CN103065168B - A kind of electronic tag method for anti-counterfeit and system - Google Patents

A kind of electronic tag method for anti-counterfeit and system Download PDF

Info

Publication number
CN103065168B
CN103065168B CN201210553617.7A CN201210553617A CN103065168B CN 103065168 B CN103065168 B CN 103065168B CN 201210553617 A CN201210553617 A CN 201210553617A CN 103065168 B CN103065168 B CN 103065168B
Authority
CN
China
Prior art keywords
sequence number
certificate server
code
parameter
product
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210553617.7A
Other languages
Chinese (zh)
Other versions
CN103065168A (en
Inventor
王涛
钟衍徽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Netcom Commercial Equipment Co., Ltd.
Shenzhen Netcom Electronics Co Ltd
Original Assignee
SHENZHEN NETCOM COMMERCIAL EQUIPMENT CO Ltd
Shenzhen Netcom Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN NETCOM COMMERCIAL EQUIPMENT CO Ltd, Shenzhen Netcom Electronics Co Ltd filed Critical SHENZHEN NETCOM COMMERCIAL EQUIPMENT CO Ltd
Priority to CN201210553617.7A priority Critical patent/CN103065168B/en
Publication of CN103065168A publication Critical patent/CN103065168A/en
Application granted granted Critical
Publication of CN103065168B publication Critical patent/CN103065168B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention is applicable to REID field, a kind of electronic tag method for anti-counterfeit and system are provided, described method comprises: the information in close range wireless communication NFC equipment reading electronic labels, and described information comprises the chained address of security parameter and certificate server; NFC equipment is accessed corresponding certificate server according to described chained address, and described security parameter is sent to described certificate server certification; Certificate server receiving after described security parameter, is verified described security parameter, is made corresponding prompting according to the result. The present invention is in Product Certification, do not need special authentication means, the terminal device arbitrarily with wireless telecommunications and function of surfing the Net can be served as authentication means, thereby effectively solves the problem of the false proof effective utilization of the incompatible restriction radio frequency of existing radio-frequency recognition system. And verification process simply, easily and fast, has stronger practicality.

