CN109583915A - Anti-counterfeiting authentication method, equipment and storage medium - Google Patents
Anti-counterfeiting authentication method, equipment and storage medium Download PDFInfo
- Publication number
- CN109583915A CN109583915A CN201811432601.4A CN201811432601A CN109583915A CN 109583915 A CN109583915 A CN 109583915A CN 201811432601 A CN201811432601 A CN 201811432601A CN 109583915 A CN109583915 A CN 109583915A
- Authority
- CN
- China
- Prior art keywords
- counterfeiting information
- fake certificate
- information
- fake
- counterfeiting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Development Economics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- Technology Law (AREA)
- Entrepreneurship & Innovation (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of anti-counterfeiting authentication method, equipment and storage medium, this method comprises: receiving the anti-fake certificate solicited message for request the first article of certification that user terminal is sent;According to the certification permission of user's signature Information Authentication user: being proved to be successful, then generate the second anti-counterfeiting information, password for inquiry information, the second anti-counterfeiting information and encrypted message are sent to read-and-write device according to facility information, for reading the first anti-counterfeiting information, the second anti-counterfeiting information being written to the first RFID tag to cover the first anti-counterfeiting information;The first anti-counterfeiting information that read-and-write device is sent is received, the first anti-counterfeiting information is verified by the anti-counterfeiting information list being recorded on the first block chain to generate the anti-fake certificate result of the first article and return;When record has the first anti-counterfeiting information in anti-counterfeiting information list, the first anti-counterfeiting information is covered by the second anti-counterfeiting information and is updated on anti-counterfeiting information list and record to the first block chain.The present invention has ensured the reliability to the multiple anti-fake certificate of same article.
Description
Technical field
This application involves anti-fake certificate technical fields, and in particular to a kind of anti-counterfeiting authentication method, equipment and storage medium.
Background technique
In current anti-fake certificate scheme, since the article can be generated after carrying out first time anti-fake certificate to article
The problem of corresponding anti-fake certificate information leakage:
For example, after article carries out first time anti-fake certificate, i.e., in certificate server by the corresponding anti-fake certificate of the article
Information configuration is failure, then will lead to the article can not be certified again;Without being failure by the anti-fake certificate information configuration, then
It will lead to and replicate the fake products of the anti-fake certificate information and can equally authenticate successful problem.
Therefore, current anti-fake certificate scheme can only ensure reliability when authenticating for the first time, and can not ensure to same
The reliability of the multiple anti-fake certificate of article, is unfavorable for article and circulates in the market.
Summary of the invention
In view of drawbacks described above in the prior art or deficiency, it is intended to provide a kind of can ensure to the multiple anti-of same article
Anti-counterfeiting authentication method, equipment and the storage medium of the reliability of dummy authentication.
In a first aspect, the present invention provides a kind of anti-counterfeiting authentication method, it is suitable for anti-fake certificate server-side, comprising:
Receive the anti-fake certificate solicited message for request the first article of certification that user terminal is sent;Wherein, the first article configures
There is the first RFID tag for having the first anti-counterfeiting information, anti-fake certificate solicited message includes user's signature information and reader
The facility information of device;
According to the certification permission of user's signature Information Authentication user:
It is proved to be successful, then generates the second anti-counterfeiting information, inquire the encrypted message of the first RFID tag, believed according to equipment
Second anti-counterfeiting information and encrypted message are sent to read-and-write device by breath, so that read-and-write device reads first according to encrypted message
The first RFID tag is written to cover the first anti-counterfeiting information in second anti-counterfeiting information by anti-counterfeiting information;
The first anti-counterfeiting information that read-and-write device is sent is received, the anti-counterfeiting information list being recorded on the first block chain is passed through
First anti-counterfeiting information is verified to generate the anti-fake certificate of the first article as a result, anti-fake certificate result is returned to user terminal
And/or read-and-write device;Wherein, it when record has the first anti-counterfeiting information in anti-counterfeiting information list, is covered by the second anti-counterfeiting information
The first anti-counterfeiting information of lid updates anti-counterfeiting information list and records to the first block chain.
Second aspect, the present invention provide another anti-counterfeiting authentication method, are suitable for read-and-write device, comprising:
Receive the second anti-counterfeiting information and encrypted message that anti-fake certificate server-side is sent;Wherein, the second anti-counterfeiting information is by preventing
Dummy authentication server-side receives the anti-fake certificate solicited message for request the first article of certification that user terminal is sent, and is believed according to user's signature
It is generated after the certification permission success of breath verifying user, and inquires the encrypted message of the first RFID tag;The configuration of first article
There is the first RFID tag for having the first anti-counterfeiting information, anti-fake certificate solicited message includes user's signature information and reader
The facility information of device;
The first anti-counterfeiting information is read according to encrypted message;
The first RFID tag is written into cover the first anti-counterfeiting information in second anti-counterfeiting information;
First anti-counterfeiting information is sent to anti-fake certificate server-side, for use by the anti-fake letter being recorded on the first block chain
Breath list to the first anti-counterfeiting information verified with generate the first article anti-fake certificate as a result, and, return anti-fake certificate knot
Fruit, and/or, anti-fake certificate result is sent to user terminal.
Wherein, when record has the first anti-counterfeiting information in anti-counterfeiting information list, anti-fake certificate server-side is anti-fake by second
Information covers the first anti-counterfeiting information and updates anti-counterfeiting information list and record to the first block chain.
The third aspect, the present invention also provides a kind of equipment, including one or more processors and memory, wherein memory
Comprising can by instruction that the one or more processors execute so that the one or more processors execute it is each according to the present invention
The anti-counterfeiting authentication method that embodiment provides.
Fourth aspect, the present invention also provides a kind of storage medium for being stored with computer program, which makes to count
Calculation machine executes the anti-counterfeiting authentication method that each embodiment provides according to the present invention.
Anti-counterfeiting authentication method, equipment and the storage medium that many embodiments of the present invention provide are by carrying out anti-fake recognizing every time
New anti-counterfeiting information is generated by server-side when card and is sent to read-and-write device, is write after reading place where troops were originally stationed fake information by read-and-write device
Enter new anti-counterfeiting information, and by server-side when being authenticated successfully to place where troops were originally stationed fake information by new anti-counterfeiting information be recorded on block chain with
For verifying next time, thus ensured certified products configuration RFID tag in store forever it is not revealing, block can be passed through
The anti-counterfeiting information that chain is verified has ensured the reliability to the multiple anti-fake certificate of same article;
Anti-counterfeiting authentication method, equipment and the storage medium that some embodiments of the invention provide are further by block chain
Reward is provided to the user for carrying out anti-fake certificate, to motivate user to carry out anti-fake certificate, to promote to crack down on counterfeit goods;
Anti-counterfeiting authentication method, equipment and the storage medium that some embodiments of the invention provide further anti-fake are recognized by recording
Card log gains reward by cheating to judge whether user repeats to defraud of anti-fake certificate reward with preventing malice.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 is the schematic diagram of a scenario of anti-fake certificate in one embodiment of the invention.
Fig. 2 is a kind of flow chart for anti-counterfeiting authentication method that one embodiment of the invention provides.
Fig. 3 is a kind of flow chart of preferred embodiment of method shown in Fig. 2.
Fig. 4 is a kind of flow chart of preferred embodiment of method shown in Fig. 2.
Fig. 5 is the flow chart for another anti-counterfeiting authentication method that one embodiment of the invention provides.
Fig. 6 is a kind of structural schematic diagram for equipment that one embodiment of the invention provides.
Specific embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to
Convenient for description, part relevant to invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase
Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is the schematic diagram of a scenario of anti-fake certificate in one embodiment of the invention.Below will by taking scene shown in FIG. 1 as an example,
Every solution provided by the invention is described in detail.
Fig. 2 is a kind of flow chart for anti-counterfeiting authentication method that one embodiment of the invention provides.
As shown in Fig. 2, in the present embodiment, the present invention provides a kind of anti-counterfeiting authentication method, comprising:
S11: the anti-fake certificate solicited message for request the first article of certification that user terminal is sent is received;Wherein, the first article
Configured with the first RFID tag for having the first anti-counterfeiting information, anti-fake certificate solicited message includes user's signature information and reading
Write the facility information of device device;
S12: according to the certification permission of user's signature Information Authentication user:
It is proved to be successful, thens follow the steps S13: generating the second anti-counterfeiting information, inquire the message in cipher of the first RFID tag
Breath, is sent to read-and-write device for the second anti-counterfeiting information and encrypted message according to facility information, so that read-and-write device is according to close
Code information reads the first anti-counterfeiting information, the second anti-counterfeiting information is written to the first RFID tag to cover the first anti-counterfeiting information;
S14: the first anti-counterfeiting information that read-and-write device is sent is received, the anti-counterfeiting information being recorded on the first block chain is passed through
The first anti-counterfeiting information is verified in list: when record has the first anti-counterfeiting information in anti-counterfeiting information list, execute step S15:
The first anti-counterfeiting information is covered by the second anti-counterfeiting information to update on anti-counterfeiting information list and record to the first block chain;
S16: the anti-fake certificate of the first article is generated as a result, anti-fake certificate result is returned to user terminal and/or reader
Device.
With in scene shown in Fig. 1, user's first has purchased the automobile parts 20 of certain company production, it is configured in automobile parts 20
RFID chip 21 explains above-mentioned method shown in Fig. 2 for user's first carries out anti-fake certificate to automobile parts 20 in detail
It states.
The user terminal 10 of user's first generates the anti-fake certificate solicited message of request certification automobile parts 20, and is sent to anti-fake
Certificate server 30.The anti-fake certificate solicited message includes the signing messages of user's first and the facility information of read-and-write device 40,
Can further include at least one of following information: User ID, the ID of automobile parts 20, RFID chip ID (information without
Password is needed to can be read), etc..Wherein, the facility information of read-and-write device 40 is configurable to the communication of read-and-write device 40
Address, so that anti-fake certificate server-side 30 is directly communicated according to mailing address;Also it is configurable to read-and-write device 40
Any one or more information such as title, ID, other marks, so that the confirmation of anti-fake certificate server-side 30 is which platform is pre-configured
Read-and-write device, and the mailing address of the read-and-write device is searched to be communicated.
In step s 11, anti-fake certificate server-side 30 receives the anti-fake certificate solicited message that above-mentioned user terminal 10 is sent;
In step s 12, anti-fake certificate server-side 30 is according to the user's signature Information Authentication in anti-fake certificate solicited message
Whether user's first has verifying authorization: if user's first does not have verifying authorization, then terminating verifying and returns to prompt information.Specifically
Ground, in the present embodiment, default configuration are the related side (for example, producer, dealer, the user for buying product etc.) of the first article
It can also according to actual needs be different Population disposition verifying authorizations in more embodiments with verifying authorization, for example, also
It is configurable to anyone and all has verifying authorization, or, non-black list user has verifying authorization, etc..
In step s 13, it after anti-fake certificate server-side 30 confirms that user's first has verifying authorization, is generated for RFID chip 21
Second anti-counterfeiting information is inquired the encrypted message of RFID chip 21, is prevented according to the facility information of above-mentioned read-and-write device 40 by second
Fake information and encrypted message are sent to read-and-write device 40.
After read-and-write device 40 receives the second anti-counterfeiting information and encrypted message, 21 institute of RFID chip is read according to encrypted message
First anti-counterfeiting information is sent to anti-fake certificate server-side 30 after successful reading by the first anti-counterfeiting information of storage, and by second
RFID chip 21 is written to cover the first anti-counterfeiting information in anti-counterfeiting information.
Preferably, during above-mentioned read-write, read-and-write device 40 can be after successful reading i.e. by the first anti-counterfeiting information
It is sent to anti-fake certificate server-side 30, and regeneration notification information is sent to anti-fake certificate server-side 30 after being written successfully;?
The first anti-counterfeiting information can be sent to anti-fake certificate server-side 30 again after being written successfully, to ensure anti-fake certificate server-side 30
The anti-counterfeiting information list recorded on the first block chain is updated again after the write operation success of read-and-write device 40, ensures certified products
RFID chip 21 and the first block chain recorded information atomicity.
In step S14, anti-fake certificate server-side 30 is by the cryptographic Hash of the first anti-counterfeiting information received and the first block
Verifying is compared in the anti-counterfeiting information list recorded on chain, judge the anti-counterfeiting information list whether include the first anti-counterfeiting information Kazakhstan
Uncommon value: being, then automobile parts 20 are certified products;No, then automobile parts 20 are fake products.In the present embodiment, it is calculated by Hash
Method is encrypted and recorded in anti-counterfeiting information list the anti-counterfeiting information of certified products, in more embodiments, can also using it is other can
The rivest, shamir, adelman of verifying is encrypted.
When it is fake products that verification result, which is the automobile parts 20, anti-fake certificate server-side 30 directly executes step S16,
It generates anti-fake certificate result and returns to user terminal 10;
When it is certified products that verification result, which is the automobile parts 20, anti-fake certificate server-side 30 is other than executing step S16, also
Step S15 is executed, the first anti-counterfeiting information is covered by the second anti-counterfeiting information and updates anti-counterfeiting information list, and will be updated anti-fake
Information list is recorded to the first block chain, to ensure that the second anti-counterfeiting information for recording in the RFID chip 21 of certified products can be with
Be proved to be successful in fake certification next time, even if while the first anti-counterfeiting information leakage can not also pass through verifying.
In the examples described above, anti-fake certificate result is returned to user terminal 10 by anti-fake certificate server-side 30, in other realities
It applies in example, can also according to actual needs configure step S16 to by anti-fake certificate result while being sent to user terminal 10 simultaneously
With read-and-write device 40, or, being only sent to read-and-write device 40.
In more embodiments, items solution provided by the invention, which could be applicable to those skilled in the art, to manage
The different scenes of solution wait, it can be achieved that identical technical effect for example, user terminal 10 is integrated with read-and-write device 40, without
It is confined to the scene that Fig. 1 is enumerated.
Above-described embodiment is sent to read-write by generating new anti-counterfeiting information by server-side when carrying out anti-fake certificate every time
Device device is written new anti-counterfeiting information by read-and-write device after reading place where troops were originally stationed fake information, and is believed by server-side to place where troops were originally stationed puppet
New anti-counterfeiting information is recorded on block chain for verifying next time when authenticating successfully for breath, to ensure the radio frequency of certified products configuration
Anti-counterfeiting information not revealing, being verified by block chain is store forever in identification label, has been ensured to same article
Multiple anti-fake certificate reliability.
Fig. 3 is a kind of flow chart of preferred embodiment of method shown in Fig. 2.As shown in figure 3, in a preferred embodiment
In, the above method further include:
S17: generating anti-fake certificate reward transaction and is sent to the node of the first block chain for executing and by common recognition pair
User provides anti-fake certificate reward.
Specifically, equally for the scene shown in above-mentioned Fig. 1, anti-fake certificate server-side 30 is according to user in the first block chain
On public key or address (can be submitted by user terminal 10 in user's registration and be stored in 30 local data of anti-fake certificate server-side
In library, can also be configured in anti-fake certificate solicited message by user terminal 10, etc.) generate and reward is provided to the address of the user
Anti-fake certificate reward transaction, and be sent to the node 501 of the first block chain.Node 501 receives and executes anti-fake certificate reward
Transaction is rewarded by successfully providing after common recognition.
Above-described embodiment is further by providing reward to the user for carrying out anti-fake certificate on block chain, to motivate user
Anti-fake certificate is carried out, to promote to crack down on counterfeit goods.
Fig. 4 is a kind of flow chart of preferred embodiment of method shown in Fig. 2.As shown in figure 4, in a preferred embodiment
In, the above method further include:
S18: it generates anti-fake certificate log and records to local data base.Wherein, anti-fake certificate log is for judging user
Whether repeat to gain anti-fake certificate reward by cheating.
Specifically, when anti-fake certificate server-side 30 is judged according to anti-fake certificate log, same user is repeated to same object
Product carry out multiple anti-fake certificate, recognize or, multiple users are continuously abnormal to multiple anti-fake certificate of same article progress etc. in the short time
When demonstrate,proving situation, it can determine automatically abnormal and no longer provide reward.In more embodiments, it can also configure according to actual needs
Different abnormal determination strategies are, it can be achieved that identical technical effect.
Above-described embodiment further judges whether user repeats to gain anti-fake certificate prize by cheating by record anti-fake certificate log
It encourages and reward is gained by cheating with preventing malice.
In a preferred embodiment, the communication between anti-fake certificate server-side 30 and read-and-write device 40 also passes through public and private key
Algorithm is encrypted.Specifically, in step s 13, anti-fake certificate server-side 30 passes through the first public key of read-and-write device 40
Sent after being encrypted to the second anti-counterfeiting information and encrypted message, read-and-write device 40 receive after by corresponding first private key into
Row decryption;In step S14, read-and-write device 40 by the second public key of anti-fake certificate server-side 30 to the first anti-counterfeiting information into
It is sent after row encryption, anti-fake certificate server-side 30 is decrypted after receiving by corresponding second private key.
In a preferred embodiment, record has encrypted encrypted message on the first block chain.It specifically, can be by anti-
The public key of dummy authentication server-side 30 is encrypted, and can also be encrypted by the public key of the first article owner (user), also
To can be all recorded on the first block chain by the encrypted messages of different public key encryptions, etc..
It is further preferred that anti-fake certificate server-side 30 can also be generated while generating the second anti-counterfeiting information it is new close
Code information, and new encrypted message is sent to read-and-write device 40 together with the second anti-counterfeiting information, for read-and-write device 40
Password is replaced after completing read-write operation for RFID chip 21.
Fig. 5 is the flow chart for another anti-counterfeiting authentication method that one embodiment of the invention provides.Method shown in fig. 5 can match
Method shown in Fig. 2-4 is closed to execute.
As shown in figure 5, in the present embodiment, the present invention also provides another anti-counterfeiting authentication methods, it is suitable for reader and fills
It sets, comprising:
S21: the second anti-counterfeiting information and encrypted message that anti-fake certificate server-side is sent are received;Wherein, the second anti-counterfeiting information
The anti-fake certificate solicited message that request the first article of certification that user terminal is sent is received by anti-fake certificate server-side, is signed according to user
It is generated after the certification permission success of name Information Authentication user, and inquires the encrypted message of the first RFID tag;First article
Configured with the first RFID tag for having the first anti-counterfeiting information, anti-fake certificate solicited message includes user's signature information and reading
Write the facility information of device device;
S23: the first anti-counterfeiting information is read according to encrypted message;
S25: the first RFID tag is written into cover the first anti-counterfeiting information in the second anti-counterfeiting information;
S27: being sent to anti-fake certificate server-side for the first anti-counterfeiting information, with anti-on the first block chain for use by being recorded in
Fake information list the first anti-counterfeiting information is verified to generate the anti-fake certificate of the first article as a result, and, return and anti-fake recognize
Card as a result, and/or, anti-fake certificate result is sent to user terminal.
Wherein, when record has the first anti-counterfeiting information in anti-counterfeiting information list, anti-fake certificate server-side is anti-fake by second
Information covers the first anti-counterfeiting information and updates anti-counterfeiting information list and record to the first block chain.
Preferably, the anti-fake certificate solicited message further includes public key or ground of the user on the first block chain
Location, the public key or address are used to generate anti-fake certificate reward transaction for the anti-fake certificate server-side and are sent to described first
The node of block chain is rewarded for executing and providing anti-fake certificate to the user by common recognition.
Preferably, the local database record of the anti-fake certificate server-side has anti-fake certificate log, the anti-fake certificate
Log is for judging whether the user repeats to gain the anti-fake certificate reward by cheating.
Preferably, the communication between read-and-write device and anti-fake certificate server-side also passes through public private key pair algorithm and is added
It is close.
Preferably, record has encrypted encrypted message on the first block chain.
The anti-fake certificate principle of method shown in Fig. 5 can refer to method shown in Fig. 2-4, and details are not described herein again.
Fig. 6 is a kind of structural schematic diagram for equipment that one embodiment of the invention provides.
As shown in fig. 6, present invention also provides a kind of equipment 600, including one or more centres as on the other hand
Unit (CPU) 601 is managed, can be added according to the program being stored in read-only memory (ROM) 602 or from storage section 608
The program that is downloaded in random access storage device (RAM) 603 and execute various movements appropriate and processing.In RAM603, also deposit
It contains equipment 600 and operates required various programs and data.CPU601, ROM602 and RAM603 pass through the phase each other of bus 604
Even.Input/output (I/O) interface 605 is also connected to bus 604.
I/O interface 605 is connected to lower component: the importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode
The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 608 including hard disk etc.;
And the communications portion 609 of the network interface card including LAN card, modem etc..Communications portion 609 via such as because
The network of spy's net executes communication process.Driver 610 is also connected to I/O interface 605 as needed.Detachable media 611, such as
Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 610, in order to read from thereon
Computer program be mounted into storage section 608 as needed.
Particularly, in accordance with an embodiment of the present disclosure, the anti-counterfeiting authentication method of any of the above-described embodiment description can be implemented
For computer software programs.For example, embodiment of the disclosure includes a kind of computer program product comprising be tangibly embodied in
Computer program on machine readable media, the computer program include the program code for executing anti-counterfeiting authentication method.
In such embodiments, which can be downloaded and installed from network by communications portion 609, and/or from
Detachable media 611 is mounted.
As another aspect, present invention also provides a kind of computer readable storage medium, the computer-readable storage mediums
Matter can be computer readable storage medium included in the device of above-described embodiment;It is also possible to individualism, it is unassembled
Enter the computer readable storage medium in equipment.Computer-readable recording medium storage has one or more than one program, should
Program is used to execute the anti-counterfeiting authentication method for being described in the application by one or more than one processor.
Flow chart and block diagram in attached drawing are illustrated according to the system of various embodiments of the invention, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use
The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box
The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually
It can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depending on related function.Also it wants
It is noted that the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, Ke Yitong
The dedicated hardware based system of functions or operations as defined in executing is crossed to realize, or by specialized hardware and can be calculated
The combination of machine instruction is realized.
Being described in the embodiment of the present application involved unit or module can be realized by way of software, can also be with
It is realized by way of hardware.Described unit or module also can be set in the processor, for example, each unit can
To be the software program being arranged in computer or intelligent movable equipment, it is also possible to the hardware device being separately configured.Wherein, this
The title of a little units or module does not constitute the restriction to the unit or module itself under certain conditions.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Those skilled in the art
Member is it should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic
Scheme, while should also cover in the case where not departing from the application design, appointed by above-mentioned technical characteristic or its equivalent feature
Other technical solutions of meaning combination and formation.Such as features described above and (but being not limited to) disclosed herein have similar functions
Technical characteristic replaced mutually and the technical solution that is formed.
Claims (12)
1. a kind of anti-counterfeiting authentication method characterized by comprising
Receive the anti-fake certificate solicited message for request the first article of certification that user terminal is sent;Wherein, the first article configuration
There is the first RFID tag for having the first anti-counterfeiting information, the anti-fake certificate solicited message includes user's signature information and reading
Write the facility information of device device;
According to the certification permission of the user's signature Information Authentication user:
It is proved to be successful, then generates the second anti-counterfeiting information, inquire the encrypted message of first RFID tag, set according to described
Second anti-counterfeiting information and the encrypted message are sent to the read-and-write device by standby information, for the read-and-write device
First anti-counterfeiting information is read according to the encrypted message, first radio frequency identification marking is written into second anti-counterfeiting information
Label are to cover first anti-counterfeiting information;
First anti-counterfeiting information that the read-and-write device is sent is received, the anti-counterfeiting information being recorded on the first block chain is passed through
List is verified first anti-counterfeiting information to generate the anti-fake certificate of first article as a result, by the anti-fake certificate
As a result the user terminal and/or the read-and-write device are returned to;Wherein, when in the anti-counterfeiting information list record have described the
When one anti-counterfeiting information, the first anti-counterfeiting information update anti-counterfeiting information list is covered by second anti-counterfeiting information and is remembered
On record to the first block chain.
2. the method according to claim 1, wherein further include:
It generates anti-fake certificate reward transaction and is sent to the node of the first block chain for executing and by common recognition to described
User provides anti-fake certificate reward.
3. according to the method described in claim 2, it is characterized by further comprising:
It generates anti-fake certificate log and records to local data base;Wherein, the anti-fake certificate log is for judging the user
Whether repeat to gain the anti-fake certificate reward by cheating.
4. method according to claim 1-3, which is characterized in that it is described according to the facility information by described
It includes: the first public key by the read-and-write device that two anti-counterfeiting information and the encrypted message, which are sent to the read-and-write device,
The read-and-write device is sent to after encrypting to second anti-counterfeiting information and the encrypted message;
The first anti-counterfeiting information that the read-and-write device is sent is encrypted by the second public key, described to receive the reader dress
Set first anti-counterfeiting information of transmission further include: the second private key by corresponding to second public key is decrypted to obtain
First anti-counterfeiting information.
5. method according to claim 1-3, which is characterized in that after record has encryption on the first block chain
The encrypted message.
6. a kind of anti-counterfeiting authentication method characterized by comprising
Receive the second anti-counterfeiting information and encrypted message that anti-fake certificate server-side is sent;Wherein, second anti-counterfeiting information is by institute
The anti-fake certificate solicited message that anti-fake certificate server-side receives request the first article of certification that user terminal is sent is stated, is signed according to user
It is generated after the certification permission success of name Information Authentication user, and inquires the encrypted message of the first RFID tag;Described first
Article is configured with the first RFID tag for having the first anti-counterfeiting information, and the anti-fake certificate solicited message includes user's signature
The facility information of information and read-and-write device;
First anti-counterfeiting information is read according to the encrypted message;
First RFID tag is written into cover first anti-counterfeiting information in second anti-counterfeiting information;
First anti-counterfeiting information is sent to the anti-fake certificate server-side, with anti-on the first block chain for use by being recorded in
Fake information list first anti-counterfeiting information is verified to generate the anti-fake certificate of first article as a result, and, return
Return the anti-fake certificate as a result, and/or, the anti-fake certificate result is sent to the user terminal;
Wherein, when record has first anti-counterfeiting information in the anti-counterfeiting information list, the anti-fake certificate server-side passes through
Second anti-counterfeiting information covers first anti-counterfeiting information and updates the anti-counterfeiting information list and record to first block
On chain.
7. according to the method described in claim 6, it is characterized in that, the anti-fake certificate solicited message further includes that the user exists
Public key or address on the first block chain, the public key or address are used to recognize for anti-fake certificate server-side generation is anti-fake
Card reward transaction is simultaneously sent to the node of the first block chain for executing and recognizing by the way that common recognition is anti-fake to user granting
Card reward.
8. according to the method described in claim 6, it is characterized in that, the local database record of the anti-fake certificate server-side has
Anti-fake certificate log, the anti-fake certificate log is for judging whether the user repeats to gain the anti-fake certificate reward by cheating.
9. according to the described in any item methods of claim 6-8, which is characterized in that received second anti-counterfeiting information of institute and message in cipher
Breath passes through the first public key encryption, the second anti-fake letter for receiving anti-fake certificate server-side and sending by the anti-fake certificate server-side
Breath and encrypted message further include: the first private key by corresponding to first public key is decrypted anti-fake to obtain described second
Information and the encrypted message;
It is described that first anti-counterfeiting information is sent to the anti-fake certificate server-side includes: by the anti-fake certificate server-side
The second public key first anti-counterfeiting information is encrypted, and encrypted first anti-counterfeiting information is sent to and described anti-fake is recognized
Demonstrate,prove server-side.
10. according to the described in any item methods of claim 6-8, which is characterized in that record has encryption on the first block chain
The encrypted message afterwards.
11. a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Memory, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors
Execute such as method of any of claims 1-10.
12. a kind of storage medium for being stored with computer program, which is characterized in that realize when the program is executed by processor as weighed
Benefit requires method described in any one of 1-10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811432601.4A CN109583915A (en) | 2018-11-28 | 2018-11-28 | Anti-counterfeiting authentication method, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811432601.4A CN109583915A (en) | 2018-11-28 | 2018-11-28 | Anti-counterfeiting authentication method, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109583915A true CN109583915A (en) | 2019-04-05 |
Family
ID=65925187
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811432601.4A Pending CN109583915A (en) | 2018-11-28 | 2018-11-28 | Anti-counterfeiting authentication method, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109583915A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110717770A (en) * | 2019-10-23 | 2020-01-21 | 北京牛电信息技术有限责任公司 | Anti-counterfeiting detection method, device, equipment and storage medium for vehicle parts |
CN111342974A (en) * | 2020-02-27 | 2020-06-26 | 上海上大鼎正软件股份有限公司 | Management method, device, equipment and storage medium of radio frequency identification data |
CN112766982A (en) * | 2021-01-04 | 2021-05-07 | 上海华兴数字科技有限公司 | Vehicle accessory after-sale service method and device |
CN114154606A (en) * | 2021-12-02 | 2022-03-08 | 杭州复杂美科技有限公司 | Identification code generation method, computer device and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101038630A (en) * | 2006-12-15 | 2007-09-19 | 北京航空航天大学 | False proof identification module of RFID liquor products |
CN101872460A (en) * | 2010-05-27 | 2010-10-27 | 上海华彩科技有限公司 | Treatment method of RFID online anti-counterfeiting system based on dynamic anti-counterfeiting mark |
CN102609846A (en) * | 2011-03-18 | 2012-07-25 | 诺美网讯应用技术有限公司 | Anti-false verification method and system based on communication network |
CN104318447A (en) * | 2014-10-22 | 2015-01-28 | 龚小林 | Anti-counterfeiting authentication method and device |
CN105590227A (en) * | 2016-01-14 | 2016-05-18 | 姜智广 | Dynamic verification method, apparatus, and system of authenticity of commodity |
CN105654170A (en) * | 2014-11-14 | 2016-06-08 | 苏州海博智能系统有限公司 | Security label, security method and security system based on dynamic ciphers |
CN106209877A (en) * | 2016-07-19 | 2016-12-07 | 井创(北京)科技有限公司 | A kind of be certification core with block chain backstage false-proof authentication system |
-
2018
- 2018-11-28 CN CN201811432601.4A patent/CN109583915A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101038630A (en) * | 2006-12-15 | 2007-09-19 | 北京航空航天大学 | False proof identification module of RFID liquor products |
CN101872460A (en) * | 2010-05-27 | 2010-10-27 | 上海华彩科技有限公司 | Treatment method of RFID online anti-counterfeiting system based on dynamic anti-counterfeiting mark |
CN102609846A (en) * | 2011-03-18 | 2012-07-25 | 诺美网讯应用技术有限公司 | Anti-false verification method and system based on communication network |
CN104318447A (en) * | 2014-10-22 | 2015-01-28 | 龚小林 | Anti-counterfeiting authentication method and device |
CN105654170A (en) * | 2014-11-14 | 2016-06-08 | 苏州海博智能系统有限公司 | Security label, security method and security system based on dynamic ciphers |
CN105590227A (en) * | 2016-01-14 | 2016-05-18 | 姜智广 | Dynamic verification method, apparatus, and system of authenticity of commodity |
CN106209877A (en) * | 2016-07-19 | 2016-12-07 | 井创(北京)科技有限公司 | A kind of be certification core with block chain backstage false-proof authentication system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110717770A (en) * | 2019-10-23 | 2020-01-21 | 北京牛电信息技术有限责任公司 | Anti-counterfeiting detection method, device, equipment and storage medium for vehicle parts |
CN110717770B (en) * | 2019-10-23 | 2022-06-14 | 北京牛电信息技术有限责任公司 | Anti-counterfeiting detection method, device, equipment and storage medium for vehicle parts |
CN111342974A (en) * | 2020-02-27 | 2020-06-26 | 上海上大鼎正软件股份有限公司 | Management method, device, equipment and storage medium of radio frequency identification data |
CN112766982A (en) * | 2021-01-04 | 2021-05-07 | 上海华兴数字科技有限公司 | Vehicle accessory after-sale service method and device |
CN114154606A (en) * | 2021-12-02 | 2022-03-08 | 杭州复杂美科技有限公司 | Identification code generation method, computer device and storage medium |
CN114154606B (en) * | 2021-12-02 | 2024-03-15 | 杭州复杂美科技有限公司 | Identification code generation method, computer device, and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220044237A1 (en) | Systems and methods for initialization and activation of secure elements | |
US11743054B2 (en) | Method and system for creating and checking the validity of device certificates | |
US7273181B2 (en) | Device and method for authenticating and securing transactions using RF communication | |
CN109583915A (en) | Anti-counterfeiting authentication method, equipment and storage medium | |
US9740847B2 (en) | Method and system for authenticating a user by means of an application | |
US8009017B2 (en) | Contactless type communication tag, portable tag reader for verifying a genuine article, and method for providing information of whether an article is genuine or not | |
CN109961292A (en) | Block chain identifying code application method, equipment and storage medium | |
CN109426868A (en) | Life period of equipment distribution ledger | |
Lehtonen et al. | Trust and security in RFID-based product authentication systems | |
US20180019872A1 (en) | Open registry for internet of things including sealed materials | |
CN108140137A (en) | For the open registration table of things identity | |
CN102831529B (en) | A kind of commodity information identification method based on radio frequency and system | |
CN110383752A (en) | Compact recording agreement | |
KR101812638B1 (en) | Module, service server, system and method for authenticating genuine goods using secure element | |
CN109583226A (en) | Data desensitization process method, apparatus and electronic equipment | |
WO2018018175A1 (en) | Authentication device and method for article | |
CN110598433A (en) | Anti-counterfeiting information processing method and device based on block chain | |
WO2019125632A1 (en) | Authentication of goods | |
JP3822575B2 (en) | RF tag issuing device and program | |
US20210391993A1 (en) | Methods, systems, and apparatuses for cryptographic wireless detection and authentication of fluids | |
WO2018064329A1 (en) | Open registry for internet of things including sealed materials | |
Lu et al. | Toward Privacy-Aware Traceability for Automotive Supply Chains | |
CN106228379A (en) | False proof device, system and method | |
CN106027256A (en) | Identity card reading response system | |
CN109064197A (en) | A kind of supply chain opening registration and Verification System and method based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |