CN103763007B - Identification method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology - Google Patents

Identification method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology Download PDF

Info

Publication number
CN103763007B
CN103763007B CN201410006048.3A CN201410006048A CN103763007B CN 103763007 B CN103763007 B CN 103763007B CN 201410006048 A CN201410006048 A CN 201410006048A CN 103763007 B CN103763007 B CN 103763007B
Authority
CN
China
Prior art keywords
false proof
mobile phone
owner
token
counterfeiting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410006048.3A
Other languages
Chinese (zh)
Other versions
CN103763007A (en
Inventor
张诗悦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410006048.3A priority Critical patent/CN103763007B/en
Publication of CN103763007A publication Critical patent/CN103763007A/en
Application granted granted Critical
Publication of CN103763007B publication Critical patent/CN103763007B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides an identification method, an anti-counterfeiting device and an anti-counterfeiting system based on the near-field communication technology. Owner identification requests and non-owner identification requests are adopted in the identification method. According to the identification method, identification of identities of owners of artworks can be achieved through the incidence relations between label IDs and anti-counterfeiting object IDs and between the label IDs and owner IDs. The anti-counterfeiting system comprises an anti-counterfeiting label, an anti-counterfeiting mobile phone and an anti-counterfeiting server, the anti-counterfeiting label, the anti-counterfeiting mobile phone and the anti-counterfeiting server are restricted and associated mutually, effective identification information can be generated only by updating data in the anti-counterfeiting label, data in the anti-counterfeiting mobile phone and data in the anti-counterfeiting server at the same time, and therefore the safety and the reliability in the artwork transaction process are improved.

