CN103065168A - Anti-fake method and system of radio frequency identification - Google Patents

Anti-fake method and system of radio frequency identification Download PDF

Info

Publication number
CN103065168A
CN103065168A CN2012105536177A CN201210553617A CN103065168A CN 103065168 A CN103065168 A CN 103065168A CN 2012105536177 A CN2012105536177 A CN 2012105536177A CN 201210553617 A CN201210553617 A CN 201210553617A CN 103065168 A CN103065168 A CN 103065168A
Authority
CN
China
Prior art keywords
certificate server
code
product
random code
sequence number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012105536177A
Other languages
Chinese (zh)
Other versions
CN103065168B (en
Inventor
王涛
钟衍徽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Netcom Commercial Equipment Co., Ltd.
Shenzhen Netcom Electronics Co Ltd
Original Assignee
SHENZHEN NETCOM COMMERCIAL EQUIPMENT CO Ltd
Shenzhen Netcom Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN NETCOM COMMERCIAL EQUIPMENT CO Ltd, Shenzhen Netcom Electronics Co Ltd filed Critical SHENZHEN NETCOM COMMERCIAL EQUIPMENT CO Ltd
Priority to CN201210553617.7A priority Critical patent/CN103065168B/en
Publication of CN103065168A publication Critical patent/CN103065168A/en
Application granted granted Critical
Publication of CN103065168B publication Critical patent/CN103065168B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention is suitable for the technical field of radio frequency identification, and provides an anti-fake method and a system of radio frequency identification. The anti-fake method comprises that a near field wireless communication (NFC) device reads the information inside the radio frequency identification, and the information comprises safety parameters and chained addresses of authentication servers. The NFC device accesses the corresponding authentication server according to the chained addresses, and sends the safety parameters to the authentication server to certify. The authentication servers carry out authentication to the safety parameters after receiving the safety parameters, and make corresponding prompting according to authentication results. In a product authentication process, the anti-fake method and the system of the radio frequency identification need no dedicated certification tools, any terminal device with wireless communication and web-surfacing functions can be used as an authentication device, and therefore the problem that the effective utilizing is restricted due to the incompatibility of an existing radio frequency identification system is solved. The authentication process is simple, convenient and fast, and the anti-fake method and the system of the radio frequency identification have strong practicality.

