by thecontrol unit.

Fourteenth Embodiment

Reference is now made to FIG. 22, which is a flowchart of an atomizationmethod with an authentication mechanism according to a fourteenthembodiment of the present invention. As shown, the atomization methodhaving an authentication mechanism of the present embodiment includesthe following steps:

Step S130: placing an atomized medicine contained in an atomizedmedicine container into a containing portion of an atomizing device;optionally, the user may first perform step S131 to obtain theauthentication code carrier of the atomized medicine container inadvance. The authentication code carrier may be directly printed withthe authentication information, for example, an authentication codehaving a specific sequence code, and may be printed at a position wherethe authentication code carrier is disposed, for example, inside oroutside of the bottle cap or the bottle body of the atomized medicinecontainer.

On the other hand, the atomization device used in this embodiment can bereferred to in FIGS. 6 and 7 and its related embodiments. Theatomization device is generally equipped with a user interface, and theuser device 14 may include the above-mentioned authentication code inputinterface, and a control interface for the user to control theatomization module. The authentication code input interface and controlinterface can be configured with a display screen, and physical keys orvirtual keys displayed on the display screen may be utilized, and thepresent embodiment does not limit the manner of implementation of theinterfaces.

Step S132: inputting the authentication information of theauthentication code carrier through the authentication code inputinterface by the user. For example, the user can directly input theauthentication code printed on the inside of the bottle cap through theauthentication code input interface, and the authentication code can becorrespondingly displayed on the display screen for the user to confirm.

Step S133, configuring the authentication module to process theauthentication information. After the user inputs the authenticationinformation, the authentication module may further process theauthentication information input by the user, for example,authentication codes. Optionally, the method may proceed to step S134,using the authentication unit to further process the readanti-counterfeit identification code with a specific coding sequenceinput by the user, and to execute a specific authentication algorithmstored in the memory to perform decryption to confirm the authenticityof the authentication code carrier having the authentication information1004. Another example of the processing operation performed by theauthentication unit includes proceeding to step S135, comparing a partor all of the authentication information with the data stored in thememory to confirm authenticity of the authentication code carrier.

Step S136: configuring the authentication module to determine theauthenticity of the atomized medicine container or the atomizedmedicine, and generate an authentication result signal correspondingly.This step mainly generates the corresponding authentication resultsignal according to the authentication step of step S133, S134 or S135.

If the authentication module determines that the atomized medicinecontainer is true during the authentication operation, the methodproceeds to step S137: configuring the control unit to control the powermodule to output the driving voltage according to the authenticationsuccess signal to directly drive a atomization element of theatomization module to atomize the atomized medicine. If theauthentication module determines that the atomized medicine container isfake during the authentication operation, the method proceeds to stepS138: generating the corresponding authentication result signal, anddisabling the first power module according to the authentication resultsignal by the control unit.

Fifteenth Embodiment

Reference is now made to FIG. 23, which is a flowchart of an atomizationmethod having an authentication mechanism according to a fifteenthembodiment of the present invention. As shown, the atomization methodhaving an authentication mechanism of the present embodiment includesfollowing steps:

Step S140: placing an atomized medicine contained in an atomizedmedicine container into a containing portion of an atomizing device; thespecific configuration of the atomization device can refer to FIG. 8 andFIG. 9, which further includes a structural lock module connected withthe authentication module, and the authentication code carrier furtherincludes a structural key. The structural lock module includes astructural lock 160 and an electronic switch.

Optionally, the user may first perform step S141 to obtain thestructural key on the authentication code carrier in advance. Thestructural key can be disposed inside the bottle cap served as theauthentication code carrier 100, the structural key 18 and thestructural lock 160 on the atomization device 12 provided by themanufacturer may be consistent in terms of commercial nature to providethe first level of security.

Step S142: unlocking a structural lock module with the structural key ofthe authentication code carrier.

Step S143: determining whether the structural lock module is unlocksuccess, if not, the method proceed to step S144, configuring theelectronic switch or the authentication module to disable the firstpower module through the control module. If yes, the method proceed tostep S145, configuring the electronic switch to enable theauthentication module to confirm successful unlocking. In detail, afterthe user successfully unlocks the structural lock with the structuralkey, the electronic switch will transmit a start up signal to enable theauthentication module.

After the authentication module receives the start up signal, step S146may be further performed by the control unit: controlling the powermodule to output the driving voltage to directly drive the atomizationelement of the atomization module to atomize the atomized medicine.

On the other hand, the authentication code carrier may have anauthentication chip provided for the wireless identification module toperform the identification, the authentication module may further obtainthe authentication information through the antenna module, and performthe authentication operation according to the third embodiment. Forexample, comparing the authentication information with the data storedin the memory, or the obtained authentication information is ananti-counterfeiting identification code having a specific codingsequence so that a specific algorithm stored in the memory may befurther executed for decryption to determine the authenticity of theatomized medicine container or the atomized medicine. In this way, asecond level of security can be provided.

Therefore, this embodiment can provide double guarantees of thestructural key and the wireless identification, which not only ensuressafety, but also increases the difficulty of forging atomized medicinecontainers.

