CN102201100B - Object anti-counterfeiting method and system - Google Patents

Object anti-counterfeiting method and system Download PDF

Info

Publication number
CN102201100B
CN102201100B CN 201110119710 CN201110119710A CN102201100B CN 102201100 B CN102201100 B CN 102201100B CN 201110119710 CN201110119710 CN 201110119710 CN 201110119710 A CN201110119710 A CN 201110119710A CN 102201100 B CN102201100 B CN 102201100B
Authority
CN
China
Prior art keywords
false proof
label
article
file
uniqueness
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 201110119710
Other languages
Chinese (zh)
Other versions
CN102201100A (en
Inventor
朱清明
冯濒啸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 201110119710 priority Critical patent/CN102201100B/en
Publication of CN102201100A publication Critical patent/CN102201100A/en
Application granted granted Critical
Publication of CN102201100B publication Critical patent/CN102201100B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Cash Registers Or Receiving Machines (AREA)

Abstract

The invention discloses an object anti-counterfeiting method and system. The method comprises the following steps of: firstly, setting a label on an object to be anti-counterfeited, wherein the label is provided with uniqueness; reading image information displayed by the uniqueness label when anti-counterfeiting verification is carried out, and encrypting the label by utilizing a private key to generate a signature file; encoding the signature file to generate an anti-counterfeiting code so as to set the anti-counterfeiting code on the object to be anti-counterfeited; obtaining anti-counterfeiting information on the object to be anti-counterfeited through an image capturing device on a user terminal device when the truth and false of the object to be anti-counterfeited need to be verified; decoding the anti-counterfeiting code to obtain the signature file; and decrypting the signature file according to public key information corresponding to the private key to obtain and display the image information of the uniqueness label. By adopting the object anti-counterfeiting method and system, the anti-counterfeiting effect can be improved.