Description

A kind of electronic tag method for anti-counterfeit and system
Technical field
The invention belongs to the REID field, relate in particular to a kind of electronic tag method for anti-counterfeit and system.
Background technology
Radio-frequency (RF) identification (Radio Frequency Identification, RFID) technology, claim again electronic tag, radio frequency identification, it is a kind of communication technology, can identify specific objective and read and write related data by radio signals, and need not to set up machinery between recognition system and the specific objective or optics contacts.Identifying need not manual intervention, is applicable to various environment, can be used in control, detection and tracking specific objective etc.
Radio-frequency recognition system mainly comprises reader (Reader), electronic tag (TAG) and three parts of application software system, its principle of work is that reader is launched the radio wave energy of a characteristic frequency to electronic tag, in order to drive the electronic tag circuit data of inside are sent, the reader receive data is also processed.
At present, what the leading firm of radio-frequency recognition system provided all is special-purpose system, and need special-purpose reader, therefore different application is adopted frequency, consensus standard and the reader of different vendor with different industries, thereby causes radio-frequency recognition system incompatible.This incompatible and dedicated reader has restricted the particularly false proof effective utilization of radio frequency of whole radio-frequency (RF) identification industry.
Summary of the invention
The purpose of the embodiment of the invention is to provide a kind of electronic tag method for anti-counterfeit and system, to solve the problem of the existing false proof effective utilization of the incompatible restriction radio frequency of radio-frequency recognition system.
The embodiment of the invention is achieved in that a kind of electronic tag method for anti-counterfeit, and described method comprises:
Information in the close range wireless communication NFC equipment reading electronic labels, described information comprises the chained address of security parameter and certificate server;
NFC equipment is accessed corresponding certificate server according to described chained address, and described security parameter is sent to described certificate server authentication;
Certificate server is verified described security parameter after receiving described security parameter, is made corresponding prompting according to the result.
Another purpose of the embodiment of the invention is to provide a kind of electronic tag Antiforge system, and described system comprises:
Electronic tag, close range wireless communication NFC equipment and certificate server;
Described NFC equipment, be used for reading the information in the described electronic tag, described information comprises the chained address of security parameter and certificate server, accesses corresponding certificate server according to described chained address, and described security parameter is sent to described certificate server authentication;
Described certificate server is used for receiving described security parameter, and the described security parameter that receives is verified, makes corresponding prompting according to the result.
A kind of close range wireless communication equipment, described close range wireless communication equipment comprises:
The information reading unit is used for the information in the reading electronic labels, and described information comprises the chained address of security parameter and certificate server;
First information transmitting element, corresponding certificate server is accessed in the chained address that is used for reading according to described information reading unit, and the described security parameter that will read sends to described certificate server authentication, so that described certificate server is behind the described security parameter that receives, described security parameter is verified, made corresponding prompting according to the result.
A kind of certificate server, described certificate server comprises:
Information receiving unit be used for to receive the security parameter that close range wireless communication NFC equipment sends, the described security parameter information that to be described NFC equipment read in the electronic tag;
Authentication unit is used for the described security parameter that described information receiving unit receives is verified, and makes corresponding prompting according to the result.
The beneficial effect that the embodiment of the invention compared with prior art exists is: the security parameter of pre-stored product certification and the chained address of certificate server in the electronic tag, read security parameter and chained address in the described electronic tag by NFC equipment, and according to certificate server corresponding to described chained address access, described security parameter is sent to described certificate server authentication, certificate server is made corresponding prompting according to authentication result, and whether whether the authentication authorization and accounting product be certified products or be used etc.The embodiment of the invention is in Product Certification, do not need special-purpose authentication means, the terminal device that has arbitrarily wireless telecommunications and function of surfing the Net can be as authentication means, thereby can effectively solve the problem of the existing false proof effective utilization of the incompatible restriction radio frequency of radio-frequency recognition system.And the verification process of the embodiment of the invention simply, easily and fast, and product can repeatedly authenticate before not losing efficacy, and had stronger practicality.
Description of drawings
In order to be illustrated more clearly in the technical scheme in the embodiment of the invention, the below will do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art, apparently, accompanying drawing in the following describes only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the scene synoptic diagram of the electronic tag Antiforge system that provides of the embodiment of the invention one;
Fig. 2 is the interaction diagrams of the electronic tag method for anti-counterfeit that provides of the embodiment of the invention two;
Fig. 3 is the Product Validation exemplary plot that the embodiment of the invention two provides;
Fig. 4 is the composition structural drawing of the NFC equipment that provides of the embodiment of the invention three;
Fig. 5 is the composition structural drawing of the certificate server that provides of the embodiment of the invention four.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, is not intended to limit the present invention.
For technical solutions according to the invention are described, describe below by specific embodiment.
Embodiment one:
Fig. 1 shows the scene of the electronic tag Antiforge system that the embodiment of the invention one provides, the described electronic tag method for anti-counterfeit of the embodiment of the invention can be applicable in the described electronic tag Antiforge system, for convenience of explanation, only show the part relevant with the embodiment of the invention.
As shown in Figure 1, this system comprises close range wireless communication (Near Field Communication, NFC) equipment 1, certificate server 2 and electronic tag 3.
Wherein, described NFC equipment 1 can be the terminal device that has arbitrarily wireless telecommunications and function of surfing the Net, includes but not limited to mobile phone.