Sixteenth Embodiment

Another aspect of the atomization method with the authenticationmechanism of the present invention will be described in detailhereinafter while making reference to the accompanying drawings. In thepresent embodiment, the atomization method with the authenticationmechanism is mainly applicable to the fifth, sixth, and seventhembodiments, but is not limited thereto, and the present embodiment maybe implemented in a manner that can be considered by those skilled inthe arts. The method provided by the present embodiment may alsoapplicable to any of the embodiments described above.

Reference is now made to FIG. 24A, which is a flowchart of anatomization method having an authentication mechanism according to asixteenth embodiment of the present invention. As shown, the atomizationmethod having an authentication mechanism of the present embodimentincludes following steps:

Step S200: placing an atomized medicine contained in an atomizedmedicine container into a containing portion of an atomizing device;optionally, the user may first obtain the authentication code carrier ofthe atomized medicine container in advance. Specific configurations ofthe atomization device, the cloud server, the user device and theatomized medicine container can be seen in FIG. 10. The atomizationdevice includes an atomization module, a power module, a control unit,and a first communication module. The user device includes a processor,a second communication module, and an authentication module. The relatedtechnical features are already described in the foregoing embodiment.

Step S201: Pairing the first communication module of the atomizationdevice with the second communication module of the user device. Thepairing of the first communication module and the second communicationmodule can be transmitted through the near-end network, such as WIFI,Bluetooth, etc. More specifically, the user device can obtainadministrator rights of the atomization device through the pairingoperation, such that wireless controls and authentication mechanisms maybe achieved.

Step S202: configuring the second communication module to connect withthe cloud server through the network. In this embodiment, theauthentication operation is mainly performed on the user device and thecloud server, and the atomization device may not need to be providedwith an authentication module and its related device or system, whichcan save the manufacturing cost.

Step S203: configuring the authentication module of the user device toperform an authentication operation related to an authentication codecarrier. Specifically, the authentication operation between theauthentication module 228 and the authentication code carrier 200 mayutilize the radio frequency identification (RFID), which is mainlycomposed of radio frequency tag (RFID tag), reader or barcode reader andrelated application system.

Step S204: configuring the cloud server to determine the authenticity ofthe atomized medicine container or the atomized medicine, and togenerate an authentication result signal. If the cloud server determinesthat the atomized medicine container is true, the correspondingauthentication result signal is generated and transmitted to the userdevice, the method proceeds to step S207, configuring the authenticationmodule to transmit the authentication success signal to the firstcommunication module through the second communication module, and themethod proceeds to step 208, the control unit controlling the outputdriving voltage of the power module according to the authenticationsuccess signal, and directly driving the atomization element of theatomization module to atomize the atomized medicine.

If the cloud server determines that the atomized medicine container isfake in step S204, a corresponding authentication result signal isgenerated and transmitted to the user device. The method proceeds tostep S205, the authentication fails, and the authentication failuremessage may be displayed on the user device. The method proceeds to stepS206, where the process comes to an end. Details of the authenticationoperation will be described in more detail hereinafter.

Reference is now made to FIG. 24B, which is another flowchart of theatomization method having the authentication mechanism according to thesixteenth embodiment of the present invention. As shown, the atomizationmethod having an authentication mechanism of the present embodimentincludes following steps:

Step S200′: configuring a value storing device to update the usage limitinformation; As previously described in FIG. 11B, when the usercompletes the purchase at pharmacy counter, staffs of the pharmacy mayoperate the value storing interface to update the usage limitinformation by the wireless value storing module, for example,configuring the value storing processor to query or update the databaseaccording to the purchased barcode, and to update the usage limitinformation to the purchased quantity of the atomization medicinecontainers. The value storing device may directly update the usage limitinformation in the authentication code carrier by the wireless valuestoring module, or directly store the usage limit information in theuser device through the wireless value storing module directly after theuser completes the purchase procedure at the pharmacy counter.

Step S201′: placing an atomized medicine contained in an atomizedmedicine container into a containing portion of an atomizing device;optionally, the user may first obtain the authentication code carrier ofthe atomized medicine container in advance.

Step S202′: Pairing the first communication module of the atomizationdevice with the second communication module of the user device.

Step S203′: configuring the second communication module to connect withthe cloud server through the network. In this embodiment, theauthentication operation is mainly performed on the user device and thecloud server, and the atomization device may not need to be providedwith an authentication module and its related device or system, whichcan save the manufacturing cost.

Step S204′: configuring the authentication module of the user device toperform an authentication operation related to an authentication codecarrier.

Step S205′: configuring the cloud server to determine the authenticityof the atomized medicine container or the atomized medicine, and togenerate an authentication result signal. If the cloud server determinesthat the atomized medicine container is true, a correspondingauthentication result signal is generated and transmitted to the userdevice. The method proceeds to step S206′, configuring theauthentication module to determine whether the usage limit informationreaches a predetermined limited amount. For example, the authenticationunit of the authentication module may determine whether the usage limitinformation has reached 0, and if yes, step S207′ is executed,generating the corresponding authentication result signal to disable thecontrol unit.