Description

A kind of article anti-counterfeit method and system
Technical field
The present invention relates to field of anti-counterfeit technology, relate in particular a kind of article anti-counterfeit method and system.
Background technology
Along with the continuous fierceness of social competition, the behavior of various false makings, fraud is increasing.As, the forged certificates such as various Fake Diplomas, spurious certificate constantly occur, and various counterfeit goods are of common occurrence especially.In order to identify forged certificate, counterfeit and shoddy goods, hit the behavior that false making is faked, various anti-fake certificate technology are arisen at the historic moment.
For example, for commodity counterfeit prevention, traditional method for anti-counterfeit is to stamp label for commodity, but, the label of any record merchandise news all needs to carry out authenticity examination for any the 3rd people, check whether commodity are true, generally include three partial contents: the authenticity of commodity main body, the authenticity of label substance and label publisher information, only have the label publisher that Qualification Approval is completely arranged or deny the authenticity of commodity.If the authenticity of check commodity need to suppose that the proofer possesses certain knowledge, but the people of check commodity is label publisher third parties in addition usually, and such as common consumer etc., this class crowd but often lacks this knowledge.In addition, the result of this knowledge check has some shortcomings usually: at first, be lower than licensor's authority; Can't ruling produce contradiction when secondly, assay is not by approval.
Therefore, check commodity authority's method only has the publisher of commodity to get involved finally solution commodity authenticity identification problem.But after the commodity issue, when needing to check authenticity whenever and wherever possible, the commodity publisher can't show the on-the-spot authenticity of in time declaring commodity usually, and this just gives the commodity of forging, the label of counterfeiting merchandise, and the abuse Commercial goods labels provides chance.
Thus, a kind of improved method for anti-counterfeit is exactly to increase the label that is difficult to copy on commodity, leans on the authenticity of label to guarantee the authenticity of commodity, is equivalent to copy commodity if copy label.But the manufacture difficulty of label and the authenticity of label are judged needs still to differentiate that the people has specific knowledge, the contrast otherwise the authenticity of label is had no way of.
False proof another kind of method to commodity arranges the information of goods information data storehouse exactly, preserves the merchandise news that the commodity publisher issued, and need to obtain merchandise news from database by means of communication during check, and the merchandise news of collection in worksite is compared.This method have at least a following shortcoming: the first, need to possess specific communication condition; 2, the identifier has the ability of using means of communication; 3, communications cost occurs; 4, need the permanent failure-free operation that keeps merchandising database; 5, need to keep corresponding merchandising database for different commodity publishers.But a lot of commodity publishers do not possess technology and the economic capability of keeping database, and the data center of third party's foundation, can increase false proof cost.
Summary of the invention
The invention provides a kind of article anti-counterfeit method and system, can improve antifalse effect.
The invention provides following technical scheme:
A kind of article anti-counterfeit method treats to be provided with on the false proof article uniqueness label, and described uniqueness label comprises master pattern and cover thin slice two parts on the master pattern that described thin slice is made by the transparent material of randomly changing printing opacity and reflective characteristic; Described method comprises:
Read the image information that described uniqueness label demonstrates, and the image information that reads is preserved into e-file;
Utilize private key that described e-file is encrypted the generation signature file;
To the described signature file generating anti-counterfeiting code of encoding, in order to described security code is arranged on described treating on the false proof article;
When needs checkings is described when treating the true and false of false proof article, finish following operation by yard device of testing that is installed in advance on the subscriber terminal equipment:
Obtain the described security code information on the false proof article for the treatment of by the image-pickup device on the described subscriber terminal equipment;
Described security code is decoded, obtain described signature file;
The PKI corresponding according to described private key is decrypted described signature file, obtains the image information of described uniqueness label;
Demonstrate the image of described uniqueness label at described terminal device, so that the user determines the described true and false for the treatment of false proof article by comparing the described image that demonstrates on the uniqueness label on the false proof article and the terminal device treated.
Preferably, the descriptor and the commodity distributor information that also comprise commodity in the described e-file.
Preferably, describedly utilize private key that described e-file is encrypted to generate signature file and comprise:
Utilization is encrypted the generation signature file through the private key of the false proof central authority of third party to described e-file.
Preferably, be provided with otch on the described uniqueness label, and, described uniqueness label treats that described position on the false proof article can treat that false proof article are used or pack the position that needs are opened when being opened and determine according to described, attempted to take off or describedly treated that false proof article are used or pack when being opened, the destroy integrity of described uniqueness label with the described uniqueness label of box lunch.
Preferably, described security code comprises two-dimension code.
A kind of article anti-counterfeit system treats to be provided with on the false proof article uniqueness label, and described uniqueness label comprises master pattern and cover thin slice two parts on the master pattern that described thin slice is made by the transparent material of randomly changing printing opacity and reflective characteristic; Described system comprises:
The first reading unit is used for reading the image information that described uniqueness label demonstrates, and the image information that reads is preserved into e-file;
Ciphering unit is used for utilizing private key that described e-file is encrypted the generation signature file;
Coding unit is for generating anti-counterfeiting code that described signature file is encoded, in order to described security code is arranged on described treating on the false proof article;
The second reading unit is used for obtaining the described security code information on the false proof article for the treatment of by the image-pickup device on the subscriber terminal equipment;
Decoding unit is used for described security code is decoded, and obtains described signature file;
Decryption unit is used for according to PKI corresponding to described private key described signature file being decrypted, and obtains the image information of described uniqueness label;
Display unit is used for demonstrating at described terminal device the image of described uniqueness label, so that the user determines the described true and false for the treatment of false proof article by comparing the described image that demonstrates on the uniqueness label on the false proof article and the terminal device treated.
