CN104217335A - Storing device and method for commodity authenticity verification information, and commodity authenticity verification method - Google Patents

Storing device and method for commodity authenticity verification information, and commodity authenticity verification method Download PDF

Info

Publication number
CN104217335A
CN104217335A CN201310222371.XA CN201310222371A CN104217335A CN 104217335 A CN104217335 A CN 104217335A CN 201310222371 A CN201310222371 A CN 201310222371A CN 104217335 A CN104217335 A CN 104217335A
Authority
CN
China
Prior art keywords
authorization information
nfc
nfc chip
commodity
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310222371.XA
Other languages
Chinese (zh)
Inventor
陈德权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sumavision Technologies Co Ltd
Original Assignee
Sumavision Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sumavision Technologies Co Ltd filed Critical Sumavision Technologies Co Ltd
Priority to CN201310222371.XA priority Critical patent/CN104217335A/en
Publication of CN104217335A publication Critical patent/CN104217335A/en
Pending legal-status Critical Current

Links

Landscapes

  • Cash Registers Or Receiving Machines (AREA)

Abstract

The invention discloses a storing device and a storing method for commodity authenticity verification information, and a commodity authenticity verification method. The device comprises a near field communication (NFC) chip, an NFC antenna, and a connecting piece, wherein the NFC chip is used for storing verification information for verifying commodity authenticity; the NFC antenna is used for receiving a signal for inquiring the verification information from verification equipment and is also used for transmitting the verification information; and the connecting piece is used for connecting the NFC antenna with the NFC chip, in unpacking of the commodity, the connecting piece is damaged due to external force in unpacking, so that the connection between the NFC antenna and the NFC chip is destroyed. According to the technical scheme provided by the invention, counterfeiters can be effectively prevented from stealing the verification information, and the credibility of the commodity authenticity verification process is improved.

Description

The memory storage of commodity true and false authorization information, method and commodity true and false verification method
Technical field
The present invention relates to the communications field, in particular to a kind of memory storage of commodity true and false authorization information, method and commodity true and false verification method.
Background technology
At present, the fake and inferior commodities on home market seriously constrain the fast development of China's economy, have also led the interests of consumers in general into a trap simultaneously.For alcoholic commercial articles, particularly High Grade Liquor, such as: Maotai, five-Grain Liquor etc., because the profit margin of faking is huge, fake producer steals the beams and changes the pillars in the packaging of alcoholic commercial articles to be enough to reach the stage of mixing the spurious with the genuine, and ordinary consumer cannot carry out the true and false of recognition value simply by external packing.
Consumer is mainly through the true and false of following two kinds of means identification alcoholic commercial articles in the market:
Means one, to be distinguished by external packing and bar code;
Means two, commodity in use sequence number, one of at least inquire about: message search, Help by Phone, network inquiry in the following manner.
Due to the almost striking resemblances that counterfeit goods makes with real goods in external packing and bar code, therefore ordinary consumer is difficult to be distinguished by external packing and bar code; Fake producer, by reclaiming the external packing (comprising: the bottle of alcoholic commercial articles) of real goods, by new wine in old bottles, reaches the object of mixing the spurious with the genuine; In addition, commodity sequence number is easily forged, and for fake producer, because the profit of faking is very big, fake producer has the ability oneself to build a set of note or phone or Network Services Center completely, cheat consumers with this, and consumer also just cannot distinguish the true and false of commodity again by this inquiry mode.
Summary of the invention
The invention provides a kind of memory storage of commodity true and false authorization information, method and commodity true and false verification method, easily fake at least to solve in correlation technique the process verifying commodity true and false thus make the problem that the confidence level of commodity true and false proof procedure is lower.
According to an aspect of the present invention, a kind of memory storage of commodity true and false authorization information is provided.
Memory storage according to commodity true and false authorization information of the present invention comprises: near-field communication (Near Field Communication, referred to as NFC) chip, for the authorization information of memory check commodity true and false; NFC antenna, for receiving the signal of the inquiring and authenticating information coming from Authentication devices, also for sending authorization information; Web member, for connecting NFC antenna and NFC chip, wherein, in commodity decapsulation process, it is impaired that web member is subject to externally applied forces in decapsulation process, makes the continuous damage between NFC antenna and NFC chip.
Preferably, above-mentioned web member, for being subject to being pulled off under the tension force effect on one or more directions outside along the center of gravity of web member.
Preferably, NFC antenna, also for receiving the radiofrequency signal coming from NFC card-reading apparatus, and being sent to NFC chip by radiofrequency signal, wherein, carrying authorization information in radiofrequency signal; NFC chip, also for preserving authorization information.
Preferably, NFC chip, also for generating the first random number, wherein, NFC chip extracts the second random number from authorization information, and the second random number and the first random number is compared, if comparative result is consistent, then preserves authorization information.
Preferably, NFC chip, also for receiving the first signature authentication result coming from NFC card-reading apparatus, adopt the authenticate key and the first generating random number second signature authentication result that write in advance, and the first signature authentication result and the second signature authentication result are compared, if comparative result is consistent, then Receipt Validation information.
Preferably, NFC chip, also for adopting the data key of writing write in advance to be decrypted process to the authorization information encrypted through NFC card-reading apparatus, wherein, NFC card-reading apparatus is before writing NFC chip by authorization information, and employing is write data key and is encrypted authorization information.
According to a further aspect in the invention, a kind of storage system of commodity true and false authorization information is provided.
Storage system according to commodity true and false authorization information of the present invention comprises: commodity true and false authorization information memory storage and Authentication devices, and wherein, Authentication devices supports NFC function, Authentication devices, for reading the authorization information that is stored in NFC chip and showing.
Preferably, said system can also comprise: NFC card-reading apparatus; NFC card-reading apparatus, for writing NFC chip by authorization information.
According to another aspect of the invention, a kind of verification method of commodity true and false is provided.
Verification method according to commodity true and false of the present invention comprises: receive the request signal coming from Authentication devices via NFC antenna; Be sent in the authorization information stored in NFC chip, wherein, the true and false of authorization information for making Authentication devices judge NFC chip and NFC antenna place commodity; Bear externally applied forces in commodity decapsulation process, wherein, make the continuous damage between NFC antenna and NFC chip when external force is greater than predetermined threshold value.
Preferably, before reception comes from the request signal of Authentication devices, also comprise: receive the first signature authentication result coming from NFC card-reading apparatus, wherein, first signature authentication result from NFC chip, reads random number by NFC card-reading apparatus, and adopting the authenticate key preset to carry out random number, signature authentication obtains; Adopt the authenticate key preset to carry out signature authentication to random number and generate the second signature authentication result; First signature authentication result and the second signature authentication result are compared; If comparative result is consistent, then prepare Receipt Validation information.
Preferably, before reception comes from the request signal of Authentication devices, also comprise: receive and come from the radiofrequency signal of NFC card-reading apparatus, wherein, carry in radiofrequency signal NFC card-reading apparatus adopt preset write the authorization information that data key is encrypted; Adopt the information of carrying in data key radio frequency signal of writing preset to be decrypted process, obtain authorization information and store.
Preferably, after acquisition authorization information also stores, also comprise: receive the 3rd signature authentication result coming from Authentication devices, wherein, 3rd signature authentication result from NFC chip, reads random number by Authentication devices, and adopting the authenticate key preset to carry out random number, signature authentication obtains; Adopt the authenticate key preset to carry out signature authentication to random number and generate the 4th signature authentication result; 3rd signature authentication result and the 4th signature authentication result are compared; If comparative result is consistent, then prepare to receive request signal.
Preferably, after reception comes from the request signal of Authentication devices, before being sent in the authorization information stored in NFC chip, also comprise: adopt the read data double secret key authorization information preset to be encrypted; Send the authorization information through encryption to Authentication devices, wherein, authorization information is presented on Authentication devices after adopting the read data key preset to be decrypted process through Authentication devices.
Preferably, after being sent in the authorization information stored in NFC chip, also comprise: receive the erasure signal coming from the deletion authorization information of Authentication devices; Authorization information is removed according to erasure signal.
Pass through the present invention, adopt, on commodity, NFC chip and NFC antenna are installed respectively, the authorization information of NFC chip memory check commodity true and false, NFC antenna receives the signal and transmission authorization information that come from the described authorization information of inquiry of Authentication devices, in addition, between NFC antenna and NFC chip, web member is set, it is impaired that this web member is subject to externally applied forces in decapsulation process, make the continuous damage between NFC antenna and NFC chip, owing to only realizing the inquiry of one-time authentication information between Authentication devices and commodity, after determining commodity true and false, by web member being made to damage commodity decapsulation, NFC chip cannot reuse, solve in correlation technique the process verifying commodity true and false thus easily fake thus make the problem that the confidence level of commodity true and false proof procedure is lower, and then prevent fake producer from usurping authorization information, improve the confidence level of commodity true and false proof procedure.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, and form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the structured flowchart of the memory storage of commodity true and false authorization information according to the embodiment of the present invention;
Fig. 2 is the structured flowchart of the storage system of commodity true and false authorization information according to the embodiment of the present invention;
Fig. 3 is the structured flowchart of the storage system of commodity true and false authorization information according to the preferred embodiment of the invention;
Fig. 4 is the process flow diagram of the verification method of commodity true and false according to the embodiment of the present invention;
Fig. 5 is the structured flowchart of the demo plant of commodity true and false according to the embodiment of the present invention;
Fig. 6 is the structured flowchart of the demo plant of commodity true and false according to the preferred embodiment of the invention.
Embodiment
Hereinafter also describe the present invention in detail with reference to accompanying drawing in conjunction with the embodiments.It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combine mutually.
In the following description, for the Authentication devices of checking commodity true and false, except as otherwise noted, otherwise represent with reference to the symbol of the action performed by one or more computing machine and operation each embodiment describing the application.Wherein, computing machine comprises the various products such as personal computer, server, mobile terminal, employs the equipment that CPU, single-chip microcomputer, DSP etc. have a process chip and all can be called computing machine.Thus, be appreciated that processing unit that this kind of action performed sometimes referred to as computing machine and operation comprise computing machine is to the manipulation of electric signal representing data with structured form.It is safeguarded in this manipulation transforms data or the position in the accumulator system of computing machine, and this reshuffles or changes the operation of computing machine in the mode that those skilled in the art understands.The data structure of service data is the physical location of the storer of the particular community that the form with data defines.But although describe the present invention in above-mentioned context, it does not also mean that restrictive, as understood by those skilled in the art, hereinafter described action and each side of operation also can realize with hardware.
Turn to accompanying drawing, wherein identical reference number refers to identical element, and the principle of the application is shown in a suitable computing environment and realizes.Below describe the embodiment based on described the application, and should not think about the alternative embodiment clearly do not described herein and limit the application.
Fig. 1 is the structured flowchart of the memory storage of commodity true and false authorization information according to the embodiment of the present invention.As shown in Figure 1, the memory storage of this commodity true and false authorization information can comprise: NFC chip 10, for the authorization information of memory check commodity true and false; NFC antenna 20, for receiving the signal of the inquiring and authenticating information coming from Authentication devices, also for sending authorization information; Web member 30, for connecting NFC antenna and NFC chip, wherein, in commodity decapsulation process, it is impaired that web member is subject to externally applied forces in decapsulation process, makes the continuous damage between NFC antenna and NFC chip.
In correlation technique, the process of checking commodity true and false is easily faked and is caused the confidence level of commodity true and false proof procedure lower.Adopt device as shown in Figure 1, commodity install NFC chip and NFC antenna respectively, the authorization information of NFC chip memory check commodity true and false, NFC antenna receives the signal and transmission authorization information that come from the described authorization information of inquiry of Authentication devices, in addition, between NFC antenna and NFC chip, web member is set, it is impaired that this web member is subject to externally applied forces in decapsulation process, make the continuous damage between NFC antenna and NFC chip, owing to only realizing the inquiry of one-time authentication information between Authentication devices and commodity, after determining commodity true and false, by web member being made to damage commodity decapsulation, NFC chip cannot reuse, solve in correlation technique the process verifying commodity true and false thus easily fake thus make the problem that the confidence level of commodity true and false proof procedure is lower, and then prevent fake producer from usurping authorization information, improve the confidence level of commodity true and false proof procedure.
In a preferred embodiment, the technical scheme adopting the claims in the present invention 1 to provide can effectively prevent fake producer from wantonly usurping authorization information, such as: in correlation technique, consumer is after drinking the wine in bottle up, usually deliberately can not cause damage to bottle, the authenticity verification information in bottle of remaining in thus provides opportunity for fake producer.Fake producer, by reclaiming the external packing (as: bottle of high-grade drinks) of real goods, only by new wine in old bottles, need can reach and mix the spurious with the genuine, and deception consumer, gets rich profit.And according to the technical scheme provided in claim 1, introduce near-field communication, near-field communication is also called wireless near field communication, be a kind of short-range high frequency wireless communication technology, it allows to carry out contactless Point-to-Point Data Transmission (usually within ten centimetres) between electronic equipment and exchanges data.NFC chip has mutual communication function, computing power and the integrated circuit (IC) chip containing encryption logic circuit.Even if consumer may not carry out any damage to bottle after drinking and be abandoned drinking up, but because commodity are in decapsulation process, web member between NFC antenna and NFC chip is destroyed, and therefore, the authenticity verification information of abandoned bottle cannot be reused by fake producer.
As for the NFC antenna mentioned in claim 1 and NFC chip, the position relationship on commodity is not specifically limited in the present invention, as long as the web member between NFC antenna and NFC chip can be caused in decapsulation process to damage.Such as: the closure inside that NFC chip can be arranged on bottled commodity, and NFC antenna is arranged on the outer wall of bottled commodity, is connected by plain conductor between NFC antenna with NFC chip.In the process of commodity decapsulation (such as: consumer's twist-off closure), above-mentioned plain conductor generation physical damage, NFC chip cannot reuse, thus guarantee the confidence level of commodity true and false proof procedure.
In preferred implementation process, above-mentioned web member, for being subject to being pulled off under the tension force effect on one or more directions outside along the center of gravity of web member.
In a preferred embodiment, various types of web member all has respective center of gravity and center of gravity is unique, and in decapsulation process, such as: opening bottled commodity needs bottle cap upwards to pull up, web member may can be subject to along center of gravity upwards and along the reverse tension in the downward both direction of center of gravity respectively, until web member is pulled off.
Preferably, NFC antenna 20, also for receiving the radiofrequency signal coming from NFC card-reading apparatus, and being sent to NFC chip by radiofrequency signal, wherein, carrying authorization information in radiofrequency signal; NFC chip 10, also for preserving authorization information.
In a preferred embodiment, authorization information can be write NFC chip by NFC antenna by NFC card-reading apparatus, and namely authorization information can be carried in radiofrequency signal by NFC card-reading apparatus, and sends radiofrequency signal to NFC antenna; NFC antenna receives radiofrequency signal and forwards radiofrequency signal to NFC chip; NFC chip can be extracted authorization information and store from radiofrequency signal.
Preferably, NFC chip 10, also for generating the first random number, wherein, NFC chip extracts the second random number from authorization information, and the second random number and the first random number is compared, if comparative result is consistent, then preserves authorization information.
In a preferred embodiment, be adopt the mode of non-malicious that authorization information is write NFC chip in order to ensure NFC card-reading apparatus, therefore, NFC chip can generate a random number at therein, also can receive another random number from NFC card-reading apparatus simultaneously.Two random numbers can compare by NFC chip, if comparative result is consistent, then illustrate that the authorization information of the current write NFC chip of NFC card-reading apparatus can be stored in NFC chip.
Preferably, NFC chip 10, also for receiving the first signature authentication result coming from NFC card-reading apparatus, adopt the authenticate key and the first generating random number second signature authentication result that write in advance, and the first signature authentication result and the second signature authentication result are compared, if comparative result is consistent, then Receipt Validation information.
In a preferred embodiment, NFC card-reading apparatus can use the random number of authenticate key to preset length (such as: 16 bytes) preset to carry out signature authentication, thus obtaining a signature authentication result, the algorithm that above-mentioned signature authentication adopts usually can include but not limited to one of following: Message Digest Algorithm 5 (MD5), Secure Hash Algorithm (Sha1); Signature authentication result is sent to NFC chip by NFC card-reading apparatus, and NFC chip inside also can use identical authenticate key, identical random number and identical algorithm to produce another signature authentication result.NFC chip needs two signature authentication results to compare, and when comparative result is consistent, has continued the operation that authorization information is write NFC chip by NFC card-reading apparatus.
Preferably, NFC chip 10, also for adopting the data key of writing write in advance to be decrypted process to the authorization information encrypted through NFC card-reading apparatus, wherein, NFC card-reading apparatus is before writing NFC chip by authorization information, and employing is write data key and is encrypted authorization information.
In a preferred embodiment, NFC card-reading apparatus can gather the authorization information that will be written to NFC chip, this authorization information at least can comprise following content: trade name, manufacturer, address, date of manufacture, sequence number, random number and the signature result to above-mentioned information, and its signature algorithm can adopt MD5 or Sha1; The use of NFC card-reading apparatus is write data key and is encrypted authorization information, and its cryptographic algorithm can adopt Advanced Encryption Standard (AES), triple data encryption algorithm (3DES); Then write in NFC chip by the authorization information after encryption, NFC chip can adopt same data key of writing to be decrypted operation, obtains authorization information.
Fig. 2 is the structured flowchart of the storage system of commodity true and false authorization information according to the embodiment of the present invention.As shown in Figure 2, the storage system of this commodity true and false authorization information can comprise: above-mentioned commodity true and false authorization information memory storage 1 and Authentication devices 2, and wherein, Authentication devices needs to support NFC function, Authentication devices 2, for reading the authorization information that is stored in NFC chip and showing.
Adopt system as shown in Figure 2, solve in correlation technique the process verifying commodity true and false easily fake thus make the problem that the confidence level of commodity true and false proof procedure is lower, and then prevent fake producer from usurping authorization information, improve the confidence level of commodity true and false proof procedure.
In a preferred embodiment, safe unit (Security Element can be embedded in the mobile terminal supporting NFC function, referred to as SE), consumer can use the mobile terminal carrying SE to carry out commodity true and false and distinguish, the form of SE can be one of following: Subscriber Identity Module (SIM) Card, safe digital card (SD card), can authentication storage key and read data key in SE.
Preferably, as shown in Figure 3, said system can also comprise: NFC card-reading apparatus 3; NFC card-reading apparatus 3, for writing NFC chip by authorization information.
Fig. 4 is the process flow diagram of the verification method of commodity true and false according to the embodiment of the present invention.As shown in Figure 4, the method can comprise following treatment step:
Step S402: receive the request signal coming from Authentication devices via NFC antenna;
Step S404: be sent in the authorization information stored in NFC chip, wherein, the true and false of authorization information for making Authentication devices judge NFC chip and NFC antenna place commodity;
Step S406: bear externally applied forces in commodity decapsulation process, wherein, make the continuous damage between NFC antenna and NFC chip when external force is greater than predetermined threshold value.
Adopt method as shown in Figure 4, solve in correlation technique the process verifying commodity true and false easily fake thus make the problem that the confidence level of commodity true and false proof procedure is lower, and then prevent fake producer from usurping authorization information, improve the confidence level of commodity true and false proof procedure.
Preferably, in step S402, receive before coming from the request signal of Authentication devices, following operation can also be comprised:
Step S1: receive and come from the first signature authentication result of NFC card-reading apparatus, wherein, the first signature authentication result reads random number by NFC card-reading apparatus from NFC chip, and adopting the authenticate key preset to carry out random number, signature authentication obtains;
Step S2: adopt the authenticate key preset to carry out signature authentication to random number and generate the second signature authentication result;
Step S3: the first signature authentication result and the second signature authentication result are compared; If comparative result is consistent, then prepare Receipt Validation information.
In a preferred embodiment, in order to ensure the reliability of the authorization information in NFC card-reading apparatus write NFC chip, instead of arbitrarily write, forge authorization information to prevent fake producer.First NFC chip can complete the certification to NFC card-reading apparatus in authorization information initialization procedure, namely NFC chip can by self generating a random number, then NFC card-reading apparatus can read this random number from NFC chip, identical authenticate key is adopted to carry out signature authentication to random number respectively by NFC card-reading apparatus and NFC chip again, only when the coming to the same thing of both signature authentications, NFC card-reading apparatus just can to write verification information in NFC chip.
Preferably, in step S402, receive before coming from the request signal of Authentication devices, can also comprise the following steps:
Step S4: receive and come from the radiofrequency signal of NFC card-reading apparatus, wherein, carry in radiofrequency signal NFC card-reading apparatus adopt preset write the authorization information that data key is encrypted;
Step S5: adopt the information of carrying in data key radio frequency signal of writing preset to be decrypted process, obtain authorization information and store.
In a preferred embodiment, complete the certification of NFC chip to NFC card-reading apparatus, after the radiofrequency signal carrying authorization information is sent to NFC chip by NFC card-reading apparatus, NFC chip can extract random number information wherein from authorization information, then the random number that the random number extracted and NFC chip self generate is compared, if comparative result is consistent, then illustrate that the authorization information be currently received can store by NFC chip.
In a preferred embodiment, for the production run of alcoholic commercial articles (i.e. the initialization procedure of commodity authorization information), alcoholic commercial articles can adopt following production run:
The first step, in the bottle cap of bottle, embed NFC chip (authenticate key KEYa can be write in advance in NFC chip, write data key KEYw and read data key K EYr); In addition, also on bottle, NFC antenna is pasted;
Second step, encapsulation alcoholic commercial articles process in, by plain conductor, the NFC chip on bottle cap and the NFC antenna on bottle can be coupled together;
3rd step, alcoholic commercial articles encapsulation after, initialization can be carried out by NFC card-reading apparatus to NFC chip.
In the preferred embodiment, above by NFC card-reading apparatus, initialized flow process carried out to NFC chip as follows:
Step one: NFC card-reading apparatus and NFC chip set up wireless telecommunications;
Step 2: NFC card-reading apparatus reads the random number R of 16 bytes from NFC chip;
Step 3: NFC card-reading apparatus uses the random number R of authenticate key KEYa to 16 bytes to sign, thus obtain Ra, wherein, the signature algorithm of employing can include but not limited to one of following: Message Digest Algorithm 5 (MD5), Secure Hash Algorithm (Sha1);
Step 4: signature result Ra is sent to NFC chip by NFC card-reading apparatus, NFC chip inside also can use identical authenticate key KEYa, random number R and algorithm to produce signature result Rb;
Step 5: the signature result Ra received and the signature result Rb self calculated compares by NFC chip, if Ra is not equal to Rb, then returns failure information; If Ra equals Rb, then return success, and proceed initialization;
Step 6: NFC card-reading apparatus gathers the data (Data) that will be written to NFC chip, these data (i.e. above-mentioned authorization information) at least can comprise: trade name, manufacturer, address, date of manufacture, sequence number, random number and the signature result to above-mentioned data, and its signature algorithm can adopt MD5 or Sha1; The use of NFC card-reading apparatus is write data key KEYw and is encrypted Data and then obtains Data ', and its cryptographic algorithm can adopt Advanced Encryption Standard (AES), triple data encryption algorithm (3DES); Then Data ' is write in NFC chip;
Step 7: NFC chip, after receiving Data ', uses KEYw to be decrypted process to Data ', and verifies the data after deciphering, if verify unsuccessfully, then return error message; If verification succeeds, then continue to perform initialization operation;
Step 8: it is inner that the data Data after deciphering is saved to this NFC chip by NFC chip, thus complete NFC chip initialization procedure.
After completing initialization operation to NFC chip, alcoholic commercial articles just can be for sale.
Preferably, in step S5, obtain authorization information and after storage, following operation can also be comprised:
Step S6: receive and come from the 3rd signature authentication result of Authentication devices, wherein, the 3rd signature authentication result reads random number by Authentication devices from NFC chip, and adopting the authenticate key preset to carry out random number, signature authentication obtains;
Step S7: adopt the authenticate key preset to carry out signature authentication to random number and obtain the 4th signature authentication result;
Step S8: the 3rd signature authentication result and the 4th signature authentication result are compared; If comparative result is consistent, then prepare to receive request signal.
In a preferred embodiment, the authorization information in NFC chip can be read in order to ensure Authentication devices, forge authorization information to prevent fake producer.First NFC chip can complete the certification to Authentication devices in authorization information query script, namely NFC chip can by self generating a random number, then Authentication devices can read this random number from NFC chip, identical authenticate key is adopted to carry out signature authentication to random number respectively by Authentication devices and NFC chip again, only when the coming to the same thing of both signature authentications, Authentication devices just can read authorization information from NFC chip.
Preferably, after reception comes from the request signal of Authentication devices, before being sent in the authorization information stored in NFC chip, can also comprise the following steps:
Step S9: adopt the read data double secret key authorization information preset to be encrypted;
Step S10: send the authorization information through encryption to Authentication devices, wherein, authorization information is presented on Authentication devices after adopting the read data key preset to be decrypted process through Authentication devices.
In a preferred embodiment, in order to ensure the security of the authorization information sent from NFC chip to Authentication devices, NFC chip can adopt default read data double secret key authorization information to be encrypted, and only have storage inside to have the Authentication devices of above-mentioned default read data key to authorization information row decryption processing thus display authorization information, and then the complexity that fake producer obtains authorization information can be effectively increased.
Preferably, in step S404, after being sent in the authorization information stored in NFC chip, following operation can also be comprised:
Step S11: receive the erasure signal coming from the deletion authorization information of Authentication devices;
Step S12: remove authorization information according to erasure signal.
In a preferred embodiment, except adopting and in commodity decapsulation process, the connection between NFC antenna and NFC chip being damaged, can also after Authentication devices gets authorization information, namely send the radiofrequency signal of deleting the authorization information stored in NFC chip to NFC antenna, thus guarantee that authorization information is not usurped by fake producer further.
In a preferred embodiment, consumer can use Authentication devices (such as: the mobile terminal carrying the support NFC function of SE) to carry out commodity true and false and distinguish, the form of SE can be one of following: Subscriber Identity Module (SIM) Card, safe digital card (SD card), be preset with authenticate key KEYa and read data key K EYr in SE, concrete commodity true and false distinguishes that flow process is as follows:
Step one: the wireless telecommunications of the NFC chip that mobile terminal is set up and commodity are carried;
Step 2: mobile terminal reads 16 byte random number R from NFC chip;
Step 3: mobile terminal uses the authenticate key KEYa in SE, signs to R, obtains the result Ra that signs;
Step 4: Ra is sent to NFC chip by mobile terminal, NFC chip, after receiving Ra, uses the authenticate key KEYa of self to sign to random number R, obtains the result Rb that signs; If Ra is not equal to Rb, then return failure information; If Ra equals Rb, then return success, continue to perform follow-up flow process;
Step 5: mobile terminal sends read data order to NFC chip, NFC chip uses and reads key K EYr, the Data being kept at NFC chip inside is encrypted and obtains Data ', wherein, above-mentioned Data data can include but not limited to following one of at least: trade name, manufacturer, address, date of manufacture, sequence number, Rb and the signature result to above-mentioned data;
Step 6: mobile terminal, after receiving Data ', uses the key K EYr that reads in SE to be decrypted process to Data ', and verifies the data after deciphering, then show check results on interface; If verify unsuccessfully, then notify that these commodity of consumer are counterfeit and shoddy goods; If by verification, then display of commodity title, manufacturer, date of manufacture and sequence number, consumer can carry out secondary verification according to the information of display and the information in packaging;
Step 7: whether mobile terminal display removes the information of NFC chip information interface; If consumer clicks "No", then this does not destroy NFC chip; If consumer clicks "Yes", then mobile terminal sends clear command to NFC chip;
Step 8: NFC chip, after receiving clear command, removes the information that NFC chip inside is preserved;
Step 9: consumer is when rotary bottle cover opens commodity, the NFC chip wire in bottle cap can be destroyed, thus cut off the connection of NFC antenna on NFC chip and bottle, cause NFC chip unavailable, re-use this NFC chip to prevent fake producer and forge fake and inferior commodities, deception consumer.
Fig. 5 is the structured flowchart of the demo plant of commodity true and false according to the embodiment of the present invention.As shown in Figure 5, the demo plant of this commodity true and false can comprise: the first receiver module 100, for receiving the request signal coming from Authentication devices via NFC antenna; First sending module 102, for being sent in the authorization information stored in NFC chip, wherein, the true and false of authorization information for making Authentication devices judge NFC chip and NFC antenna place commodity; Processing module 104, for bearing externally applied forces in commodity decapsulation process, wherein, makes the continuous damage between NFC antenna and NFC chip when external force is greater than predetermined threshold value.
Adopt device as shown in Figure 5, solve in correlation technique the process verifying commodity true and false easily fake thus make the problem that the confidence level of commodity true and false proof procedure is lower, and then prevent fake producer from usurping authorization information, improve the confidence level of commodity true and false proof procedure.
Preferably, as shown in Figure 6, this device can also comprise: the second receiver module 106, for receiving the first signature authentication result coming from NFC card-reading apparatus, wherein, first signature authentication result from NFC chip, reads random number by NFC card-reading apparatus, and adopting the authenticate key preset to carry out random number, signature authentication obtains; First generation module 108, carries out signature authentication for adopting default authenticate key to random number and generates the second signature authentication result; First comparison module 110, for comparing the first signature authentication result and the second signature authentication result; If comparative result is consistent, then prepare Receipt Validation information.
Preferably, as shown in Figure 6, this device also comprises: the 3rd receiver module 112, for receiving the radiofrequency signal coming from NFC card-reading apparatus, wherein, carry in radiofrequency signal NFC card-reading apparatus adopt preset write the authorization information that data key is encrypted; Memory module 114, for adopting the default information of carrying in data key radio frequency signal of writing to be decrypted process, obtaining authorization information and storing.
Preferably, as shown in Figure 6, this device also comprises: the 4th receiver module 116, for receiving the 3rd signature authentication result coming from Authentication devices, wherein, 3rd signature authentication result from NFC chip, reads random number by Authentication devices, and adopting the authenticate key preset to carry out random number, signature authentication obtains; Second generation module 118, carries out signature authentication for adopting default authenticate key to random number and generates the 4th signature authentication result; Second comparison module 120, for comparing the 3rd signature authentication result and the 4th signature authentication result; If comparative result is consistent, then prepare to receive request signal.
Preferably, as shown in Figure 6, this device also comprises: encrypting module 122, is encrypted for adopting default read data double secret key authorization information; Second sending module 124, for sending the authorization information through encryption to Authentication devices, wherein, authorization information is presented on Authentication devices after adopting the read data key preset to be decrypted process through Authentication devices.
Preferably, as shown in Figure 6, this device also comprises: the 5th receiver module 126, for receiving the erasure signal of the deletion authorization information coming from Authentication devices; Removing module 128, for removing authorization information according to erasure signal.
From above description, can find out, above embodiments enable following technique effect (it should be noted that these effects are effects that some preferred embodiment can reach): merchandise news can be written in NFC chip by technical scheme provided by the present invention, and protected by key, thus make fake producer cannot copying and forging fake and inferior commodities; Consumer can read the merchandise news of preserving in NFC chip by SE, and upper to itself and the packaging information shown is compared, thus can confirm the true and false of commodity further; The merchandise news that NFC chip is preserved can be deleted in process of consumption, is usurped by fake producer to prevent merchandise news; NFC chip there will be physical damage in process of consumption, can prevent merchandise news from being usurped by fake producer further.Thus, be convenient to the true and false that consumer picks out commodity quickly and accurately, to safeguard the rights and interests of consumer.
Obviously, those skilled in the art should be understood that, above-mentioned of the present invention each module or each step can realize with general calculation element, they can concentrate on single calculation element, or be distributed on network that multiple calculation element forms, alternatively, they can realize with the executable program code of calculation element, thus, they can be stored and be performed by calculation element in the storage device, and in some cases, step shown or described by can performing with the order be different from herein, or they are made into each integrated circuit modules respectively, or the multiple module in them or step are made into single integrated circuit module to realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (14)

1. a memory storage for commodity true and false authorization information, is characterized in that, comprising:
Near-field communication NFC chip, for the authorization information of memory check commodity true and false;
NFC antenna, for receiving the signal of the described authorization information of the inquiry coming from Authentication devices, also for sending described authorization information;
Web member, for connecting described NFC antenna and described NFC chip, wherein, in commodity decapsulation process, it is impaired that described web member is subject to externally applied forces in described decapsulation process, makes the continuous damage between described NFC antenna and described NFC chip.
2. device according to claim 1, is characterized in that, described web member, for being subject to being pulled off under the tension force effect on one or more directions outside along the center of gravity of described web member.
3. device according to claim 1, is characterized in that,
Described NFC antenna, also for receiving the radiofrequency signal coming from NFC card-reading apparatus, and is sent to described NFC chip by described radiofrequency signal, wherein, carries described authorization information in described radiofrequency signal;
Described NFC chip, also for preserving described authorization information.
4. device according to claim 3, is characterized in that,
Described NFC chip, also for generating the first random number, wherein, described NFC chip extracts the second random number from described authorization information, and described second random number and described first random number are compared, if comparative result is consistent, then preserve described authorization information.
5. device according to claim 4, is characterized in that,
Described NFC chip, also for receiving the first signature authentication result coming from NFC card-reading apparatus, adopt the authenticate key and described first generating random number second signature authentication result that write in advance, and described first signature authentication result and described second signature authentication result are compared, if comparative result is consistent, then receive described authorization information.
6. device according to claim 5, is characterized in that,
Described NFC chip, also for adopting the data key of writing write in advance to be decrypted process to the described authorization information encrypted through described NFC card-reading apparatus, wherein, described NFC card-reading apparatus, before described authorization information is write described NFC chip, adopts authorization information described in write data double secret key to be encrypted.
7. the storage system of a commodity true and false authorization information, it is characterized in that, comprise: the commodity true and false authorization information memory storage described in claim 1 or 2 and Authentication devices, wherein, described Authentication devices supports near-field communication NFC function, described Authentication devices, for reading the described authorization information that is stored in NFC chip and showing.
8. system according to claim 7, is characterized in that, described system also comprises: NFC card-reading apparatus;
Described NFC card-reading apparatus, for writing described NFC chip by described authorization information.
9. a verification method for commodity true and false, is characterized in that, comprising:
The request signal coming from Authentication devices is received via near-field communication NFC antenna;
Be sent in the authorization information stored in NFC chip, wherein, the true and false of described authorization information for making described Authentication devices judge described NFC chip and described NFC antenna place commodity;
Bear externally applied forces in described commodity decapsulation process, wherein, make the continuous damage between described NFC antenna and described NFC chip when described external force is greater than predetermined threshold value.
10. method according to claim 9, is characterized in that, before reception comes from the described request signal of described Authentication devices, also comprises:
Receive the first signature authentication result coming from NFC card-reading apparatus, wherein, described first signature authentication result from described NFC chip, reads random number by described NFC card-reading apparatus, and adopting the authenticate key preset to carry out described random number, signature authentication obtains;
Adopt described default authenticate key to carry out signature authentication to described random number and generate the second signature authentication result;
Described first signature authentication result and described second signature authentication result are compared; If comparative result is consistent, then prepare to receive described authorization information.
11. methods according to claim 10, is characterized in that, before reception comes from the described request signal of described Authentication devices, also comprise:
Receive and come from the described radiofrequency signal of described NFC card-reading apparatus, wherein, carry in described radiofrequency signal described NFC card-reading apparatus adopt preset write the described authorization information that data key is encrypted;
Adopt described default data key of writing to be decrypted process to the information of carrying in described radiofrequency signal, obtain described authorization information and store.
12. methods according to claim 11, is characterized in that, after the described authorization information of acquisition also stores, also comprise:
Receive the 3rd signature authentication result coming from described Authentication devices, wherein, described 3rd signature authentication result from described NFC chip, reads described random number by described Authentication devices, and adopting described default authenticate key to carry out described random number, signature authentication obtains;
Adopt described default authenticate key to carry out signature authentication to described random number and generate the 4th signature authentication result;
Described 3rd signature authentication result and described 4th signature authentication result are compared; If comparative result is consistent, then prepare to receive described request signal.
13. methods according to claim 12, is characterized in that, after reception comes from the described request signal of described Authentication devices, before being sent in described NFC chip the described authorization information stored, also comprise:
Authorization information described in default read data double secret key is adopted to be encrypted;
Send the described authorization information through encryption to described Authentication devices, wherein, described authorization information is presented on described Authentication devices after adopting described default read data key to be decrypted process through described Authentication devices.
14. methods according to claim 13, is characterized in that, after being sent in described NFC chip the described authorization information stored, also comprise:
Receive the erasure signal coming from the described authorization information of deletion of described Authentication devices;
Described authorization information is removed according to described erasure signal.
CN201310222371.XA 2013-06-05 2013-06-05 Storing device and method for commodity authenticity verification information, and commodity authenticity verification method Pending CN104217335A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310222371.XA CN104217335A (en) 2013-06-05 2013-06-05 Storing device and method for commodity authenticity verification information, and commodity authenticity verification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310222371.XA CN104217335A (en) 2013-06-05 2013-06-05 Storing device and method for commodity authenticity verification information, and commodity authenticity verification method

Publications (1)

Publication Number Publication Date
CN104217335A true CN104217335A (en) 2014-12-17

Family

ID=52098793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310222371.XA Pending CN104217335A (en) 2013-06-05 2013-06-05 Storing device and method for commodity authenticity verification information, and commodity authenticity verification method

Country Status (1)

Country Link
CN (1) CN104217335A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105657961A (en) * 2016-03-28 2016-06-08 柳州龙辉科技有限公司 Secret leakage prevention device
CN107822208A (en) * 2017-12-11 2018-03-23 深圳市海派特光伏科技有限公司 Electronic cigarette and electronic cigarette activation system
CN109760942A (en) * 2018-11-29 2019-05-17 四川商通实业有限公司 A kind of wine bottle cover showing dynamic anti-counterfeiting code and its dynamic anti-fake method
CN111994456A (en) * 2020-08-20 2020-11-27 天地融科技股份有限公司 Power generation self-destruction anti-counterfeiting device and system of liquid container
CN112651747A (en) * 2019-10-11 2021-04-13 珠海荣奇微电子科技有限公司 Anti-counterfeiting authentication label and anti-counterfeiting authentication system
CN112734441A (en) * 2019-10-11 2021-04-30 珠海荣奇微电子科技有限公司 Anti-counterfeiting authentication method and device
CN108573296B (en) * 2018-07-02 2024-03-15 北京广弘电子信息技术有限公司 Anti-counterfeiting device, anti-counterfeiting system and anti-counterfeiting method

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101882277A (en) * 2009-05-08 2010-11-10 深圳市爱特智能系统有限公司 Wine anti-counterfeit method and system thereof

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101882277A (en) * 2009-05-08 2010-11-10 深圳市爱特智能系统有限公司 Wine anti-counterfeit method and system thereof

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105657961A (en) * 2016-03-28 2016-06-08 柳州龙辉科技有限公司 Secret leakage prevention device
CN107822208A (en) * 2017-12-11 2018-03-23 深圳市海派特光伏科技有限公司 Electronic cigarette and electronic cigarette activation system
CN108573296B (en) * 2018-07-02 2024-03-15 北京广弘电子信息技术有限公司 Anti-counterfeiting device, anti-counterfeiting system and anti-counterfeiting method
CN109760942A (en) * 2018-11-29 2019-05-17 四川商通实业有限公司 A kind of wine bottle cover showing dynamic anti-counterfeiting code and its dynamic anti-fake method
CN112651747A (en) * 2019-10-11 2021-04-13 珠海荣奇微电子科技有限公司 Anti-counterfeiting authentication label and anti-counterfeiting authentication system
CN112734441A (en) * 2019-10-11 2021-04-30 珠海荣奇微电子科技有限公司 Anti-counterfeiting authentication method and device
CN111994456A (en) * 2020-08-20 2020-11-27 天地融科技股份有限公司 Power generation self-destruction anti-counterfeiting device and system of liquid container

Similar Documents

Publication Publication Date Title
CN104217335A (en) Storing device and method for commodity authenticity verification information, and commodity authenticity verification method
CN103065168B (en) A kind of electronic tag method for anti-counterfeit and system
CN102136079B (en) Dynamic authentication method between reader and tag card and implementing device thereof
CN102831529A (en) Radio frequency based commodity information identification method and system
CN103279693B (en) A kind of file encrypting method
CN102855574A (en) Method and system for identifying commodity information based on NFC (Near Field Communication)
CN103473592B (en) A kind of label off-line authenticating method and device based on CPK system
CN104217327A (en) Financial IC (integrated circuit) card Internet terminal and trading method thereof
CN103279775B (en) Ensure that secret and the rfid system of data integrity and its implementation
CN202870900U (en) NFC (Near Field Communication)-based commodity information identification system
CN104320250A (en) Anti-counterfeiting authentication method based on NFC chip
GB2444652A (en) A method for implementing encryption and the device thereof
CN101656748A (en) Second-generation ID card online inquiry system and method based on secure network
WO2018227685A1 (en) Method and system for secure access of terminal device to internet of things
CN103516520A (en) Data safe transmission system and method based on electronic tag
CN101976363A (en) Hash function based RFID (Radio Frequency Identification Devices) authentication method
KR100723868B1 (en) Method for verifying RFID tag and reader each other in EPC C1G2 RFID system
CN108082723B (en) Anti-counterfeiting bottle cap based on CPU (Central processing Unit) password chip and working method thereof
CN102118250A (en) System and method for indentifying dynamic password based on double-interface intelligent card
WO2006003562A1 (en) Method of choosing one of a multitude of data sets being registered with a device and corresponding device
CN202870898U (en) Radio frequency-based commodity information identification system
CN102034307A (en) Electronic wallet-based dynamic password authentication system and method
CN106385320B (en) RFID anti-counterfeiting device and anti-counterfeiting method based on PUF and digital signature
US10511946B2 (en) Dynamic secure messaging
CN104700125A (en) AES encryption and verification of ultra high frequency radio identification system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20141217