A kind of electronic tag method for anti-counterfeit and system
Technical field
The invention belongs to REID field, relate in particular to a kind of electronic tag method for anti-counterfeit and system.
Background technology
RF identification (RadioFrequencyIdentification, RFID) technology, claim again electronic tag,Radio frequency identification, it is a kind of communication technology, can be identified specific objective and be read and write phase by radio signalsClose data, and without setting up machinery between recognition system and specific objective or optics contacts. Identifying need notManual intervention, is applicable to various environment, can be used in control, detection and tracking specific objective etc.
Radio-frequency recognition system mainly comprises reader (Reader), electronic tag (TAG) and application softwareThree parts of system, its operation principle be reader launch a CF radio wave energy to electronics markSign, in order to drive electronic tag circuit that inner data are sent, reader receives data and processes.
At present, what the leading firm of radio-frequency recognition system provided is all special system, and needs special readdingRead device, therefore different application and different industries adopt frequency, consensus standard and the reading of different vendorDevice, thus cause radio-frequency recognition system incompatible. This incompatible and dedicated reader has restricted whole penetratingFrequently identify the particularly false proof effective utilization of radio frequency of industry.
Summary of the invention
The object of the embodiment of the present invention is to provide a kind of electronic tag method for anti-counterfeit and system, existing to solveThe problem of the false proof effective utilization of the incompatible restriction radio frequency of radio-frequency recognition system.
The embodiment of the present invention is achieved in that a kind of electronic tag method for anti-counterfeit, and described method comprises:
Information in close range wireless communication NFC equipment reading electronic labels, described information comprises security parameterAnd the chained address of certificate server;
NFC equipment is accessed corresponding certificate server according to described chained address, and described security parameter is sent outGive described certificate server certification;
Certificate server, receiving after described security parameter, is verified described security parameter, according to testingCard result is made corresponding prompting.
Another object of the embodiment of the present invention is to provide a kind of electronic tag Antiforge system, and described system comprises:
Electronic tag, close range wireless communication NFC equipment and certificate server;
Described NFC equipment, for reading the information in described electronic tag, described information comprises security parameterAnd the chained address of certificate server, access corresponding certificate server according to described chained address, and willDescribed security parameter sends to described certificate server certification;
Described certificate server, for receiving described security parameter, and enters the described security parameter receivingRow checking, makes corresponding prompting according to the result.
A kind of close range wireless communication equipment, described close range wireless communication equipment comprises:
Information reading unit, for the information in reading electronic labels, described information comprise security parameter andThe chained address of certificate server;
First information transmitting element is corresponding for the chained address access of reading according to described information reading unitCertificate server, and the described security parameter reading is sent to the certification of described certificate server, to makeDescribed certificate server, after the described security parameter receiving, verifies described security parameter, according toThe result is made corresponding prompting.
A kind of certificate server, described certificate server comprises:
Information receiving unit, the security parameter sending for receiving close range wireless communication NFC equipment, described inSecurity parameter is described NFC equipment from the information reading in electronic tag;
Authentication unit, verifies for the described security parameter that described information receiving unit is received, andMake corresponding prompting according to the result.
The beneficial effect that the embodiment of the present invention compared with prior art exists is: pre-stored product in electronic tagThe security parameter of product certification and the chained address of certificate server, read described electronics mark by NFC equipmentSecurity parameter in label and chained address, and access corresponding certificate server according to described chained address,Described security parameter is sent to described certificate server certification, and certificate server is made phase according to authentication resultThe prompting of answering, whether whether authentication authorization and accounting product be certified products or used etc. The embodiment of the present invention is recognized at productIn card process, do not need special authentication means, the terminal arbitrarily with wireless telecommunications and function of surfing the Net is establishedFor serving as authentication means, thereby it is anti-effectively to solve the incompatible restriction radio frequency of existing radio-frequency recognition systemThe pseudo-problem of effectively using. And the verification process of the embodiment of the present invention simply, easily and fast, product existsBefore not losing efficacy, can repeatedly authenticate, there is stronger practicality.
Brief description of the drawings
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below will be to embodiment or existing skillIn art description, the accompanying drawing of required use is briefly described, and apparently, the accompanying drawing in the following describes onlyBe only some embodiments of the present invention, for those of ordinary skill in the art, do not paying creative laborUnder the prerequisite of moving property, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the scene schematic diagram of the electronic tag Antiforge system that provides of the embodiment of the present invention one;
Fig. 2 is the interaction diagrams of the electronic tag method for anti-counterfeit that provides of the embodiment of the present invention two;
Fig. 3 is the Product Validation exemplary plot that the embodiment of the present invention two provides;
Fig. 4 is the composition structure chart of the NFC equipment that provides of the embodiment of the present invention three;
Fig. 5 is the composition structure chart of the certificate server that provides of the embodiment of the present invention four.