Preferably, the descriptor and the commodity distributor information that also comprise commodity in the described e-file.
Preferably, described ciphering unit specifically is used for:
Utilization is encrypted the generation signature file through the private key of the false proof central authority of third party to described e-file.
Preferably, be provided with otch on the described uniqueness label, and, described uniqueness label treats that described position on the false proof article can treat that false proof article are used or pack the position that needs are opened when being opened and determine according to described, attempted to take off or describedly treated that false proof article are used or pack when being opened, the destroy integrity of described uniqueness label with the described uniqueness label of box lunch.
Preferably, comprise glass for the transparent material of making described thin slice, perhaps, organic transparent material, perhaps, the potpourri of glass and organic transparent material; Mode by knocking, corrode or mix impurity is so that described transparent material has randomly changing printing opacity and reflective characteristic.
Via above-mentioned technical scheme as can be known, compared with prior art, the article anti-counterfeit method of the embodiment of the invention is at first to treat that false proof article arrange the uniqueness label, this uniqueness label has following characteristic: because the image of uniqueness label is observed through thin slice, therefore make it have the feature of 3-D view, for common two dimensional image, have non-reproduction or very high difficulty of reproduction, also be uniqueness.
After treating that false proof article being provided with has the uniqueness label of above-mentioned feature, just can be convenient in the following manner the true and false that the user treats false proof article verifies: at first, by treating that false proof article publisher carries out following operation: read the uniqueness label from treating false proof article, and the image information that reads preserved into e-file, then utilize private key that described e-file is encrypted the generation signature file, to the described signature file generating anti-counterfeiting code of encoding, so just can be with security code by printing or the mode such as stickup be arranged on and treats on the false proof article.Then, when the user need to verify, just can finish following operation by yard device of testing that is installed in advance on the subscriber terminal equipment: obtain the described security code information on the false proof article for the treatment of by the image-pickup device on the described subscriber terminal equipment; Described security code is decoded, obtain described signature file; The PKI corresponding according to the private key when encrypting is decrypted described signature file, obtains the image information of described uniqueness label; Demonstrate the image of described uniqueness label at described terminal device, like this, the user just can by comparing the described image that demonstrates on the uniqueness label on the false proof article and the terminal device treated, determine the described true and false for the treatment of false proof article.
As seen, the method for the embodiment of the invention need not the verifier have special knowledge when carrying out authenticity verification, can effectively realize article anti-counterfeit.Although need to use the terminal devices such as mobile phone, but only need this terminal device to have the image capture function, and install at this terminal device and to test a yard device, the process of checking is finished in terminal device this locality, need not by utilizing communication function inquiry item information data storehouse just can distinguish article genuine-fake, the consumption that therefore can not produce the communication resource.The method of the embodiment of the invention need not to set up and safeguard the item information data storehouse simultaneously, has reduced the cost of inquiry article genuine-fake.And this testing in the terminal device that yard software is installed in users has been equivalent to adopt the PKI diffusion technique of a large amount of public publications, and this can prevent from testing the collusion attack in yard process, can prevent that also whole anti-counterfeiting technology from testing the Single Point of Faliure of yard process.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, the below will do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art, apparently, accompanying drawing in the following describes only is embodiments of the invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to the accompanying drawing that provides other accompanying drawing.
Fig. 1 is the process flow diagram of the method for the embodiment of the invention;
Fig. 2 is the synoptic diagram of the system of the embodiment of the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that obtains under the creative work prerequisite.
Need to prove that at first about the method for anti-counterfeit of the article such as certificate, the applicant applies for separately as another part patent.Its main thought is, because the article such as certificate have following characteristics: usually have photo on the certificate, everyone photo is different, has uniqueness; And certificate is only held by certificate and is used, that is to say that the photo on the holder of certificate and user and the certificate has one by one correspondence, if the adulterator is intended for someone forged certificate, then need to use this people's photo, the photo that uses others is invalid.
Have These characteristics just because of article such as certificates, so that photo can be as a kind of uniqueness label of certificate, and then just can utilize this uniqueness label to carry out the false proof of certificate.Its specific practice is: at credential issuance mechanism one end, can be verified the identity of issuer by third party's false-proof mechanism, and provide a private key that is specific to this issuer by this third party's false-proof mechanism for this issuer.Issuer can be at first in a conventional manner with certificate making out after getting access to this private key, on the certificate with the photo of holder and Notified Body's information etc.; Then, just can carry out following operation: by taking pictures or the mode such as scanning, read the image information in the photo on the certificate, the private key that gets access to from third party issuer before utilizing is encrypted the image information that reads, and generates a signature file; Then, with this signature file security codes such as generating two-dimension code of encoding, after generating anti-counterfeiting code, can directly security code be printed on the certificate, perhaps security code is printed on the adhesive tape, again adhesive tape is sticked on the certificate, in a word, can be so that certificate beyond the demonstration original information, also shows a security code.Then, credential issuance mechanism just can issue with the certificate of security code.
Accordingly, third party's false-proof mechanism can also be tested a yard software to users' public publication, this tests the function that has the decoding security code in yard software, and wherein be provided with the PKI corresponding with the private key that offers each licence issuing authority, can the signature file that decoding obtains be decrypted, obtain image information, and be presented in the terminal device.Like this, the user just can by comparison on the certificate photo and the screen of terminal device on the image that demonstrates, judge the true and false of certificate: if both are consistent, then certificate is genuine, otherwise, if both are inconsistent, perhaps can't correctly demonstrate image in the terminal device at all, then certificate is false.In a word, credential issuance mechanism according to aforementioned manner after certificate provides security code, users only need this is tested in the terminal devices with the image capture function such as mobile phone that yard software is installed in oneself, just can verify the true and false of certificate.
