CN103745365B - A kind of register method based on near-field communication technology, false proof device and Antiforge system - Google Patents

A kind of register method based on near-field communication technology, false proof device and Antiforge system Download PDF

Info

Publication number
CN103745365B
CN103745365B CN201410006029.0A CN201410006029A CN103745365B CN 103745365 B CN103745365 B CN 103745365B CN 201410006029 A CN201410006029 A CN 201410006029A CN 103745365 B CN103745365 B CN 103745365B
Authority
CN
China
Prior art keywords
token
tag
false proof
mobile phone
counterfeiting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410006029.0A
Other languages
Chinese (zh)
Other versions
CN103745365A (en
Inventor
张诗悦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410006029.0A priority Critical patent/CN103745365B/en
Publication of CN103745365A publication Critical patent/CN103745365A/en
Application granted granted Critical
Publication of CN103745365B publication Critical patent/CN103745365B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a kind of register method based on near-field communication technology, false proof device and Antiforge system.By the register method, it can realize that tag ID corresponds with anti-counterfeiting object ID, then it is associated with ID;And ID, tag ID, anti-counterfeiting object ID, works information, the first counterfeiting token, the second counterfeiting token are stored respectively in antifalsification label, false proof mobile phone and anti-counterfeit server.The Antiforge system includes three kinds of antifalsification label, false proof mobile phone and anti-counterfeit server false proof devices, it is the relation of mutual restriction and related association between three, data in antifalsification label, false proof mobile phone, anti-counterfeit server must be updated simultaneously, effective log-on message could be produced, therefore adds safety and reliability.

