CN1588436A - Anti-fake method using non-symmetric cipher technology - Google Patents

Anti-fake method using non-symmetric cipher technology Download PDF

Info

Publication number
CN1588436A
CN1588436A CN 200410078160 CN200410078160A CN1588436A CN 1588436 A CN1588436 A CN 1588436A CN 200410078160 CN200410078160 CN 200410078160 CN 200410078160 A CN200410078160 A CN 200410078160A CN 1588436 A CN1588436 A CN 1588436A
Authority
CN
China
Prior art keywords
information
label
counterfeit
key
antifalsification label
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200410078160
Other languages
Chinese (zh)
Inventor
邱华生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 200410078160 priority Critical patent/CN1588436A/en
Publication of CN1588436A publication Critical patent/CN1588436A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to an anti-fake method using nonsymmetrical code technology. it includes following steps: the input step of protected object information; application step for generating, managing and using the nonsymmetrical code; anti-fake label generating step for outputting the edited label information as anti-fake label product; anti-fake label identification step for reading, decoding and testifying the label on the protected product. The invention is an anti-fake method with nonsymmetrical code technology, it ensures the safety of the anti-fake method; and it uses network server to complete the input and code application of protected object information, guarantees the stability and reliability of the anti-fake method; at the same time, the invention completes the production of label with printing output device, thus the cost is decreased.

