CN103763007B - Identification method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology - Google Patents
Identification method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology Download PDFInfo
- Publication number
- CN103763007B CN103763007B CN201410006048.3A CN201410006048A CN103763007B CN 103763007 B CN103763007 B CN 103763007B CN 201410006048 A CN201410006048 A CN 201410006048A CN 103763007 B CN103763007 B CN 103763007B
- Authority
- CN
- China
- Prior art keywords
- false proof
- mobile phone
- owner
- token
- counterfeiting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 99
- 238000004891 communication Methods 0.000 title claims abstract description 66
- 238000005516 engineering process Methods 0.000 title claims abstract description 44
- 230000008569 process Effects 0.000 claims abstract description 43
- 230000004044 response Effects 0.000 claims description 141
- 238000012797 qualification Methods 0.000 claims description 58
- 238000000205 computational method Methods 0.000 claims description 20
- 238000012545 processing Methods 0.000 claims description 14
- 238000013500 data storage Methods 0.000 claims description 10
- 230000010365 information processing Effects 0.000 claims description 8
- 238000007726 management method Methods 0.000 claims description 7
- 241000208340 Araliaceae Species 0.000 claims description 2
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 claims description 2
- 235000003140 Panax quinquefolius Nutrition 0.000 claims description 2
- 235000008434 ginseng Nutrition 0.000 claims description 2
- 238000000151 deposition Methods 0.000 claims 1
- 238000012546 transfer Methods 0.000 description 57
- 230000005540 biological transmission Effects 0.000 description 14
- 238000012795 verification Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 7
- 238000012790 confirmation Methods 0.000 description 6
- 210000004027 cell Anatomy 0.000 description 5
- 238000007689 inspection Methods 0.000 description 5
- 210000004247 hand Anatomy 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 2
- 235000013399 edible fruits Nutrition 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 210000000352 storage cell Anatomy 0.000 description 2
- 241000196324 Embryophyta Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Abstract
The invention provides an identification method, an anti-counterfeiting device and an anti-counterfeiting system based on the near-field communication technology. Owner identification requests and non-owner identification requests are adopted in the identification method. According to the identification method, identification of identities of owners of artworks can be achieved through the incidence relations between label IDs and anti-counterfeiting object IDs and between the label IDs and owner IDs. The anti-counterfeiting system comprises an anti-counterfeiting label, an anti-counterfeiting mobile phone and an anti-counterfeiting server, the anti-counterfeiting label, the anti-counterfeiting mobile phone and the anti-counterfeiting server are restricted and associated mutually, effective identification information can be generated only by updating data in the anti-counterfeiting label, data in the anti-counterfeiting mobile phone and data in the anti-counterfeiting server at the same time, and therefore the safety and the reliability in the artwork transaction process are improved.
Description
Technical field
The present invention relates to near-field communication technology, it is more particularly to a kind of based on the art work authentication method of near-field communication technology,
False proof device and Antiforge system.
Background technology
In recent years art work collection is fast-developing, and with the art sales market boom is fakement great Dang Qi roads.
Therefore, that how to set up that art work registration conveniently, reliable, authoritative, identification, transfer system be always that artwort market faces asks
Topic.
Existing electronic anti-fogery technology mainly includes two ways:Carried out as label using bar code or Quick Response Code false proof;With
The modes such as RFID store digital anti-counterfeiting label using task equipment read label information carry out it is false proof.
The former shortcoming is that the cost of reproduction of bar code or Quick Response Code is low, as long as this yard is replicated into the genuine piece that can disguise oneself as.
The latter is more advanced compared with the former technology, but equally exists limitation:First, need to be scanned using proprietary instrument, generally bag
Including can carry out computer, label reader of network service etc., not portable and deployment.Second, merely anti-counterfeiting object is carried out
Digital independent and verification, it is impossible to exclude false proof instrument and fake this problem.Cannot identify that this is false proof in anti-counterfeiting object qualification process
The owner of object and all relations of anti-counterfeiting object.
The content of the invention
It is an object of the invention to one of above-mentioned technical problem is solved, according to one embodiment of present invention, there is provided one
Plant based on the art work authentication method of near-field communication technology, including:
S501, anti-counterfeit server is received and stores the false proof mobile phone of the carrying owner from false proof mobile phone intelligent card described in the owner
In transfer the first counterfeiting token the owner identification request (608), create and store the owner identification token (609), send
To the false proof mobile phone of the owner;
S502, antifalsification label receives owner's identification request (610) that the false proof mobile phone of the owner sends, and second is prevented
Pseudo- token secure is sent to the false proof mobile phone of the owner (612);
S503, the false proof mobile phone of the owner identifies token according to the first counterfeiting token, the second counterfeiting token and the owner
Calculate first identification response (RES1), to anti-counterfeit server send carrying it is described first identification response (RES1), anti-counterfeiting object ID,
Identification request (616) of owner's ID;
S504, the anti-counterfeit server is according to corresponding to anti-counterfeiting object ID in the identification request and is stored in described false proof
Second counterfeiting token of server, the first counterfeiting token and the owner identification identification response of token computation second
(RES2), if second identification response (RES2) is equal to the described first identification response (RES1), correct judgment, inspection institute
Whether consistent with the ID being associated with anti-counterfeiting object ID in the identification request state owner's ID in identification request,
The correct judgment if consistent, creates and preserves owner's search sequence number (S1) (617), while the owner is inquired about into sequence
Row number (S1) is sent to the false proof mobile phone of the owner (618), is deleted the owner and is identified token.
Preferably, in S503, the false proof mobile phone of the owner to anti-counterfeit server sends carrying the first identification response
(RES1), the identification request of anti-counterfeiting object ID, owner's ID and other the false proof phone numbers for needing to receive qualification result
(616);
In S504, owner's search sequence number (S1) is sent into the identification request and is needed by the anti-counterfeit server
Receive other false proof phone numbers (619) of qualification result.
Preferably, in S502, antifalsification label receives owner's identification request that the false proof mobile phone of the owner sends
(610), public key is included in owner's identification request, antifalsification label verifies the public key (611).
Additionally, in S504, the anti-counterfeit server storage qualification time is simultaneously related to owner's ID by qualification time
Connection;And the false proof mobile phone of the owner or described need other the false proof mobile phones for receiving qualification result to log in the false proof clothes
Business device is input into owner's search sequence number (S1), inquires about this time false proof result, and the false proof result includes qualification time.
Preferably, in S501, anti-counterfeit server creates and stores owner's identification token time limit simultaneously;
In S504, when the anti-counterfeit server confirms that this owner's qualification process is not above owner's identification token
Limit, and delete owner's identification token time limit.
Additionally, in S502, antifalsification label calculates the 5th tag security information (Y5) by parameter of the second counterfeiting token
(611), and by the 5th tag security information (Y5) mobile phone false proof to the owner is sent) (612);
In S503, the false proof mobile phone intelligent card of the owner is calculated with the 5th tag security information (Y5) as parameter
(613-614), the false proof mobile phone of the owner is with first result (J1) and the false proof mobile phone intelligence of the owner for first result (J1)
The first counterfeiting token calculates the second result (J2) for parameter in blocking, then with second result (J2) and owner's writ of appraisement
Board is that parameter calculates the first identification response (RES1) (615):
In S504, the anti-counterfeit server is according to corresponding to anti-counterfeiting object ID in the identification request and is stored in described anti-
The second counterfeiting token in pseudo server calculates the 6th tag security information (Y6) with the same computational methods of the antifalsification label,
And by the 6th tag security information (Y6) by calculating the 3rd with the same computational methods of the false proof mobile phone intelligent card of the owner
As a result (J3), further according to the 3rd result (J3) and the first counterfeiting token being stored in the anti-counterfeit server by with institute
State the same computational methods of the false proof mobile phone of the owner and calculate the 4th result (J4), further according to the 4th result (J4) and the institute
The person of having identifies token to calculate the second identification response (RES2) (617) with the same computational methods of the false proof mobile phone of the owner.
According to another embodiment of the present invention, also provide a kind of art work nonowners based on near-field communication technology to identify
Method, including:
S801, anti-counterfeit server receives and stores nonowners' identification request of the false proof cellphone subscriber ID of carrying nonowners
(903) nonowners' identification token (904), are created and stored, mobile phone false proof to the nonowners is sent;
S802, antifalsification label receives nonowners' identification request (905) that the false proof mobile phone of the nonowners sends, by the
Two counterfeiting tokens are sent safely to the false proof mobile phone of the nonowners (907) with anti-counterfeiting object ID;
S803, the false proof mobile phone of the nonowners to the false proof mobile phone of the owner initiate to carry anti-counterfeiting object ID, second
Identification request (908) of counterfeiting token and nonowners identification token;
S804, the false proof mobile phone of the owner receives identification request, and the false proof mobile phone of the owner is according to the second false proof order
The first counterfeiting token calculates safe result (911) in board and the false proof mobile phone intelligent card of the owner, and by safe result and the owner
ID is sent to the false proof mobile phone of the nonowners (912);
S805, the false proof mobile phone of the nonowners is according to the safe result and nonowners identification token computation the
Three identification response (RES3) (913), to anti-counterfeit server send carry it is described 3rd identification response (RES3), anti-counterfeiting object ID,
Nonowners' identification request (914) of owner's ID;
S806, the anti-counterfeit server is according to corresponding to anti-counterfeiting object ID in nonowners identification request and is stored in
Second counterfeiting token of the anti-counterfeit server and the first counterfeiting token calculate the 4th identification response (RES4);If the described 4th
Identification response (RES4) is equal to the described 3rd identification response (RES3), then correct judgment, checks the owner in the identification request
Whether associated with the identification request anti-counterfeiting object ID ID ID be consistent, the correct judgment if consistent, wound
Nonowners' search sequence number (S2) (915) is built and preserves, while nonowners' search sequence number (S2) is sent to institute
The false proof mobile phone of nonowners (916) are stated, the nonowners is deleted and is identified token.
In S802, antifalsification label receives nonowners' identification request (905) institute that the false proof mobile phone of the nonowners sends
State in nonowners' identification request and verify the public key (906) comprising public key, antifalsification label.
In S806, the anti-counterfeit server storage qualification time is simultaneously associated qualification time with owner's ID;With
And the false proof mobile phone of the nonowners logs in the anti-counterfeit server and is input into nonowners' search sequence number (S2), inquires about this
Secondary false proof result, the false proof result includes qualification time.
Preferably, in S801, anti-counterfeit server creates and stores nonowners' identification token time limit simultaneously;
In S806, the anti-counterfeit server confirms that this nonowners' qualification process is not above nonowners' identification token
Time limit, and delete nonowners' identification token time limit.
Additionally, in S802, antifalsification label calculates the 7th tag security information (Y7) by parameter of the second counterfeiting token;And will
7th tag security information (Y7) and anti-counterfeiting object ID send mobile phone false proof to the nonowners;
In S803, the false proof mobile phone of the nonowners to the false proof mobile phone of the owner initiate to carry anti-counterfeiting object ID, the
Identification request (908) of seven tag security information (Y7) and nonowners identification token;
In S804, the false proof mobile phone of the owner receives nonowners' identification request, the false proof cell phone intelligent of the owner
Card calculates the 5th result (J5) with the 7th tag security information (Y7) as parameter;The false proof mobile phone of the owner is with described
5th result (J5) and to be stored in the false proof mobile phone intelligent card of the owner the first counterfeiting token be that parameter calculates the 6th result (J6)
As safety result (909-911);
In S806, the anti-counterfeit server is according to corresponding to anti-counterfeiting object ID in nonowners identification request and stores
It is that parameter calculates the 8th tag security information (Y8) in the second related counterfeiting token of the anti-counterfeit server;Again with the 8th label
Safety information (Y8) is that parameter calculates the 7th result (J7) with the same computational methods of owner's mobile phone intelligent card;Again with
In seven results (J7) and nonowners identification request in anti-counterfeiting object ID associated storage and the anti-counterfeit server first
Counterfeiting token is to calculate the 8th result (J8) with the false proof mobile phone identical computational methods of the owner by parameter;Further according to
It is parameter with to calculate the with the false proof mobile phone identical method of nonowners that eight results (J8) and the nonowners identify token
Four identifications response (RES4).
According to still another embodiment of the invention, there is provided a kind of antifalsification label based on near-field communication technology, it is described false proof
Label is used to receive identification request (610,905), and the second counterfeiting token for prestoring is transmitted or by prestore second
Counterfeiting token and anti-counterfeiting object ID carry out safe transmission.
The antifalsification label is additionally operable to:Owner's identification request (610) is received, comprising public affairs in owner's identification request
Key, antifalsification label verifies the public key (611);And/or nonowners' identification request (905) are received, the nonowners reflect
Public key is included in fixed request, antifalsification label verifies the public key (906).
The antifalsification label is additionally operable to:Owner's identification request (610) is received, by parameter of the second counterfeiting token the is calculated
Five tag security information (Y5) are for transmission;And/or nonowners' identification request (905) are received, it is with the second counterfeiting token
Parameter calculates the 7th tag security information (Y7);And send the 7th tag security information (Y7) and anti-counterfeiting object ID (907).
The antifalsification label is additionally operable to:Storage ID, tag ID, anti-counterfeiting object ID and the second counterfeiting token.
A kind of another embodiment of the invention, there is provided the false proof mobile phone of the owner based on near-field communication technology
(102-1), the mobile phone is used for:Owner's identification request (608) is initiated to server, carries what is prestored in the identification request
First counterfeiting token, and receive owner's identification token (609);
Owner's identification request (610) is initiated to antifalsification label, and the second counterfeiting token, root are received safely from antifalsification label
According to the first counterfeiting token, the second counterfeiting token and the owner identification request identification response of token computation first (RES1) that prestore
(615);
Send to server carry first identification response (RES1), anti-counterfeiting object ID that prestores and, owner user
Identification request (616) of ID.
Wherein:Ask also to be carried in (616) other the false proof handss for needing to receive qualification result to the identification that server sends
Machine number.
Wherein:It is to receive to calculate for obtaining by the second counterfeiting token to receive the second counterfeiting token safely from antifalsification label
(611-612), the false proof mobile phone intelligent card of the owner is with the 5th tag security information for five tag security information (Y5)
(Y5) the first result (J1) is calculated (613-614) for parameter, the false proof mobile phone of the owner is with the first result (J1) and all
The first counterfeiting token calculates the second result (J2) for parameter in the false proof mobile phone intelligent card of person;Again with second result (J2) and
The owner identifies token and calculates the first identification response (RES1) (615) for parameter.
The mobile phone is additionally operable to:Search sequence number (S1) is received, anti-counterfeit server is logged in and is input into owner's inquiry sequence
Row number (S1), inquires about false proof result.
The mobile phone is additionally operable to:Nonowners' mobile phone identification request (908) is received, second in identification request is false proof
The first counterfeiting token calculates safe result in token, the false proof mobile phone intelligent card of the owner, and by safe result and owner user
ID is transmitted (912).
Wherein:The second counterfeiting token in nonowners' mobile phone identification request (908) replaces with false proof according to second
7th tag security information (Y7) of token computation;
The false proof mobile phone intelligent card of the owner calculates the 5th result with the 7th tag security information (Y7) as parameter
(J5)(909-910);The false proof mobile phone of the owner is with the 5th result (J5) and is stored in the false proof cell phone intelligent of the owner
The first counterfeiting token is that parameter calculates the 6th result (J6) as safe result in card.
Another embodiment of the invention, also provides a kind of nonowners based on near-field communication technology false proof mobile phone
(102-2), the mobile phone is used for:
Nonowners' identification request (903) are initiated to server, in the identification request nonowners' ID is carried, and
Nonowners' identification token (904) are received from server;
Nonowners' identification request (905) are initiated to antifalsification label, and the second counterfeiting token is received safely from antifalsification label
With anti-counterfeiting object ID (907);
Initiate to carry anti-counterfeiting object ID, the second counterfeiting token and nonowners identification token to owner's mobile phone
Identification request (908);
Safe result and owner's ID are received from owner's mobile phone, according to the safe result, the nonowners
Identification identification response of token computation the 3rd (RES3) (913);
Send to server and carry the 3rd identification response (RES3), anti-counterfeiting object ID, the non-institute of owner's ID
Person's of having identification request (914).
Wherein:Public key is included in nonowners identification request (905) sent to antifalsification label.
Preferably, it is from antifalsification label peace to receive the second counterfeiting token and anti-counterfeiting object ID (907) safely from antifalsification label
Full reception calculates the 7th tag security information (Y7) (907) for obtaining by the second counterfeiting token;And
Initiate to carry anti-counterfeiting object ID, the 7th tag security information (Y7) and the nonowners to owner's mobile phone
Identification request (908) of identification token.
The mobile phone is additionally operable to:Nonowners' search sequence number (S2) is received, anti-counterfeit server input nonowners are logged in
Mirror search sequence number (S2), inquires about false proof result.
According to another embodiment of the present invention, a kind of anti-counterfeit server (103) based on near-field communication technology, institute are also provided
Stating server is used for:Identification request (608,903) is received from mobile phone, identification token is created and store for sending (609,904);
Identification request (616,914), the identification request bag ID containing the owner, anti-counterfeiting object are received again from mobile phone
ID and identification response (RES1, RES3) calculated by mobile phone, according to corresponding to anti-counterfeiting object ID and storing in the identification request
The first counterfeiting token, the second counterfeiting token and the identification token computation identification response (RES2, RES4) in server, such as
The identification response that fruit server is calculated is equal to the identification response that mobile phone is calculated, then correct judgment;
Whether owner's ID is corresponding with anti-counterfeiting object ID in identification request in the inspection identification request and stores
ID in server is consistent, the correct judgment if consistent;
Create, preserve and send search sequence number;
Delete identification token.
Wherein:Identify that request is owner's identification request from what mobile phone was received, include first in the identification request false proof
Token;Or identify that request is nonowners' identification request from what mobile phone was received, comprising nonowners' use in the identification request
Family ID.
The server is additionally operable to:Create the identification token time limit;Identification process is not above identifying the token time limit;Delete
Except the identification token time limit.
The server is additionally operable to:Storage qualification time is simultaneously associated qualification time with owner's ID.
Finally, according to still another embodiment of the invention, there is provided a kind of Antiforge system (100) based on near-field communication technology:
Including aforementioned antifalsification label (101), the false proof mobile phone of the owner (102-1) and anti-counterfeit server (103);Or including aforementioned false proof
Label (101), the false proof mobile phone of the owner (102-1), the false proof mobile phone of nonowners and anti-counterfeit server (103).
For prior art, beneficial effects of the present invention are:
1. in owner's identification request process that the present invention is provided, identification is calculated by the first counterfeiting token in false proof mobile phone
The owner identifies token;And the common cryptographic in antifalsification label and false proof mobile phone calculates the parameter that anti-counterfeit server is verified, it
Between it is completely the same could obtain owner's qualification result information, and also owner's qualification result can be sent to the owner and prevent
Other false proof mobile phones that pseudo- mobile phone is specified.Such mode, it is possible to achieve between art work transfer transaction, by the owner actively
Initiate requesting query art owner's state of the identification true and false.Increase the safety and reliability of the follow-up transfer transaction of the art work.
2. another nonowners' identification request mechanism that the present invention is also provided.Nonowners pass through the false proof handss of the owner
Machine transfers the authentication parameter of the corresponding anti-counterfeiting object of specified antifalsification label, and submits to nonowners to reflect to anti-counterfeit server
Fixed request.Can so realize that nonowners actively identify the related letter for specifying the art work before or during art sales
Breath, particularly owner information and circulation process.
3. the Antiforge system that the present invention is provided includes antifalsification label, false proof mobile phone, anti-counterfeit server, is mutual between three
Restriction and the relation of related association.Either owner's identification request or nonowners' identification request must simultaneously have anti-counterfeiting label
Label, false proof mobile phone, the participation of anti-counterfeit server three could produce effective qualification process, therefore increased safety and reliability
Property.
Description of the drawings
Fig. 1 is the system block diagram of the present invention.
Fig. 2 is a kind of art work register method flow chart based on near-field communication technology.
Fig. 3 is a kind of art work register method preferred embodiment based on near-field communication technology.
Fig. 4 is antifalsification label, smart card, false proof handss after a kind of art work register method based on near-field communication technology is implemented
Data table memory in machine, anti-counterfeit server.
Fig. 5 is a kind of art owners' authentication method flow chart based on near-field communication technology.
Fig. 6 is a kind of art owners' authentication method preferred embodiment based on near-field communication technology.
Fig. 7 is that false proof mobile phone intelligent card and false proof mobile phone calculate identification response schematic diagram in owner's identification request link.
Fig. 8 is a kind of art work nonowners' authentication method flow chart based on near-field communication technology of the present invention.
Fig. 9 is a kind of art work nonowners' authentication method preferred embodiment based on near-field communication technology of the present invention.
The false proof mobile phone intelligent card of nonowners and the false proof mobile phone of the owner and non-in Figure 10 nonowners identification request link
The false proof mobile phone of the owner calculates identification response schematic diagram.
Figure 11 is the structural representation of anti-counterfeit server of the present invention.
Figure 12 is the work-based logic schematic diagram of authentication processing unit
Figure 13 is a kind of art work assignment method flow chart based on near-field communication technology of the present invention.
Figure 14 is a kind of art work assignment method preferred embodiment based on near-field communication technology of the present invention.
One of structural representation of the false proof mobile phone of Figure 15 present invention.
The two of the structural representation of the false proof mobile phone of Figure 16 present invention.
Figure 17 is the structural representation of false proof smart card of the invention.
Figure 18 is the structural representation of antifalsification label of the present invention.
Figure 19 is the structural representation of Antiforge system embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to the concrete of the present invention
Embodiment is described in further detail.Obviously, described embodiment is only a part of embodiment of the present invention, rather than
Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not before creative work is paid
All embodiments obtained by putting belong to protection scope of the present invention.
Fig. 1 is the system block diagram of the present invention.As shown in figure 1, the system 100 of the present invention includes:It is antifalsification label 101, false proof
Mobile phone 102 and anti-counterfeit server 103, include smart card 104 in false proof mobile phone 102.Antifalsification label is preferably NFC label, prevents
Pseudo- mobile phone 102 can read the information of antifalsification label 101, by authentication module and smart card inside false proof mobile phone 102
104 chips carry out safe computations, secondary safety is carried out in false proof mobile phone with reference to false proof ID and is calculated, in false proof service
Verified in device 103.Thereby increase the safety and reliability of Antiforge system.
Registration, identification and the transference of the reliable authority of the art work can be realized with the system.Wherein described antifalsification label
101 have globally unique antifalsification label ID, have ID in false proof mobile phone 102 and smart card 104.Carrying out anti-counterfeiting object
Registration before, antifalsification label 101 is built in the anti-counterfeiting object that will be registered, and especially, the anti-counterfeiting object can be with
For the art work that be registered, identify or transfer the possession of.Anti-counterfeit server 103 distribute for each anti-counterfeiting object and store one it is false proof
Object ID.
Here is illustrated:Participate due to having different false proof mobile phones in registration, identification and transference.Cause
This, in order to make it easy to understand, can add to false proof mobile phone respectively in Antiforge system registration, identification and transference in this manual
To limit.For example:In registration process, because only main body of the owner (or referred to as creator), therefore, false proof mobile phone
Do not distinguish, be only expressed as false proof mobile phone 102.In qualification process, there is the difference of owner's identification and nonowners' identification, because
This, in qualification process, false proof mobile phone have the false proof mobile phone of the owner and the false proof mobile phone of nonowners point.Make this differentiation be in order to
Be easy to describe in qualification process, the false proof mobile phone of the owner and the false proof mobile phone of nonowners accordingly functional relationship when do not cause table
The confusion stated.During identification 102, if no special instructions, false proof mobile phone represents the false proof mobile phone of the owner.In transference
In, the false proof mobile phone of the owner will be related to and be transferred mobile phone and participated.Therefore, with the false proof mobile phone of the owner is used and will be turned
False proof mobile phone is allowed to make a distinction.If no special instructions, false proof mobile phone represents the false proof mobile phone of the owner.It is believed that the present invention is protected
The false proof mobile phone of shield is respectively provided with the registration, identification and transference any different appellation main bodys (such as:Registrant, the owner,
Nonowners, it is transferred surrenderee) the part or all of function of mobile phone.
Fig. 2 is a kind of art work register method flow chart based on near-field communication technology of the present invention.Using the method skill
The creator of art product can be registered to a new art work in server, and give the false proof of the unique mark art work
Label.Methods described includes:S201, anti-counterfeit server 103 according to false proof mobile phone 102 transmit come ID and false proof mobile phone
102 tag IDs read from antifalsification label 101 create and store the establishment token that is associated with the tag ID and false proof right
As ID.
Antifalsification label 101 has globally unique antifalsification label ID, in this step, with the false proof of tag reading function
Mobile phone 102 reads antifalsification label ID, and tag ID and ID is together sent to anti-counterfeit server 103, the false proof clothes
It is simultaneously the unique sign of art work distribution one that business device 103 creates according to tag ID and ID and store one to create token
Anti-counterfeiting object ID of the art work.
Alternatively, the token that creates can be that the registration of the token with the time limit, the i.e. art work must definited time-lag in advance
Inside complete just effectively.For this purpose, the anti-counterfeit server can simultaneously create an establishment token when the establishment token is created
Time limit.