Description

A kind of electronic tag method for anti-counterfeit and system
Technical field
The invention belongs to REID field, relate in particular to a kind of electronic tag method for anti-counterfeit and system.
Background technology
RF identification (RadioFrequencyIdentification, RFID) technology, claim again electronic tag,Radio frequency identification, it is a kind of communication technology, can be identified specific objective and be read and write phase by radio signalsClose data, and without setting up machinery between recognition system and specific objective or optics contacts. Identifying need notManual intervention, is applicable to various environment, can be used in control, detection and tracking specific objective etc.
Radio-frequency recognition system mainly comprises reader (Reader), electronic tag (TAG) and application softwareThree parts of system, its operation principle be reader launch a CF radio wave energy to electronics markSign, in order to drive electronic tag circuit that inner data are sent, reader receives data and processes.
At present, what the leading firm of radio-frequency recognition system provided is all special system, and needs special readdingRead device, therefore different application and different industries adopt frequency, consensus standard and the reading of different vendorDevice, thus cause radio-frequency recognition system incompatible. This incompatible and dedicated reader has restricted whole penetratingFrequently identify the particularly false proof effective utilization of radio frequency of industry.
Summary of the invention
The object of the embodiment of the present invention is to provide a kind of electronic tag method for anti-counterfeit and system, existing to solveThe problem of the false proof effective utilization of the incompatible restriction radio frequency of radio-frequency recognition system.
The embodiment of the present invention is achieved in that a kind of electronic tag method for anti-counterfeit, and described method comprises:
Information in close range wireless communication NFC equipment reading electronic labels, described information comprises security parameterAnd the chained address of certificate server;
NFC equipment is accessed corresponding certificate server according to described chained address, and described security parameter is sent outGive described certificate server certification;
Certificate server, receiving after described security parameter, is verified described security parameter, according to testingCard result is made corresponding prompting.
Another object of the embodiment of the present invention is to provide a kind of electronic tag Antiforge system, and described system comprises:
Electronic tag, close range wireless communication NFC equipment and certificate server;
Described NFC equipment, for reading the information in described electronic tag, described information comprises security parameterAnd the chained address of certificate server, access corresponding certificate server according to described chained address, and willDescribed security parameter sends to described certificate server certification;
Described certificate server, for receiving described security parameter, and enters the described security parameter receivingRow checking, makes corresponding prompting according to the result.
A kind of close range wireless communication equipment, described close range wireless communication equipment comprises:
Information reading unit, for the information in reading electronic labels, described information comprise security parameter andThe chained address of certificate server;
First information transmitting element is corresponding for the chained address access of reading according to described information reading unitCertificate server, and the described security parameter reading is sent to the certification of described certificate server, to makeDescribed certificate server, after the described security parameter receiving, verifies described security parameter, according toThe result is made corresponding prompting.
A kind of certificate server, described certificate server comprises:
Information receiving unit, the security parameter sending for receiving close range wireless communication NFC equipment, described inSecurity parameter is described NFC equipment from the information reading in electronic tag;
Authentication unit, verifies for the described security parameter that described information receiving unit is received, andMake corresponding prompting according to the result.
The beneficial effect that the embodiment of the present invention compared with prior art exists is: pre-stored product in electronic tagThe security parameter of product certification and the chained address of certificate server, read described electronics mark by NFC equipmentSecurity parameter in label and chained address, and access corresponding certificate server according to described chained address,Described security parameter is sent to described certificate server certification, and certificate server is made phase according to authentication resultThe prompting of answering, whether whether authentication authorization and accounting product be certified products or used etc. The embodiment of the present invention is recognized at productIn card process, do not need special authentication means, the terminal arbitrarily with wireless telecommunications and function of surfing the Net is establishedFor serving as authentication means, thereby it is anti-effectively to solve the incompatible restriction radio frequency of existing radio-frequency recognition systemThe pseudo-problem of effectively using. And the verification process of the embodiment of the present invention simply, easily and fast, product existsBefore not losing efficacy, can repeatedly authenticate, there is stronger practicality.
Brief description of the drawings
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below will be to embodiment or existing skillIn art description, the accompanying drawing of required use is briefly described, and apparently, the accompanying drawing in the following describes onlyBe only some embodiments of the present invention, for those of ordinary skill in the art, do not paying creative laborUnder the prerequisite of moving property, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the scene schematic diagram of the electronic tag Antiforge system that provides of the embodiment of the present invention one;
Fig. 2 is the interaction diagrams of the electronic tag method for anti-counterfeit that provides of the embodiment of the present invention two;
Fig. 3 is the Product Validation exemplary plot that the embodiment of the present invention two provides;
Fig. 4 is the composition structure chart of the NFC equipment that provides of the embodiment of the present invention three;
Fig. 5 is the composition structure chart of the certificate server that provides of the embodiment of the present invention four.
Detailed description of the invention
In order to make object of the present invention, technical scheme and advantage clearer, below in conjunction with accompanying drawing and realityExecute example, the present invention is further elaborated. Only should be appreciated that specific embodiment described hereinOnly, in order to explain the present invention, be not intended to limit the present invention.
For technical solutions according to the invention are described, describe below by specific embodiment.
Embodiment mono-:
Fig. 1 shows the scene of the electronic tag Antiforge system that the embodiment of the present invention one provides, the invention processThe described electronic tag method for anti-counterfeit of example can be applicable in described electronic tag Antiforge system, for convenience of explanation,Only show the part relevant to the embodiment of the present invention.