If the authentication module determines that the usage limit informationhas not reached the predetermined limit amount in step S206′, forexample, more than 0 times, the method proceeds to step S208′,configuring the authentication module to update the usage limitinformation. For example, reducing the number of uses of theauthentication code carrier by one, and generating the authenticationsuccess signal correspondingly.

Step S209′, configuring the authentication module to transmit theauthentication success signal to the first communication module throughthe second communication module, and the method proceeds to step 209′-1,the control unit controlling the output driving voltage of the powermodule according to the authentication success signal, and directlydriving the atomization element of the atomization module to atomize theatomized medicine.

If the cloud server determines that the atomized medicine container isfake in step S205′, a corresponding authentication result signal isgenerated and transmitted to the user device. The method proceeds tostep S207′, the authentication fails, and the authentication failuremessage may be displayed on the user device. The method proceeds to stepS207′-1, the flow ends.

With the above configuration, when the user purchases a specific numberof atomized medicine containers, it can ensure that the usage limitinformation corresponds to the number of atomized medicine containers,and the reliability of the authentication may be further increased.

Seventeenth Embodiment

Reference is now made to FIG. 25, which is a flowchart of anauthentication operation of a seventeenth embodiment of the presentinvention. This embodiment is mainly to exemplify the details of theauthentication process described from step S203 to step S204 in theatomization method of the previous embodiment, the method may furtherinclude the following steps:

Step S210: configuring a wireless identifier to obtain authenticationinformation of the wireless identification chip. In this example, theauthentication operation between the authentication module and theauthentication code carrier is mainly based on the passive RFIDtechnology, which is directly powered by the wireless identifier throughthe radio waves transmitted by the second communication module to theradio frequency identification tag, that is, the wireless identificationchip itself, and obtain the authentication information previouslywritten in the wireless identification chip.

Step S211: sending the authentication information to the cloud serverthrough the second communication module. Here, the authenticationoperation for determining the authenticity of the authenticationinformation is mainly performed by the cloud server. After theauthentication unit reads the wireless identification chip, theauthentication information may be obtained, which may be ananti-counterfeit identification code having a specific coding sequence,and is transmitted to the cloud server through the second communicationmodule.

Step S212: configuring the cloud server to determine the authenticity ofthe atomized medicine container or the atomized medicine according tothe authentication information. The built-in processor of the cloudserver can execute a specific decryption algorithm to confirm theauthenticity of the authentication code carrier having theauthentication information. In addition, another example of theauthentication operation performed by the cloud server may compare apart or all of the authentication information with the data stored inthe password database to confirm the authenticity of the authenticationcode carrier.

Step S213: generating an authentication result signal.

If the cloud server determines that the authenticating code carrier istrue, it can be known that the corresponding atomized medicine containeris not forged, such that the user can use it with confidence.

Eighteenth Embodiment

Reference is now made to FIG. 26, which is a flowchart of anauthentication operation of the eighteenth embodiment of the presentinvention. This embodiment is mainly to exemplify the details of theauthentication process described in step S204 in the atomization methodof the previous embodiment, the method may further include the followingsteps:

Step S220: configuring the cloud server to determine the authenticity ofthe atomized medicine container or the atomized medicine according tothe authentication information.

Step S221: configuring the cloud server to perform a comparisonoperation in a password database to obtain password informationcorresponding to the authentication information.

Specifically, the password database may be pre-established according toa list of products sold by a pharmaceutical supplier, and the passworddatabase may have a plurality of unique authentication information, andmultiple and unique passwords corresponding to the authenticationinformation. After the cloud server receives the read authenticationinformation, the cloud server then performs a comparison operation inthe password database according to the authentication information toobtain password information corresponding to the authenticationinformation. Since the password database may be instantly updated by thesupplier, it may be ensured that the atomized medicine containerspurchased by users have not been used and faked.

After the above authentication operation, if the comparison operation ofthe cloud server succeeds in obtaining the password information, themethod proceeds to step S225, the authentication result signal includingthe password information may be transmitted back to the authenticationmodule. In the user device, the authentication unit of theauthentication module may process the authentication result signal tocontrol the second communication module to transmit the authenticationsuccess signal to the first communication module through the processor.

In detail, the password information included in the authenticationresult signal can be used by the authentication unit for decryption, soas to confirm that the authentication result signal is indeed from thecloud server, or to identify the encrypted authentication result signal.These security mechanisms may also prevent persons of interest fromintercepting, analyzing or cracking the signals. After being processedby the authentication unit, the method may proceed to step S226,configuring the authentication module to generate the authenticationsuccess signal according to the authentication result signal.Specifically, the authentication module may control the secondcommunication module to transmit the authentication success signal tothe first communication module through the processor.

If the cloud server determines that the atomized medicine container isfake in step S221, a corresponding authentication result signal isgenerated and transmitted to the user device. The method proceeds tostep S223, the authentication fails, and the authentication failuremessage may be displayed on the user device. The method proceeds to stepS224, the flow ends.

The double authentication mechanism provided by the present embodimentmay greatly increase the difficulty of counterfeiting the authenticationcode carrier, so as to ensure the security of data transmission, suchthat the counterfeit goods are not able to be used by the atomizationdevice even if they are sold in the market, thus protecting the livesand property of consumers.