Description

A kind of register method based on near-field communication technology, false proof device and Antiforge system
Technical field
The present invention relates to near-field communication technology, more particularly to a kind of art work register method based on near-field communication technology, False proof device and Antiforge system.
Background technology
Art work collection is fast-developing in recent years, and what it is with the art sales market boom is fakement great Dang Qi roads. Therefore, how to establish conveniently, reliable, authority art work registration, identification, transfer system be always asking of facing of artwort market Topic.
Existing electronic anti-fogery technology mainly includes two ways:Carried out using bar code or Quick Response Code as label false proof;With It is false proof using task equipment reading label information progress that the modes such as RFID store digital anti-counterfeiting label.
The former the shortcomings that, is that the cost of reproduction of bar code or Quick Response Code is low, as long as this yard is replicated into the genuine piece that can disguise oneself as. The latter equally exists limitation compared with the former advanced technology:First using proprietary instrument, it is necessary to be scanned, and generally including can Carry out computer, label reader of network service etc., not portable and deployment.Second, data merely are carried out to anti-counterfeiting object Read and verification, false proof instrument can not be excluded and faked this problem.The anti-counterfeiting object can not be identified in anti-counterfeiting object qualification process The owner and anti-counterfeiting object all relations.
The content of the invention
It is an object of the invention to solve one of above-mentioned technical problem, according to one embodiment of present invention, there is provided one Art work register method of the kind based on near-field communication technology, including:
S201, anti-counterfeit server (103) according to false proof mobile phone (102) transmit come ID and false proof mobile phone (102) from The tag ID read in antifalsification label (101) creates and stores the establishment token associated with the tag ID and anti-counterfeiting object ID, it is sent to false proof mobile phone (102) (308-310);
S202, the false proof mobile phone (102) receive from the anti-counterfeit server (103) and store the establishment token and institute State anti-counterfeiting object ID and sent to the antifalsification label (101) and write tag request;
S203, the antifalsification label (101) write tag request in the antifalsification label according to the false proof mobile phone (102) (101) the anti-counterfeiting object ID and the ID are write in;
S204, the false proof mobile phone (102) by user interface input works information, and according to the anti-counterfeiting object ID, The works information and the establishment token send registration request to the anti-counterfeit server (103);
S205, it is described with receiving that token is created described in the registration request that the anti-counterfeit server (103) confirms to receive Establishment token corresponding to anti-counterfeiting object ID is consistent, while determines that the tag ID is to register for the first time, then stores works information, Generation first counterfeiting token and second counterfeiting token associated with the anti-counterfeiting object ID, send the false proof mobile phone to (102) the establishment token, is deleted;
S206, the false proof mobile phone (102) receive by the anti-counterfeiting object ID and from the anti-counterfeit server (103) First counterfeiting token write-in smart card (104), and will second counterfeiting token write-in antifalsification label (101), Delete the establishment token.
Wherein:S203, the antifalsification label (101) calculate the first tag security information according to tag ID and ID (X1), and according to the first tag security information (X1) calculate the second tag security information (X2) be transmitted to it is described false proof Mobile phone (102);
S204, the false proof mobile phone (102) sends to the anti-counterfeit server (103) carries the second tag security letter Cease (X2), the anti-counterfeiting object ID, the works information and the registration request for creating token;
S205, corresponding to the establishment token of the anti-counterfeit server (103) in the registration request and store Tag ID and ID in the anti-counterfeit server (103) calculate the to calculate X1 identicals method with the antifalsification label Three tag security information (X3), the anti-counterfeit server (103) decrypt the second tag security information (X2) using asymmetric arithmetic The 4th tag security information (X4) is obtained, if the 4th tag security information (X4) is equal to the 3rd tag security information (X3), then the anti-counterfeit server (103) verifies the second tag security information (X2) described in the registration request correctly.
Preferably:In methods described:
S201, the anti-counterfeit server (103) according to false proof mobile phone (102) transmit come ID and false proof mobile phone from prevent The tag ID read in pseudo label (101) creates and stores the establishment token time limit associated with the tag ID;And
S205, the anti-counterfeit server (103) judges that this establishment process is not above the establishment token time limit, and deletes Except the establishment token time limit.
In addition:In the label corresponding with the tag ID that S201, anti-counterfeit server (103) inquiry are prestored Key is write, transmitting the label with rivest, shamir, adelman writes key;
In S202, the false proof mobile phone (102) receives the label from the anti-counterfeit server (103) and writes key, described False proof mobile phone (102) sends to write tag request and include the label to the antifalsification label (101) writes key;
In S203, the antifalsification label (101) examines the label to write key and mark preset in antifalsification label (101) Whether label write key consistent, using the tag ID, ID and label local key are parameter with 3DES encryption if consistent Algorithm calculate the first tag security information (X1), and by the first tag security information (X1) be parameter in terms of asymmetric arithmetic The second tag security information (X2) is calculated, label local key is equally stored in anti-counterfeit server and and tag ID Correspond;
In S205, corresponding to the establishment token of the anti-counterfeit server (103) in the registration request and deposit Tag ID, ID and the label local key being stored in the anti-counterfeit server (103) are parameter in terms of 3DES encryption algorithm Calculate the 3rd tag security information (X3);And first counterfeiting token and the second false proof order are transmitted with rivest, shamir, adelman Board.
Wherein, works information includes described in S204:Author information, works content, works description, creative time, creation Place.
In addition, before S201, in addition to:Associating for the tag ID and the ID is stored in anti-counterfeit server Relation, and judge in step sl ID that false proof mobile phone (102) transmission comes whether with false proof mobile phone (102) from anti-counterfeiting label Sign the tag ID association read in (101).
According to another embodiment of the invention, there is provided a kind of antifalsification label (101) based on near-field communication technology, use In:Reception writes tag request and writes anti-counterfeiting object ID and ID;And receive and write tag request the second counterfeiting token of write-in.
The antifalsification label is additionally operable to:According to tag ID and the ID calculate the second tag security information (X2) for Send.
In addition, the antifalsification label is additionally operable to:First tag security information is calculated according to tag ID and the ID (X1), and according to the first tag security information (X1) the second tag security information (X2) is calculated for sending.
The antifalsification label is additionally operable to:Receive label write key, examine the label write key write with preset label it is close Whether key is consistent, using tag ID, ID and label local key is parameter with 3DES encryption algorithm calculating the if consistent One tag security information (X1), and be described in parameter is calculated with asymmetric arithmetic according to the first tag security information (X1) Second tag security information (X2) is for transmission.
According to one more embodiment of the present invention, there is provided a kind of false proof mobile phone (102) based on near-field communication technology, it is described anti- Pseudo- mobile phone is used for:Read the tag ID in antifalsification label;ID and tag ID are sent to anti-counterfeit server (103);From false proof Server (103) receives and storage creation token and anti-counterfeiting object ID;Establishment writes tag request for sending;Pass through user interface Works information is inputted, and sends to the anti-counterfeit server (103) and to carry the anti-counterfeiting object ID, the works information and described Create the registration request of token;The first counterfeiting token and the second counterfeiting token are received, is prevented by the anti-counterfeiting object ID and from described First counterfeiting token write-in smart card (104) received in pseudo server (103), and second counterfeiting token is write Enter the antifalsification label (101);And delete the establishment token.
The mobile phone is additionally operable to:Receive the second tag security information (X2);And sent to the anti-counterfeit server (103) Carry the second tag security information (X2) received, the anti-counterfeiting object ID, the works information and the note for creating token Volume request.
The mobile phone is additionally operable to:The label, which is received, from the anti-counterfeit server (103) writes key;To the antifalsification label (101) send carry that the label writes key write tag request.
Wherein, the works information includes:Author information, works content, works description, creative time, creative place.
According to still another embodiment of the invention, a kind of anti-counterfeit server (103) based on near-field communication technology, institute are also provided Anti-counterfeit server is stated to be used for:According to the ID and tag ID received, create and store the wound associated with the tag ID Token and anti-counterfeiting object ID are built, for sending;Receive and carry anti-counterfeiting object ID, works information and the registration request for creating token, Confirm that the establishment token in the registration request of reception is consistent with the establishment token corresponding to the anti-counterfeiting object ID received, it is determined that The tag ID is to register for the first time, then stores works information;The generation first false proof order associated with the anti-counterfeiting object ID Board and the second counterfeiting token, for sending;Delete the establishment token.
The anti-counterfeit server is used for:Receive carry the second tag security information (X2), anti-counterfeiting object ID, works information and The registration request of token is created, corresponding to the establishment token in registration request and is stored in the anti-counterfeit server (103) In tag ID and ID calculate the 3rd tag security information (X3) to calculate X1 identicals methods with antifalsification label, it is described anti- Pseudo server (103) decrypts the second tag security information (X2) using asymmetric arithmetic and obtains the 4th tag security information (X4), If the 4th tag security information (X4) is equal to the 3rd tag security information (X2), the anti-counterfeit server (103) it is correct to verify the second tag security information (X2) described in the registration request.
The anti-counterfeit server is additionally operable to:ID and tag ID according to receiving are created and stored and the tag ID The associated establishment token time limit;The anti-counterfeit server (103) judges that this registration process is not above the establishment token Time limit;And delete and create the token time limit.
Preferably, the anti-counterfeit server is additionally operable to:The label corresponding with the tag ID prestored is inquired about to write Key, the label is transmitted with rivest, shamir, adelman and writes key;Corresponding to the establishment token in registration request simultaneously Tag ID, ID and the label local key being stored in the anti-counterfeit server (103) are parameter with 3DES encryption algorithm Calculate the 3rd tag security information (X3);And first counterfeiting token and described second false proof is transmitted with rivest, shamir, adelman Token.
The works information includes:Author information, works content, works description, creative time, creative place.
Finally, according to still another embodiment of the invention, there is provided a kind of Antiforge system (100) based on near-field communication technology, Including foregoing antifalsification label (101), false proof mobile phone (102) and anti-counterfeit server (103).
For prior art, beneficial effects of the present invention are:
1. register method provided by the invention, can realize that tag ID is associated with anti-counterfeiting object ID, then with ID one One correspondence;And ID, tag ID, anti-counterfeiting object ID, works information, the first counterfeiting token, the second counterfeiting token are deposited respectively It is stored in antifalsification label, false proof mobile phone and anti-counterfeit server.Therefore, realize that antifalsification label, false proof mobile phone, anti-counterfeit server are formed One system that is interrelated and mutually restricting, it is necessary to while data in antifalsification label, false proof mobile phone, anti-counterfeit server are updated, Effective log-on message could be produced, therefore adds safety and reliability.
It is mutual between three 2. Antiforge system provided by the invention includes antifalsification label, false proof mobile phone, anti-counterfeit server Restriction and the relation of related association, it is necessary to while data in antifalsification label, false proof mobile phone, anti-counterfeit server are updated, it could produce Effective log-on message, therefore add safety and reliability.
Brief description of the drawings
Fig. 1 is the system block diagram of the present invention.
Fig. 2 is a kind of art work register method flow chart based on near-field communication technology.
Fig. 3 is a kind of art work register method preferred embodiment based on near-field communication technology.
Fig. 4 is antifalsification label, smart card, false proof hand after a kind of art work register method based on near-field communication technology is implemented Data table memory in machine, anti-counterfeit server.
Fig. 5 is a kind of art owners' authentication method flow chart based on near-field communication technology.
Fig. 6 is a kind of art owners' authentication method preferred embodiment based on near-field communication technology.
Fig. 7 is that the owner identifies that false proof mobile phone intelligent card and false proof mobile phone calculate identification response schematic diagram in request link.
Fig. 8 is a kind of art work nonowners' authentication method flow chart based on near-field communication technology of the present invention.
Fig. 9 is a kind of art work nonowners' authentication method preferred embodiment based on near-field communication technology of the present invention.
Figure 10 nonowners identify the false proof mobile phone intelligent card of nonowners and the false proof mobile phone of the owner and non-in request link The false proof mobile phone of the owner calculates identification response schematic diagram.
Figure 11 is the structural representation of anti-counterfeit server of the present invention.
Figure 12 is the work-based logic schematic diagram of authentication processing unit
Figure 13 is a kind of art work assignment method flow chart based on near-field communication technology of the present invention.
Figure 14 is a kind of art work assignment method preferred embodiment based on near-field communication technology of the present invention.Figure 15 present invention One of structural representation of false proof mobile phone.
The two of the structural representation of the false proof mobile phone of Figure 16 present invention.
Figure 17 is the structural representation of the false proof smart card of the present invention.
Figure 18 is the structural representation of antifalsification label of the present invention.
Figure 19 is the structural representation of Antiforge system embodiment of the present invention.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to the specific of the present invention Embodiment is described in further detail.Obviously, described embodiment is only the part of the embodiment of the present invention, rather than Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not before creative work is paid All embodiments obtained by putting belong to protection scope of the present invention.
Fig. 1 is the system block diagram of the present invention.As shown in figure 1, the system 100 of the present invention includes:It is antifalsification label 101, false proof Mobile phone 102 and anti-counterfeit server 103, include smart card 104 in false proof mobile phone 102.Antifalsification label is preferably NFC label, is prevented Pseudo- mobile phone 102 can read the information of antifalsification label 101, pass through the authentication module and smart card inside false proof mobile phone 102 104 chips carry out safe computations, and carrying out secondary safety in false proof mobile phone with reference to false proof ID calculates, in false proof service Verified in device 103.Thereby increase the safety and reliability of Antiforge system.
Registration, identification and the transference of the reliable authority of the art work can be realized with the system.Wherein described antifalsification label 101 have globally unique antifalsification label ID, have ID in false proof mobile phone 102 and smart card 104.Carrying out anti-counterfeiting object Registration before, antifalsification label 101 is built in the anti-counterfeiting object that will be registered, and especially, the anti-counterfeiting object can be with For the art work that be registered, identify or transfer the possession of.Anti-counterfeit server 103 be each anti-counterfeiting object distribute and store one it is false proof Object ID.