As shown in Figure 1, this system comprises close range wireless communication (NearFieldCommunication, NFC)Equipment 1, certificate server 2 and electronic tag 3.
Wherein, described NFC equipment 1 can be the terminal device arbitrarily with wireless telecommunications and function of surfing the Net,Include but not limited to mobile phone.
Described certificate server 2 can be single server, can be also common by several function serversThe server end of composition. Described certificate server 2 has data-handling capacity, in described certificate server 2Store the data such as unique identifier (ID), decruption key and the relevant identity of various product, for the external worldAccess, checking product whether certified products, whether used etc.
Electronic tag 3(is generally placed in the packing of product) in store the data such as product IDs, described electronics markSign 3 and be also built-in with random code generator and sequence number generator. Described random code generator and sequence number generatorEffect be to make NFC equipment 1 at every turn in the time of reading electronic labels 3, all can produce a new random codeAnd sequence number, avoid occurring on same product IDs identical random code and sequence number. Random code and sequence number make oftenThe enciphered data that inferior electronic tag 3 returns is not identical, thereby improves the difficulty cracking.
In the present embodiment, the information in NFC equipment 1 reading electronic labels 3, described information comprises safetyThe chained address of parameter and certificate server;
NFC equipment 1 is accessed corresponding certificate server 2 according to described chained address, and by described safety ginsengNumber sends to described certificate server 2 to authenticate;
Certificate server 2, receiving after described security parameter, verifies described security parameter, according toThe result is made corresponding prompting.
Further, described security parameter comprises product IDs (expressly) and ciphertext parameter, described ciphertextParameter be electronic tag 3 utilize random code that preset-key produces random code generator and sequence number generator andThe parameter obtaining after sequence number is encrypted;
Described certificate server 2 specifically for, receiving after described security parameter, judge described safety ginsengWhether the product IDs in number is effective, if effectively, obtains the decruption key of this product, and dense by described solutionKey is decrypted described ciphertext parameter, obtains decrypted result, and described decrypted result is verified to rootMake corresponding prompting according to the result.
Wherein, described decrypted result comprises random code and sequence number;
Further, described certificate server 2 is obtaining after described decrypted result, further described in judgementWhether the random code in decrypted result is effective, if effectively, judge that whether described sequence number is than described certificate serverIn the sequence number of having stored large and/or with described certificate server in the sequence number of having stored meet default rule; IfBe, pointing out described product is certified products, and stores current described sequence number, comparison while certification for next time.
Further, described security parameter can also comprise the first verification random code (expressly), describedOne verification random code is a regular part in described random code, for example odd bits, or even bit, orIts last four etc.;
Described certificate server 2 in the time judging described random code, specifically judge described the first verification random code withWhether the second verification random code is identical, if identical, then judge that whether described sequence number is than in described certificate serverThe sequence number of having stored large and/or with described certificate server in the sequence number of having stored meet default rule; IfBe, pointing out described product is certified products, and stores current described sequence number, comparison while certification for next time. ItsDescribed in the second verification random code be the random code of extracting according to default rule from described random code.
It should be noted that, described sequence number can be natural number or other character, and after every certification once, sequence number is passedIncrease or regular variation, this variation can be detected by certificate server 2 the priority rule of sequence number, for examplePress odd number progressive law 3,5,7 ...
The effect of sequence number is to prevent that the verify data that is submitted to certificate server 2 from repeating and judging when time identificationThe order of data. For example, product placement, on sales counter, has people to think that shop-assistant authenticated this then and there before buyingWhether certified products of product, shop-assistant can, without the certification of number of times restriction, obtain random code at every turn while certification soDifference, and sequence number all can change by preset algorithm, thereby can repeat certification and do not affect certification next time.
As a preferred embodiment of the present invention, because the certified products certification of product can not ensure that product is not madeWith, the present embodiment has also increased the inefficacy certification to product, is specially:
NFC equipment 1 receives the inefficacy code of user's input, and described inefficacy code is sent to described authentication serviceDevice 2;
Certificate server 2 is receiving after described inefficacy code, is to lose by product labelling corresponding to the described code that lost efficacyEffect, this product is used, and is failure state, afterwards this product IDs of any submission and with this productThe random code that ID is corresponding, the certification of sequence number all point out this product to lose efficacy, and are used;
Wherein, described inefficacy code is associated with product IDs, and described inefficacy code bit is not used front user to see in productThe position loseing only (it should be noted that, at production in visibility status after product is usedDescribed in tense marker, lost efficacy the visibility status in when code not within this scope), when this position class is seemingly had a drink " againCome one bottle " position, when product does not use, cannot see this lost efficacy code.
It should be noted that, the system scene that the present embodiment provides, only for explaining the present invention, does not limit thisThe protection domain of invention.
Embodiment bis-:
Fig. 2 shows the interaction flow of the electronic tag method for anti-counterfeit that the second embodiment provides, the method processDetails are as follows:
In step S201, the information in close range wireless communication NFC equipment reading electronic labels.
In the present embodiment, described information includes but not limited to the chain ground connection of security parameter and certificate serverLocation. Described security parameter includes but not limited to product IDs (expressly) and ciphertext parameter, described ciphertext parameterFor electronic tag utilizes preset-key by the random code (expressly) of random code generator and sequence number generator generationAnd the parameter that obtains after being encrypted of sequence number (expressly).
In step S202, NFC equipment is accessed corresponding certificate server according to described chained address, andDescribed security parameter is sent to described certificate server certification.