Nineteenth Embodiment

Reference is now made to FIG. 27, which is a flowchart of anauthentication operation of the nineteenth embodiment of the presentinvention. This embodiment is mainly to exemplify the details of theauthentication process described from step S203 to step S204 in theatomization method of the previous embodiment, the method may furtherinclude the following steps:

Step S230: obtaining the 2D barcode of the authentication code carrier.For the specific configuration of the user device and the authenticationcode carrier, reference may be made to FIG. 12, the user device furtherincludes an image capturing module connected to the authentication unit,and the authentication code carrier further includes a two-dimensionalbarcode. The two-dimensional barcode of the authentication code carriermay be directly printed at a position where the authentication codecarrier is disposed, for example, inside or outside of the bottle cap orthe bottle body of the atomized medicine container.

Step S231: configuring the authentication module to identify atwo-dimensional barcode to generate authentication information. The usermay obtain the image of the 2D barcode through the image capturingmodule, and analyze the 2D barcode through the authentication unit toobtain the authentication information. Specifically, this embodimentprovides another implementation for obtaining the authenticationinformation, which utilizes a camera that is commonly provided in anexisting smart phone, and also improves the convenience of theauthentication. The production costs may be further reduced whencompared with the previous embodiment in which the wirelessidentification chip is provided.

Step S232: configuring the authentication module to send theauthentication information to the cloud server through the secondcommunication module. Here, the authentication operation for determiningthe authenticity of the authentication information is mainly performedby the cloud server. After the authentication unit analyzes the 2Dbarcode to obtain the authentication information, it can be transmittedto the cloud server through the second communication module.

Step S233: configuring the cloud server to determine the authenticity ofthe atomized medicine container or the atomized medicine according tothe authentication information, and to generate the authenticationresult signal. The built-in processor of the cloud server can execute aspecific decryption algorithm to confirm the authenticity of the 2Dbarcode having the authentication information. In addition, anotherexample of the authentication operation performed by the cloud servermay compare a part or all of the authentication information with thedata stored in the password database to confirm the authenticity of theauthentication code carrier. If the cloud server determines that theauthenticating code carrier is true, it can be known that thecorresponding atomized medicine container is not forged, such that theuser can use it with confidence.

If the cloud server determines that the atomized medicine container istrue, a corresponding authentication result signal is generated andtransmitted to the user device. The method proceeds to step S236,configuring the authentication module to determine whether the usagelimit information reaches a predetermined limited amount.

If the cloud server determines that the atomized medicine container isfake in step S233, a corresponding authentication result signal isgenerated and transmitted to the user device. The method proceeds tostep S234, the authentication fails, and the authentication failuremessage may be displayed on the user device. The method proceeds to stepS235, where the process comes to an end.

Twentieth Embodiment

Reference is now made to FIG. 28, which is a flowchart of anauthentication operation of the twentieth embodiment of the presentinvention. This embodiment is mainly to exemplify the details of theauthentication process described from step S203 to step S204 in theatomization method of the previous embodiment, the method may furtherinclude the following steps:

Step S240: obtaining the authentication information of theauthentication code carrier. For the specific configuration of the userdevice and the authentication code carrier, reference may be made toFIG. 13, the user device further includes an authentication code inputinterface connected to the authentication unit. The authentication codecarrier may be directly printed with the authentication information, forexample, an authentication code having a specific sequence code, and maybe printed at a position where the authentication code carrier isdisposed, for example, inside or outside of the bottle cap or the bottlebody of the atomized medicine container.

Step S241: inputting the authentication information of theauthentication code carrier through the authentication code inputinterface by the user. The user can directly input the authenticationcode (i.e., authentication information) through the authentication codeinput interface, and the authentication code can be correspondinglydisplayed on the display screen commonly provided in the user device forthe user to confirm.

After the user inputs the authentication code (i.e., the authenticationinformation) through the authentication code input interface, theauthentication unit directly obtains the authentication information, orobtains the authentication information by decrypting the authenticationcode. Specifically, this embodiment provides another implementation forobtaining the authentication information, which utilizes a userinterface that is commonly provided in an existing smart phone, and alsoimproves the convenience of the authentication. The production costs maybe further reduced when compared with the previous embodiment in whichthe wireless identification chip is provided.

Step S242: configuring the authentication module to send theauthentication information to the cloud server through the secondcommunication module. Here, the authentication operation for determiningthe authenticity of the authentication information is mainly performedby the cloud server. After the authentication unit obtains theauthentication information, it can be transmitted to the cloud serverthrough the second communication module.

Step S243: configuring the cloud server to determine the authenticity ofthe atomized medicine container or the atomized medicine according tothe authentication information, and to generate the authenticationresult signal. The built-in processor of the cloud server can execute aspecific decryption algorithm to confirm the authenticity of theauthentication code carrier having the authentication information. Inaddition, another example of the authentication operation performed bythe cloud server may compare a part or all of the authenticationinformation with the data stored in the password database to confirm theauthenticity of the authentication code carrier. If the cloud serverdetermines that the authenticating code carrier is true, it can be knownthat the corresponding atomized medicine container is not forged, suchthat the user can use it with confidence.

