WO2015154647A1 - Currency or security authentication system based on closed-loop authentication theory - Google Patents

Currency or security authentication system based on closed-loop authentication theory Download PDF

Info

Publication number
WO2015154647A1
WO2015154647A1 PCT/CN2015/075952 CN2015075952W WO2015154647A1 WO 2015154647 A1 WO2015154647 A1 WO 2015154647A1 CN 2015075952 W CN2015075952 W CN 2015075952W WO 2015154647 A1 WO2015154647 A1 WO 2015154647A1
Authority
WO
WIPO (PCT)
Prior art keywords
currency
securities
server
csn
key
Prior art date
Application number
PCT/CN2015/075952
Other languages
French (fr)
Chinese (zh)
Inventor
江峰
江欣屿
Original Assignee
江峰
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 江峰 filed Critical 江峰
Publication of WO2015154647A1 publication Critical patent/WO2015154647A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce

Definitions

  • the invention relates to the field of commodity anti-counterfeiting technology.
  • the currency anti-counterfeiting technology is still limited to setting an anti-counterfeiting mark on each currency, and a currency check device matched with it.
  • the magnetic counterfeiting technology on the RMB banknote counter is 6 kinds: 1. Detecting the magnetic ink distribution of the banknote, and also detecting the fifth version of the RMB security line; 2.
  • Fluorescent counterfeiting checking the quality of the banknote with ultraviolet light, coupled with the photoelectric sensor Monitoring, as long as there are subtle paper changes, can be counterfeit; 3, penetrating for counterfeiting: according to the characteristics of the renminbi, coupled with the penetrating authentication mode, to increase the ability to identify various counterfeit coins; 4, infrared counterfeiting: the use of Advanced fuzzy recognition technology, according to the infrared characteristics of banknotes, can effectively identify various counterfeit coins; 5, multi-spectral forgery: multi-spectral light source, lens array, image sensor unit array formed by arranging LED particles of different wavelengths into a matrix , control and signal amplification circuit and input/output interface; multi-spectral light source and lens array form an optical path system for emitting light and focusing the reflected light on the renminbi onto the image sensor unit array, using multi-spectral image sensor image analysis function, Banknotes for authenticity identification; 6, digital quantitative qualitative analysis detection and authentication: using high-speed parallel AD conversion circuit, high fidelity Set signal, quantitative analysis of ultraviolet light,
  • the old problem is solved and new problems will appear again.
  • the counterfeiter can illegally obtain the encrypted authentication data in the electronic tag and illegally copy it by means of hacking means, that is, by decrypting the electronic tag, thereby counterfeiting the electronic tag to achieve the purpose of fraud. Therefore, the existing Internet anti-counterfeiting authentication system needs to be improved and improved from the system security.
  • the traditional authentication system is mostly based on the open-loop chain or tree-shaped encryption authentication theory system of A ⁇ B ( ⁇ C%) (read-write memory A ⁇ authentication server B), and its security is often cracked by the authenticated label. Being counterfeited, in the highly developed Internet and mobile Internet today, our newly created A ⁇ (B ⁇ )A closed-loop authentication encryption theory system (authentication server A ⁇ read/write memory B ⁇ authentication server A) will become the authentication system.
  • the mainstream this is a good solution to the security problems caused by the cracking of all aspects of the authentication system including the authenticated label in the authentication system.
  • One time and one secret is the highest security scheme of encryption theory. It can not be cracked due to the one-time use of password.
  • the invention combines closed-loop authentication and one-time secret to build a new authentication security architecture, so that the system authentication scheme reaches a new security height. Its advanced nature and security are obvious.
  • the object of the present invention is to provide a network-based technology and to effectively prevent counterfeiters System solutions for the production of counterfeit banknotes and fake securities through security breaches or security vulnerabilities in other anti-counterfeiting system components.
  • the entire system security architecture is built, and the security of the anti-counterfeiting system is ensured from the overall security architecture of the system.
  • a technical solution adopted for achieving the object of the present invention is a currency or securities authentication system based on a closed loop authentication theory, including a system server and a readable and writable storage device disposed on a currency or a valuable security, and An inspection device capable of reading and writing the readable and writable storage device and establishing communication with the server;
  • Each currency or marketable securities generates a key K i,j and this currency or a securities unique identifier SN i before being placed in the public environment space;
  • Encryption operation is performed on SN i using a specific encryption algorithm; in this process, K i,j is used as a key for one-time encryption operation, and ciphertext CSN i,j corresponding to SN i is obtained , and SN i and CSN i are obtained.
  • j is stored in the anti-counterfeiting server; where i is a pointer connecting SN i , K i, j and CSN i, j ; j is the number of times a secret key is generated; i ⁇ ⁇ E ⁇ , SN i ⁇ ⁇ R ⁇ , j is a natural number, and the set ⁇ E ⁇ , and ⁇ R ⁇ are a collection of sequences consisting of numbers and/or letters;
  • the inspection device When the verification device verifies the currency or the valuable securities, in addition to verifying the anti-counterfeit identification, the inspection device also reads the key K x,j on the currency or the valuable securities and sends To the server;
  • Extracting the key x, j, on the currency or the securities K x, j contains a pointer x, where: x ⁇ ⁇ E ⁇ , find the corresponding SN x and CSN x, j in the server; wherein, the same algorithm as in step 2) is used , using K x, j as a key, performing cryptographic operations on SN x to obtain ciphertext P;
  • the system server sends the money or the securities to the terminal as false information, and ends the authenticity verification operation;
  • the system server sends information indicating that the currency or the valuable securities are true to the terminal;
  • j is updated with the value of j+1, and the system server generates a new key K x,j ; using the same algorithm as step 2), using the new K x,j as the key, encrypting the SN x Obtaining a new ciphertext CSN x,j and storing it in the server to update the original CSN x,j and sending a new key K x,j to the verification device to update the Read and write the original K x,j in the storage device.