In the present embodiment, described certificate server can be the clothes under enterprise or Third Party Authentication mechanismBusiness device. In described certificate server, store the unique identifier (ID), decruption key of various product, withWhether whether the data such as machine code, sequence number, be certified products and/or used etc. for external certificate product.
In step S203, certificate server, receiving after described security parameter, enters described security parameterRow checking, makes corresponding prompting according to the result.
Wherein, described described security parameter is verified, made corresponding prompting according to the result concreteComprise:
Judge that whether described product IDs is effective;
If effectively, obtain the decruption key of this product, and by described decruption key, described ciphertext parameter enteredRow deciphering, obtains decrypted result, and described decrypted result is verified, makes corresponding according to the resultPrompting; If invalid, in authentication authorization and accounting server, do not store this product IDs, checking finishes, prompting productNon-certified products.
Wherein, described decrypted result includes but not limited to random code and sequence number;
Further, described described decrypted result is verified, made corresponding prompting according to the resultSpecifically comprise:
Judge that whether described random code is effective;
If effectively, judge described sequence number whether larger than the sequence number of having stored in described certificate server and/or with instituteState the sequence number of having stored in certificate server and meet default rule; If invalid, checking finishes, and prompting is producedThe non-certified products of product;
If so, pointing out described product is certified products, and stores current described sequence number, ratio while certification for next time; If not, checking finishes, the non-certified products of prompting product.
In the present embodiment, in certificate server the pre-stored sequence number that has legal certification and described inThe judgment principle whether sequence number is legal, the rule meeting. Certificate server by deciphering after current sequence number withThe sequence number of the legal certification of authentication server stores compares, if current sequence number is than describedThe sequence number of legal certification is large and/or meet default rule, thinks that this certification is legal, by current sequence number (The sequence number of this certification) be stored in certificate server; Otherwise, think that this certification is illegal, checking knotBundle, the non-certified products of prompting product.
For example, sequence number rule is defaulted as by odd number incremental variations, and the sequence number of last legal checking is 1, thatFor the second time and later multiple authentication, the sequence number after deciphering is 3,5,7,9 successively ... time just regard as certified products,If the sequence number after the deciphering of submitting to while once checking is 2,4,8, obviously sequence number has problem, and justIn the situation of product, the sequence number that each certification is submitted to and any once authenticated order of submitting to for certified products aboveNumber all not identical, and be greater than previous sequence number, last sequence number is 1, after deciphering next time, sequence number is largeIn or equal at 3 o'clock just for certified products.
Further, described security parameter also comprises the first verification random code (expressly), described the first schoolTesting random code is a regular part in described random code, for example odd bits, or even bit, or it isLatter four etc.
Described certificate server, in the time judging described random code, specifically judges described the first verification random code andWhether two verification random codes are identical, if not identical, checking finishes, the non-certified products of prompting product; If it is identical,Judge again whether described sequence number takes greatly and/or with described certification than the sequence number of having stored in described certificate serverThe sequence number of having stored in business device meets default rule; If so, pointing out described product is certified products, and storageCurrent described sequence number, comparison while certification for next time. Wherein said the second verification random code is from described randomThe random code of extracting according to default rule in code.
Illustrate, as shown in Figure 3, in electronic tag, comprise product IDs: 123456 and produce orderNumber: 1357, random code: ABCDEF01, default key, by default key to described sequence number:1357 and random code: ABCDEF01 be encrypted and obtain ciphertext parameter A bcdefghjklm, and the first schoolTest random code EF01, in the present embodiment, the rule of obtaining of the first school, two verification random codes is to get random codeLatter four. When the information of NFC equipment in reading electronic labels, obtain security parameter, described security parameterFor 123456AbcdefghjklmEFO1(comprises product IDs: 123456, ciphertext parameter: AbcdefghjklmAnd first verification random code: the EF01), described security parameter is sent to certificate server by NFC, certificationServer first verifies that whether described product IDs is effective, whether has the described product IDs of storage in authentication authorization and accounting server:123456, if effectively, described ciphertext parameter is decrypted, obtain sequence number: 1357 and random code:ABCDEF01。
Preferably, in the time being certified products by such scheme certified product, can not ensure that this product is not madeWith, because the words that the product after using authenticates are again also certified products, for fear of this kind of situation, the present embodimentAlso increase the inefficacy certification to product, be specially:
NFC equipment receives the inefficacy code of user's input, and described inefficacy code is sent to described certificate server;
Certificate server is receiving after described inefficacy code, is to lose efficacy by product labelling corresponding to the described code that lost efficacy,This product is used, and is failure state, afterwards this product IDs of any submission and with this product IDs pairThe random code of answering, the certification of sequence number all point out this product to lose efficacy, and are used.
Wherein, described inefficacy code is associated with product IDs, and described inefficacy code bit is not used front user to see in productThe position loseing, only after product is used in visibility status, when this position class is seemingly had a drink, " come againOne bottle " position, when product does not use, cannot see this lost efficacy code.
In the present embodiment, the mode that certificate server receives the code that lost efficacy can have various ways, for example, pass throughNote receives or in the time of NFC device access certification page, this page has the code of inefficacy dialog box, and code will lose efficacyBeing passed to this dialog box submits to.
Further, for encourage consumer uses product failure certification, can initiatively use product consumerLost efficacy and (send and lost efficacy after code) after certification, certificate server sends the preferential Securities of electronics to checking NFC equipmentOr the awards such as integration.
Embodiment tri-:
Fig. 4 shows the composition structure of the NFC equipment that third embodiment of the invention provides, this NFC equipmentBe applied in electronic tag Antiforge system as shown in Figure 1, for convenience of explanation, only show and the present inventionThe part that embodiment is relevant.