If the cloud server determines that the atomized medicine container istrue, a corresponding authentication result signal is generated andtransmitted to the user device. The method proceeds to step S246,configuring the authentication module to determine whether the usagelimit information reaches a predetermined limited amount.

If the cloud server determines that the atomized medicine container isfake in step S243, a corresponding authentication result signal isgenerated and transmitted to the user device. The method proceeds tostep S244, the authentication fails, and the authentication failuremessage may be displayed on the user device. The method proceeds to stepS245, the flow ends.

Similarly, after the cloud server receives the read authenticationinformation, the cloud server then performs a comparison operation inthe password database according to the authentication information toobtain password information corresponding to the authenticationinformation. Since the password database may be instantly updated by thesupplier, it can be ensured that the atomized medicine containerspurchased by users have not been used and faked.

Twenty-First Embodiment

Yet another aspect of the atomization method with the authenticationmechanism of the present invention will be described in detailhereinafter with reference made to the accompanying drawings. In thepresent embodiment, the atomization method with the authenticationmechanism is mainly applicable to the eighth embodiment to the tenthembodiment, but is not limited thereto, and the present embodiment maybe implemented in a manner that can be considered by those skilled inthe arts. The method provided by the present embodiment may alsoapplicable to any of the embodiments described above.

Reference is now made to FIG. 29, which is a flowchart of an atomizationmethod having an authentication mechanism according to a twenty-firstembodiment of the present invention. As shown, the atomization methodhaving an authentication mechanism of the present embodiment includesfollowing steps:

Step S250: placing an atomized medicine contained in an atomizedmedicine container into a containing portion of an atomizing device;optionally, the user may first obtain the authentication code carrier ofthe atomized medicine container in advance. The specific configurationof the atomization device, the cloud server, the user device, and theatomization medicine container can be referred to in FIG. 14. Theatomization device includes an atomization module, a power module, acontrol unit, a first authentication module, and an antenna module. Theuser device includes a processor, a second communication module, and anauthentication module. The related technical features are alreadydescribed in the foregoing embodiment.

Step S251: configuring the communication module to connect with thecloud server through the network. In this embodiment, in addition to theauthentication operation performed on the user device and the cloudserver, another authentication operation is performed on the atomizationdevice.

It should be noted that the functions and characteristics of the secondauthentication module are basically similar to those of theauthentication module in the sixteenth embodiment, and the firstauthentication operation performed by the second authentication moduleinteracts with the authentication code carrier, and the authenticationoperation for determining the authenticity of the authentication codecarrier through the cloud server are also the same, so that repeateddescriptions are omitted herein.

Step S252: configuring the second authentication module of the userdevice to perform an authentication operation related to anauthentication code carrier. Specifically, the authentication operationbetween the second authentication module and the authentication codecarrier may utilize the radio frequency identification (RFID), which ismainly composed of radio frequency tag (RFID tag), reader or barcodereader and related application system. The method may proceed to stepS253 in advance: configuring a second wireless identifier of the secondauthentication module to obtain authentication information of thewireless identification chip. In this example, the authenticationoperation between the second authentication module and theauthentication code carrier is mainly based on the passive RFIDtechnology, which is directly powered by the wireless identifier throughthe radio waves transmitted by the second communication module to theradio frequency identification tag, that is, the wireless identificationchip itself, and obtain the authentication information previouslywritten in the wireless identification chip.

After the second authentication unit reads the wireless identificationchip, the authentication information may be obtained, which may be ananti-counterfeit identification code having a specific coding sequence,and is transmitted to the cloud server through the communication module.The built-in processor of the cloud server can execute a specificdecryption algorithm to confirm the authenticity of the authenticationcode carrier having the authentication information. In addition, anotherexample of the first authentication operation performed by the cloudserver may compare a part or all of the authentication information withthe data stored in the password database to confirm the authenticity ofthe authentication code carrier. If the cloud server determines that theauthenticating code carrier is true, it can be known that thecorresponding atomized medicine container is not forged, such that theuser can use it with confidence.

Step S254: configuring the cloud server to determine the authenticity ofthe atomized medicine container or the atomized medicine, and togenerate an authentication result signal. If the cloud server determinesthat the atomized medicine container is true, a correspondingauthentication result signal is generated and transmitted to the userdevice. The method proceeds to configure the authentication module totransmit the authentication success signal to the antenna module throughthe second communication module.

Step S257: configuring the second authentication module to generate awireless identification signal. In the present embodiment, the secondauthentication module 238 may serve as a reader medium of theauthentication code carrier, and may also generate a radio frequencyidentification signal that can be read by the first authenticationmodule.

Step S258: controlling the second authentication module to transmit thewireless identification signal to the antenna module of the atomizationdevice. When the user needs to continuously use a plurality of atomizedmedicine, the user device may perform the first authentication operationon the plurality of authentication code carriers in advance, and after aplurality of corresponding authentication result signals S21 areobtained, the second authentication unit is configured to store theconfiguration for generating a plurality of wireless identificationsignals in the second memory, respectively. The user can quickly switchand select the different atomized medicine through the user device, soas to provide the user with more flexibility in the demand formedication.