The result of said process why reliably be because:
First, the private key of be used for encrypting is to be after the identity of credential issuance mechanism is verified by third party's false-proof mechanism, licenses to credential issuance mechanism, and the adulterator is because can't be by the authentication of third party's false-proof mechanism, therefore, also just can't obtain the mandate at the false proof center of third party.
Second, being used for the private key of encrypting and the PKI that is used for deciphering is all provided by the false proof center of third party, if the adulterator uses the private key of the false proof central authority of non-third party to be encrypted, and finally obtain security code, then when checking, can't correctly be decrypted, also just can't demonstrate the image before encrypting.Can prove thus the authenticity of credential issuance mechanism.
The 3rd, forged certificate is by checking if the adulterator wants, and then unique approach is that additional clause photo and security code are copied together, makes another certificate.But by preamble to the description of the characteristics of certificate as can be known, the adulterator can not do like this, this be because, forge a certificate if the adulterator is intended for user A, but the photo on the pseudo-certificate of producing but is user B, obviously, this certificate has lost its meaning.
As seen, by the way, can very effectively prevent from certificate is faked.
But, in actual applications, except certificate, also have other article may have counterfeiting risk.For example, some commodity etc.The difference of these article and certificate is, need to be with labels such as holder's photos on these article, and the same a commodity of same manufacturers produce have reproducibility between different individualities, in addition, in some cases, also there is the difference between commodity itself and the commodity external packing, Commercial goods labels can only be beaten in external packing, and can't directly beat on commodity (for example mineral water, label can't directly be beaten on mineral water, and can only beat in external packing).At this moment, if still carry out false proofly according to aforementioned manner, then can greatly reduce its reliability.
For example, with certain brand mineral water of equal-specification, from external packing, may there be obvious difference between each bottle, as long as the adulterator forges out external packing, therefore can't distinguish by preceding method the true and false of external packing, just more can't distinguish about the true and false of commodity itself.Namely allow to allow the manufacturer of external packing stamp different patterns on the label of each mineral water bottle, and with this pattern as aforementioned uniqueness label, use the preceding method generating anti-counterfeiting code, also still can stay opportunity to the adulterator.This all is to be replicated because of pattern and security code, the verifier has no way of learning the true and false of this pattern and security code itself, the adulterator can be directly copies the security code of this pattern and generation get off together, prints in the external packing of forging, and then package interior is put the commodity of personation outside.Like this, the verifier can find that in when checking image that mobile phone shows is consistent with pattern in the commodity packaging, and finds that unlikely in fact this pattern occurred in other one or more commodity packagings.In addition, the adulterator also may reclaim used commodity external packing, then directly in packing, load onto and counterfeit merchandise, at this moment, just can directly utilize in the former commodity packaging with pattern and security code.Obviously, be genuine if believe packing or commodity itself at this point, then be not right.
In a word, treat that with external packing for the false proof article, even use aforementioned method for certificate false proof, then the adulterator still can fake by following dual mode: a kind of is pattern and the corresponding security code that copies in the commodity external packing for commodity etc.; The second is to reclaim used commodity external packing, the commodity of the personation of then packing into therein.
The embodiment of the invention just is based on above-mentioned consideration, for commodity are waited for a kind of method for anti-counterfeit that false proof article provide.During specific implementation, at first need to treat that false proof article provide the uniqueness label, in embodiments of the present invention, the uniqueness label has following features: the uniqueness label comprises master pattern and covers thin slice two parts on the master pattern, wherein, this thin slice is made by the transparent material of randomly changing printing opacity and reflective characteristic; Wherein, in order to prevent that the adulterator from using the aforementioned second way to fake, can also otch be set at this uniqueness label, and, this uniqueness label position on treating false proof article can be according to treating that false proof article are used or pack the position that needs are opened when being opened and determine, for example, for mineral water etc., this uniqueness label can stick on the junction of bottle cap and body, like this, when there being the people to attempt to take off the uniqueness label, treat that perhaps false proof article are used or pack when being opened, the integrality of this uniqueness label all can be destroyed.Need to prove, for some situations that can label at commodity itself, then can only consider aforementioned the first fraud mode (only needing namely to prevent that pattern and corresponding security code that the adulterator copies in the commodity external packing from getting final product), therefore, for this situation, the uniqueness label only need to satisfy aforementioned uniqueness and get final product.
Wherein, about aforementioned thin slice, so long as getting final product of making of the transparent material of randomly changing printing opacity and reflective characteristic, during specific implementation, this material can be glass or organic transparent material, perhaps also can be both potpourris.For so that this transparent material has randomly changing printing opacity and reflective characteristic, can be accomplished in several ways, can be various can be so that starting material produce various physics or the chemical method of texture.Concrete, can comprise and knock, corrode or mix impurity etc.Its principle is that aforesaid operations all has non-reproduction.For example, for the mode of mixing impurity, just be the equal of in starting material, to mix the material different from starting material, can be the lines of bubble, drop, solid particle, solid fragment or the arbitrary shape of transparent or opaque arbitrary shape or color, perhaps their combination, etc.In a word, by the thin slice that above-mentioned variety of way intervention produces, all be different between per two.When covering such thin slice on the master pattern, even master pattern is identical, in the covering after the different thin slice, actual observation to image also be different.