Description

A kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique
Technical field
The present invention relates to a kind of method for anti-counterfeit, particularly relate to a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique.
Background technology
Current field of anti-counterfeit technology mainly is divided into three big anti-counterfeiting technologies, and the first kind is the vision anti-counterfeiting technology, and, fluorescence falsification preventing false proof as: multiple laser anti-counterfeit, one dimension, two-dimensional bar, alternating temperature is false proof and watermark is false proof etc.This class anti-counterfeiting technology, the initial stage that develops in anti-counterfeiting technology has played better action really.But how these technology have certain special technique and fill a prescription with the fabricator is that prerequisite is made, and will occur forging in a large number packing and products in case leak.Second class is the electronic recognition anti-counterfeiting technology, as: anti-counterfeit recognitions such as magnetic recording, IC-card, this anti-counterfeiting mark has played good anti-fake effect really, but majority is just discerned product category, use to such an extent that symmetric encryption method is also rigorous inadequately simultaneously, reliable inadequately on safety.The 3rd class is the telephone code anti-counterfeiting technology, sets up national production assurance central database by computing machine, and the product that dispatches from the factory of networking enterprise is gone into library management, and the public utilizes telephone public network that product is inquired about.This is a kind of numerical information anti-counterfeiting technology, now is widely adopted, but but exists many drawbacks:
At first, because this discriminating needs damaged label to be verified sign indicating number, so just can't satisfy the follow-up of quality service of government and enterprise requirement and the need of cracking down on counterfeit goods;
Secondly,,, also make trade company be reluctant to allow the user tell truth from falsehood, increased user's purchase risk virtually at before sales so the user differentiates that first the back just can't prove the true and false of product once more because this discriminating is disposable;
At last, this discriminating has imputed to the consumer with the regular fee of anti-counterfeit recognition, and the Antiforge inquiry phone of its announcement is performed practically no function, and does not play the effect that the consumer initiatively participates in that wakes up.
This shows that above-mentioned existing antifake method for products obviously still has inconvenience and defective in method and use, can not satisfy the requirement of enterprise to its product protection, and demand urgently further being improved.In order to solve the problem that the existing product method for anti-counterfeit exists, relevant manufacturer there's no one who doesn't or isn't seeks solution painstakingly, but do not see always that for a long time suitable design finished by development, and general technology does not have appropriate method to address the above problem, and this obviously is the problem that the anxious desire of relevant dealer solves.
Because the defective that above-mentioned existing antifake method for products exists, the inventor is based on being engaged in this type of product design manufacturing abundant for many years practical experience and professional knowledge, and the utilization of cooperation scientific principle, actively studied innovation, in the hope of founding a kind of new method for anti-counterfeit that utilizes asymmetric cryptographic technique, can improve general existing antifake method for products, make it have more practicality.Through constantly research, design, and after studying repeatedly and improving, create the present invention who has practical value finally.
Summary of the invention
The objective of the invention is to, overcome the defective that existing method for anti-counterfeit exists, and a kind of new method for anti-counterfeit that utilizes asymmetric cryptographic technique is provided, technical matters to be solved be make its by the key that utilizes asymmetric cryptographic technique and produce between can't push away mutually, guaranteeing the security of this method for anti-counterfeit, thereby be suitable for practicality more.
Another object of the present invention is to, a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique is provided, technical matters to be solved is to utilize the webserver to finish the input and the cipher key application of protected object information, to guarantee the reliable and stable of this method for anti-counterfeit; Simultaneously, the present invention finishes the production of label by utilizing print out equipment, reducing application cost of the present invention, thus practical more.
The object of the invention to solve the technical problems realizes by the following technical solutions.According to a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique that the present invention proposes, it may further comprise the steps: the input step of protected object information; Produce, manage and use the cipher key application step of unsymmetrical key; The label information that has editted is output as the antifalsification label production stage of antifalsification label finished product; And identification is attached to the label on the protected product, to its antifalsification label identification step of distinguishing, decipher, verifying.
The object of the invention to solve the technical problems also can be applied to the following technical measures to achieve further.
Aforesaid a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique, the input step of wherein said protected object information is further comprising the steps of: input company information step; Input product information step; Input purchase order information step; And, generate the product serial number according to the information of above-mentioned input, and the information and the serial number of above-mentioned input is combined into information to be encrypted, deposit in the label raw data table, wait for encryption.
Aforesaid a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique, wherein said cipher key application step further may further comprise the steps: it is right at first regularly to produce pair of secret keys, and this key is to comprising encryption key that above-mentioned information to be encrypted is encrypted and the decruption key that above-mentioned information to be encrypted is decrypted; Utilize encryption key antifalsification label raw information to be carried out the encrypting step of encryption; And deposit decruption key in the decryption key information table storing step.
Aforesaid a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique, wherein said key is right to being unsymmetrical key.