Step S259: configuring the first authentication module of theatomization device to perform a second authentication operation relatedto the wireless identification signal. For example, when the antennamodule receives the radio frequency identification signal generated bythe second authentication module, the first wireless identifier analyzesthe radio frequency identification signal, and the first authenticationunit process the radio frequency identification signal to confirm thecorrectness of the radio frequency identification signal.

Step S259-1: configuring the first authentication unit to confirm thecorrectness of the radio frequency identification signal. If the radiofrequency identification signal is determined to be correct, the methodproceeds to step S259-4, enabling the control unit to control the powermodule to output driving voltage to drive the atomization element of theatomization device to atomize the atomized medicine. If the radiofrequency identification signal is determined to be incorrect, themethod proceeds to step S259-2, the authentication fails, and the methodproceeds to step S259-3, where the method comes to an end. For example,if the first authentication unit determines that the wirelessidentification signal is incorrect, for example, the authentication unitcannot recognize the wireless identification signal, then thecorrespondingly output authentication failure signal may disable thecontrol unit.

In this embodiment, in addition to providing a double authenticationmechanism at the user device, an independent authentication mechanism isfurther provided at the atomization device, which greatly increases thedifficulty of counterfeiting the authentication code carrier whencompared with the previous embodiments, so as to ensure the security ofdata transmission, such that the counterfeit goods are not able to beused by the atomization device even if they are sold in the market, thusprotecting the lives and properties of consumers.

Twenty-Second Embodiment

Reference is now made to FIG. 30, which is a flowchart of anauthentication operation according to the twenty-second embodiment ofthe present invention. This embodiment is mainly to exemplify thedetails of the authentication process described from step S257 to stepS259-4 in the atomization method of the twenty-first embodiment, themethod may further include the following steps:

Step S260: configuring the second authentication module to generate awireless identification signal. Specifically, the second authenticationoperation between the user device and the atomization device may beperformed through the radio frequency identification signal. The userdevice may be a mobile electronic device having a near fieldcommunication (NFC) module, for simulating the operation of the RFID tagby using appropriate electronic circuits and corresponding antennas.Furthermore, in addition to the foregoing second authenticationoperation performed with the radio frequency identification signal, theBluetooth authentication signal may also be transmitted between thefirst authentication module and the second authentication module.

Step S261: controlling the second authentication module to transmit thewireless identification signal to the antenna module of the atomizationdevice. As described above, the user may perform step S262 in advance,transmitting the Bluetooth identification signal using the secondcommunication module, or may perform step S263 in advance to transmitthe radio frequency identification signal using the second communicationmodule.

Step S264: configuring the first authentication module of theatomization device to perform a second authentication operation relatedto the wireless identification signal.

Step S265: configuring a first wireless identifier of the firstauthentication module to receive the wireless identification signalthrough the antenna module. When the antenna module receives the radiofrequency identification signal or the Bluetooth identification signalgenerated by the second authentication module, the first wirelessidentifier analyzes the radio frequency identification signal or theBluetooth identification signal, and the first authentication unitprocess the radio frequency identification signal or the Bluetoothidentification signal to confirm the correctness of the radio frequencyidentification signal or the Bluetooth identification signal.

Step S266: configuring the first authentication unit to confirm thecorrectness of the radio frequency identification signal. If the radiofrequency identification signal is determined to be correct, the methodproceeds to step S269, enabling the control unit to control the powermodule to output driving voltage to drive the atomization element of theatomization device to atomize the atomized medicine. If the radiofrequency identification signal is determined to be incorrect, themethod proceeds to step S267, the authentication fails, and the methodproceeds to step S268, where the process comes to an end. For example,if the first authentication unit determines that the wirelessidentification signal is incorrect, for example, the authentication unitcannot recognize the wireless radio frequency identification signal orthe Bluetooth identification signal served as the wirelessidentification signal, then the correspondingly output authenticationfailure signal may disable the control unit.

In certain cases, the first authentication module may also have thecapability of directly authenticating the authentication code carrier.For example, after the user device has performed the firstauthentication operation with the cloud server, the authenticationinformation of the wireless identification chip may be rewritten so thatthe first wireless identifier may directly perform the secondauthentication operation on the authentication information of thewireless identification chip, so as to save the time for performing thefirst authentication operation through the user device and the cloudserver every time the user needs to use the atomized medicine. On theother hand, when the user device is operated without network connectioncapability, or the user device is depleted of power, as long as theauthentication code carrier has performed the first authenticationoperation, the user may still directly use the atomized medicine throughthe atomization device.

Twenty-Third Embodiment

Reference is now made to FIG. 31, which is a flowchart of anauthentication operation according to the twenty-third embodiment of thepresent invention. This embodiment is mainly to exemplify the details ofthe authentication process described from step S252 to step S257 in theatomization method of the twenty-first embodiment, the method mayfurther include the following steps:

Step S270: configuring the second authentication module of the userdevice to perform an authentication operation related to anauthentication code carrier. As described above, the authenticationoperation may include identifying the two-dimensional barcode of theauthentication code carrier with the user device, or the user may inputthe authentication code through the authentication code input interface.The specific configuration of the user device may refer to FIGS. 16, 17and 18, respectively.

Optionally, the user may first perform step S271, obtaining the image ofthe 2D barcode through the image capturing module, and analyze the 2Dbarcode through the authentication unit to obtain the authenticationinformation.

Step S273: configuring the second authentication module to send theauthentication information to the cloud server through the secondcommunication module. After the authentication information is obtained,the authentication information may be an anti-counterfeit identificationcode having a specific coding sequence, and is transmitted to the cloudserver through the second communication module.

Step S274: configuring the cloud server to perform a comparisonoperation in a password database to obtain password informationcorresponding to the authentication information. Specifically, thepassword database may be pre-established according to a list of productssold by a pharmaceutical supplier, and the password database may have aplurality of unique authentication information, and multiple and uniquepasswords corresponding to the authentication information. After thecloud server receives the read authentication information, the cloudserver then performs a comparison operation in the password databaseaccording to the authentication information to obtain passwordinformation corresponding to the authentication information. Since thepassword database may be instantly updated by the supplier, the atomizedmedicine containers purchased by users may be ensured that those havenot been used and faked.

Step S275: determining whether the comparison is successful through thecloud server. After the above authentication operation, if thecomparison operation of the cloud server succeeds in obtaining thepassword information, the method proceeds to step S278, theauthentication result signal including the password information may betransmitted back to the authentication module. If the cloud serverdetermines that the authenticating code carrier is true, it can be knownthat the corresponding atomized medicine container is not forged, suchthat the user can use it with confidence.

If the cloud server determines that the atomized medicine container isfake in step S275, a corresponding authentication result signal isgenerated and transmitted to the user device. The method proceeds tostep S276, the authentication fails, and the authentication failuremessage may be displayed on the user device. The method proceeds to stepS277, where the process comes to an end.

Step S279: configuring the second authentication module to generate awireless identification signal. Specifically, the second authenticationoperation between the user device and the atomization device may beperformed through the Bluetooth identification signal.

The present embodiment utilizes the camera module or the user interfacethat is commonly provided in an existing smart phone, and also improvesthe convenience of the authentication. In addition, the doubleauthentication mechanism not only greatly increases the difficulty ofcounterfeiting the authentication code carrier, but also ensures thesecurity of data transmission, such that the counterfeit goods are notable to be used by the atomization device even if they are sold in themarket, thus protecting the lives and property of consumers.

The description of the different exemplary embodiments has beenpresented for purposes of illustration and description, and is notintended to be exhaustive or limited to the disclosure in the formdisclosed. Many modifications and variations will be apparent to thoseof ordinary skill in the art. Further, different exemplary embodimentsmay provide different advantages as compared to other exemplaryembodiments. The embodiment or embodiments selected are chosen anddescribed in order to best explain the principles of the disclosure, thepractical application, and to enable others of ordinary skill in the artto understand the disclosure for various embodiments with variousmodifications as are suited to the particular use contemplated.

