CN103607283A - Target authentication method based on mobile device and authentication center - Google Patents

Target authentication method based on mobile device and authentication center Download PDF

Info

Publication number
CN103607283A
CN103607283A CN201310638695.1A CN201310638695A CN103607283A CN 103607283 A CN103607283 A CN 103607283A CN 201310638695 A CN201310638695 A CN 201310638695A CN 103607283 A CN103607283 A CN 103607283A
Authority
CN
China
Prior art keywords
authentication
identification information
target
information
certified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310638695.1A
Other languages
Chinese (zh)
Inventor
王旭东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201310638695.1A priority Critical patent/CN103607283A/en
Publication of CN103607283A publication Critical patent/CN103607283A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method for authentication of a unique identification label of a target (a person or an object) by means of a mobile device (a mobile phone, a tablet computer, a wearable mobile device and the like). According to the method, comprehensive judgment is carried out on the unique identification label of the authentication target and the authentication action of an authentication executor through a rear-end authentication center, the authenticity of the identity of the target can be confirmed, and the action information of a counterfeiter can be tracked. According to the method, the unique identification information is arranged on the authentication target (the object or person to be authenticated) firstly through the authentication center, wherein the information can be barcodes, two-dimension codes, near field communication (NFC) labels and the like. During authentication, a user conducts identification information recognition with the mobile device, and then the recognized identification information, the device number of an authentication device (the international mobile device identification recognition number IMEI or a program imbedded identification code), geographic position information and the like are transmitted to the authentication center together through the Internet.