For master pattern, difference treats that between the false proof article individuality, original image can be identical, for example, and can be with trade mark of product etc. as master pattern.Certainly, original image also can be different.During specific implementation, can at first master pattern be printed on the adhesive tape, then cover thin slice in this adhesive tape, stick on together again on the ad-hoc location for the treatment of false proof article; Perhaps, also can directly print the patterns such as ATTACH LABEL at the ad-hoc location for the treatment of false proof article, and then stick thin slice at this pattern.Aforementioned ad-hoc location just refers to previously describedly treat that false proof article are used or pack the position that need to open when being opened, for example aforementioned bottle cap and body junction, etc.
Thus, so that the uniqueness label has following characteristic: at first, because the image of uniqueness label is observed through thin slice, even and if thin slice is thin again, also be by certain thickness, therefore make the image of observing have the feature of 3-D view, and this 3-D view is for common two dimensional image, having non-reproduction or very high difficulty of reproduction, also is uniqueness, and this has just been avoided the adulterator to forge by the mode that copies this label; Secondly, owing on the uniqueness label otch can be set, and can be provided with according to the open site position at uniqueness label place, therefore, be used or pack and all have destructibility when being opened so that the uniqueness label, is perhaps treated false proof article by being attempted to take off; Moreover, because the uniqueness label is dimerous by original image and thin slice, and thin slice is to be made by the transparent material of randomly changing printing opacity and reflective characteristic, can't produce living thin slice, therefore, just has an irreducibility so that the uniqueness label is in a single day destroyed again.By above-mentioned destructibility and irreducibility, fake by the mode that reclaims used product external packaging with regard to having avoided the adulterator.
After having had the uniqueness label of above-mentioned characteristic, treat that the false proof article producer just can carry out following processing, so that carry out fake certification.Referring to Fig. 1, the article anti-counterfeit method that the embodiment of the invention provides may further comprise the steps:
S101: read the image information that described uniqueness label demonstrates, and the image information that reads is preserved into e-file;
During specific implementation, can be by taking pictures or the mode such as scanning reads the image information that the uniqueness label demonstrates.Because uniqueness information is by master pattern and covers laminar on the original image, therefore, the image that reads is through thin slice refraction and/or the image that reflected, is equivalent to also comprise in the image that reads the characteristic of thin slice.Because thin slice is to be made by the material of randomly changing printing opacity and reflective characteristic, has randomness, therefore, the image that reads has also had the characteristics of randomness.
In actual applications, except the image information of this uniqueness label, descriptor and the commodity distributor information of commodity can also be kept in the e-file together, so that the true and false of more effective checking article.
S102: utilize private key that described e-file is encrypted the generation signature file;
Wherein, the private key of be used for encrypting can commodity producers or publisher etc. determine voluntarily, also be that each producer or commodity publisher can use private key separately that oneself the false proof article for the treatment of are encrypted.Accordingly, when verifying, then need to use the PKI that private key is corresponding separately to be decrypted.That is to say that each treats that the false proof article producer can have separately independently Antiforge system.
In order further to guarantee false proof validity, the private key that should be used for encrypting also can be through the false proof central authority of third party, at this moment, treat that the false proof article producer needs to obtain the private key of mandate from the false proof center of third party in advance, only have the producer by the checking of the false proof center of third party can get access to for the private key of encrypting, the identity that is equivalent to like this to be treated by the false proof center of third party the false proof article producer is verified.And the private key of user encryption and the PKI that is used for deciphering can be by third party's false proof center unified management and distribution.
S103: to the described signature file generating anti-counterfeiting code of encoding, in order to described security code is arranged on described treating on the false proof article;
The signature file that encryption obtains is encoded, can obtain security code.During specific implementation, this security code can be two-dimension code.Concrete coding method does not belong to emphasis of the present invention, therefore repeats no more here.
After generating anti-counterfeiting code, just security code can be printed or sticked on and treat on the false proof article.Thereby so that treat not only have the uniqueness label on the false proof article, also has the security code that generates according to the uniqueness label.
So far, treat that the false proof article producer just can will treat that false proof article offer users and used.When the user uses in the process of article, if need the true and false of checking article, just can install at terminal device and test a yard device.If when generating anti-counterfeiting code, use be that each treats the private key that the false proof article producer arranges voluntarily, then this is tested yard device and can treat false proof article producer public publication, wherein presets the PKI corresponding with this private key for the treatment of that the false proof article producer uses; Perhaps, if during generating anti-counterfeiting code, use be the private key of the false proof central authority of third party, then this demo plant can by third party's false proof center public publication, wherein preset the PKI for deciphering.Test a yard device by this and finish following operation:
S104: obtain the described security code information on the false proof article for the treatment of by the image-pickup device on the described subscriber terminal equipment;
For example, usually all be equipped with camera on the terminal device, the camera function of the equipment that can open a terminal allows camera aim at security code on the article to be verified, so that the security code on the article is converted to the e-file in the terminal device, preserved security code information in this document.
S105: described security code is decoded, obtain described signature file;
Decoding is the inverse process of aforementioned coding.
S106: the PKI corresponding according to described private key is decrypted described signature file, obtains the image information of described uniqueness label;
As mentioned before, the PKI for deciphering is preset at decoding device.
Need to prove, if each treats that the false proof article producer uses the private key of deciding in its sole discretion to be encrypted, then each treats that the false proof article producer may need independent distribution decoding software separately, that is to say, if the user need to carry out fake certification to various article, decoding software corresponding to each article can be installed then.
And if by the unified distribution in the false proof center of third party decoding device, a decoding software of finding at the false proof center of third party then only is installed on the subscriber terminal equipment is got final product.This is because the false proof center of third party can generate for the different producers different private keys, but these private keys can corresponding same PKI.That is to say that PKI can corresponding a plurality of private keys, although each producer uses different separately private keys to be encrypted, in decoding software, can adopt identical PKI to be decrypted.Particularly, how to realize the corresponding a plurality of private keys of PKI, and how to improve cryptographic algorithm crack difficulty etc., can know according to cryptographic knowledge owing to do not relate to emphasis of the present invention, therefore repeat no more here.