  • the readable and writable storage device is an RFID electronic tag implanted with money or securities.
  • CSN x,j is updated to CSN x,j+1 , CSN x,j+1 is used as the verification key on the currency or securities read by the next verification check device.
  • CSN x,j is still stored in the historical data area of the server, not as a basis for verification;
  • the server receives the verification key on the currency or the securities read by the inspection device, and the verification result of the key P ⁇ CSN x,j , but P is the data in the historical data region, then it is determined The key has been stolen and written into a readable and writable storage device on a counterfeit currency or security;
  • the inspection device sends to the server the time and geographical location of scanning the verified currency or the readable and writable storage device of the securities. If there is counterfeit currency or securities, it can provide the counterfeiting time and geographical location of the counterfeiter for anti-counterfeiting and anti-counterfeiting. And the historical time and place of use of users who use counterfeit currency or securities.
  • the inspection device is a money detector or a money counter; the money detector or the money counter is equipped with an rfid reading and writing device.
  • K i,j is not stored on the server.
  • the system server marks the SN i and CSN i,j corresponding to the stolen money or the securities; one of the stolen money or the securities
  • the system server records and submits the scanning time and geographical location of the terminal device that scans the currency or the securities, that is, the time and geographical location where the stolen money or the valuable securities appear.
  • the server receives the verification key on the currency or the securities read by the inspection device, and the verification result of the key is the data in the historical data region, it is determined The key has been stolen and written into the counterfeit currency or RFID tag on the security.
  • the inspection device sends the time and geographical location of the scanned commodity RFID to the server. If there is counterfeit currency or valuable securities, the counterfeiting and counterfeiting can provide the counterfeiting time and geographical location of the counterfeiter.
  • the technical effect of the present invention is undoubted, and the solution can effectively prevent the electronic tag on the currency or the securities from being decrypted or being copied and copied by the illegal counterfeiter of the tag itself.
  • the present invention adopts a one-card dynamic signature authentication system, and only a relatively irregular key is written into the label on the currency or the valuable securities, and the isolation prevention is successfully realized. . Whether the counterfeiter decrypts the tag or breaks the server, it is impossible to achieve large-scale fraud.
  • a currency or portfolio certification system based on closed-loop authentication theory including a system server and a readable and writable storage device disposed on each currency or security, and capable of reading and writing the readable and writable storage device And an inspection device that establishes communication with the server.
  • Each currency or marketable securities generates a key K i,j and the currency or securities unique identifier SN i before being placed in the public environment space.
  • K i,j is used as the key of one-time encryption operation, and the ciphertext CSN i,j corresponding to SN i is obtained , and SN i and CSN i,j are stored in the currency or securities security server.
  • i is a pointer connecting SN i
  • j is the number of times a secret key is generated.
  • I ⁇ E ⁇ , SN i ⁇ R ⁇ . j is a natural number and is the number of times the key is generated.
  • the set ⁇ E ⁇ , and ⁇ R ⁇ are a collection of sequences of numbers and/or letters.
  • the server has a set ⁇ SN 1 , SN 2 ... SN i ... ⁇ corresponding to each currency or portfolio of securities, and the data in this set is fixed.
  • the inspection device (counterfeit detector, money counter, etc.) is used to read the key on the currency or the securities. K x,j , and sent to the server.
  • K x, j is used as a key to perform cryptographic operations on SN x to obtain ciphertext P.
  • x ⁇ ⁇ 1, 2, ..., n ⁇ , y ⁇ ⁇ 1, 2, ..., m ⁇ of course, if the extracted K x, j digital form is inconsistent with K i, j , then directly Determine that the currency or marketable securities are counterfeit.
  • the system server sends the terminal the money or the securities to the fake information, and ends the authenticity check operation.
  • the system server sends information to the terminal that the currency or the securities are true.
  • j is updated with the value of j+1, and the system server generates a new key K x,j .
  • the new K x,j as the key, encrypt the original SN x to obtain a new ciphertext CSN x,j and store it in the server to update
  • the original CSN x,j and the new key K x,j are sent to the verification device to update the original K x,j in the readable and writable storage device.
  • a total of five banknotes with a face value of 100 yuan were printed.
  • RFID tags respectively written into the randomly generated message K i,j are implanted. That is, RFID tags of K 1,1 , K 2,1 , K 3,1 , K 4,1 , K 5,1 .
  • SN 1 1234567891
  • SN 2 1234567892
  • SN 3 1234567893
  • SN 4 1234567894
  • SN 5 1234567895.
  • the SN i value is encrypted.
  • CSN i,j is stored in the server's certificate storage data storage area.
  • the money detectors that check these currencies are equipped with devices that read and write RFID tags. That is, the rfid reading and writing device can be installed on the inspection component of the money detector.
  • the banknote counter reads the data X on a banknote and sends it to the server.
  • the present invention requires communication with the server over the network. It may take a certain amount of time for the money detector to receive data from the server. Therefore, it is necessary to improve the traditional money detector to meet the requirements.
  • the banknotes are sent out. Or you can use two inspections, collect the information in the banknote for the first time, and pass it to the server. After receiving the feedback from the server, proceed to the first The second check, this time check can check the counterfeit banknotes and update the data in the real money.
  • the server finds SN 2 and CSN 2,1 that exist in the server authentication data store.
  • the server finds SN 2 and CSN 2,2 that exist in the server authentication data storage area and correspond to K 2,1 .
  • CSN 2,2 is used as the basis for verifying the verification key on the currency read by the next verification device.
  • CSN 2,1 is still stored in the historical data area of the server and is not used as a verification basis.
  • the time and geographical location of the counterfeit banknote sent to the server by the money counter is provided for the anti-counterfeiting and counterfeiting. Possible time and location.