Description

A kind of method that target is authenticated based on mobile device and authentication center
Technical field
The present invention relates to the technology of mobile device recognition technology, the network communications technology, authentication center, especially based on uniqueness, identify Verification System and the method for the comprehensive identity discrimination technology of identification and identifying and identification equipment, thereby effectively carry out target authentication and the identification of people and article.
Background technology
Existing identity recognizing technology, conventionally the physical method adopting, biological information method etc. the whole bag of tricks, normally adopt difficulty of processing high, or the method for manufacturing technology complexity, authentication goals (certified article or certified people) is carried out to false proof processing.And these methods need to adopt professional equipment conventionally, by professional, used, could differentiate accurately certified object identity.
Summary of the invention
In view of this, main purpose of the present invention is to provide identifying and the target authentication system and method for act of authentication by authentication based on mobile device and authentication center, false proof principal character itself can be transferred to authentication center from authentication goals (certified article or certified people), make the forgery that depends on authentication goals (certified article or certified people) no longer feasible.
And when effectively saving manufacturing cost, non-professional by adopting, general mobile device, makes each ordinary person, grasps the true and false authentication of authentication goals (certified article or certified people).
For achieving the above object, technical scheme of the present invention is achieved in that
The method that target is authenticated based on mobile device and network, comprising:
A, authentication center are that each authentication goals (certified article or certified people) generates unique identification information A, in database, record unique identification information and relevant authentication goals (certified article or certified people) information, relevant information is including, but not limited to production time, the term of validity and circulating area etc. simultaneously;
B, upper at each authentication goals (certified article or certified people), additional unique identification information B, unique identification information is complete plain code, does not need to hide;
C, authentication operation person use universal intelligent mobile terminal (comprising mobile phone, panel computer and wearable mobile device), directly obtain authentication goals (certified article or certified people's) unique identification information B.
D, the relevant information by the Internet or mobile network etc. during by identification information B and mobile terminal authentication (this relevant information is including, but not limited to authenticated time, authentication location and authenticating device sign) are transferred to authentication center, and request authentication center authenticates;
Authentication center accepts after target authentication request, by the identification information A of the identification information B of authentication goals (certified article or certified people) and authentication center's record is compared, to carry out the target authentication of identification information;
First, authentication center compares the unique identification information A of the unique identification information B receiving and data-base recording, if both are not identical, is directly judged to be the authentication result of " vacation "; If both are identical, for the act of authentication information such as authenticated time, authentication location, verification process are carried out to synthetic determination, if judge effectively, judge the authentication result that authentication is "True", otherwise judge the result that authentication is " vacation ";
E, authentication center turn back to identification result on mobile terminal.
The method that target is authenticated based on mobile device and network according to above-mentioned, is characterized in that:
The described information that sends to authentication center by mobile terminal, comprises authentication goals (certified article or certified people's) identification information and the essential information of authenticating device itself and the behavioural information of verification process.
The method that target is authenticated based on mobile device and network according to above-mentioned, is characterized in that, obtains the mode of the identification information of authentication goals (certified article or certified people), comprising:
View data or the image file of the uniqueness identification image that utilizing takes a picture takes;
Utilize NFC, target identification information or digital document that near field communication (NFC) obtains;
Utilize bluetooth, infrared target identification information or the digital document obtaining;
The target identification information or the digital document that utilize other inductor meanses of mobile device to obtain; Or
The target information or the digital document that utilize the application program of installing on mobile device to obtain.
According to the above-mentioned method that target is authenticated based on mobile device and network, it is characterized in that: after acquired information, utilize network, include spider lines, WIFI wireless network, mobile network, the target identification information or the digital document that obtain are sent to authentication center.
According to the above-mentioned method that target is authenticated based on mobile device and network, it is characterized in that: authentication goals (certified article or certified people) unique identification information B, be by printed patterns or implant physical tag and be attached to marker, and can be moved terminal and directly read or identify.
The method that target is authenticated based on mobile device and network according to above-mentioned, is characterized in that: uniqueness identification information B is as target authentication label print or is attached on authentication goals (certified article or certified people); Described mobile terminal is provided with the identification software of identification information.