Description

It is a kind of based on the authentication method of near-field communication technology, false proof device and Antiforge system
Technical field
The present invention relates to near-field communication technology, it is more particularly to a kind of based on the art work authentication method of near-field communication technology, False proof device and Antiforge system.
Background technology
In recent years art work collection is fast-developing, and with the art sales market boom is fakement great Dang Qi roads. Therefore, that how to set up that art work registration conveniently, reliable, authoritative, identification, transfer system be always that artwort market faces asks Topic.
Existing electronic anti-fogery technology mainly includes two ways:Carried out as label using bar code or Quick Response Code false proof;With The modes such as RFID store digital anti-counterfeiting label using task equipment read label information carry out it is false proof.
The former shortcoming is that the cost of reproduction of bar code or Quick Response Code is low, as long as this yard is replicated into the genuine piece that can disguise oneself as. The latter is more advanced compared with the former technology, but equally exists limitation:First, need to be scanned using proprietary instrument, generally bag Including can carry out computer, label reader of network service etc., not portable and deployment.Second, merely anti-counterfeiting object is carried out Digital independent and verification, it is impossible to exclude false proof instrument and fake this problem.Cannot identify that this is false proof in anti-counterfeiting object qualification process The owner of object and all relations of anti-counterfeiting object.
The content of the invention
It is an object of the invention to one of above-mentioned technical problem is solved, according to one embodiment of present invention, there is provided one Plant based on the art work authentication method of near-field communication technology, including:
S501, anti-counterfeit server is received and stores the false proof mobile phone of the carrying owner from false proof mobile phone intelligent card described in the owner In transfer the first counterfeiting token the owner identification request (608), create and store the owner identification token (609), send To the false proof mobile phone of the owner;
S502, antifalsification label receives owner's identification request (610) that the false proof mobile phone of the owner sends, and second is prevented Pseudo- token secure is sent to the false proof mobile phone of the owner (612);
S503, the false proof mobile phone of the owner identifies token according to the first counterfeiting token, the second counterfeiting token and the owner Calculate first identification response (RES1), to anti-counterfeit server send carrying it is described first identification response (RES1), anti-counterfeiting object ID, Identification request (616) of owner's ID;
S504, the anti-counterfeit server is according to corresponding to anti-counterfeiting object ID in the identification request and is stored in described false proof Second counterfeiting token of server, the first counterfeiting token and the owner identification identification response of token computation second (RES2), if second identification response (RES2) is equal to the described first identification response (RES1), correct judgment, inspection institute Whether consistent with the ID being associated with anti-counterfeiting object ID in the identification request state owner's ID in identification request, The correct judgment if consistent, creates and preserves owner's search sequence number (S1) (617), while the owner is inquired about into sequence Row number (S1) is sent to the false proof mobile phone of the owner (618), is deleted the owner and is identified token.
Preferably, in S503, the false proof mobile phone of the owner to anti-counterfeit server sends carrying the first identification response (RES1), the identification request of anti-counterfeiting object ID, owner's ID and other the false proof phone numbers for needing to receive qualification result (616);
In S504, owner's search sequence number (S1) is sent into the identification request and is needed by the anti-counterfeit server Receive other false proof phone numbers (619) of qualification result.
Preferably, in S502, antifalsification label receives owner's identification request that the false proof mobile phone of the owner sends (610), public key is included in owner's identification request, antifalsification label verifies the public key (611).
Additionally, in S504, the anti-counterfeit server storage qualification time is simultaneously related to owner's ID by qualification time Connection;And the false proof mobile phone of the owner or described need other the false proof mobile phones for receiving qualification result to log in the false proof clothes Business device is input into owner's search sequence number (S1), inquires about this time false proof result, and the false proof result includes qualification time.
Preferably, in S501, anti-counterfeit server creates and stores owner's identification token time limit simultaneously;
In S504, when the anti-counterfeit server confirms that this owner's qualification process is not above owner's identification token Limit, and delete owner's identification token time limit.
Additionally, in S502, antifalsification label calculates the 5th tag security information (Y5) by parameter of the second counterfeiting token (611), and by the 5th tag security information (Y5) mobile phone false proof to the owner is sent) (612);
In S503, the false proof mobile phone intelligent card of the owner is calculated with the 5th tag security information (Y5) as parameter (613-614), the false proof mobile phone of the owner is with first result (J1) and the false proof mobile phone intelligence of the owner for first result (J1) The first counterfeiting token calculates the second result (J2) for parameter in blocking, then with second result (J2) and owner's writ of appraisement Board is that parameter calculates the first identification response (RES1) (615):
In S504, the anti-counterfeit server is according to corresponding to anti-counterfeiting object ID in the identification request and is stored in described anti- The second counterfeiting token in pseudo server calculates the 6th tag security information (Y6) with the same computational methods of the antifalsification label, And by the 6th tag security information (Y6) by calculating the 3rd with the same computational methods of the false proof mobile phone intelligent card of the owner As a result (J3), further according to the 3rd result (J3) and the first counterfeiting token being stored in the anti-counterfeit server by with institute State the same computational methods of the false proof mobile phone of the owner and calculate the 4th result (J4), further according to the 4th result (J4) and the institute The person of having identifies token to calculate the second identification response (RES2) (617) with the same computational methods of the false proof mobile phone of the owner.
According to another embodiment of the present invention, also provide a kind of art work nonowners based on near-field communication technology to identify Method, including:
S801, anti-counterfeit server receives and stores nonowners' identification request of the false proof cellphone subscriber ID of carrying nonowners (903) nonowners' identification token (904), are created and stored, mobile phone false proof to the nonowners is sent;
S802, antifalsification label receives nonowners' identification request (905) that the false proof mobile phone of the nonowners sends, by the Two counterfeiting tokens are sent safely to the false proof mobile phone of the nonowners (907) with anti-counterfeiting object ID;
S803, the false proof mobile phone of the nonowners to the false proof mobile phone of the owner initiate to carry anti-counterfeiting object ID, second Identification request (908) of counterfeiting token and nonowners identification token;
S804, the false proof mobile phone of the owner receives identification request, and the false proof mobile phone of the owner is according to the second false proof order The first counterfeiting token calculates safe result (911) in board and the false proof mobile phone intelligent card of the owner, and by safe result and the owner ID is sent to the false proof mobile phone of the nonowners (912);
S805, the false proof mobile phone of the nonowners is according to the safe result and nonowners identification token computation the Three identification response (RES3) (913), to anti-counterfeit server send carry it is described 3rd identification response (RES3), anti-counterfeiting object ID, Nonowners' identification request (914) of owner's ID;
S806, the anti-counterfeit server is according to corresponding to anti-counterfeiting object ID in nonowners identification request and is stored in Second counterfeiting token of the anti-counterfeit server and the first counterfeiting token calculate the 4th identification response (RES4);If the described 4th Identification response (RES4) is equal to the described 3rd identification response (RES3), then correct judgment, checks the owner in the identification request Whether associated with the identification request anti-counterfeiting object ID ID ID be consistent, the correct judgment if consistent, wound Nonowners' search sequence number (S2) (915) is built and preserves, while nonowners' search sequence number (S2) is sent to institute The false proof mobile phone of nonowners (916) are stated, the nonowners is deleted and is identified token.
In S802, antifalsification label receives nonowners' identification request (905) institute that the false proof mobile phone of the nonowners sends State in nonowners' identification request and verify the public key (906) comprising public key, antifalsification label.
In S806, the anti-counterfeit server storage qualification time is simultaneously associated qualification time with owner's ID;With And the false proof mobile phone of the nonowners logs in the anti-counterfeit server and is input into nonowners' search sequence number (S2), inquires about this Secondary false proof result, the false proof result includes qualification time.
Preferably, in S801, anti-counterfeit server creates and stores nonowners' identification token time limit simultaneously;
In S806, the anti-counterfeit server confirms that this nonowners' qualification process is not above nonowners' identification token Time limit, and delete nonowners' identification token time limit.
Additionally, in S802, antifalsification label calculates the 7th tag security information (Y7) by parameter of the second counterfeiting token;And will 7th tag security information (Y7) and anti-counterfeiting object ID send mobile phone false proof to the nonowners;
In S803, the false proof mobile phone of the nonowners to the false proof mobile phone of the owner initiate to carry anti-counterfeiting object ID, the Identification request (908) of seven tag security information (Y7) and nonowners identification token;
In S804, the false proof mobile phone of the owner receives nonowners' identification request, the false proof cell phone intelligent of the owner Card calculates the 5th result (J5) with the 7th tag security information (Y7) as parameter;The false proof mobile phone of the owner is with described 5th result (J5) and to be stored in the false proof mobile phone intelligent card of the owner the first counterfeiting token be that parameter calculates the 6th result (J6) As safety result (909-911);
In S806, the anti-counterfeit server is according to corresponding to anti-counterfeiting object ID in nonowners identification request and stores It is that parameter calculates the 8th tag security information (Y8) in the second related counterfeiting token of the anti-counterfeit server;Again with the 8th label Safety information (Y8) is that parameter calculates the 7th result (J7) with the same computational methods of owner's mobile phone intelligent card;Again with In seven results (J7) and nonowners identification request in anti-counterfeiting object ID associated storage and the anti-counterfeit server first Counterfeiting token is to calculate the 8th result (J8) with the false proof mobile phone identical computational methods of the owner by parameter;Further according to It is parameter with to calculate the with the false proof mobile phone identical method of nonowners that eight results (J8) and the nonowners identify token Four identifications response (RES4).
According to still another embodiment of the invention, there is provided a kind of antifalsification label based on near-field communication technology, it is described false proof Label is used to receive identification request (610,905), and the second counterfeiting token for prestoring is transmitted or by prestore second Counterfeiting token and anti-counterfeiting object ID carry out safe transmission.
The antifalsification label is additionally operable to:Owner's identification request (610) is received, comprising public affairs in owner's identification request Key, antifalsification label verifies the public key (611);And/or nonowners' identification request (905) are received, the nonowners reflect Public key is included in fixed request, antifalsification label verifies the public key (906).
The antifalsification label is additionally operable to:Owner's identification request (610) is received, by parameter of the second counterfeiting token the is calculated Five tag security information (Y5) are for transmission;And/or nonowners' identification request (905) are received, it is with the second counterfeiting token Parameter calculates the 7th tag security information (Y7);And send the 7th tag security information (Y7) and anti-counterfeiting object ID (907).
The antifalsification label is additionally operable to:Storage ID, tag ID, anti-counterfeiting object ID and the second counterfeiting token.
A kind of another embodiment of the invention, there is provided the false proof mobile phone of the owner based on near-field communication technology (102-1), the mobile phone is used for:Owner's identification request (608) is initiated to server, carries what is prestored in the identification request First counterfeiting token, and receive owner's identification token (609);
Owner's identification request (610) is initiated to antifalsification label, and the second counterfeiting token, root are received safely from antifalsification label According to the first counterfeiting token, the second counterfeiting token and the owner identification request identification response of token computation first (RES1) that prestore (615);
Send to server carry first identification response (RES1), anti-counterfeiting object ID that prestores and, owner user Identification request (616) of ID.
Wherein:Ask also to be carried in (616) other the false proof handss for needing to receive qualification result to the identification that server sends Machine number.
Wherein:It is to receive to calculate for obtaining by the second counterfeiting token to receive the second counterfeiting token safely from antifalsification label (611-612), the false proof mobile phone intelligent card of the owner is with the 5th tag security information for five tag security information (Y5) (Y5) the first result (J1) is calculated (613-614) for parameter, the false proof mobile phone of the owner is with the first result (J1) and all The first counterfeiting token calculates the second result (J2) for parameter in the false proof mobile phone intelligent card of person;Again with second result (J2) and The owner identifies token and calculates the first identification response (RES1) (615) for parameter.
The mobile phone is additionally operable to:Search sequence number (S1) is received, anti-counterfeit server is logged in and is input into owner's inquiry sequence Row number (S1), inquires about false proof result.
The mobile phone is additionally operable to:Nonowners' mobile phone identification request (908) is received, second in identification request is false proof The first counterfeiting token calculates safe result in token, the false proof mobile phone intelligent card of the owner, and by safe result and owner user ID is transmitted (912).
Wherein:The second counterfeiting token in nonowners' mobile phone identification request (908) replaces with false proof according to second 7th tag security information (Y7) of token computation;
The false proof mobile phone intelligent card of the owner calculates the 5th result with the 7th tag security information (Y7) as parameter (J5)(909-910);The false proof mobile phone of the owner is with the 5th result (J5) and is stored in the false proof cell phone intelligent of the owner The first counterfeiting token is that parameter calculates the 6th result (J6) as safe result in card.
Another embodiment of the invention, also provides a kind of nonowners based on near-field communication technology false proof mobile phone (102-2), the mobile phone is used for:
Nonowners' identification request (903) are initiated to server, in the identification request nonowners' ID is carried, and Nonowners' identification token (904) are received from server;
Nonowners' identification request (905) are initiated to antifalsification label, and the second counterfeiting token is received safely from antifalsification label With anti-counterfeiting object ID (907);
Initiate to carry anti-counterfeiting object ID, the second counterfeiting token and nonowners identification token to owner's mobile phone Identification request (908);
Safe result and owner's ID are received from owner's mobile phone, according to the safe result, the nonowners Identification identification response of token computation the 3rd (RES3) (913);
Send to server and carry the 3rd identification response (RES3), anti-counterfeiting object ID, the non-institute of owner's ID Person's of having identification request (914).
Wherein:Public key is included in nonowners identification request (905) sent to antifalsification label.
Preferably, it is from antifalsification label peace to receive the second counterfeiting token and anti-counterfeiting object ID (907) safely from antifalsification label Full reception calculates the 7th tag security information (Y7) (907) for obtaining by the second counterfeiting token;And
Initiate to carry anti-counterfeiting object ID, the 7th tag security information (Y7) and the nonowners to owner's mobile phone Identification request (908) of identification token.
The mobile phone is additionally operable to:Nonowners' search sequence number (S2) is received, anti-counterfeit server input nonowners are logged in Mirror search sequence number (S2), inquires about false proof result.
According to another embodiment of the present invention, a kind of anti-counterfeit server (103) based on near-field communication technology, institute are also provided Stating server is used for:Identification request (608,903) is received from mobile phone, identification token is created and store for sending (609,904);
Identification request (616,914), the identification request bag ID containing the owner, anti-counterfeiting object are received again from mobile phone ID and identification response (RES1, RES3) calculated by mobile phone, according to corresponding to anti-counterfeiting object ID and storing in the identification request The first counterfeiting token, the second counterfeiting token and the identification token computation identification response (RES2, RES4) in server, such as The identification response that fruit server is calculated is equal to the identification response that mobile phone is calculated, then correct judgment;
Whether owner's ID is corresponding with anti-counterfeiting object ID in identification request in the inspection identification request and stores ID in server is consistent, the correct judgment if consistent;
Create, preserve and send search sequence number;
Delete identification token.
Wherein:Identify that request is owner's identification request from what mobile phone was received, include first in the identification request false proof Token;Or identify that request is nonowners' identification request from what mobile phone was received, comprising nonowners' use in the identification request Family ID.