This NFC equipment 1 comprises information reading unit 11 and first information transmitting element 12. Wherein, eachThe concrete function of unit is as follows:
Information reading unit 11, for the information in reading electronic labels, described information comprise security parameter withAnd the chained address of certificate server;
First information transmitting element 12, visits for the chained address of reading according to described information reading unit 11Ask corresponding certificate server, and the described security parameter reading sent to described certificate server certification,To make described certificate server after the described security parameter receiving, described security parameter is verified,Make corresponding prompting according to the result.
Further, it is characterized in that, described NFC equipment 1 also comprises:
Information receiving unit 13, for receiving the inefficacy code of input;
The second information transmitting unit 14, for the described inefficacy code that described information receiving unit 13 is receivedBe sent to described certificate server, so that described certificate server is being received after described inefficacy code, by instituteStating the product labelling that the code that lost efficacy is corresponding is inefficacy;
Wherein, described inefficacy code is associated with product IDs, and described inefficacy code bit is not used front user to see in productThe position loseing, only after product is used in visibility status.
Embodiment tetra-:
Fig. 5 shows the composition structure of the certificate server that fourth embodiment of the invention provides, this authentication serviceDevice is applied in electronic tag Antiforge system as shown in Figure 1, for convenience of explanation, only shows and thisThe part that bright embodiment is relevant.
This certificate server 2 comprises information receiving unit 21 and authentication unit 22. Wherein, each unitConcrete function is as follows:
Information receiving unit 21, the security parameter sending for receiving close range wireless communication NFC equipment,Described security parameter is described NFC equipment from the information reading in electronic tag;
Authentication unit 22, tests for the described security parameter that described information receiving unit 21 is receivedCard, and make corresponding prompting according to the result.
Further, it is characterized in that, described security parameter comprises product unique identifier ID and ciphertext ginsengNumber;
Described authentication unit 22 comprises:
Judge module 221, whether effective for judging described product IDs;
Authentication module 222, in described judge module 221 judged results when being, obtain this productDecruption key, and by described decruption key, described ciphertext parameter is decrypted, obtain decrypted result, andDescribed decrypted result is verified, made corresponding prompting according to the result.
Further, described decrypted result comprises random code and sequence number;
Described authentication module 222 also comprises:
First judges submodule 2221, for judging that whether described random code is effective;
Second judges submodule 2222, for judging that described first submodule 2221 judged results are when being,Judge described sequence number whether larger than the sequence number of having stored in described certificate server or with described certificate serverIn the sequence number of having stored meet default rule;
Checking submodule 2223, for judging that described second submodule 2222 judged results when being, carryShow that described product is certified products, and store current described sequence number, comparison while certification for next time.
Further, described security parameter also comprises the first verification random code;
Described second judges submodule 2222, specifically for judging that described first submodule judged result is yesTime, judge that whether described the first verification random code is identical with the second verification random code, wherein said the second verificationRandom code is the random code of extracting according to default rule from described random code.
Further, described certificate server 2 also comprises:
Inefficacy authentication module 23, the inefficacy code sending for receiving described NFC equipment, and by described inefficacyThe product labelling that code is corresponding is inefficacy;
Wherein, described inefficacy code is associated with product IDs, and described inefficacy code bit is not used front user to see in productThe position loseing, only after product is used in visibility status.
Those skilled in the art can be well understood to, for convenience and simplicity of description, and only with above-mentionedThe division of each functional unit, module is illustrated, in practical application, and can be as required and by above-mentionedFunction distribution is completed by different functional units or module, is divided into different merits by the internal structure of deviceEnergy unit or module, to complete all or part of function described above. Each functional unit in embodiment,Module can be integrated in a processing unit, can be also that the independent physics of unit exists, also can twoIndividual or more than two unit is integrated in a unit, and above-mentioned integrated unit both can adopt the form of hardwareRealize, also can adopt the form of SFU software functional unit to realize. In addition, each functional unit, module is concreteTitle also, just for the ease of mutual differentiation, is not limited to the application's protection domain. In said apparatusThe specific works process of unit, module, can be with reference to the corresponding process in preceding method embodiment, at this notRepeat again.
In sum, the embodiment of the present invention can be passed through the various ways such as product IDs, random code and sequence numberWhether checking product is certified products, has improved greatly the accuracy of product certification. But also can pass through productWhether the mode certified product authenticating that lost efficacy is used, to solve the certified products verification process of prior art at productIn cannot ensure the problem that product is not used. In addition, the embodiment of the present invention is in Product Certification, noNeed special authentication means, the terminal device arbitrarily with wireless telecommunications and function of surfing the Net can be served asAuthentication means, thus the incompatible restriction radio frequency of existing radio-frequency recognition system false proof effective utilization can effectively be solvedProblem. The verification process of the embodiment of the present invention simply, easily and fast, accuracy rate is high, and product is notBefore inefficacy, can repeatedly authenticate, there is stronger practicality.
Those of ordinary skill in the art are further appreciated that all or part of step realizing in above-described embodiment methodSuddenly be can carry out the hardware that instruction is relevant by program to complete, described program can be stored in a calculatingIn machine read/write memory medium, described storage medium, comprises ROM/RAM, disk, CD etc.
Above content is in conjunction with concrete preferred embodiment further description made for the present invention, noCan assert that specific embodiment of the invention is confined to these explanations. Common for the technical field of the inventionTechnical staff, makes some alternative or obvious modification that are equal to without departing from the inventive concept of the premise,And performance or purposes identical, all should be considered as belonging to the present invention determines by submitted to claims speciallyProfit protection domain.