Detailed description of the invention
In order to make object of the present invention, technical scheme and advantage clearer, below in conjunction with accompanying drawing and realityExecute example, the present invention is further elaborated. Only should be appreciated that specific embodiment described hereinOnly, in order to explain the present invention, be not intended to limit the present invention.
For technical solutions according to the invention are described, describe below by specific embodiment.
Embodiment mono-:
Fig. 1 shows the scene of the electronic tag Antiforge system that the embodiment of the present invention one provides, the invention processThe described electronic tag method for anti-counterfeit of example can be applicable in described electronic tag Antiforge system, for convenience of explanation,Only show the part relevant to the embodiment of the present invention.
As shown in Figure 1, this system comprises close range wireless communication (NearFieldCommunication, NFC)Equipment 1, certificate server 2 and electronic tag 3.
Wherein, described NFC equipment 1 can be the terminal device arbitrarily with wireless telecommunications and function of surfing the Net,Include but not limited to mobile phone.
Described certificate server 2 can be single server, can be also common by several function serversThe server end of composition. Described certificate server 2 has data-handling capacity, in described certificate server 2Store the data such as unique identifier (ID), decruption key and the relevant identity of various product, for the external worldAccess, checking product whether certified products, whether used etc.
Electronic tag 3(is generally placed in the packing of product) in store the data such as product IDs, described electronics markSign 3 and be also built-in with random code generator and sequence number generator. Described random code generator and sequence number generatorEffect be to make NFC equipment 1 at every turn in the time of reading electronic labels 3, all can produce a new random codeAnd sequence number, avoid occurring on same product IDs identical random code and sequence number. Random code and sequence number make oftenThe enciphered data that inferior electronic tag 3 returns is not identical, thereby improves the difficulty cracking.
In the present embodiment, the information in NFC equipment 1 reading electronic labels 3, described information comprises safetyThe chained address of parameter and certificate server;
NFC equipment 1 is accessed corresponding certificate server 2 according to described chained address, and by described safety ginsengNumber sends to described certificate server 2 to authenticate;
Certificate server 2, receiving after described security parameter, verifies described security parameter, according toThe result is made corresponding prompting.
Further, described security parameter comprises product IDs (expressly) and ciphertext parameter, described ciphertextParameter be electronic tag 3 utilize random code that preset-key produces random code generator and sequence number generator andThe parameter obtaining after sequence number is encrypted;
Described certificate server 2 specifically for, receiving after described security parameter, judge described safety ginsengWhether the product IDs in number is effective, if effectively, obtains the decruption key of this product, and dense by described solutionKey is decrypted described ciphertext parameter, obtains decrypted result, and described decrypted result is verified to rootMake corresponding prompting according to the result.
Wherein, described decrypted result comprises random code and sequence number;
Further, described certificate server 2 is obtaining after described decrypted result, further described in judgementWhether the random code in decrypted result is effective, if effectively, judge that whether described sequence number is than described certificate serverIn the sequence number of having stored large and/or with described certificate server in the sequence number of having stored meet default rule; IfBe, pointing out described product is certified products, and stores current described sequence number, comparison while certification for next time.
Further, described security parameter can also comprise the first verification random code (expressly), describedOne verification random code is a regular part in described random code, for example odd bits, or even bit, orIts last four etc.;
Described certificate server 2 in the time judging described random code, specifically judge described the first verification random code withWhether the second verification random code is identical, if identical, then judge that whether described sequence number is than in described certificate serverThe sequence number of having stored large and/or with described certificate server in the sequence number of having stored meet default rule; IfBe, pointing out described product is certified products, and stores current described sequence number, comparison while certification for next time. ItsDescribed in the second verification random code be the random code of extracting according to default rule from described random code.
It should be noted that, described sequence number can be natural number or other character, and after every certification once, sequence number is passedIncrease or regular variation, this variation can be detected by certificate server 2 the priority rule of sequence number, for examplePress odd number progressive law 3,5,7 ...