In this step, server 103 is received after ID and antifalsification label ID directly by antifalsification label ID and user
ID is associated, that is, give tacit consent to antifalsification label ID and belong to the ID.Alternatively, can be before S201, in advance in false proof service
The incidence relation of tag ID and ID is stored in device 103, i.e., just in clothes when antifalsification label is actually allocated to certain user
In business device this corresponding relation is recorded accordingly and stored.Then when server receives ID and anti-counterfeiting label in S201
Sign and first judge whether the tag ID read from antifalsification label 101 with false proof mobile phone 102 is associated the ID after ID, if closed
Connection just creates token and continues subsequent step, and registration failure is returned if not associating.It is possible thereby to further prevent tag ID quilt
Situation about usurping, increased the safety and reliability of system.
Additionally, before this step, the step of setting up secure link between server and mobile phone can be included.
S202, the false proof mobile phone 102 receives and stores the establishment token and described anti-from the anti-counterfeit server 103
Pseudo- object ID simultaneously writes tag request to the transmission of the antifalsification label 101.
Antifalsification label 101 can write key with preset, just need when now equipment carries out write operation to antifalsification label 101
Whether preset to write key consistent with this for key of writing in the write request of checking equipment.Therefore, the anti-of key is write for being prefixed
When pseudo label 101 carries out write operation, tag ID can be prestored in server 103 and writes key with corresponding label.By preventing
Pseudo server 103 writes key according to the label corresponding with the tag ID that tag ID inquiry is prestored;With asymmetric encryption
Algorithm transmits the label writes key to mobile phone 102.
Then described false proof mobile phone 102 receives the label and writes key from the anti-counterfeit server 103.The false proof mobile phone
Tag request is write in 102 to the antifalsification label (101) transmission, and the tag request of writing includes writing label key.
S203, the antifalsification label 101 writes tag request in the antifalsification label 101 according to the false proof mobile phone 102
Middle write anti-counterfeiting object ID and the ID.Thus, the antifalsification label completes anti-counterfeiting object ID and ID
Record.
When antifalsification label is preset write key in the case of, antifalsification label verify first the label write key with anti-counterfeiting label
Whether preset label to write key consistent in signing 101.
Preferably, in this step, antifalsification label 101 also calculates the second safety information X2 and passes to the false proof mobile phone
102.Specifically, the antifalsification label 101 calculates the second tag security information X2 according to the tag ID and the ID,
And the second tag security information X2 is passed to into the false proof mobile phone 102.Preferably, can be calculated according to tag ID, ID
First tag security information X1, and the second tag security information X2 is calculated according to the first tag security information X1;
It is highly preferred that the antifalsification label 101 check the label write key it is correct after, it is local according to tag ID, ID and label
Key is that parameter calculates the first tag security information X1 with 3DES encryption algorithm, and is according to the first tag security information X1
Parameter calculates the second tag security information X2 with asymmetric arithmetic.The local key of the label can be differently configured from label and write
Key, when the local key of label is with writing key and differing, can prestore tag ID with corresponding mark in server 103
Sign local key.
S204, the false proof mobile phone 102 is input into works information by user interface, and according to anti-counterfeiting object ID, institute
State works information and the establishment token and send registration request to the anti-counterfeit server 103;Preferably, works described in S204
Information includes:Author information, works content, works description, creative time, creative place.It is highly preferred that when false proof mobile phone is received
To after the second safety information X2, the second safety information X2 is carried in the registration request and is sent to server 103.
S205, creates token described with what is received described in the registration request that anti-counterfeit server (103) confirmation is received
Establishment token corresponding to anti-counterfeiting object ID is consistent, while determining that the tag ID is registration for the first time, then stores works information,
The first counterfeiting token and the second counterfeiting token that generation is associated with anti-counterfeiting object ID, send the false proof mobile phone to
(102), the establishment token is deleted.
In the case of antifalsification label also calculates X2, the anti-counterfeit server 103 is according in the registration request
Tag ID, the ID for creating corresponding to token and being stored in the anti-counterfeit server 103 with the antifalsification label to calculate
X1 identicals method calculates the 3rd tag security information X3, and the anti-counterfeit server (103) is received using asymmetric arithmetic decryption
The the second tag security information (X2) for arriving obtains the 4th tag security information (X4), if described 4th tag security information X4 etc.
In the 3rd tag security information X3, then the anti-counterfeit server 103 verifies the peace of the second label described in the registration request
Full information X2 is correct.
Preferably, corresponding to the establishment token of the anti-counterfeit server 103 in the registration request and store
Tag ID, ID and the local key of label in the anti-counterfeit server 103 is that parameter calculates the with 3DES encryption algorithm
Three tag security information X3.
When it is the token with the time limit to create token, the anti-counterfeit server 103 also judges that this establishment process does not surpass
The establishment token time limit is spent, and when establishment token is deleted, is deleted create the token time limit in the lump.
Preferably, first counterfeiting token and second counterfeiting token can be transmitted with rivest, shamir, adelman.
S206, described in the false proof mobile phone 102 is received by anti-counterfeiting object ID and from the anti-counterfeit server 8
First counterfeiting token writes the smart card 104, and second counterfeiting token is write into the antifalsification label 101.Then delete
Except the establishment token.
Fig. 3 is a kind of art work register method preferred embodiment based on near-field communication technology of the present invention.Carrying out this
Before the register method of bright offer, it is preferable to carry out secure log, in embodying 301-305 in figure 3:
In a preferred embodiment of the invention, tag ID and ID have been prestored in anti-counterfeit server associates pass
System, and the corresponding label of tag ID writes key.
301:Secure connection is set up between false proof mobile phone 102 and anti-counterfeit server 103.
302:False proof mobile phone 102 logs in token by ID to the request of smart card 104.
303:Smart card is generated by computations and logs in token, while by ID and logging in the false proof mobile phone of token return
102。
304:False proof mobile phone is according to ID and logs in token login anti-counterfeit server.
305:Anti-counterfeit server to false proof mobile phone feedback security is logined successfully.
After secure log, step as shown in Figure 3 is carried out:
306:False proof mobile phone reads tag ID in antifalsification label, and the antifalsification label is built in anti-counterfeiting object.
307:Antifalsification label sends antifalsification label ID to the false proof mobile phone.
308:False proof mobile phone creates token according to antifalsification label ID and ID to anti-counterfeit server application.
309:Anti-counterfeit server is received after establishment token request, and whether the incidence relation of confirmation antifalsification label ID and ID
It coincide, then creates and store establishment token, establishment token time limit and anti-counterfeiting object ID being associated with the tag ID.It is preferred that
Ground, also needs the label for inquiring about the antifalsification label according to tag ID to write key.
310:Token will be created and anti-counterfeiting object ID, the key of writing of antifalsification label are sent to the false proof mobile phone;Wherein, it is excellent
Selection of land, antifalsification label write key with rivest, shamir, adelman transmission.
311:The false proof mobile phone receives and the establishment token and described anti-is received and stored from the anti-counterfeit server 8
Pseudo- object ID, it may be preferable that also including the key of writing for receiving antifalsification label, and write close using label is obtained after asymmetric arithmetic decryption
Key.
312:False proof mobile phone writes key and initiates to write tag request to antifalsification label by the label, and parameter is included:It is anti-
Pseudo- object ID, the ID, the label write key.
313:The antifalsification label is received and verify after request whether correctly label writes key, by anti-counterfeiting object if correct
ID, the ID write the antifalsification label;And using 3DES encryption algorithm, it is preferable that with antifalsification label ID, user
ID, local key (may differ from label and write key) calculate the first tag security information X1 for parameter, reuse asymmetric calculation
Method calculates the second tag security information X2.
314:Second tag security information X2 is back to the false proof mobile phone by the antifalsification label.
315:Works information is input into by false proof cell-phone user interface, including being not limited to author information, works content, works
Description, creative time, creative place, other creation characteristic information;Then registration request, parameter bag are initiated to anti-counterfeit server
Include:Anti-counterfeiting object ID, the second tag security information X2, the works information and the establishment token.
316:Anti-counterfeit server is received after registration request, according to anti-counterfeiting object ID, recall in anti-counterfeit server with
Corresponding anti-counterfeiting object ID and the ID, it is preferable that with antifalsification label ID, ID and the anti-counterfeiting label deposited
The local key signed is that parameter calculates the 3rd tag security information X3 to calculate X1 identical modes with antifalsification label, is reused
The 4th tag security information X4 is calculated with 313 step identical asymmetric arithmetics;If the 4th tag security information X4
Equal to the 3rd tag security information X2, then judge that the second tag security information X2 is correct;Meanwhile, anti-counterfeit server is true
Recognize this time antifalsification label and be registered as registration for the first time, and confirm that what is received creates token with the anti-counterfeiting object for receiving
Establishment token corresponding to ID is consistent, then store works information;And generation is associated with anti-counterfeiting object ID and works information
The first counterfeiting token and the second counterfeiting token.
317:Anti-counterfeit server to the false proof mobile phone sends first counterfeiting token and the second counterfeiting token;And delete
The establishment token.
318:The false proof mobile phone will receive the first counterfeiting token and anti-counterfeiting object ID writes the false proof cell phone intelligent
Card.
319:The false proof mobile phone intelligent card writes successfully to false proof confirming phone.
320:The false proof mobile phone is write key and is sent to the antifalsification label and writes tag request by the label, parameter bag
Include:Write key and the second counterfeiting token.
321:The antifalsification label is received and verify after request whether correctly label writes key, false proof by second if correct
Token writes the antifalsification label.
322:The antifalsification label to false proof the confirming phone writes successfully.
Fig. 4 illustrates all steps of the 301-322 in Fig. 3, in the antifalsification label, the false proof mobile phone and described
Formed in anti-counterfeit server one it is interrelated and mutually restrict data.As can be seen from Figure 4:Have passed through above-mentioned steps:Institute
State in antifalsification label except the antifalsification label ID that there is originally, be also written into ID, anti-counterfeiting object ID and second false proof
Token;And except original ID in the false proof mobile phone, it is also written into anti-counterfeiting object ID;In false proof mobile phone intelligent card except
Existing subscriber ID, has been also written into anti-counterfeiting object ID, the first counterfeiting token;And anti-counterfeit server, through above-mentioned register method, remove
Original tag ID, ID, have been written to anti-counterfeiting object ID, works information, the first counterfeiting token and the second counterfeiting token.
Wherein:The tag ID is corresponded with anti-counterfeiting object ID, the first counterfeiting token, the second counterfeiting token and works information, and
It is associated with ID.The formation of above-mentioned data and between mutual relation, the identification and transference after being lay the foundation.
For instance, it is preferred that in identification request, related data can be calculated by above-mentioned data, including:5th tag security information X5,
6th tag security information X6, the 7th tag security information X7, the 8th tag security information X8, the first result J1, the second result
J2, the 3rd result J3, the 4th result J4, the 5th result J5, the 6th result J6, the 7th result J7, the 8th result J8;The S1 owners
Identification search sequence number;S2 nonowners identify search sequence number.
The art work information registering stage is being realized using the system, is being additionally provided a kind of based on the false proof of near-field communication technology
System.The Antiforge system includes the label 101, the false proof mobile phone 102 and the anti-counterfeit server 103.
The antifalsification label 101 is used for:Reception writes tag request and writes anti-counterfeiting object ID and ID;And reception is write
Tag request writes the second counterfeiting token.
Additionally, the label be additionally operable to according to the tag ID, the ID calculate the second tag security information X2 with
For sending.Preferably, the first tag security information X1 is calculated according to tag ID, ID, and according to first tag security
Information X1 calculates the second tag security information X2.
Additionally, the label is additionally operable to reception label writes key, check the label to write key and write close with preset label
Whether key is consistent.The is calculated if consistent with 3DES encryption algorithm by parameter of the local key of tag ID, ID and label
One tag security information X1, and calculate described second with asymmetric arithmetic for parameter according to the first tag security information X1
Tag security information X2.
The false proof mobile phone 102 is used for:Receive from anti-counterfeit server 103 and storage creation token and anti-counterfeiting object ID;Wound
Build include that label writes key write tag request, to feed to antifalsification label transmission.Works information, institute are input into by user interface
Stating works information includes:Author information, works content, works description, creative time, creative place.And to the false proof service
Device 8 sends the registration request for carrying anti-counterfeiting object ID, the works information and the establishment token.Receive the first false proof order
Board and the second counterfeiting token, by anti-counterfeiting object ID and receive from the anti-counterfeit server 103 it is described first false proof
Token writes the smart card 104, and second counterfeiting token is write into the antifalsification label 101.And delete the establishment
Token.
The false proof mobile phone 102 is additionally operable to receive the second tag security information X2;And to the anti-counterfeit server 103
Send the note for carrying the second tag security information X2, anti-counterfeiting object ID, the works information and the establishment token that receive
Volume request.
Anti-counterfeit server 103 is used for:According to the ID and tag ID that receive, create and store and the tag ID phase
The establishment token of association, token time limit and anti-counterfeiting object ID are created, for sending;And the tag ID that inquiry is prestored
Accordingly label writes key;The label is transmitted with rivest, shamir, adelman and writes key.Receive and carry the second tag security letter
The registration request of breath (X2), anti-counterfeiting object ID, works information and establishment token.Corresponding to establishment token in registration request
And the tag ID that is stored in the anti-counterfeit server (103) and ID with the antifalsification label calculating X1 identical methods
The 3rd tag security information X3 is calculated, the anti-counterfeit server 103 decrypts the second tag security information X2 using asymmetric arithmetic
The 4th tag security information X4 is obtained, if the 4th tag security information (X4) is equal to the 3rd tag security information
(X2), then the anti-counterfeit server (103) verifies the second tag security information (X2) described in the registration request correctly.Confirm
Establishment token in the registration request of reception is consistent with the establishment token corresponding to anti-counterfeiting object ID for receiving, it is determined that described
Tag ID is registration for the first time, and this registration process is not above the establishment token time limit;Then store works information.Generate
The first counterfeiting token being associated with anti-counterfeiting object ID and the second counterfeiting token, for sending.And the deletion establishment
Token and establishment token time.
Preferably, corresponding to the establishment token in registration request and it is stored in the anti-counterfeit server 103
Tag ID, ID and the local key of label be that parameter calculates the 3rd tag security information X3 with 3DES encryption algorithm.
The works information includes:Author information, works content, works description, creative time, creative place.
Preferably, and with rivest, shamir, adelman first counterfeiting token and second counterfeiting token are transmitted.
Below the art work register method based on near-field communication technology of the present invention has been described with reference to the accompanying drawings.The method
Define the interdependent data that condition each other in server, false proof mobile phone, smart card and antifalsification label, including ID,
Tag ID, anti-counterfeiting object ID, key, local key, the first counterfeiting token and second counterfeiting token etc. are write, so that it is guaranteed that each ring
Section can complete by the verification of multiple data, so as to realize the art work become art sales behavior safety anti-fake (register,
Identification, transfer).Simultaneously creator can in the server record works information, facilitate displaying, the record of art sales behavior
And management.
Describe below and realize art work qualification process using the Antiforge system of the present invention.
Qualification process can be divided into owner's identity process and nonowners' identity process according to the difference for initiating main body.Cause
This, is divided into the false proof mobile phone of the owner and the false proof mobile phone of nonowners in qualification process.In qualification process, such as nothing is especially said
Bright, false proof mobile phone represents the false proof mobile phone of the owner.
Referring to art owners authentication method flow chart of Fig. 5 descriptions based on near-field communication technology.Including as follows
Step:
S501, anti-counterfeit server is received and stores the false proof mobile phone of the carrying owner from false proof mobile phone intelligent card described in the owner
In owner's identification request of the first counterfeiting token for transferring, create and store owner's identification token, send to described all
The false proof mobile phone of person.
When the establishment token is the token with the time limit, anti-counterfeit server creates and stores owner's writ of appraisement simultaneously
The board time limit;
S502, antifalsification label receives owner's identification request that the false proof mobile phone of the owner sends, by the second false proof order
Board sends safely mobile phone false proof to the owner.
Especially, verification step can be set to the read operation of the antifalsification label, that is, being verified just can be read
Operation.In this case, antifalsification label is received can wrap in owner's identification request that the false proof mobile phone of the owner sends
Containing public key, antifalsification label verifies the public key, and verification is by just to the owner's the second counterfeiting token of false proof mobile phone transmission.
Wherein described safety is sent and refers to and be not stolen by external equipment and send data in the way of distorting.It is being preferable to carry out
In example, antifalsification label calculates the 5th tag security information (Y5) by parameter of the second counterfeiting token, and the 5th tag security is believed
Breath (Y5) sends mobile phone false proof to the owner).
S503, the false proof mobile phone of the owner identifies token according to the first counterfeiting token, the second counterfeiting token and the owner
Calculate first identification response (RES1), to anti-counterfeit server send carrying it is described first identification response (RES1), anti-counterfeiting object ID,
The identification request of owner's ID.
In a preferred embodiment, the false proof mobile phone intelligent card of the owner is with the 5th tag security information (Y5) as ginseng
Number calculates the first result (J1), and the false proof mobile phone of the owner is with first result (J1) and the false proof cell phone intelligent of the owner
The first counterfeiting token calculates the second result (J2) for parameter in card, then with second result (J2) and owner's identification token
The first identification response (RES1) is calculated for parameter;
Especially, can also connect including needs in the identification request that the false proof mobile phone of the owner sends to anti-counterfeit server
Receive the identification request of other false proof phone numbers of qualification result.
S504, the anti-counterfeit server is according to corresponding to anti-counterfeiting object ID in the identification request and is stored in described false proof
Second counterfeiting token of server, the first counterfeiting token and the owner identification identification response of token computation second
(RES2), if second identification response (RES2) is equal to the described first identification response (RES1), correct judgment, inspection institute
Whether consistent with the ID being associated with anti-counterfeiting object ID in the identification request state owner's ID in identification request,
The correct judgment if consistent, creates and preserves owner's search sequence number (S1), while by owner's search sequence number
(S1) mobile phone false proof to the owner is sent, the owner is deleted and is identified token.
In a preferred embodiment, the anti-counterfeit server is according to corresponding to anti-counterfeiting object ID in the identification request and stores
The second counterfeiting token in the anti-counterfeit server calculates the 6th tag security with the same computational methods of the antifalsification label
Information (Y6), and by the 6th tag security information (Y6) by with the same computational methods meter of the false proof mobile phone intelligent card of the owner
The 3rd result (J3) is calculated, further according to the 3rd result (J3) and the first counterfeiting token being stored in the anti-counterfeit server
By calculating the 4th result (J4) with the same computational methods of the false proof mobile phone of the owner, further according to the 4th result (J4)
Identify token to calculate the second identification response (RES2) with the same computational methods of the false proof mobile phone of the owner with the owner.
When in identification request comprising other phone numbers, the anti-counterfeit server is by owner's search sequence number
(S1) sending into the identification request needs to receive other false proof phone numbers of qualification result.
Additionally, the anti-counterfeit server can also store qualification time and qualification time is related to owner's ID
Connection;And the false proof mobile phone of the owner or described need other the false proof mobile phones for receiving qualification result to log in the false proof clothes
Business device is input into owner's search sequence number (S1), inquires about in this time false proof result and includes qualification time.
When it is described identification token with when prescribe a time limit, the anti-counterfeit server confirms that this owner's qualification process is not above
The owner identifies the token time limit, and deletes owner's identification token time limit.
Fig. 6 is a kind of art owners' authentication method preferred embodiment based on near-field communication technology.Here is especially said
It is bright:False proof mobile phone in Fig. 6 is the false proof mobile phone of the owner in owner's authentication method.
Secure log is carried out first, in embodying 601-605 in figure 6:
601:Secure connection is set up between false proof mobile phone 102 and anti-counterfeit server 103.
602:False proof mobile phone 102 logs in token by ID to the request of smart card 104.
603:Smart card is generated by computations and logs in token, while by ID and logging in the false proof mobile phone of token return
102。
604:False proof mobile phone is according to ID and logs in token login anti-counterfeit server.
605:Anti-counterfeit server to false proof mobile phone feedback security is logined successfully.
Subsequently, owner's identity process is carried out.
606:False proof mobile phone initiates owner's identification request, Xiang Fang with ID, login token to false proof mobile phone intelligent card
Pseudo- mobile phone intelligent card asks the first counterfeiting token.
607:False proof mobile phone intelligent card sends first counterfeiting token to the false proof mobile phone.
608:False proof mobile phone to anti-counterfeit server initiates owner's identification request, the first counterfeiting token described in parameter.
609:Anti-counterfeit server creates and stores owner's identification token and owner's writ of appraisement according to the first counterfeiting token
The board time limit;Sending the owner simultaneously identifies token to the false proof mobile phone of the owner.
610:False proof mobile phone lifts owner's identification request by parameter of public key to antifalsification label;Public key is used for asymmetric calculation
Method is encrypted.
611:Antifalsification label checks public key, and by parameter of the second counterfeiting token the 5th tag security information of calculating is encrypted
Y5。
612:Antifalsification label sends the 5th tag security information Y5 to the false proof mobile phone.
613:The false proof mobile phone intelligent card goes out the first result J1 with the 5th tag security information Y5 computations.
614:The false proof mobile phone intelligent card is sent the first result J1 is calculated to the false proof mobile phone.
615:Preferably, the false proof mobile phone goes out the second result according to the first result J1 and the first counterfeiting token computations
J2;Go out the first identification response RES1 further according to the second result J2 and owner's identification token computations.
616:False proof mobile phone connects further according to the described first identification response RES1, anti-counterfeiting object ID, owner's ID, needs
Other the false proof phone numbers for receiving qualification result send identification request to the anti-counterfeit server.
617:Anti-counterfeit server is received after owner's identification request, and the anti-counterfeit server is prevented in being asked according to the identification
The second related counterfeiting token of pseudo- object ID calculates the 6th tag security information Y6;And by the 6th tag security information Y6 by with
The same computational methods of the false proof mobile phone intelligent card of the owner calculate the 3rd result J3;Further according to the 3rd result J3,
One counterfeiting token with the same computational methods of the false proof mobile phone of the owner by calculating the 4th result J4;Further according to the described 4th
As a result J4, the owner identification identification of token computation second respond RES2, if the second identification response RES2 is equal to institute
The first identification response RES1 is stated, then correct judgment;And check in the identification request owner's ID whether with the identification
The associated ID of request anti-counterfeiting object ID is consistent, the correct judgment if consistent;And institute in checking the identification to ask
Whether associated with the identification request anti-counterfeiting object ID person's of having ID ID be consistent, judges just if consistent
Really;Store qualification time simultaneously to be associated with owner's ID;Create and preserve owner's search sequence S1;Delete described
The owner identifies token and owner's identification token time limit.
618:Anti-counterfeit server sends owner's search sequence S1 to false proof mobile phone.
619:Anti-counterfeit server sends owner's search sequence S1 into the identification request to be needed to receive identification knot
Other phone numbers of fruit;Delete owner's identification token.
620:Other the false proof mobile phones for receiving owner's search sequence S1 can be according to owner's search sequence S1
Inquire about the result of this authentication.
Fig. 7 shows that preferred embodiment antifalsification label and owner's mobile phone calculate the flow chart of RES1.
Fig. 8 is a kind of art work nonowners' authentication method flow chart based on near-field communication technology of the present invention.Including:
S801, anti-counterfeit server receive and store carry nonowners' identification of the false proof cellphone subscriber ID of nonowners please
Ask, create and store nonowners' identification token, send mobile phone false proof to the nonowners.
When the establishment token is the token with the time limit, anti-counterfeit server creates and stores nonowners' identification simultaneously
The token time limit.
S802, antifalsification label receives nonowners' identification request that the false proof mobile phone of the nonowners sends, and second is prevented
Pseudo- token sends safely mobile phone false proof to the nonowners with anti-counterfeiting object ID.
Especially, verification step can be set to the read operation of the antifalsification label, that is, being verified just can be read
Operation.In this case, can in nonowners' identification request that the false proof mobile phone of the antifalsification label reception nonowners sends
So that comprising public key, antifalsification label verifies the public key, verification sends the second counterfeiting token by ability to the false proof mobile phone of nonowners.
Wherein described safety is sent and refers to and be not stolen by external equipment and send data in the way of distorting.It is being preferable to carry out
In example, antifalsification label calculates the 7th tag security information (Y7) by parameter of the second counterfeiting token;And believe the 7th tag security
Breath (Y7) and anti-counterfeiting object ID send mobile phone false proof to the nonowners.
S803, the false proof mobile phone of the nonowners to the false proof mobile phone of the owner initiate to carry anti-counterfeiting object ID, second
The identification request of counterfeiting token and nonowners identification token.
In a preferred embodiment, the false proof mobile phone of the nonowners initiates to carry described false proof right to the false proof mobile phone of the owner
As ID, the 7th tag security information (Y7) and the nonowners identify the identification request of token.
S804, the false proof mobile phone of the owner receives identification request, and the false proof mobile phone of the owner is according to the second false proof order
The first counterfeiting token calculates safe result in board and the false proof mobile phone intelligent card of the owner, and by safe result and owner's ID
It is sent to the false proof mobile phone of the nonowners.