Described certificate server 2 can be single server, also can be the server end that jointly is comprised of several function servers.Described certificate server 2 has data-handling capacity, stores the data such as the unique identifier (ID), decruption key of various product and relevant identity in the described certificate server 2, for external world's access, the checking product whether certified products, whether be used etc.
Electronic tag 3(generally places in the packing of product) in store the data such as product IDs, described electronic tag 3 also is built-in with random code generator and sequence number generator.The effect of described random code generator and sequence number generator is so that NFC equipment 1 at every turn when reading electronic labels 3, all can produce a new random code and sequence number, avoids occurring on the same product IDs identical random code and sequence number.Random code with sequence number so that the enciphered data that each electronic tag 3 returns is not identical, thereby improve the difficulty that cracks.
In the present embodiment, the information in NFC equipment 1 reading electronic labels 3, described information comprises the chained address of security parameter and certificate server;
NFC equipment 1 is accessed corresponding certificate server 2 according to described chained address, and described security parameter is sent to described certificate server 2 authentications;
Certificate server 2 is verified described security parameter after receiving described security parameter, is made corresponding prompting according to the result.
Further be, described security parameter comprises product IDs (expressly) and ciphertext parameter, and described ciphertext parameter is the parameter that obtains after electronic tag 3 utilizes random code that preset-key produces random code generator and sequence number generator and sequence number to be encrypted;
Described certificate server 2 specifically is used for, after receiving described security parameter, judge whether the product IDs in the described security parameter is effective, if effectively, obtain the decruption key of this product, and by described decruption key described ciphertext parameter is decrypted, obtain decrypted result, and described decrypted result verified, make corresponding prompting according to the result.
Wherein, described decrypted result comprises random code and sequence number;
Further be, described certificate server 2 is after obtaining described decrypted result, further judge whether the random code in the described decrypted result is effective, if effectively, judge described sequence number whether larger than the sequence number of having stored in the described certificate server and/or with described certificate server in the sequence number of having stored meet default rule; If then pointing out described product is certified products, and store current described sequence number, compare when authenticating for next time.
Further, described security parameter can also comprise the first verification random code (expressly), and described the first verification random code is a regular part in the described random code, for example odd bits, or even bit, perhaps its last four etc.;
Described certificate server 2 is when judging described random code, specifically judge whether described the first verification random code is identical with the second verification random code, if identical, judge again described sequence number whether larger than the sequence number of having stored in the described certificate server and/or with described certificate server in the sequence number of having stored meet default rule; If then pointing out described product is certified products, and store current described sequence number, compare when authenticating for next time.Wherein said the second verification random code is the random code of extracting according to default rule from described random code.
Need to prove that described sequence number can be natural number or other character, sequence number increases progressively or regular variation after every authentication once, and this variation can be detected by certificate server 2 the priority rule of sequence number, for example presses odd number progressive law 3,5,7 ...
The effect of sequence number is to prevent from being submitted to the verify data repetition of certificate server 2 and judging the order of working as time recognition data.For example, product placement is on sales counter, someone thought that before buying the shop-assistant authenticates whether certified products of this product then and there, the shop-assistant can be without the authentication of number of times restriction so, it is all different to obtain random code during each authentication, and sequence number all can change by preset algorithm, thereby can repeat authentication and do not affect authentication next time.
As a preferred embodiment of the present invention, because the authentication of the certified products of product can not guarantee that product is not used, present embodiment has also increased the inefficacy authentication to product, is specially:
NFC equipment 1 receives the inefficacy code of user's input, and described inefficacy code is sent to described certificate server 2;
Certificate server 2 is after receiving described inefficacy code, the product labelling that the described code that lost efficacy is corresponding was for losing efficacy, be that this product is used, be failure state, this product IDs of any submission and all point out this product to lose efficacy with random code corresponding to this product IDs, the authentication of sequence number is used afterwards;
Wherein, described inefficacy code is associated with product IDs, described inefficacy code bit is not used the invisible position of front user in product, namely only being in visual state after product is used (need to prove, visual state when the described inefficacy code of production tense marker is not then within this scope), this code that lost efficacy be cannot see in the position of " coming again one bottle " when this position class is seemingly had a drink when product does not use.
Need to prove that system's scene that present embodiment provides only is used for explaining the present invention, does not limit protection scope of the present invention.
Embodiment two:
Fig. 2 shows the interaction flow of the electronic tag method for anti-counterfeit that the second embodiment provides, and details are as follows for the method process:
In step S201, the information in the close range wireless communication NFC equipment reading electronic labels.
In the present embodiment, described information includes but not limited to the chained address of security parameter and certificate server.Described security parameter includes but not limited to product IDs (expressly) and ciphertext parameter, and described ciphertext parameter is the parameter that obtains after electronic tag utilizes random code (expressly) that preset-key produces random code generator and sequence number generator and sequence number (expressly) to be encrypted.
In step S202, NFC equipment is accessed corresponding certificate server according to described chained address, and described security parameter is sent to described certificate server authentication.
In the present embodiment, described certificate server can be the server under enterprise or the Third Party Authentication mechanism.Store the data such as unique identifier (ID), decruption key, random code, sequence number of various product in the described certificate server, whether be certified products and/or whether be used etc. for the external certificate product.
In step S203, certificate server is verified described security parameter after receiving described security parameter, is made corresponding prompting according to the result.
Wherein, described described security parameter is verified, is made corresponding prompting according to the result and specifically comprise:
Judge whether described product IDs is effective;
If effectively, obtain the decruption key of this product, and by described decruption key described ciphertext parameter is decrypted, obtain decrypted result, and described decrypted result is verified, make corresponding prompting according to the result; If invalid, do not store this product IDs in the authentication authorization and accounting server, then checking finishes, the non-certified products of prompting product.
Wherein, described decrypted result includes but not limited to random code and sequence number;
Further, described described decrypted result is verified, is made corresponding prompting according to the result and specifically comprise:
Judge whether described random code is effective;
If effectively, judge described sequence number whether larger than the sequence number of having stored in the described certificate server and/or with described certificate server in the sequence number of having stored meet default rule; If invalid, then checking finishes, the non-certified products of prompting product;
If then pointing out described product is certified products, and store current described sequence number, compare when authenticating for next time; If not, then checking finishes, the non-certified products of prompting product.
In the present embodiment, the pre-stored sequence number that legal authentication arranged and described sequence number legal judgment principle whether in the certificate server, the rule that namely meets.The sequence number of the current sequence number after certificate server will be deciphered and the legal authentication of authentication server stores compares, if current sequence number is larger and/or meet default rule than the sequence number of described legal authentication, think that then this time authentication is legal, current sequence number (being the sequence number of this authentication) is stored in the certificate server; Otherwise, think that this authentication is illegal, checking finishes, the non-certified products of prompting product.
For example, the sequence number rule is defaulted as by the odd number incremental variations, the sequence number of last legal checking is 1, multiple authentication after reaching so for the second time, sequence number after the deciphering is 3 successively, 5,7,9 ... the time just regard as certified products, if the sequence number after the deciphering of submitting to when once verifying is 2,4,8, then obviously sequence number has problem, and in the situation of certified products, the sequence number that each authentication is submitted to is all not identical with any once authenticated sequence number of submitting to for certified products in front, and greater than previous sequence number, namely last sequence number is 1, and sequence number be just to be certified products more than or equal to 3 o'clock after the next time deciphering.
Further, described security parameter also comprises the first verification random code (expressly), and described the first verification random code is a regular part in the described random code, for example odd bits, or even bit, perhaps its last four etc.
Described certificate server judges specifically whether described the first verification random code is identical with the second verification random code when judging described random code, if not identical, then checking finishes, the non-certified products of prompting product; If identical, judge again described sequence number whether larger than the sequence number of having stored in the described certificate server and/or with described certificate server in the sequence number of having stored meet default rule; If then pointing out described product is certified products, and store current described sequence number, compare when authenticating for next time.Wherein said the second verification random code is the random code of extracting according to default rule from described random code.
Illustrate, as shown in Figure 3, comprise product IDs in the electronic tag: 123456 and the sequence number that produces: 1357, random code: ABCDEF01, default key, by default key to described sequence number: 1357 and random code: ABCDEF01 be encrypted and obtain ciphertext parameter A bcdefghjklm, and the first verification random code EF01, in the present embodiment, the rule of obtaining of the first school, two verification random codes is to get last four of random code.During the information of NFC equipment in reading electronic labels, obtain security parameter, described security parameter is that 123456Abcdefghjklm EFO1(comprises product IDs: 123456, ciphertext parameter: Abcdefghjklm and the first verification random code: EF01), NFC sends to certificate server with described security parameter, certificate server verifies first whether described product IDs is effective, whether the described product IDs of storage is arranged: 123456 in the authentication authorization and accounting server, if effectively, then described ciphertext parameter is decrypted, obtains sequence number: 1357 and random code: ABCDEF01.
Preferably, when being certified products by the such scheme certified product, can not guarantee that this product is not used, because the words that the product after using authenticates again also are certified products, for fear of this kind situation, present embodiment has also increased the inefficacy authentication to product, is specially:
NFC equipment receives the inefficacy code of user's input, and described inefficacy code is sent to described certificate server;
Certificate server is after receiving described inefficacy code, the product labelling that the described code that lost efficacy is corresponding was for losing efficacy, and namely this product has been used, and is failure state, this product IDs of any submission and all point out this product to lose efficacy with random code corresponding to this product IDs, the authentication of sequence number is used afterwards.
Wherein, described inefficacy code is associated with product IDs, and described inefficacy code bit is not used the invisible position of front user in product, namely only is in visual state after product is used, this code that lost efficacy be cannot see in the position of " coming again one bottle " when this position class is seemingly had a drink when product does not use.
In the present embodiment, receive the to lose efficacy mode of code of certificate server can have various ways, for example receives by note or when NFC device access certification page, this page has the code of an inefficacy dialog box, and the code that will lose efficacy is passed to this dialog box submission and gets final product.
Further, for the encourage consumer uses the product failure authentication, can be after the consumer initiatively use the product failure authentication (after namely sending the code that lost efficacy), certificate server sends the awards such as the preferential Securities of electronics or integration for checking NFC equipment.
Embodiment three:
Fig. 4 shows the composition structure of the NFC equipment that third embodiment of the invention provides, and this NFC equipment is applied to for convenience of explanation, only show the part relevant with the embodiment of the invention in as shown in Figure 1 the electronic tag Antiforge system.
This NFC equipment 1 comprises information reading unit 11 and first information transmitting element 12.Wherein, the concrete function of each unit is as follows:
Information reading unit 11 is used for the information in the reading electronic labels, and described information comprises the chained address of security parameter and certificate server;
First information transmitting element 12, corresponding certificate server is accessed in the chained address that is used for reading according to described information reading unit 11, and the described security parameter that will read sends to described certificate server authentication, so that described certificate server is behind the described security parameter that receives, described security parameter is verified, made corresponding prompting according to the result.
Further, it is characterized in that described NFC equipment 1 also comprises:
Information receiving unit 13 is used for receiving the inefficacy code of inputting;
The second information transmitting unit 14 is used for the described inefficacy code that described information receiving unit 13 receives is sent to described certificate server, so that described certificate server is after receiving described inefficacy code, the product labelling that the described code that lost efficacy is corresponding was for losing efficacy;
Wherein, described inefficacy code is associated with product IDs, and described inefficacy code bit is not used the invisible position of front user in product, namely only is in visual state after product is used.
Embodiment four:
Fig. 5 shows the composition structure of the certificate server that fourth embodiment of the invention provides, and this certificate server is applied to for convenience of explanation, only show the part relevant with the embodiment of the invention in as shown in Figure 1 the electronic tag Antiforge system.
This certificate server 2 comprises information receiving unit 21 and authentication unit 22.Wherein, the concrete function of each unit is as follows:
Information receiving unit 21 be used for to receive the security parameter that close range wireless communication NFC equipment sends, the described security parameter information that to be described NFC equipment read in the electronic tag;
Authentication unit 22 is used for the described security parameter that described information receiving unit 21 receives is verified, and makes corresponding prompting according to the result.
Further, it is characterized in that described security parameter comprises product unique identifier ID and ciphertext parameter;
Described authentication unit 22 comprises:
Judge module 221 is used for judging whether described product IDs is effective;
Authentication module 222 is used in described judge module 221 judged results obtaining the decruption key of this product when being, and by described decruption key described ciphertext parameter is decrypted, obtain decrypted result, and described decrypted result is verified, make corresponding prompting according to the result.
Further, described decrypted result comprises random code and sequence number;
Described authentication module 222 also comprises:
First judges submodule 2221, is used for judging whether described random code is effective;
Second judges submodule 2222, be used for judging submodule 2221 judged results when being described first, judge described sequence number whether than the sequence number of having stored in the described certificate server greatly or with described certificate server in the sequence number of having stored meet default rule;
Checking submodule 2223 is used for judging submodule 2222 judged results when being described second that pointing out described product is certified products, and stores current described sequence number, comparison when authenticating for next time.
Further, described security parameter also comprises the first verification random code;
Described second judges submodule 2222, concrete being used for judges that described first the submodule judged result is when being, judge whether described the first verification random code is identical with the second verification random code, wherein said the second verification random code is the random code of extracting according to default rule from described random code.
Further, described certificate server 2 also comprises:
Inefficacy authentication module 23 is used for receiving the inefficacy code that described NFC equipment sends, and the product labelling that the described code that lost efficacy is corresponding was for losing efficacy;
Wherein, described inefficacy code is associated with product IDs, and described inefficacy code bit is not used the invisible position of front user in product, namely only is in visual state after product is used.
The those skilled in the art can be well understood to, be the convenience described and succinct, only the division with above-mentioned each functional unit, module is illustrated, in the practical application, can as required the above-mentioned functions distribution be finished by different functional units or module, the inner structure that is about to device is divided into different functional units or module, to finish all or part of function described above.Each functional unit among the embodiment, module can be integrated in the processing unit, also can be that the independent physics of unit exists, also can be integrated in the unit two or more unit, above-mentioned integrated unit both can adopt the form of hardware to realize, also can adopt the form of SFU software functional unit to realize.In addition, the concrete title of each functional unit, module also just for the ease of mutual differentiation, is not limited to the application's protection domain.The specific works process of unit, module in the said apparatus can with reference to the corresponding process among the preceding method embodiment, not repeat them here.
In sum, whether the embodiment of the invention can be certified products by the various ways such as product IDs, random code and sequence number checking product, has improved greatly the accuracy of product certification.But also can whether be used by the mode certified product of product failure authentication, in the certified products verification process of product, can't guarantee the problem that product is not used to solve prior art.In addition, the embodiment of the invention is in Product Certification, do not need special-purpose authentication means, the terminal device that has arbitrarily wireless telecommunications and function of surfing the Net can be as authentication means, thereby can effectively solve the problem of the existing false proof effective utilization of the incompatible restriction radio frequency of radio-frequency recognition system.The verification process of the embodiment of the invention simply, easily and fast, accuracy rate is high, and product can repeatedly not authenticate before losing efficacy, and had stronger practicality.
Those of ordinary skills it is also understood that, realize that all or part of step in above-described embodiment method is to come the relevant hardware of instruction to finish by program, described program can be in being stored in a computer read/write memory medium, described storage medium comprises ROM/RAM, disk, CD etc.
Above content is the further description of the present invention being done in conjunction with concrete preferred implementation, can not assert that implementation of the present invention is confined to these explanations.For the general technical staff of the technical field of the invention; make without departing from the inventive concept of the premise some alternative or obvious modification that are equal to; and performance or purposes are identical, all should be considered as belonging to the scope of patent protection that the present invention is determined by claims of submitting to.