Claims (17)

1. an electronic tag method for anti-counterfeit, is characterized in that, described method comprises:
Information in close range wireless communication NFC equipment reading electronic labels, described information comprises security parameterAnd the chained address of certificate server, described electronic tag is also built-in with random code generator and sequence number is sent outRaw device, described security parameter comprises product unique identifier ID and ciphertext parameter, described ciphertext parameter is electricitySubtab utilizes preset-key that random code and the sequence number of random code generator and sequence number generator generation are addedThe parameter obtaining after close;
NFC equipment is accessed corresponding certificate server according to described chained address, and described security parameter is sent outGive described certificate server certification;
Certificate server, receiving after described security parameter, is verified described security parameter, according to testingCard result is made corresponding prompting;
Described described security parameter verified and comprised:
After described ciphertext parameter in described security parameter is decrypted, obtains described sequence number, and judge instituteState sequence number whether larger than the sequence number of having stored in described certificate server and/or with described certificate server inThe sequence number of storage meets default rule.
2. the method for claim 1, is characterized in that,
Described described security parameter is verified, is made corresponding prompting according to the result and specifically comprise:
Judge that whether described product IDs is effective;
If effectively, obtain the decruption key of this product, and by described decruption key, described ciphertext parameter enteredRow deciphering, obtains decrypted result, and described decrypted result is verified, makes corresponding according to the resultPrompting.
3. method as claimed in claim 2, is characterized in that, described decrypted result comprise random code andSequence number;
Described described decrypted result is verified, is made corresponding prompting according to the result and specifically comprise:
Judge that whether described random code is effective;
If effectively, judge described sequence number whether larger than the sequence number of having stored in described certificate server and/or with instituteState the sequence number of having stored in certificate server and meet default rule;
If so, pointing out described product is certified products, and stores current described sequence number, ratio while certification for next time.
4. method as claimed in claim 3, is characterized in that, described security parameter also comprises the first verificationRandom code;
Describedly judge whether described random code effectively specifically comprises:
Judge that whether described the first verification random code is identical with the second verification random code, wherein said the second verificationRandom code is the random code of extracting according to default rule from described random code.
5. the method for claim 1, is characterized in that, described method also comprises:
NFC equipment receives the inefficacy code of input, and described inefficacy code is sent to described certificate server;
Certificate server is receiving after described inefficacy code, is to lose efficacy by product labelling corresponding to the described code that lost efficacy;
Wherein, described inefficacy code is associated with product IDs, described inefficacy yard only after product is used in canDepending on state.
6. an electronic tag Antiforge system, is characterized in that, described system comprises:
Electronic tag, close range wireless communication NFC equipment and certificate server;
Described NFC equipment, for reading the information in described electronic tag, described information comprises security parameterAnd the chained address of certificate server, access corresponding certificate server according to described chained address, and willDescribed security parameter sends to described certificate server certification, and described electronic tag is also built-in with random code and occursDevice and sequence number generator, described security parameter comprises product unique identifier ID and ciphertext parameter, described inCiphertext parameter is that electronic tag utilizes preset-key by the random code of random code generator and sequence number generator generationThe parameter obtaining after being encrypted with sequence number;
Described certificate server, for receiving described security parameter, and enters the described security parameter receivingRow checking, makes corresponding prompting according to the result; Described electronic tag, for generation of random code and orderNumber, and by preset-key, described random code and sequence number are encrypted;
Described certificate server, after the described ciphertext parameter in described security parameter is decrypted,Obtain described sequence number, and judge described sequence number whether larger than the sequence number of having stored in described certificate server and/Or with described certificate server in the sequence number of having stored meet default rule.
7. system as claimed in claim 6, is characterized in that, described certificate server specifically for:
Judge that whether described product IDs is effective;
If effectively, obtain the decruption key of this product, and by described decruption key, described ciphertext parameter enteredRow deciphering, obtains decrypted result, and described decrypted result is verified, makes corresponding according to the resultPrompting.
8. system as claimed in claim 7, is characterized in that, described decrypted result comprise random code andSequence number;
Described authentication service implement body also for:
Judge that whether described random code is effective;
If effectively, judge described sequence number whether larger than the sequence number of having stored in described certificate server and/or with instituteState the sequence number of having stored in certificate server and meet default rule;
If so, pointing out described product is certified products, and stores current described sequence number, ratio while certification for next time.
9. system as claimed in claim 8, is characterized in that, described security parameter also comprises the first verificationRandom code;
Described certificate server specifically for:
Judge that whether described the first verification random code is identical with the second verification random code, wherein said the second verificationRandom code is the random code of extracting according to default rule from described random code.
10. system as claimed in claim 6, is characterized in that, described NFC equipment also for, receiveThe inefficacy code of input, and described inefficacy code is sent to described certificate server;
Described certificate server also for, receiving after described inefficacy code, by a described product corresponding to code that lost efficacyProduct are labeled as inefficacy;
Wherein, described inefficacy code is associated with product IDs, described inefficacy yard only after product is used in canDepending on state.
11. 1 kinds of close range wireless communication equipment, is characterized in that, described close range wireless communication equipment bagDraw together:
Information reading unit, for the information in reading electronic labels, described information comprise security parameter andThe chained address of certificate server, described electronic tag is also built-in with random code generator and sequence number generator,Described security parameter comprises product unique identifier ID and ciphertext parameter, and described ciphertext parameter is electronic tagAfter utilizing random code that preset-key produces random code generator and sequence number generator and sequence number to be encryptedThe parameter arriving;
First information transmitting element is corresponding for the chained address access of reading according to described information reading unitCertificate server, and the described security parameter reading is sent to the certification of described certificate server, to makeDescribed certificate server, after the described security parameter receiving, verifies described security parameter, according toThe result is made corresponding prompting;
Described first information transmitting element, specifically for carrying out the described ciphertext parameter in described security parameterAfter deciphering, obtain described sequence number, and judge that whether described sequence number is than the order of having stored in described certificate serverNumber large and/or with described certificate server in the sequence number of having stored meet default rule.
12. close range wireless communication equipment as claimed in claim 11, is characterized in that, closely describedWireless telecommunications system also comprises:
Information receiving unit, for receiving the inefficacy code of input;
The second information transmitting unit, is sent to for the described inefficacy code that described information receiving unit is receivedDescribed certificate server, receiving after described inefficacy code, by described inefficacy described certificate serverThe product labelling that code is corresponding is inefficacy;
Wherein, described inefficacy code is associated with product IDs, described inefficacy yard only after product is used in canDepending on state.
13. 1 kinds of certificate servers, is characterized in that, described certificate server comprises:
Information receiving unit, the security parameter sending for receiving close range wireless communication NFC equipment, described inSecurity parameter is described NFC equipment from the information reading in electronic tag, described electronic tag be also built-in withMachine code generator and sequence number generator, described security parameter comprises product unique identifier ID and ciphertext ginsengNumber, described ciphertext parameter is that electronic tag utilizes preset-key that random code generator and sequence number generator are producedRandom code and the parameter that obtains after being encrypted of sequence number;
Authentication unit, verifies for the described security parameter that described information receiving unit is received, andMake corresponding prompting according to the result;
Described authentication unit, after the described ciphertext parameter in described security parameter is decrypted,Obtain described sequence number, and judge described sequence number whether larger than the sequence number of having stored in described certificate server and/Or with described certificate server in the sequence number of having stored meet default rule.
14. certificate servers as claimed in claim 13, is characterized in that, described security parameter comprises productProduct unique identifier ID and ciphertext parameter;
Described authentication unit specifically comprises:
Judge module, whether effective for judging described product IDs;
Authentication module, in described judge module judged result when being, obtain the decruption key of this product,And by described decruption key, described ciphertext parameter is decrypted, obtain decrypted result, and to described decipheringResult is verified, makes corresponding prompting according to the result.
15. certificate servers as claimed in claim 14, is characterized in that, described decrypted result comprise withMachine code and sequence number;
Described authentication module specifically also comprises:
First judges submodule, for judging that whether described random code is effective;
Second judges submodule, for judging that described first submodule judged result is when being, described in judgementSequence number whether larger than the sequence number of having stored in described certificate server or with described certificate server in storeSequence number meet default rule;
Checking submodule, for judging that described second submodule judged result when being, points out described productFor certified products, and store current described sequence number, comparison while certification for next time.
16. certificate servers as claimed in claim 15, is characterized in that, described security parameter also comprisesThe first verification random code;
Described first judges submodule, random specifically for judging described the first verification random code and the second verificationWhether code is identical, and wherein said the second verification random code is to extract according to default rule from described random codeRandom code.
17. certificate servers as claimed in claim 13, is characterized in that, described certificate server also wrapsDraw together:
Inefficacy authentication unit, the inefficacy code sending for receiving described NFC equipment, and by right described inefficacy codeThe product labelling of answering was for losing efficacy;
Wherein, described inefficacy code is associated with product IDs, described inefficacy yard only after product is used in canDepending on state.
CN201210553617.7A 2012-12-19 2012-12-19 A kind of electronic tag method for anti-counterfeit and system Active CN103065168B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210553617.7A CN103065168B (en) 2012-12-19 2012-12-19 A kind of electronic tag method for anti-counterfeit and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210553617.7A CN103065168B (en) 2012-12-19 2012-12-19 A kind of electronic tag method for anti-counterfeit and system