What is claimed is:
 1. An atomization system having a doubleauthentication mechanism, comprising: at least one atomized medicinecontainer associated with an authentication code carrier, the at leastone atomized medicine container containing an atomized medicine; anatomization device, including: an atomization module having anaccommodating portion for accommodating the atomized medicine and anatomization element for atomizing the atomized medicine placed in theaccommodating portion; a power module for outputting a driving voltageto directly drive the atomization module; a control unit connected tothe power module, the control unit is configured to control the powermodule to output the driving voltage; and a first communication modulefor transmitting and receiving signals; a user device, including: aprocessor; a second communication module connected to the processor,configured to pair with the first communication module, and connected toa cloud server through a network; and an authentication module connectedto the processor, configured to perform an authentication operationrelated to the authentication code carrier, to determine an authenticityof the at least one atomized medicine container or the atomized drugthrough the cloud server, and to generate an authentication resultsignal correspondingly; and a value storing device, wherein theauthentication module is configured to determine whether to control thesecond communication module through the processor to transmit anauthentication success signal to the first communication moduleaccording to the authentication result signal, and wherein when thefirst communication module receives the authentication success signal,the control unit is configured to control the power module to output thedriving voltage according to the authentication success signal, whereinthe authentication code carrier further includes usage limitinformation, and the authentication operation includes configuring theauthentication module to determine whether the usage limit informationof the authentication code carrier reaches a predetermined limit amount,wherein the authentication operation includes further configuring theauthentication module to update the usage limit information after the atleast one atomized medicine container or the atomization medicine isdetermined to be true, and wherein the value storing device isconfigured to update the usage limit information of the authenticationcode carrier.
 2. The atomization system having the double authenticationmechanism according to claim 1, wherein the authentication moduleincludes a wireless identifier, the authentication code carrier includesa wireless identification chip, wireless identifier is configured toobtain authentication information of the wireless identification chip,the cloud server is configured to determine the authenticity of the atleast one atomized medicine container or the atomized medicine accordingto the authentication information, and to generate the authenticationresult signal correspondingly.
 3. The atomization system having thedouble authentication mechanism according to claim 2, wherein the cloudserver further includes a password database, and the authenticationmodule is configured to transmit the authentication information to thecloud server through the second communication module, the cloud serverperforms a comparison operation in the password database according tothe authentication information to obtain password informationcorresponding to the authentication information, and transmits theauthentication module back to generate the authentication result signalincluding the password information.
 4. The atomization system having thedouble authentication mechanism according to claim 1, wherein theauthentication code carrier further includes a two-dimensional barcode,and the authentication module is further configured to identify thetwo-dimensional barcode to generate authentication information, and theauthentication module is configured to transmit the authenticationinformation to the cloud server, the cloud server performs a comparisonoperation in a password database according to the authenticationinformation to obtain password information corresponding to theauthentication information, and transmits the password information backto the authentication module to generate the authentication successsignal containing the password information.
 5. The atomization systemhaving the double authentication mechanism according to claim 1, whereinthe authentication module further includes an authentication code inputinterface, the authentication code input interface is configured for auser to input authentication information of the authentication codecarrier, and the authentication module is further configured todetermine the authenticity of the at least one atomized medicinecontainer or the atomized medicine according to the authenticationinformation, and to generate the authentication result signalcorrespondingly.
 6. The atomization system having the doubleauthentication mechanism according to claim 1, wherein the number of theat least one atomized medicine container is plural, and the plurality ofatomized medicine containers are associated with the authentication codecarrier.
 7. An atomization system having a double authenticationmechanism, comprising: at least one atomized medicine container havingan authentication code carrier, the at least one atomized medicinecontainer containing an atomized medicine; an atomization device,including: an atomization module having an accommodating portion foraccommodating the atomized medicine and an atomization element foratomizing the atomized medicine placed in the accommodating portion; apower module for outputting a driving voltage to directly drive theatomization module; a control unit connected to the power module, thecontrol unit is configured to control the power module to output thedriving voltage; an antenna module for transmitting and receivingsignals; and a first authentication module respectively connected to thecontrol unit and the antenna module; a user device, including: aprocessor; a communication module connected to the processor andconnected to a cloud server through a network; and a secondauthentication module connected to the processor, configured to performa first authentication operation associated with the authentication codecarrier to determine the authenticity of the at least one atomizedmedicine container or the atomized medicine through the cloud server,and to generate an authentication result signal correspondingly; and avalue storing device, wherein the second authentication module isconfigured to determine whether to generate a wireless identificationsignal according to the authentication result signal, wherein when theantenna module receives the wireless identification signal, the firstauthentication module is configured to perform a second authenticationoperation related to the wireless identification signal, and to furtherdetermine whether to enable the control unit to control the power moduleto output the driving voltage, wherein the authentication code carrierfurther includes usage limit information, and the first authenticationoperation includes configuring the second authentication module todetermine whether the usage limit information of the authentication codecarrier reaches a predetermined limit amount, wherein the firstauthentication operation includes further configuring the secondauthentication module to update the usage limit information after the atleast one atomized medicine container or the atomization medicine isdetermined to be true, wherein the value storing device is configured toupdate the usage limit information of the authentication code carrier.8. The atomization system having the double authentication mechanismaccording to claim 7, wherein the first authentication module includes afirst wireless identifier configured to receive the wirelessidentification signal through the antenna module and to determinewhether to enable the control unit to control the power module to outputthe driving voltage according to the wireless identification signal. 9.The atomization system having the double authentication mechanismaccording to claim 8, wherein the wireless identification signal is aradio frequency identification signal or a Bluetooth identificationsignal, and the second authentication module is configured to receivethe authentication result signal and to determine whether to generatethe radio frequency identification signal or the Bluetoothidentification signal according to the authentication result signal. 10.The atomization system having the double authentication mechanismaccording to claim 7, wherein the second authentication module includesa second wireless identifier, and the authentication code carrierincludes a wireless identification chip, and the second wirelessidentifier is configured to obtain authentication information of thewireless identification chip.
 11. The atomization system having thedouble authentication mechanism according to claim 10, wherein the cloudserver further includes a password database, and the authenticationmodule is configured to transmit the authentication information to thecloud server through the second communication module, the cloud serverperforms a comparison operation in the password database according tothe authentication information to obtain password informationcorresponding to the authentication information, and transmits theauthentication module back to generate the authentication result signalincluding the password information.
 12. The atomization system havingthe double authentication mechanism according to claim 7, wherein theauthentication code carrier further includes a two-dimensional barcode,the second authentication module is further configured to identify thetwo-dimensional barcode to generate authentication information, thesecond authentication module is configured to transmit theauthentication information to the cloud server, the cloud serverperforms a comparison operation in a password database according to theauthentication information to obtain password information correspondingto the authentication information, and transmits the passwordinformation back to the authentication module to generate theauthentication success signal containing the password information. 13.The atomization system having the double authentication mechanismaccording to claim 7, wherein the authentication module further includesan authentication code input interface configured for a user to inputauthentication information of the authentication code carrier, and thesecond authentication module is further configured to determine theauthenticity of the at least one atomized medicine container or theatomized medicine according to the authentication information, and togenerate the authentication result signal correspondingly.
 14. Theatomization system having the double authentication mechanism accordingto claim 7, wherein the number of the at least one atomized medicinecontainer is plural, and the plurality of atomized medicine containersare associated with the authentication code carrier.