Claims (17)

1. an electronic tag method for anti-counterfeit is characterized in that, described method comprises:
Information in the close range wireless communication NFC equipment reading electronic labels, described information comprises the chained address of security parameter and certificate server;
NFC equipment is accessed corresponding certificate server according to described chained address, and described security parameter is sent to described certificate server authentication;
Certificate server is verified described security parameter after receiving described security parameter, is made corresponding prompting according to the result.
2. the method for claim 1 is characterized in that, described security parameter comprises product unique identifier ID and ciphertext parameter;
Described described security parameter is verified, is made corresponding prompting according to the result and specifically comprise:
Judge whether described product IDs is effective;
If effectively, obtain the decruption key of this product, and by described decruption key described ciphertext parameter is decrypted, obtain decrypted result, and described decrypted result is verified, make corresponding prompting according to the result.
3. method as claimed in claim 2 is characterized in that, described decrypted result comprises random code and sequence number;
Described described decrypted result is verified, is made corresponding prompting according to the result and specifically comprise:
Judge whether described random code is effective;
If effectively, judge described sequence number whether larger than the sequence number of having stored in the described certificate server and/or with described certificate server in the sequence number of having stored meet default rule;
If then pointing out described product is certified products, and store current described sequence number, compare when authenticating for next time.
4. method as claimed in claim 3 is characterized in that, described security parameter also comprises the first verification random code;
Describedly judge whether described random code effectively specifically comprises:
Judge whether described the first verification random code is identical with the second verification random code, wherein said the second verification random code is the random code of extracting according to default rule from described random code.
5. the method for claim 1 is characterized in that, described method also comprises:
NFC equipment receives the inefficacy code of input, and described inefficacy code is sent to described certificate server;
Certificate server is after receiving described inefficacy code, and the product labelling that the described code that lost efficacy is corresponding was for losing efficacy;
Wherein, described inefficacy code is associated with product IDs, and described inefficacy code only is in visual state after product is used.
6. an electronic tag Antiforge system is characterized in that, described system comprises:
Electronic tag, close range wireless communication NFC equipment and certificate server;
Described NFC equipment, be used for reading the information in the described electronic tag, described information comprises the chained address of security parameter and certificate server, accesses corresponding certificate server according to described chained address, and described security parameter is sent to described certificate server authentication;
Described certificate server is used for receiving described security parameter, and the described security parameter that receives is verified, makes corresponding prompting according to the result;
Described electronic tag for generation of random code and sequence number, and is encrypted described random code and sequence number by preset-key.。
7. system as claimed in claim 6 is characterized in that, described security parameter comprises product unique identifier ID and ciphertext parameter;
Described authentication service implement body is used for:
Judge whether described product IDs is effective;
If effectively, obtain the decruption key of this product, and by described decruption key described ciphertext parameter is decrypted, obtain decrypted result, and described decrypted result is verified, make corresponding prompting according to the result.
8. system as claimed in claim 7 is characterized in that, described decrypted result comprises random code and sequence number;
Described authentication service implement body also is used for:
Judge whether described random code is effective;
If effectively, judge described sequence number whether larger than the sequence number of having stored in the described certificate server and/or with described certificate server in the sequence number of having stored meet default rule;
If then pointing out described product is certified products, and store current described sequence number, compare when authenticating for next time.
9. system as claimed in claim 8 is characterized in that, described security parameter also comprises the first verification random code;
Described authentication service implement body is used for:
Judge whether described the first verification random code is identical with the second verification random code, wherein said the second verification random code is the random code of extracting according to default rule from described random code.
10. system as claimed in claim 6 is characterized in that, described NFC equipment also is used for, and receives the inefficacy code of input, and described inefficacy code is sent to described certificate server;
Described certificate server also is used for, and after receiving described inefficacy code, the product labelling that the described code that lost efficacy is corresponding was for losing efficacy;
Wherein, described inefficacy code is associated with product IDs, and described inefficacy code only is in visual state after product is used.
11. a close range wireless communication equipment is characterized in that, described close range wireless communication equipment comprises:
The information reading unit is used for the information in the reading electronic labels, and described information comprises the chained address of security parameter and certificate server;
First information transmitting element, corresponding certificate server is accessed in the chained address that is used for reading according to described information reading unit, and the described security parameter that will read sends to described certificate server authentication, so that described certificate server is behind the described security parameter that receives, described security parameter is verified, made corresponding prompting according to the result.
12. close range wireless communication equipment as claimed in claim 11 is characterized in that, described close range wireless communication equipment also comprises:
Information receiving unit is used for receiving the inefficacy code of inputting;
The second information transmitting unit is used for the described inefficacy code that described information receiving unit receives is sent to described certificate server, so that described certificate server is after receiving described inefficacy code, the product labelling that the described code that lost efficacy is corresponding was for losing efficacy;
Wherein, described inefficacy code is associated with product IDs, and described inefficacy code only is in visual state after product is used.
13. a certificate server is characterized in that, described certificate server comprises:
Information receiving unit be used for to receive the security parameter that close range wireless communication NFC equipment sends, the described security parameter information that to be described NFC equipment read in the electronic tag;
Authentication unit is used for the described security parameter that described information receiving unit receives is verified, and makes corresponding prompting according to the result.
14. certificate server as claimed in claim 13 is characterized in that, described security parameter comprises product unique identifier ID and ciphertext parameter;
Described authentication unit specifically comprises:
Judge module is used for judging whether described product IDs is effective;
Authentication module is used in described judge module judged result obtaining the decruption key of this product when being, and by described decruption key described ciphertext parameter is decrypted, obtain decrypted result, and described decrypted result is verified, make corresponding prompting according to the result.
15. certificate server as claimed in claim 14 is characterized in that, described decrypted result comprises random code and sequence number;
Described authentication module specifically also comprises:
First judges submodule, is used for judging whether described random code is effective;
Second judges submodule, is used for judging the submodule judged result when being described first, judge described sequence number whether than the sequence number of having stored in the described certificate server greatly or with described certificate server in the sequence number of having stored meet default rule;
The checking submodule is used for judging the submodule judged result when being described second that pointing out described product is certified products, and stores current described sequence number, comparison when authenticating for next time.
16. certificate server as claimed in claim 15 is characterized in that, described security parameter also comprises the first verification random code;
Described second judges submodule, concrete being used for judges that described first the submodule judged result is when being, judge whether described the first verification random code is identical with the second verification random code, wherein said the second verification random code is the random code of extracting according to default rule from described random code.
17. certificate server as claimed in claim 13 is characterized in that, described certificate server also comprises:
The inefficacy authentication ' unit is used for receiving the inefficacy code that described NFC equipment sends, and the product labelling that the described code that lost efficacy is corresponding was for losing efficacy;
Wherein, described inefficacy code is associated with product IDs, and described inefficacy code only is in visual state after product is used.
CN201210553617.7A 2012-12-19 2012-12-19 A kind of electronic tag method for anti-counterfeit and system Active CN103065168B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210553617.7A CN103065168B (en) 2012-12-19 2012-12-19 A kind of electronic tag method for anti-counterfeit and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210553617.7A CN103065168B (en) 2012-12-19 2012-12-19 A kind of electronic tag method for anti-counterfeit and system