The method that target is authenticated based on mobile device and network according to above-mentioned, is characterized in that: the information that is sent to authentication center comprises image, word, all digital documents; Utilization is arranged on the data that the software of mobile terminal produces identification information identifying processing, and the identification data of mobile device itself.
According to the above-mentioned method that target is authenticated based on mobile device and network, it is characterized in that: described authentication center, preserves the identification information of authentication goals (certified article or certified people) and the verification process information that comprises time, place, mobile device that mobile terminal identification marking information produces.
In addition, authentication center is the large data to existing record regularly, comprehensively analyze.To data analysis, note abnormalities, and be the analysis of false entry to authentication, all report to the manager of authentication center, give the alarm and provide fraud tracing information.For normal authentication record, also provide analysis report, for manager, improve algorithm, aid decision, completes the strike to fake producer.
Further, the information that sends to authentication center by mobile terminal comprises authentication goals (certified article or certified people's) identification information B, and the essential information of authenticating device itself and the behavioural information of verification process.
Further, when authenticating, not only judge the authentication information that this receives, also authentication information in the past is comprehensively judged simultaneously;
Further, when authenticating, not only when mobile terminal transmits authentication information, judge, also incite somebody to action timing to all authentication record and data analysis, thereby abnormal conditions are reported to the police, and produce the report information of reviewing to adulterator;
In described method, the unique identification information ,You authentication center of authentication goals (certified article or certified people) produces, and is attached on authentication goals (certified article or certified people) with certain method.These methods include but not limited to:
In information such as authentication goals (certified article or certified people) printed bar code or Quick Response Codes;
At authentication goals (certified article or certified people), implant NFC (near field communication (NFC)) label;
At authentication goals (certified article or certified people) implanting device, by bluetooth, infrared, network etc., send the identification information of self;
Described method, the mode of obtaining the identification information of authentication goals (certified article or certified people) comprises:
Utilize view data or the image file of the uniqueness identification image of the camera on mobile device (mobile phone, panel computer, wearable mobile device etc.);
Utilize NFC (near field communication (NFC)) equipment on mobile device (mobile phone, panel computer, wearable mobile device etc.), the target identification information or the digital document that obtain;
Utilize bluetooth on mobile device (mobile phone, panel computer, wearable mobile device etc.), infrared etc., the target identification information or the digital document that obtain;
The target identification information or the digital document that utilize other inductor meanses on mobile device (mobile phone, panel computer, wearable mobile device etc.) to obtain;
Target information or digital document that the application program of utilizing mobile device (mobile phone, panel computer, wearable mobile device etc.) to install obtains.
The network that utilizes on mobile device (mobile phone, panel computer, wearable mobile device etc.) comprises cable network, WIFI wireless network, mobile network, and the target identification information obtaining or digital document are sent to authentication center;
Described method, authentication center's record includes but not limited to:
Authentication goals (certified article or certified people) unique identification information;
Authentication goals (certified article or certified people) production information;
The information such as authentication goals (certified article or the certified people) term of validity, circulating area scope;
Authentication goals (certified article or certified people) records uniquely identified method information;
The certification mode information that authentication goals (certified article or certified people) can be supported;
Adopt identifying and act of authentication is carried out the method for target authentication by authentication based on mobile device and network provided by the present invention, the mode of authentication goals (certified article or certified people) self anti-counterfeiting is transferred to authentication center false proof, make the adulterator cannot be by the fraud of authentication goals (certified article or certified people) is forged, synthetic determination based on unique identification information and verification process, has realized adulterator's imitation behavior has been reviewed simultaneously.
For the most frequently used forgery means, be at the upper intercepting of true authentication goals (certified article or certified people) identification information, carry out massive duplication.But due to present technique, can record the authentic number of times of this unique identification in authentication center, therefore can judge rapidly that new Copy Info is for forging (all identification informations of forging target are identical).
Because present technique is in recording verification process, the unique identification information that not only record is sent back to, time, the equipment of authentication, the Additional Verification information such as place of authentication of record authentication simultaneously, therefore can review rapidly spot and the concentrated time of origin of a large amount of spurious information, thereby auxiliary phase should be machine-operated rapidly, hits adulterator.