In a preferred embodiment, the false proof mobile phone of the owner receives nonowners' identification request, and the owner is false proof
Mobile phone intelligent card calculates the 5th result (J5) with the 7th tag security information (Y7) as parameter;The false proof handss of the owner
Machine is with the 5th result (J5) and is stored in the false proof mobile phone intelligent card of the owner the first counterfeiting token and calculates the 6th as parameter
As a result (J6) is used as safe result.
S805, the false proof mobile phone of the nonowners is according to the safe result and nonowners identification token computation the
Three identifications response (RES3), send to anti-counterfeit server and carry the 3rd identification response (RES3), anti-counterfeiting object ID, the owner
Nonowners' identification request of ID;
S806, the anti-counterfeit server is according to corresponding to anti-counterfeiting object ID in nonowners identification request and is stored in
Second counterfeiting token of the anti-counterfeit server and the first counterfeiting token calculate the 4th identification response (RES4);If the described 4th
Identification response (RES4) is equal to the described 3rd identification response (RES3), then correct judgment, checks the owner in the identification request
Whether associated with the identification request anti-counterfeiting object ID ID ID be consistent, the correct judgment if consistent, wound
Nonowners' search sequence number (S2) is built and preserves, while nonowners' search sequence number (S2) is sent to the non-institute
The false proof mobile phone of the person of having (916), deletes the nonowners and identifies token.
In a preferred embodiment, the anti-counterfeit server is right according to anti-counterfeiting object ID institute in nonowners identification request
And should be stored in the second related counterfeiting token of the anti-counterfeit server is that parameter calculates the 8th tag security information (Y8);Again with
8th tag security information (Y8) is that parameter calculates the 7th result with the same computational methods of owner's mobile phone intelligent card
(J7);Again with anti-counterfeiting object ID associated storage and the false proof service in the 7th result (J7) and nonowners identification request
The first counterfeiting token in device is to calculate the 8th result (J8) with the false proof mobile phone identical computational methods of the owner by parameter;
Further according to the 8th result (J8) and the nonowners identify token as parameter with the false proof mobile phone identical of nonowners
Method calculates the 4th identification response (RES4).
Additionally, the anti-counterfeit server also stores qualification time and is associated qualification time with owner's ID;With
And the false proof mobile phone of the nonowners logs in the anti-counterfeit server and is input into nonowners' search sequence number (S2), inquires about this
Secondary false proof result, the false proof result includes qualification time.
When it is described identification token with when prescribe a time limit, the anti-counterfeit server confirms that this nonowners' qualification process does not surpass
Nonowners' identification token time limit is spent, and is deleted nonowners' identification token time limit.
Fig. 9 is a kind of art work nonowners' authentication method preferred embodiment based on near-field communication technology of the present invention.
Secure log is carried out first, in embodying 901-902 in fig .9:
901:The false proof mobile phone of nonowners is with nonowners' ID and logs in token login anti-counterfeit server.
902:Anti-counterfeit server to the false proof mobile phone feedback security of nonowners is logined successfully.
Subsequently, nonowners' identity process is carried out.
903:Nonowners' false proof mobile phone false proof cellphone subscriber ID requests nonowners identification token of nonowners.
904:Anti-counterfeit server identifies that request creates and store nonowners' identification token and not all according to nonowners
Person identifies the token time limit.
905:The false proof mobile phone of nonowners lifts nonowners' identification request by parameter of public key to antifalsification label;Public key is used
In asymmetric arithmetic encryption.
906:Antifalsification label checks public key, and by parameter of the second counterfeiting token the 7th tag security information of calculating is encrypted
Y7。
907:7th tag security information Y7 and anti-counterfeiting object ID are sent into mobile phone false proof to the nonowners.
908:The false proof mobile phone of the nonowners is according to anti-counterfeiting object ID, the 7th tag security information Y7 and described non-
Owner's identification request token to the false proof mobile phone of the owner initiates identification request.
909:The false proof mobile phone intelligent card of the owner adds according to the 7th tag security information Y7 that the false proof mobile phone of the owner sends
The 5th result J5 of close calculating.
910:The false proof mobile phone intelligent card of the owner and by the 5th result J5 to the false proof mobile phone of the owner.
911:The false proof mobile phone of the owner is according to the 5th result J5 and the false proof counterfeiting token of mobile phone first encryption of the owner
Calculate the 6th result J6.
912:Owner's ID and the 6th result J6 are sent to the nonowners by the false proof mobile phone of the owner to be prevented
Pseudo- mobile phone.
913:The false proof mobile phone of the nonowners is further according to the 6th result J6, nonowners identification token encryption
Calculate the 3rd identification response RES3;According to anti-counterfeiting object ID.
914:The false proof mobile phone owner ID of the nonowners, the 3rd identification response RES3 are to the server
Initiate nonowners' identification request.
915:The anti-counterfeit server is false proof according to anti-counterfeiting object ID is related in nonowners identification request second
Safety information Y8 of token computations label the 8th, and go out the 7th result J7 according to the 8th safety information Y8 computations;
Go out the 8th result J8 further according to the 7th result J7, the first counterfeiting token computations;Further according to the 8th result,
Nonowners' identification token computations the 4th identify response RES4;If the 4th identification response RES4 is equal to the described 3rd
Identification responds RES3, then correct judgment;Whether owner's ID is false proof with the identification request in the inspection identification request
The associated ID of object ID is consistent, the correct judgment if consistent;Confirm that this nonowners' qualification process does not surpass
Spend nonowners' identification token time limit;Store qualification time simultaneously to be associated with owner's ID;Create and preserve not all
Person's search sequence S2.
916:Nonowners' search sequence S2 is sent into mobile phone false proof to the nonowners;Delete the non-institute
The person of having identifies token and nonowners' identification token.
Figure 10 shows that preferred embodiment antifalsification label and owner's mobile phone and nonowners' mobile phone calculate the flow process of RES3
Figure.
The Antiforge system 100 based on near-field communication technology of the present embodiment, it is possible to achieve the above-mentioned art work identifies function.Institute
Antiforge system is stated including antifalsification label 101, false proof mobile phone 102 and anti-counterfeit server 103.Main body difference is initiated according to identification, is prevented
Pseudo- mobile phone includes the false proof mobile phone 102-1 of the owner and false proof mobile phone 102-2 of nonowners.
The antifalsification label 101 is used for:Owner's identification request is received, in the owner's identification request public key is included,
Antifalsification label verifies the public key;And/or nonowners' identification request is received, comprising public affairs in nonowners' identification request
Key, antifalsification label verifies the public key.
Identifying for the reception is asked to be owner's identification request, with the second counterfeiting token as parameter calculating the 5th
Tag security information (Y5) is for transmission;It is anti-with second and/or identifying for the reception asks to be asked for nonowners' identification
Pseudo- token is that parameter calculates the 7th tag security information (Y7);And send the 7th tag security information (Y7) and anti-counterfeiting object ID.
The antifalsification label is used to store ID, tag ID, anti-counterfeiting object ID and the second counterfeiting token.
The false proof mobile phone 102-1 of the owner, is used for:Owner's identification request, the identification request are initiated to server
It is middle to carry the first counterfeiting token for prestoring, and receive owner's identification token.Owner's identification request is initiated to antifalsification label, and
The second counterfeiting token is received safely from antifalsification label, according to the first counterfeiting token, the second counterfeiting token and the owner mirror for prestoring
Surely identification response of token computation first (RES1) is asked;Send carrying first identification response (RES1), prestore to server
Anti-counterfeiting object ID and, the identification of owner's ID request (616).
It is to receive to calculate the 5th mark for obtaining by the second counterfeiting token to receive the second counterfeiting token safely from antifalsification label
Safety information (Y5) is signed, the false proof mobile phone intelligent card of the owner is calculated with the 5th tag security information (Y5) as parameter
First result (J1), the false proof mobile phone of the owner is false proof with the first result (J1) and the false proof mobile phone intelligent card of the owner first
Token calculates the second result (J2) for parameter;Identify that token calculates the as parameter with second result (J2) and the owner again
One identification response (RES1).
Additionally, the mobile phone is asked in (616) to the identification that server sends, and also carrying needs its of reception qualification result
His false proof phone number.
The mobile phone is additionally operable to:Search sequence number (S1) is received, anti-counterfeit server is logged in and is input into owner's inquiry sequence
Row number (S1), inquires about false proof result.
Preferably, the mobile phone also has the function of coordinating nonowners' identification, that is, receiving the identification of nonowners' mobile phone please
Ask, the first counterfeiting token calculates safety knot in the second counterfeiting token, the false proof mobile phone intelligent card of the owner in identification request
Really, and by safety result and owner's ID it is transmitted.
Wherein:The second counterfeiting token in nonowners' mobile phone identification request is replaced with according to the second counterfeiting token meter
The 7th tag security information (Y7) calculated.
The false proof mobile phone intelligent card of the owner calculates the 5th result with the 7th tag security information (Y7) as parameter
(J5);The false proof mobile phone of the owner is with the 5th result (J5) and is stored in the false proof mobile phone intelligent card of the owner first and prevents
Pseudo- token is that parameter calculates the 6th result (J6) as safe result.
The false proof mobile phone 102-2 of the nonowners, for initiating nonowners' identification request to server, the identification please
Middle carrying nonowners' ID is sought, and nonowners' identification token is received from server.Nonowners are initiated to antifalsification label
Identification request, and the second counterfeiting token and anti-counterfeiting object ID are received safely from antifalsification label.Initiate to carry institute to owner's mobile phone
State the identification request of anti-counterfeiting object ID, the second counterfeiting token and nonowners identification token.Receive from owner's mobile phone and pacify
Full result and owner's ID, according to the safe result, the nonowners identification identification response of token computation the 3rd
(RES3).Carrying the 3rd identification response (RES3), anti-counterfeiting object ID, the not all of owner's ID are sent to server
Person's identification request.
Wherein, it is to receive logical safely from antifalsification label to receive the second counterfeiting token and anti-counterfeiting object ID safely from antifalsification label
Cross the second counterfeiting token and calculate the 7th tag security information (Y7) for obtaining;And initiate to carry described false proof to owner's mobile phone
The identification request of object ID, the 7th tag security information (Y7) and nonowners identification token.
The mobile phone is additionally operable to:Nonowners' search sequence number (S2) is received, anti-counterfeit server input nonowners are logged in
Mirror search sequence number (S2), inquires about false proof result.
Wherein:Public key is included in nonowners identification request (905) sent to antifalsification label.
The anti-counterfeit server 103, is used for:Identification request is received from mobile phone, identification token is created and store for sending;
Identification request is received again from mobile phone, it is described to identify request bag ID containing the owner, anti-counterfeiting object ID and by mobile phone calculating
Identification response (RES1, RES3), according in the identification request corresponding to anti-counterfeiting object ID and be stored in server first
Counterfeiting token, the second counterfeiting token and the identification token computation identification response (RES2, RES4), if the mirror that server is calculated
Provisioning response is equal to the identification response that mobile phone is calculated, then correct judgment;In the inspection identification request owner's ID whether with
Anti-counterfeiting object ID is corresponding in identification request and consistent, the correct judgment if consistent that is stored in the ID in server;
Create, preserve and send search sequence number;Delete identification token.
Wherein:Identify that request is owner's identification request from what mobile phone was received, include first in the identification request false proof
Token;Or identify that request is nonowners' identification request from what mobile phone was received, comprising nonowners' use in the identification request
Family ID.
The server is additionally operable to:Create the identification token time limit;Identification process is not above identifying the token time limit;Delete
Except the identification token time limit.
The server is additionally operable to:Storage qualification time is simultaneously associated qualification time with owner's ID.
The system architecture diagram of the present invention is described below:Figure 11 is the structural representation of anti-counterfeit server of the present invention.As schemed
Shown in 11, the anti-counterfeit server includes:Authentication processing unit 1101, communication unit 1102, Antiforge system user management list
Unit 1103, anti-counterfeiting object data base 1104, authentication result queries processing unit 1105, short message sending unit 1106.Wherein:
Authentication processing unit 1101 is used to receive authentication request (including owner's identification request from communication unit
Ask with nonowners' identification) and relevant information, anti-counterfeiting object information is inquired about from anti-counterfeiting object data base, use from Antiforge system
Family administrative unit inquires about false proof user profile, identifies false proof user, and to false proof user counterfeiting token is issued, and by safety mould is calculated
Block carries out calculating the first identification response that the second identification identification response RES4 of response RES2 or the 4th send with false proof mobile phone
The identification response RES3 of RES1 or the 3rd compare, and are true if unanimously, otherwise are false.
Communication unit 110 is used to process the authentication request sent from false proof mobile phone, including owner's identification request
Ask with nonowners' identification.
Antiforge system administrative unit 1103 is used to inquire about the mark and safety information of false proof user, logs in token.