Publications (2)

Publication Number Publication Date
CN103065168A CN103065168A (en) 2013-04-24
CN103065168B true CN103065168B (en) 2016-05-11

Family

ID=48107791

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210553617.7A Active CN103065168B (en) 2012-12-19 2012-12-19 A kind of electronic tag method for anti-counterfeit and system

Country Status (1)

Country Link
CN (1) CN103065168B (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103326864B (en) * 2013-06-24 2016-03-09 詹万泉 A kind of electronic tag anti-fake authentication method
CN103559466B (en) * 2013-11-01 2017-07-14 中国联合网络通信集团有限公司 NFC application processing methods, terminal and server
CN103607283A (en) * 2013-12-04 2014-02-26 王旭东 Target authentication method based on mobile device and authentication center
CN104766211A (en) * 2014-01-06 2015-07-08 塞米西斯科株式会社 Genuine product authentication system and method thereof
CN103763007B (en) * 2014-01-07 2017-04-12 张诗悦 Identification method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology
CN103927664A (en) * 2014-03-20 2014-07-16 林清华 Product verification method
CN104320250A (en) * 2014-08-12 2015-01-28 北京傲飞商智软件有限公司 Anti-counterfeiting authentication method based on NFC chip
US10019604B2 (en) 2014-10-31 2018-07-10 Xiaomi Inc. Method and apparatus of verifying terminal and medium
CN105184587A (en) * 2015-09-22 2015-12-23 深圳市裕盛星文化传播有限公司 Anti-counterfeiting method, anti-counterfeiting device and anti-counterfeiting system
CN107038587A (en) * 2016-02-04 2017-08-11 北京童讯风联科技有限责任公司 A kind of Bluetooth label verified based on service end and its method for anti-counterfeit
CN107886333A (en) * 2016-09-29 2018-04-06 珠海晶通科技有限公司 A kind of Antiforge system and its method for anti-counterfeit with dynamic anti-fake information
CN107483427B (en) * 2017-08-09 2020-10-16 北京冠霖环如科技有限公司 Self-enhanced anti-counterfeiting method based on Ntag21X series chips
CN109428718A (en) * 2017-08-30 2019-03-05 江苏稻源微电子有限公司 A kind of NFC label chip with dynamic encryption image feature
CN108388938A (en) * 2018-03-15 2018-08-10 华大半导体有限公司 Antifalsification label
CN109472624A (en) * 2018-11-14 2019-03-15 李小文 Method for anti-counterfeit, Antiforge electronic drop and system based on electronics drop
CN110533128B (en) * 2019-08-21 2023-08-04 上海唯链信息科技有限公司 Encryption-based anti-counterfeiting traceability data processing method, device, system and medium
CN110516491A (en) * 2019-08-30 2019-11-29 上海应用技术大学 The information coding coding/decoding method anti-fake for books
CN113343318A (en) * 2021-06-30 2021-09-03 浙江德鲸数字科技有限公司 Data processing method, device, equipment and medium
CN114492489B (en) * 2022-01-24 2022-10-21 芯电智联(北京)科技有限公司 NFC label verification system based on dynamic data
CN117221877B (en) * 2023-09-03 2024-03-29 广东高芯国际物联网科技有限公司 Safety verification and transmission method applied to frequency radio field data