Publications (2)

Publication Number Publication Date
CN103065168A true CN103065168A (en) 2013-04-24
CN103065168B CN103065168B (en) 2016-05-11

Family

ID=48107791

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210553617.7A Active CN103065168B (en) 2012-12-19 2012-12-19 A kind of electronic tag method for anti-counterfeit and system

Country Status (1)

Country Link
CN (1) CN103065168B (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103326864A (en) * 2013-06-24 2013-09-25 詹万泉 Electronic tag anti-fake authentication method
CN103559466A (en) * 2013-11-01 2014-02-05 中国联合网络通信集团有限公司 NFC application processing method, terminal and server
CN103607283A (en) * 2013-12-04 2014-02-26 *** Target authentication method based on mobile device and authentication center
CN103763007A (en) * 2014-01-07 2014-04-30 张诗悦 Identification method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology
CN103927664A (en) * 2014-03-20 2014-07-16 林清华 Product verification method
CN104320250A (en) * 2014-08-12 2015-01-28 北京傲飞商智软件有限公司 Anti-counterfeiting authentication method based on NFC chip
CN104766211A (en) * 2014-01-06 2015-07-08 塞米西斯科株式会社 Genuine product authentication system and method thereof
CN105184587A (en) * 2015-09-22 2015-12-23 深圳市裕盛星文化传播有限公司 Anti-counterfeiting method, anti-counterfeiting device and anti-counterfeiting system
CN107038587A (en) * 2016-02-04 2017-08-11 北京童讯风联科技有限责任公司 A kind of Bluetooth label verified based on service end and its method for anti-counterfeit
CN107483427A (en) * 2017-08-09 2017-12-15 北京冠霖环如科技有限公司 A kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips
CN107886333A (en) * 2016-09-29 2018-04-06 珠海晶通科技有限公司 A kind of Antiforge system and its method for anti-counterfeit with dynamic anti-fake information
US10019604B2 (en) 2014-10-31 2018-07-10 Xiaomi Inc. Method and apparatus of verifying terminal and medium
CN108388938A (en) * 2018-03-15 2018-08-10 华大半导体有限公司 Antifalsification label
CN109428718A (en) * 2017-08-30 2019-03-05 江苏稻源微电子有限公司 A kind of NFC label chip with dynamic encryption image feature
CN109472624A (en) * 2018-11-14 2019-03-15 李小文 Method for anti-counterfeit, Antiforge electronic drop and system based on electronics drop
CN110516491A (en) * 2019-08-30 2019-11-29 上海应用技术大学 The information coding coding/decoding method anti-fake for books
CN110533128A (en) * 2019-08-21 2019-12-03 上海唯链信息科技有限公司 A kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption
CN113343318A (en) * 2021-06-30 2021-09-03 浙江德鲸数字科技有限公司 Data processing method, device, equipment and medium
CN114492489A (en) * 2022-01-24 2022-05-13 芯电智联(北京)科技有限公司 NFC label verification system based on dynamic data
CN117221877A (en) * 2023-09-03 2023-12-12 广东高芯国际物联网科技有限公司 Safety verification and transmission method applied to frequency radio field data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090258678A1 (en) * 2008-04-09 2009-10-15 Ven Chava System and method for storing and retrieving multimedia messages on low-cost tags in order to facilitate contextual communications
CN102368706A (en) * 2011-10-18 2012-03-07 深圳市江波龙商用设备有限公司 Authentication method, authentication system and authentication device based on USB (Universal Serial Bus) HID (Human Interface device) protocol
CN102375960A (en) * 2010-08-12 2012-03-14 中兴通讯股份有限公司 Method and system for identifying radio frequency identification (RFID) tags
CN102629332A (en) * 2012-02-20 2012-08-08 江苏凯路威电子科技有限公司 Radio frequency identification (RFID) anti-fake method
CN102779284A (en) * 2012-01-30 2012-11-14 张楠 RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090258678A1 (en) * 2008-04-09 2009-10-15 Ven Chava System and method for storing and retrieving multimedia messages on low-cost tags in order to facilitate contextual communications
CN102375960A (en) * 2010-08-12 2012-03-14 中兴通讯股份有限公司 Method and system for identifying radio frequency identification (RFID) tags
CN102368706A (en) * 2011-10-18 2012-03-07 深圳市江波龙商用设备有限公司 Authentication method, authentication system and authentication device based on USB (Universal Serial Bus) HID (Human Interface device) protocol
CN102779284A (en) * 2012-01-30 2012-11-14 张楠 RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like
CN102629332A (en) * 2012-02-20 2012-08-08 江苏凯路威电子科技有限公司 Radio frequency identification (RFID) anti-fake method