The server is additionally operable to:Create the identification token time limit;Identification process is not above identifying the token time limit;Delete Except the identification token time limit.
The server is additionally operable to:Storage qualification time is simultaneously associated qualification time with owner's ID.
Finally, according to still another embodiment of the invention, there is provided a kind of Antiforge system (100) based on near-field communication technology: Including aforementioned antifalsification label (101), the false proof mobile phone of the owner (102-1) and anti-counterfeit server (103);Or including aforementioned false proof Label (101), the false proof mobile phone of the owner (102-1), the false proof mobile phone of nonowners and anti-counterfeit server (103).
For prior art, beneficial effects of the present invention are:
1. in owner's identification request process that the present invention is provided, identification is calculated by the first counterfeiting token in false proof mobile phone The owner identifies token;And the common cryptographic in antifalsification label and false proof mobile phone calculates the parameter that anti-counterfeit server is verified, it Between it is completely the same could obtain owner's qualification result information, and also owner's qualification result can be sent to the owner and prevent Other false proof mobile phones that pseudo- mobile phone is specified.Such mode, it is possible to achieve between art work transfer transaction, by the owner actively Initiate requesting query art owner's state of the identification true and false.Increase the safety and reliability of the follow-up transfer transaction of the art work.
2. another nonowners' identification request mechanism that the present invention is also provided.Nonowners pass through the false proof handss of the owner Machine transfers the authentication parameter of the corresponding anti-counterfeiting object of specified antifalsification label, and submits to nonowners to reflect to anti-counterfeit server Fixed request.Can so realize that nonowners actively identify the related letter for specifying the art work before or during art sales Breath, particularly owner information and circulation process.
3. the Antiforge system that the present invention is provided includes antifalsification label, false proof mobile phone, anti-counterfeit server, is mutual between three Restriction and the relation of related association.Either owner's identification request or nonowners' identification request must simultaneously have anti-counterfeiting label Label, false proof mobile phone, the participation of anti-counterfeit server three could produce effective qualification process, therefore increased safety and reliability Property.
Description of the drawings
Fig. 1 is the system block diagram of the present invention.
Fig. 2 is a kind of art work register method flow chart based on near-field communication technology.
Fig. 3 is a kind of art work register method preferred embodiment based on near-field communication technology.
Fig. 4 is antifalsification label, smart card, false proof handss after a kind of art work register method based on near-field communication technology is implemented Data table memory in machine, anti-counterfeit server.
Fig. 5 is a kind of art owners' authentication method flow chart based on near-field communication technology.
Fig. 6 is a kind of art owners' authentication method preferred embodiment based on near-field communication technology.
Fig. 7 is that false proof mobile phone intelligent card and false proof mobile phone calculate identification response schematic diagram in owner's identification request link.
Fig. 8 is a kind of art work nonowners' authentication method flow chart based on near-field communication technology of the present invention.
Fig. 9 is a kind of art work nonowners' authentication method preferred embodiment based on near-field communication technology of the present invention.
The false proof mobile phone intelligent card of nonowners and the false proof mobile phone of the owner and non-in Figure 10 nonowners identification request link The false proof mobile phone of the owner calculates identification response schematic diagram.
Figure 11 is the structural representation of anti-counterfeit server of the present invention.
Figure 12 is the work-based logic schematic diagram of authentication processing unit
Figure 13 is a kind of art work assignment method flow chart based on near-field communication technology of the present invention.
Figure 14 is a kind of art work assignment method preferred embodiment based on near-field communication technology of the present invention.
One of structural representation of the false proof mobile phone of Figure 15 present invention.
The two of the structural representation of the false proof mobile phone of Figure 16 present invention.
Figure 17 is the structural representation of false proof smart card of the invention.
Figure 18 is the structural representation of antifalsification label of the present invention.
Figure 19 is the structural representation of Antiforge system embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to the concrete of the present invention Embodiment is described in further detail.Obviously, described embodiment is only a part of embodiment of the present invention, rather than Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not before creative work is paid All embodiments obtained by putting belong to protection scope of the present invention.
Fig. 1 is the system block diagram of the present invention.As shown in figure 1, the system 100 of the present invention includes:It is antifalsification label 101, false proof Mobile phone 102 and anti-counterfeit server 103, include smart card 104 in false proof mobile phone 102.Antifalsification label is preferably NFC label, prevents Pseudo- mobile phone 102 can read the information of antifalsification label 101, by authentication module and smart card inside false proof mobile phone 102 104 chips carry out safe computations, secondary safety is carried out in false proof mobile phone with reference to false proof ID and is calculated, in false proof service Verified in device 103.Thereby increase the safety and reliability of Antiforge system.
Registration, identification and the transference of the reliable authority of the art work can be realized with the system.Wherein described antifalsification label 101 have globally unique antifalsification label ID, have ID in false proof mobile phone 102 and smart card 104.Carrying out anti-counterfeiting object Registration before, antifalsification label 101 is built in the anti-counterfeiting object that will be registered, and especially, the anti-counterfeiting object can be with For the art work that be registered, identify or transfer the possession of.Anti-counterfeit server 103 distribute for each anti-counterfeiting object and store one it is false proof Object ID.
Here is illustrated:Participate due to having different false proof mobile phones in registration, identification and transference.Cause This, in order to make it easy to understand, can add to false proof mobile phone respectively in Antiforge system registration, identification and transference in this manual To limit.For example:In registration process, because only main body of the owner (or referred to as creator), therefore, false proof mobile phone Do not distinguish, be only expressed as false proof mobile phone 102.In qualification process, there is the difference of owner's identification and nonowners' identification, because This, in qualification process, false proof mobile phone have the false proof mobile phone of the owner and the false proof mobile phone of nonowners point.Make this differentiation be in order to Be easy to describe in qualification process, the false proof mobile phone of the owner and the false proof mobile phone of nonowners accordingly functional relationship when do not cause table The confusion stated.During identification 102, if no special instructions, false proof mobile phone represents the false proof mobile phone of the owner.In transference In, the false proof mobile phone of the owner will be related to and be transferred mobile phone and participated.Therefore, with the false proof mobile phone of the owner is used and will be turned False proof mobile phone is allowed to make a distinction.If no special instructions, false proof mobile phone represents the false proof mobile phone of the owner.It is believed that the present invention is protected The false proof mobile phone of shield is respectively provided with the registration, identification and transference any different appellation main bodys (such as:Registrant, the owner, Nonowners, it is transferred surrenderee) the part or all of function of mobile phone.
Fig. 2 is a kind of art work register method flow chart based on near-field communication technology of the present invention.Using the method skill The creator of art product can be registered to a new art work in server, and give the false proof of the unique mark art work Label.Methods described includes:S201, anti-counterfeit server 103 according to false proof mobile phone 102 transmit come ID and false proof mobile phone 102 tag IDs read from antifalsification label 101 create and store the establishment token that is associated with the tag ID and false proof right As ID.
Antifalsification label 101 has globally unique antifalsification label ID, in this step, with the false proof of tag reading function Mobile phone 102 reads antifalsification label ID, and tag ID and ID is together sent to anti-counterfeit server 103, the false proof clothes It is simultaneously the unique sign of art work distribution one that business device 103 creates according to tag ID and ID and store one to create token Anti-counterfeiting object ID of the art work.
Alternatively, the token that creates can be that the registration of the token with the time limit, the i.e. art work must definited time-lag in advance Inside complete just effectively.For this purpose, the anti-counterfeit server can simultaneously create an establishment token when the establishment token is created Time limit.
In this step, server 103 is received after ID and antifalsification label ID directly by antifalsification label ID and user ID is associated, that is, give tacit consent to antifalsification label ID and belong to the ID.Alternatively, can be before S201, in advance in false proof service The incidence relation of tag ID and ID is stored in device 103, i.e., just in clothes when antifalsification label is actually allocated to certain user In business device this corresponding relation is recorded accordingly and stored.Then when server receives ID and anti-counterfeiting label in S201 Sign and first judge whether the tag ID read from antifalsification label 101 with false proof mobile phone 102 is associated the ID after ID, if closed Connection just creates token and continues subsequent step, and registration failure is returned if not associating.It is possible thereby to further prevent tag ID quilt Situation about usurping, increased the safety and reliability of system.
Additionally, before this step, the step of setting up secure link between server and mobile phone can be included.
S202, the false proof mobile phone 102 receives and stores the establishment token and described anti-from the anti-counterfeit server 103 Pseudo- object ID simultaneously writes tag request to the transmission of the antifalsification label 101.
Antifalsification label 101 can write key with preset, just need when now equipment carries out write operation to antifalsification label 101 Whether preset to write key consistent with this for key of writing in the write request of checking equipment.Therefore, the anti-of key is write for being prefixed When pseudo label 101 carries out write operation, tag ID can be prestored in server 103 and writes key with corresponding label.By preventing Pseudo server 103 writes key according to the label corresponding with the tag ID that tag ID inquiry is prestored;With asymmetric encryption Algorithm transmits the label writes key to mobile phone 102.
Then described false proof mobile phone 102 receives the label and writes key from the anti-counterfeit server 103.The false proof mobile phone Tag request is write in 102 to the antifalsification label (101) transmission, and the tag request of writing includes writing label key.
S203, the antifalsification label 101 writes tag request in the antifalsification label 101 according to the false proof mobile phone 102 Middle write anti-counterfeiting object ID and the ID.Thus, the antifalsification label completes anti-counterfeiting object ID and ID Record.
When antifalsification label is preset write key in the case of, antifalsification label verify first the label write key with anti-counterfeiting label Whether preset label to write key consistent in signing 101.
Preferably, in this step, antifalsification label 101 also calculates the second safety information X2 and passes to the false proof mobile phone 102.Specifically, the antifalsification label 101 calculates the second tag security information X2 according to the tag ID and the ID, And the second tag security information X2 is passed to into the false proof mobile phone 102.Preferably, can be calculated according to tag ID, ID First tag security information X1, and the second tag security information X2 is calculated according to the first tag security information X1; It is highly preferred that the antifalsification label 101 check the label write key it is correct after, it is local according to tag ID, ID and label Key is that parameter calculates the first tag security information X1 with 3DES encryption algorithm, and is according to the first tag security information X1 Parameter calculates the second tag security information X2 with asymmetric arithmetic.The local key of the label can be differently configured from label and write Key, when the local key of label is with writing key and differing, can prestore tag ID with corresponding mark in server 103 Sign local key.
S204, the false proof mobile phone 102 is input into works information by user interface, and according to anti-counterfeiting object ID, institute State works information and the establishment token and send registration request to the anti-counterfeit server 103;Preferably, works described in S204 Information includes:Author information, works content, works description, creative time, creative place.It is highly preferred that when false proof mobile phone is received To after the second safety information X2, the second safety information X2 is carried in the registration request and is sent to server 103.
S205, creates token described with what is received described in the registration request that anti-counterfeit server (103) confirmation is received Establishment token corresponding to anti-counterfeiting object ID is consistent, while determining that the tag ID is registration for the first time, then stores works information, The first counterfeiting token and the second counterfeiting token that generation is associated with anti-counterfeiting object ID, send the false proof mobile phone to (102), the establishment token is deleted.
In the case of antifalsification label also calculates X2, the anti-counterfeit server 103 is according in the registration request Tag ID, the ID for creating corresponding to token and being stored in the anti-counterfeit server 103 with the antifalsification label to calculate X1 identicals method calculates the 3rd tag security information X3, and the anti-counterfeit server (103) is received using asymmetric arithmetic decryption The the second tag security information (X2) for arriving obtains the 4th tag security information (X4), if described 4th tag security information X4 etc. In the 3rd tag security information X3, then the anti-counterfeit server 103 verifies the peace of the second label described in the registration request Full information X2 is correct.
Preferably, corresponding to the establishment token of the anti-counterfeit server 103 in the registration request and store Tag ID, ID and the local key of label in the anti-counterfeit server 103 is that parameter calculates the with 3DES encryption algorithm Three tag security information X3.
When it is the token with the time limit to create token, the anti-counterfeit server 103 also judges that this establishment process does not surpass The establishment token time limit is spent, and when establishment token is deleted, is deleted create the token time limit in the lump.
Preferably, first counterfeiting token and second counterfeiting token can be transmitted with rivest, shamir, adelman.
S206, described in the false proof mobile phone 102 is received by anti-counterfeiting object ID and from the anti-counterfeit server 8 First counterfeiting token writes the smart card 104, and second counterfeiting token is write into the antifalsification label 101.Then delete Except the establishment token.
Fig. 3 is a kind of art work register method preferred embodiment based on near-field communication technology of the present invention.Carrying out this Before the register method of bright offer, it is preferable to carry out secure log, in embodying 301-305 in figure 3:
In a preferred embodiment of the invention, tag ID and ID have been prestored in anti-counterfeit server associates pass System, and the corresponding label of tag ID writes key.
301:Secure connection is set up between false proof mobile phone 102 and anti-counterfeit server 103.
302:False proof mobile phone 102 logs in token by ID to the request of smart card 104.
303:Smart card is generated by computations and logs in token, while by ID and logging in the false proof mobile phone of token return 102。
304:False proof mobile phone is according to ID and logs in token login anti-counterfeit server.
305:Anti-counterfeit server to false proof mobile phone feedback security is logined successfully.
After secure log, step as shown in Figure 3 is carried out:
306:False proof mobile phone reads tag ID in antifalsification label, and the antifalsification label is built in anti-counterfeiting object.
307:Antifalsification label sends antifalsification label ID to the false proof mobile phone.
308:False proof mobile phone creates token according to antifalsification label ID and ID to anti-counterfeit server application.
309:Anti-counterfeit server is received after establishment token request, and whether the incidence relation of confirmation antifalsification label ID and ID It coincide, then creates and store establishment token, establishment token time limit and anti-counterfeiting object ID being associated with the tag ID.It is preferred that Ground, also needs the label for inquiring about the antifalsification label according to tag ID to write key.
310:Token will be created and anti-counterfeiting object ID, the key of writing of antifalsification label are sent to the false proof mobile phone;Wherein, it is excellent Selection of land, antifalsification label write key with rivest, shamir, adelman transmission.
311:The false proof mobile phone receives and the establishment token and described anti-is received and stored from the anti-counterfeit server 8 Pseudo- object ID, it may be preferable that also including the key of writing for receiving antifalsification label, and write close using label is obtained after asymmetric arithmetic decryption Key.
312:False proof mobile phone writes key and initiates to write tag request to antifalsification label by the label, and parameter is included:It is anti- Pseudo- object ID, the ID, the label write key.
313:The antifalsification label is received and verify after request whether correctly label writes key, by anti-counterfeiting object if correct ID, the ID write the antifalsification label;And using 3DES encryption algorithm, it is preferable that with antifalsification label ID, user ID, local key (may differ from label and write key) calculate the first tag security information X1 for parameter, reuse asymmetric calculation Method calculates the second tag security information X2.
314:Second tag security information X2 is back to the false proof mobile phone by the antifalsification label.
315:Works information is input into by false proof cell-phone user interface, including being not limited to author information, works content, works Description, creative time, creative place, other creation characteristic information;Then registration request, parameter bag are initiated to anti-counterfeit server Include:Anti-counterfeiting object ID, the second tag security information X2, the works information and the establishment token.