For more senior adulterator, may be by the identification information of a large amount of certified article of sampling, crack the algorithm (for current a large amount of cipher authentication method) that unique authentication sign produces, thereby produce new identification information, produce massive duplication product (all identification informations of forging target are different, but algorithm is consistent).
Because present technique adopts the sign of authentication method ,Zhi Dui authentication center of authentication center record, sentence very, even if therefore algorithm is cracked, the method that also cannot pass through is by legal authentication.And once authentication center finds this situation about being cracked, update algorithm rapidly not only, and can reviewing by time, the equipment of authentication, the Additional Verification information such as place of authentication of authentication, auxiliary phase should office, hits adulterator.
In fact, the core of this method, by current, has been carried out revolutionary improvement by adopting various technological means to strengthen to the method for the forgery cost of authentication goals.The technological means of all authentications and method, all transferred on authentication center's server of authentication center.By the forgery that the cloning process of authentication goals is carried out, all cannot sentence "True" in certified center, thereby stop the method to the direct imitation of authentication goals at all.
Because the record of authentication center has not only comprised the unique identification information of authentication goals, comprised effective Applicative time, place etc., so whether this method also can effectively be used and be authenticated to "True" product simultaneously.For example whether effectively the term of validity of product (has prevented the correction possibility of selling post), and can be for the authentication to smuggling product.
Because the record of authentication center has not only comprised the unique identification information of authentication goals, comprised effective Applicative time, place etc., so whether this method also can effectively be used and be authenticated to "True" product simultaneously.For example whether effectively the term of validity of product (has prevented the correction possibility of selling post), and can be for the authentication to smuggling product.
Due to no longer production and the manufacture of operation technique means step-up authentication target of this method, therefore not only greatly reduced the production cost of authentication goals, the adulterator who is also cannot effectively manufacture fake products.
Because this method is used general mobile device (smart mobile phone, flat board, wearable equipment etc.) as authentication means, also avoided production, the training cost of using specific purpose tool to authenticate professional, saved a large amount of social cost.
In sum, this method not only can effectively be stopped to fake, and can report to the police to the illegal application of genuine piece simultaneously, and adulterator's forgery behavior is reviewed.The application of this method, can bring very large society and economic benefit.
Accompanying drawing explanation
Accompanying drawing 1 is for the present invention is based on being identified with act of authentication and carried out the method Zhong, authentication center generation unique identification information of target authentication the process of record by authentication of mobile device and network;
Accompanying drawing 2 is for identifying the anti-fake certificate process of carrying out the method Zhong, domestic consumer practical operation of target authentication with act of authentication based on mobile device and network by authentication.
Accompanying drawing 3 identifies the method for carrying out target authentication with act of authentication, the process that reads authentication goals (certified article or certified people) information and authenticate based on mobile device and network by authentication for embodiment 1 application.
Accompanying drawing 4 identifies the method for carrying out target authentication with act of authentication, the process that certified people's identity is authenticated based on mobile device and network by authentication for embodiment 2 application.In this example, unique identification information is implanted individual adornment (can be bracelet, or ring, or have the mobile phone of NFC chip) by NFC (near field communication (NFC)) stamp methods;
Specific implementation method
Below in conjunction with accompanying drawing and enforcement of the present invention, target authentication system and method for the present invention is described in further detail.
In accompanying drawing 1, authentication center is that each authentication goals (certified article or certified people) generates globally unique identification information.
1 unique identification information generating with reference to the accompanying drawings, can select Quick Response Code, NFC (near field communication (NFC)) label, infrared record information etc., by selection print, the mode such as implantation, be attached on authentication goals (certified article or certified people) reliable and stablely.
With reference to the accompanying drawings 2, authenticator is according to authentication goals (certified article or certified people's) identification information, adopt mobile device (comprising mobile phone, flat board, wearable mobile device etc.), unique identification information to authentication goals (certified article or certified people) is identified, and then identification information, authenticating device information and verification process information is returned to authentication center and authenticates.
Accompanying drawing 3 identifies the system of carrying out target authentication with act of authentication based on mobile device and authentication center by authentication for embodiment 1, be applied to the schematic flow sheet (in this example, adopting authentication goals printing Quick Response Code to record unique identification information) of article anti-counterfeit.
Embodiment 1
Adopt this method to authenticate article such as product, invoices.Based on identifying and act of authentication is carried out the method for target authentication by authentication of mobile device and network, comprising:
1, authentication center
2, authentication center generates unique identification information A;