S107: demonstrate the image of described uniqueness label at described terminal device, so that the user determines the described true and false for the treatment of false proof article by comparing the described image that demonstrates on the uniqueness label on the false proof article and the terminal device treated.
After the display screen of terminal device demonstrates the image that deciphering obtains, the user just can be by comparing the described image that demonstrates on the uniqueness label on the false proof article and the terminal device treated, determine the described true and false for the treatment of false proof article, for example, if both are consistent, can prove that then article are genuine, otherwise these article may be forged.
In a word, in embodiments of the present invention, when checking article genuine-fake, although need to use the terminal devices such as mobile phone, but only need this terminal device to have the image capture function, and test a yard device in this terminal device installation, the process of checking is finished in terminal device this locality, need not by utilizing communication function inquiry item information data storehouse just can distinguish article genuine-fake, the consumption that therefore can not produce the communication resource.The method of the embodiment of the invention need not to set up and safeguard the item information data storehouse simultaneously, has reduced the cost of inquiry article genuine-fake.And, this testing in the terminal device that yard software is installed in users, be equivalent to adopt extensive STOCHASTIC DIFFUSION technology in distribution during PKI, this can prevent from testing the collusion attack in yard process, can prevent that also whole anti-counterfeiting technology from testing the Single Point of Faliure of yard process.
Corresponding with the article anti-counterfeit method that the embodiment of the invention provides, the embodiment of the invention also provides a kind of article anti-counterfeit system, wherein, treat to be provided with on the false proof article uniqueness label, described uniqueness label comprises master pattern and covers thin slice two parts on the master pattern that described thin slice is made by the transparent material of randomly changing printing opacity and reflective characteristic; Referring to Fig. 2, described system comprises:
The first reading unit 201 is used for reading the image information that described uniqueness label demonstrates, and the image information that reads is preserved into e-file;
Ciphering unit 202 is used for utilizing private key that described e-file is encrypted the generation signature file;
Coding unit 203 is for generating anti-counterfeiting code that described signature file is encoded, in order to described security code is arranged on described treating on the false proof article;
The second reading unit 204 is used for obtaining the described security code information on the false proof article for the treatment of by the image-pickup device on the subscriber terminal equipment;
Decoding unit 205 is used for described security code is decoded, and obtains described signature file;
Decryption unit 206 is used for according to PKI corresponding to described private key described signature file being decrypted, and obtains the image information of described uniqueness label;
Display unit 207 is used for demonstrating at described terminal device the image of described uniqueness label, so that the user determines the described true and false for the treatment of false proof article by comparing the described image that demonstrates on the uniqueness label on the false proof article and the terminal device treated.
Wherein, in order further to improve verification the verifying results, can also comprise descriptor and the commodity distributor information of commodity in the e-file.Accordingly, in when checking, be presented at image in the terminal device except the uniqueness label image, can also comprise descriptor and the commodity distributor information of commodity.
Wherein, ciphering unit 202 specifically can use private key through the false proof central authority of third party that e-file is encrypted and obtain signature file.
In order to prevent that the adulterator from using the used packing of product to fake, can also otch be set at the uniqueness label, and, described uniqueness label treats that described position on the false proof article can treat that false proof article are used or pack the position that needs are opened when being opened and determine according to described, attempted to take off or describedly treated that false proof article are used or pack when being opened, the destroy integrity of described uniqueness label with the described uniqueness label of box lunch.
During specific implementation, can be glass for the transparent material of making described thin slice, perhaps, organic transparent material, perhaps, the potpourri of glass and organic transparent material.Mode that can be by knocking, corrode or mix impurity is so that described transparent material has randomly changing printing opacity and reflective characteristic.
The concrete form of security code can have multiple, and a kind of preferred mode is two-dimension code.
The uniqueness label that provides by the embodiment of the invention combines with the items Antiforge system, can realize effective antifalse effect.When checking article genuine-fake, although need to use the terminal devices such as mobile phone, but only need this terminal device to have the image capture function, and install at this terminal device and to test a yard device, the process of checking is finished in terminal device this locality, need not by utilizing communication function inquiry item information data storehouse just can distinguish article genuine-fake, the consumption that therefore can not produce the communication resource.The method of the embodiment of the invention need not to set up and safeguard the item information data storehouse simultaneously, has reduced the cost of inquiry article genuine-fake.And this testing in the terminal device that yard software is installed in users has been equivalent to adopt the PKI diffusion technique of a large amount of public publications, and this can prevent from testing the collusion attack in yard process, can prevent that also whole anti-counterfeiting technology from testing the Single Point of Faliure of yard process.
Each embodiment adopts the mode of going forward one by one to describe in this instructions, and what each embodiment stressed is and the difference of other embodiment that identical similar part is mutually referring to getting final product between each embodiment.For the disclosed device of embodiment, because it is corresponding with the disclosed method of embodiment, so description is fairly simple, relevant part partly illustrates referring to method and gets final product.
To the above-mentioned explanation of the disclosed embodiments, make this area professional and technical personnel can realize or use the present invention.Multiple modification to these embodiment will be apparent concerning those skilled in the art, and General Principle as defined herein can in the situation that does not break away from the spirit or scope of the present invention, realize in other embodiments.Therefore, the present invention will can not be restricted to these embodiment shown in this article, but will meet the widest scope consistent with principle disclosed herein and features of novelty.