Aforesaid a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique, wherein said encrypting step further may further comprise the steps: the random digit that at first adds certain-length in label raw information back; Utilize encryption key that above-mentioned information is encrypted then; The front of the information that will encrypt adds cleartext information at last, and the finish message after the above-mentioned processing is become to be fit to the form of antifalsification label output device output, and carries out output.
Aforesaid a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique, wherein said cleartext information are time, month and key issue.
Aforesaid a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique, wherein said antifalsification label production stage are after the label output information that will produce in the cipher key application step is transferred to the antifalsification label production equipment, the output antifalsification label.
Aforesaid a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique, wherein said antifalsification label production stage are the form output antifalsification labels with one yard of a mark.
Aforesaid a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique, wherein said antifalsification label identification step may further comprise the steps: the tag readable degree step; The label information decryption step; The step of the enciphered message in inquiry and the display tag information; Anti-counterfeiting information storehouse updating steps; And the step of updating of false proof decruption key.
Aforesaid a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique, the input step of wherein said protected object information and cipher key application step are finished by the webserver.
Aforesaid a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique, wherein said antifalsification label production stage is to be finished by the antifalsification label output device.
Aforesaid a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique, wherein said antifalsification label output device is a print out equipment.
The present invention compared with prior art has tangible advantage and beneficial effect.By above technical scheme as can be known, in order to reach aforementioned goal of the invention, major technique of the present invention thes contents are as follows:
A kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique that the present invention proposes, it is false proof to utilize asymmetric cryptographic technique to implement enterprise product.This method uses encryption key that enterprise product information is encrypted, and compiling is output into antifalsification label, requires in the shielded product attached to enterprise.Simultaneously, method is come in and gone out the product information of decruption key and enterprise in the recognizer, described recognizer is distinguished antifalsification label, utilize corresponding decruption key that institute's read message is decrypted, be presented on the affiliated recognizer by the product information of inquiring enterprise product information storehouse again enterprise, shown information and the information above the product material object are contrasted, differentiate the true and false of product thus.
A kind of method for anti-counterfeit of asymmetric cryptographic technique that utilizes that the present invention proposes mainly may further comprise the steps: the input step of protected object information; The cipher key application step; The antifalsification label production stage; And antifalsification label identification step.Wherein, the input step of protected object information and cipher key application step are finished by the webserver; The antifalsification label production stage is to be finished by the antifalsification label production equipment; The antifalsification label identification step is finished by the identification equipment with recognition, deciphering, data query library facility.
The input step of protected object information is responsible for collecting enterprise name, enterprise product information and enterprise product production information.The present invention at first carries out qualification authentication to protected enterprise, and industry and commerce, the tax and the relevant legal information of enterprise are confirmed, ability is input to the information of enterprise in the company information tables of data after definite enterprise is legitimate enterprise.Then, require enterprise to import it and need shielded product information, system can require the product of importing to meet the relevant information of relevant legal provisions, product information can be put into the enterprise product information data table after confirming.When enterprise needed the antifalsification label of its registered product, enterprise need provide production information to this module, and production information mainly comprises the product quantity of enterprise's this batch production.Module will produce the product serial number of this batch of enterprise product according to this product production quantity in the past.After having produced serial number, again enterprise name code, enterprise product code and product serial number are combined into one group of data, deposit in the label raw data table, wait for encryption.
The cipher key application step is responsible for the generation, management of unsymmetrical key and to the ciphering process of information.This step is one of core of this method, and it is right that it utilizes general asymmetric cryptographic technique commonly used to produce key, as elliptic curve cryptography (ECC), RSA etc.Key is to being divided into encryption key and decruption key.Encryption key is used for information is encrypted, and decruption key is used for information is decrypted.Encryption key and decruption key can't push away mutually, have guaranteed security.The method is to utilize encryption key that antifalsification label raw information is encrypted, and then utilize decruption key that antifalsification label information is decrypted, its concrete steps are as follows: it is right at first regularly to produce pair of secret keys, decruption key is deposited in the decryption key information table, storing the decruption key of all key issues before this in this table, and in this phase, all using this encryption key, encryption key will be deleted immediately when this phase finishes.This step can detect the original tag information table, after this table has data to write, module will be encrypted the original tag data, and the concrete steps of encryption are as follows: at first add the random digit of certain-length in label raw information back, to guarantee to encrypt the incomprehensiveness of raw information; Utilize the encryption key of current period that above-mentioned information is encrypted then; The information front that to encrypt at last adds the cleartext informations such as time, month and key issue of encryption, and the label information that this is complete is organized into the form that is fit to the output of antifalsification label output device, and carries out output.