The effect of sequence number is to prevent that the verify data that is submitted to certificate server 2 from repeating and judging when time identificationThe order of data. For example, product placement, on sales counter, has people to think that shop-assistant authenticated this then and there before buyingWhether certified products of product, shop-assistant can, without the certification of number of times restriction, obtain random code at every turn while certification soDifference, and sequence number all can change by preset algorithm, thereby can repeat certification and do not affect certification next time.
As a preferred embodiment of the present invention, because the certified products certification of product can not ensure that product is not madeWith, the present embodiment has also increased the inefficacy certification to product, is specially:
NFC equipment 1 receives the inefficacy code of user's input, and described inefficacy code is sent to described authentication serviceDevice 2;
Certificate server 2 is receiving after described inefficacy code, is to lose by product labelling corresponding to the described code that lost efficacyEffect, this product is used, and is failure state, afterwards this product IDs of any submission and with this productThe random code that ID is corresponding, the certification of sequence number all point out this product to lose efficacy, and are used;
Wherein, described inefficacy code is associated with product IDs, and described inefficacy code bit is not used front user to see in productThe position loseing only (it should be noted that, at production in visibility status after product is usedDescribed in tense marker, lost efficacy the visibility status in when code not within this scope), when this position class is seemingly had a drink " againCome one bottle " position, when product does not use, cannot see this lost efficacy code.
It should be noted that, the system scene that the present embodiment provides, only for explaining the present invention, does not limit thisThe protection domain of invention.
Embodiment bis-:
Fig. 2 shows the interaction flow of the electronic tag method for anti-counterfeit that the second embodiment provides, the method processDetails are as follows:
In step S201, the information in close range wireless communication NFC equipment reading electronic labels.
In the present embodiment, described information includes but not limited to the chain ground connection of security parameter and certificate serverLocation. Described security parameter includes but not limited to product IDs (expressly) and ciphertext parameter, described ciphertext parameterFor electronic tag utilizes preset-key by the random code (expressly) of random code generator and sequence number generator generationAnd the parameter that obtains after being encrypted of sequence number (expressly).
In step S202, NFC equipment is accessed corresponding certificate server according to described chained address, andDescribed security parameter is sent to described certificate server certification.
In the present embodiment, described certificate server can be the clothes under enterprise or Third Party Authentication mechanismBusiness device. In described certificate server, store the unique identifier (ID), decruption key of various product, withWhether whether the data such as machine code, sequence number, be certified products and/or used etc. for external certificate product.
In step S203, certificate server, receiving after described security parameter, enters described security parameterRow checking, makes corresponding prompting according to the result.
Wherein, described described security parameter is verified, made corresponding prompting according to the result concreteComprise:
Judge that whether described product IDs is effective;
If effectively, obtain the decruption key of this product, and by described decruption key, described ciphertext parameter enteredRow deciphering, obtains decrypted result, and described decrypted result is verified, makes corresponding according to the resultPrompting; If invalid, in authentication authorization and accounting server, do not store this product IDs, checking finishes, prompting productNon-certified products.
Wherein, described decrypted result includes but not limited to random code and sequence number;
Further, described described decrypted result is verified, made corresponding prompting according to the resultSpecifically comprise:
Judge that whether described random code is effective;
If effectively, judge described sequence number whether larger than the sequence number of having stored in described certificate server and/or with instituteState the sequence number of having stored in certificate server and meet default rule; If invalid, checking finishes, and prompting is producedThe non-certified products of product;
If so, pointing out described product is certified products, and stores current described sequence number, ratio while certification for next time; If not, checking finishes, the non-certified products of prompting product.
In the present embodiment, in certificate server the pre-stored sequence number that has legal certification and described inThe judgment principle whether sequence number is legal, the rule meeting. Certificate server by deciphering after current sequence number withThe sequence number of the legal certification of authentication server stores compares, if current sequence number is than describedThe sequence number of legal certification is large and/or meet default rule, thinks that this certification is legal, by current sequence number (The sequence number of this certification) be stored in certificate server; Otherwise, think that this certification is illegal, checking knotBundle, the non-certified products of prompting product.
For example, sequence number rule is defaulted as by odd number incremental variations, and the sequence number of last legal checking is 1, thatFor the second time and later multiple authentication, the sequence number after deciphering is 3,5,7,9 successively ... time just regard as certified products,If the sequence number after the deciphering of submitting to while once checking is 2,4,8, obviously sequence number has problem, and justIn the situation of product, the sequence number that each certification is submitted to and any once authenticated order of submitting to for certified products aboveNumber all not identical, and be greater than previous sequence number, last sequence number is 1, after deciphering next time, sequence number is largeIn or equal at 3 o'clock just for certified products.