316:Anti-counterfeit server is received after registration request, according to anti-counterfeiting object ID, recall in anti-counterfeit server with Corresponding anti-counterfeiting object ID and the ID, it is preferable that with antifalsification label ID, ID and the anti-counterfeiting label deposited The local key signed is that parameter calculates the 3rd tag security information X3 to calculate X1 identical modes with antifalsification label, is reused The 4th tag security information X4 is calculated with 313 step identical asymmetric arithmetics;If the 4th tag security information X4 Equal to the 3rd tag security information X2, then judge that the second tag security information X2 is correct;Meanwhile, anti-counterfeit server is true Recognize this time antifalsification label and be registered as registration for the first time, and confirm that what is received creates token with the anti-counterfeiting object for receiving Establishment token corresponding to ID is consistent, then store works information;And generation is associated with anti-counterfeiting object ID and works information The first counterfeiting token and the second counterfeiting token.
317:Anti-counterfeit server to the false proof mobile phone sends first counterfeiting token and the second counterfeiting token;And delete The establishment token.
318:The false proof mobile phone will receive the first counterfeiting token and anti-counterfeiting object ID writes the false proof cell phone intelligent Card.
319:The false proof mobile phone intelligent card writes successfully to false proof confirming phone.
320:The false proof mobile phone is write key and is sent to the antifalsification label and writes tag request by the label, parameter bag Include:Write key and the second counterfeiting token.
321:The antifalsification label is received and verify after request whether correctly label writes key, false proof by second if correct Token writes the antifalsification label.
322:The antifalsification label to false proof the confirming phone writes successfully.
Fig. 4 illustrates all steps of the 301-322 in Fig. 3, in the antifalsification label, the false proof mobile phone and described Formed in anti-counterfeit server one it is interrelated and mutually restrict data.As can be seen from Figure 4:Have passed through above-mentioned steps:Institute State in antifalsification label except the antifalsification label ID that there is originally, be also written into ID, anti-counterfeiting object ID and second false proof Token;And except original ID in the false proof mobile phone, it is also written into anti-counterfeiting object ID;In false proof mobile phone intelligent card except Existing subscriber ID, has been also written into anti-counterfeiting object ID, the first counterfeiting token;And anti-counterfeit server, through above-mentioned register method, remove Original tag ID, ID, have been written to anti-counterfeiting object ID, works information, the first counterfeiting token and the second counterfeiting token. Wherein:The tag ID is corresponded with anti-counterfeiting object ID, the first counterfeiting token, the second counterfeiting token and works information, and It is associated with ID.The formation of above-mentioned data and between mutual relation, the identification and transference after being lay the foundation. For instance, it is preferred that in identification request, related data can be calculated by above-mentioned data, including:5th tag security information X5, 6th tag security information X6, the 7th tag security information X7, the 8th tag security information X8, the first result J1, the second result J2, the 3rd result J3, the 4th result J4, the 5th result J5, the 6th result J6, the 7th result J7, the 8th result J8;The S1 owners Identification search sequence number;S2 nonowners identify search sequence number.
The art work information registering stage is being realized using the system, is being additionally provided a kind of based on the false proof of near-field communication technology System.The Antiforge system includes the label 101, the false proof mobile phone 102 and the anti-counterfeit server 103.
The antifalsification label 101 is used for:Reception writes tag request and writes anti-counterfeiting object ID and ID;And reception is write Tag request writes the second counterfeiting token.
Additionally, the label be additionally operable to according to the tag ID, the ID calculate the second tag security information X2 with For sending.Preferably, the first tag security information X1 is calculated according to tag ID, ID, and according to first tag security Information X1 calculates the second tag security information X2.
Additionally, the label is additionally operable to reception label writes key, check the label to write key and write close with preset label Whether key is consistent.The is calculated if consistent with 3DES encryption algorithm by parameter of the local key of tag ID, ID and label One tag security information X1, and calculate described second with asymmetric arithmetic for parameter according to the first tag security information X1 Tag security information X2.
The false proof mobile phone 102 is used for:Receive from anti-counterfeit server 103 and storage creation token and anti-counterfeiting object ID;Wound Build include that label writes key write tag request, to feed to antifalsification label transmission.Works information, institute are input into by user interface Stating works information includes:Author information, works content, works description, creative time, creative place.And to the false proof service Device 8 sends the registration request for carrying anti-counterfeiting object ID, the works information and the establishment token.Receive the first false proof order Board and the second counterfeiting token, by anti-counterfeiting object ID and receive from the anti-counterfeit server 103 it is described first false proof Token writes the smart card 104, and second counterfeiting token is write into the antifalsification label 101.And delete the establishment Token.
The false proof mobile phone 102 is additionally operable to receive the second tag security information X2;And to the anti-counterfeit server 103 Send the note for carrying the second tag security information X2, anti-counterfeiting object ID, the works information and the establishment token that receive Volume request.
Anti-counterfeit server 103 is used for:According to the ID and tag ID that receive, create and store and the tag ID phase The establishment token of association, token time limit and anti-counterfeiting object ID are created, for sending;And the tag ID that inquiry is prestored Accordingly label writes key;The label is transmitted with rivest, shamir, adelman and writes key.Receive and carry the second tag security letter The registration request of breath (X2), anti-counterfeiting object ID, works information and establishment token.Corresponding to establishment token in registration request And the tag ID that is stored in the anti-counterfeit server (103) and ID with the antifalsification label calculating X1 identical methods The 3rd tag security information X3 is calculated, the anti-counterfeit server 103 decrypts the second tag security information X2 using asymmetric arithmetic The 4th tag security information X4 is obtained, if the 4th tag security information (X4) is equal to the 3rd tag security information (X2), then the anti-counterfeit server (103) verifies the second tag security information (X2) described in the registration request correctly.Confirm Establishment token in the registration request of reception is consistent with the establishment token corresponding to anti-counterfeiting object ID for receiving, it is determined that described Tag ID is registration for the first time, and this registration process is not above the establishment token time limit;Then store works information.Generate The first counterfeiting token being associated with anti-counterfeiting object ID and the second counterfeiting token, for sending.And the deletion establishment Token and establishment token time.
Preferably, corresponding to the establishment token in registration request and it is stored in the anti-counterfeit server 103 Tag ID, ID and the local key of label be that parameter calculates the 3rd tag security information X3 with 3DES encryption algorithm.
The works information includes:Author information, works content, works description, creative time, creative place.
Preferably, and with rivest, shamir, adelman first counterfeiting token and second counterfeiting token are transmitted.
Below the art work register method based on near-field communication technology of the present invention has been described with reference to the accompanying drawings.The method Define the interdependent data that condition each other in server, false proof mobile phone, smart card and antifalsification label, including ID, Tag ID, anti-counterfeiting object ID, key, local key, the first counterfeiting token and second counterfeiting token etc. are write, so that it is guaranteed that each ring Section can complete by the verification of multiple data, so as to realize the art work become art sales behavior safety anti-fake (register, Identification, transfer).Simultaneously creator can in the server record works information, facilitate displaying, the record of art sales behavior And management.
Describe below and realize art work qualification process using the Antiforge system of the present invention.
Qualification process can be divided into owner's identity process and nonowners' identity process according to the difference for initiating main body.Cause This, is divided into the false proof mobile phone of the owner and the false proof mobile phone of nonowners in qualification process.In qualification process, such as nothing is especially said Bright, false proof mobile phone represents the false proof mobile phone of the owner.
Referring to art owners authentication method flow chart of Fig. 5 descriptions based on near-field communication technology.Including as follows Step:
S501, anti-counterfeit server is received and stores the false proof mobile phone of the carrying owner from false proof mobile phone intelligent card described in the owner In owner's identification request of the first counterfeiting token for transferring, create and store owner's identification token, send to described all The false proof mobile phone of person.
When the establishment token is the token with the time limit, anti-counterfeit server creates and stores owner's writ of appraisement simultaneously The board time limit;
S502, antifalsification label receives owner's identification request that the false proof mobile phone of the owner sends, by the second false proof order Board sends safely mobile phone false proof to the owner.
Especially, verification step can be set to the read operation of the antifalsification label, that is, being verified just can be read Operation.In this case, antifalsification label is received can wrap in owner's identification request that the false proof mobile phone of the owner sends Containing public key, antifalsification label verifies the public key, and verification is by just to the owner's the second counterfeiting token of false proof mobile phone transmission.
Wherein described safety is sent and refers to and be not stolen by external equipment and send data in the way of distorting.It is being preferable to carry out In example, antifalsification label calculates the 5th tag security information (Y5) by parameter of the second counterfeiting token, and the 5th tag security is believed Breath (Y5) sends mobile phone false proof to the owner).
S503, the false proof mobile phone of the owner identifies token according to the first counterfeiting token, the second counterfeiting token and the owner Calculate first identification response (RES1), to anti-counterfeit server send carrying it is described first identification response (RES1), anti-counterfeiting object ID, The identification request of owner's ID.
In a preferred embodiment, the false proof mobile phone intelligent card of the owner is with the 5th tag security information (Y5) as ginseng Number calculates the first result (J1), and the false proof mobile phone of the owner is with first result (J1) and the false proof cell phone intelligent of the owner The first counterfeiting token calculates the second result (J2) for parameter in card, then with second result (J2) and owner's identification token The first identification response (RES1) is calculated for parameter;
Especially, can also connect including needs in the identification request that the false proof mobile phone of the owner sends to anti-counterfeit server Receive the identification request of other false proof phone numbers of qualification result.
S504, the anti-counterfeit server is according to corresponding to anti-counterfeiting object ID in the identification request and is stored in described false proof Second counterfeiting token of server, the first counterfeiting token and the owner identification identification response of token computation second (RES2), if second identification response (RES2) is equal to the described first identification response (RES1), correct judgment, inspection institute Whether consistent with the ID being associated with anti-counterfeiting object ID in the identification request state owner's ID in identification request, The correct judgment if consistent, creates and preserves owner's search sequence number (S1), while by owner's search sequence number (S1) mobile phone false proof to the owner is sent, the owner is deleted and is identified token.
In a preferred embodiment, the anti-counterfeit server is according to corresponding to anti-counterfeiting object ID in the identification request and stores The second counterfeiting token in the anti-counterfeit server calculates the 6th tag security with the same computational methods of the antifalsification label Information (Y6), and by the 6th tag security information (Y6) by with the same computational methods meter of the false proof mobile phone intelligent card of the owner The 3rd result (J3) is calculated, further according to the 3rd result (J3) and the first counterfeiting token being stored in the anti-counterfeit server By calculating the 4th result (J4) with the same computational methods of the false proof mobile phone of the owner, further according to the 4th result (J4) Identify token to calculate the second identification response (RES2) with the same computational methods of the false proof mobile phone of the owner with the owner.
When in identification request comprising other phone numbers, the anti-counterfeit server is by owner's search sequence number (S1) sending into the identification request needs to receive other false proof phone numbers of qualification result.
Additionally, the anti-counterfeit server can also store qualification time and qualification time is related to owner's ID Connection;And the false proof mobile phone of the owner or described need other the false proof mobile phones for receiving qualification result to log in the false proof clothes Business device is input into owner's search sequence number (S1), inquires about in this time false proof result and includes qualification time.
When it is described identification token with when prescribe a time limit, the anti-counterfeit server confirms that this owner's qualification process is not above The owner identifies the token time limit, and deletes owner's identification token time limit.
Fig. 6 is a kind of art owners' authentication method preferred embodiment based on near-field communication technology.Here is especially said It is bright:False proof mobile phone in Fig. 6 is the false proof mobile phone of the owner in owner's authentication method.
Secure log is carried out first, in embodying 601-605 in figure 6:
601:Secure connection is set up between false proof mobile phone 102 and anti-counterfeit server 103.
602:False proof mobile phone 102 logs in token by ID to the request of smart card 104.
603:Smart card is generated by computations and logs in token, while by ID and logging in the false proof mobile phone of token return 102。
604:False proof mobile phone is according to ID and logs in token login anti-counterfeit server.
605:Anti-counterfeit server to false proof mobile phone feedback security is logined successfully.
Subsequently, owner's identity process is carried out.
606:False proof mobile phone initiates owner's identification request, Xiang Fang with ID, login token to false proof mobile phone intelligent card Pseudo- mobile phone intelligent card asks the first counterfeiting token.
607:False proof mobile phone intelligent card sends first counterfeiting token to the false proof mobile phone.
608:False proof mobile phone to anti-counterfeit server initiates owner's identification request, the first counterfeiting token described in parameter.
609:Anti-counterfeit server creates and stores owner's identification token and owner's writ of appraisement according to the first counterfeiting token The board time limit;Sending the owner simultaneously identifies token to the false proof mobile phone of the owner.
610:False proof mobile phone lifts owner's identification request by parameter of public key to antifalsification label;Public key is used for asymmetric calculation Method is encrypted.
611:Antifalsification label checks public key, and by parameter of the second counterfeiting token the 5th tag security information of calculating is encrypted Y5。
612:Antifalsification label sends the 5th tag security information Y5 to the false proof mobile phone.
613:The false proof mobile phone intelligent card goes out the first result J1 with the 5th tag security information Y5 computations.
614:The false proof mobile phone intelligent card is sent the first result J1 is calculated to the false proof mobile phone.
615:Preferably, the false proof mobile phone goes out the second result according to the first result J1 and the first counterfeiting token computations J2;Go out the first identification response RES1 further according to the second result J2 and owner's identification token computations.
616:False proof mobile phone connects further according to the described first identification response RES1, anti-counterfeiting object ID, owner's ID, needs Other the false proof phone numbers for receiving qualification result send identification request to the anti-counterfeit server.
617:Anti-counterfeit server is received after owner's identification request, and the anti-counterfeit server is prevented in being asked according to the identification The second related counterfeiting token of pseudo- object ID calculates the 6th tag security information Y6;And by the 6th tag security information Y6 by with The same computational methods of the false proof mobile phone intelligent card of the owner calculate the 3rd result J3;Further according to the 3rd result J3, One counterfeiting token with the same computational methods of the false proof mobile phone of the owner by calculating the 4th result J4;Further according to the described 4th As a result J4, the owner identification identification of token computation second respond RES2, if the second identification response RES2 is equal to institute The first identification response RES1 is stated, then correct judgment;And check in the identification request owner's ID whether with the identification The associated ID of request anti-counterfeiting object ID is consistent, the correct judgment if consistent;And institute in checking the identification to ask Whether associated with the identification request anti-counterfeiting object ID person's of having ID ID be consistent, judges just if consistent Really;Store qualification time simultaneously to be associated with owner's ID;Create and preserve owner's search sequence S1;Delete described The owner identifies token and owner's identification token time limit.
618:Anti-counterfeit server sends owner's search sequence S1 to false proof mobile phone.
619:Anti-counterfeit server sends owner's search sequence S1 into the identification request to be needed to receive identification knot Other phone numbers of fruit;Delete owner's identification token.