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103326864A (en) * 2013-06-24 2013-09-25 詹万泉 Electronic tag anti-fake authentication method
CN103326864B (en) * 2013-06-24 2016-03-09 詹万泉 A kind of electronic tag anti-fake authentication method
CN103559466A (en) * 2013-11-01 2014-02-05 中国联合网络通信集团有限公司 NFC application processing method, terminal and server
CN103559466B (en) * 2013-11-01 2017-07-14 中国联合网络通信集团有限公司 NFC application processing methods, terminal and server
CN103607283A (en) * 2013-12-04 2014-02-26 *** Target authentication method based on mobile device and authentication center
CN104766211A (en) * 2014-01-06 2015-07-08 塞米西斯科株式会社 Genuine product authentication system and method thereof
CN103763007A (en) * 2014-01-07 2014-04-30 张诗悦 Identification method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology
CN103927664A (en) * 2014-03-20 2014-07-16 林清华 Product verification method
CN104320250A (en) * 2014-08-12 2015-01-28 北京傲飞商智软件有限公司 Anti-counterfeiting authentication method based on NFC chip
US10019604B2 (en) 2014-10-31 2018-07-10 Xiaomi Inc. Method and apparatus of verifying terminal and medium
CN105184587A (en) * 2015-09-22 2015-12-23 深圳市裕盛星文化传播有限公司 Anti-counterfeiting method, anti-counterfeiting device and anti-counterfeiting system
CN107038587A (en) * 2016-02-04 2017-08-11 北京童讯风联科技有限责任公司 A kind of Bluetooth label verified based on service end and its method for anti-counterfeit
CN107886333A (en) * 2016-09-29 2018-04-06 珠海晶通科技有限公司 A kind of Antiforge system and its method for anti-counterfeit with dynamic anti-fake information
CN107483427A (en) * 2017-08-09 2017-12-15 北京冠霖环如科技有限公司 A kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips
CN107483427B (en) * 2017-08-09 2020-10-16 北京冠霖环如科技有限公司 Self-enhanced anti-counterfeiting method based on Ntag21X series chips
CN109428718A (en) * 2017-08-30 2019-03-05 江苏稻源微电子有限公司 A kind of NFC label chip with dynamic encryption image feature
CN108388938A (en) * 2018-03-15 2018-08-10 华大半导体有限公司 Antifalsification label
CN109472624A (en) * 2018-11-14 2019-03-15 李小文 Method for anti-counterfeit, Antiforge electronic drop and system based on electronics drop
CN110533128A (en) * 2019-08-21 2019-12-03 上海唯链信息科技有限公司 A kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption
CN110516491A (en) * 2019-08-30 2019-11-29 上海应用技术大学 The information coding coding/decoding method anti-fake for books
CN113343318A (en) * 2021-06-30 2021-09-03 浙江德鲸数字科技有限公司 Data processing method, device, equipment and medium
CN114492489A (en) * 2022-01-24 2022-05-13 芯电智联(北京)科技有限公司 NFC label verification system based on dynamic data
CN114492489B (en) * 2022-01-24 2022-10-21 芯电智联(北京)科技有限公司 NFC label verification system based on dynamic data
CN117221877A (en) * 2023-09-03 2023-12-12 广东高芯国际物联网科技有限公司 Safety verification and transmission method applied to frequency radio field data
CN117221877B (en) * 2023-09-03 2024-03-29 广东高芯国际物联网科技有限公司 Safety verification and transmission method applied to frequency radio field data

Also Published As

Publication number Publication date
CN103065168B (en) 2016-05-11

Similar Documents

Publication Publication Date Title
CN103065168A (en) Anti-fake method and system of radio frequency identification
CN101923660B (en) Dynamic password identity authorization system and method based on RFID
EP3017580B1 (en) Signatures for near field communications
CN105554035B (en) A kind of electronic lock system and its control method
CN103413159B (en) A kind of RFID electronic certificate off-line false proof realization method and system of Jianzhen based on CPK
WO2016145705A1 (en) Time-based encrypted nfc cell phone terminal anti-counterfeit system and method
CN102831529A (en) Radio frequency based commodity information identification method and system
CN103473592B (en) A kind of label off-line authenticating method and device based on CPK system
CN103152174B (en) It is applied to the data processing method in parking lot, device and managing system of car parking
CN103281299B (en) A kind of ciphering and deciphering device and information processing method and system
CN101140605A (en) Data safety reading method and safety storage apparatus thereof
WO2018227685A1 (en) Method and system for secure access of terminal device to internet of things
CN108200014B (en) Method, device and system for accessing server by using intelligent key device
El Madhoun et al. A cloud-based secure authentication protocol for contactless-nfc payment
CN202870900U (en) NFC (Near Field Communication)-based commodity information identification system
CN103530785A (en) Double anti-counterfeiting system and method based on near field communication (NFC) function
CN109903052A (en) A kind of block chain endorsement method and mobile device
CN105450400A (en) Identity verification method, client, server side, and system
CN104217335A (en) Storing device and method for commodity authenticity verification information, and commodity authenticity verification method
CN103107888A (en) Dynamic multi-attribute multilevel identity authentication method for mobile terminal (MT)
US10305878B2 (en) Virtual device authorization method and device
CN202870898U (en) Radio frequency-based commodity information identification system
KR20170080576A (en) Authentication system and method
CN105516182B (en) A kind of mutual authentication method and its system between smart card and reader
CN109547404B (en) Data acquisition method and server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 518057 A, B, C, D, E, F1, 8 Building, Financial Services Technology Innovation Base, No. 8 Kefa Road, Nanshan District, Shenzhen City, Guangdong Province

Co-patentee after: Shenzhen Netcom Commercial Equipment Co., Ltd.

Patentee after: Shenzhen jiangbolong electronic Limited by Share Ltd

Address before: 518057 A, B, C, D, E, F1, 8 Building, Financial Services Technology Innovation Base, No. 8 Kefa Road, Nanshan District, Shenzhen City, Guangdong Province

Co-patentee before: Shenzhen Netcom Commercial Equipment Co., Ltd.

Patentee before: Shenzhen jiangbolong Electronic Co., Ltd.

CP01 Change in the name or title of a patent holder