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102368706A (en) * 2011-10-18 2012-03-07 深圳市江波龙商用设备有限公司 Authentication method, authentication system and authentication device based on USB (Universal Serial Bus) HID (Human Interface device) protocol
CN102629332A (en) * 2012-02-20 2012-08-08 江苏凯路威电子科技有限公司 Radio frequency identification (RFID) anti-fake method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8532624B2 (en) * 2008-04-09 2013-09-10 Ven Chava System and method for storing and retrieving multimedia messages on low-cost tags in order to facilitate contextual communications
CN102375960A (en) * 2010-08-12 2012-03-14 中兴通讯股份有限公司 Method and system for identifying radio frequency identification (RFID) tags
CN102779284B (en) * 2012-01-30 2015-05-20 张楠 RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102368706A (en) * 2011-10-18 2012-03-07 深圳市江波龙商用设备有限公司 Authentication method, authentication system and authentication device based on USB (Universal Serial Bus) HID (Human Interface device) protocol
CN102629332A (en) * 2012-02-20 2012-08-08 江苏凯路威电子科技有限公司 Radio frequency identification (RFID) anti-fake method

Also Published As

Publication number Publication date
CN103065168A (en) 2013-04-24

Similar Documents

Publication Publication Date Title
CN103065168B (en) A kind of electronic tag method for anti-counterfeit and system
CN101923660B (en) Dynamic password identity authorization system and method based on RFID
Juels " Yoking-proofs" for RFID tags
US9213870B1 (en) RFID tag and reader authentication by trusted authority
CN103259667B (en) The method and system of eID authentication on mobile terminal
US20190165947A1 (en) Signatures for near field communications
CN106845304B (en) A kind of method and system for realizing reader and smart-tag authentication in RFID system
WO2016145705A1 (en) Time-based encrypted nfc cell phone terminal anti-counterfeit system and method
US9501675B1 (en) RFID tag and reader authentication by trusted authority
CN102682311B (en) Passive radio frequency identification (RFID) secutiry authentication method based on cyclic redundancy check (CRC) code operation
CN101882197B (en) RFID (Radio Frequency Identification Device) inquiring-response safety certificate method based on grading key
CN102831529A (en) Radio frequency based commodity information identification method and system
CN107181714A (en) Verification method and device, the generation method of service code and device based on service code
US10146969B1 (en) RFID tag and reader authentication by trusted authority
CN103107888B (en) The identity identifying method that the dynamic multi-attribute of facing moving terminal is multi-level
CN103516520A (en) Data safe transmission system and method based on electronic tag
CN104217335A (en) Storing device and method for commodity authenticity verification information, and commodity authenticity verification method
CN103218633B (en) A kind of RFID safety authentication
CN102034307A (en) Electronic wallet-based dynamic password authentication system and method
CN103235995A (en) Electronic anti-counterfeiting and logistics management system based on NFC (near field communication) mobile phone
KR20070006525A (en) System and method for assigning dynamic id to rfid tag, rfid tag, rfid terminal and recording medium
CN106779711A (en) Safe payment method and device based on eID
CN106779672A (en) The method and device that mobile terminal safety pays
CN103500349A (en) RFID (radio frequency identification) digital information read-write security control method and device, and reader-writer
US20110081016A1 (en) Secure data communication using elliptic curve cryptology

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 518057 A, B, C, D, E, F1, 8 Building, Financial Services Technology Innovation Base, No. 8 Kefa Road, Nanshan District, Shenzhen City, Guangdong Province

Co-patentee after: Shenzhen Netcom Commercial Equipment Co., Ltd.

Patentee after: Shenzhen jiangbolong electronic Limited by Share Ltd

Address before: 518057 A, B, C, D, E, F1, 8 Building, Financial Services Technology Innovation Base, No. 8 Kefa Road, Nanshan District, Shenzhen City, Guangdong Province

Co-patentee before: Shenzhen Netcom Commercial Equipment Co., Ltd.

Patentee before: Shenzhen jiangbolong Electronic Co., Ltd.