Landscapes

  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)
  • Storage Device Security (AREA)

Abstract

Provided is a currency or security authentication system based on a closed-loop authentication theory. The system comprises a system server, readable and writable memories arranged on each currency or security note, and a testing device capable of performing reading and writing operations on the readable and writable memories, and of establishing communication with the server. On the principle that any participant of the system and any device provider used by the system are unreliable, an entire block box system security architecture is built, and the security of an anti-counterfeiting system is ensured by the entire security architecture of the system.

Description

基于闭环认证理论的货币或有价证券认证***Currency or Securities Certification System Based on Closed-Loop Authentication Theory 技术领域Technical field
本发明涉及商品防伪技术领域。The invention relates to the field of commodity anti-counterfeiting technology.
背景技术Background technique
***泛滥是一个困扰全球政府和金融机构的问题。目前,货币防伪技术仍然局限于在每一张货币上设置防伪标识,以及与之配合的货币点验装置。例如,人民币点钞机上上的磁性鉴伪技术为6种:1、检测纸币磁性油墨分布,同时还检测第五版人民币安全线;2、荧光鉴伪:用紫外线检查纸币质量,配上光电传感器进行监控,只要有细微纸质变化,就能鉴伪;3、穿透鉴伪:根据人民币特征,配上穿透鉴伪模式,增加识别各种伪币的能力;4、红外鉴伪:采用先进的模糊识别技术,根据纸币的红外特征,能有效识别各种伪币;5、多光谱鉴伪:以不同波长的LED颗粒排列成矩阵而成的多光谱光源、透镜阵列、图像传感器单元阵列、控制和信号放大电路以及输入输出接口;多光谱光源和透镜阵列形成光路***,用于发射光线并将人民币上的反射光聚焦到图像传感器单元阵列上,运用多光谱图像传感器图像分析功能,对钞票进行真伪鉴别;6、数字量化定性分析检测鉴伪:使用高速并行AD转换电路,高保真采集信号,对紫外光量化分析,可检测有微弱荧光反应的伪钞;对人民币的磁性油墨进行定量分析;对红外油墨进行定点分析;运用模糊数学理论,将一些边界不清、不容易定量的因素定量化,并建立了安全性能评估的多级评估模型,对钞票进行真伪鉴别。The proliferation of counterfeit currency is a problem that plagues governments and financial institutions around the world. At present, the currency anti-counterfeiting technology is still limited to setting an anti-counterfeiting mark on each currency, and a currency check device matched with it. For example, the magnetic counterfeiting technology on the RMB banknote counter is 6 kinds: 1. Detecting the magnetic ink distribution of the banknote, and also detecting the fifth version of the RMB security line; 2. Fluorescent counterfeiting: checking the quality of the banknote with ultraviolet light, coupled with the photoelectric sensor Monitoring, as long as there are subtle paper changes, can be counterfeit; 3, penetrating for counterfeiting: according to the characteristics of the renminbi, coupled with the penetrating authentication mode, to increase the ability to identify various counterfeit coins; 4, infrared counterfeiting: the use of Advanced fuzzy recognition technology, according to the infrared characteristics of banknotes, can effectively identify various counterfeit coins; 5, multi-spectral forgery: multi-spectral light source, lens array, image sensor unit array formed by arranging LED particles of different wavelengths into a matrix , control and signal amplification circuit and input/output interface; multi-spectral light source and lens array form an optical path system for emitting light and focusing the reflected light on the renminbi onto the image sensor unit array, using multi-spectral image sensor image analysis function, Banknotes for authenticity identification; 6, digital quantitative qualitative analysis detection and authentication: using high-speed parallel AD conversion circuit, high fidelity Set signal, quantitative analysis of ultraviolet light, can detect counterfeit banknotes with weak fluorescence reaction; quantitative analysis of magnetic ink of RMB; fixed-point analysis of infrared ink; use fuzzy mathematics theory to use some factors that are unclear and not easy to quantify Quantitatively, and established a multi-level evaluation model for safety performance assessment to verify the authenticity of banknotes.
上述防伪技术在一定时期内能够解决货币的防伪问题,但是随着时间的推移,理论上这些技术都会被不法者掌握。因此,各国不得不持续不断地研发新的防伪标识,对货币进行换代。The above anti-counterfeiting technology can solve the problem of currency anti-counterfeiting in a certain period of time, but over time, in theory, these technologies will be mastered by the lawless. Therefore, countries have to continuously develop new anti-counterfeiting labels to replace the currency.
能否通过互联网技术对货币进行防伪验证? Can I verify the currency for security through Internet technology?
随着通信技术的发展,特别是2.45GHz射频识别技术及手机近距离无线通讯技术(NFC 13.56MHz)的发展,手机及终端的近距离识别功能日益强大。互联网和物联网正向人们的生活领域渗透。基于该技术的防伪识别技术层出不穷。例如,中国专利“一种基于终端和RFID电子标签的商品防伪***”就是物联网通过互联方式在产品信息追溯和验证上的成功拓展应用。该技术在很大程度上防止了制假,实践中也得到了成功的应用。基于RFID电子标签和互联网的商品信息查询及防伪应用日益广泛,商品电子防伪***的信息安全和加密***的进一步完善越来越重要。这些技术使得货币的互联网认证变成了可能。With the development of communication technologies, especially the development of 2.45 GHz radio frequency identification technology and mobile phone short-range wireless communication technology (NFC 13.56 MHz), the proximity recognition function of mobile phones and terminals is increasingly powerful. The Internet and the Internet of Things are infiltrating into the realm of people's lives. Anti-counterfeiting recognition technology based on this technology emerges in an endless stream. For example, the Chinese patent "a product anti-counterfeiting system based on terminals and RFID electronic tags" is a successful application of the Internet of Things to trace and verify product information through interconnection. This technology has largely prevented counterfeiting and has been successfully applied in practice. Based on RFID electronic tags and the Internet, commodity information inquiry and anti-counterfeiting applications are becoming more and more widespread, and the information security and encryption system of commodity electronic anti-counterfeiting systems are becoming more and more important. These technologies have made currency Internet certification possible.
但是,旧问题解决了,新问题又会出现。制假者可以通过黑客手段,即通过对电子标签的解密等各种手段,非法获取电子标签中的加密认证数据并进行非法复制,从而假冒电子标签达到造假的目的。因此,现有的互联网防伪认证***从***安全上需要得到改进和提高。However, the old problem is solved and new problems will appear again. The counterfeiter can illegally obtain the encrypted authentication data in the electronic tag and illegally copy it by means of hacking means, that is, by decrypting the electronic tag, thereby counterfeiting the electronic tag to achieve the purpose of fraud. Therefore, the existing Internet anti-counterfeiting authentication system needs to be improved and improved from the system security.