Claims (10)

1. article anti-counterfeit method, it is characterized in that, treat to be provided with on the false proof article uniqueness label, described uniqueness label comprises master pattern and covers thin slice two parts on the master pattern that described thin slice is made by the transparent material of randomly changing printing opacity and reflective characteristic; Described method comprises:
Read the image information that described uniqueness label demonstrates, and the image information that reads is preserved into e-file;
Utilize private key that described e-file is encrypted the generation signature file;
To the described signature file generating anti-counterfeiting code of encoding, in order to described security code is arranged on described treating on the false proof article;
When needs checkings is described when treating the true and false of false proof article, finish following operation by yard device of testing that is installed in advance on the subscriber terminal equipment:
Obtain the described security code information on the false proof article for the treatment of by the image-pickup device on the described subscriber terminal equipment;
Described security code is decoded, obtain described signature file;
The PKI corresponding according to described private key is decrypted described signature file, obtains the image information of described uniqueness label;
Demonstrate the image of described uniqueness label at described terminal device, so that the user determines the described true and false for the treatment of false proof article by comparing the described image that demonstrates on the uniqueness label on the false proof article and the terminal device treated.
2. method according to claim 1 is characterized in that, also comprises descriptor and the commodity distributor information of commodity in the described e-file.
3. method according to claim 1 is characterized in that, describedly utilizes private key that described e-file is encrypted to generate signature file and comprise:
Utilization is encrypted the generation signature file through the private key of the false proof central authority of third party to described e-file.
4. method according to claim 1, it is characterized in that, be provided with otch on the described uniqueness label, and, described uniqueness label treats that described position on the false proof article can treat that false proof article are used or pack the position that needs are opened when being opened and determine according to described, attempted to take off or describedly treated that false proof article are used or pack when being opened, the destroy integrity of described uniqueness label with the described uniqueness label of box lunch.
5. according to claim 1 to 4 each described methods, it is characterized in that described security code comprises two-dimension code.
6. article anti-counterfeit system, it is characterized in that, treat to be provided with on the false proof article uniqueness label, described uniqueness label comprises master pattern and covers thin slice two parts on the master pattern that described thin slice is made by the transparent material of randomly changing printing opacity and reflective characteristic; Described system comprises:
The first reading unit is used for reading the image information that described uniqueness label demonstrates, and the image information that reads is preserved into e-file;
Ciphering unit is used for utilizing private key that described e-file is encrypted the generation signature file;
Coding unit is for generating anti-counterfeiting code that described signature file is encoded, in order to described security code is arranged on described treating on the false proof article;
Described system also comprises: be installed in advance yard device of testing on the subscriber terminal equipment, be used for verifying the described true and false for the treatment of false proof article; Specifically comprise:
The second reading unit is used for obtaining the described security code information on the false proof article for the treatment of by the image-pickup device on the subscriber terminal equipment;
Decoding unit is used for described security code is decoded, and obtains described signature file;
Decryption unit is used for according to PKI corresponding to described private key described signature file being decrypted, and obtains the image information of described uniqueness label;
Display unit is used for demonstrating at described terminal device the image of described uniqueness label, so that the user determines the described true and false for the treatment of false proof article by comparing the described image that demonstrates on the uniqueness label on the false proof article and the terminal device treated.
7. system according to claim 6 is characterized in that, also comprises descriptor and the commodity distributor information of commodity in the described e-file.
8. system according to claim 6 is characterized in that, described ciphering unit specifically is used for:
Utilization is encrypted the generation signature file through the private key of the false proof central authority of third party to described e-file.
9. system according to claim 6, it is characterized in that, be provided with otch on the described uniqueness label, and, described uniqueness label treats that described position on the false proof article can treat that false proof article are used or pack the position that needs are opened when being opened and determine according to described, attempted to take off or describedly treated that false proof article are used or pack when being opened, the destroy integrity of described uniqueness label with the described uniqueness label of box lunch.
10. system according to claim 6 is characterized in that, comprises glass for the transparent material of making described thin slice, perhaps, and organic transparent material, perhaps, the potpourri of glass and organic transparent material; Mode by knocking, corrode or mix impurity is so that described transparent material has randomly changing printing opacity and reflective characteristic.
CN 201110119710 2011-05-10 2011-05-10 Object anti-counterfeiting method and system Expired - Fee Related CN102201100B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110119710 CN102201100B (en) 2011-05-10 2011-05-10 Object anti-counterfeiting method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110119710 CN102201100B (en) 2011-05-10 2011-05-10 Object anti-counterfeiting method and system

Publications (2)

Publication Number Publication Date
CN102201100A CN102201100A (en) 2011-09-28
CN102201100B true CN102201100B (en) 2013-04-24

Family

ID=44661754

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110119710 Expired - Fee Related CN102201100B (en) 2011-05-10 2011-05-10 Object anti-counterfeiting method and system

Country Status (1)

Country Link
CN (1) CN102201100B (en)

Families Citing this family (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102509066A (en) * 2011-11-18 2012-06-20 祝启忠 Two-dimensional code anti-counterfeiting method and identification device both based on goods feature information
TW201351295A (en) * 2012-06-11 2013-12-16 Chang-Ren Chen Chip tag anti-counterfeiting method and system with positioning function
CN102945389A (en) * 2012-10-22 2013-02-27 北京印刷学院 Double-variant two-dimensional gradually-increased encryption binary anti-counterfeiting printing method
CN102945390A (en) * 2012-10-22 2013-02-27 北京印刷学院 Double-variant third-order encryption binary anti-counterfeiting printing method
CN102945417A (en) * 2012-10-22 2013-02-27 北京印刷学院 Multi-parameter bivariate opposite synchronous progressive encrypted binary anti-counterfeiting printing method
CN102945398A (en) * 2012-10-22 2013-02-27 北京印刷学院 Double-variant third-order progressive encryption binary anti-counterfeiting printing method
CN102945432A (en) * 2012-10-22 2013-02-27 北京印刷学院 Single-variable and progressive encryption type binary anti-counterfeit printing method
CN102945406A (en) * 2012-10-22 2013-02-27 北京印刷学院 Multi-parameter transposition variable-sequence encrypted binary anti-counterfeiting printing method
CN102945392A (en) * 2012-10-22 2013-02-27 北京印刷学院 Single-parameter, gradient, opposite, synchronous and progressive encryption type binary anti-counterfeit printing method
CN102945404A (en) * 2012-10-22 2013-02-27 北京印刷学院 Multi-parameter reverse synchronous incremental encrypted binary anti-counterfeiting printing method
CN102945397A (en) * 2012-10-22 2013-02-27 北京印刷学院 Variable-sequence, right-shifting, stepping and increasing encryption type binary anti-counterfeit printing method
CN102945471A (en) * 2012-10-22 2013-02-27 北京印刷学院 Binary anti-fake print method encrypting in opposite synchronous increasing way
CN102945422A (en) * 2012-10-22 2013-02-27 北京印刷学院 Shift left displacement stepping increasing encryption binary anti-counterfeit printing method
EE01291U1 (en) * 2013-11-29 2015-04-15 Dmitri Marinkin Method of protecting authenticity of a product from imitation and forgery
CN103793830A (en) * 2014-02-24 2014-05-14 朱清明 Goods identifying and authenticating method and corresponding device thereof
CN103824198B (en) * 2014-03-10 2017-07-11 上海理工大学 Security code generates checking system
CN105989504A (en) * 2015-02-02 2016-10-05 沈永培 Shaping camera using different state codes
CN104616313A (en) * 2015-02-16 2015-05-13 可信视科技(深圳)有限公司 Handheld device image shooting and verification method based on cloud service
CN105512900A (en) * 2015-12-17 2016-04-20 厦门纳纬信息技术有限公司 Product anti-counterfeiting authenticating and product quality tracking method
CN106296229A (en) * 2016-08-17 2017-01-04 柴永 The false proof assembly of kaleidoscope
CN109117909B (en) * 2017-06-22 2024-03-01 杭州沃朴物联科技有限公司 Three-dimensional anti-counterfeit label based on trace random bubbles
CN107833058A (en) * 2017-10-27 2018-03-23 葛徽 A kind of novel article anti-counterfeiting authentication method
CN107705139A (en) * 2017-11-03 2018-02-16 葛徽 A kind of novel article anti-counterfeiting authentication method
CN108646993B (en) * 2018-05-17 2021-08-31 张安东 Output file uniqueness guaranteeing method based on biological attribute and fluorescent printing technology
CN108846681A (en) * 2018-05-30 2018-11-20 于东升 For the method for anti-counterfeit and device of woodwork, anti-fake traceability system
CN109146370B (en) * 2018-08-07 2021-08-10 景德镇陶瓷大学 Method for confirming conveyed article by positioning shooting
CN109615030A (en) * 2018-10-12 2019-04-12 阿里巴巴集团控股有限公司 Dimension code anti-counterfeit method, equipment and system based on security application
CN110827041A (en) * 2019-11-04 2020-02-21 广州布珞科技有限公司 Anti-counterfeiting tracing method, system, medium and equipment
CN112785308A (en) * 2021-02-02 2021-05-11 中钞印制技术研究院有限公司 Anti-counterfeiting method, anti-counterfeiting system and securities
CN117952138A (en) * 2023-05-05 2024-04-30 杭州蚂蚁酷爱科技有限公司 Anti-fake code generation and verification method and label-based anti-fake system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070244764A1 (en) * 2006-04-17 2007-10-18 Pryor Sandra K Method and apparatus for customizing items
CN101777134B (en) * 2010-03-01 2012-05-23 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102004986A (en) * 2010-10-26 2011-04-06 梁庆生 Product anti-counterfeiting method based on digital signature and public key system and verifying method

Also Published As

Publication number Publication date
CN102201100A (en) 2011-09-28

Similar Documents

Publication Publication Date Title
CN102201100B (en) Object anti-counterfeiting method and system
US20210006399A1 (en) Multi-address population based on single address
CN100530253C (en) System and method of authenticating an article
US7080041B2 (en) System and method for production and authentication of original documents
Huang et al. Optical watermarking for printed document authentication
CN104166871B (en) Anti-counterfeit label and anti-counterfeit method based on combination of two-dimension codes and RFID chips
TW200907864A (en) Authenticity validation subject, authenticity validation chip reader, and authenticity judging method
CN102147884A (en) Anti-counterfeiting and authenticity-verifying method and system for article
JP2006510051A (en) Authentication system with visual encryption using polarization of light
WO2014154109A1 (en) Generating method, verifying method for electronic bill with anti-fake two dimension (2d) code and system for same
CA2374196A1 (en) Legitimacy protection of electronic document and a printed copy thereof
CN1421814A (en) Digital anti-fake method
CN101398915A (en) Electronic stamp platform system based on internet
JP2007535682A (en) Identifying and authenticating identifiers attached to objects or organisms without using a specific reader
CN101789067A (en) Electronic document signature protecting method and system
WO2007072793A1 (en) Card capable of authentication
CN101398870A (en) Electronic stamp system based on password layered system
CN107508685A (en) The implementation method of applying electronic Digital signature service system in a kind of cloud computing environment
US20230121749A1 (en) Customizable cryptocurrency card
CN106779002A (en) Complex encryption authentication method based on Quick Response Code and radio frequency compound marking
CN105912894A (en) Method for applying certificate number to electronic seal stamp anti-counterfeiting
Zhao et al. Card user authentication based on generalized image morphing
Joshi Session passwords using grids and colors for web applications and PDA
CN1841410A (en) Anti-counterfeit method for digital certificate and digital anti-counterfeit certificate system
CN108256612B (en) Two-dimensional code anti-counterfeiting technology based on magic cube matrix

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130424

Termination date: 20180510