The antifalsification label production stage, the label information of being responsible for having editted is output as the antifalsification label finished product.This step is finished by an antifalsification label output device, and after the label output information that produces in the cipher key application step is transferred to the antifalsification label output device, this equipment will one be marked one yard form output antifalsification label.
The antifalsification label identification step is responsible for identification attached to the label on the protected product, to its work of distinguishing, decipher, verifying.The antifalsification label identification step is to finish by an antifalsification label identification equipment.This equipment has functions such as tag readable degree, label information deciphering, label information inquiry and demonstration, the renewal of anti-counterfeiting information storehouse and false proof decruption key renewal.The antifalsification label identification equipment can regularly download to up-to-date enterprise product information table and decruption key table the database of device interior from system server.In identifying, at first label is read in, and label information is decoded by the recognition part of equipment.Then,, learn the issue of this label decruption key, by inquiry decruption key table, obtain the decruption key of this label, and this label is implemented deciphering by reading cleartext information in the information of decoding back.Behind the plaintext that obtains this label, by the inquiring enterprise product information table, obtain the information of product that label is protected, and be presented on the screen of equipment.The user contrasts this information and product information, thus authenticity of products is differentiated.
By technique scheme, a kind of method for anti-counterfeit of asymmetric cryptographic technique that utilizes of the present invention is compared with existing method for anti-counterfeit, has following advantage at least:
1, the present invention arrives false proof field with the asymmetry cryptographic applications first, uses encryption key to encrypt when making antifalsification label, utilizes decruption key to be decrypted when identification, therefore has good security.
2, the invention enables the personator can't utilize decruption key to release encryption key,, copy antifalsification label so can't obtain encryption key.
3, the present invention can accomplish one yard of a mark, and promptly each protected product all has its unique antifalsification label, makes the imitator come fake products by duplicating certain label.
4, the antifalsification label among the present invention there is no need the disposable label that uses telephone service used, and this just makes the label can repeated detection.So both well protect user's rights and interests, also made things convenient for the right-safeguarding and the supervision behavior of government and enterprise simultaneously.
5, false proof discrimination process of the present invention can inquire the information of enterprise name, product, serial number, so very convenient user uses.And the present invention can set up identification equipment in public places, and the consumer can differentiate label very easily.
In sum, a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique of the present invention, by utilize key that asymmetric cryptographic technique produces between can't push away mutually, guaranteed the security of this method for anti-counterfeit; And utilize the webserver to finish the input and the cipher key application of protected object information, guaranteed the reliable and stable of this method for anti-counterfeit; Simultaneously, the present invention finishes the production of label by utilizing print out equipment, has reduced application cost of the present invention, thereby practical more.The present invention has above-mentioned many advantages and practical value, and in class methods, do not see have similar design to publish or use and really genus innovation, no matter it all has bigger improvement on method or function, have large improvement technically, and produced handy and practical effect, and more existing antifake method for products has the multinomial effect of enhancement, thus be suitable for practicality more, and have the extensive value of industry, really be a new and innovative, progressive, practical new design.
Above-mentioned explanation only is the general introduction of technical solution of the present invention, for can clearer understanding technological means of the present invention, and can be implemented according to the content of instructions, and for above-mentioned and other purposes, feature and advantage of the present invention can be become apparent, below especially exemplified by going out preferred embodiment, and conjunction with figs., be described in detail as follows.
Description of drawings
Fig. 1 is the process flow diagram that the present invention utilizes the method for anti-counterfeit of asymmetric cryptographic technique.
Fig. 2 is the process flow diagram of the input step of the protected object information among the present invention.
Fig. 3 is the process flow diagram of the cipher key application step among the present invention.
Fig. 4 is the process flow diagram of continuous figure of the flow process of the cipher key application step among the present invention and antifalsification label production stage.
Fig. 5 is the process flow diagram of the antifalsification label identification step among the present invention.
I: protected object information II: cipher key application
III: antifalsification label is produced IV: antifalsification label identification
11: input company information 12: notice enterprise reaffirms its information
13: company information is examined 14: the company information table
15: input enterprise product information 16: notice enterprise reaffirms its product information
17: enterprise product information is examined 18: product information table
19: enterprise sends label order 110: manufacturing enterprise's label raw information
111: the original tag information table
21: whether the check key expires 22: the existing encryption key of deletion
23: it is right to utilize asymmetric cryptographic technique regularly to produce key
24: the decruption key table
25: use encryption key that label information is encrypted
26: after label raw information, add the preceding paragraph random number
27: the key issue is added in the label information with clear-text way
28: the label information of finishing is organized into the adaptation label information is organized into the form that adapts to the label output device
31: antifalsification label output
32: enterprise is with on the product of finished product label attached to correspondence
41: whether database is expired in the periodic inspection equipment
42: download up-to-date tables of data by FPDP
43: the recognition head reads antifalsification label 44: label is decoded
45: extract decruption key 46 by reading the key issue: the decruption key table
47: utilize decruption key that the label ciphertext is decrypted