传统认证***多是基于A→B(→C…)的开环链形或树形加密认证理论体系建立的(可读写存储器A→认证服务器B),其安全性常常因为被认证标签的破解而被假冒,在互联网和移动互联网高度发达的今天,我们全新创立的A→(B→)A的闭环认证加密理论体系(认证服务器A→可读写存储器B→认证服务器A)将成为认证***的主流,这很好的解决了认证***中包括被认证标签在内的认证***各环节被破解所带来的安全问题。而一次一密则是加密理论的最高安全方案,因密码的一次性使用而无法被破解,本发明结合闭环认证和一次一密构建全新认证安全架构,使***认证方案到达了一个新的安全高度,其先进性和安全性显而易见。The traditional authentication system is mostly based on the open-loop chain or tree-shaped encryption authentication theory system of A→B (→C...) (read-write memory A→authentication server B), and its security is often cracked by the authenticated label. Being counterfeited, in the highly developed Internet and mobile Internet today, our newly created A→(B→)A closed-loop authentication encryption theory system (authentication server A→read/write memory B→authentication server A) will become the authentication system. The mainstream, this is a good solution to the security problems caused by the cracking of all aspects of the authentication system including the authenticated label in the authentication system. One time and one secret is the highest security scheme of encryption theory. It can not be cracked due to the one-time use of password. The invention combines closed-loop authentication and one-time secret to build a new authentication security architecture, so that the system authentication scheme reaches a new security height. Its advanced nature and security are obvious.
发明内容Summary of the invention
本发明的目的是提供一种基于网络技术,且能够有效防止制假者 通过安全漏洞或其他防伪***组件的安全漏洞,规模制***、假有价证券的***方案。从而达到以***的任何参与人员和***使用的任何器件提供商均为不可靠的原则,搭建整个***安全架构,从***的整体安全架构方面,确保防伪***的安全。The object of the present invention is to provide a network-based technology and to effectively prevent counterfeiters System solutions for the production of counterfeit banknotes and fake securities through security breaches or security vulnerabilities in other anti-counterfeiting system components. In order to achieve the unreliable principle of any participant and any device provider used by the system, the entire system security architecture is built, and the security of the anti-counterfeiting system is ensured from the overall security architecture of the system.
为实现本发明目的而采用的技术方案是这样的,一种基于闭环认证理论的货币或有价证券认证***,包括***服务器和设置在货币或有价证券上的的可读写存储器件,以及能够对该可读写存储器件进行读写操作、并与服务器建立通讯的检验设备;A technical solution adopted for achieving the object of the present invention is a currency or securities authentication system based on a closed loop authentication theory, including a system server and a readable and writable storage device disposed on a currency or a valuable security, and An inspection device capable of reading and writing the readable and writable storage device and establishing communication with the server;
通过以下过程实现货币或有价证券防伪:Realize currency or securities security through the following process:
1)每一张货币或有价证券在投放到公开环境空间前,产生密钥Ki,j和这张货币或有价证券唯一标识SNi1) Each currency or marketable securities generates a key K i,j and this currency or a securities unique identifier SN i before being placed in the public environment space;
2)使用特定加密算法对SNi进行加密运算;此过程中,Ki,j作为一次一密加密运算的密钥,得到SNi对应的密文CSNi,j,将SNi和CSNi,j存入防伪服务器;其中,i是连接SNi、Ki,j和CSNi,j的指针;j为产生一次一密密钥的次数;i∈{E},SNi∈{R},j为自然数,集合{E}、和{R}是由数字和/或字母组成的序列的集合;2) Encryption operation is performed on SN i using a specific encryption algorithm; in this process, K i,j is used as a key for one-time encryption operation, and ciphertext CSN i,j corresponding to SN i is obtained , and SN i and CSN i are obtained. j is stored in the anti-counterfeiting server; where i is a pointer connecting SN i , K i, j and CSN i, j ; j is the number of times a secret key is generated; i ∈ {E}, SN i ∈ {R}, j is a natural number, and the set {E}, and {R} are a collection of sequences consisting of numbers and/or letters;
3)将密钥Ki.j写入固定在对应的货币或有价证券上的可读写存储器件后,货币或有价证券投放到公开环境空间;3) After the key K ij is written into the readable and writable storage device fixed on the corresponding currency or the valuable security, the currency or the valuable securities are placed in the public environment space;
4)检验设备对货币或有价证券进行校验时,除了对其防伪标识进行验证外,所述检验设备还要读取所述货币或有价证券上的密钥Kx,j,并发送至所述服务器;4) When the verification device verifies the currency or the valuable securities, in addition to verifying the anti-counterfeit identification, the inspection device also reads the key K x,j on the currency or the valuable securities and sends To the server;
提取货币或有价证券上的密钥Kx,j含有的指针x,其中:x∈{E},找到服务器中对应的SNx和CSNx,j;其中,使用与步骤2)相同的算法,以Kx,j作为密钥,对SNx进行加密运算,得到密文P;Extracting the key x, j, on the currency or the securities K x, j contains a pointer x, where: x ∈ {E}, find the corresponding SN x and CSN x, j in the server; wherein, the same algorithm as in step 2) is used , using K x, j as a key, performing cryptographic operations on SN x to obtain ciphertext P;
若密文P=CSNx,j,则货币或有价证券为真,跳转至下一步;If the ciphertext P=CSN x,j , then the currency or the securities are true, and jump to the next step;
若密文P≠CSNx,j,所述***服务器向终端发送货币或有价证券为假的信息,并结束真伪校验操作;If the ciphertext P≠CSN x,j , the system server sends the money or the securities to the terminal as false information, and ends the authenticity verification operation;
5)所述***服务器向终端发送货币或有价证券为真的信息;5) the system server sends information indicating that the currency or the valuable securities are true to the terminal;
同时,以j+1的数值来更新j,***服务器生成新的密钥Kx,j; 使用与步骤2)相同的算法,以新的Kx,j作为密钥,对SNx进行加密运算,得到新的密文CSNx,j,并将其存储于服务器中,以更新原有的CSNx,j,并将新的密钥Kx,j发送至所述检验设备,更新所述可读写存储器件中原有的Kx,jAt the same time, j is updated with the value of j+1, and the system server generates a new key K x,j ; using the same algorithm as step 2), using the new K x,j as the key, encrypting the SN x Obtaining a new ciphertext CSN x,j and storing it in the server to update the original CSN x,j and sending a new key K x,j to the verification device to update the Read and write the original K x,j in the storage device.
进一步,所述可读写存储器件为植入货币或有价证券的RFID电子标签。Further, the readable and writable storage device is an RFID electronic tag implanted with money or securities.
进一步,所述步骤5)中,将CSNx,j更新为CSNx,j+1后,CSNx,j+1作为下一次验证检验设备读取到的货币或有价证券上的验证密钥的依据;但CSNx,j仍然存储于服务器的历史数据区域中,不作为验证依据;Further, in the step 5), after CSN x,j is updated to CSN x,j+1 , CSN x,j+1 is used as the verification key on the currency or securities read by the next verification check device. Basis; but CSN x, j is still stored in the historical data area of the server, not as a basis for verification;
如果服务器收到检验设备读取到的货币或有价证券上的验证密钥,且该密钥的验证结果P≠CSNx,j,但P是所述历史数据区域中的数据时,则判定该密钥已被窃取,并被写入了假冒货币或有价证券上的可读写存储器件中;If the server receives the verification key on the currency or the securities read by the inspection device, and the verification result of the key P≠CSN x,j , but P is the data in the historical data region, then it is determined The key has been stolen and written into a readable and writable storage device on a counterfeit currency or security;
检验设备向服务器发送扫描被验证货币或有价证券可读写存储器件的时间和地理位置,若存在假冒货币或有价证券,即可为防伪打假提供制假者可能的制假时间和地理位置,以及使用假冒货币或有价证券的使用者的历史使用时间和地点。The inspection device sends to the server the time and geographical location of scanning the verified currency or the readable and writable storage device of the securities. If there is counterfeit currency or securities, it can provide the counterfeiting time and geographical location of the counterfeiter for anti-counterfeiting and anti-counterfeiting. And the historical time and place of use of users who use counterfeit currency or securities.
进一步,所述检验设备为验钞机或点钞机;所述验钞机或点钞机上装有rfid读写装置。Further, the inspection device is a money detector or a money counter; the money detector or the money counter is equipped with an rfid reading and writing device.