620:Other the false proof mobile phones for receiving owner's search sequence S1 can be according to owner's search sequence S1 Inquire about the result of this authentication.
Fig. 7 shows that preferred embodiment antifalsification label and owner's mobile phone calculate the flow chart of RES1.
Fig. 8 is a kind of art work nonowners' authentication method flow chart based on near-field communication technology of the present invention.Including:
S801, anti-counterfeit server receive and store carry nonowners' identification of the false proof cellphone subscriber ID of nonowners please Ask, create and store nonowners' identification token, send mobile phone false proof to the nonowners.
When the establishment token is the token with the time limit, anti-counterfeit server creates and stores nonowners' identification simultaneously The token time limit.
S802, antifalsification label receives nonowners' identification request that the false proof mobile phone of the nonowners sends, and second is prevented Pseudo- token sends safely mobile phone false proof to the nonowners with anti-counterfeiting object ID.
Especially, verification step can be set to the read operation of the antifalsification label, that is, being verified just can be read Operation.In this case, can in nonowners' identification request that the false proof mobile phone of the antifalsification label reception nonowners sends So that comprising public key, antifalsification label verifies the public key, verification sends the second counterfeiting token by ability to the false proof mobile phone of nonowners.
Wherein described safety is sent and refers to and be not stolen by external equipment and send data in the way of distorting.It is being preferable to carry out In example, antifalsification label calculates the 7th tag security information (Y7) by parameter of the second counterfeiting token;And believe the 7th tag security Breath (Y7) and anti-counterfeiting object ID send mobile phone false proof to the nonowners.
S803, the false proof mobile phone of the nonowners to the false proof mobile phone of the owner initiate to carry anti-counterfeiting object ID, second The identification request of counterfeiting token and nonowners identification token.
In a preferred embodiment, the false proof mobile phone of the nonowners initiates to carry described false proof right to the false proof mobile phone of the owner As ID, the 7th tag security information (Y7) and the nonowners identify the identification request of token.
S804, the false proof mobile phone of the owner receives identification request, and the false proof mobile phone of the owner is according to the second false proof order The first counterfeiting token calculates safe result in board and the false proof mobile phone intelligent card of the owner, and by safe result and owner's ID It is sent to the false proof mobile phone of the nonowners.
In a preferred embodiment, the false proof mobile phone of the owner receives nonowners' identification request, and the owner is false proof Mobile phone intelligent card calculates the 5th result (J5) with the 7th tag security information (Y7) as parameter;The false proof handss of the owner Machine is with the 5th result (J5) and is stored in the false proof mobile phone intelligent card of the owner the first counterfeiting token and calculates the 6th as parameter As a result (J6) is used as safe result.
S805, the false proof mobile phone of the nonowners is according to the safe result and nonowners identification token computation the Three identifications response (RES3), send to anti-counterfeit server and carry the 3rd identification response (RES3), anti-counterfeiting object ID, the owner Nonowners' identification request of ID;
S806, the anti-counterfeit server is according to corresponding to anti-counterfeiting object ID in nonowners identification request and is stored in Second counterfeiting token of the anti-counterfeit server and the first counterfeiting token calculate the 4th identification response (RES4);If the described 4th Identification response (RES4) is equal to the described 3rd identification response (RES3), then correct judgment, checks the owner in the identification request Whether associated with the identification request anti-counterfeiting object ID ID ID be consistent, the correct judgment if consistent, wound Nonowners' search sequence number (S2) is built and preserves, while nonowners' search sequence number (S2) is sent to the non-institute The false proof mobile phone of the person of having (916), deletes the nonowners and identifies token.
In a preferred embodiment, the anti-counterfeit server is right according to anti-counterfeiting object ID institute in nonowners identification request And should be stored in the second related counterfeiting token of the anti-counterfeit server is that parameter calculates the 8th tag security information (Y8);Again with 8th tag security information (Y8) is that parameter calculates the 7th result with the same computational methods of owner's mobile phone intelligent card (J7);Again with anti-counterfeiting object ID associated storage and the false proof service in the 7th result (J7) and nonowners identification request The first counterfeiting token in device is to calculate the 8th result (J8) with the false proof mobile phone identical computational methods of the owner by parameter; Further according to the 8th result (J8) and the nonowners identify token as parameter with the false proof mobile phone identical of nonowners Method calculates the 4th identification response (RES4).
Additionally, the anti-counterfeit server also stores qualification time and is associated qualification time with owner's ID;With And the false proof mobile phone of the nonowners logs in the anti-counterfeit server and is input into nonowners' search sequence number (S2), inquires about this Secondary false proof result, the false proof result includes qualification time.
When it is described identification token with when prescribe a time limit, the anti-counterfeit server confirms that this nonowners' qualification process does not surpass Nonowners' identification token time limit is spent, and is deleted nonowners' identification token time limit.
Fig. 9 is a kind of art work nonowners' authentication method preferred embodiment based on near-field communication technology of the present invention.
Secure log is carried out first, in embodying 901-902 in fig .9:
901:The false proof mobile phone of nonowners is with nonowners' ID and logs in token login anti-counterfeit server.
902:Anti-counterfeit server to the false proof mobile phone feedback security of nonowners is logined successfully.
Subsequently, nonowners' identity process is carried out.
903:Nonowners' false proof mobile phone false proof cellphone subscriber ID requests nonowners identification token of nonowners.
904:Anti-counterfeit server identifies that request creates and store nonowners' identification token and not all according to nonowners Person identifies the token time limit.
905:The false proof mobile phone of nonowners lifts nonowners' identification request by parameter of public key to antifalsification label;Public key is used In asymmetric arithmetic encryption.
906:Antifalsification label checks public key, and by parameter of the second counterfeiting token the 7th tag security information of calculating is encrypted Y7。
907:7th tag security information Y7 and anti-counterfeiting object ID are sent into mobile phone false proof to the nonowners.
908:The false proof mobile phone of the nonowners is according to anti-counterfeiting object ID, the 7th tag security information Y7 and described non- Owner's identification request token to the false proof mobile phone of the owner initiates identification request.
909:The false proof mobile phone intelligent card of the owner adds according to the 7th tag security information Y7 that the false proof mobile phone of the owner sends The 5th result J5 of close calculating.
910:The false proof mobile phone intelligent card of the owner and by the 5th result J5 to the false proof mobile phone of the owner.
911:The false proof mobile phone of the owner is according to the 5th result J5 and the false proof counterfeiting token of mobile phone first encryption of the owner Calculate the 6th result J6.
912:Owner's ID and the 6th result J6 are sent to the nonowners by the false proof mobile phone of the owner to be prevented Pseudo- mobile phone.
913:The false proof mobile phone of the nonowners is further according to the 6th result J6, nonowners identification token encryption Calculate the 3rd identification response RES3;According to anti-counterfeiting object ID.
914:The false proof mobile phone owner ID of the nonowners, the 3rd identification response RES3 are to the server Initiate nonowners' identification request.
915:The anti-counterfeit server is false proof according to anti-counterfeiting object ID is related in nonowners identification request second Safety information Y8 of token computations label the 8th, and go out the 7th result J7 according to the 8th safety information Y8 computations; Go out the 8th result J8 further according to the 7th result J7, the first counterfeiting token computations;Further according to the 8th result, Nonowners' identification token computations the 4th identify response RES4;If the 4th identification response RES4 is equal to the described 3rd Identification responds RES3, then correct judgment;Whether owner's ID is false proof with the identification request in the inspection identification request The associated ID of object ID is consistent, the correct judgment if consistent;Confirm that this nonowners' qualification process does not surpass Spend nonowners' identification token time limit;Store qualification time simultaneously to be associated with owner's ID;Create and preserve not all Person's search sequence S2.
916:Nonowners' search sequence S2 is sent into mobile phone false proof to the nonowners;Delete the non-institute The person of having identifies token and nonowners' identification token.
Figure 10 shows that preferred embodiment antifalsification label and owner's mobile phone and nonowners' mobile phone calculate the flow process of RES3 Figure.
The Antiforge system 100 based on near-field communication technology of the present embodiment, it is possible to achieve the above-mentioned art work identifies function.Institute Antiforge system is stated including antifalsification label 101, false proof mobile phone 102 and anti-counterfeit server 103.Main body difference is initiated according to identification, is prevented Pseudo- mobile phone includes the false proof mobile phone 102-1 of the owner and false proof mobile phone 102-2 of nonowners.
The antifalsification label 101 is used for:Owner's identification request is received, in the owner's identification request public key is included, Antifalsification label verifies the public key;And/or nonowners' identification request is received, comprising public affairs in nonowners' identification request Key, antifalsification label verifies the public key.
Identifying for the reception is asked to be owner's identification request, with the second counterfeiting token as parameter calculating the 5th Tag security information (Y5) is for transmission;It is anti-with second and/or identifying for the reception asks to be asked for nonowners' identification Pseudo- token is that parameter calculates the 7th tag security information (Y7);And send the 7th tag security information (Y7) and anti-counterfeiting object ID.
The antifalsification label is used to store ID, tag ID, anti-counterfeiting object ID and the second counterfeiting token.
The false proof mobile phone 102-1 of the owner, is used for:Owner's identification request, the identification request are initiated to server It is middle to carry the first counterfeiting token for prestoring, and receive owner's identification token.Owner's identification request is initiated to antifalsification label, and The second counterfeiting token is received safely from antifalsification label, according to the first counterfeiting token, the second counterfeiting token and the owner mirror for prestoring Surely identification response of token computation first (RES1) is asked;Send carrying first identification response (RES1), prestore to server Anti-counterfeiting object ID and, the identification of owner's ID request (616).
It is to receive to calculate the 5th mark for obtaining by the second counterfeiting token to receive the second counterfeiting token safely from antifalsification label Safety information (Y5) is signed, the false proof mobile phone intelligent card of the owner is calculated with the 5th tag security information (Y5) as parameter First result (J1), the false proof mobile phone of the owner is false proof with the first result (J1) and the false proof mobile phone intelligent card of the owner first Token calculates the second result (J2) for parameter;Identify that token calculates the as parameter with second result (J2) and the owner again One identification response (RES1).
Additionally, the mobile phone is asked in (616) to the identification that server sends, and also carrying needs its of reception qualification result His false proof phone number.
The mobile phone is additionally operable to:Search sequence number (S1) is received, anti-counterfeit server is logged in and is input into owner's inquiry sequence Row number (S1), inquires about false proof result.
Preferably, the mobile phone also has the function of coordinating nonowners' identification, that is, receiving the identification of nonowners' mobile phone please Ask, the first counterfeiting token calculates safety knot in the second counterfeiting token, the false proof mobile phone intelligent card of the owner in identification request Really, and by safety result and owner's ID it is transmitted.
Wherein:The second counterfeiting token in nonowners' mobile phone identification request is replaced with according to the second counterfeiting token meter The 7th tag security information (Y7) calculated.
The false proof mobile phone intelligent card of the owner calculates the 5th result with the 7th tag security information (Y7) as parameter (J5);The false proof mobile phone of the owner is with the 5th result (J5) and is stored in the false proof mobile phone intelligent card of the owner first and prevents Pseudo- token is that parameter calculates the 6th result (J6) as safe result.
The false proof mobile phone 102-2 of the nonowners, for initiating nonowners' identification request to server, the identification please Middle carrying nonowners' ID is sought, and nonowners' identification token is received from server.Nonowners are initiated to antifalsification label Identification request, and the second counterfeiting token and anti-counterfeiting object ID are received safely from antifalsification label.Initiate to carry institute to owner's mobile phone State the identification request of anti-counterfeiting object ID, the second counterfeiting token and nonowners identification token.Receive from owner's mobile phone and pacify Full result and owner's ID, according to the safe result, the nonowners identification identification response of token computation the 3rd (RES3).Carrying the 3rd identification response (RES3), anti-counterfeiting object ID, the not all of owner's ID are sent to server Person's identification request.
Wherein, it is to receive logical safely from antifalsification label to receive the second counterfeiting token and anti-counterfeiting object ID safely from antifalsification label Cross the second counterfeiting token and calculate the 7th tag security information (Y7) for obtaining;And initiate to carry described false proof to owner's mobile phone The identification request of object ID, the 7th tag security information (Y7) and nonowners identification token.
The mobile phone is additionally operable to:Nonowners' search sequence number (S2) is received, anti-counterfeit server input nonowners are logged in Mirror search sequence number (S2), inquires about false proof result.
Wherein:Public key is included in nonowners identification request (905) sent to antifalsification label.
The anti-counterfeit server 103, is used for:Identification request is received from mobile phone, identification token is created and store for sending; Identification request is received again from mobile phone, it is described to identify request bag ID containing the owner, anti-counterfeiting object ID and by mobile phone calculating Identification response (RES1, RES3), according in the identification request corresponding to anti-counterfeiting object ID and be stored in server first Counterfeiting token, the second counterfeiting token and the identification token computation identification response (RES2, RES4), if the mirror that server is calculated Provisioning response is equal to the identification response that mobile phone is calculated, then correct judgment;In the inspection identification request owner's ID whether with Anti-counterfeiting object ID is corresponding in identification request and consistent, the correct judgment if consistent that is stored in the ID in server; Create, preserve and send search sequence number;Delete identification token.
Wherein:Identify that request is owner's identification request from what mobile phone was received, include first in the identification request false proof Token;Or identify that request is nonowners' identification request from what mobile phone was received, comprising nonowners' use in the identification request Family ID.
The server is additionally operable to:Create the identification token time limit;Identification process is not above identifying the token time limit;Delete Except the identification token time limit.
The server is additionally operable to:Storage qualification time is simultaneously associated qualification time with owner's ID.
The system architecture diagram of the present invention is described below:Figure 11 is the structural representation of anti-counterfeit server of the present invention.As schemed Shown in 11, the anti-counterfeit server includes:Authentication processing unit 1101, communication unit 1102, Antiforge system user management list Unit 1103, anti-counterfeiting object data base 1104, authentication result queries processing unit 1105, short message sending unit 1106.Wherein:
Authentication processing unit 1101 is used to receive authentication request (including owner's identification request from communication unit Ask with nonowners' identification) and relevant information, anti-counterfeiting object information is inquired about from anti-counterfeiting object data base, use from Antiforge system Family administrative unit inquires about false proof user profile, identifies false proof user, and to false proof user counterfeiting token is issued, and by safety mould is calculated Block carries out calculating the first identification response that the second identification identification response RES4 of response RES2 or the 4th send with false proof mobile phone The identification response RES3 of RES1 or the 3rd compare, and are true if unanimously, otherwise are false.
Communication unit 110 is used to process the authentication request sent from false proof mobile phone, including owner's identification request Ask with nonowners' identification.
Antiforge system administrative unit 1103 is used to inquire about the mark and safety information of false proof user, logs in token.
Anti-counterfeiting object data base 1104 is anti-for managing anti-counterfeiting object ID, creator's information, the first counterfeiting token and second Pseudo- token.
Authentication result queries processing unit 1105 is used to receive from false proof mobile phone and the result of other ordinary terminals Inquiry request, is inquired about according to the identifying code for reporting.
Short message sending unit 1106 is responsible for sending the identifying code of authentication result to false proof mobile phone and regular handset.
Figure 12 is the work-based logic schematic diagram of authentication processing unit 1101.Wherein:
Step 1201 communication unit receives identification request.
Step 1202 judges whether user is legal, if it is otherwise, it returns to user is illegal.
Step 1203 checks whether user's identification token is legal, and 1004 are turned if not, if turning 1005.
The request of step 1204 authentication is illegal.