Illustrate herein:Due to register, identify and transference in have different false proof mobile phones and participate.Cause This, in order to make it easy to understand, can register in Antiforge system, false proof mobile phone is added respectively in this manual in identification and transference To limit.Such as:In registration process, because only main body of the owner (or referred to as creator), therefore, false proof mobile phone Do not distinguish, be only expressed as false proof mobile phone 102.In qualification process, there is the difference of owner's identification and nonowners' identification, because This, in qualification process, false proof mobile phone has point of the false proof mobile phone of the owner and the false proof mobile phone of nonowners.Make this differentiation be in order to Be easy to describe in qualification process, the false proof mobile phone of the owner and the false proof mobile phone of nonowners accordingly functional relationship when do not cause table The confusion stated.During identification 102, unless otherwise instructed, false proof mobile phone represents the false proof mobile phone of the owner.In transference In, the false proof mobile phone of the owner will be related to and be transferred mobile phone and participated.Therefore, it will use using the false proof mobile phone of the owner and be turned False proof mobile phone is allowed to make a distinction.Unless otherwise instructed, false proof mobile phone represents the false proof mobile phone of the owner.It is believed that the present invention protects Shield false proof mobile phone be respectively provided with it is described registration, identification and transference in any different appellation main bodys (such as:Registrant, the owner, Nonowners, it is transferred surrenderee) the part or all of function of mobile phone.
Fig. 2 is a kind of art work register method flow chart based on near-field communication technology of the present invention.Utilize this method skill One new art work can be registered in server by the creator of art product, and assign the false proof of the unique mark art work Label.Methods described includes:S201, anti-counterfeit server 103 according to false proof mobile phone 102 transmit come ID and false proof mobile phone 102 tag IDs read from antifalsification label 101 create and store the establishment token associated with the tag ID and false proof right As ID.
Antifalsification label 101 has globally unique antifalsification label ID, in this step, has the false proof of tag reading function Mobile phone 102 reads antifalsification label ID, and tag ID and ID are together sent to anti-counterfeit server 103, the false proof clothes Business device 103 creates according to tag ID and ID and stores one and creates token while distribute a unique sign for the art work The anti-counterfeiting object ID of the art work.
Alternatively, the establishment token can be the token with the time limit, i.e. the registration of the art work must definite time-lag in advance Interior completion is just effective.Therefore, the anti-counterfeit server can create an establishment token simultaneously when creating the establishment token Time limit.
In this step, server 103 is received after ID and antifalsification label ID directly by antifalsification label ID and user ID is associated, that is, is given tacit consent to antifalsification label ID and belonged to the ID.Alternatively, can be before S201, in advance in false proof service The incidence relation of tag ID and ID is stored in device 103, i.e., is just being taken when antifalsification label is actually allocated to some user It is engaged in device by this corresponding relation record and store accordingly.Then when server receives ID and anti-counterfeiting label in S201 First judge whether the tag ID read with false proof mobile phone 102 from antifalsification label 101 associates the ID after label ID, if closed Connection just creates token and continues subsequent step, and registration failure is returned if not associating.It is possible thereby to further prevent tag ID quilt Situation about usurping, add the safety and reliability of system.
In addition, before this step, the step of can including establishing secure link between server and mobile phone.
S202, the false proof mobile phone 102 receive from the anti-counterfeit server 103 and store the establishment token and described anti- Pseudo- object ID simultaneously writes tag request to the antifalsification label 101 transmission.
Antifalsification label 101 can write key with preset, just be needed when now equipment carries out write operation to antifalsification label 101 Whether preset to write key consistent with this for the key of writing for verifying in the write request of equipment.Therefore, the anti-of key is write for being prefixed When pseudo label 101 carries out write operation, tag ID can be prestored in server 103 and writes key with corresponding label.By preventing The label corresponding with the tag ID that pseudo server 103 prestores according to tag ID inquiry writes key;With asymmetric encryption Algorithm, which transmits the label, writes key to mobile phone 102.
Then described false proof mobile phone 102 receives the label from the anti-counterfeit server 103 and writes key.The false proof mobile phone 102 write tag request to the antifalsification label (101) transmission, and the tag request of writing includes writing label key.
S203, the antifalsification label 101 write tag request in the antifalsification label 101 according to the false proof mobile phone 102 The middle write-in anti-counterfeiting object ID and the ID.Thus, the antifalsification label completes anti-counterfeiting object ID and ID Record.
When antifalsification label is preset write key in the case of, antifalsification label verify first the label write key with anti-counterfeiting label Whether consistent preset label writes key in label 101.
Preferably, in this step, antifalsification label 101 also calculates the second security information X2 and is transmitted to the false proof mobile phone 102.Specifically, the antifalsification label 101 calculates the second tag security information X2 according to the tag ID and the ID, And the second tag security information X2 is transmitted to the false proof mobile phone 102.Preferably, can be calculated according to tag ID, ID First tag security information X1, and the second tag security information X2 is calculated according to the first tag security information X1; It is highly preferred that the antifalsification label 101 examine the label write key it is correct after, it is local according to tag ID, ID and label Key is that parameter calculates the first tag security information X1 with 3DES encryption algorithm, and is according to the first tag security information X1 Parameter calculates the second tag security information X2 with asymmetric arithmetic.Label local key can be differently configured from label and write Key, when label local key differs with writing key, tag ID and corresponding mark can be prestored in server 103 Sign local key.
S204, the false proof mobile phone 102 input works information by user interface, and according to the anti-counterfeiting object ID, institute State works information and the establishment token sends registration request to the anti-counterfeit server 103;Preferably, works described in S204 Information includes:Author information, works content, works description, creative time, creative place.It is highly preferred that when false proof mobile phone receives To after the second security information X2, the second security information X2 is carried in the registration request and is sent to server 103.
S205, it is described with receiving that token is created described in the registration request that the anti-counterfeit server (103) confirms to receive Establishment token corresponding to anti-counterfeiting object ID is consistent, while determines that the tag ID is to register for the first time, then stores works information, Generation first counterfeiting token and second counterfeiting token associated with the anti-counterfeiting object ID, send the false proof mobile phone to (102) the establishment token, is deleted.
In the case of antifalsification label also calculates X2, the anti-counterfeit server 103 is according in the registration request Create token it is corresponding and be stored in the anti-counterfeit server 103 tag ID, ID is with the antifalsification label to calculate X1 identicals method calculates the 3rd tag security information X3, and the anti-counterfeit server (103) is received using asymmetric arithmetic decryption The the second tag security information (X2) arrived obtains the 4th tag security information (X4), if described 4th tag security information X4 etc. In the 3rd tag security information X3, then the anti-counterfeit server 103 verifies the peace of the second label described in the registration request Full information X2 is correct.
Preferably, corresponding to the establishment token of the anti-counterfeit server 103 in the registration request and store Tag ID, ID and label local key in the anti-counterfeit server 103 calculate for parameter with 3DES encryption algorithm Three tag security information X3.
When it is the token with the time limit to create token, the anti-counterfeit server 103 also judges that this time establishment process is not super The establishment token time limit is spent, and when deleting establishment token, deletes create the token time limit in the lump.
Preferably, first counterfeiting token and second counterfeiting token can be transmitted with rivest, shamir, adelman.
S206, described in the false proof mobile phone 102 receives by the anti-counterfeiting object ID and from the anti-counterfeit server 8 First counterfeiting token writes the smart card 104, and second counterfeiting token is write into the antifalsification label 101.Then delete Except the establishment token.
Fig. 3 is a kind of art work register method preferred embodiment based on near-field communication technology of the present invention.Carrying out this hair Before the register method of bright offer, it is preferable to carry out secure log, embody in 301-305 in figure 3:
In a preferred embodiment of the invention, tag ID and ID have been prestored in anti-counterfeit server associates pass System, and the corresponding label of tag ID write key.
301:Secure connection is established between false proof mobile phone 102 and anti-counterfeit server 103.
302:False proof mobile phone 102 asks to log in token by ID to smart card 104.
303:Smart card is generated by computations logs in token, while by ID and logs in the false proof mobile phone of token return 102。
304:False proof mobile phone is according to ID and logs in token login anti-counterfeit server.
305:Anti-counterfeit server logins successfully to false proof mobile phone feedback security.
After secure log, step as shown in Figure 3 is carried out:
306:False proof mobile phone reads tag ID in antifalsification label, and the antifalsification label is built in anti-counterfeiting object.
307:Antifalsification label sends antifalsification label ID to the false proof mobile phone.
308:False proof mobile phone creates token according to antifalsification label ID and ID to anti-counterfeit server application.
309:After anti-counterfeit server receives establishment token request, whether the incidence relation of confirmation antifalsification label ID and ID It coincide, then creates and store the establishment token associated with the tag ID, creates token time limit and anti-counterfeiting object ID.It is preferred that Ground, the label for also needing to inquire about the antifalsification label according to tag ID write key.
310:Token will be created and anti-counterfeiting object ID, the key of writing of antifalsification label are sent to the false proof mobile phone;Wherein, it is excellent Selection of land, the key of writing of antifalsification label are sent with rivest, shamir, adelman.
311:The false proof mobile phone, which receives, to be received and stores from the anti-counterfeit server 8 the establishment token and described prevent Pseudo- object ID, it may be preferable that also include receiving antifalsification label and write key, and obtained after being decrypted using asymmetric arithmetic label write it is close Key.
312:False proof mobile phone writes key by the label and writes tag request to antifalsification label initiation, and parameter includes:It is anti- Pseudo- object ID, the ID, the label write key.
313:Whether the antifalsification label to write key correct if receiving verification label after request, by anti-counterfeiting object if correct ID, the ID write the antifalsification label;And use 3DES encryption algorithm, it is preferable that with antifalsification label ID, user ID, local key (may differ from label and write key) are that parameter calculates the first tag security information X1, reuse asymmetric calculation Method calculates the second tag security information X2.
314:Second tag security information X2 is back to the false proof mobile phone by the antifalsification label.
315:Works information is inputted by false proof cell-phone user interface, including is not limited to author information, works content, works Description, creative time, creative place, other creation characteristic information;Then registration request, parameter bag are initiated to anti-counterfeit server Include:Anti-counterfeiting object ID, the second tag security information X2, the works information and the establishment token.
316:After anti-counterfeit server receives registration request, according to the anti-counterfeiting object ID, recalled in anti-counterfeit server with Corresponding anti-counterfeiting object ID and the ID, it is preferable that with antifalsification label ID, ID and the anti-counterfeiting label deposited The local key of label is that parameter calculates the 3rd tag security information X3 in a manner of calculating X1 identicals with antifalsification label, is reused The 4th tag security information X4 is calculated with 313 step identical asymmetric arithmetics;If the 4th tag security information X4 Equal to the 3rd tag security information X2, then judge that the second tag security information X2 is correct;Meanwhile anti-counterfeit server is true Recognize this time antifalsification label to be registered as registering for the first time, and confirm to receive creates token and the anti-counterfeiting object received Establishment token corresponding to ID is consistent, then stores works information;And generate associated with the anti-counterfeiting object ID and works information The first counterfeiting token and the second counterfeiting token.
317:Anti-counterfeit server sends first counterfeiting token and the second counterfeiting token to the false proof mobile phone;And delete The establishment token.
318:The false proof mobile phone will receive the first counterfeiting token and anti-counterfeiting object ID writes the false proof cell phone intelligent Card.
319:The false proof mobile phone intelligent card writes successfully to false proof confirm phone.
320:The false proof mobile phone, which by the label is write key and sent to the antifalsification label, writes tag request, parameter bag Include:Write key and the second counterfeiting token.
321:Whether the antifalsification label to write key correct if receiving verification label after request, false proof by second if correct Token writes the antifalsification label.
322:The antifalsification label writes successfully to false proof confirm phone.
Fig. 4 illustrates all steps by 301-322 in Fig. 3, in the antifalsification label, the false proof mobile phone and described Formation one is interrelated in anti-counterfeit server and mutually restricts data.As can be seen from Figure 4:It has passed through above-mentioned steps:Institute State in antifalsification label except natively existing antifalsification label ID, it is false proof to be also written into ID, anti-counterfeiting object ID and second Token;And it is also written into anti-counterfeiting object ID except original ID in the false proof mobile phone;In false proof mobile phone intelligent card except Existing subscriber ID, anti-counterfeiting object ID, the first counterfeiting token have been also written into it;And anti-counterfeit server, by above-mentioned register method, remove Original tag ID, ID, have been written to anti-counterfeiting object ID, works information, the first counterfeiting token and the second counterfeiting token. Wherein:The tag ID corresponds with anti-counterfeiting object ID, the first counterfeiting token, the second counterfeiting token and works information, and It is associated with ID.The formation of above-mentioned data and between correlation, identification and transference after being lay the foundation. For instance, it is preferred that in identification request, related data can be calculated by above-mentioned data, including:5th tag security information X5, 6th tag security information X6, the 7th tag security information X7, the 8th tag security information X8, the first result J1, the second result J2, the 3rd result J3, the 4th result J4, the 5th result J5, the 6th result J6, the 7th result J7, the 8th result J8;The S1 owners Identify search sequence number;S2 nonowners identify search sequence number.
The art work information registering stage is being realized using the system, is being additionally provided a kind of based on the false proof of near-field communication technology System.The Antiforge system includes the label 101, the false proof mobile phone 102 and the anti-counterfeit server 103.
The antifalsification label 101 is used for:Reception writes tag request and writes anti-counterfeiting object ID and ID;And receive and write Tag request writes the second counterfeiting token.
In addition, the label be additionally operable to according to the tag ID, the ID calculate the second tag security information X2 with For sending.Preferably, the first tag security information X1 is calculated according to tag ID, ID, and according to first tag security Information X1 calculates the second tag security information X2.
In addition, the label be additionally operable to receive label write key, examine the label write key write with preset label it is close Whether key is consistent.Using tag ID, ID and label local key it is parameter with 3DES encryption algorithm calculating the if consistent One tag security information X1, and be that parameter calculates described second with asymmetric arithmetic according to the first tag security information X1 Tag security information X2.
The false proof mobile phone 102 is used for:Simultaneously storage creation token and anti-counterfeiting object ID are received from anti-counterfeit server 103;Wound Build include that label writes key write tag request, to feed to antifalsification label transmission.Works information, institute are inputted by user interface Stating works information includes:Author information, works content, works description, creative time, creative place.And to the false proof service Device 8, which is sent, carries the anti-counterfeiting object ID, the works information and the registration request for creating token.Receive the first false proof order Board and the second counterfeiting token, receive the anti-counterfeiting object ID and from the anti-counterfeit server 103 described first false proof Token writes the smart card 104, and second counterfeiting token is write into the antifalsification label 101.And delete the establishment Token.
The false proof mobile phone 102 is additionally operable to receive the second tag security information X2;And sent out to the anti-counterfeit server 103 Send and carry the second tag security information X2 received, the anti-counterfeiting object ID, the works information and the note for creating token Volume request.
Anti-counterfeit server 103 is used for:According to the ID and tag ID received, create and store and the tag ID phase The establishment token of association, token time limit and anti-counterfeiting object ID are created, for sending;And the tag ID that inquiry prestores Accordingly label writes key;The label is transmitted with rivest, shamir, adelman and writes key.Receive and carry the second tag security letter Cease (X2), anti-counterfeiting object ID, works information and the registration request for creating token.Corresponding to establishment token in registration request And the tag ID in the anti-counterfeit server (103) and ID are stored in calculate X1 identical methods with the antifalsification label The 3rd tag security information X3 is calculated, the anti-counterfeit server 103 decrypts the second tag security information X2 using asymmetric arithmetic The 4th tag security information X4 is obtained, if the 4th tag security information (X4) is equal to the 3rd tag security information (X2), then the anti-counterfeit server (103) verifies the second tag security information (X2) described in the registration request correctly.Confirm Establishment token in the registration request of reception is consistent with the establishment token corresponding to the anti-counterfeiting object ID received, it is determined that described Tag ID is to register for the first time, and this registration process is not above the establishment token time limit;Then store works information.Generation First counterfeiting token and second counterfeiting token associated with the anti-counterfeiting object ID, for sending.And delete the establishment Token and establishment token time.
Preferably, corresponding to the establishment token in registration request and it is stored in the anti-counterfeit server 103 Tag ID, ID and label local key for parameter with 3DES encryption algorithm calculate the 3rd tag security information X3.
The works information includes:Author information, works content, works description, creative time, creative place.
Preferably, and with rivest, shamir, adelman first counterfeiting token and second counterfeiting token are transmitted.
The art work register method based on near-field communication technology of the present invention is described with reference to the accompanying drawings above.This method Form the data for conditioning each other and depending on each other for existence in server, false proof mobile phone, smart card and antifalsification label, including ID, Tag ID, anti-counterfeiting object ID, key, local key, the first counterfeiting token and second counterfeiting token etc. are write, so that it is guaranteed that each ring Section can be completed by the verifications of multiple data, so as to realize the art work turn into art sales behavior safety anti-fake (registration, Identification, transfer the possession of).Creator can record works information in the server simultaneously, facilitate displaying, the record of art sales behavior And management.
Describe to realize art work qualification process using Antiforge system of the invention below.
Qualification process can be divided into owner's identity process and nonowners' identity process according to the difference for initiating main body.Cause This, is divided into the false proof mobile phone of the owner and the false proof mobile phone of nonowners in qualification process.In qualification process, such as nothing is especially said Bright, false proof mobile phone represents the false proof mobile phone of the owner.
Art owners' authentication method flow chart based on near-field communication technology is described referring to Fig. 5.Including as follows Step:
S501, anti-counterfeit server, which is received and stored, carries the false proof mobile phone of the owner from false proof mobile phone intelligent card described in the owner In the owner of the first counterfeiting token that transfers identify request, create and store the owner and identify token, send to described all The false proof mobile phone of person.
When the establishment token is the token with the time limit, anti-counterfeit server creates and stores owner's writ of appraisement simultaneously The board time limit;
S502, antifalsification label receives the owner that the false proof mobile phone of the owner is sent and identifies request, by the second false proof order Board is sent safely to the false proof mobile phone of the owner.
Especially, read operation that can be to the antifalsification label sets verification step, that is, being verified can just be read Operation.In this case, antifalsification label receives can wrap in owner's identification request that the false proof mobile phone of the owner is sent Containing public key, antifalsification label verifies the public key, and verification to the false proof mobile phone of the owner by just sending the second counterfeiting token.
Wherein described safety, which is sent, to be referred to send data in a manner of external equipment is not stolen and distorted.It is being preferable to carry out In example, antifalsification label calculates the 5th tag security information (Y5) by parameter of the second counterfeiting token, and the 5th tag security is believed Cease (Y5) to send to the false proof mobile phone of the owner).
S503, the false proof mobile phone of the owner identify token according to the first counterfeiting token, the second counterfeiting token and the owner Calculate first identification response (RES1), to anti-counterfeit server send carry it is described first identification response (RES1), anti-counterfeiting object ID, The identification request of owner's ID.
In a preferred embodiment, the false proof mobile phone intelligent card of the owner is ginseng with the 5th tag security information (Y5) Number calculates the first result (J1), and the false proof mobile phone of the owner is with first result (J1) and the false proof cell phone intelligent of the owner The first counterfeiting token is that parameter calculates the second result (J2) in card, then identifies token with second result (J2) and the owner The first identification response (RES1) is calculated for parameter;
Especially, can also be connect in the identification request that the false proof mobile phone of the owner is sent to anti-counterfeit server including needs Receive the identification request of other false proof phone numbers of qualification result.
S504, the anti-counterfeit server is according to corresponding to anti-counterfeiting object ID in the identification request and is stored in described false proof The second counterfeiting token, the first counterfeiting token and the owner of server identify the identification response of token computation second (RES2), if the second identification response (RES2), which is equal to the described first identification, responds (RES1), correct judgment, inspection institute Whether consistent with ID associated with anti-counterfeiting object ID in the identification request state owner's ID in identification request, The correct judgment if consistent, creates and preserves owner's search sequence number (S1), while by owner's search sequence number (S1) send to the false proof mobile phone of the owner, delete the owner and identify token.
In a preferred embodiment, the anti-counterfeit server according to corresponding to anti-counterfeiting object ID in the identification request and stores The second counterfeiting token in the anti-counterfeit server calculates the 6th tag security with the same computational methods of the antifalsification label Information (Y6), and the 6th tag security information (Y6) is passed through into computational methods meter same with the false proof mobile phone intelligent card of the owner The 3rd result (J3) is calculated, further according to the 3rd result (J3) and the first counterfeiting token being stored in the anti-counterfeit server The 4th result (J4) is calculated by computational methods same with the false proof mobile phone of the owner, further according to the 4th result (J4) Identify that token calculates the second identification response (RES2) with computational methods same with the false proof mobile phone of the owner with the owner.
When including other phone numbers during identification is asked, the anti-counterfeit server is by owner's search sequence number (S1) sending into the identification request needs to receive other false proof phone numbers of qualification result.
In addition, the anti-counterfeit server can also store qualification time and qualification time is related to owner's ID Connection;And the false proof mobile phone of the owner or the other false proof mobile phones logins false proof clothes for needing to receive qualification result Business device inputs owner's search sequence number (S1), and qualification time is included in this false proof result of inquiry.
When it is described identification token with when prescribe a time limit, the anti-counterfeit server confirms that this owner's qualification process is not above The owner identifies the token time limit, and deletes the owner and identify the token time limit.
Fig. 6 is a kind of art owners' authentication method preferred embodiment based on near-field communication technology.Especially say herein It is bright:False proof mobile phone in Fig. 6 is the false proof mobile phone of the owner in owner's authentication method.
Secure log is carried out first, is embodied in 601-605 in figure 6:
601:Secure connection is established between false proof mobile phone 102 and anti-counterfeit server 103.
602:False proof mobile phone 102 asks to log in token by ID to smart card 104.
603:Smart card is generated by computations logs in token, while by ID and logs in the false proof mobile phone of token return 102。
604:False proof mobile phone is according to ID and logs in token login anti-counterfeit server.
605:Anti-counterfeit server logins successfully to false proof mobile phone feedback security.
Then, owner's identity process is carried out.
606:False proof mobile phone initiates the owner to false proof mobile phone intelligent card with ID, login token and identifies request, Xiang Fang Pseudo- mobile phone intelligent card asks the first counterfeiting token.
607:False proof mobile phone intelligent card sends first counterfeiting token to the false proof mobile phone.
608:False proof mobile phone initiates the owner to anti-counterfeit server and identifies request, the first counterfeiting token described in parameter.
609:Anti-counterfeit server, which creates according to the first counterfeiting token and stores the owner, identifies token and owner's writ of appraisement The board time limit;Sending the owner simultaneously identifies token to the false proof mobile phone of the owner.
610:False proof mobile phone lifts the owner to antifalsification label as parameter using public key and identifies request;Public key is used for asymmetric calculation Method is encrypted.
611:Antifalsification label examines public key, is encrypted using the second counterfeiting token as parameter and calculates the 5th tag security information Y5。
612:Antifalsification label sends the 5th tag security information Y5 to the false proof mobile phone.
613:The false proof mobile phone intelligent card goes out the first result J1 with the 5th tag security information Y5 computations.
614:The false proof mobile phone intelligent card is sent the first result J1 is calculated to the false proof mobile phone.
615:Preferably, the false proof mobile phone goes out the second result according to the first result J1 and the first counterfeiting token computations J2;Identify that token computations go out the first identification response RES1 further according to the second result J2 and the owner.
616:False proof mobile phone connects further according to the described first identification response RES1, anti-counterfeiting object ID, owner's ID, needs The other false proof phone numbers for receiving qualification result send identification request to the anti-counterfeit server.
617:After anti-counterfeit server receives owner's identification request, the anti-counterfeit server is prevented according in the identification request The second related counterfeiting token of pseudo- object ID calculates the 6th tag security information Y6;And by the 6th tag security information Y6 by with The same computational methods of the false proof mobile phone intelligent card of the owner calculate the 3rd result J3;Further according to the 3rd result J3, One counterfeiting token calculates the 4th result J4 by computational methods same with the false proof mobile phone of the owner;Further according to the described 4th As a result J4, the owner identify the identification response RES2 of token computation second, if the second identification response RES2 is equal to institute The first identification response RES1 is stated, then correct judgment;And examine it is described identification request in owner's ID whether with the identification Ask the associated IDs of anti-counterfeiting object ID consistent, the correct judgment if consistent;And examine institute in the identification request Whether associated with the identification request anti-counterfeiting object ID person's of having ID ID be consistent, judges just if consistent Really;It is associated with owner's ID to store qualification time simultaneously;Create and preserve owner's search sequence S1;Described in deletion The owner identifies that token and the owner identify the token time limit.
618:Anti-counterfeit server sends owner's search sequence S1 to false proof mobile phone.
619:Anti-counterfeit server, which sends owner's search sequence S1 into the identification request, to be needed to receive identification knot Other phone numbers of fruit;Delete the owner and identify token.
620:Other the false proof mobile phones for receiving owner's search sequence S1 can be according to owner's search sequence S1 Inquire about the result of this authentication.
Fig. 7 shows that preferred embodiment antifalsification label and owner's mobile phone calculate RES1 flow chart.
Fig. 8 is a kind of art work nonowners' authentication method flow chart based on near-field communication technology of the present invention.Including:
S801, anti-counterfeit server receive and store carry nonowners false proof cellphone subscriber ID nonowners' identification please Ask, create and store nonowners and identify token, send to the false proof mobile phone of the nonowners.
When the establishment token is the token with the time limit, anti-counterfeit server creates and stores nonowners' identification simultaneously The token time limit.
S802, antifalsification label receive the nonowners that the false proof mobile phone of the nonowners is sent and identify request, second is prevented Pseudo- token is sent safely to the false proof mobile phone of the nonowners with anti-counterfeiting object ID.
Especially, read operation that can be to the antifalsification label sets verification step, that is, being verified can just be read Operation.In this case, the nonowners that the false proof mobile phone of the antifalsification label reception nonowners is sent identify can in request So that comprising public key, antifalsification label verifies the public key, and verification to the false proof mobile phone of nonowners by just sending the second counterfeiting token.
Wherein described safety, which is sent, to be referred to send data in a manner of external equipment is not stolen and distorted.It is being preferable to carry out In example, antifalsification label calculates the 7th tag security information (Y7) by parameter of the second counterfeiting token;And the 7th tag security is believed Breath (Y7) and anti-counterfeiting object ID are sent to the false proof mobile phone of the nonowners.
S803, the false proof mobile phone of nonowners initiate to carry the anti-counterfeiting object ID, second to the false proof mobile phone of the owner Counterfeiting token and the nonowners identify the identification request of token.
In a preferred embodiment, the false proof mobile phone of the nonowners carries described false proof right to the false proof mobile phone initiation of the owner As ID, the 7th tag security information (Y7) and the nonowners identify the identification request of token.
S804, the false proof mobile phone of the owner receive identification request, and the false proof mobile phone of the owner is according to the second false proof order The first counterfeiting token calculates safe result in board and the false proof mobile phone intelligent card of the owner, and by safe result and owner's ID It is sent to the false proof mobile phone of the nonowners.
In a preferred embodiment, the false proof mobile phone of the owner receives nonowners' identification request, and the owner is false proof Mobile phone intelligent card is that parameter calculates the 5th result (J5) with the 7th tag security information (Y7);The false proof hand of the owner Machine is using the 5th result (J5) and is stored in the false proof mobile phone intelligent card of the owner the first counterfeiting token and calculates the 6th as parameter As a result (J6) is used as safe result.
S805, the false proof mobile phone of nonowners identify token computation the according to the safe result and the nonowners Three identification responses (RES3), sent to anti-counterfeit server and carry the 3rd identification response (RES3), anti-counterfeiting object ID, the owner The nonowners of ID identify request;
S806, the anti-counterfeit server is according to corresponding to the nonowners identify anti-counterfeiting object ID in request and is stored in Second counterfeiting token of the anti-counterfeit server and the first counterfeiting token calculate the 4th identification response (RES4);If the described 4th Identification response (RES4) is equal to the described 3rd identification and responds (RES3), then correct judgment, examines the owner in the identification request Whether associated with the identification request anti-counterfeiting object ID ID ID be consistent, the correct judgment if consistent, wound Build and preserve nonowners' search sequence number (S2), while nonowners' search sequence number (S2) is sent to the non-institute The false proof mobile phone of the person of having (916), delete the nonowners and identify token.
In a preferred embodiment, the anti-counterfeit server identifies that anti-counterfeiting object ID institutes are right in request according to the nonowners The second related counterfeiting token of the anti-counterfeit server and should be stored in and calculate the 8th tag security information (Y8) for parameter;Again with 8th tag security information (Y8) is that parameter calculates the 7th result with the same computational methods of owner's mobile phone intelligent card (J7);Again anti-counterfeiting object ID associated storages and the false proof service in request are identified with the 7th result (J7) and the nonowners The first counterfeiting token in device is to calculate the 8th result (J8) by parameter with mobile phone identical computational methods false proof with the owner; Further according to using the 8th result (J8) and the nonowners identify token as parameter with the false proof mobile phone identical of nonowners Method calculates the 4th identification response (RES4).
In addition, the anti-counterfeit server also stores qualification time and qualification time is associated with owner's ID;With And the false proof mobile phone of nonowners logs in the anti-counterfeit server and inputs nonowners' search sequence number (S2), inquires about this Secondary false proof result, the false proof result include qualification time.
When the identification token with when prescribe a time limit, the anti-counterfeit server confirms that this nonowners' qualification process is not super Cross nonowners and identify the token time limit, and delete nonowners and identify the token time limit.
Fig. 9 is a kind of art work nonowners' authentication method preferred embodiment based on near-field communication technology of the present invention.
Secure log is carried out first, is embodied in 901-902 in fig.9:
901:The false proof mobile phone of nonowners is with nonowners' ID and logs in token login anti-counterfeit server.
902:Anti-counterfeit server logins successfully to the false proof mobile phone feedback security of nonowners.
Then, nonowners' identity process is carried out.
903:The false proof mobile phone of nonowners identifies token with the false proof cellphone subscriber ID requests nonowners of nonowners.
904:Anti-counterfeit server identifies that request creates and stores nonowners according to nonowners and identifies token and not all Person identifies the token time limit.
905:The false proof mobile phone of nonowners lifts nonowners to antifalsification label as parameter using public key and identifies request;Public key is used Encrypted in asymmetric arithmetic.
906:Antifalsification label examines public key, is encrypted using the second counterfeiting token as parameter and calculates the 7th tag security information Y7。
907:7th tag security information Y7 and anti-counterfeiting object ID are sent to the false proof mobile phone of the nonowners.
908:The false proof mobile phone of nonowners is according to the anti-counterfeiting object ID, the 7th tag security information Y7 and described non- The owner identifies that request token initiates identification request to the false proof mobile phone of the owner.
909:The 7th tag security information Y7 that the false proof mobile phone intelligent card of the owner is sent according to the false proof mobile phone of the owner adds The 5th result J5 of close calculating.
910:The false proof mobile phone intelligent card of the owner and by the 5th result J5 to the false proof mobile phone of the owner.
911:The false proof mobile phone of the owner is encrypted according to the 5th result J5 and the false proof counterfeiting token of mobile phone first of the owner Calculate the 6th result J6.
912:Owner's ID and the 6th result J6 are sent to the nonowners by the false proof mobile phone of the owner to be prevented Pseudo- mobile phone.
913:The false proof mobile phone of nonowners identifies token encryption further according to the 6th result J6, the nonowners Calculate the 3rd identification response RES3;According to anti-counterfeiting object ID.
914:The false proof mobile phone owner ID of the nonowners, the 3rd identification response RES3 are to the server Initiate nonowners and identify request.
915:The anti-counterfeit server is false proof according to anti-counterfeiting object ID is related in nonowners identification request second The security information Y8 of token computations label the 8th, and go out the 7th result J7 according to the 8th security information Y8 computations; Go out the 8th result J8 further according to the 7th result J7, the first counterfeiting token computations;Further according to the 8th result, Nonowners identify that token computations the 4th identify response RES4;If the 4th identification response RES4 is equal to the described 3rd Identification responds RES3, then correct judgment;Examine owner's ID in the identification request whether false proof with the identification request The associated ID of object ID is consistent, the correct judgment if consistent;Confirm that this nonowners' qualification process is not super Cross nonowners and identify the token time limit;It is associated with owner's ID to store qualification time simultaneously;Create and preserve not all Person's search sequence S2.
916:Nonowners' search sequence S2 is sent to the false proof mobile phone of the nonowners;Delete the non-institute The person of having identifies that token and nonowners identify token.
Figure 10 shows that preferred embodiment antifalsification label and owner's mobile phone and nonowners' mobile phone calculate RES3 flow Figure.
The Antiforge system 100 based on near-field communication technology of the present embodiment, it is possible to achieve the above-mentioned art work identifies function.Institute Stating Antiforge system includes antifalsification label 101, false proof mobile phone 102 and anti-counterfeit server 103.Main body difference is initiated according to identification, prevented Pseudo- mobile phone includes the false proof mobile phone 102-1 of the owner and false proof mobile phone 102-2 of nonowners.
The antifalsification label 101 is used for:Receiving the owner and identify request, the owner, which is identified in request, includes public key, Antifalsification label verifies the public key;And/or receive nonowners and identify request, the nonowners are identified in request comprising public affairs Key, antifalsification label verify the public key.
The reception identifies request as that can be that the owner identifies request, and the 5th is calculated by parameter of the second counterfeiting token Tag security information (Y5) is for transmission;It is anti-with second and/or identifying for the reception asks to identify request for nonowners Pseudo- token is that parameter calculates the 7th tag security information (Y7);And send the 7th tag security information (Y7) and anti-counterfeiting object ID.
The antifalsification label is used to store ID, tag ID, anti-counterfeiting object ID and the second counterfeiting token.
The false proof mobile phone 102-1 of the owner, is used for:The owner, which is initiated, to server identifies request, the identification request It is middle to carry the first counterfeiting token to prestore, and receive the owner and identify token.The owner, which is initiated, to antifalsification label identifies request, and The second counterfeiting token is received safely from antifalsification label, is reflected according to the first counterfeiting token, the second counterfeiting token and the owner to prestore Surely the identification response of token computation first (RES1) is asked;Sent to server and carry the first identification response (RES1), prestore Anti-counterfeiting object ID and, the identification of owner's ID request (616).
Receive the second counterfeiting token safely from antifalsification label and the obtain the 5th mark is calculated by the second counterfeiting token to receive Security information (Y5) is signed, the false proof mobile phone intelligent card of the owner is calculated with the 5th tag security information (Y5) for parameter First result (J1), the false proof mobile phone of the owner are false proof with the first result (J1) and the false proof mobile phone intelligent card of the owner first Token is that parameter calculates the second result (J2);Identify that token calculates the as parameter using second result (J2) and the owner again One identification response (RES1).
In addition, also carrying needs its of reception qualification result in the identification request (616) that the mobile phone is sent to server His false proof phone number.
The mobile phone is additionally operable to:Search sequence number (S1) is received, anti-counterfeit server is logged in and inputs owner's inquiry sequence Row number (S1), inquires about false proof result.
Preferably, the mobile phone also has the function of coordinating nonowners' identification, that is, receiving the identification of nonowners' mobile phone please Ask, the first counterfeiting token calculates safety knot in the second counterfeiting token, the false proof mobile phone intelligent card of the owner in being asked according to identification Fruit, and safety result and owner's ID are transmitted.
Wherein:The second counterfeiting token in nonowners' mobile phone identification request is replaced with according to the second counterfeiting token meter The 7th tag security information (Y7) calculated.
The false proof mobile phone intelligent card of the owner is that parameter calculates the 5th result with the 7th tag security information (Y7) (J5);The false proof mobile phone of the owner is with the 5th result (J5) and to be stored in the false proof mobile phone intelligent card of the owner first anti- Pseudo- token is that parameter the 6th result (J6) of calculating is used as safe result.
The false proof mobile phone 102-2 of nonowners, request is identified for initiating nonowners to server, the identification please Middle carrying nonowners' ID is sought, and receives nonowners from server and identifies token.Nonowners are initiated to antifalsification label Identification request, and the second counterfeiting token and anti-counterfeiting object ID are received safely from antifalsification label.Initiate to carry institute to owner's mobile phone State the identification request that anti-counterfeiting object ID, the second counterfeiting token and the nonowners identify token.Receive and pacify from owner's mobile phone Full result and owner's ID, the identification response of token computation the 3rd is identified according to the safe result, the nonowners (RES3).To server send carry it is described 3rd identification response (RES3), anti-counterfeiting object ID, owner's ID it is not all Person identifies request.
Wherein, it is that reception is logical safely from antifalsification label to receive the second counterfeiting token and anti-counterfeiting object ID safely from antifalsification label Cross the second counterfeiting token and calculate the 7th tag security information (Y7) obtained;And carried to the initiation of owner's mobile phone described false proof Object ID, the 7th tag security information (Y7) and the nonowners identify the identification request of token.
The mobile phone is additionally operable to:Nonowners' search sequence number (S2) is received, logs in anti-counterfeit server input nonowners Search sequence number of reflecting (S2), inquires about false proof result.
Wherein:The nonowners sent to antifalsification label, which are identified in request (905), includes public key.
The anti-counterfeit server 103, is used for:Identification request is received from mobile phone, creates and stores identification token for sending; Receive identification request again from mobile phone, it is described to identify request bag ID containing the owner, anti-counterfeiting object ID and by mobile phone calculating Identification response (RES1, RES3), according in the identification request corresponding to anti-counterfeiting object ID and be stored in server first Counterfeiting token, the second counterfeiting token and the identification token computation identification response (RES2, RES4), if the mirror that server calculates Provisioning response is equal to the identification response that mobile phone calculates, then correct judgment;Examine it is described identification request in owner's ID whether with Anti-counterfeiting object ID is corresponding in identification request and consistent, the correct judgment if consistent that is stored in the ID in server; Create, preserve and send search sequence number;Delete identification token.
Wherein:Identify that request identifies request for the owner from what mobile phone received, it is false proof comprising first in the identification request Token;Or identify that request identifies request for nonowners from what mobile phone received, used in the identification request comprising nonowners Family ID.
The server is additionally operable to:Create the identification token time limit;Identification process is not above identifying the token time limit;Delete Except the identification token time limit.
The server is additionally operable to:Storage qualification time is simultaneously associated with owner's ID by qualification time.
The system architecture diagram of the present invention is described below:Figure 11 is the structural representation of anti-counterfeit server of the present invention.Such as figure Shown in 11, the anti-counterfeit server includes:Authentication processing unit 1101, communication unit 1102, Antiforge system user management list Member 1103, anti-counterfeiting object database 1104, authentication result queries processing unit 1105, short message sending unit 1106.Wherein:
Authentication processing unit 1101 be used for from communication unit receive authentication request (including the owner identify request Identify and ask with nonowners) and relevant information, anti-counterfeiting object information is inquired about from anti-counterfeiting object database, is used from Antiforge system Family administrative unit inquires about false proof user profile, identifies false proof user, counterfeiting token is issued to false proof user, by calculating mould safely Block calculate the first identification that the second identification identifications of response RES2 or the 4th response RES4 is sent with false proof mobile phone and responded The identification responses of RES1 or the 3rd RES3 is compared, if being true unanimously, otherwise is false.
Communication unit 110 is used to handle the authentication request sent from false proof mobile phone, including the owner identifies request Identify and ask with nonowners.
Antiforge system administrative unit 1103 is used for the mark and security information for inquiring about false proof user, logs in token.
Anti-counterfeiting object database 1104 is anti-for managing anti-counterfeiting object ID, creator's information, the first counterfeiting token and second Pseudo- token.
Authentication result queries processing unit 1105 is used to receive the result from false proof mobile phone and other ordinary terminals Inquiry request, inquired about according to the identifying code reported.
Short message sending unit 1106 is responsible for sending the identifying code of authentication result to false proof mobile phone and regular handset.
Figure 12 is the work-based logic schematic diagram of authentication processing unit 1101.Wherein:
Step 1201 communication unit receives identification request.
Step 1202 judges whether user is legal, if it is otherwise, it returns to user is illegal.
Step 1203 checks that user identifies whether token is legal, turns 1004 if not, if turning 1005.
The request of step 1204 authentication is illegal.
Step 1205 is identified in the owner in request:Calculate the second identification response RES2 is sent with false proof mobile phone first Identification response RES1 is compared, and algorithm is referring to Fig. 7 and correlation step;In nonowners identify request:Calculate the 4th identification Response RES4 is compared with the 3rd identification response RES3 that false proof mobile phone is sent, and algorithm is referring to Figure 10 and correlation step.
Step 1206 checks whether RES and RES1 is consistent, if inconsistent turn 1207;It is consistent then turn 1208.
The request of step 1207 authentication is false.
The request of step 1208 authentication is true.
The art work authentication method and device based on near-field communication technology of the present invention is described with reference to the accompanying drawings above. This method forms the data for conditioning each other and depending on each other for existence in server, false proof mobile phone, smart card and antifalsification label, including with Family ID, tag ID, anti-counterfeiting object ID, the first counterfeiting token and the second counterfeiting token, various tag security information Y5, Y7, it is various Intermediate result etc., intermediate data is calculated between server and mobile phone and label respectively, and verified, so that it is guaranteed that links It can be completed by the verification of multiple data, so as to realize that the art work turns into safety anti-fake (registration, the mirror of art sales behavior Fixed, transfer).Simultaneously creator can record works information in the server, facilitate art sales behavior displaying, record and Management.
Describe to realize art work transference using Antiforge system of the invention below.
When transferring the possession of function, understand the false proof mobile phone of the owner and be transferred mobile phone and participate.Therefore, function introduction is being carried out When, the false proof mobile phone of the owner can be used and be transferred false proof mobile phone and be accordingly introduced.Unless otherwise instructed, false proof mobile phone Represent the false proof mobile phone of the owner.
Figure 13 is a kind of art work assignment method flow chart based on near-field communication technology of the present invention, including:
S1301, anti-counterfeit server receive the transfer request sent from false proof mobile phone, and described transfer the possession of asks to include being transferred use Family ID and anti-counterfeiting object ID, generate and store the transfer token associated with anti-counterfeiting object ID, send to include and transfer the possession of token Confirm to transfer the possession of request to the false proof mobile phone of the owner and be transferred false proof mobile phone.
In order to ensure assigning security, it is preferable that also include the false proof mobile phone of the owner before the step S1301 to false proof The step of object is identified;And/or also anti-counterfeiting object is entered including the false proof mobile phone in the side of being transferred after the step 1301 The step of row identification, Fig. 5 and Fig. 6 owner's identity process, institute are may be referred to the step of the owner false proof mobile phone identification State nonowners' identity process that the step of being transferred false proof mobile phone identification may be referred to Fig. 8 and Fig. 9.
Wherein, anti-counterfeit server receives the transfer request sent from false proof mobile phone, and the false proof mobile phone is that the owner is false proof Mobile phone is the false proof mobile phone in the side of being transferred.
S1302, the false proof mobile phone of the owner receive and store the transfer token, judge whether to confirm that the transfer please Ask, if it is confirmed that then in the false proof mobile phone intelligent card of the owner with anti-counterfeiting object ID is associated in the transfer token the One counterfeiting token carries out invalid setting, and the second counterfeiting token in pair antifalsification label associated with the transfer token carries out nothing Effect is set;Delete first counterfeiting token and second counterfeiting token simultaneously;
S1303, the server is according to the associated tag ID of the transfer token and is transferred false proof cellphone subscriber ID Generate and store new the first counterfeiting token and the second counterfeiting token, send the first new counterfeiting token and the second false proof order Board is transferred false proof mobile phone to described.
S1304, it is described to be transferred false proof mobile phone and receive new first counterfeiting token and the second counterfeiting token, with institute State new the first counterfeiting token write-in transferred the possession of the associated anti-counterfeiting object ID of token and received from the anti-counterfeit server It is described to be transferred false proof mobile phone intelligent card.And by the second new counterfeiting token received from the anti-counterfeit server and turned ID is allowed to write the antifalsification label associated with the transfer token.
S1305, the anti-counterfeit server include transferring the possession of the setting successful request of token from false proof mobile phone reception is transferred, will The owner that false proof mobile phone is arranged to the anti-counterfeiting object ID related to transferring the possession of token is transferred, records Transaction Information;Delete and transfer the possession of Token.
S1306, the anti-counterfeit server to the false proof mobile phone of the former owner and it is described be transferred false proof mobile phone send transfer the possession of into Work(firmly believes request, and the former false proof mobile phone of the owner, which is deleted, transfers the possession of token, the first counterfeiting token and the second counterfeiting token;The quilt Transfer the possession of false proof mobile phone and delete transfer token.
Figure 14 is a kind of art work assignment method preferred embodiment based on near-field communication technology of the present invention.
1401:The owner initiates identity process.
1402:The anti-counterfeiting object ID being transferred in mobile phone reading antifalsification label.
1403:It is transferred mobile phone and will be transferred ID, anti-counterfeiting object ID is sent to the false proof mobile phone of the owner.
1404:The false proof mobile phone of the owner is to be transferred ID, anti-counterfeiting object ID turns as parameter to anti-counterfeit server request Allow.
1405:Anti-counterfeit server, which is sent, transfers the possession of token to the false proof mobile phone of the owner.
1406:Anti-counterfeit server sends the message for confirming to receive to being transferred mobile phone.
1407:Anti-counterfeit server sends identification request and is transferred mobile phone.
1408:It is transferred mobile phone and initiates identity process.
1409:Being transferred mobile phone and sending confirms the message that accepts a delivery acceptance of delivery to server.
1410:Anti-counterfeit server sends the confirmation transfer request for including transferring the possession of token.
1411:The false proof mobile phone of the owner confirms to start to transfer the possession of to anti-counterfeit server.
1412:The false proof mobile phone of the owner sets the first counterfeiting token in the false proof mobile phone intelligent card of the owner invalid.
1413:The false proof mobile phone intelligent card feedback of the owner sets the invalid success of the first counterfeiting token.
1414:The false proof mobile phone of the owner sets the second counterfeiting token in antifalsification label invalid.
1415:Antifalsification label feedback sets the invalid success of the second counterfeiting token.
1416:The false proof mobile phone of the owner to anti-counterfeit server feed back the first counterfeiting token and the second counterfeiting token it is invalid into Work(.
1417:The server is associated with transferring the possession of token in the setting invalid successful request of counterfeiting token according to receiving Tag ID, be transferred false proof cellphone subscriber ID and generate and store the first new counterfeiting token and the second new counterfeiting token.
1418:The anti-counterfeit server sends the first new counterfeiting token and the second new counterfeiting token to described It is transferred false proof mobile phone.
1419:It is described to be transferred false proof mobile phone by with the associated anti-counterfeiting object ID of the transfer token and from described false proof False proof mobile phone intelligent card is transferred described in new the first counterfeiting token write-in that server receives.
1420:The mobile phone intelligent card that is transferred writes successfully to the mobile phone feedback that is transferred.
1421:It is described to be transferred mobile phone by the second new counterfeiting token received from the anti-counterfeit server and turned ID is allowed to write the antifalsification label associated with the transfer token.
1422:The antifalsification label writes successfully to the mobile phone feedback that is transferred.
1423:The anti-counterfeit server reception is transferred the setting for including transferring the possession of token that false proof mobile phone is sent and successfully asked Ask.
1424:The anti-counterfeit server is arranged to the anti-counterfeiting object ID's related to transferring the possession of token by false proof mobile phone is transferred The owner;And record Transaction Information;Delete and transfer the possession of token.
1425:The anti-counterfeit server sends to transfer the possession of to the false proof mobile phone of the former owner successfully firmly believes request.
1426:The false proof mobile phone of the former owner, which is deleted, transfers the possession of token and the first counterfeiting token and the second counterfeiting token.
The Antiforge system 100 based on near-field communication technology of the present embodiment, it is possible to achieve the above-mentioned art work transfers the possession of function.Institute Stating Antiforge system includes antifalsification label 101, the false proof mobile phone 102-1 of the owner, is transferred false proof mobile phone 102-3 and the false proof clothes Business device 103.
The antifalsification label 101 is used for:Receive and transfer the possession of token, set the second counterfeiting token invalid according to token is transferred the possession of, with And send and the successful message of token valid is set;Write request is received, the second new counterfeiting token is write according to write request, with And send and write successful message.
Preferably, the antifalsification label:Receive and transfer the possession of token, public key, antifalsification label verification are included in the transfer token The public key.
Preferably, the antifalsification label (101) receives write request, and said write request includes writing key, anti-counterfeiting label Key is write described in label verification.
The false proof mobile phone 102-1 of the owner, is used for:Antifalsification label is read, obtains antifalsification label ID and anti-counterfeiting object ID; Sent to anti-counterfeit server and transfer the possession of request, the request includes being transferred ID and anti-counterfeiting object ID;Receive and wrap from server The confirmation transfer request for transferring the possession of token is included, judges whether to confirm that described transfer the possession of is asked, if it is confirmed that then preventing the owner Carry out invalid setting with associated the first counterfeiting tokens of anti-counterfeiting object ID in the transfer token in pseudo- mobile phone intelligent card, pair and Second counterfeiting token transferred the possession of in the associated antifalsification label of token carries out invalid setting;It is false proof to delete described first simultaneously Token and second counterfeiting token.
Wherein, receive and store the transfer request for being transferred mobile phone transmission including being transferred ID and anti-counterfeiting object ID.
In addition, the mobile phone also sends the invalid successfully request of the setting counterfeiting token for including transferring the possession of token to server.
The mobile phone is additionally operable to:Delete and transfer the possession of token, the first counterfeiting token and the second counterfeiting token.
It is described to be transferred false proof mobile phone 102-3, it is used for:Antifalsification label is read, obtains antifalsification label ID and anti-counterfeiting object ID; Sent to owner's mobile phone and transfer the possession of request, described transfer the possession of asks to include being transferred ID and anti-counterfeiting object ID;Connect from server The transfer confirmation request for including and transferring the possession of token is received, judgement is confirmed whether to accept a delivery acceptance of delivery, and receives the first new counterfeiting token and new The second counterfeiting token;False proof cell phone intelligent will be transferred described in anti-counterfeiting object ID and new the first counterfeiting token write-in Card, and by the second new counterfeiting token and it is transferred the ID write-in anti-counterfeiting label associated with the transfer token Label;Delete and transfer the possession of token.
The anti-counterfeit server 103, is used for:Receive anti-counterfeiting object ID and be transferred false proof cellphone subscriber ID, generate and deposit The storage transfer token associated with anti-counterfeiting object ID, the confirmation transfer that sending has transfer token ask to the false proof mobile phone of the owner with It is transferred false proof mobile phone;According to the associated tag ID of the transfer token and it is transferred false proof cellphone subscriber ID and generates and store New the first counterfeiting token and the second counterfeiting token, for sending;Include transferring the possession of setting for token from being transferred false proof mobile phone and receiving Successful request is put, false proof mobile phone will be transferred and be arranged to the owner to transferring the possession of the related anti-counterfeiting object ID of token;And record friendship Easy information;Delete and transfer the possession of token.
Figure 15 is one of structural representation of the false proof mobile phone of the present invention.As shown in figure 15, the false proof mobile phone includes:NFC Control unit 1501, anti-counterfeiting information processing and control element (PCE) 1502, encrypting module 1503, safe data storage unit 1504, communication Unit 1505.
Wherein:NFC control units 1501 are used to be communicated with anti-counterfeiting object, read the mark and safety letter of anti-counterfeiting object Breath, packet ID containing antifalsification label.Anti-counterfeiting information control unit 1502 is used to handle false proof request, using counterfeiting token as defeated Enter to call encrypting module to obtain accordingly result.Communication unit 1505 is used for and all false proof mobile phones of the communications of anti-counterfeit server Message between anti-counterfeit server.Safe data storage unit 1504 is used to store ID, identification request token (including institute The person of having identifies that token and nonowners identify token).Encrypting module 1503, which is used to handle, comes from anti-counterfeiting information processing and control element (PCE) CIPHERING REQUEST, if the owner identify ask, flow such as Fig. 7;Identify and ask if nonowners, flow such as Figure 10.
The two of the structural representation of the false proof mobile phone of Figure 16 present invention.As shown in figure 16, on the basis of Figure 15, false proof mobile phone Also include:NFC antenna 1607, telecom intelligent card 1606, short message receiving unit 1608.Wherein:NFC antenna 1607, for preventing Antifalsification label carries out radio communication in pseudo- object;Telecom intelligent card 1606, for storing the ID of false proof user, log-on message;It is short Receiving unit 1608 is believed, for receiving Antiforge inquiry result, and dependent authentication information.
Figure 17 is the structural representation of the false proof smart card of the present invention.As shown in figure 17, the smart card includes, and NFC-SWP leads to Believe unit 1701, be responsible for communicating with false proof mobile phone NFC communication module;Machine cartoon letters unit 1702, it is responsible for false proof mobile phone and intelligence The communication of card;Control unit 1703, it is responsible for the processing of all anti-counterfeiting information, the communication of unit;Encrypting module 1704 is responsible for Calculating is encrypted;Data storage cell 1705 is responsible for storage security information data.
Figure 18 is the structural representation of antifalsification label of the present invention.As shown in figure 18, the antifalsification label includes, communication unit 1812, it is responsible for carrying out near-field communication with false proof mobile phone;Anti-counterfeiting information processing and control element (PCE) 1811, it is responsible for all false proof letters in label The processing of breath, the communication between unit;Encrypting module 1813 is responsible for that calculating is encrypted, as anti-counterfeiting object is believed safely in Figure 10 Cease Y7 calculating or Fig. 7 in anti-counterfeiting object security information Y5;Data storage cell 1814 is responsible for data storage.
Figure 19 is the structural representation of Antiforge system embodiment of the present invention.As shown in figure 19, the system of the present embodiment is to Fig. 1 Shown system is refined, and the Antiforge system of the present embodiment specifically includes:
Antiforge system server 1920 is identical with foregoing Antiforge system server Figure 15.Wherein communication unit, authentication Processing unit, anti-counterfeiting object database, Antiforge system service management unit, access qualification result query unit, short message sending list Member is corresponding with each module in Figure 15, and its working method is identical.
False proof mobile phone 1910 is identical with the false proof mobile phone in foregoing false proof mobile phone Figure 16, Figure 17, wherein NFC antenna, NFC controls Unit processed, communication unit, short message receiving unit, anti-counterfeiting information processing and control element (PCE), encrypting module, safe data storage unit with Each module is corresponding in Figure 16, Figure 17, and its working method is identical.
Smart card 1900 is corresponding with telecom intelligent card in Figure 18, and working method is identical.
Anti-counterfeiting object 1940 is corresponding with anti-counterfeiting object in Fig. 1, and working method is identical.
The art work assignment method and device based on near-field communication technology of the present invention is described with reference to the accompanying drawings above. This method forms the data for conditioning each other and depending on each other for existence in server, false proof mobile phone, smart card and antifalsification label, including with Between family ID, tag ID, anti-counterfeiting object ID, the first counterfeiting token and the second counterfeiting token, server and mobile phone and label respectively Respective data are updated in transference and are verified, so that it is guaranteed that links can be complete by the verification of multiple data Into so as to realize that the art work turns into the safety anti-fake (registration, identification, transferring the possession of) of art sales behavior.Creator can be with simultaneously Works information is recorded in the server, facilitates displaying, record and the management of art sales behavior.
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all the present invention spirit and Within principle, any modification, equivalent substitution and improvements made etc., it should be included in the scope of the protection.

Claims (16)

1. a kind of art work register method based on near-field communication technology, it is characterised in that comprise the following steps:
S201, anti-counterfeit server (103) according to false proof mobile phone (102) transmit come ID and false proof mobile phone (102) from false proof The tag ID read in label (101) creates and stores the establishment token and anti-counterfeiting object ID associated with the tag ID, sends out Give false proof mobile phone (102) (308-310);
S202, the false proof mobile phone (102) receive from the anti-counterfeit server (103) and store the establishment token and described anti- Pseudo- object ID simultaneously writes tag request to the antifalsification label (101) transmission;
S203, the antifalsification label (101) write tag request in the antifalsification label according to the false proof mobile phone (102) (101) the anti-counterfeiting object ID and the ID are write in;
S204, the false proof mobile phone (102) input works information by user interface, and according to the anti-counterfeiting object ID, described Works information and the establishment token send registration request to the anti-counterfeit server (103);
S205, it is described false proof with receiving that token is created described in the registration request that the anti-counterfeit server (103) confirms to receive Establishment token corresponding to object ID is consistent, while determines that the tag ID is to register for the first time, then stores works information, generate First counterfeiting token and second counterfeiting token associated with the anti-counterfeiting object ID, send the false proof mobile phone (102) to, delete Except the establishment token;
S206, the false proof mobile phone (102) is by the anti-counterfeiting object ID and the institute received from the anti-counterfeit server (103) The first counterfeiting token write-in smart card (104) is stated, and second counterfeiting token is write into the antifalsification label (101), is deleted The establishment token.
2. method as claimed in claim 1, it is characterised in that methods described also includes:
S203, the antifalsification label (101) calculate the first tag security information (X1) according to tag ID and ID, and according to institute State the first tag security information (X1) and calculate the second tag security information (X2) and be transmitted to the false proof mobile phone (102);
S204, the false proof mobile phone (102) send to the anti-counterfeit server (103) and carry the second tag security information (X2), the anti-counterfeiting object ID, the works information and the registration request for creating token;
S205, corresponding to the establishment token of the anti-counterfeit server (103) in the registration request and it is stored in institute The tag ID in anti-counterfeit server (103) and ID are stated to calculate the first tag security information phase with the antifalsification label Same method calculates the 3rd tag security information (X3), and the anti-counterfeit server (103) uses the mark of asymmetric arithmetic decryption second Sign security information (X2) and obtain the 4th tag security information (X4), if the 4th tag security information (X4) is equal to described the Three tag security information (X3), then the second tag security is believed described in anti-counterfeit server (103) verification registration request It is correct to cease (X2).
3. method as claimed in claim 1 or 2, it is characterised in that methods described also includes:
S201, the anti-counterfeit server (103) according to false proof mobile phone (102) transmit come ID and false proof mobile phone from anti-counterfeiting label The tag ID read in label (101) creates and stores the establishment token time limit associated with the tag ID;
S205, the anti-counterfeit server (103) judges that this establishment process is not above the establishment token time limit, and deletes wound Build the token time limit.
4. method as claimed in claim 2, it is characterised in that methods described also includes:
S201, the label corresponding with the tag ID that anti-counterfeit server (103) inquiry prestores writes key, with non- Symmetric encipherment algorithm, which transmits the label, writes key;
S202, the false proof mobile phone (102) receive the label from the anti-counterfeit server (103) and write key, the false proof hand Machine (102) sends to write tag request and include the label to the antifalsification label (101) writes key;
S203, the antifalsification label (101) examine the label write key write with label preset in antifalsification label (101) it is close Whether key is consistent, using the tag ID, ID and label local key is parameter in terms of 3DES encryption algorithm if consistent The first tag security information (X1) is calculated, and institute is calculated with asymmetric arithmetic for parameter with the first tag security information (X1) State the second tag security information (X2), label local key be equally stored in anti-counterfeit server and with a pair of tag ID 1 Should;
S205, corresponding to the establishment token of the anti-counterfeit server (103) in the registration request and it is stored in institute Tag ID, ID and the label local key stated in anti-counterfeit server (103) calculate the 3rd for parameter with 3DES encryption algorithm Tag security information (X3);And first counterfeiting token and second counterfeiting token are transmitted with rivest, shamir, adelman.
5. method as claimed in claim 1 or 2, it is characterised in that:
Works information includes described in S204:Author information, works content, works description, creative time, creative place.
6. method as claimed in claim 1 or 2, it is characterised in that:
Before S201, in addition to:The incidence relation of the tag ID and the ID is stored in anti-counterfeit server, and Judge in step sl false proof mobile phone (102) transmission come ID whether with false proof mobile phone (102) from antifalsification label (101) The tag ID association of reading.
A kind of 7. art work register method based on near-field communication technology performed as described in any one in claim 1-6 False proof mobile phone (102), it is characterised in that the false proof mobile phone is used for:
Read the tag ID in antifalsification label;
ID and tag ID are sent to anti-counterfeit server (103);
Simultaneously storage creation token and anti-counterfeiting object ID are received from anti-counterfeit server (103);
Establishment writes tag request for sending;
Works information is inputted by user interface, and is sent to the anti-counterfeit server (103) and carries the anti-counterfeiting object ID, institute State works information and the registration request for creating token;
The first counterfeiting token and the second counterfeiting token are received, by the anti-counterfeiting object ID and from the anti-counterfeit server (103) First counterfeiting token write-in smart card (104) received, and second counterfeiting token is write into the antifalsification label (101);
And delete the establishment token.
8. mobile phone (102) as claimed in claim 7, it is characterised in that the mobile phone is additionally operable to:
Receive the second tag security information (X2);And the second label for carrying and receiving is sent to the anti-counterfeit server (103) Security information (X2), the anti-counterfeiting object ID, the works information and the registration request for creating token.
9. mobile phone (102) as described in claim 7 or 8, it is characterised in that the mobile phone is additionally operable to:
The label, which is received, from the anti-counterfeit server (103) writes key;Sent to the antifalsification label (101) and carry the mark What label write key writes tag request.
10. mobile phone (102) as described in claim 7 or 8, it is characterised in that:
The works information includes:Author information, works content, works description, creative time, creative place.
A kind of 11. art work registration side based on near-field communication technology performed as described in any one in claim 1-6 The anti-counterfeit server (103) of method, it is characterised in that the anti-counterfeit server is used for:
According to the ID and tag ID received, create and store the establishment token associated with the tag ID and false proof right As ID, for sending;
Receive and carry anti-counterfeiting object ID, works information and the registration request for creating token, confirm the wound in the registration request of reception It is consistent with the establishment token corresponding to the anti-counterfeiting object ID received to build token, it is to register for the first time to determine the tag ID, Then store works information;
Generation first counterfeiting token and second counterfeiting token associated with the anti-counterfeiting object ID, for sending;
Delete the establishment token.
12. server as claimed in claim 11, it is characterised in that the anti-counterfeit server is used for:
Receive and carry the second tag security information (X2), anti-counterfeiting object ID, works information and the registration request for creating token, according to Establishment token in registration request is corresponding and the tag ID that is stored in the anti-counterfeit server (103) and ID with it is anti- Pseudo label calculates X1 identicals method and calculates the 3rd tag security information (X3), and the anti-counterfeit server (103) uses asymmetric Algorithm decrypts the second tag security information (X2) and obtains the 4th tag security information (X4), if the 4th tag security information (X4) it is equal to the 3rd tag security information (X2), then the anti-counterfeit server (103) is verified described in the registration request Second tag security information (X2) is correct.
13. the server as described in claim 11 or 12, it is characterised in that the anti-counterfeit server is additionally operable to:
ID and tag ID according to receiving create and store the establishment token time limit associated with the tag ID;
The anti-counterfeit server (103) judges that this registration process is not above the establishment token time limit;
And delete and create the token time limit.
14. the server as described in claim 11 or 12, it is characterised in that the anti-counterfeit server is additionally operable to:
Inquire about the label corresponding with the tag ID prestored and write key, the label is transmitted with rivest, shamir, adelman Write key;
Corresponding to the establishment token in registration request and be stored in the anti-counterfeit server (103) tag ID, ID and label local key are that parameter calculates the 3rd tag security information (X3) with 3DES encryption algorithm;And added with asymmetric Close algorithm transmits first counterfeiting token and second counterfeiting token.
15. the server as described in claim 11 or 12, it is characterised in that:
The works information includes:Author information, works content, works description, creative time, creative place.
A kind of 16. Antiforge system (100) based on near-field communication technology, it is characterised in that:
Including the false proof mobile phone (102) described in antifalsification label (101), claim 7 and the false proof service described in claim 11 Device (103).
CN201410006029.0A 2014-01-07 2014-01-07 A kind of register method based on near-field communication technology, false proof device and Antiforge system Expired - Fee Related CN103745365B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410006029.0A CN103745365B (en) 2014-01-07 2014-01-07 A kind of register method based on near-field communication technology, false proof device and Antiforge system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410006029.0A CN103745365B (en) 2014-01-07 2014-01-07 A kind of register method based on near-field communication technology, false proof device and Antiforge system

Publications (2)

Publication Number Publication Date
CN103745365A CN103745365A (en) 2014-04-23
CN103745365B true CN103745365B (en) 2017-12-19

Family

ID=50502381

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410006029.0A Expired - Fee Related CN103745365B (en) 2014-01-07 2014-01-07 A kind of register method based on near-field communication technology, false proof device and Antiforge system

Country Status (1)

Country Link
CN (1) CN103745365B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103218591A (en) * 2013-05-07 2013-07-24 南京大学 Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6105871A (en) * 1992-07-16 2000-08-22 Telxon Corporation Portable bar code scanner apparatus
CN100410958C (en) * 2003-12-04 2008-08-13 武汉矽感科技有限公司 Antifalse antipirated edition terninal equipment and method
US7677461B2 (en) * 2005-03-10 2010-03-16 Mil. Digital Labeling Inc. Digital labels for product authentication
JP5728975B2 (en) * 2011-01-31 2015-06-03 ソニー株式会社 Information processing apparatus and method, and program
CN102779284B (en) * 2012-01-30 2015-05-20 张楠 RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103218591A (en) * 2013-05-07 2013-07-24 南京大学 Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same

Also Published As

Publication number Publication date
CN103745365A (en) 2014-04-23

Similar Documents

Publication Publication Date Title
CN109034793A (en) Digital cash method of commerce and digital cash wallet hardware based on block chain
CN105684346B (en) Ensure the method for air communication safety between mobile application and gateway
CN1588386B (en) System and method for realizing article information detection by radio frequency identification and mobile communication combination
US12014338B2 (en) Device for directly transmitting electronic coin data records to another device, and payment system
CN107771383A (en) At least two authenticating devices are mapped to the method for user account using certificate server
CN108496382A (en) Security information transmitting system and method for personal identification
CN107822208A (en) Electronic cigarette and electronic cigarette activation system
CN103795807B (en) Task data processing method, apparatus and system based on P2P networks
CN101300808A (en) Method and arrangement for secure autentication
WO2003050774A1 (en) A method of distributing a public key
AU7560298A (en) Electronic transaction
US20230103038A1 (en) Method for directly transferring electronic coin data sets between terminals, payment system, currency system and monitoring unit
CN107920052A (en) A kind of encryption method and intelligent apparatus
US20230259899A1 (en) Method, participant unit, transaction register and payment system for managing transaction data sets
CN109754241A (en) A kind of hard money packet and the verification method based on hard money packet
KR20190132159A (en) Method for Providing Cryptocurrency Trading Platform based on Blockchain by using Smart Contract
KR20190132054A (en) Method for Providing Cryptocurrency Trading Platform by using Smart Contract based on Blockchain
CN107609878A (en) A kind of safety certifying method and system of shared automobile
CN109088729A (en) Key storage method and device
CN103763007B (en) Identification method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology
CN103186805A (en) Smart card and signature authentication method based on smart card
CN103761655B (en) A kind of assignment method based on near-field communication technology, false proof device and Antiforge system
CN105072084B (en) The method for building up of mobile terminal and external equipment data connection
CN103745365B (en) A kind of register method based on near-field communication technology, false proof device and Antiforge system
CN105376704A (en) Mobile wallet near-field communication payment method based on image encryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171219