进一步,服务器上不存储Ki,jFurther, K i,j is not stored on the server.
进一步,所述SNi=i。Further, the SN i =i.
进一步,所述Ki,j是随机生成的。Further, the K i,j are randomly generated.
进一步,若发生货币或有价证券被盗事件,***服务器对这批被盗货币或有价证券对应的SNi和CSNi,j进行标记;在这批被盗货币或有价证券中的一张或多张被终端设备验证时,所述***服务器记录并提交该次扫描货币或有价证券的终端设备的扫描时间和地理位置,即提供被盗货币或有价证券出现的时间和地理位置。Further, if a currency or securities is stolen, the system server marks the SN i and CSN i,j corresponding to the stolen money or the securities; one of the stolen money or the securities When the one or more sheets are verified by the terminal device, the system server records and submits the scanning time and geographical location of the terminal device that scans the currency or the securities, that is, the time and geographical location where the stolen money or the valuable securities appear. .
如果服务器收到检验设备读取到的货币或有价证券上的验证密钥,且该密钥的验证结果是所述历史数据区域中的数据时,则判定该 密钥已被窃取,并被写入了假冒货币或有价证券上的RFID电子标签中。If the server receives the verification key on the currency or the securities read by the inspection device, and the verification result of the key is the data in the historical data region, it is determined The key has been stolen and written into the counterfeit currency or RFID tag on the security.
检验设备向服务器发送扫描商品RFID的时间和地理位置,若存在假冒货币或有价证券,即可为防伪打假提供制假者可能的制假时间和地理位置。The inspection device sends the time and geographical location of the scanned commodity RFID to the server. If there is counterfeit currency or valuable securities, the counterfeiting and counterfeiting can provide the counterfeiting time and geographical location of the counterfeiter.
本发明的技术效果是毋庸置疑的,该方案可以有效地防止货币或有价证券上的电子标签被解密或被标签本身漏洞被非法造假者读取复制。从***架构上,本发明地采用了一次一证的动态签名认证体系,而且仅仅是相对来说无规律的密钥被写入了货币或有价证券上的标签之中,成功实现了隔离防范。不管是制假者解密标签,还是攻破服务器,均不能实现规模化的制假。The technical effect of the present invention is undoubted, and the solution can effectively prevent the electronic tag on the currency or the securities from being decrypted or being copied and copied by the illegal counterfeiter of the tag itself. From the system architecture, the present invention adopts a one-card dynamic signature authentication system, and only a relatively irregular key is written into the label on the currency or the valuable securities, and the isolation prevention is successfully realized. . Whether the counterfeiter decrypts the tag or breaks the server, it is impossible to achieve large-scale fraud.
具体实施方式detailed description
下面结合实施例对本发明作进一步说明,但不应该理解为本发明上述主题范围仅限于下述实施例。在不脱离本发明上述技术思想的情况下,根据本领域普通技术知识和惯用手段,做出各种替换和变更,均应包括在本发明的保护范围内。The invention is further illustrated by the following examples, but it should not be understood that the scope of the invention described above is limited to the following examples. Various changes and modifications may be made without departing from the spirit and scope of the invention.
实施例1:Example 1:
一种基于闭环认证理论的货币或有价证券认证***,包括***服务器和设置在每一张货币或有价证券上的可读写存储器件,以及能够对该可读写存储器件进行读写操作、并与服务器建立通讯的检验设备。A currency or portfolio certification system based on closed-loop authentication theory, including a system server and a readable and writable storage device disposed on each currency or security, and capable of reading and writing the readable and writable storage device And an inspection device that establishes communication with the server.
通过以下过程实现货币或有价证券防伪:Realize currency or securities security through the following process:
1)每一张货币或有价证券在投放到公开环境空间前,产生密钥Ki,j和该货币或有价证券唯一标识SNi1) Each currency or marketable securities generates a key K i,j and the currency or securities unique identifier SN i before being placed in the public environment space.
2)使用特定加密算法对SNi进行加密运算。此过程中,Ki,j作为一次一密加密运算的密钥,得到SNi对应的密文CSNi,j,将SNi和CSNi,j存入货币或有价证券防伪服务器。其中,i是连接SNi、Ki,j和CSNi,j 的指针。j为产生一次一密密钥的次数。i∈{E},SNi∈{R}。j为自然数,是产生密钥的次数。集合{E}、和{R}是由数字和/或字母组成的序列的集合。即服务器内存在对应于每一张货币或有价证券的集合{SN1、SN2……SNi……},这个集合中的数据是固定不变的。另外,服务器内存在对应于每一张货币或有价证券的集合{CSN1,j、CSN2,j……CSNi,j……},这个集合中的数据在每一个货币或有价证券被验证时,发生改变,j的数值也会变。2) Encryption operation of SN i using a specific encryption algorithm. In this process, K i,j is used as the key of one-time encryption operation, and the ciphertext CSN i,j corresponding to SN i is obtained , and SN i and CSN i,j are stored in the currency or securities security server. Where i is a pointer connecting SN i , K i,j and CSN i,j . j is the number of times a secret key is generated. I∈{E}, SN i ∈{R}. j is a natural number and is the number of times the key is generated. The set {E}, and {R} are a collection of sequences of numbers and/or letters. That is, the server has a set {SN 1 , SN 2 ... SN i ...} corresponding to each currency or portfolio of securities, and the data in this set is fixed. In addition, there is a set of {CSN 1,j , CSN 2,j ... CSN i,j ...} corresponding to each currency or portfolio of securities in the server, and the data in this set is in each currency or securities. When it is verified, a change occurs and the value of j also changes.
3)将密钥Ki.j及对应货币或有价证券序号SNi写入固定在对应货币或有价证券上的可读写存储器件后,货币或有价证券投放到公开环境空间。3) After the key K ij and the corresponding currency or the securities serial number SN i are written into the readable and writable storage device fixed on the corresponding currency or the securities, the currency or the securities are placed in the public environment space.
4)当货币或有价证券持有者对货币或有价证券进行防伪验证时,采用所述检验设备(验钞机、点钞机等)读取所述货币或有价证券上的密钥Kx,j,并发送至所述服务器。4) When the holder of the currency or the security securities performs the security verification on the currency or the securities, the inspection device (counterfeit detector, money counter, etc.) is used to read the key on the currency or the securities. K x,j , and sent to the server.
提取货币或有价证券上的密钥Kx,j含有的指针x,找到服务器中对应的SNx,CSNx,j。其中,j为产生密钥的次数。使用与步骤2)相同的算法,以Kx,j作为密钥,对SNx进行加密运算,得到密文P。其中:x∈{1、2、……、n},y∈{1、2、……、m},当然,若提取到的Kx,j的数字形式与Ki,j不一致,则直接判定该货币或有价证券是假冒的。Extract the pointer x contained in the key K x,j on the currency or the securities, and find the corresponding SN x , CSN x, j in the server. Where j is the number of times the key is generated. Using the same algorithm as in step 2), K x, j is used as a key to perform cryptographic operations on SN x to obtain ciphertext P. Where: x ∈ {1, 2, ..., n}, y ∈ {1, 2, ..., m}, of course, if the extracted K x, j digital form is inconsistent with K i, j , then directly Determine that the currency or marketable securities are counterfeit.
若密文P=CSNx,j,则货币或有价证券为真,跳转至下一步。If the ciphertext P=CSN x,j , then the currency or the securities are true and jump to the next step.
若密文P≠CSNx,j,所述***服务器向终端发送货币或有价证券为假的信息,并结束真伪校验操作。If the ciphertext P ≠ CSN x, j , the system server sends the terminal the money or the securities to the fake information, and ends the authenticity check operation.
5)所述***服务器向终端发送货币或有价证券为真的信息。5) The system server sends information to the terminal that the currency or the securities are true.