Step 1205 is in owner's identification request:Calculate the second identification response RES2 sends with false proof mobile phone first Identification response RES1 is compared, and algorithm is referring to Fig. 7 and correlation step;In nonowners' identification request:Calculate the 4th identification The 3rd identification response RES3 that response RES4 sends with false proof mobile phone compares, and algorithm is referring to Figure 10 and correlation step.
Step 1206 checks whether RES is consistent with RES1, if inconsistent turn 1207;It is consistent then turn 1208.
The request of step 1207 authentication is false.
The request of step 1208 authentication is true.
Below the art work authentication method based on near-field communication technology and device of the present invention have been described with reference to the accompanying drawings. The method defines the interdependent data that condition each other in server, false proof mobile phone, smart card and antifalsification label, including uses Family ID, tag ID, anti-counterfeiting object ID, the first counterfeiting token and the second counterfeiting token, various tag security information Y5, Y7, it is various Intermediate result etc., calculates respectively intermediate data between server and mobile phone and label, and is verified, so that it is guaranteed that links Can be completed by the verification of multiple data, so as to realize that the art work becomes safety anti-fake (registration, the mirror of art sales behavior Fixed, transfer).Simultaneously creator can in the server record works information, facilitate the displaying of art sales behavior, record and Management.
Describe below and realize art work transference using the Antiforge system of the present invention.
When function is transferred the possession of, understand the false proof mobile phone of the owner and be transferred mobile phone and participate.Therefore, function introduction is being carried out When, using the false proof mobile phone of the owner and false proof mobile phone can be transferred accordingly it is introduced.If no special instructions, false proof mobile phone Represent the false proof mobile phone of the owner.
Figure 13 is a kind of art work assignment method flow chart based on near-field communication technology of the present invention, including:
S1301, anti-counterfeit server receives the transfer request sent from false proof mobile phone, and described transfer asks to include being transferred use Family ID and anti-counterfeiting object ID, generate and store the transfer token being associated with anti-counterfeiting object ID, and transmission is included transfers the possession of token Confirm to transfer the possession of request to the false proof mobile phone of the owner and be transferred false proof mobile phone.
In order to ensure assigning security, it is preferable that also included the false proof mobile phone of the owner to false proof before step S1301 The step of object is identified;And/or also anti-counterfeiting object is entered including the false proof mobile phone in the side of being transferred after the step 1301 The step of row identification, owner's identity process of Fig. 5 and Fig. 6, institute are may be referred to the step of the false proof mobile phone of the owner is identified State and be transferred nonowners' identity process that Fig. 8 and Fig. 9 is may be referred to the step of false proof mobile phone is identified.
Wherein, anti-counterfeit server receives the transfer request sent from false proof mobile phone, and the false proof mobile phone is that the owner is false proof Mobile phone or for the false proof mobile phone in the side of being transferred.
S1302, the false proof mobile phone of the owner receives and stores the transfer token, judges whether to confirm that the transfer please Ask, if it is confirmed that then to be associated with anti-counterfeiting object ID in the transfer token in the false proof mobile phone intelligent card of the owner the One counterfeiting token carries out invalid setting, and the second counterfeiting token in pair antifalsification label being associated with the transfer token carries out nothing Effect is arranged;Delete first counterfeiting token and second counterfeiting token simultaneously;
S1303, the server is according to the associated tag ID of the transfer token and is transferred false proof cellphone subscriber ID New the first counterfeiting token and the second counterfeiting token is generated and stored, the first new counterfeiting token and the second false proof order is sent Board is transferred false proof mobile phone to described.
S1304, it is described to be transferred the false proof mobile phone reception first new counterfeiting token and the second counterfeiting token., with The first new counterfeiting token transferred the possession of associated anti-counterfeiting object ID of token and receive from the anti-counterfeit server is write False proof mobile phone intelligent card is transferred described in entering.And by the second described new counterfeiting token received from the anti-counterfeit server and quilt Transfer the possession of ID and write the antifalsification label being associated with the transfer token.
S1305, the anti-counterfeit server includes transferring the possession of the setting successful request of token from false proof mobile phone reception is transferred, will The owner that false proof mobile phone is set to anti-counterfeiting object ID related to token is transferred the possession of is transferred, Transaction Information is recorded;Delete and transfer the possession of Token.
S1306, the anti-counterfeit server to the false proof mobile phone of the former owner and it is described be transferred false proof mobile phone and send transfer the possession of into Work(firmly believes request, and the false proof mobile phone of the former owner is deleted and transfers the possession of token, the first counterfeiting token and the second counterfeiting token;The quilt Transfer the possession of false proof mobile phone and delete transfer token.
Figure 14 is a kind of art work assignment method preferred embodiment based on near-field communication technology of the present invention.
1401:The owner initiates identity process.
1402:It is transferred anti-counterfeiting object ID that mobile phone is read in antifalsification label.
1403:It is transferred mobile phone and will be transferred ID, anti-counterfeiting object ID and sends mobile phone false proof to the owner.
1404:The false proof mobile phone of the owner is turned as parameter with being transferred ID, anti-counterfeiting object ID to anti-counterfeit server request Allow.
1405:Anti-counterfeit server sends transfers the possession of token to the false proof mobile phone of the owner.
1406:Anti-counterfeit server sends the message for confirming to receive to being transferred mobile phone.
1407:Anti-counterfeit server sends identification request and is transferred mobile phone.
1408:It is transferred mobile phone and initiates identity process.
1409:It is transferred mobile phone and sends the message for confirming to accept a delivery acceptance of delivery to server.
1410:Anti-counterfeit server sends the confirmation transfer request for including transferring the possession of token.
1411:The false proof mobile phone of the owner confirms to start to transfer the possession of to anti-counterfeit server.
1412:It is invalid that the false proof mobile phone of the owner arranges the first counterfeiting token in the false proof mobile phone intelligent card of the owner.
1413:The false proof mobile phone intelligent card feedback of the owner arranges the invalid success of the first counterfeiting token.
1414:It is invalid that the false proof mobile phone of the owner arranges the second counterfeiting token in antifalsification label.
1415:Antifalsification label feedback arranges the invalid success of the second counterfeiting token.
1416:The false proof mobile phone of the owner to anti-counterfeit server feed back the first counterfeiting token and the second counterfeiting token it is invalid into Work(.
1417:The server is associated according to described setting in the invalid successful request of counterfeiting token is received with transfer token Tag ID, be transferred false proof cellphone subscriber ID and generate and store new the first counterfeiting token and the second new counterfeiting token.
1418:The anti-counterfeit server sends the first new counterfeiting token and the second new counterfeiting token to described It is transferred false proof mobile phone.
1419:It is described to be transferred false proof mobile phone by with anti-counterfeiting object ID that is associated of transfer token and from described false proof False proof mobile phone intelligent card is transferred described in described new the first counterfeiting token write that server is received.
1420:The mobile phone intelligent card that is transferred writes successfully to the mobile phone feedback that is transferred.
1421:It is described to be transferred mobile phone by the second new counterfeiting token received from the anti-counterfeit server and turned ID is allowed to write the antifalsification label being associated with the transfer token.
1422:The antifalsification label to the mobile phone feedback that is transferred writes successfully.
1423:The anti-counterfeit server is received and is transferred successfully asking including the setting for transferring the possession of token for false proof mobile phone transmission Ask.
1424:The anti-counterfeit server is set to anti-counterfeiting object ID related to token is transferred the possession of by false proof mobile phone is transferred The owner;And record Transaction Information;Delete and transfer the possession of token.
1425:The anti-counterfeit server sends to transfer the possession of to the false proof mobile phone of the former owner successfully firmly believe request.
1426:The false proof mobile phone of the former owner is deleted and transfers the possession of token and the first counterfeiting token and the second counterfeiting token.
The Antiforge system 100 based on near-field communication technology of the present embodiment, it is possible to achieve the above-mentioned art work transfers the possession of function.Institute Stating Antiforge system includes the false proof mobile phone 102-1 of the antifalsification label 101, owner, is transferred false proof mobile phone 102-3 and the false proof clothes Business device 103.
The antifalsification label 101 is used for:Receive and transfer the possession of token, token the second counterfeiting token of setting is invalid according to transferring the possession of, with And transmission arranges the successful message of token valid;Write request is received, the second new counterfeiting token is write according to write request, with And the successful message of transmission write.
Preferably, the antifalsification label:Receive and transfer the possession of token, public key, antifalsification label verification are included in the transfer token The public key.
Preferably, the antifalsification label (101) receives write request, and said write request includes writing key, anti-counterfeiting label Sign and write key described in verification.
The false proof mobile phone 102-1 of the owner, is used for:Antifalsification label is read, antifalsification label ID and anti-counterfeiting object ID is obtained; Send to anti-counterfeit server and transfer the possession of request, the request includes being transferred ID and anti-counterfeiting object ID;Receive from server and wrap The confirmation transfer request for transferring the possession of token is included, judges whether to confirm that described transfer is asked, if it is confirmed that then anti-to the owner Carry out invalid setting with the first counterfeiting token for be associated of anti-counterfeiting object ID in the transfer token in pseudo- mobile phone intelligent card, pair and Second counterfeiting token transferred the possession of in the associated antifalsification label of token carries out invalid setting;Delete described first simultaneously false proof Token and second counterfeiting token.
Wherein, receive and store be transferred mobile phone transmission transfer request include be transferred ID and anti-counterfeiting object ID.
Additionally, the mobile phone also sends the invalid successful request of setting counterfeiting token for including transferring the possession of token to server.
The mobile phone is additionally operable to:Delete and transfer the possession of token, the first counterfeiting token and the second counterfeiting token.
It is described to be transferred false proof mobile phone 102-3, it is used for:Antifalsification label is read, antifalsification label ID and anti-counterfeiting object ID is obtained; Send to owner's mobile phone and transfer the possession of request, described transfer asks to include being transferred ID and anti-counterfeiting object ID;Connect from server Receipts include the transfer confirmation request for transferring the possession of token, and judgement is confirmed whether to accept a delivery acceptance of delivery, and receive new the first counterfeiting token and new The second counterfeiting token;False proof cell phone intelligent will be transferred described in anti-counterfeiting object ID and new the first counterfeiting token write Card, and by the second new counterfeiting token and it is transferred the anti-counterfeiting label that ID write is associated with the transfer token Sign;Delete and transfer the possession of token.
The anti-counterfeit server 103, is used for:Receive anti-counterfeiting object ID and be transferred false proof cellphone subscriber ID, generate and deposit The transfer token that be associated with anti-counterfeiting object ID of storage, the confirmation transfer that transmission has transfer token ask to the false proof mobile phone of the owner with It is transferred false proof mobile phone;According to the associated tag ID of the transfer token and it is transferred false proof cellphone subscriber ID and generates and store The first counterfeiting token newly and the second counterfeiting token, for sending;Include transferring the possession of setting for token from being transferred false proof mobile phone and receiving Successful request is put, the owner that false proof mobile phone is set to and transfers the possession of related anti-counterfeiting object ID of token will be transferred;And record friendship Easy information;Delete and transfer the possession of token.
Figure 15 is one of structural representation of false proof mobile phone of the invention.As shown in figure 15, the false proof mobile phone includes:NFC Control unit 1501, anti-counterfeiting information processing and control element (PCE) 1502, encrypting module 1503, safe data storage unit 1504, communication Unit 1505.
Wherein:NFC control units 1501 are used to be communicated with anti-counterfeiting object, read the mark and safety letter of anti-counterfeiting object Breath, packet ID containing antifalsification label.Anti-counterfeiting information control unit 1502 is used to process false proof request, using counterfeiting token as defeated Enter to call encrypting module to obtain accordingly result.Communication unit 1505 is used for false proof mobile phones all with the communications of anti-counterfeit server Message between anti-counterfeit server.Safe data storage unit 1504 is used to store ID, identification request token (including institute The person of having identifies token and nonowners' identification token).Encrypting module 1503 is used to process from anti-counterfeiting information processing and control element (PCE) CIPHERING REQUEST, if the owner identification ask, flow process such as Fig. 7;Ask if nonowners' identification, flow process such as Figure 10.
The two of the structural representation of the false proof mobile phone of Figure 16 present invention.As shown in figure 16, on the basis of Figure 15, false proof mobile phone Also include:NFC antenna 1607, telecom intelligent card 1606, note receiving unit 1608.Wherein:NFC antenna 1607, for it is anti- Antifalsification label carries out radio communication in pseudo- object;Telecom intelligent card 1606, for storing the ID of false proof user, log-on message;It is short Letter receiving unit 1608, for receiving Antiforge inquiry result, and dependent authentication information.
Figure 17 is the structural representation of false proof smart card of the invention.As shown in figure 17, the smart card includes that NFC-SWP leads to Letter unit 1701, is responsible for being communicated with false proof mobile phone NFC communication module;Machine cartoon letters unit 1702, is responsible for false proof mobile phone and intelligence The communication of card;Control unit 1703, is responsible for the process of all anti-counterfeiting information, the communication of unit;Encrypting module 1704 is responsible for It is encrypted calculating;Data storage cell 1705 is responsible for storage safety information data.
Figure 18 is the structural representation of antifalsification label of the present invention.As shown in figure 18, the antifalsification label includes, communication unit 1812, it is responsible for carrying out near-field communication with false proof mobile phone;Anti-counterfeiting information processing and control element (PCE) 1811, is responsible for all false proof letters in label The process of breath, the communication between unit;Encrypting module 1813 is responsible for being encrypted calculating, and anti-counterfeiting object is believed safely in such as Figure 10 Anti-counterfeiting object safety information Y5 in the calculating of breath Y7 or Fig. 7;Data storage cell 1814 is responsible for data storage.
Figure 19 is the structural representation of Antiforge system embodiment of the present invention.As shown in figure 19, the system of the present embodiment is to Fig. 1 Shown system is refined, and the Antiforge system of the present embodiment is specifically included:
Antiforge system server 1920 is identical with aforementioned Antiforge system server Figure 15.Wherein communication unit, authentication Processing unit, anti-counterfeiting object data base, Antiforge system service management unit, access qualification result query unit, short message sending list Unit is corresponding with each module in Figure 15, and its working method is identical.
False proof mobile phone 1910 is identical with the false proof mobile phone in aforementioned false proof mobile phone Figure 16, Figure 17, wherein NFC antenna, NFC controls Unit processed, communication unit, note receiving unit, anti-counterfeiting information processing and control element (PCE), encrypting module, safe data storage unit with Each module correspondence in Figure 16, Figure 17, its working method is identical.
Smart card 1900 is corresponding with telecom intelligent card in Figure 18, and working method is identical.
Anti-counterfeiting object 1940 is corresponding with anti-counterfeiting object in Fig. 1, and working method is identical.
Below the art work assignment method based on near-field communication technology and device of the present invention have been described with reference to the accompanying drawings. The method defines the interdependent data that condition each other in server, false proof mobile phone, smart card and antifalsification label, including uses Family ID, tag ID, anti-counterfeiting object ID, the first counterfeiting token and the second counterfeiting token, between server and mobile phone and label respectively Respective data are updated in transference and is verified, so that it is guaranteed that links can be complete by the verification of multiple data Into so as to realize that the art work becomes the safety anti-fake (registration, identification, transfer) of art sales behavior.Simultaneously creator can be with Works information is recorded in the server, facilitates displaying, record and the management of art sales behavior.
The foregoing is only presently preferred embodiments of the present invention, not to limit the present invention, all spirit in the present invention and Within principle, any modification, equivalent substitution and improvements made etc. should be included within the scope of the present invention.