Further, described security parameter also comprises the first verification random code (expressly), described the first schoolTesting random code is a regular part in described random code, for example odd bits, or even bit, or it isLatter four etc.
Described certificate server, in the time judging described random code, specifically judges described the first verification random code andWhether two verification random codes are identical, if not identical, checking finishes, the non-certified products of prompting product; If it is identical,Judge again whether described sequence number takes greatly and/or with described certification than the sequence number of having stored in described certificate serverThe sequence number of having stored in business device meets default rule; If so, pointing out described product is certified products, and storageCurrent described sequence number, comparison while certification for next time. Wherein said the second verification random code is from described randomThe random code of extracting according to default rule in code.
Illustrate, as shown in Figure 3, in electronic tag, comprise product IDs: 123456 and produce orderNumber: 1357, random code: ABCDEF01, default key, by default key to described sequence number:1357 and random code: ABCDEF01 be encrypted and obtain ciphertext parameter A bcdefghjklm, and the first schoolTest random code EF01, in the present embodiment, the rule of obtaining of the first school, two verification random codes is to get random codeLatter four. When the information of NFC equipment in reading electronic labels, obtain security parameter, described security parameterFor 123456AbcdefghjklmEFO1(comprises product IDs: 123456, ciphertext parameter: AbcdefghjklmAnd first verification random code: the EF01), described security parameter is sent to certificate server by NFC, certificationServer first verifies that whether described product IDs is effective, whether has the described product IDs of storage in authentication authorization and accounting server:123456, if effectively, described ciphertext parameter is decrypted, obtain sequence number: 1357 and random code:ABCDEF01。
Preferably, in the time being certified products by such scheme certified product, can not ensure that this product is not madeWith, because the words that the product after using authenticates are again also certified products, for fear of this kind of situation, the present embodimentAlso increase the inefficacy certification to product, be specially:
NFC equipment receives the inefficacy code of user's input, and described inefficacy code is sent to described certificate server;
Certificate server is receiving after described inefficacy code, is to lose efficacy by product labelling corresponding to the described code that lost efficacy,This product is used, and is failure state, afterwards this product IDs of any submission and with this product IDs pairThe random code of answering, the certification of sequence number all point out this product to lose efficacy, and are used.
Wherein, described inefficacy code is associated with product IDs, and described inefficacy code bit is not used front user to see in productThe position loseing, only after product is used in visibility status, when this position class is seemingly had a drink, " come againOne bottle " position, when product does not use, cannot see this lost efficacy code.
In the present embodiment, the mode that certificate server receives the code that lost efficacy can have various ways, for example, pass throughNote receives or in the time of NFC device access certification page, this page has the code of inefficacy dialog box, and code will lose efficacyBeing passed to this dialog box submits to.
Further, for encourage consumer uses product failure certification, can initiatively use product consumerLost efficacy and (send and lost efficacy after code) after certification, certificate server sends the preferential Securities of electronics to checking NFC equipmentOr the awards such as integration.
Embodiment tri-:
Fig. 4 shows the composition structure of the NFC equipment that third embodiment of the invention provides, this NFC equipmentBe applied in electronic tag Antiforge system as shown in Figure 1, for convenience of explanation, only show and the present inventionThe part that embodiment is relevant.
This NFC equipment 1 comprises information reading unit 11 and first information transmitting element 12. Wherein, eachThe concrete function of unit is as follows:
Information reading unit 11, for the information in reading electronic labels, described information comprise security parameter withAnd the chained address of certificate server;
First information transmitting element 12, visits for the chained address of reading according to described information reading unit 11Ask corresponding certificate server, and the described security parameter reading sent to described certificate server certification,To make described certificate server after the described security parameter receiving, described security parameter is verified,Make corresponding prompting according to the result.
Further, it is characterized in that, described NFC equipment 1 also comprises:
Information receiving unit 13, for receiving the inefficacy code of input;
The second information transmitting unit 14, for the described inefficacy code that described information receiving unit 13 is receivedBe sent to described certificate server, so that described certificate server is being received after described inefficacy code, by instituteStating the product labelling that the code that lost efficacy is corresponding is inefficacy;
Wherein, described inefficacy code is associated with product IDs, and described inefficacy code bit is not used front user to see in productThe position loseing, only after product is used in visibility status.