3, upper at authentication goals (certified article), adopt printing Quick Response Code to record unique identification information B:
4, authenticator, uses the camera of mobile device (mobile phone, flat board, wearable smart machine etc.) to be printed on the Quick Response Code on authentication goals (certified article), reads unique identification information B;
5, transmit unique identification information B, authenticating device information, verification process information is to authentication center;
6, authentication center receives information;
7, whether authentication center is first legal by relative discern unique identification information.If illegal, directly return authentication target is false authentication;
If 8, unique identification information is legal, authentication center carries out synthetic determination to the existing record in authenticating device, authenticated time, authentication position, verification process and database.If it is invalid or abnormal to find, return authentication target is false authentication;
9, authentication center is judged to be very result by authentication center's (unique identification information, is recorded in authentication center's information, authenticating device information, verification process information), and return authentication target is for really authenticating;
10, authentication center is the large data to existing record regularly, comprehensively analyze;
11, to data analysis, note abnormalities, and be the analysis of false entry to authentication, all report to the manager of authentication center, give the alarm and provide fraud tracing information;
12, for normal authentication record, also provide analysis report, for manager, improve algorithm, aid decision, completes the strike to fake producer.
Accompanying drawing 4 identifies the system of carrying out target authentication with act of authentication, the schematic flow sheet that the personnel of being applied to authenticate based on mobile device and authentication center by authentication for embodiment 2.
Embodiment 2
Adopt this method to authenticate targets such as personnel.Based on identifying and act of authentication is carried out the method for target authentication by authentication of mobile device and network, comprising:
1, authentication center
2, authentication center generates unique identification information A;
3, on the ornaments of wearing at authentication goals (certified people), adopt NFC (near field communication (NFC)) label record unique identification information B, this label is implanted in and can wears on ornaments.Can include but not limited to: mobile phone, bracelet, necklace, ring, NFC card etc.;
4, authenticator, the ornaments that NFC (near field communication (NFC)) equipment of use mobile device (mobile phone, flat board, wearable smart machine etc.) is worn authentication goals (certified people) read;
5, the mobile device that authentication is used is by the unique identification information transmission, the authenticating device information that read, and verification process information etc. is sent to authentication center;
6, authentication center receives information;
7, whether authentication center is first legal by relative discern unique identification information.If illegal, directly return authentication target is false authentication;
If 8, unique identification information is legal, authentication center carries out synthetic determination to the existing record in authenticating device, authenticated time, authentication position, verification process and database.If it is invalid or abnormal to find, return authentication target is false authentication;
9, authentication center is judged to be very result by authentication center's (unique identification information, is recorded in authentication center's information, authenticating device information, verification process information), and return authentication target is for really authenticating;
10, authentication center is the large data to existing record regularly, comprehensively analyze;
11, to data analysis, note abnormalities, and be the analysis of false entry to authentication, all report to the manager of authentication center, give the alarm and provide fraud tracing information;
12, for normal authentication record, also provide analysis report, for manager, improve algorithm, aid decision, completes the strike to fake producer.
Because the periodic data of large data in authentication center excavates, for the unreasonable use of abnormal time, place, authenticating device, all can find rapidly, and pseudo-scope and behavioral characteristic are made in locking.
Due to authentication sign, can adopt the multiple recording modes such as printing, electronic tag, infrared, bluetooth to be stored in authentication goals (certified article or certified people) upper, therefore also can adopt the combination of different recording modes, strengthen the reliability of authentication.
Due to this method by the means of anti-fake certificate from authentication goals, transferred to authentication center, so adulterator cannot fake by simple clone's authentication goals.
This method Zhong, authentication center, for the unique identification information that each authentication goals generates can adopt plain code completely, opens to all masses.
For special applications, also support authentication goals (certified article or certified people) uniqueness identification information to carry out particular algorithm generation and encryption.
This method Zhong, authentication center has also recorded effective time and effective geographic range of authentication goals, therefore can be used as in the various activities such as meeting, lottery ticket, registers, gets multiple application such as specifying award.
Because the record of authentication center has not only comprised the unique identification information of authentication goals, comprised effective Applicative time, place etc., so whether this method also can effectively be used and be authenticated to "True" product simultaneously.For example whether effectively the term of validity of product (has prevented the correction possibility of selling post), and can be for the authentication to smuggling product.
The above, be only preferred embodiment of the present invention, is not intended to limit protection scope of the present invention.

Claims (8)

1. the method that target is authenticated based on mobile device and network, comprising:
A, authentication center are that each authentication goals (certified article or certified people) generates unique identification information A, in database, record unique identification information and relevant authentication goals (certified article or certified people) information, relevant information is including, but not limited to production time, the term of validity and circulating area etc. simultaneously;
B, upper at each authentication goals (certified article or certified people), additional unique identification information B, unique identification information is complete plain code, does not need to hide;
C, authentication operation person use universal intelligent mobile terminal (comprising mobile phone, panel computer and wearable mobile device), directly obtain authentication goals (certified article or certified people's) unique identification information B.
D, the relevant information by the Internet or mobile network etc. during by identification information B and mobile terminal authentication (this relevant information is including, but not limited to authenticated time, authentication location and authenticating device sign) are transferred to authentication center, and request authentication center authenticates;
Authentication center accepts after target authentication request, by the identification information A of the identification information B of authentication goals (certified article or certified people) and authentication center's record is compared, to carry out the target authentication of identification information;
First, authentication center compares the unique identification information A of the unique identification information B receiving and data-base recording, if both are not identical, is directly judged to be the authentication result of " vacation "; If both are identical, for the act of authentication information such as authenticated time, authentication location, verification process are carried out to synthetic determination, if judge effectively, judge the authentication result that authentication is "True", otherwise judge the result that authentication is " vacation ";
Authentication center turns back to identification result on mobile terminal.
2. the method that target is authenticated based on mobile device and network as claimed in claim 1, is characterized in that:
The described information that sends to authentication center by mobile terminal, comprises authentication goals (certified article or certified people's) identification information and the essential information of authenticating device itself and the behavioural information of verification process.
3. the method that target is authenticated based on mobile device and network as claimed in claim 1 or 2, is characterized in that, obtains the mode of the identification information of authentication goals (certified article or certified people), comprising:
View data or the image file of the uniqueness identification image that utilizing takes a picture takes;
Utilize NFC, target identification information or digital document that near field communication (NFC) obtains;
Utilize bluetooth, infrared target identification information or the digital document obtaining;
The target identification information or the digital document that utilize other inductor meanses of mobile device to obtain; Or
The target information or the digital document that utilize the application program of installing on mobile device to obtain.
4. the method that target is authenticated based on mobile device and network as claimed in claim 3, it is characterized in that: after acquired information, utilize network, include spider lines, WIFI wireless network, mobile network, the target identification information or the digital document that obtain are sent to authentication center.
5. the method that target is authenticated based on mobile device and network as claimed in claim 4, it is characterized in that: authentication goals (certified article or certified people) unique identification information B, be by printed patterns or implant physical tag and be attached to marker, and can be moved terminal and directly read or identify.
6. the method that target is authenticated based on mobile device and network as claimed in claim 5, is characterized in that: uniqueness identification information B is as target authentication label print or is attached on authentication goals (certified article or certified people); Described mobile terminal is provided with the identification software of identification information.
7. the method that target is authenticated based on mobile device and network as claimed in claim 6, is characterized in that: the information that is sent to authentication center comprises image, word, all digital documents; Utilization is arranged on the data that the software of mobile terminal produces identification information identifying processing, and the identification data of mobile device itself.
8. the method that target is authenticated based on mobile device and network as claimed in claim 7, it is characterized in that: described authentication center, preserves the identification information of authentication goals (certified article or certified people) and the verification process information that comprises time, place, mobile device that mobile terminal identification marking information produces.
CN201310638695.1A 2013-12-04 2013-12-04 Target authentication method based on mobile device and authentication center Pending CN103607283A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310638695.1A CN103607283A (en) 2013-12-04 2013-12-04 Target authentication method based on mobile device and authentication center

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310638695.1A CN103607283A (en) 2013-12-04 2013-12-04 Target authentication method based on mobile device and authentication center

Publications (1)

Publication Number Publication Date
CN103607283A true CN103607283A (en) 2014-02-26

Family

ID=50125484

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310638695.1A Pending CN103607283A (en) 2013-12-04 2013-12-04 Target authentication method based on mobile device and authentication center

Country Status (1)

Country Link
CN (1) CN103607283A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104811312A (en) * 2015-05-25 2015-07-29 王旭东 Terminal course identity authentication method based on center authorization
CN105391680A (en) * 2014-08-27 2016-03-09 霍夫曼-拉罗奇有限公司 Identification, authentication and authorization method in a laboratory system
CN105610841A (en) * 2015-12-31 2016-05-25 国网智能电网研究院 User information authentication method based on traceability
CN105704715A (en) * 2015-04-10 2016-06-22 浙江公共安全技术研究院有限公司 Secure communication authentication method of mobile terminal
WO2016116023A1 (en) * 2015-01-20 2016-07-28 中兴通讯股份有限公司 Ornament and ornament identifying system
CN105988802A (en) * 2015-02-13 2016-10-05 深圳市普华骏达科技有限公司 Method and system suitable for implanting and applying various information interaction equipment APPs (Applications)
CN106464489A (en) * 2014-06-25 2017-02-22 高通股份有限公司 Enhanced secure identity generation
CN107798546A (en) * 2017-11-07 2018-03-13 王清萍 Utilize the commodity the method for distinguishing of Randomised code acquisition discrimination result
CN108353069A (en) * 2015-11-19 2018-07-31 惠普发展公司,有限责任合伙企业 It is established via the communication link of identifier
CN108391266A (en) * 2018-01-03 2018-08-10 广州杰赛科技股份有限公司 Safe checking method, system and storage medium
CN109948320A (en) * 2019-03-22 2019-06-28 泰康保险集团股份有限公司 Identity identification managing method, device, medium and electronic equipment based on block chain
CN111369673A (en) * 2020-03-26 2020-07-03 江西服装学院 Three-dimensional fitting simulation system
CN117062037A (en) * 2023-10-11 2023-11-14 长沙盈芯半导体科技有限公司 RFID tag data processing method, device, base station, computer equipment and medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1584911A (en) * 2004-05-31 2005-02-23 上海复旦微电子股份有限公司 Antifogery method by mobile communicating apparatus and electronic label
CN101304597A (en) * 2007-05-08 2008-11-12 上海中策工贸有限公司 Mobile internet equipment reader-writer and uses thereof
CN101504715A (en) * 2009-03-04 2009-08-12 深圳市众合联科技有限公司 Product identity digital identification apparatus, inspection apparatus, product and anti-fake inspection method
CN101945123A (en) * 2010-08-24 2011-01-12 刘彤 RFID mobile phone and combination key technology-based authenticity identification method
CN102982463A (en) * 2012-12-05 2013-03-20 熊文俊 Commodity anti-counterfeiting system and two-channel method to realize commodity anti-counterfeiting
CN103065168A (en) * 2012-12-19 2013-04-24 深圳市江波龙电子有限公司 Anti-fake method and system of radio frequency identification
CN103325042A (en) * 2013-05-17 2013-09-25 包晗 Tracing anti-fake market interaction integration system and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1584911A (en) * 2004-05-31 2005-02-23 上海复旦微电子股份有限公司 Antifogery method by mobile communicating apparatus and electronic label
CN101304597A (en) * 2007-05-08 2008-11-12 上海中策工贸有限公司 Mobile internet equipment reader-writer and uses thereof
CN101504715A (en) * 2009-03-04 2009-08-12 深圳市众合联科技有限公司 Product identity digital identification apparatus, inspection apparatus, product and anti-fake inspection method
CN101945123A (en) * 2010-08-24 2011-01-12 刘彤 RFID mobile phone and combination key technology-based authenticity identification method
CN102982463A (en) * 2012-12-05 2013-03-20 熊文俊 Commodity anti-counterfeiting system and two-channel method to realize commodity anti-counterfeiting
CN103065168A (en) * 2012-12-19 2013-04-24 深圳市江波龙电子有限公司 Anti-fake method and system of radio frequency identification
CN103325042A (en) * 2013-05-17 2013-09-25 包晗 Tracing anti-fake market interaction integration system and method

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106464489A (en) * 2014-06-25 2017-02-22 高通股份有限公司 Enhanced secure identity generation
CN105391680A (en) * 2014-08-27 2016-03-09 霍夫曼-拉罗奇有限公司 Identification, authentication and authorization method in a laboratory system
US10944760B2 (en) 2014-08-27 2021-03-09 Roche Diagnostics Operations, Inc. Identification, authentication, and authorization method in a laboratory system
CN105391680B (en) * 2014-08-27 2020-05-22 霍夫曼-拉罗奇有限公司 Identification, authentication and authorization method in laboratory system
US10491604B2 (en) 2014-08-27 2019-11-26 Roche Diagnostics Operations, Inc. Identification, authentication, and authorization method in a laboratory system
WO2016116023A1 (en) * 2015-01-20 2016-07-28 中兴通讯股份有限公司 Ornament and ornament identifying system
CN105988802A (en) * 2015-02-13 2016-10-05 深圳市普华骏达科技有限公司 Method and system suitable for implanting and applying various information interaction equipment APPs (Applications)
CN105704715A (en) * 2015-04-10 2016-06-22 浙江公共安全技术研究院有限公司 Secure communication authentication method of mobile terminal
CN104811312A (en) * 2015-05-25 2015-07-29 王旭东 Terminal course identity authentication method based on center authorization
CN108353069A (en) * 2015-11-19 2018-07-31 惠普发展公司,有限责任合伙企业 It is established via the communication link of identifier
CN108353069B (en) * 2015-11-19 2021-10-29 惠普发展公司,有限责任合伙企业 Computing device and communication system
CN105610841B (en) * 2015-12-31 2020-10-23 国网智能电网研究院 User information authentication method based on traceability
CN105610841A (en) * 2015-12-31 2016-05-25 国网智能电网研究院 User information authentication method based on traceability
CN107798546A (en) * 2017-11-07 2018-03-13 王清萍 Utilize the commodity the method for distinguishing of Randomised code acquisition discrimination result
CN108391266A (en) * 2018-01-03 2018-08-10 广州杰赛科技股份有限公司 Safe checking method, system and storage medium
CN108391266B (en) * 2018-01-03 2021-09-17 广州杰赛科技股份有限公司 Security verification method, system and storage medium
CN109948320B (en) * 2019-03-22 2021-08-10 泰康保险集团股份有限公司 Block chain-based identity recognition management method, device, medium and electronic equipment
CN109948320A (en) * 2019-03-22 2019-06-28 泰康保险集团股份有限公司 Identity identification managing method, device, medium and electronic equipment based on block chain
CN111369673A (en) * 2020-03-26 2020-07-03 江西服装学院 Three-dimensional fitting simulation system
CN117062037A (en) * 2023-10-11 2023-11-14 长沙盈芯半导体科技有限公司 RFID tag data processing method, device, base station, computer equipment and medium
CN117062037B (en) * 2023-10-11 2023-12-29 长沙盈芯半导体科技有限公司 RFID tag data processing method, device, base station, computer equipment and medium

Similar Documents

Publication Publication Date Title
CN103607283A (en) Target authentication method based on mobile device and authentication center
US8646686B2 (en) Secure system for creating and validating personal identification cards with operator discretion
US9946865B2 (en) Document authentication based on expected wear
CN108062466A (en) The system and method for the anti-tamper anti-counterfeiting of ID card information in the Internet, applications
US8903181B2 (en) Low cost unique identification generation using combination of patterns and unique code images
CN111612966B (en) Bill certificate anti-counterfeiting detection method and device based on image recognition
CN100576942C (en) A kind of mobile antifogery method and system thereof based on mobile phone
US20140095398A1 (en) Double ID Anti-Counterfeit Method and System
CN102129589A (en) Asymmetric encryption two-dimension code anti-counterfeiting method
CN105765595A (en) System and method for verifying an identification token
CN111612963B (en) Bill voucher anti-counterfeiting detection method and device based on intelligent equipment
CN103699995A (en) Payment authentication method based on fingerprints and finger veins
JP2020521260A (en) Product counterfeit prevention verification system based on natural biological information
US20200274714A1 (en) System for, method of, and server computer system for implementing transformation of an original entity into a verifiably authenticable entity in a heterogeneous communications network environment
CN106850667A (en) It is a kind of to continue certification security protection system and its method
KR20170011305A (en) Electronic identification card, system and method for proving authenticity of the electronic identification card
JP2017532696A (en) Method and authentication system for registering random security functions
CN104036399A (en) True and false identification method based bar code scanning and dynamic password
JP2020013525A (en) Authentication device, authentication system, and authentication method
US20210090011A1 (en) Identifying and Tracking System for Searching Items
JP4322455B2 (en) Method and system for confirming originality of recorded information
CN105187404B (en) A kind of document security querying method and device based on Cloud Server
US10061981B2 (en) Security improvements for tickets
JP7176655B1 (en) Authenticity determination method, authenticity determination system, and authenticity determination device
CN111612964B (en) Bill certificate anti-counterfeiting detection method and device based on block chain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140226