Claims (26)

1. a kind of art owners' authentication method based on near-field communication technology, it is characterised in that include:
S501, anti-counterfeit server is received and stores the false proof mobile phone of the carrying owner and adjusts from false proof mobile phone intelligent card described in the owner Owner's identification request (608) of the first counterfeiting token for taking, creates and stores owner's identification token (609), sends to institute State the false proof mobile phone of the owner;
S502, antifalsification label receives owner's identification request (610) that the false proof mobile phone of the owner sends, by the second false proof order Board is sent safely to the false proof mobile phone of the owner (612);
S503, the false proof mobile phone of the owner identifies token computation according to the first counterfeiting token, the second counterfeiting token and the owner First identifies response (RES1), sends carrying first identification response (RES1), anti-counterfeiting object ID, owns to anti-counterfeit server Identification request (616) of person's ID;
S504, the anti-counterfeit server in the identification request according to corresponding to anti-counterfeiting object ID and being stored in the false proof service Second counterfeiting token of device, the first counterfeiting token and the owner identification identification response of token computation second (RES2), such as Really described second identification responds (RES2) and is equal to the described first identification response (RES1), then correct judgment, checks the identification to ask Ask owner's ID whether consistent with the ID being associated with anti-counterfeiting object ID in the identification request, if unanimously Then correct judgment, creates and preserves owner's search sequence number (S1) (617), while by owner's search sequence number (S1) Send to the false proof mobile phone of the owner (618), delete the owner and identify token.
2. method as claimed in claim 1, it is characterised in that also include:
S503, the false proof mobile phone of the owner to anti-counterfeit server sends carrying first identification response (RES1), false proof right As identification request (616) of ID, owner's ID and other the false proof phone numbers for needing to receive qualification result;
S504, the anti-counterfeit server sends owner's search sequence number (S1) into the identification request to be needed to receive Other false proof phone numbers (619) of qualification result.
3. method as claimed in claim 1, it is characterised in that also include:
S502, antifalsification label receives owner's identification request (610) that the false proof mobile phone of the owner sends, owner's mirror Public key is included in fixed request, antifalsification label verifies the public key (611).
4. method as claimed in claim 1, it is characterised in that also include:
S504, the anti-counterfeit server storage qualification time is simultaneously associated qualification time with owner's ID;And it is described The false proof mobile phone of the owner needs other the false proof mobile phones for receiving qualification result to log in the anti-counterfeit server input institute The person's of having search sequence number (S1), inquires about this time false proof result, and the false proof result includes qualification time.
5. method as claimed in claim 1, it is characterised in that also include:
S501, anti-counterfeit server creates and stores owner's identification token time limit simultaneously;
S504, the anti-counterfeit server confirms that this owner's qualification process is not above owner's identification token time limit, and Delete owner's identification token time limit.
6. method as claimed in claim 1, it is characterised in that also include:
S502, antifalsification label calculates the 5th tag security information (Y5) (611) by parameter of the second counterfeiting token, and the 5th is marked Sign safety information (Y5) and send mobile phone false proof to the owner) (612);
S503, the false proof mobile phone intelligent card of the owner calculates the first knot with the 5th tag security information (Y5) as parameter Really (J1) (613-614), the false proof mobile phone of the owner is with first result (J1) and the false proof mobile phone intelligent card of the owner First counterfeiting token calculates the second result (J2) for parameter, then identifies that token is ginseng with second result (J2) and the owner Number calculates the first identification response (RES1) (615);
S504, the anti-counterfeit server in the identification request according to corresponding to anti-counterfeiting object ID and being stored in the false proof service The second counterfeiting token in device calculates the 6th tag security information (Y6) with the same computational methods of the antifalsification label, and by the Six tag security information (Y6) with the same computational methods of the false proof mobile phone intelligent card of the owner by calculating the 3rd result (J3), further according to the 3rd result (J3) and the first counterfeiting token being stored in the anti-counterfeit server by with the institute The same computational methods of the false proof mobile phone of the person of having calculate the 4th result (J4), further according to the 4th result (J4) and the owner Identification token responds (RES2) (617) to calculate the second identification with the same computational methods of the false proof mobile phone of the owner.
7. a kind of art work nonowners' authentication method based on near-field communication technology, it is characterised in that include:
S801, anti-counterfeit server receives and stores nonowners' identification request of the false proof cellphone subscriber ID of carrying nonowners (903) nonowners' identification token (904), are created and stored, mobile phone false proof to the nonowners is sent;
S802, antifalsification label receives nonowners' identification request (905) that the false proof mobile phone of the nonowners sends, and second is prevented Pseudo- token is sent safely to the false proof mobile phone of the nonowners (907) with anti-counterfeiting object ID;
S803, the false proof mobile phone of the nonowners to the false proof mobile phone of the owner initiates to carry anti-counterfeiting object ID, second false proof Identification request (908) of token and nonowners identification token;
S804, the false proof mobile phone of the owner receives identification request, the false proof mobile phone of the owner according to the second counterfeiting token and The first counterfeiting token calculates safe result (911) in the false proof mobile phone intelligent card of the owner, and by safe result and owner user ID is sent to the false proof mobile phone of the nonowners (912);
S805, the false proof mobile phone of the nonowners reflects according to the safe result and nonowners identification token computation the 3rd Provisioning response (RES3) (913), sends to anti-counterfeit server and carries the 3rd identification response (RES3), anti-counterfeiting object ID, owns Nonowners' identification request (914) of person's ID;
S806, the anti-counterfeit server is according in nonowners identification request corresponding to anti-counterfeiting object ID and described in being stored in Second counterfeiting token of anti-counterfeit server and the first counterfeiting token calculate the 4th identification response (RES4);If the 4th identification Response (RES4) is equal to the described 3rd identification response (RES3), then correct judgment, checks owner user in the identification request Whether associated with the identification request anti-counterfeiting object ID ID ID be consistent, and the correct judgment if consistent is created simultaneously Nonowners' search sequence number (S2) (915) is preserved, while nonowners' search sequence number (S2) is sent to described non- The false proof mobile phone of the owner (916), deletes the nonowners and identifies token.
8. method as claimed in claim 7, it is characterised in that also include:
S802, antifalsification label receives nonowners' identification request (905) non-institute that the false proof mobile phone of the nonowners sends Public key is included in the person's of having identification request, antifalsification label verifies the public key (906).
9. method as claimed in claim 7, it is characterised in that also include:
S806, the anti-counterfeit server storage qualification time is simultaneously associated qualification time with owner's ID;And it is described The false proof mobile phone of nonowners logs in the anti-counterfeit server and is input into nonowners' search sequence number (S2), and inquiry is this time false proof As a result, the false proof result includes qualification time.
10. method as claimed in claim 7, it is characterised in that also include:
S801, anti-counterfeit server creates and stores nonowners' identification token time limit simultaneously;
S806, the anti-counterfeit server confirms that this nonowners' qualification process is not above nonowners' identification token time limit, And delete nonowners' identification token time limit.
11. methods as claimed in claim 7, it is characterised in that also include:
S802, antifalsification label calculates the 7th tag security information (Y7) by parameter of the second counterfeiting token;And pacify on the 7th label Full information (Y7) and anti-counterfeiting object ID send mobile phone false proof to the nonowners;
S803, the false proof mobile phone of the nonowners to the false proof mobile phone of the owner initiates to carry anti-counterfeiting object ID, the 7th label Identification request (908) of safety information (Y7) and nonowners identification token;
S804, the false proof mobile phone of the owner receives nonowners' identification request, and the false proof mobile phone intelligent card of the owner is with institute State the 7th tag security information (Y7) and calculate the 5th result (J5) for parameter;The false proof mobile phone of the owner is with the described 5th knot Really (J5) and to be stored in the false proof mobile phone intelligent card of the owner the first counterfeiting token be that parameter calculates the 6th result (J6) as peace Full result (909-911);
S806, the anti-counterfeit server is according in nonowners identification request corresponding to anti-counterfeiting object ID and described in being stored in The second related counterfeiting token of anti-counterfeit server is that parameter calculates the 8th tag security information (Y8);Again with the 8th tag security letter Breath (Y8) is that parameter calculates the 7th result (J7) with the same computational methods of owner's mobile phone intelligent card;Again with the 7th result (J7) the first false proof order and in nonowners identification request in anti-counterfeiting object ID associated storage and the anti-counterfeit server Board is to calculate the 8th result (J8) with the false proof mobile phone identical computational methods of the owner by parameter;Further according to the 8th result (J8) and the nonowners to identify token be parameter with to calculate the 4th identification with the false proof mobile phone identical method of nonowners Response (RES4).
The false proof mobile phone (102-1) of the 12. a kind of owners based on near-field communication technology, it is characterised in that the mobile phone is used for:
Owner's identification request (608) is initiated to server, in the identification request the first counterfeiting token for prestoring is carried, and connect Receive owner's identification token (609);
Owner's identification request (610) is initiated to antifalsification label, and the second counterfeiting token is received safely from antifalsification label, according to pre- The first counterfeiting token, the second counterfeiting token and owner's identification request identification response of token computation first (RES1) (615) for depositing;
Send to server carry first identification response (RES1), anti-counterfeiting object ID that prestores and, owner's ID Identification request (616);
The false proof mobile phone of the owner includes:NFC control units (1501), anti-counterfeiting information processing and control element (PCE) (1502), encryption Module (1503), safe data storage unit (1504), communication unit (1505);Wherein:
NFC control units (1501) read the mark and safety information of anti-counterfeiting object, the letter for being communicated with anti-counterfeiting object Breath includes antifalsification label ID;
Anti-counterfeiting information control unit (1502) calls encrypting module to obtain for processing false proof request using counterfeiting token as input Accordingly result;
Communication unit (1505) is for disappearing between all false proof mobile phones of communications and anti-counterfeit server of anti-counterfeit server Breath;
Safe data storage unit (1504) asks token for storing ID, identification;
Encrypting module (1503) for process from anti-counterfeiting information processing and control element (PCE) CIPHERING REQUEST.
13. mobile phones as claimed in claim 12, it is characterised in that wherein:
Ask also to be carried in (616) other the false proof phone numbers for needing to receive qualification result to the identification that server sends.
14. mobile phones as claimed in claim 12, it is characterised in that wherein:
It is to receive to calculate the 5th label for obtaining peace by the second counterfeiting token to receive the second counterfeiting token safely from antifalsification label (611-612), the false proof mobile phone intelligent card of the owner is with the 5th tag security information (Y5) as parameter for full information (Y5) Calculate the first result (J1) (613-614), the false proof mobile phone of the owner is with the first result (J1) and the false proof mobile phone of the owner The first counterfeiting token calculates the second result (J2) for parameter in smart card;Identified with second result (J2) and the owner again Token is that parameter calculates the first identification response (RES1) (615).
15. mobile phones as claimed in claim 12, it is characterised in that the mobile phone is used for:
Search sequence number (S1) is received, anti-counterfeit server is logged in and is input into owner's search sequence number (S1), inquire about false proof knot Really.
16. mobile phones as claimed in claim 12, it is characterised in that the mobile phone is additionally operable to:
Nonowners' mobile phone identification request (908) is received, according to the second counterfeiting token, the false proof mobile phone of the owner in identification request The first counterfeiting token calculates safe result in smart card, and safety result and owner's ID are transmitted (912).
17. mobile phones as claimed in claim 16, it is characterised in that wherein:
The second counterfeiting token in nonowners' mobile phone identification request (908) replaces with what is calculated according to the second counterfeiting token 7th tag security information (Y7);
The false proof mobile phone intelligent card of the owner calculates the 5th result (J5) with the 7th tag security information (Y7) as parameter (909-910);The false proof mobile phone of the owner is with the 5th result (J5) and is stored in the false proof mobile phone intelligent card of the owner First counterfeiting token is that parameter calculates the 6th result (J6) as safe result.
The false proof mobile phone (102-2) of 18. a kind of nonowners based on near-field communication technology, it is characterised in that the mobile phone is used for:
Nonowners' identification request (903) are initiated to server, in the identification request nonowners' ID is carried, and from clothes Business device receives nonowners' identification token (904);
Nonowners are initiated to antifalsification label and identify request (905), and receive the second counterfeiting token safely from antifalsification label and prevent Pseudo- object ID (907);
Initiate to carry the mirror that anti-counterfeiting object ID, the second counterfeiting token and the nonowners identify token to owner's mobile phone Fixed request (908);
Safe result and owner's ID are received from owner's mobile phone, is identified according to the safe result, the nonowners Identification response of token computation the 3rd (RES3) (913);
Send to server and carry the 3rd identification response (RES3), anti-counterfeiting object ID, the nonowners of owner's ID Identification request (914);
The false proof mobile phone of the nonowners includes:NFC control units (1501), anti-counterfeiting information processing and control element (PCE) (1502), plus Close module (1503), safe data storage unit (1504), communication unit (1505);Wherein:
NFC control units (1501) read the mark and safety information of anti-counterfeiting object, the letter for being communicated with anti-counterfeiting object Breath includes antifalsification label ID;
Anti-counterfeiting information control unit (1502) calls encrypting module to obtain for processing false proof request using counterfeiting token as input Accordingly result;
Communication unit (1505) is for disappearing between all false proof mobile phones of communications and anti-counterfeit server of anti-counterfeit server Breath;
Safe data storage unit (1504) asks token for storing ID, identification;
Encrypting module (1503) for process from anti-counterfeiting information processing and control element (PCE) CIPHERING REQUEST.
19. mobile phones as claimed in claim 18, it is characterised in that wherein:
Public key is included in nonowners identification request (905) sent to antifalsification label.
20. mobile phones as claimed in claim 18, it is characterised in that wherein:
The second counterfeiting token is received safely from antifalsification label and anti-counterfeiting object ID (907) is to receive safely by the from antifalsification label Two counterfeiting tokens calculate the 7th tag security information (Y7) (907) for obtaining;And
Initiate to carry anti-counterfeiting object ID, the 7th tag security information (Y7) and nonowners identification to owner's mobile phone Identification request (908) of token.
21. mobile phones as claimed in claim 18, it is characterised in that the mobile phone is used for:
Nonowners' search sequence number (S2) is received, anti-counterfeit server input nonowners' mirror search sequence number (S2) is logged in, is looked into Ask false proof result.
22. a kind of anti-counterfeit servers (103) based on near-field communication technology, it is characterised in that the server is used for:
Identification request (608,903) is received from mobile phone, identification token is created and store for sending (609,904);
From mobile phone receive again identification request (616,914), it is described identification request bag ID containing the owner, anti-counterfeiting object ID and Identification response (RES1, RES3) calculated by mobile phone, according to corresponding to anti-counterfeiting object ID and being stored in clothes in the identification request The first counterfeiting token, the second counterfeiting token and identification token computation identification response (RES2, RES4) in business device, if clothes The identification response that business device is calculated is equal to the identification response that mobile phone is calculated, then correct judgment;
Check owner's ID in the identification request whether corresponding with anti-counterfeiting object ID in identification request and be stored in clothes ID in business device is consistent, the correct judgment if consistent;
Create, preserve and send search sequence number;
Delete identification token;
The anti-counterfeit server includes:Authentication processing unit (1101), communication unit (1102), Antiforge system user management Unit (1103), anti-counterfeiting object data base (1104), authentication result queries processing unit (1105), short message sending unit (1106);Wherein:
Authentication processing unit (1101) is asked and relevant information for receiving authentication from communication unit, from anti-counterfeiting object Anti-counterfeiting object information is inquired about in data base, from Antiforge system service management unit false proof user profile is inquired about, identify false proof user, Counterfeiting token is issued to false proof user, carries out calculating the second identification response (RES2) or the 4th identification by safety caculation module The first identification response (RES1) or the 3rd identification response (RES3) that response (RES4) is sent with false proof mobile phone is compared, if Unanimously, then it is true, otherwise is false;
Communication unit (110) is asked for processing the authentication sent from false proof mobile phone;
Antiforge system administrative unit (1103) is for inquiring about the mark and safety information of false proof user;
Anti-counterfeiting object data base (1104) is false proof for managing anti-counterfeiting object ID, creator's information, the first counterfeiting token and second Token;
Authentication result queries processing unit (1105) is looked into for the result received from false proof mobile phone and other ordinary terminals Request is ask, is inquired about according to the identifying code for reporting;
Short message sending unit (1106) is responsible for sending the identifying code of authentication result to false proof mobile phone and regular handset.
23. servers as claimed in claim 22, it is characterised in that wherein:
Identify that request is owner's identification request from what mobile phone was received, comprising the first counterfeiting token in the identification request;Or Identify that request is nonowners' identification request from what mobile phone was received, comprising nonowners' ID in the identification request.
24. servers as claimed in claim 22, it is characterised in that the server is additionally operable to:
Create the identification token time limit;
Identification process is not above identifying the token time limit;
Delete the identification token time limit.
25. servers as claimed in claim 22, it is characterised in that the server is additionally operable to:
Storage qualification time is simultaneously associated qualification time with owner's ID.
A kind of 26. Antiforge systems (100) based on near-field communication technology, it is characterised in that:Including as claimed in claim 12 The false proof mobile phone of the owner (102-1) and anti-counterfeit server (103) described in claim 24;Or including as claimed in claim 12 The false proof mobile phone of the owner (102-1), false proof described in the false proof mobile phone of nonowners described in claim 18 and claim 22 Server (103).
CN201410006048.3A 2014-01-07 2014-01-07 Identification method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology Expired - Fee Related CN103763007B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410006048.3A CN103763007B (en) 2014-01-07 2014-01-07 Identification method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410006048.3A CN103763007B (en) 2014-01-07 2014-01-07 Identification method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology

Publications (2)

Publication Number Publication Date
CN103763007A CN103763007A (en) 2014-04-30
CN103763007B true CN103763007B (en) 2017-04-12

Family

ID=50530184

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410006048.3A Expired - Fee Related CN103763007B (en) 2014-01-07 2014-01-07 Identification method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology

Country Status (1)

Country Link
CN (1) CN103763007B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844477A (en) * 2016-03-18 2016-08-10 王小凡 NFC label information tracking method
CN106357409A (en) * 2016-09-06 2017-01-25 中国银联股份有限公司 Safety information interaction system and method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102629332A (en) * 2012-02-20 2012-08-08 江苏凯路威电子科技有限公司 Radio frequency identification (RFID) anti-fake method
CN103218591A (en) * 2013-05-07 2013-07-24 南京大学 Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202383750U (en) * 2011-11-14 2012-08-15 马志敏 Near field communication (NFC) mobile phone and radio frequency identification (RFID) combination type anti-counterfeiting system
CN103226771A (en) * 2012-01-31 2013-07-31 马志敏 Article authentication and anti-counterfeiting system based on combination of NFC fingerprint mobile phone and RFID (Radio Frequency Identification)
CN103065168B (en) * 2012-12-19 2016-05-11 深圳市江波龙电子有限公司 A kind of electronic tag method for anti-counterfeit and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102629332A (en) * 2012-02-20 2012-08-08 江苏凯路威电子科技有限公司 Radio frequency identification (RFID) anti-fake method
CN103218591A (en) * 2013-05-07 2013-07-24 南京大学 Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same

Also Published As

Publication number Publication date
CN103763007A (en) 2014-04-30

Similar Documents

Publication Publication Date Title
US20220021662A1 (en) Operating system for blockchain iot devices
TWI770022B (en) Computer implemented control method, system and control system
US7362869B2 (en) Method of distributing a public key
CN109034793A (en) Digital cash method of commerce and digital cash wallet hardware based on block chain
CN109478279A (en) Method and system for realizing block chain
CN108496382A (en) Security information transmitting system and method for personal identification
CN110599342B (en) Block chain-based identity information authorization method and device
KR20220113307A (en) System to provide genuinity verification and ownership change records of product esset by using a blockchain and a genuine authentiation tag technologies
US20230103038A1 (en) Method for directly transferring electronic coin data sets between terminals, payment system, currency system and monitoring unit
CN104125230B (en) A kind of short message certification service system and authentication method
CN107920052A (en) A kind of encryption method and intelligent apparatus
CN103763007B (en) Identification method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology
CN116057554A (en) Method for managing transaction data sets, participant unit, transaction register and payment system
CN103761655B (en) A kind of assignment method based on near-field communication technology, false proof device and Antiforge system
CN115345729A (en) Credit card issuing method and device, electronic equipment and storage medium
CN103745365B (en) A kind of register method based on near-field communication technology, false proof device and Antiforge system
CN117061089B (en) Voting management method, device, equipment and storage medium
KR20190115551A (en) Method for Providing Cryptocurrency Trade by using Smart Contract based on Blockchain
WO2016178074A1 (en) Storage control of a transferable value or rights token
KR20190115552A (en) Method for Providing Multiple Cryptocurrency Trade by using Smart Contract based on Blockchain
US20230091509A1 (en) Method for directly transmitting electronic coin datasets between terminals, payment system, protection system and monitoring entity
Vivek et al. Enhancing the Security of Aadhar Cards using Blockchain and Steganography
US20230222509A1 (en) Method, terminal, and coin register for transmitting electronic coin data sets
JP2008022189A (en) Electronic application method using virtual storage medium
CN117411638A (en) Service tag authentication method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170412