Embodiment tetra-:
Fig. 5 shows the composition structure of the certificate server that fourth embodiment of the invention provides, this authentication serviceDevice is applied in electronic tag Antiforge system as shown in Figure 1, for convenience of explanation, only shows and thisThe part that bright embodiment is relevant.
This certificate server 2 comprises information receiving unit 21 and authentication unit 22. Wherein, each unitConcrete function is as follows:
Information receiving unit 21, the security parameter sending for receiving close range wireless communication NFC equipment,Described security parameter is described NFC equipment from the information reading in electronic tag;
Authentication unit 22, tests for the described security parameter that described information receiving unit 21 is receivedCard, and make corresponding prompting according to the result.
Further, it is characterized in that, described security parameter comprises product unique identifier ID and ciphertext ginsengNumber;
Described authentication unit 22 comprises:
Judge module 221, whether effective for judging described product IDs;
Authentication module 222, in described judge module 221 judged results when being, obtain this productDecruption key, and by described decruption key, described ciphertext parameter is decrypted, obtain decrypted result, andDescribed decrypted result is verified, made corresponding prompting according to the result.
Further, described decrypted result comprises random code and sequence number;
Described authentication module 222 also comprises:
First judges submodule 2221, for judging that whether described random code is effective;
Second judges submodule 2222, for judging that described first submodule 2221 judged results are when being,Judge described sequence number whether larger than the sequence number of having stored in described certificate server or with described certificate serverIn the sequence number of having stored meet default rule;
Checking submodule 2223, for judging that described second submodule 2222 judged results when being, carryShow that described product is certified products, and store current described sequence number, comparison while certification for next time.
Further, described security parameter also comprises the first verification random code;
Described second judges submodule 2222, specifically for judging that described first submodule judged result is yesTime, judge that whether described the first verification random code is identical with the second verification random code, wherein said the second verificationRandom code is the random code of extracting according to default rule from described random code.
Further, described certificate server 2 also comprises:
Inefficacy authentication module 23, the inefficacy code sending for receiving described NFC equipment, and by described inefficacyThe product labelling that code is corresponding is inefficacy;
Wherein, described inefficacy code is associated with product IDs, and described inefficacy code bit is not used front user to see in productThe position loseing, only after product is used in visibility status.
Those skilled in the art can be well understood to, for convenience and simplicity of description, and only with above-mentionedThe division of each functional unit, module is illustrated, in practical application, and can be as required and by above-mentionedFunction distribution is completed by different functional units or module, is divided into different merits by the internal structure of deviceEnergy unit or module, to complete all or part of function described above. Each functional unit in embodiment,Module can be integrated in a processing unit, can be also that the independent physics of unit exists, also can twoIndividual or more than two unit is integrated in a unit, and above-mentioned integrated unit both can adopt the form of hardwareRealize, also can adopt the form of SFU software functional unit to realize. In addition, each functional unit, module is concreteTitle also, just for the ease of mutual differentiation, is not limited to the application's protection domain. In said apparatusThe specific works process of unit, module, can be with reference to the corresponding process in preceding method embodiment, at this notRepeat again.
In sum, the embodiment of the present invention can be passed through the various ways such as product IDs, random code and sequence numberWhether checking product is certified products, has improved greatly the accuracy of product certification. But also can pass through productWhether the mode certified product authenticating that lost efficacy is used, to solve the certified products verification process of prior art at productIn cannot ensure the problem that product is not used. In addition, the embodiment of the present invention is in Product Certification, noNeed special authentication means, the terminal device arbitrarily with wireless telecommunications and function of surfing the Net can be served asAuthentication means, thus the incompatible restriction radio frequency of existing radio-frequency recognition system false proof effective utilization can effectively be solvedProblem. The verification process of the embodiment of the present invention simply, easily and fast, accuracy rate is high, and product is notBefore inefficacy, can repeatedly authenticate, there is stronger practicality.
Those of ordinary skill in the art are further appreciated that all or part of step realizing in above-described embodiment methodSuddenly be can carry out the hardware that instruction is relevant by program to complete, described program can be stored in a calculatingIn machine read/write memory medium, described storage medium, comprises ROM/RAM, disk, CD etc.
Above content is in conjunction with concrete preferred embodiment further description made for the present invention, noCan assert that specific embodiment of the invention is confined to these explanations. Common for the technical field of the inventionTechnical staff, makes some alternative or obvious modification that are equal to without departing from the inventive concept of the premise,And performance or purposes identical, all should be considered as belonging to the present invention determines by submitted to claims speciallyProfit protection domain.