同时,以j+1的数值来更新j,***服务器生成新的密钥Kx,j。使用与步骤2)相同的算法,以新的Kx,j作为密钥,对原有的SNx进行加密运算,得到新的密文CSNx,j,并将其存储于服务器中,以更新原有的CSNx,j,并将新的密钥Kx,j发送至所述检验设备,更新所述可读写存储器件中原有的Kx,jAt the same time, j is updated with the value of j+1, and the system server generates a new key K x,j . Using the same algorithm as in step 2), using the new K x,j as the key, encrypt the original SN x to obtain a new ciphertext CSN x,j and store it in the server to update The original CSN x,j and the new key K x,j are sent to the verification device to update the original K x,j in the readable and writable storage device.
实施例2Example 2
本实施例的主要步骤同实施例1: The main steps of this embodiment are the same as those of Embodiment 1:
共有5张面值100元的纸币被印刷出来。5张面值100元的货币被制作出来时均植入了分别写入随机生成的消息Ki,j的RFID标签。即K1,1、K2,1、K3,1、K4,1、K5,1的RFID电子标签。具体地,K1,1=1、K2,1=2、K3,1=3、K4,1=4、K5,1=5。A total of five banknotes with a face value of 100 yuan were printed. When five currencies with a face value of 100 yuan are produced , RFID tags respectively written into the randomly generated message K i,j are implanted. That is, RFID tags of K 1,1 , K 2,1 , K 3,1 , K 4,1 , K 5,1 . Specifically, K 1,1 =1, K 2,1 = 2, K 3,1 =3, K 4,1 =4, K 5,1 =5.
与这5张面值100元的货币相对应,服务器内存储有5个SNi值。即SN1=1234567891、SN2=1234567892、SN3=1234567893、SN4=1234567894、SN5=1234567895。Corresponding to the five currencies with a face value of 100 yuan, there are 5 SN i values stored in the server. That is, SN 1 =1234567891, SN 2 =1234567892, SN 3 =1234567893, SN 4 =1234567894, SN 5 =1234567895.
对5个SNi值进行加密运算,加密规则为:将第1位数字与第F位数字互换,F=Ki,j,即Ki,j作为加密SNi的密钥,得到CSNi,j:CSN1, 1=1234567891、CSN2,1=2134567892、CSN3,1=3214567893、CSN4,1=4231567894、CSN5,1=5234167895。CSNi,j储于服务器的验存证数据存储区。The SN i value is encrypted. The encryption rule is: the first digit and the F digit are interchanged, and F=K i,j , that is, K i,j is used as the key of the encrypted SN i to obtain the CSN i. , j : CSN 1, 1 =1234567891, CSN 2,1 =2134567892, CSN 3,1 =3214567893, CSN 4,1 =4231567894, CSN 5,1 =5234167895. CSN i,j is stored in the server's certificate storage data storage area.
与之配合,点验这些货币的验钞机上安装有读写RFID标签的设备。即可以在验钞机的点验传动部件上装有rfid读写装置。In conjunction with this, the money detectors that check these currencies are equipped with devices that read and write RFID tags. That is, the rfid reading and writing device can be installed on the inspection component of the money detector.
当验钞时,验钞机读取一张纸币上的数据X并发送至所述服务器。When the banknote is checked, the banknote counter reads the data X on a banknote and sends it to the server.
服务器判断出,X=K2,1=2,含有指针i=2。The server determines that X = K 2, 1 = 2, and contains the pointer i = 2.
服务器找到存在于服务器中,与K2,1对应的SN2和CSN2,1Found server exist in the server, corresponding to the SN 2 K 2,1 and CSN 2,1.
服务器以K2,1=2为密钥,对SN2=1234567892进行加密运算,得到P=2134567892。由于P=CSN2,1,则判断这张纸币为真。同时,服务器生成新的密钥K2,2=3,即j=j+1,对SN2=1234567892进行加密运算,得到SN2,2=3214567892。将SN2,2存储于服务器,并替换SN2,1。将新的密钥K2,2=3发送给验钞机,写入RFID标签,替换K2,1The server encrypts SN 2 =1234567892 with K 2,1 =2 as the key, and obtains P=2134567892. Since P=CSN 2,1 , it is judged that this banknote is true. At the same time, the server generates a new key K 2,2 =3, ie j=j+1, and performs an encryption operation on SN 2 =1234567892 to obtain SN 2,2 =3214567892. Store SN 2, 2 on the server and replace SN 2,1 . Send the new key K 2,2 =3 to the money detector, write the RFID tag, and replace K 2,1 .
值得说明的是,与传统验钞的过程不同,本发明需要与通过网络与服务器通讯。可能需要一定的时间后,验钞机才会收到服务器反馈的数据。因此,有必要对传统的验钞机进行改进,以满足要求。方式可以有多种,例如,增加验证每一张纸币的时间,待读RFID标签写完成后,再将纸币送出。或者可以采用两次点验,第一次采集纸币中的信息,并将其传递给服务器,待收到服务器反馈的信息后,进行第 二次点验,这次点验就可以甄别***,更新真币中的数据。It is worth noting that, unlike the traditional banknote verification process, the present invention requires communication with the server over the network. It may take a certain amount of time for the money detector to receive data from the server. Therefore, it is necessary to improve the traditional money detector to meet the requirements. There are a variety of ways, for example, to increase the time for verifying each banknote, and after the RFID tag to be read is written, the banknotes are sent out. Or you can use two inspections, collect the information in the banknote for the first time, and pass it to the server. After receiving the feedback from the server, proceed to the first The second check, this time check can check the counterfeit banknotes and update the data in the real money.
实施例3Example 3
本实施例的主要步骤同实施例2:The main steps of this embodiment are the same as those of Embodiment 2:
同样的5张面值100元的纸币,同样的点钞机。The same five banknotes with a face value of 100 yuan, the same money counter.
有一回,某机构收到一张纸币时,读取验证密钥X并发送至所述服务器。Once, when an institution receives a banknote, it reads the verification key X and sends it to the server.
服务器判断出,X=K2,1=2,含有指针i=2。The server determines that X = K 2, 1 = 2, and contains the pointer i = 2.
服务器找到存在于服务器验证数据存储区中的SN2和CSN2,1The server finds SN 2 and CSN 2,1 that exist in the server authentication data store.
服务器以K2,1=2为密钥,对SN2=1234567892进行加密运算,得到P=2134567892。由于P=CSN2,则判断出这张纸币为真。同时,服务器生成新的密钥K2,2=3,对SN2=1234567892进行加密运算,得到SN2,2=3214567892。将SN2,2存储于服务器,并替换SN2,1。将新的密钥K2,2=3发送给点钞机,写入纸币,替换原有的K2,1The server encrypts SN 2 =1234567892 with K 2,1 =2 as the key, and obtains P=2134567892. Since P = CSN 2 , it is judged that this banknote is true. At the same time, the server generates a new key K 2,2 =3, and performs an encryption operation on SN 2 =1234567892 to obtain SN 2,2 =3214567892. Store SN 2, 2 on the server and replace SN 2,1 . Send the new key K 2,2 =3 to the cash register, write the banknote, and replace the original K 2,1 .
又一回,某机构又收到一张纸币时,读取验证密钥X并发送至所述服务器。In another round, when an institution receives another banknote, it reads the verification key X and sends it to the server.
服务器判断出,X的数值为2,含有指针i=2。The server determines that the value of X is 2 and contains the pointer i=2.
服务器找到存在于服务器验证数据存储区中的、且与K2,1对应的SN2和CSN2,2The server finds SN 2 and CSN 2,2 that exist in the server authentication data storage area and correspond to K 2,1 .
服务器以X=2为密钥,对SN2=1234567892进行加密运算,得到P=2134567892。由于CSN2,2=3214567892,P≠CSN2,2,这张纸币是***。The server encrypts SN 2 =1234567892 with X=2 as the key, and obtains P=2134567892. Since CSN 2, 2 = 3214567892, P≠CSN 2 , 2 , this banknote is a counterfeit note.
进一步地,上一次将CSN2,1更新为CSN2,2后,CSN2,2作为下一次验证检验设备读取到的货币上的验证密钥的依据。但CSN2,1仍然存储于服务器的历史数据区域中,不作为验证依据。Further, the last time CSN 2,1 is updated to CSN 2,2 , CSN 2,2 is used as the basis for verifying the verification key on the currency read by the next verification device. However, CSN 2,1 is still stored in the historical data area of the server and is not used as a verification basis.
前面,服务器发现了***,而且P=2134567892正好是服务器历史数据区域中的数据CSN2,1,点钞机向服务器发送***出现的时间和地理位置,为防伪打假提了供制假者可能的制假时间和地理位置。 In the front, the server found the counterfeit banknote, and P=2134567892 is exactly the data CSN 2,1 in the server historical data area. The time and geographical location of the counterfeit banknote sent to the server by the money counter is provided for the anti-counterfeiting and counterfeiting. Possible time and location.

Claims (9)

  1. 一种基于闭环认证理论的货币或有价证券认证***,其特征在于:包括***服务器和设置在货币或有价证券上的的可读写存储器件,以及能够对该可读写存储器件进行读写操作、并与服务器建立通讯的检验设备;A currency or securities authentication system based on closed-loop authentication theory, comprising: a system server and a readable and writable storage device disposed on a currency or a valuable security, and capable of reading the readable and writable storage device An inspection device that writes operations and establishes communication with the server;
    通过以下过程实现货币或有价证券防伪:Realize currency or securities security through the following process:
    1)每一张货币或有价证券在投放到公开环境空间前,产生密钥Ki,j和这张货币或有价证券唯一标识SNi1) Each currency or marketable securities generates a key K i,j and this currency or a securities unique identifier SN i before being placed in the public environment space;
    2)使用特定加密算法对SNi进行加密运算;此过程中,Ki,j作为一次一密加密运算的密钥,得到SNi对应的密文CSNi,j,将SNi和CSNi,j存入防伪服务器;其中,i是连接SNi、Ki,j和CSNi,j的指针;j为产生一次一密密钥的次数;i∈{E},SNi∈{R},j为自然数,集合{E}、和{R}是由数字和/或字母组成的序列的集合;2) Encryption operation is performed on SN i using a specific encryption algorithm; in this process, K i,j is used as a key for one-time encryption operation, and ciphertext CSN i,j corresponding to SN i is obtained , and SN i and CSN i are obtained. j is stored in the anti-counterfeiting server; where i is a pointer connecting SN i , K i, j and CSN i, j ; j is the number of times a secret key is generated; i ∈ {E}, SN i ∈ {R}, j is a natural number, and the set {E}, and {R} are a collection of sequences consisting of numbers and/or letters;
    3)将密钥Ki.j写入固定在对应的货币或有价证券上的可读写存储器件后,货币或有价证券投放到公开环境空间;3) After the key K ij is written into the readable and writable storage device fixed on the corresponding currency or the valuable security, the currency or the valuable securities are placed in the public environment space;
    4)检验设备对货币或有价证券进行校验时,除了对其防伪标识进行验证外,所述检验设备还要读取所述货币或有价证券上的密钥Kx,j,并发送至所述服务器;4) When the verification device verifies the currency or the valuable securities, in addition to verifying the anti-counterfeit identification, the inspection device also reads the key K x,j on the currency or the valuable securities and sends To the server;
    提取货币或有价证券上的密钥Kx,j含有的指针x,其中:x∈{E},找到服务器中对应的SNx和CSNx,j;其中,使用与步骤2)相同的算法,以Kx,j作为密钥,对SNx进行加密运算,得到密文P;Extracting the key x, j, on the currency or the securities K x, j contains a pointer x, where: x ∈ {E}, find the corresponding SN x and CSN x, j in the server; wherein, the same algorithm as in step 2) is used , using K x, j as a key, performing cryptographic operations on SN x to obtain ciphertext P;
    若密文P=CSNx,j,则货币或有价证券为真,跳转至下一步;If the ciphertext P=CSN x,j , then the currency or the securities are true, and jump to the next step;
    若密文P≠CSNx,j,所述***服务器向终端发送货币或有价证券为假的信息,并结束真伪校验操作;If the ciphertext P≠CSN x,j , the system server sends the money or the securities to the terminal as false information, and ends the authenticity verification operation;
    5)所述***服务器向终端发送货币或有价证券为真的信息;5) the system server sends information indicating that the currency or the valuable securities are true to the terminal;
    同时,以j+1的数值来更新j,***服务器生成新的密钥Kx,j;使用与步骤2)相同的算法,以新的Kx,j作为密钥,对SNx进行加密运算,得到新的密文CSNx,j,并将其存储于服务器中,以更新原有的CSNx,j,并将新的密钥Kx,j发送至所述检验设备,更新所述可读写存储器件中原有的Kx,jAt the same time, j is updated with the value of j+1, the system server generates a new key K x,j ; using the same algorithm as step 2), the new K x,j is used as the key to encrypt the SN x Obtaining a new ciphertext CSN x,j and storing it in the server to update the original CSN x,j and sending a new key K x,j to the verification device to update the Read and write the original K x,j in the storage device.
  2. 根据权利要求1所述的基于闭环认证理论的货币或有价证券 认证***,其特征在于:所述可读写存储器件为植入货币或有价证券的RFID电子标签。Currency or securities based on closed loop authentication theory according to claim 1 The authentication system is characterized in that the readable and writable storage device is an RFID electronic tag implanted with money or securities.
  3. 根据权利要求1所述的基于闭环认证理论的货币或有价证券认证***,其特征在于:所述步骤5)中,将CSNx,j更新为CSNx,j+1后,CSNx,j+1作为下一次验证检验设备读取到的货币或有价证券上的验证密钥的依据;但CSNx,j仍然存储于服务器的历史数据区域中,不作为验证依据;The currency or securities authentication system based on closed loop authentication theory according to claim 1, wherein in the step 5), the CSN x, j is updated to CSN x, j+1 , CSN x, j +1 is used as the basis for verifying the verification key on the currency or securities on the next time; but CSN x, j is still stored in the historical data area of the server, not as a verification basis;
    如果服务器收到检验设备读取到的货币或有价证券上的验证密钥,且该密钥的验证结果P≠CSNx,j,但P是所述历史数据区域中的数据时,则判定该密钥已被窃取,并被写入了假冒货币或有价证券上的可读写存储器件中;If the server receives the verification key on the currency or the securities read by the inspection device, and the verification result of the key P≠CSN x,j , but P is the data in the historical data region, then it is determined The key has been stolen and written into a readable and writable storage device on a counterfeit currency or security;
    检验设备向服务器发送扫描被验证货币或有价证券可读写存储器件的时间和地理位置,若存在假冒货币或有价证券,即可为防伪打假提供制假者可能的制假时间和地理位置,以及使用假冒货币或有价证券的使用者的历史使用时间和地点。The inspection device sends to the server the time and geographical location of scanning the verified currency or the readable and writable storage device of the securities. If there is counterfeit currency or securities, it can provide the counterfeiting time and geographical location of the counterfeiter for anti-counterfeiting and anti-counterfeiting. And the historical time and place of use of users who use counterfeit currency or securities.
  4. 根据权利要求1所述的基于闭环认证理论的货币或有价证券认证***,其特征在于:所述检验设备为点钞机或验钞机;所述点钞机或验钞机上装有rfid读写装置。The currency or valuable securities authentication system based on the closed loop authentication theory according to claim 1, wherein the inspection device is a money counter or a money detector; and the money counter or the money detector is equipped with an RFID reading. Write device.
  5. 根据权利要求1所述的基于闭环认证理论的货币或有价证券认证***,其特征在于:SNi包含货币印刷时间和序号。The currency or securities authentication system based on closed loop authentication theory according to claim 1, wherein SN i includes a currency printing time and a serial number.
  6. 根据权利要求1所述的基于闭环认证理论的货币或有价证券认证***,其特征在于:服务器上不存储Ki,jA currency or value securities authentication system based on closed loop authentication theory according to claim 1, wherein K i,j is not stored on the server.
  7. 根据权利要求1所述的基于闭环认证理论的货币或有价证券认证***,其特征在于:所述SNi=i。A currency or value securities authentication system based on closed loop authentication theory according to claim 1, wherein said SN i = i.
  8. 根据权利要求1所述的基于闭环认证理论的货币或有价证券认证***,其特征在于:所述Ki,j是随机生成的。A currency or value securities authentication system based on closed loop authentication theory according to claim 1, wherein said K i,j is randomly generated.
  9. 根据权利要求1所述的基于闭环认证理论的货币或有价证券认证***,其特征在于:若发生货币或有价证券被盗事件,***服务 器对这批被盗货币或有价证券对应的SNi和CSNi,j进行标记;The currency or securities authentication system based on closed loop authentication theory according to claim 1, characterized in that: in the event of a stolen money or securities, the system server pairs the stolen money or the SN corresponding to the securities. i and CSN i,j are marked;
    在这批被盗货币或有价证券中的一张或多张被终端设备验证时,When one or more of the stolen money or securities are verified by the terminal device,
    所述***服务器记录并提交该次扫描货币或有价证券的终端设备的扫描时间和地理位置,即提供被盗货币或有价证券出现的时间和地理位置。 The system server records and submits the scan time and geographic location of the terminal device that scans the currency or the securities, that is, the time and geographic location at which the stolen money or the securities are present.
PCT/CN2015/075952 2014-04-09 2015-04-07 Currency or security authentication system based on closed-loop authentication theory WO2015154647A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201410140584.2A CN103971250B (en) 2014-04-09 2014-04-09 A kind of one time one card anti-fake traceability system based on mobile terminal and RFID
CN201410140584.2 2014-04-09
CNPCT/CN2015/073591 2015-03-03
PCT/CN2015/073591 WO2015154595A1 (en) 2014-04-09 2015-03-03 One-time pad authentication system based on closed-loop authentication theory and internet

Publications (1)

Publication Number Publication Date
WO2015154647A1 true WO2015154647A1 (en) 2015-10-15

Family

ID=51240710

Family Applications (4)

Application Number Title Priority Date Filing Date
PCT/CN2014/092112 WO2015154482A1 (en) 2014-04-09 2014-11-25 One-time certificate anti-counterfeiting tracing system based on mobile terminal and rfid
PCT/CN2015/073591 WO2015154595A1 (en) 2014-04-09 2015-03-03 One-time pad authentication system based on closed-loop authentication theory and internet
PCT/CN2015/075952 WO2015154647A1 (en) 2014-04-09 2015-04-07 Currency or security authentication system based on closed-loop authentication theory
PCT/CN2015/075949 WO2015154646A1 (en) 2014-04-09 2015-04-07 Currency or security anti-counterfeiting tracing system based on one-time certificate technology

Family Applications Before (2)

Application Number Title Priority Date Filing Date
PCT/CN2014/092112 WO2015154482A1 (en) 2014-04-09 2014-11-25 One-time certificate anti-counterfeiting tracing system based on mobile terminal and rfid
PCT/CN2015/073591 WO2015154595A1 (en) 2014-04-09 2015-03-03 One-time pad authentication system based on closed-loop authentication theory and internet

Family Applications After (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/075949 WO2015154646A1 (en) 2014-04-09 2015-04-07 Currency or security anti-counterfeiting tracing system based on one-time certificate technology

Country Status (2)

Country Link
CN (1) CN103971250B (en)
WO (4) WO2015154482A1 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971250B (en) * 2014-04-09 2017-04-05 四川谦泰仁投资管理有限公司 A kind of one time one card anti-fake traceability system based on mobile terminal and RFID
CN105844472A (en) * 2015-01-13 2016-08-10 四川谦泰仁投资管理有限公司 RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention
CN105279470B (en) * 2015-09-24 2018-01-16 深圳市金溢科技股份有限公司 A kind of method, system and handheld terminal for handling the handing-over of money case
CN106709562A (en) * 2015-11-16 2017-05-24 四川谦泰仁投资管理有限公司 Currency counting system having RFID identification function
DE112018000705T5 (en) 2017-03-06 2019-11-14 Cummins Filtration Ip, Inc. DETECTION OF REAL FILTERS WITH A FILTER MONITORING SYSTEM
CN108881167B (en) * 2017-05-16 2021-06-22 江峰 Intelligent contract of finite field block chain system
CN110648143A (en) * 2018-06-11 2020-01-03 江峰 Closed-loop anti-counterfeiting verification system based on Merkle trusted tree
CN109360002A (en) * 2018-09-21 2019-02-19 蛙力买(浙江)信息科技有限公司 A kind of method for anti-counterfeit and device of product

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030221098A1 (en) * 2002-05-22 2003-11-27 Kun-Huei Chen Method for automatically updating a network ciphering key
CN101183439A (en) * 2006-11-14 2008-05-21 中国民生银行股份有限公司 Electronic bill processing system and processing method
CN102186151A (en) * 2011-05-13 2011-09-14 中国电信股份有限公司 Method and system for processing tax-related business on line and intermediary transmission device
CN102469080A (en) * 2010-11-11 2012-05-23 中国电信股份有限公司 Method for pass user to realize safety login application client and system thereof

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040000987A1 (en) * 2002-06-27 2004-01-01 Ncr Corporation Check fraud detection process using checks having radio frequency identifier (RFID) tags and a system therefor
WO2007027151A1 (en) * 2005-09-01 2007-03-08 Stora Enso Oyj Verification of a product identifier
CN101556654B (en) * 2009-05-27 2013-03-27 杨志清 Anti-counterfeiting technology for multi-variable dynamic digital signature and interactive authentication electronic tag
CN102236861A (en) * 2011-07-07 2011-11-09 江苏联博计算机信息产业有限公司 Commodity anti-counterfeiting method based on path mechanism
CN203232458U (en) * 2012-03-31 2013-10-09 四川谦泰仁投资管理有限公司 Merchandise anti-counterfeiting system based on mobile terminal and RFID electronic label
CN103544511A (en) * 2013-10-29 2014-01-29 上海华彩科技有限公司 Anti-counterfeiting identification
CN103971250B (en) * 2014-04-09 2017-04-05 四川谦泰仁投资管理有限公司 A kind of one time one card anti-fake traceability system based on mobile terminal and RFID

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030221098A1 (en) * 2002-05-22 2003-11-27 Kun-Huei Chen Method for automatically updating a network ciphering key
CN101183439A (en) * 2006-11-14 2008-05-21 中国民生银行股份有限公司 Electronic bill processing system and processing method
CN102469080A (en) * 2010-11-11 2012-05-23 中国电信股份有限公司 Method for pass user to realize safety login application client and system thereof
CN102186151A (en) * 2011-05-13 2011-09-14 中国电信股份有限公司 Method and system for processing tax-related business on line and intermediary transmission device

Also Published As

Publication number Publication date
CN103971250B (en) 2017-04-05
CN103971250A (en) 2014-08-06
WO2015154595A1 (en) 2015-10-15
WO2015154646A1 (en) 2015-10-15
WO2015154482A1 (en) 2015-10-15

Similar Documents

Publication Publication Date Title
WO2015154647A1 (en) Currency or security authentication system based on closed-loop authentication theory
US7080041B2 (en) System and method for production and authentication of original documents
US20130212027A1 (en) Systems, method and computer-accessible mediums for providing secure paper transactions using paper fiber identifiers
Chambers et al. Currency security and forensics: a survey
US7188258B1 (en) Method and apparatus for producing duplication- and imitation-resistant identifying marks on objects, and duplication- and duplication- and imitation-resistant objects
CN111612966B (en) Bill certificate anti-counterfeiting detection method and device based on image recognition
JP2011054166A (en) Method of authenticating security documents
KR100991855B1 (en) System for Issuing and Verifying Electronic Document, Method for Issuing Electronic Document and Method for Verifying Electronic Document
US9871660B2 (en) Method for certifying and authentifying security documents based on a measure of the relative variations of the different processes involved in its manufacture
CN111612963B (en) Bill voucher anti-counterfeiting detection method and device based on intelligent equipment
WO2012162960A1 (en) Banknote or bill management system and server
CN104881811B (en) Management method, system and device for electronization of bill information
US8931688B2 (en) System and method for currency validation
JP6532534B2 (en) A method for authentication and verification of security documents based on the measurement of relative position variations in different processes involved in the creation of security documents
KR20080052005A (en) Imaging apparatus and system for management of the bogus note comprising the same
BR112020017923A2 (en) METHOD AND SYSTEM OF AUTOMATIC VERIFICATION OF THE AUTHENTICITY OF DOCUMENTS
US10061981B2 (en) Security improvements for tickets
CN106815614A (en) A kind of bank acceptance Antiforge system of use NFC anti-counterfeiting technologies
CN111612964B (en) Bill certificate anti-counterfeiting detection method and device based on block chain
KR100965332B1 (en) Method for producr item tracking
Wezza et al. A novel model for securing seals using blockchain and digital signature based on qr codes
Hoffman et al. Securing number plates based on digital signatures and RFID
JP7274202B2 (en) Optical code creation program, optical code reading authentication program, optical code authentication system, payment system, printed matter manufacturing method, and optical code authentication method
CN107480558B (en) Voucher management system and method
WEZA¹ et al. A NOVEL MODEL FOR SECURING SEALS USING BLOCKCHAIN AND DIGITAL SIGNATURE BASED ON QUICK RESPONSE CODES

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15776170

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15776170

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 15776170

Country of ref document: EP

Kind code of ref document: A1