Anti-counterfeiting object data base 1104 is anti-for managing anti-counterfeiting object ID, creator's information, the first counterfeiting token and second
Pseudo- token.
Authentication result queries processing unit 1105 is used to receive from false proof mobile phone and the result of other ordinary terminals
Inquiry request, is inquired about according to the identifying code for reporting.
Short message sending unit 1106 is responsible for sending the identifying code of authentication result to false proof mobile phone and regular handset.
Figure 12 is the work-based logic schematic diagram of authentication processing unit 1101.Wherein:
Step 1201 communication unit receives identification request.
Step 1202 judges whether user is legal, if it is otherwise, it returns to user is illegal.
Step 1203 checks whether user's identification token is legal, and 1004 are turned if not, if turning 1005.
The request of step 1204 authentication is illegal.
Step 1205 is in owner's identification request:Calculate the second identification response RES2 sends with false proof mobile phone first
Identification response RES1 is compared, and algorithm is referring to Fig. 7 and correlation step;In nonowners' identification request:Calculate the 4th identification
The 3rd identification response RES3 that response RES4 sends with false proof mobile phone compares, and algorithm is referring to Figure 10 and correlation step.
Step 1206 checks whether RES is consistent with RES1, if inconsistent turn 1207;It is consistent then turn 1208.
The request of step 1207 authentication is false.
The request of step 1208 authentication is true.
Below the art work authentication method based on near-field communication technology and device of the present invention have been described with reference to the accompanying drawings.
The method defines the interdependent data that condition each other in server, false proof mobile phone, smart card and antifalsification label, including uses
Family ID, tag ID, anti-counterfeiting object ID, the first counterfeiting token and the second counterfeiting token, various tag security information Y5, Y7, it is various
Intermediate result etc., calculates respectively intermediate data between server and mobile phone and label, and is verified, so that it is guaranteed that links
Can be completed by the verification of multiple data, so as to realize that the art work becomes safety anti-fake (registration, the mirror of art sales behavior
Fixed, transfer).Simultaneously creator can in the server record works information, facilitate the displaying of art sales behavior, record and
Management.
Describe below and realize art work transference using the Antiforge system of the present invention.
When function is transferred the possession of, understand the false proof mobile phone of the owner and be transferred mobile phone and participate.Therefore, function introduction is being carried out
When, using the false proof mobile phone of the owner and false proof mobile phone can be transferred accordingly it is introduced.If no special instructions, false proof mobile phone
Represent the false proof mobile phone of the owner.
Figure 13 is a kind of art work assignment method flow chart based on near-field communication technology of the present invention, including:
S1301, anti-counterfeit server receives the transfer request sent from false proof mobile phone, and described transfer asks to include being transferred use
Family ID and anti-counterfeiting object ID, generate and store the transfer token being associated with anti-counterfeiting object ID, and transmission is included transfers the possession of token
Confirm to transfer the possession of request to the false proof mobile phone of the owner and be transferred false proof mobile phone.
In order to ensure assigning security, it is preferable that also included the false proof mobile phone of the owner to false proof before step S1301
The step of object is identified;And/or also anti-counterfeiting object is entered including the false proof mobile phone in the side of being transferred after the step 1301
The step of row identification, owner's identity process of Fig. 5 and Fig. 6, institute are may be referred to the step of the false proof mobile phone of the owner is identified
State and be transferred nonowners' identity process that Fig. 8 and Fig. 9 is may be referred to the step of false proof mobile phone is identified.
Wherein, anti-counterfeit server receives the transfer request sent from false proof mobile phone, and the false proof mobile phone is that the owner is false proof
Mobile phone or for the false proof mobile phone in the side of being transferred.
S1302, the false proof mobile phone of the owner receives and stores the transfer token, judges whether to confirm that the transfer please
Ask, if it is confirmed that then to be associated with anti-counterfeiting object ID in the transfer token in the false proof mobile phone intelligent card of the owner the
One counterfeiting token carries out invalid setting, and the second counterfeiting token in pair antifalsification label being associated with the transfer token carries out nothing
Effect is arranged;Delete first counterfeiting token and second counterfeiting token simultaneously;
S1303, the server is according to the associated tag ID of the transfer token and is transferred false proof cellphone subscriber ID
New the first counterfeiting token and the second counterfeiting token is generated and stored, the first new counterfeiting token and the second false proof order is sent
Board is transferred false proof mobile phone to described.
S1304, it is described to be transferred the false proof mobile phone reception first new counterfeiting token and the second counterfeiting token., with
The first new counterfeiting token transferred the possession of associated anti-counterfeiting object ID of token and receive from the anti-counterfeit server is write
False proof mobile phone intelligent card is transferred described in entering.And by the second described new counterfeiting token received from the anti-counterfeit server and quilt
Transfer the possession of ID and write the antifalsification label being associated with the transfer token.
S1305, the anti-counterfeit server includes transferring the possession of the setting successful request of token from false proof mobile phone reception is transferred, will
The owner that false proof mobile phone is set to anti-counterfeiting object ID related to token is transferred the possession of is transferred, Transaction Information is recorded;Delete and transfer the possession of
Token.
S1306, the anti-counterfeit server to the false proof mobile phone of the former owner and it is described be transferred false proof mobile phone and send transfer the possession of into
Work(firmly believes request, and the false proof mobile phone of the former owner is deleted and transfers the possession of token, the first counterfeiting token and the second counterfeiting token;The quilt
Transfer the possession of false proof mobile phone and delete transfer token.
Figure 14 is a kind of art work assignment method preferred embodiment based on near-field communication technology of the present invention.
1401:The owner initiates identity process.
1402:It is transferred anti-counterfeiting object ID that mobile phone is read in antifalsification label.
1403:It is transferred mobile phone and will be transferred ID, anti-counterfeiting object ID and sends mobile phone false proof to the owner.
1404:The false proof mobile phone of the owner is turned as parameter with being transferred ID, anti-counterfeiting object ID to anti-counterfeit server request
Allow.
1405:Anti-counterfeit server sends transfers the possession of token to the false proof mobile phone of the owner.
1406:Anti-counterfeit server sends the message for confirming to receive to being transferred mobile phone.
1407:Anti-counterfeit server sends identification request and is transferred mobile phone.
1408:It is transferred mobile phone and initiates identity process.
1409:It is transferred mobile phone and sends the message for confirming to accept a delivery acceptance of delivery to server.
1410:Anti-counterfeit server sends the confirmation transfer request for including transferring the possession of token.
1411:The false proof mobile phone of the owner confirms to start to transfer the possession of to anti-counterfeit server.
1412:It is invalid that the false proof mobile phone of the owner arranges the first counterfeiting token in the false proof mobile phone intelligent card of the owner.
1413:The false proof mobile phone intelligent card feedback of the owner arranges the invalid success of the first counterfeiting token.
1414:It is invalid that the false proof mobile phone of the owner arranges the second counterfeiting token in antifalsification label.
1415:Antifalsification label feedback arranges the invalid success of the second counterfeiting token.
1416:The false proof mobile phone of the owner to anti-counterfeit server feed back the first counterfeiting token and the second counterfeiting token it is invalid into
Work(.
1417:The server is associated according to described setting in the invalid successful request of counterfeiting token is received with transfer token
Tag ID, be transferred false proof cellphone subscriber ID and generate and store new the first counterfeiting token and the second new counterfeiting token.
1418:The anti-counterfeit server sends the first new counterfeiting token and the second new counterfeiting token to described
It is transferred false proof mobile phone.
1419:It is described to be transferred false proof mobile phone by with anti-counterfeiting object ID that is associated of transfer token and from described false proof
False proof mobile phone intelligent card is transferred described in described new the first counterfeiting token write that server is received.
1420:The mobile phone intelligent card that is transferred writes successfully to the mobile phone feedback that is transferred.
1421:It is described to be transferred mobile phone by the second new counterfeiting token received from the anti-counterfeit server and turned
ID is allowed to write the antifalsification label being associated with the transfer token.
1422:The antifalsification label to the mobile phone feedback that is transferred writes successfully.
1423:The anti-counterfeit server is received and is transferred successfully asking including the setting for transferring the possession of token for false proof mobile phone transmission
Ask.
1424:The anti-counterfeit server is set to anti-counterfeiting object ID related to token is transferred the possession of by false proof mobile phone is transferred
The owner;And record Transaction Information;Delete and transfer the possession of token.
1425:The anti-counterfeit server sends to transfer the possession of to the false proof mobile phone of the former owner successfully firmly believe request.
1426:The false proof mobile phone of the former owner is deleted and transfers the possession of token and the first counterfeiting token and the second counterfeiting token.
The Antiforge system 100 based on near-field communication technology of the present embodiment, it is possible to achieve the above-mentioned art work transfers the possession of function.Institute
Stating Antiforge system includes the false proof mobile phone 102-1 of the antifalsification label 101, owner, is transferred false proof mobile phone 102-3 and the false proof clothes
Business device 103.
The antifalsification label 101 is used for:Receive and transfer the possession of token, token the second counterfeiting token of setting is invalid according to transferring the possession of, with
And transmission arranges the successful message of token valid;Write request is received, the second new counterfeiting token is write according to write request, with
And the successful message of transmission write.
Preferably, the antifalsification label:Receive and transfer the possession of token, public key, antifalsification label verification are included in the transfer token
The public key.
Preferably, the antifalsification label (101) receives write request, and said write request includes writing key, anti-counterfeiting label
Sign and write key described in verification.
The false proof mobile phone 102-1 of the owner, is used for:Antifalsification label is read, antifalsification label ID and anti-counterfeiting object ID is obtained;
Send to anti-counterfeit server and transfer the possession of request, the request includes being transferred ID and anti-counterfeiting object ID;Receive from server and wrap
The confirmation transfer request for transferring the possession of token is included, judges whether to confirm that described transfer is asked, if it is confirmed that then anti-to the owner
Carry out invalid setting with the first counterfeiting token for be associated of anti-counterfeiting object ID in the transfer token in pseudo- mobile phone intelligent card, pair and
Second counterfeiting token transferred the possession of in the associated antifalsification label of token carries out invalid setting;Delete described first simultaneously false proof
Token and second counterfeiting token.
Wherein, receive and store be transferred mobile phone transmission transfer request include be transferred ID and anti-counterfeiting object ID.
Additionally, the mobile phone also sends the invalid successful request of setting counterfeiting token for including transferring the possession of token to server.
The mobile phone is additionally operable to:Delete and transfer the possession of token, the first counterfeiting token and the second counterfeiting token.
It is described to be transferred false proof mobile phone 102-3, it is used for:Antifalsification label is read, antifalsification label ID and anti-counterfeiting object ID is obtained;
Send to owner's mobile phone and transfer the possession of request, described transfer asks to include being transferred ID and anti-counterfeiting object ID;Connect from server
Receipts include the transfer confirmation request for transferring the possession of token, and judgement is confirmed whether to accept a delivery acceptance of delivery, and receive new the first counterfeiting token and new
The second counterfeiting token;False proof cell phone intelligent will be transferred described in anti-counterfeiting object ID and new the first counterfeiting token write
Card, and by the second new counterfeiting token and it is transferred the anti-counterfeiting label that ID write is associated with the transfer token
Sign;Delete and transfer the possession of token.
The anti-counterfeit server 103, is used for:Receive anti-counterfeiting object ID and be transferred false proof cellphone subscriber ID, generate and deposit
The transfer token that be associated with anti-counterfeiting object ID of storage, the confirmation transfer that transmission has transfer token ask to the false proof mobile phone of the owner with
It is transferred false proof mobile phone;According to the associated tag ID of the transfer token and it is transferred false proof cellphone subscriber ID and generates and store
The first counterfeiting token newly and the second counterfeiting token, for sending;Include transferring the possession of setting for token from being transferred false proof mobile phone and receiving
Successful request is put, the owner that false proof mobile phone is set to and transfers the possession of related anti-counterfeiting object ID of token will be transferred;And record friendship
Easy information;Delete and transfer the possession of token.
Figure 15 is one of structural representation of false proof mobile phone of the invention.As shown in figure 15, the false proof mobile phone includes:NFC
Control unit 1501, anti-counterfeiting information processing and control element (PCE) 1502, encrypting module 1503, safe data storage unit 1504, communication
Unit 1505.
Wherein:NFC control units 1501 are used to be communicated with anti-counterfeiting object, read the mark and safety letter of anti-counterfeiting object
Breath, packet ID containing antifalsification label.Anti-counterfeiting information control unit 1502 is used to process false proof request, using counterfeiting token as defeated
Enter to call encrypting module to obtain accordingly result.Communication unit 1505 is used for false proof mobile phones all with the communications of anti-counterfeit server
Message between anti-counterfeit server.Safe data storage unit 1504 is used to store ID, identification request token (including institute
The person of having identifies token and nonowners' identification token).Encrypting module 1503 is used to process from anti-counterfeiting information processing and control element (PCE)
CIPHERING REQUEST, if the owner identification ask, flow process such as Fig. 7;Ask if nonowners' identification, flow process such as Figure 10.
The two of the structural representation of the false proof mobile phone of Figure 16 present invention.As shown in figure 16, on the basis of Figure 15, false proof mobile phone
Also include:NFC antenna 1607, telecom intelligent card 1606, note receiving unit 1608.Wherein:NFC antenna 1607, for it is anti-
Antifalsification label carries out radio communication in pseudo- object;Telecom intelligent card 1606, for storing the ID of false proof user, log-on message;It is short
Letter receiving unit 1608, for receiving Antiforge inquiry result, and dependent authentication information.
Figure 17 is the structural representation of false proof smart card of the invention.As shown in figure 17, the smart card includes that NFC-SWP leads to
Letter unit 1701, is responsible for being communicated with false proof mobile phone NFC communication module;Machine cartoon letters unit 1702, is responsible for false proof mobile phone and intelligence
The communication of card;Control unit 1703, is responsible for the process of all anti-counterfeiting information, the communication of unit;Encrypting module 1704 is responsible for
It is encrypted calculating;Data storage cell 1705 is responsible for storage safety information data.
Figure 18 is the structural representation of antifalsification label of the present invention.As shown in figure 18, the antifalsification label includes, communication unit
1812, it is responsible for carrying out near-field communication with false proof mobile phone;Anti-counterfeiting information processing and control element (PCE) 1811, is responsible for all false proof letters in label
The process of breath, the communication between unit;Encrypting module 1813 is responsible for being encrypted calculating, and anti-counterfeiting object is believed safely in such as Figure 10
Anti-counterfeiting object safety information Y5 in the calculating of breath Y7 or Fig. 7;Data storage cell 1814 is responsible for data storage.
Figure 19 is the structural representation of Antiforge system embodiment of the present invention.As shown in figure 19, the system of the present embodiment is to Fig. 1
Shown system is refined, and the Antiforge system of the present embodiment is specifically included:
Antiforge system server 1920 is identical with aforementioned Antiforge system server Figure 15.Wherein communication unit, authentication
Processing unit, anti-counterfeiting object data base, Antiforge system service management unit, access qualification result query unit, short message sending list
Unit is corresponding with each module in Figure 15, and its working method is identical.
False proof mobile phone 1910 is identical with the false proof mobile phone in aforementioned false proof mobile phone Figure 16, Figure 17, wherein NFC antenna, NFC controls
Unit processed, communication unit, note receiving unit, anti-counterfeiting information processing and control element (PCE), encrypting module, safe data storage unit with
Each module correspondence in Figure 16, Figure 17, its working method is identical.
Smart card 1900 is corresponding with telecom intelligent card in Figure 18, and working method is identical.
Anti-counterfeiting object 1940 is corresponding with anti-counterfeiting object in Fig. 1, and working method is identical.
Below the art work assignment method based on near-field communication technology and device of the present invention have been described with reference to the accompanying drawings.
The method defines the interdependent data that condition each other in server, false proof mobile phone, smart card and antifalsification label, including uses
Family ID, tag ID, anti-counterfeiting object ID, the first counterfeiting token and the second counterfeiting token, between server and mobile phone and label respectively
Respective data are updated in transference and is verified, so that it is guaranteed that links can be complete by the verification of multiple data
Into so as to realize that the art work becomes the safety anti-fake (registration, identification, transfer) of art sales behavior.Simultaneously creator can be with
Works information is recorded in the server, facilitates displaying, record and the management of art sales behavior.
The foregoing is only presently preferred embodiments of the present invention, not to limit the present invention, all spirit in the present invention and
Within principle, any modification, equivalent substitution and improvements made etc. should be included within the scope of the present invention.
Claims (26)
1. a kind of art owners' authentication method based on near-field communication technology, it is characterised in that include:
S501, anti-counterfeit server is received and stores the false proof mobile phone of the carrying owner and adjusts from false proof mobile phone intelligent card described in the owner
Owner's identification request (608) of the first counterfeiting token for taking, creates and stores owner's identification token (609), sends to institute
State the false proof mobile phone of the owner;
S502, antifalsification label receives owner's identification request (610) that the false proof mobile phone of the owner sends, by the second false proof order
Board is sent safely to the false proof mobile phone of the owner (612);
S503, the false proof mobile phone of the owner identifies token computation according to the first counterfeiting token, the second counterfeiting token and the owner
First identifies response (RES1), sends carrying first identification response (RES1), anti-counterfeiting object ID, owns to anti-counterfeit server
Identification request (616) of person's ID;
S504, the anti-counterfeit server in the identification request according to corresponding to anti-counterfeiting object ID and being stored in the false proof service
Second counterfeiting token of device, the first counterfeiting token and the owner identification identification response of token computation second (RES2), such as
Really described second identification responds (RES2) and is equal to the described first identification response (RES1), then correct judgment, checks the identification to ask
Ask owner's ID whether consistent with the ID being associated with anti-counterfeiting object ID in the identification request, if unanimously
Then correct judgment, creates and preserves owner's search sequence number (S1) (617), while by owner's search sequence number (S1)
Send to the false proof mobile phone of the owner (618), delete the owner and identify token.
2. method as claimed in claim 1, it is characterised in that also include:
S503, the false proof mobile phone of the owner to anti-counterfeit server sends carrying first identification response (RES1), false proof right
As identification request (616) of ID, owner's ID and other the false proof phone numbers for needing to receive qualification result;
S504, the anti-counterfeit server sends owner's search sequence number (S1) into the identification request to be needed to receive
Other false proof phone numbers (619) of qualification result.
3. method as claimed in claim 1, it is characterised in that also include:
S502, antifalsification label receives owner's identification request (610) that the false proof mobile phone of the owner sends, owner's mirror
Public key is included in fixed request, antifalsification label verifies the public key (611).
4. method as claimed in claim 1, it is characterised in that also include:
S504, the anti-counterfeit server storage qualification time is simultaneously associated qualification time with owner's ID;And it is described
The false proof mobile phone of the owner needs other the false proof mobile phones for receiving qualification result to log in the anti-counterfeit server input institute
The person's of having search sequence number (S1), inquires about this time false proof result, and the false proof result includes qualification time.
5. method as claimed in claim 1, it is characterised in that also include:
S501, anti-counterfeit server creates and stores owner's identification token time limit simultaneously;
S504, the anti-counterfeit server confirms that this owner's qualification process is not above owner's identification token time limit, and
Delete owner's identification token time limit.
6. method as claimed in claim 1, it is characterised in that also include:
S502, antifalsification label calculates the 5th tag security information (Y5) (611) by parameter of the second counterfeiting token, and the 5th is marked
Sign safety information (Y5) and send mobile phone false proof to the owner) (612);
S503, the false proof mobile phone intelligent card of the owner calculates the first knot with the 5th tag security information (Y5) as parameter
Really (J1) (613-614), the false proof mobile phone of the owner is with first result (J1) and the false proof mobile phone intelligent card of the owner
First counterfeiting token calculates the second result (J2) for parameter, then identifies that token is ginseng with second result (J2) and the owner
Number calculates the first identification response (RES1) (615);
S504, the anti-counterfeit server in the identification request according to corresponding to anti-counterfeiting object ID and being stored in the false proof service
The second counterfeiting token in device calculates the 6th tag security information (Y6) with the same computational methods of the antifalsification label, and by the
Six tag security information (Y6) with the same computational methods of the false proof mobile phone intelligent card of the owner by calculating the 3rd result
(J3), further according to the 3rd result (J3) and the first counterfeiting token being stored in the anti-counterfeit server by with the institute
The same computational methods of the false proof mobile phone of the person of having calculate the 4th result (J4), further according to the 4th result (J4) and the owner
Identification token responds (RES2) (617) to calculate the second identification with the same computational methods of the false proof mobile phone of the owner.
7. a kind of art work nonowners' authentication method based on near-field communication technology, it is characterised in that include:
S801, anti-counterfeit server receives and stores nonowners' identification request of the false proof cellphone subscriber ID of carrying nonowners
(903) nonowners' identification token (904), are created and stored, mobile phone false proof to the nonowners is sent;
S802, antifalsification label receives nonowners' identification request (905) that the false proof mobile phone of the nonowners sends, and second is prevented
Pseudo- token is sent safely to the false proof mobile phone of the nonowners (907) with anti-counterfeiting object ID;
S803, the false proof mobile phone of the nonowners to the false proof mobile phone of the owner initiates to carry anti-counterfeiting object ID, second false proof
Identification request (908) of token and nonowners identification token;
S804, the false proof mobile phone of the owner receives identification request, the false proof mobile phone of the owner according to the second counterfeiting token and
The first counterfeiting token calculates safe result (911) in the false proof mobile phone intelligent card of the owner, and by safe result and owner user
ID is sent to the false proof mobile phone of the nonowners (912);
S805, the false proof mobile phone of the nonowners reflects according to the safe result and nonowners identification token computation the 3rd
Provisioning response (RES3) (913), sends to anti-counterfeit server and carries the 3rd identification response (RES3), anti-counterfeiting object ID, owns
Nonowners' identification request (914) of person's ID;
S806, the anti-counterfeit server is according in nonowners identification request corresponding to anti-counterfeiting object ID and described in being stored in
Second counterfeiting token of anti-counterfeit server and the first counterfeiting token calculate the 4th identification response (RES4);If the 4th identification
Response (RES4) is equal to the described 3rd identification response (RES3), then correct judgment, checks owner user in the identification request
Whether associated with the identification request anti-counterfeiting object ID ID ID be consistent, and the correct judgment if consistent is created simultaneously
Nonowners' search sequence number (S2) (915) is preserved, while nonowners' search sequence number (S2) is sent to described non-
The false proof mobile phone of the owner (916), deletes the nonowners and identifies token.
8. method as claimed in claim 7, it is characterised in that also include:
S802, antifalsification label receives nonowners' identification request (905) non-institute that the false proof mobile phone of the nonowners sends
Public key is included in the person's of having identification request, antifalsification label verifies the public key (906).
9. method as claimed in claim 7, it is characterised in that also include:
S806, the anti-counterfeit server storage qualification time is simultaneously associated qualification time with owner's ID;And it is described
The false proof mobile phone of nonowners logs in the anti-counterfeit server and is input into nonowners' search sequence number (S2), and inquiry is this time false proof
As a result, the false proof result includes qualification time.
10. method as claimed in claim 7, it is characterised in that also include:
S801, anti-counterfeit server creates and stores nonowners' identification token time limit simultaneously;
S806, the anti-counterfeit server confirms that this nonowners' qualification process is not above nonowners' identification token time limit,
And delete nonowners' identification token time limit.
11. methods as claimed in claim 7, it is characterised in that also include:
S802, antifalsification label calculates the 7th tag security information (Y7) by parameter of the second counterfeiting token;And pacify on the 7th label
Full information (Y7) and anti-counterfeiting object ID send mobile phone false proof to the nonowners;
S803, the false proof mobile phone of the nonowners to the false proof mobile phone of the owner initiates to carry anti-counterfeiting object ID, the 7th label
Identification request (908) of safety information (Y7) and nonowners identification token;
S804, the false proof mobile phone of the owner receives nonowners' identification request, and the false proof mobile phone intelligent card of the owner is with institute
State the 7th tag security information (Y7) and calculate the 5th result (J5) for parameter;The false proof mobile phone of the owner is with the described 5th knot
Really (J5) and to be stored in the false proof mobile phone intelligent card of the owner the first counterfeiting token be that parameter calculates the 6th result (J6) as peace
Full result (909-911);
S806, the anti-counterfeit server is according in nonowners identification request corresponding to anti-counterfeiting object ID and described in being stored in
The second related counterfeiting token of anti-counterfeit server is that parameter calculates the 8th tag security information (Y8);Again with the 8th tag security letter
Breath (Y8) is that parameter calculates the 7th result (J7) with the same computational methods of owner's mobile phone intelligent card;Again with the 7th result
(J7) the first false proof order and in nonowners identification request in anti-counterfeiting object ID associated storage and the anti-counterfeit server
Board is to calculate the 8th result (J8) with the false proof mobile phone identical computational methods of the owner by parameter;Further according to the 8th result
(J8) and the nonowners to identify token be parameter with to calculate the 4th identification with the false proof mobile phone identical method of nonowners
Response (RES4).
The false proof mobile phone (102-1) of the 12. a kind of owners based on near-field communication technology, it is characterised in that the mobile phone is used for:
Owner's identification request (608) is initiated to server, in the identification request the first counterfeiting token for prestoring is carried, and connect
Receive owner's identification token (609);
Owner's identification request (610) is initiated to antifalsification label, and the second counterfeiting token is received safely from antifalsification label, according to pre-
The first counterfeiting token, the second counterfeiting token and owner's identification request identification response of token computation first (RES1) (615) for depositing;
Send to server carry first identification response (RES1), anti-counterfeiting object ID that prestores and, owner's ID
Identification request (616);
The false proof mobile phone of the owner includes:NFC control units (1501), anti-counterfeiting information processing and control element (PCE) (1502), encryption
Module (1503), safe data storage unit (1504), communication unit (1505);Wherein:
NFC control units (1501) read the mark and safety information of anti-counterfeiting object, the letter for being communicated with anti-counterfeiting object
Breath includes antifalsification label ID;
Anti-counterfeiting information control unit (1502) calls encrypting module to obtain for processing false proof request using counterfeiting token as input
Accordingly result;
Communication unit (1505) is for disappearing between all false proof mobile phones of communications and anti-counterfeit server of anti-counterfeit server
Breath;
Safe data storage unit (1504) asks token for storing ID, identification;
Encrypting module (1503) for process from anti-counterfeiting information processing and control element (PCE) CIPHERING REQUEST.
13. mobile phones as claimed in claim 12, it is characterised in that wherein:
Ask also to be carried in (616) other the false proof phone numbers for needing to receive qualification result to the identification that server sends.
14. mobile phones as claimed in claim 12, it is characterised in that wherein:
It is to receive to calculate the 5th label for obtaining peace by the second counterfeiting token to receive the second counterfeiting token safely from antifalsification label
(611-612), the false proof mobile phone intelligent card of the owner is with the 5th tag security information (Y5) as parameter for full information (Y5)
Calculate the first result (J1) (613-614), the false proof mobile phone of the owner is with the first result (J1) and the false proof mobile phone of the owner
The first counterfeiting token calculates the second result (J2) for parameter in smart card;Identified with second result (J2) and the owner again
Token is that parameter calculates the first identification response (RES1) (615).
15. mobile phones as claimed in claim 12, it is characterised in that the mobile phone is used for:
Search sequence number (S1) is received, anti-counterfeit server is logged in and is input into owner's search sequence number (S1), inquire about false proof knot
Really.
16. mobile phones as claimed in claim 12, it is characterised in that the mobile phone is additionally operable to:
Nonowners' mobile phone identification request (908) is received, according to the second counterfeiting token, the false proof mobile phone of the owner in identification request
The first counterfeiting token calculates safe result in smart card, and safety result and owner's ID are transmitted (912).
17. mobile phones as claimed in claim 16, it is characterised in that wherein:
The second counterfeiting token in nonowners' mobile phone identification request (908) replaces with what is calculated according to the second counterfeiting token
7th tag security information (Y7);
The false proof mobile phone intelligent card of the owner calculates the 5th result (J5) with the 7th tag security information (Y7) as parameter
(909-910);The false proof mobile phone of the owner is with the 5th result (J5) and is stored in the false proof mobile phone intelligent card of the owner
First counterfeiting token is that parameter calculates the 6th result (J6) as safe result.
The false proof mobile phone (102-2) of 18. a kind of nonowners based on near-field communication technology, it is characterised in that the mobile phone is used for:
Nonowners' identification request (903) are initiated to server, in the identification request nonowners' ID is carried, and from clothes
Business device receives nonowners' identification token (904);
Nonowners are initiated to antifalsification label and identify request (905), and receive the second counterfeiting token safely from antifalsification label and prevent
Pseudo- object ID (907);
Initiate to carry the mirror that anti-counterfeiting object ID, the second counterfeiting token and the nonowners identify token to owner's mobile phone
Fixed request (908);
Safe result and owner's ID are received from owner's mobile phone, is identified according to the safe result, the nonowners
Identification response of token computation the 3rd (RES3) (913);
Send to server and carry the 3rd identification response (RES3), anti-counterfeiting object ID, the nonowners of owner's ID
Identification request (914);
The false proof mobile phone of the nonowners includes:NFC control units (1501), anti-counterfeiting information processing and control element (PCE) (1502), plus
Close module (1503), safe data storage unit (1504), communication unit (1505);Wherein:
NFC control units (1501) read the mark and safety information of anti-counterfeiting object, the letter for being communicated with anti-counterfeiting object
Breath includes antifalsification label ID;
Anti-counterfeiting information control unit (1502) calls encrypting module to obtain for processing false proof request using counterfeiting token as input
Accordingly result;
Communication unit (1505) is for disappearing between all false proof mobile phones of communications and anti-counterfeit server of anti-counterfeit server
Breath;
Safe data storage unit (1504) asks token for storing ID, identification;
Encrypting module (1503) for process from anti-counterfeiting information processing and control element (PCE) CIPHERING REQUEST.
19. mobile phones as claimed in claim 18, it is characterised in that wherein:
Public key is included in nonowners identification request (905) sent to antifalsification label.
20. mobile phones as claimed in claim 18, it is characterised in that wherein:
The second counterfeiting token is received safely from antifalsification label and anti-counterfeiting object ID (907) is to receive safely by the from antifalsification label
Two counterfeiting tokens calculate the 7th tag security information (Y7) (907) for obtaining;And
Initiate to carry anti-counterfeiting object ID, the 7th tag security information (Y7) and nonowners identification to owner's mobile phone
Identification request (908) of token.
21. mobile phones as claimed in claim 18, it is characterised in that the mobile phone is used for:
Nonowners' search sequence number (S2) is received, anti-counterfeit server input nonowners' mirror search sequence number (S2) is logged in, is looked into
Ask false proof result.
22. a kind of anti-counterfeit servers (103) based on near-field communication technology, it is characterised in that the server is used for:
Identification request (608,903) is received from mobile phone, identification token is created and store for sending (609,904);
From mobile phone receive again identification request (616,914), it is described identification request bag ID containing the owner, anti-counterfeiting object ID and
Identification response (RES1, RES3) calculated by mobile phone, according to corresponding to anti-counterfeiting object ID and being stored in clothes in the identification request
The first counterfeiting token, the second counterfeiting token and identification token computation identification response (RES2, RES4) in business device, if clothes
The identification response that business device is calculated is equal to the identification response that mobile phone is calculated, then correct judgment;
Check owner's ID in the identification request whether corresponding with anti-counterfeiting object ID in identification request and be stored in clothes
ID in business device is consistent, the correct judgment if consistent;
Create, preserve and send search sequence number;
Delete identification token;
The anti-counterfeit server includes:Authentication processing unit (1101), communication unit (1102), Antiforge system user management
Unit (1103), anti-counterfeiting object data base (1104), authentication result queries processing unit (1105), short message sending unit
(1106);Wherein:
Authentication processing unit (1101) is asked and relevant information for receiving authentication from communication unit, from anti-counterfeiting object
Anti-counterfeiting object information is inquired about in data base, from Antiforge system service management unit false proof user profile is inquired about, identify false proof user,
Counterfeiting token is issued to false proof user, carries out calculating the second identification response (RES2) or the 4th identification by safety caculation module
The first identification response (RES1) or the 3rd identification response (RES3) that response (RES4) is sent with false proof mobile phone is compared, if
Unanimously, then it is true, otherwise is false;
Communication unit (110) is asked for processing the authentication sent from false proof mobile phone;
Antiforge system administrative unit (1103) is for inquiring about the mark and safety information of false proof user;
Anti-counterfeiting object data base (1104) is false proof for managing anti-counterfeiting object ID, creator's information, the first counterfeiting token and second
Token;
Authentication result queries processing unit (1105) is looked into for the result received from false proof mobile phone and other ordinary terminals
Request is ask, is inquired about according to the identifying code for reporting;
Short message sending unit (1106) is responsible for sending the identifying code of authentication result to false proof mobile phone and regular handset.
23. servers as claimed in claim 22, it is characterised in that wherein:
Identify that request is owner's identification request from what mobile phone was received, comprising the first counterfeiting token in the identification request;Or
Identify that request is nonowners' identification request from what mobile phone was received, comprising nonowners' ID in the identification request.
24. servers as claimed in claim 22, it is characterised in that the server is additionally operable to:
Create the identification token time limit;
Identification process is not above identifying the token time limit;
Delete the identification token time limit.
25. servers as claimed in claim 22, it is characterised in that the server is additionally operable to:
Storage qualification time is simultaneously associated qualification time with owner's ID.
A kind of 26. Antiforge systems (100) based on near-field communication technology, it is characterised in that:Including as claimed in claim 12
The false proof mobile phone of the owner (102-1) and anti-counterfeit server (103) described in claim 24;Or including as claimed in claim 12
The false proof mobile phone of the owner (102-1), false proof described in the false proof mobile phone of nonowners described in claim 18 and claim 22
Server (103).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410006048.3A CN103763007B (en) | 2014-01-07 | 2014-01-07 | Identification method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410006048.3A CN103763007B (en) | 2014-01-07 | 2014-01-07 | Identification method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103763007A CN103763007A (en) | 2014-04-30 |
CN103763007B true CN103763007B (en) | 2017-04-12 |
Family
ID=50530184
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410006048.3A Expired - Fee Related CN103763007B (en) | 2014-01-07 | 2014-01-07 | Identification method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103763007B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105844477A (en) * | 2016-03-18 | 2016-08-10 | 王小凡 | NFC label information tracking method |
CN106357409A (en) * | 2016-09-06 | 2017-01-25 | 中国银联股份有限公司 | Safety information interaction system and method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102629332A (en) * | 2012-02-20 | 2012-08-08 | 江苏凯路威电子科技有限公司 | Radio frequency identification (RFID) anti-fake method |
CN103218591A (en) * | 2013-05-07 | 2013-07-24 | 南京大学 | Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202383750U (en) * | 2011-11-14 | 2012-08-15 | 马志敏 | Near field communication (NFC) mobile phone and radio frequency identification (RFID) combination type anti-counterfeiting system |
CN103226771A (en) * | 2012-01-31 | 2013-07-31 | 马志敏 | Article authentication and anti-counterfeiting system based on combination of NFC fingerprint mobile phone and RFID (Radio Frequency Identification) |
CN103065168B (en) * | 2012-12-19 | 2016-05-11 | 深圳市江波龙电子有限公司 | A kind of electronic tag method for anti-counterfeit and system |
-
2014
- 2014-01-07 CN CN201410006048.3A patent/CN103763007B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102629332A (en) * | 2012-02-20 | 2012-08-08 | 江苏凯路威电子科技有限公司 | Radio frequency identification (RFID) anti-fake method |
CN103218591A (en) * | 2013-05-07 | 2013-07-24 | 南京大学 | Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same |
Also Published As
Publication number | Publication date |
---|---|
CN103763007A (en) | 2014-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220021662A1 (en) | Operating system for blockchain iot devices | |
TWI770022B (en) | Computer implemented control method, system and control system | |
US7362869B2 (en) | Method of distributing a public key | |
CN109034793A (en) | Digital cash method of commerce and digital cash wallet hardware based on block chain | |
CN109478279A (en) | Method and system for realizing block chain | |
CN108496382A (en) | Security information transmitting system and method for personal identification | |
CN110599342B (en) | Block chain-based identity information authorization method and device | |
KR20220113307A (en) | System to provide genuinity verification and ownership change records of product esset by using a blockchain and a genuine authentiation tag technologies | |
US20230103038A1 (en) | Method for directly transferring electronic coin data sets between terminals, payment system, currency system and monitoring unit | |
CN104125230B (en) | A kind of short message certification service system and authentication method | |
CN107920052A (en) | A kind of encryption method and intelligent apparatus | |
CN103763007B (en) | Identification method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology | |
CN116057554A (en) | Method for managing transaction data sets, participant unit, transaction register and payment system | |
CN103761655B (en) | A kind of assignment method based on near-field communication technology, false proof device and Antiforge system | |
CN115345729A (en) | Credit card issuing method and device, electronic equipment and storage medium | |
CN103745365B (en) | A kind of register method based on near-field communication technology, false proof device and Antiforge system | |
CN117061089B (en) | Voting management method, device, equipment and storage medium | |
KR20190115551A (en) | Method for Providing Cryptocurrency Trade by using Smart Contract based on Blockchain | |
WO2016178074A1 (en) | Storage control of a transferable value or rights token | |
KR20190115552A (en) | Method for Providing Multiple Cryptocurrency Trade by using Smart Contract based on Blockchain | |
US20230091509A1 (en) | Method for directly transmitting electronic coin datasets between terminals, payment system, protection system and monitoring entity | |
Vivek et al. | Enhancing the Security of Aadhar Cards using Blockchain and Steganography | |
US20230222509A1 (en) | Method, terminal, and coin register for transmitting electronic coin data sets | |
JP2008022189A (en) | Electronic application method using virtual storage medium | |
CN117411638A (en) | Service tag authentication method, device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170412 |