48: according to label information inquiring enterprise product information 49: the enterprise product information table
410: the device prompts label can't be discerned
411: product information is presented on the equipment contrasts with product mark
Embodiment
Reach technological means and the effect that predetermined goal of the invention is taked for further setting forth the present invention, below in conjunction with accompanying drawing and preferred embodiment, to a kind of equipment that utilizes its embodiment of method for anti-counterfeit, method, step and the use of asymmetric cryptographic technique that foundation the present invention proposes, describe in detail as after.
See also shown in Figure 1ly, it is the process flow diagram that the present invention utilizes the method for anti-counterfeit of asymmetric cryptographic technique.See also shown in Figure 2ly, it is the process flow diagram of the input step of the protected object information among the present invention.See also shown in Figure 3ly, it is the process flow diagram of the cipher key application step among the present invention.See also shown in Figure 4ly, it is the process flow diagram of the antifalsification label production stage among the present invention.See also shown in Figure 5ly, it is the process flow diagram of the antifalsification label identification step among the present invention.
As shown in Figure 1; a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique that the present invention proposes; it may further comprise the steps: the cipher key application II of the input I of protected object information, generation, management and use unsymmetrical key, the label information that will edit are output as the antifalsification label production III of antifalsification label finished product and discern attached to the label on the protected product, to its antifalsification label of distinguishing, decipher, verifying identification IV.
As shown in Figure 2, the input I of protected object information is responsible for collecting enterprise name, enterprise product information and enterprise product production information.At first, by enterprise input company information 11, this step examines 13 to company information then, if not by examining then need to notify enterprise to reaffirm its information 12, requires it to examine 13 from new input company information 11 and to company information then.After more than having finished, examining process, company information is deposited in the company information table 14.So far, enterprise can begin to import enterprise product information 15, this step examines 17 to enterprise product information then, if by examining, require it to re-enter enterprise product information 15 then and enterprise product information is examined 17 from needing notice enterprise reaffirm its product information 16.After having finished above product information and examining process, product information is deposited in the product information table 18.Then, enterprise just can send label order 19, and this step can and be produced serial number according to enterprise name, enterprise product information and be generated enterprise's label raw information 110, and deposits original tag information table 111 in.
As shown in Figure 3, cipher key application II is responsible for the generation, management of unsymmetrical key and to the ciphering process of information.At first, this step can check key to whether expiring 21, if find to time limit of having exceeded its use then the at first existing encryption key 22 of deletion and utilize asymmetric cryptographic technique to produce key of key, simultaneously decruption key deposited in the decruption key table 24 to 23.Just can bring into use encryption key that label information is encrypted 25 then.If whether the check key of beginning expires found in 21 o'clock not expire, then directly enter and use encryption key label information to be encrypted 25 step.Here need to prove, use encryption key that label information is encrypted original tag information that 25 wherein label informations transfer from original tag information table 111 and after label raw information, add the preceding paragraph random number 26 again and obtain.When finish label information encrypted after, the key issue need be added in the label information 27 with clear-text way.At last, the label information of finishing is organized into the form 28 that adapts to the label output device.
As shown in Figure 4, antifalsification label is produced III, and the label information of being responsible for having editted is output as the antifalsification label finished product.Among this step receiving step II the label information of finishing is organized into the information of the form 28 that adapts to the label output device, carries out antifalsification label output 31.Enterprise just can be with the finished product label attached on the product of correspondence 32 then.
As shown in Figure 5, antifalsification label identification IV is responsible for identification attached to the label on the protected product, to its work of distinguishing, decipher, verifying.At first, whether database is expired 41 in the periodic inspection equipment, if find expired then download up-to-date tables of data 42 by FPDP, and upgrades decruption key table 46 and enterprise product information table 49, reads antifalsification label 43 just can begin the recognition head then.If whether expired 41 discoveries are not expired through database in the periodic inspection equipment, then can directly begin the recognition head and read antifalsification label 43.When the information of antifalsification label is read in the equipment, just begin label is decoded 44, extract decruption key 45 by reading the key issue, be kind to read here from decruption key table 46.Just begin then to utilize decruption key that the label ciphertext is decrypted 47.According to label information inquiring enterprise product information 48, what call here is enterprise product information table 49.Contrast 411 if can successfully find product information then product information is presented on the equipment with product mark, finish identifying.If do not find product information, then device prompts equipment can't discern 410, and care label has problem.
The above, it only is preferred embodiment of the present invention, be not that the present invention is done any pro forma restriction, though the present invention discloses as above with preferred embodiment, yet be not in order to limit the present invention, any those skilled in the art, in not breaking away from the technical solution of the present invention scope, when the method that can utilize above-mentioned announcement and technology contents are made a little change or be modified to the equivalent embodiment of equivalent variations, in every case be the content that does not break away from technical solution of the present invention, according to technical spirit of the present invention to any simple modification that above embodiment did, equivalent variations and modification all still belong in the scope of technical solution of the present invention.

Claims (12)

1, a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique is characterized in that this method may further comprise the steps:
The input step of a, protected object information;
The cipher key application step of b, generation, management and use unsymmetrical key;
C, the label information that will edit are output as the antifalsification label production stage of antifalsification label finished product; And
D, identification are attached to the label on the protected product, to its antifalsification label identification step of distinguishing, decipher, verifying.
2, a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique according to claim 1 is characterized in that the input step of wherein said protected object information is further comprising the steps of:
A, input company information step;
B, input product information step;
C, input purchase order information step; And
D, according to the information of above-mentioned input, generate the product serial number, the information and the serial number of above-mentioned input is combined into information to be encrypted, deposit in the label raw data table, wait for encryption.
3, a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique according to claim 1 and 2 is characterized in that wherein said cipher key application step further may further comprise the steps:
A, at first regularly to produce pair of secret keys right, and this key is to comprising encryption key that above-mentioned information to be encrypted is encrypted and the decruption key that above-mentioned information to be encrypted is decrypted;
B, utilize encryption key antifalsification label raw information to be carried out the encrypting step of encryption; And
C, deposit decruption key in the decryption key information table storing step.
4, a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique according to claim 3 is characterized in that wherein said key is right to being unsymmetrical key.
5, a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique according to claim 3 is characterized in that wherein said encrypting step further may further comprise the steps:
A, at first add the random digit of certain-length in label raw information back;
B, utilize encryption key that above-mentioned information is encrypted then;
The front of c, the information that will encrypt at last adds cleartext information, and the finish message after the above-mentioned processing is become to be fit to the form of antifalsification label output device output, and carries out output.
6, a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique according to claim 5 is characterized in that wherein said cleartext information is time, month and key issue.
7, a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique according to claim 1 and 2, it is characterized in that wherein said antifalsification label production stage is after the label output information that will produce in the cipher key application step is transferred to the antifalsification label production equipment, the output antifalsification label.
8, a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique according to claim 7 is characterized in that wherein said antifalsification label production stage is the form output antifalsification label with one yard of a mark.
9, a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique according to claim 1 and 2 is characterized in that wherein said antifalsification label identification step may further comprise the steps:
A, tag readable degree step;
B, label information decryption step;
The step of the enciphered message in c, inquiry and the display tag information;
D, anti-counterfeiting information storehouse updating steps; And
The step of updating of e, false proof decruption key.
10, a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique according to claim 1 and 2 is characterized in that the input step of wherein said protected object information and cipher key application step finished by the webserver.
11, a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique according to claim 1 and 2 is characterized in that wherein said antifalsification label production stage is to be finished by the antifalsification label output device.
12, a kind of method for anti-counterfeit that utilizes asymmetric cryptographic technique according to claim 11 is characterized in that wherein said antifalsification label output device is a print out equipment.
CN 200410078160 2004-09-20 2004-09-20 Anti-fake method using non-symmetric cipher technology Pending CN1588436A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200410078160 CN1588436A (en) 2004-09-20 2004-09-20 Anti-fake method using non-symmetric cipher technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200410078160 CN1588436A (en) 2004-09-20 2004-09-20 Anti-fake method using non-symmetric cipher technology

Publications (1)

Publication Number Publication Date
CN1588436A true CN1588436A (en) 2005-03-02

Family

ID=34604968

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200410078160 Pending CN1588436A (en) 2004-09-20 2004-09-20 Anti-fake method using non-symmetric cipher technology

Country Status (1)

Country Link
CN (1) CN1588436A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102147884A (en) * 2011-03-11 2011-08-10 朱清明 Anti-counterfeiting and authenticity-verifying method and system for article
US8058973B2 (en) 2005-09-13 2011-11-15 Nec (China) Co., Ltd. Radio frequency identification system and method
CN102842052A (en) * 2012-08-14 2012-12-26 江苏恒安方信科技有限公司 Identity code generation method
CN103020684A (en) * 2012-12-07 2013-04-03 北京印刷学院 Anti-counterfeiting device, anti-counterfeiting recognition device and system for commodity packaging
CN103020682A (en) * 2012-11-30 2013-04-03 中企永联数据交换技术(北京)有限公司 Two-dimension code identification generating device, two-dimension code identification recognition device and two-dimension code identification system of book
CN103034884A (en) * 2012-12-07 2013-04-10 北京印刷学院 Commodity packaging anti-fake device and device and system for anti-fake recognition with built-in secret key
US8560847B2 (en) 2007-12-03 2013-10-15 China Iwncomm Co., Ltd. Light access authentication method and system
CN101625727B (en) * 2008-07-08 2014-03-05 晨星软件研发(深圳)有限公司 Radio frequency identification tag and operating method thereof

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8058973B2 (en) 2005-09-13 2011-11-15 Nec (China) Co., Ltd. Radio frequency identification system and method
US8560847B2 (en) 2007-12-03 2013-10-15 China Iwncomm Co., Ltd. Light access authentication method and system
CN101625727B (en) * 2008-07-08 2014-03-05 晨星软件研发(深圳)有限公司 Radio frequency identification tag and operating method thereof
CN102147884A (en) * 2011-03-11 2011-08-10 朱清明 Anti-counterfeiting and authenticity-verifying method and system for article
CN102842052A (en) * 2012-08-14 2012-12-26 江苏恒安方信科技有限公司 Identity code generation method
CN102842052B (en) * 2012-08-14 2015-10-21 江苏恒安方信科技有限公司 A kind of identity code generating method
CN103020682A (en) * 2012-11-30 2013-04-03 中企永联数据交换技术(北京)有限公司 Two-dimension code identification generating device, two-dimension code identification recognition device and two-dimension code identification system of book
CN103020682B (en) * 2012-11-30 2015-12-02 中企永联数据交换技术(北京)有限公司 Books Quick Response Code identification generation apparatus, Quick Response Code identification recognition device and system
CN103020684A (en) * 2012-12-07 2013-04-03 北京印刷学院 Anti-counterfeiting device, anti-counterfeiting recognition device and system for commodity packaging
CN103034884A (en) * 2012-12-07 2013-04-10 北京印刷学院 Commodity packaging anti-fake device and device and system for anti-fake recognition with built-in secret key

Similar Documents

Publication Publication Date Title
CN107194266B (en) Method for verifying whether paper certificate is tampered
CN103198344B (en) Tax control secure two-dimensional code coding, decoding processing method
WO2017016318A1 (en) Credible label generation and verification method and system based on asymmetric cryptographic algorithm
CN102930317B (en) Books Quick Response Code identification generation apparatus, Quick Response Code identification recognition device and system
US20120308003A1 (en) Authentic barcodes using digital signatures
CN102930307A (en) Anti-counterfeiting authentication method for famous wine
CN106548353B (en) Commodity anti-counterfeiting code generation and verification method
CN103020682B (en) Books Quick Response Code identification generation apparatus, Quick Response Code identification recognition device and system
CN103093361A (en) Commodity double-layer anti-fake method based on technologies of internet of things
CN104809490A (en) Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system
CN105096143A (en) Anti-counterfeiting method, anti-counterfeiting system, server and intelligent terminal
CN1976512A (en) Antifake method for products with cell phone two-dimensional code
WO2011026326A1 (en) Tracing and recalling system for managing commodity circulation based on internet
CN105184590A (en) Laser on-line efficient etching and product anti-fake traceability system applied to steels
CN102968726A (en) Two-dimensional code network anti-fake method with secondary encryption characteristics
CN113420049B (en) Data circulation method, device, electronic equipment and storage medium
CN106022187A (en) High-efficient O2O implementation method
CN1588436A (en) Anti-fake method using non-symmetric cipher technology
CN106022797A (en) Smart device APP image recognition method
CN109191122B (en) Method and device for acquiring transaction information certificate
EA035937B1 (en) Secure item identification based on physical label properties
CN108596309B (en) Two-dimensional code generation and verification method
CN110532293B (en) Data stream life cycle management method and system based on block chain technology
WO2012142061A1 (en) Authentic barcodes using digital signatures
CN108460606A (en) A kind of method for anti-counterfeit based on two-dimensional code scanning and revene lookup

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication