CN115860037B - Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting assembly for precious stones - Google Patents

Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting assembly for precious stones Download PDF

Info

Publication number
CN115860037B
CN115860037B CN202310165434.6A CN202310165434A CN115860037B CN 115860037 B CN115860037 B CN 115860037B CN 202310165434 A CN202310165434 A CN 202310165434A CN 115860037 B CN115860037 B CN 115860037B
Authority
CN
China
Prior art keywords
information
terminal
counterfeiting
binding
dynamic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310165434.6A
Other languages
Chinese (zh)
Other versions
CN115860037A (en
Inventor
陈昱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Shanghai Baoyushi Trading Center Co ltd
Original Assignee
China Shanghai Baoyushi Trading Center Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Shanghai Baoyushi Trading Center Co ltd filed Critical China Shanghai Baoyushi Trading Center Co ltd
Priority to CN202310165434.6A priority Critical patent/CN115860037B/en
Publication of CN115860037A publication Critical patent/CN115860037A/en
Application granted granted Critical
Publication of CN115860037B publication Critical patent/CN115860037B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an anti-counterfeiting method, an anti-counterfeiting system and an anti-counterfeiting component of precious jade, wherein the method comprises the steps of binding and matching two physical media of the anti-counterfeiting component, and establishing binding information; setting a dynamic coded lock for the physical medium based on the binding information and user information received from the terminal; responding to a login request of a user received from a terminal, and checking user information; and responding to the unlocking application of the user received from the terminal, and sending the dynamic key corresponding to the dynamic coded lock and the traceability information of the sapphire to the terminal. The system comprises a matching module, an encryption module, a verification module and a key module which are communicated with each other. The anti-counterfeiting component comprises two physical media, wherein the physical media comprise a matrix, a storage chip and an identification medium. The technical scheme of the invention can improve the physical safety of the precious jade in the import transportation process, and can simultaneously perform anti-counterfeiting and verification on the property rights owners and goods by innovative encryption means, thereby realizing the comprehensive anti-counterfeiting purpose of the people and the goods.

Description

Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting assembly for precious stones
Technical Field
The invention relates to the technical field of security of precious and jade, in particular to an anti-counterfeiting method, an anti-counterfeiting system and an anti-counterfeiting assembly of precious and jade.
Background
The precious jades are favored by a plurality of collectors in high value and rarity, the traditional precious jades trading market pays attention to the form of off-line trading, the credit of traders is very dependent, and once one party of credit has flaws in the trading link, the precious jades trade risks are caused, so that the precious jades are stolen or wrongly circulated.
Therefore, the traditional mode of maintaining the security of the sapphire transaction by relying on credit trust among people easily causes a larger transaction risk in the aspect of transaction participation, and the application of the information security technology can replace the mode of maintaining the security of the transaction by relying on credit, so that the security of the sapphire transaction is unhooked from the credit, an electronic key is provided for the sapphire by a digital encryption mode, the participants of the sapphire transaction can be helped to identify wrong participants in time, the occurrence of the phenomenon that the sapphire is stolen or wrongly circulated is avoided, and the security of the sapphire transaction is improved.
The information security technology applied to the precious jade trade security is mainly a product anti-counterfeiting traceability technology, an encrypted digital signature is generated through a distribution key and dynamic coding, the digital signature is in one-to-one association with product anti-counterfeiting traceability information of the precious jade and is written into an RFID (Radio Frequency Identification ) tag carried by the product, and a secret protection card carrying the RFID tag is generally used as entity anti-counterfeiting equipment. During the treasury stone transaction, the participants can carry out anti-counterfeiting traceability checking requests on the treasury stone through the digital signature in the RFID of the security card, and only if the system checking passes through the digital signature, the participants can inquire the anti-counterfeiting traceability information of the treasury stone product, otherwise, the participants are out of the door to be refused, so that the safety of the treasury stone transaction is greatly improved.
However, the RFID technology is not capable of completely preventing the occurrence of security risks in the treasury stone transaction without any loss, along with the development of scientific technology, more and more cracking technologies capable of cracking the security system established by the RFID technology are available, and the problems of easy copying, encryption form and slightly single content existing in the RFID technology are gradually exposed, so that the digital signature encrypted by the RFID technology is easy to crack, and the reliability of independently confirming the legal identity of the user from the security card is also weak. It can be seen that it has become increasingly difficult for RFID technology to secure increasingly complex forms of sapphire transactions.
Disclosure of Invention
The invention aims to overcome the defects in the prior art, and provides an anti-counterfeiting method, an anti-counterfeiting system and an anti-counterfeiting assembly for precious stones, which aim at solving the problems that the precious stone encryption technology is easy to copy and crack and the reliability of entity anti-counterfeiting equipment is weak in the prior art.
In order to achieve the above purpose, the present invention is realized by the following technical scheme:
in a first aspect, the invention provides an anti-counterfeiting method of precious stones, which comprises the following steps:
binding and matching two physical media of the anti-counterfeiting component, and establishing binding information;
Setting a dynamic coded lock for the physical medium based on the binding information and user information received from a terminal;
responding to a login request of a user received from a terminal, and checking user information;
and responding to an unlocking application of a user received from the terminal, and sending a dynamic key corresponding to the dynamic coded lock and traceability information of the sapphire to the terminal.
In a preferred embodiment of the present application, in binding and matching two physical media of the anti-counterfeiting component, binding information is established, which specifically includes:
writing the traceability information of the precious jade into two physical media of the anti-counterfeiting component;
binding and matching the two physical media according to the tracing information and the media information of the physical media;
and establishing and recording binding information of the two physical media according to the binding matching result.
In a preferred embodiment of the present application, setting a dynamic coded lock for the physical medium based on the binding information and user information received from the terminal specifically includes:
acquiring user information;
the trace back information and the medium information read from the physical medium;
generating a dynamic coded lock of the physical medium based on the traceability information, the medium information, the user information and the binding information;
And writing the dynamic coded lock into the physical medium.
In a preferred embodiment of the present application, after the trace back information and the medium information read from the physical medium, further comprising:
and updating the dynamic coded lock of the physical medium into a new dynamic coded lock based on the traceability information, the medium information, the user information and the binding information.
In a preferred embodiment of the present application, in verifying the user information in response to a login request of a user received from the terminal, specifically includes:
receiving a login request of a user from a terminal to acquire login information of the user;
carrying out identity verification and authority verification on the login information;
and after the identity verification and the authority verification are passed, sending a confirmation license to the terminal.
In a preferred embodiment of the present application, after sending a confirmation license to the terminal after both the identity check and the rights check pass, the method further includes:
receiving an identification request of a user for the two physical media from a terminal to acquire binding conditions of the two physical media;
based on the binding information, carrying out binding verification on the binding condition;
And after the binding verification is passed, sending confirmation permission to the terminal.
In a preferred embodiment of the present application, in response to an unlocking application received from a terminal by a user, sending, to the terminal, a dynamic key corresponding to the dynamic coded lock and trace back information of the sapphire specifically includes:
receiving an unlocking application of a user from a terminal;
generating a dynamic key corresponding to the dynamic coded lock according to the unlocking application;
transmitting the dynamic key to the terminal;
unlocking the dynamic key and the dynamic coded lock through the terminal;
after receiving a successful unlocking result from a terminal, sending traceability information of the precious jade to the terminal;
and displaying the traceability information through the terminal.
In a second aspect, the invention provides an anti-counterfeiting system of a sapphire, the system comprising a matching module, an encryption module, a verification module and a key module which are communicated with each other;
the matching module is used for binding and matching two physical media of the anti-counterfeiting component and establishing binding information;
the encryption module is used for setting a dynamic coded lock for the physical medium based on the binding information and the user information received from the terminal;
The verification module is used for responding to a login request of a user received from the terminal and verifying the user information;
the key module is used for responding to an unlocking application of a user received from the terminal and sending a dynamic key corresponding to the dynamic coded lock and traceability information of the sapphire to the terminal.
In a preferred embodiment of the present application, the matching module is specifically configured to:
writing the traceability information of the precious jade into two physical media of the anti-counterfeiting component;
binding and matching the two physical media according to the tracing information and the media information of the physical media;
and establishing and recording binding information of the two physical media according to the binding matching result.
In a preferred embodiment of the present application, the encryption module is specifically configured to:
acquiring user information;
the trace back information and the medium information read from the physical medium;
generating a dynamic coded lock of the physical medium based on the traceability information, the medium information, the user information and the binding information;
and writing the dynamic coded lock into the physical medium.
In a preferred embodiment of the present application, the encryption module is specifically further configured to:
And updating the dynamic coded lock of the physical medium into a new dynamic coded lock based on the traceability information, the medium information, the user information and the binding information.
In a preferred embodiment of the present application, the verification module is specifically configured to:
receiving a login request of a user from a terminal to acquire login information of the user;
carrying out identity verification and authority verification on the login information;
and after the identity verification and the authority verification are passed, sending a confirmation license to the terminal.
In a preferred embodiment of the present application, the verification module is specifically further configured to:
receiving an identification request of a user for the two physical media from a terminal to acquire binding conditions of the two physical media;
based on the binding information, carrying out binding verification on the binding condition;
and after the binding verification is passed, sending confirmation permission to the terminal.
In a preferred embodiment of the present application, the key module is specifically configured to:
receiving an unlocking application of a user from a terminal;
generating a dynamic key corresponding to the dynamic coded lock according to the unlocking application;
transmitting the dynamic key to the terminal;
Unlocking the dynamic key and the dynamic coded lock through the terminal;
after receiving a successful unlocking result from a terminal, sending traceability information of the precious jade to the terminal;
and displaying the traceability information through the terminal.
In a third aspect, the present invention provides an anti-counterfeiting component of a sapphire, including two physical media, where the physical media include a substrate, a memory chip and an identification medium, the memory chip is disposed in the substrate, the identification medium is disposed on a surface of the substrate, and the identification medium and the memory chip perform the anti-counterfeiting method of the sapphire according to the first aspect through the anti-counterfeiting system of the sapphire according to the second aspect;
the storage chip is used for storing traceability information of the precious jade, medium information of the physical medium and a dynamic coded lock generated by the anti-counterfeiting system of the precious jade in the second aspect;
the identification medium is used for identifying login requests and unlocking applications from users at the terminal and verifying binding information of the two physical media.
In a preferred embodiment of the present application, each of the memory chips stores one half of the code segments of the dynamic trick lock, and when the two physical media are bound together, the two half of the code segments form the dynamic trick lock.
In a preferred embodiment of the present application, the physical medium is a security card or a security cassette.
In a preferred embodiment of the present application, the memory chip is a physically unclonable chip.
In a fourth aspect, the present invention provides a computer readable storage medium having stored therein a computer program which, when run on a computer, causes the computer to perform the anti-counterfeiting method of the precious stone according to the first aspect.
In a fifth aspect, the present invention provides a computer program product comprising a computer program which, when run on a computer, causes the computer to perform the anti-counterfeiting method of the precious stone according to the first aspect.
The anti-counterfeiting method, the anti-counterfeiting system and the anti-counterfeiting component of the precious jade disclosed by the invention can improve the physical safety of the precious jade in the import transportation process, and simultaneously perform anti-counterfeiting and verification on the property right owners and goods by innovative encryption means, so that the comprehensive anti-counterfeiting purpose of the people and the goods is realized.
Drawings
The invention is described with the aid of the following figures:
FIG. 1 is a flow chart of the anti-counterfeiting method of the precious jade according to the embodiment 1 of the invention;
FIG. 2 is a flowchart of Step100 in the anti-counterfeit method of the precious jade stone of embodiment 1 of the present invention;
FIG. 3 is a flowchart of Step200 in the anti-counterfeit method of the precious jade stone of embodiment 1 of the present invention;
FIG. 4 is another specific flowchart of Step200 in the anti-counterfeiting method of the precious jade according to embodiment 1 of the present invention;
FIG. 5 is a flowchart of Step300 in the anti-counterfeit method of the precious jade stone of example 1 of the present invention;
FIG. 6 is another specific flowchart of Step300 in the anti-counterfeiting method of the precious jade according to embodiment 1 of the present invention;
FIG. 7 is a flowchart of Step400 in the anti-counterfeit method of the precious jade stone of example 1 of the present invention;
FIG. 8 is a schematic block diagram of the anti-counterfeiting system of the sapphire according to embodiment 2 of the present invention;
fig. 9 is a schematic structural view of a security element of the precious jade according to example 3 of the present invention.
Reference numerals:
10-an anti-counterfeiting system; 11-a matching module; 12-an encryption module; 13-checking a module; 14-a key module; 20-a security component; 21-physical medium; 22-matrix; a 23-memory chip; 24-identifying a medium; 30-terminal.
Detailed Description
For a better understanding of the technical solutions of the present application, embodiments of the present application are described in detail below with reference to the accompanying drawings.
It should be understood that the described embodiments are merely some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The invention provides an anti-counterfeiting method, an anti-counterfeiting system and an anti-counterfeiting assembly, which changes the common RFID encryption technology on the market, sets a dynamic cipher lock for each physical medium (carrier) storing the traceability information of precious and jade, dynamically generates a dynamic key matched with the physical medium (carrier), and uses a dynamic encryption rule in an encryption mode of combining various information related to the physical medium and the precious and jade for random combined encryption, wherein the dynamic cipher lock and the dynamic key are updated and cannot be copied every time an unlocking operation is carried out. The method has strict rules for verifying the user identity, and overcomes the defects of easy duplication of information, single encryption form and content, easy cracking and weak reliability for verifying the legal identity of the user existing in the prior RFID technology. The invention realizes the anti-counterfeiting means of checking and identifying authenticity by combining people and objects through the association and binding relations generated between carriers of the traceable information of the precious stones and between the carriers and the system.
Example 1
The embodiment 1 of the invention discloses an anti-counterfeiting method of precious jade, which encrypts traceability information of precious jade stored in an anti-counterfeiting component, and when a user uses a terminal to inquire the traceability information of the precious jade, verifies the identity of the user through the cooperation of the terminal and the anti-counterfeiting component, and obtains the traceability information by unlocking authority of the user after verification, so that the anti-counterfeiting purpose is realized.
Referring to fig. 1, the method includes:
step100: binding and matching two physical media of the anti-counterfeiting component, and establishing binding information.
In Step100, two physical media are bound together one by one, an anti-counterfeiting line is established in the anti-counterfeiting assembly, and the established binding information is recorded for matching verification with user information in subsequent identity verification, so that a combined anti-counterfeiting basis is established between people and objects.
Step200: a dynamic trick lock is set for the physical medium based on the binding information and user information received from the terminal.
In Step200, the binding information is an anti-counterfeiting line established in the previous Step and is also the basis for verifying the identity of the user, so that a dynamic coded lock is arranged for the anti-counterfeiting line, a second anti-counterfeiting line can be formed in the anti-counterfeiting component, and an independent dynamic anti-counterfeiting mechanism which can be changed every time is formed above the first anti-counterfeiting line, so that the problem that a single password is easy to copy and crack can be avoided. The user information is information representing the situation or information of the participants in the treasury transaction, such as an identification card number of an individual who is willing to participate in the treasury transaction, a unified social credit code of an enterprise or an organization, or a specific ID (Identity document, identity number) set for each participant in the treasury transaction platform by a specific rule, or a combination of the two types. The dynamic coded lock is a code segment randomly generated through a dynamic encryption rule based on binding information and user information, and after the user accesses and unlocks each time, the dynamic coded lock can be changed and is not identical to any previous dynamic coded lock, so that the effects of uncopyability and difficulty in cracking of the codes are realized.
Step300: and responding to the login request of the user received from the terminal, and checking the user information.
In Step300, the login request of the user is different from the user information mentioned in the previous Step, and may include part of the content of the user information, such as an identification card number of a person, a unified social credit code of an enterprise or an organization, etc., and may also include account information or other information of the user using the sapphire transaction platform. In the step, verification of user information is mainly performed on the aspects of authenticity of the user identity, whether correlation exists between the user and the precious jade to be inquired, and the like.
Step400: and responding to the unlocking application of the user received from the terminal, and sending the dynamic key corresponding to the dynamic coded lock and the traceability information of the sapphire to the terminal.
In Step400, the unlock request of the user is different from the login request of the previous Step, the unlock request is only an instruction sent by the user from the terminal, after the user information is verified to be qualified, the user obtains the authority of sending the unlock request, when the user wants to know the traceability information of the precious jade, the instruction of sending the unlock request can obtain the dynamic key of unlocking the dynamic coded lock, and after the terminal finishes the unlock operation, the user can see the traceability information of the precious jade. The dynamic password and the traceability information of the precious jade can be simultaneously sent to the terminal or respectively sent to the terminal.
Referring to fig. 2, in the anti-counterfeiting method of the present embodiment 1, step100 specifically includes:
step101: writing the traceability information of the precious jade into two physical media of the anti-counterfeiting component;
step102: binding and matching the two physical media according to the trace information and the media information of the physical media;
step103: and establishing and recording binding information of the two physical media according to the binding matching result.
The Step101 and Step102 may be performed by a custom device having a read-write function and a matching function, or may be performed by a system that performs an anti-counterfeit method. The physical medium has a storage unit, such as a chip, a memory, etc., in which the trace information is written, and the storage unit stores medium information characterizing the physical medium. The traceability information of the precious jade comprises the production place, attribute, transaction node information, processing condition information, logistics transportation information and the like of the precious jade. The trace back information may be recorded in only one physical medium or may be recorded in both physical media. The media information contains the number, specification, model, etc. of the physical media in the warehouse or batch. When Step102 is executed, binding and matching each content in the traceability information and the medium information according to a preset matching rule, wherein the matching rule can correlate the content in the traceability information and the medium information to form a unique and unique one-to-one binding corresponding relation, so that when the anti-counterfeiting component is used, the binding of two physical media has uniqueness and cannot be confused with other physical media. When Step103 is executed, the binding matching result obtained in Step102 is changed into binding information which can be identified by a computer according to a preset information generation rule, and the binding information can be a specific combination of numbers or letters, can represent two physical media of binding, and has uniqueness.
Referring to fig. 3, in the anti-counterfeiting method of the present embodiment 1, step200 specifically includes:
step201: acquiring user information;
step202: trace back information and medium information read from physical medium;
step203: generating a dynamic coded lock of the physical medium based on the traceability information, the medium information, the user information and the binding information;
step204: and writing the dynamic coded lock into the physical medium.
When Step201 is executed, the user information may be obtained from the user's terminal, where the user information is recorded when the user uses the terminal for the first time, and the user information is called out from the database storing the information of the precious stone transaction participants when the user uses the terminal subsequently. When Step202 is executed, the contents of the trace back information and the medium information in the storage component are not changed by a reading mode, and the read trace back information can be all contents or part of contents, can be appointed to read several contents or can be randomly read several contents. When Step203 is executed, the acquired trace back information, medium information, user information and binding information are regularly fused and converted through dynamic encryption rules to form codes with uniqueness and uniqueness, and the codes are stored in a storage part of a physical medium through Step 204. The dynamic coded lock is bound with two physical media, the keys of other anti-counterfeiting components cannot be used for unlocking the dynamic coded lock, and the keys of the anti-counterfeiting components cannot be used for unlocking other dynamic coded locks.
Referring to fig. 4, in the anti-counterfeiting method of embodiment 1, after Step202 is performed, the method further includes:
step205: based on the traceability information, the medium information, the user information and the binding information, the dynamic coded lock of the physical medium is updated to be a new dynamic coded lock.
After the traceability information and the medium information are successfully read from the storage component of the physical medium, the dynamic coded lock in the physical medium is automatically updated, the original dynamic coded lock is abandoned, and the new dynamic coded lock is started. Therefore, the key capable of unlocking the original dynamic coded lock is also obsolete, the new dynamic coded lock cannot be unlocked, the new dynamic coded lock also keeps uniqueness and uniqueness, the key of other anti-counterfeiting components cannot be unlocked only through the new key, and the dynamic coded lock of other anti-counterfeiting components cannot be unlocked by the new key.
Referring to fig. 5, in the anti-counterfeiting method of the present embodiment 1, step300 specifically includes:
step301: receiving a login request of a user from a terminal to acquire login information of the user;
step302: carrying out identity verification and authority verification on login information;
Step303: and after the identity verification and the authority verification are passed, sending confirmation permission to the terminal.
When Step301 is executed, the user typically uses the terminal login system to submit a login request, where the login request includes login information, and the login information mainly includes basic information, identity information, authority information, and the like of the user. When Step302 is executed, the identity verification is a first Step of verification, which is used for verifying whether the identity information of the user is legal and compliant and meets the identity requirement of the precious jade participant, and the authority verification is a second Step of verification, which is used for verifying whether the authority information of the user meets the qualification of accessing the system and inquiring the traceability information of the precious jade. Finally, step303 is performed to complete the anti-counterfeit process.
Referring to fig. 6, in the anti-counterfeiting method of embodiment 1, after Step303 is performed, the method further includes:
step304: receiving an identification request of a user for two physical media from a terminal to acquire binding conditions of the two physical media;
step305: based on the binding information, carrying out binding verification on the binding condition;
step306: and after the binding verification is passed, sending confirmation permission to the terminal.
After the anti-counterfeiting of the person is completed, the combined anti-counterfeiting of the person and the object is continued. When Step304 is executed, the user uses the terminal to communicate with two physical media in the anti-counterfeiting component, the communication mode can be bluetooth, wireless network or code scanning, and the like, after connection is formed between the terminal and the two physical media, the terminal generates an identification request, the user uses the terminal to identify the two physical media, and the identification request contains binding conditions of the two physical media connected with the terminal. And then executing Step305, and carrying out binding verification on the binding condition and the recorded binding information, wherein the binding verification is a third Step of verification for verifying whether the two physical media are in a one-to-one corresponding binding relation in the system. Finally, step306 is executed to complete the combined anti-counterfeiting process of the person and the object.
It should be noted that when Step305 is executed, the dynamic encryption lock of the traceable information can be further generated after the verification is passed, the dynamic encryption lock is also encoded according to the dynamic encryption rule, and a third anti-counterfeiting line is formed by adding a layer on the established dynamic encryption lock, so that the security and anti-counterfeiting function of the precious jade are further enhanced.
Referring to fig. 7, in the anti-counterfeiting method of the present embodiment 1, step400 specifically includes:
step401: receiving an unlocking application of a user from a terminal;
step402: generating a dynamic key corresponding to the dynamic coded lock according to the unlocking application;
step403: transmitting the dynamic key to the terminal;
step404: unlocking the dynamic key and the dynamic coded lock through the terminal;
step405: after receiving the successful unlocking result from the terminal, sending the traceability information of the precious jade to the terminal;
step406: and displaying the traceability information through the terminal.
After three steps of verification from Step301 to Step306 are completed, the user is authorized to access and inquire the traceability information of the precious jade. When Step401 is executed, the user operating terminal submits an unlocking application, which is an instruction for generating a dynamic key. Upon execution of Step402, the system generates a dynamic key for unlocking the dynamic trick lock generated in Step200 according to dynamic encryption rules. If a dynamic encryption lock is generated for the trace back information when Step305 is executed, the dynamic key in Step402 corresponds to the dynamic encryption lock and is used for unlocking the dynamic encryption lock, and the dynamic encryption lock can protect other information except the trace back information in the anti-counterfeiting assembly from being accessed by a user for forming part of three anti-counterfeiting functions of the trace back information, so that the security of the anti-counterfeiting assembly is further enhanced. When Step403 is executed, the dynamic key is transmitted to the terminal by wireless communication, bluetooth, or the like, and the user obtains the dynamic key. When Step404 is executed, the user operates the terminal to input the dynamic key, and the matching and verification of the dynamic key and the dynamic coded lock (or dynamic coded lock) are completed at the terminal, and the unlocking is completed after the verification is successful. After the unlocking is successful, step405 is executed, the terminal sends out the unlocking result, and then the traceability information of the precious jade is received, wherein the traceability information at this time can be a part of traceability information read when Step202 is executed or can be all traceability information stored in the storage component. When Step406 is performed, the content of the trace back information is displayed on the interface of the terminal.
By the anti-counterfeiting method disclosed in this embodiment 1, after executing the above steps, the user with legal identity and access authority can query the traceability information of the jatropha stored in the jatropha transaction database. If the three-step verification fails due to the problems of the identity and the authority of the user or the physical medium held by the user, the traceability information of the jades cannot be queried, so that the anti-counterfeiting purpose is realized.
Example 2
The embodiment 2 of the invention discloses an anti-counterfeiting system 10 of jades, which is used for executing the anti-counterfeiting method disclosed in the embodiment 1, encrypting the traceability information of the jades stored in an anti-counterfeiting component 20, and verifying the identity of a user through the cooperation of the terminal and the anti-counterfeiting component 20 when the user wants to inquire the traceability information of the jades by using the terminal, and unlocking the authority of the user after verification to obtain the traceability information, so that the anti-counterfeiting purpose is realized.
Referring to fig. 8, the anti-counterfeiting system 10 of the present embodiment 2 includes a matching module 11, an encryption module 12, a verification module 13, and a key module 14, which communicate with each other.
The matching module 11 is configured to bind and match two physical media 21 of the anti-counterfeiting component 20, and establish binding information. The matching module 11 establishes an anti-counterfeiting line inside the anti-counterfeiting component 20 by binding two physical media 21 together one by one, and records the established binding information for matching verification with user information in subsequent identity verification, thereby being used as a basis for establishing joint anti-counterfeiting between people and objects.
The encryption module 12 is used to set a dynamic password lock for the physical medium 21 based on the binding information and the user information received from the terminal. The binding information is an anti-counterfeiting line established in the previous step and is also the basis for verifying the identity of the user, so that the encryption module 12 sets a dynamic coded lock for the anti-counterfeiting line, a second anti-counterfeiting line can be formed in the anti-counterfeiting component 20, and an independent dynamic anti-counterfeiting mechanism which can be changed every time is formed above the first anti-counterfeiting line, so that the problem that a single password is easy to copy and crack can be avoided. The user information is information representing the situation or information of the participants in the treasury transaction, such as an identification card number of an individual who is willing to participate in the treasury transaction, a unified social credit code of an enterprise or an organization, or a specific ID (Identity document, identity number) set for each participant in the treasury transaction platform by a specific rule, or a combination of the two types. The dynamic coded lock is a code segment randomly generated through a dynamic encryption rule based on binding information and user information, and after the user accesses and unlocks each time, the dynamic coded lock can be changed and is not identical to any previous dynamic coded lock, so that the effects of uncopyability and difficulty in cracking of the codes are realized.
The verification module 13 is configured to verify user information in response to a login request of a user received from a terminal. The login request of the user is different from the user information mentioned above, and may include part of the content of the user information, such as an individual identification card number, a unified social credit code of an enterprise or an organization, etc., and may also include account information or other information of the user using the baoy trading platform. In the verification module 13, verification of the user information is mainly performed for verifying whether the user identity is true or false, whether there is correlation between the user and the sapphire to be queried, and the like.
The key module 14 is configured to send, to the terminal, a dynamic key corresponding to the dynamic code lock and trace back information of the sapphire in response to an unlocking application of the user received from the terminal. The unlocking request of the user is different from the previous login request, the unlocking request is only an instruction sent by the user from the terminal, after the user information is verified to be qualified, the user obtains the authority of sending the unlocking request, when the user wants to acquire the traceability information of the precious jade, the instruction of sending the unlocking request is sent, the dynamic key of the unlocking dynamic coded lock generated by the key module 14 can be obtained, and after the terminal finishes the unlocking operation, the user can see the traceability information of the precious jade. The dynamic password and the traceability information of the precious jade can be simultaneously sent to the terminal or respectively sent to the terminal.
In the anti-counterfeiting system 10 of this embodiment 2, the matching module 11 is specifically configured to: writing the traceability information of the precious and jade into two physical media 21 of the anti-counterfeiting component 20; binding and matching the two physical media 21 according to the trace information and the media information of the physical media 21; binding information of the two physical media 21 is established and recorded according to the result of the binding matching.
The physical medium 21 has a storage unit, such as a chip, a memory, etc., in which the trace information is written by the matching module 11, and the storage unit also stores medium information characterizing the physical medium 21. The traceability information of the precious jade comprises the production place, attribute, transaction node information, processing condition information, logistics transportation information and the like of the precious jade. The trace back information may be recorded in only one physical medium 21 or may be recorded in both physical media 21. The media information contains the number, specification, model, etc. of the physical media 21 in the warehouse or batch. Then, the matching module 11 binds and matches each content in the trace back information and the medium information according to a preset matching rule, and the matching rule can correlate the trace back information with the content in the medium information to form a unique and unique one-to-one binding corresponding relationship, so that when the anti-counterfeiting component 20 is used, the binding of the two physical media 21 has uniqueness and cannot be confused with other physical media 21. Then, the matching module 11 changes the previously obtained binding matching result into binding information which can be identified by the computer according to a preset information generation rule, wherein the binding information can be a specific combination of numbers or letters, can represent two physical media 21 of the binding, and has uniqueness.
In the anti-counterfeiting system 10 of embodiment 2, the encryption module 12 is specifically configured to: acquiring user information; trace back information and medium information read from the physical medium 21; generating a dynamic coded lock of the physical medium 21 based on the trace information, the medium information, the user information and the binding information; the dynamic trick lock is written to the physical medium 21.
The user information can be obtained from the user's terminal, the user information can be recorded when the user uses the terminal for the first time, and the user information can be called out from the database storing the information of the precious stone transaction participants when the user uses the terminal subsequently. The encryption module 12 does not change the contents of the trace back information and the medium information in the storage unit by means of reading, and the trace back information can be read either in whole or in part, or in a specified manner or in random manner. Then, the encryption module 12 performs regular fusion and conversion of the acquired trace back information, medium information, user information, and binding information by dynamic encryption rules to form codes having uniqueness and uniqueness, and stores them in the storage section of the physical medium 21. The dynamic coded lock is bound with two physical media 21, and the key of the other anti-counterfeiting component 20 cannot be used for unlocking the dynamic coded lock, and the key of the anti-counterfeiting component 20 cannot be used for unlocking the other dynamic coded locks.
In the anti-counterfeiting system 10 of embodiment 2, the encryption module 12 is specifically further configured to: the dynamic code lock of the physical medium 21 is updated to a new dynamic code lock based on the trace back information, the medium information, the user information, and the binding information.
After the encryption module 12 successfully reads the trace-back information and the medium information from the storage unit of the physical medium 21, the dynamic coded lock in the physical medium 21 is automatically updated, the original dynamic coded lock is abandoned, and a new dynamic coded lock is started. Therefore, the key that can unlock the original dynamic password lock is also obsolete, and the new dynamic password lock cannot be unlocked, and the new dynamic password lock also maintains uniqueness and uniqueness, and can only be unlocked by the new key, and the keys of other anti-counterfeiting components 20 cannot unlock the new dynamic password lock of the anti-counterfeiting components 20, and similarly, the new key cannot unlock the dynamic password lock of other anti-counterfeiting components 20.
In the anti-counterfeiting system 10 of this embodiment 2, the verification module 13 is specifically configured to: receiving a login request of a user from a terminal to acquire login information of the user; carrying out identity verification and authority verification on login information; and after the identity verification and the authority verification are passed, sending confirmation permission to the terminal.
The user usually uses a terminal login system to submit a login request, wherein the login request contains login information, and the login information mainly comprises basic information, identity information, authority information and the like of the user. Therefore, when the verification module 13 performs verification, the identity verification is a first step of verification, which is used for verifying whether the identity information of the user is legal and compliant and meets the identity requirement of the precious jade participant, and the authority verification is a second step of verification, which is used for verifying whether the authority information of the user reaches the qualification of accessing the system and inquiring the traceability information of the precious jade. And finally, after the identity verification and the authority verification are passed, the verification module 13 sends a confirmation license to the terminal, and the anti-counterfeiting process of the person is completed.
In the anti-counterfeiting system 10 of this embodiment 2, the verification module 13 is specifically further configured to: receiving an identification request of a user for the two physical media 21 from a terminal to acquire binding conditions of the two physical media 21; based on the binding information, carrying out binding verification on the binding condition; and after the binding verification is passed, sending confirmation permission to the terminal.
After the verification module 13 completes the anti-counterfeiting of the person, the combined anti-counterfeiting of the person and the object is continued. The user uses the terminal to communicate with the two physical media 21 in the anti-counterfeiting component 20, the communication mode can be bluetooth, wireless network or code scanning, and the like, after the terminal and the two physical media 21 form connection, the terminal generates an identification request, the user uses the terminal to identify the two physical media 21, and the identification request contains binding conditions of the two physical media 21 connected with the terminal. The verification module 13 then performs a binding verification on the binding condition and the recorded binding information, where the binding verification is a third step of verification, and is used to verify whether the two physical media 21 are in a binding relationship corresponding to one another in the system. And finally, after the binding verification is passed, sending confirmation permission to the terminal to complete the combined anti-counterfeiting process of the person and the object.
It should be noted that when the verification module 13 is used, the encryption module 12 can be used to regenerate the dynamic encryption lock of the traceability information after the verification is passed, the dynamic encryption lock is also encoded according to the dynamic encryption rule, and a third anti-counterfeiting line is formed on the established dynamic password lock, so that the security and anti-counterfeiting function of the precious jade are further enhanced.
In the anti-counterfeiting system 10 of the present embodiment 2, the key module 14 is specifically configured to: receiving an unlocking application of a user from a terminal; generating a dynamic key corresponding to the dynamic coded lock according to the unlocking application; transmitting the dynamic key to the terminal; unlocking the dynamic key and the dynamic coded lock through the terminal; after receiving the successful unlocking result from the terminal, sending the traceability information of the precious jade to the terminal; and displaying the traceability information through the terminal.
After three steps of verification are completed by using the verification module 13, the user is authorized to access and inquire the traceability information of the precious jade. And the user operation terminal submits an unlocking application, wherein the unlocking application is an instruction for generating the dynamic key. The key module 14 generates a dynamic key for unlocking the dynamic coded lock according to the dynamic encryption rules. If the encryption module 12 generates a dynamic encryption lock for the traceback information before, the dynamic key generated by the key module 14 corresponds to the dynamic encryption lock at this time and is used for unlocking the dynamic encryption lock, and the dynamic encryption lock can protect other information except the traceback information in the anti-counterfeiting component 20 from being accessed by a user for partial three anti-counterfeiting formed by the traceback information, so that the security of the anti-counterfeiting component 20 is further enhanced. The dynamic key is transmitted to the terminal by means of wireless communication, bluetooth and the like, and the user obtains the dynamic key. And then, the user operates the terminal to input the dynamic key, the matching and verification of the dynamic key and the dynamic coded lock (or the dynamic coded lock) are completed at the terminal, and the unlocking is completed after the verification is successful. After successful unlocking, the terminal sends out successful unlocking result, and after confirmation by the key module 14, the terminal is sent with the traceability information of the precious jade, and the traceability information at this time can be part of the traceability information read by the encryption module 12 or all the traceability information stored in the storage component. Finally, the content of the trace back information sent by the key module 14 is displayed on the interface of the terminal.
With the anti-counterfeiting system 10 disclosed in this embodiment 2, the matching module 11, the encryption module 12, the verification module 13 and the key module 14 enable a user with legal identity and access rights to query the traceability information of the jaboticaba stored in the jaboticaba transaction database. If the three-step verification fails due to the identity and authority of the user or the physical medium 21 held by the user, the traceability information of the jades cannot be queried, so that the anti-counterfeiting purpose is realized.
Example 3
The embodiment 3 of the invention discloses an anti-counterfeiting component 20 of precious jade, which is used for encrypting the traceability information of the precious jade through the anti-counterfeiting system disclosed in the embodiment 2 when the anti-counterfeiting method disclosed in the embodiment 1 is executed, and is matched with a terminal to verify the identity of the user when the user uses the terminal to inquire the traceability information of the precious jade, after the verification is passed, the user obtains anti-counterfeiting permission, and then the traceability information is sent to the terminal through the anti-counterfeiting system, so that the anti-counterfeiting purpose is realized.
Referring to fig. 9, the anti-counterfeiting component 20 of the present embodiment 3 includes two physical media 21, the physical media 21 includes a substrate 22, a memory chip 23 and an identification medium 24, the memory chip 23 is disposed in the substrate 22, the identification medium 24 is disposed on the surface of the substrate 22, and the identification medium 24 and the memory chip 23 execute the anti-counterfeiting method of the baoysters as disclosed in embodiment 1 through the anti-counterfeiting system of the baoysters disclosed in embodiment 2; the memory chip 23 is used for storing traceability information of the precious jade, medium information of the physical medium 21 and a dynamic coded lock generated by the anti-counterfeiting system of the precious jade disclosed in the embodiment 2; the identification medium 24 is used to identify login requests and unlock applications from users at the terminals and verify binding information of the two physical media 21.
The physical media 21 may be anti-counterfeit cards or boxes, the sizes of which are similar to those of the note paper, and the two physical media 21 may be two anti-counterfeit cards or boxes, or a combination of the anti-counterfeit cards and boxes. When in use, the anti-fake cards are mutually scanned, the anti-fake boxes are mutually scanned, and the anti-fake cards can be inserted into the anti-fake boxes to finish the scanning. The user holds the anti-fake card or the anti-fake box, and can inquire the traceability information of the precious jade through the anti-fake verification process by using the terminal. The substrate 22 is a physical carrier of the physical medium 21 for carrying the memory chip 23 and the identification medium 24. The memory chip 23 is a component of the physical medium 21 that stores information, and has information recording, information transmission and reception, and logical operation functions. The memory chip 23 may be a physical unclonable (Physically Unclonable Function, PUF) chip, and on the level that the anti-counterfeiting component 20 is used as a storage carrier of traceability information of precious and jade, a key or a storage key is not required, and the authenticity of the user is judged by setting a dynamic coded lock through an external system such as the anti-counterfeiting system in embodiment 2, so as to realize anti-counterfeiting verification. The identification medium 24 is a component of the physical medium 21 that is communicatively connected to an external device, and may establish a connection with the external device by bluetooth, wireless communication, or a code scanning manner. In the security component 20 of this embodiment 3, before the physical media 21 are not activated, the two physical media 21 may be stored together or separately without any binding relationship.
In the anti-counterfeiting component 20 of the embodiment 3, a half code segment of the dynamic coded lock is stored in each storage chip 23, and after two physical media 21 are bound together, the two half code segments form the dynamic coded lock. After the anti-counterfeiting system of embodiment 2 generates the dynamic password lock, the memory chips 23 of the two physical media 21 each store half of the dynamic password lock, and the dynamic password lock is complete and can be unlocked only after the two physical media 21 are mutually authenticated by the identification medium 24 and combined into one.
Example 4
Embodiment 4 of the present invention discloses a computer-readable storage medium in which a computer program is stored which, when run on a computer, causes the computer to perform the anti-counterfeiting method of the gem-and-jade as disclosed in embodiment 1.
Example 5
Embodiment 5 of the present invention discloses a computer program product comprising a computer program which, when run on a computer, causes the computer to perform the anti-counterfeiting method of the precious jade stone as disclosed in embodiment 1.
The anti-counterfeiting method, the anti-counterfeiting system and the anti-counterfeiting component can improve physical safety of precious stones and jades in the import transportation process, and simultaneously perform anti-counterfeiting and verification on the owners of the object rights and goods by innovative encryption means, so that comprehensive anti-counterfeiting purposes of the owners and the goods are realized.
It should be understood that the above description of the specific embodiments of the present invention is only for illustrating the technical route and features of the present invention, and is for enabling those skilled in the art to understand the present invention and implement it accordingly, but the present invention is not limited to the above-described specific embodiments. All changes or modifications that come within the scope of the appended claims are intended to be embraced therein.

Claims (17)

1. An anti-counterfeiting method of precious stones, which is characterized by comprising the following steps:
binding and matching two physical media of the anti-counterfeiting component, and establishing binding information; the two physical media are two anti-fake cards or two anti-fake boxes or the combination of the anti-fake cards and the anti-fake boxes, and the physical media contain the traceability information of the precious jade but do not contain the precious jade;
setting a dynamic coded lock for the physical medium based on the binding information and user information received from a terminal; the dynamic coded lock is provided with two half code segments, and the two half code segments of the dynamic coded lock are respectively arranged in the two physical media;
responding to a login request of a user received from a terminal, and checking user information;
And responding to an unlocking application of a user received from a terminal, through mutual scanning among the anti-counterfeiting cards, among the anti-counterfeiting boxes or scanning completed by inserting the anti-counterfeiting cards into the anti-counterfeiting boxes, after the two half code segments mutually authenticate and form the dynamic coded lock, the dynamic coded lock is unlocked, and a dynamic key corresponding to the dynamic coded lock and trace information of the sapphire are sent to the terminal.
2. The method according to claim 1, wherein binding matching the two physical media of the security component to create binding information specifically comprises:
writing the traceability information of the precious jade into two physical media of the anti-counterfeiting component;
binding and matching the two physical media according to the tracing information and the media information of the physical media;
and establishing and recording binding information of the two physical media according to the binding matching result.
3. The method according to claim 2, wherein in setting a dynamic trick lock for the physical medium based on the binding information and user information received from a terminal, specifically comprising:
acquiring user information;
The trace back information and the medium information read from the physical medium;
generating a dynamic coded lock of the physical medium based on the traceability information, the medium information, the user information and the binding information;
and writing the dynamic coded lock into the physical medium.
4. The method of claim 3, further comprising, after the trace back information and the media information are read from the physical media:
and updating the dynamic coded lock of the physical medium into a new dynamic coded lock based on the traceability information, the medium information, the user information and the binding information.
5. The method according to claim 1, characterized in that in verifying the user information in response to a login request of the user received from the terminal, it specifically comprises:
receiving a login request of a user from a terminal to acquire login information of the user;
carrying out identity verification and authority verification on the login information;
and after the identity verification and the authority verification are passed, sending a confirmation license to the terminal.
6. The method of claim 5, further comprising, after sending a confirmation grant to the terminal after both the identity check and the rights check pass:
Receiving an identification request of a user for the two physical media from a terminal to acquire binding conditions of the two physical media;
based on the binding information, carrying out binding verification on the binding condition;
and after the binding verification is passed, sending confirmation permission to the terminal.
7. The method according to claim 1, wherein in response to an unlocking application received from a terminal by a user, sending a dynamic key corresponding to the dynamic coded lock and trace back information of the sapphire to the terminal specifically comprises:
receiving an unlocking application of a user from a terminal;
generating a dynamic key corresponding to the dynamic coded lock according to the unlocking application;
transmitting the dynamic key to the terminal;
unlocking the dynamic key and the dynamic coded lock through the terminal;
after receiving a successful unlocking result from a terminal, sending traceability information of the precious jade to the terminal;
and displaying the traceability information through the terminal.
8. An anti-counterfeiting system of a precious stone is characterized by comprising a matching module, an encryption module, a verification module and a key module which are communicated with each other;
The matching module is used for binding and matching two physical media of the anti-counterfeiting component and establishing binding information; the two physical media are two anti-fake cards or two anti-fake boxes or the combination of the anti-fake cards and the anti-fake boxes, and the physical media contain the traceability information of the precious jade but do not contain the precious jade;
the encryption module is used for setting a dynamic coded lock for the physical medium based on the binding information and the user information received from the terminal; the dynamic coded lock is provided with two half code segments, and the two half code segments of the dynamic coded lock are respectively arranged in the two physical media;
the verification module is used for responding to a login request of a user received from the terminal and verifying the user information;
the key module is used for responding to an unlocking application of a user received from the terminal, through mutual scanning among the anti-fake cards, among the anti-fake boxes or through scanning completed by inserting the anti-fake cards into the anti-fake boxes, after the two half code sections mutually authenticate and form the dynamic coded lock, the dynamic coded lock is unlocked, and a dynamic key corresponding to the dynamic coded lock and traceability information of the sapphire are sent to the terminal.
9. The system of claim 8, wherein the matching module is specifically configured to:
writing the traceability information of the precious jade into two physical media of the anti-counterfeiting component;
binding and matching the two physical media according to the tracing information and the media information of the physical media;
and establishing and recording binding information of the two physical media according to the binding matching result.
10. The system according to claim 9, wherein the encryption module is specifically configured to:
acquiring user information;
the trace back information and the medium information read from the physical medium;
generating a dynamic coded lock of the physical medium based on the traceability information, the medium information, the user information and the binding information;
and writing the dynamic coded lock into the physical medium.
11. The system according to claim 10, wherein the encryption module is further specifically configured to:
and updating the dynamic coded lock of the physical medium into a new dynamic coded lock based on the traceability information, the medium information, the user information and the binding information.
12. The system of claim 8, wherein the verification module is specifically configured to:
Receiving a login request of a user from a terminal to acquire login information of the user;
carrying out identity verification and authority verification on the login information;
and after the identity verification and the authority verification are passed, sending a confirmation license to the terminal.
13. The system according to claim 12, wherein the verification module is further specifically configured to:
receiving an identification request of a user for the two physical media from a terminal to acquire binding conditions of the two physical media;
based on the binding information, carrying out binding verification on the binding condition;
and after the binding verification is passed, sending confirmation permission to the terminal.
14. The system of claim 8, wherein the key module is specifically configured to:
receiving an unlocking application of a user from a terminal;
generating a dynamic key corresponding to the dynamic coded lock according to the unlocking application;
transmitting the dynamic key to the terminal;
unlocking the dynamic key and the dynamic coded lock through the terminal;
after receiving a successful unlocking result from a terminal, sending traceability information of the precious jade to the terminal;
and displaying the traceability information through the terminal.
15. An anti-counterfeiting component of a sapphire, characterized by comprising two physical media, wherein the two physical media are anti-counterfeiting cards and/or anti-counterfeiting boxes, the physical media contain traceability information of the sapphire and do not contain the sapphire, the physical media comprise a base body, a storage chip and an identification medium, the storage chip is arranged in the base body, the identification medium is arranged on the surface of the base body, and the identification medium and the storage chip execute an anti-counterfeiting method of the sapphire through the anti-counterfeiting system of the sapphire according to claims 8 to 14;
the memory chip is used for storing traceability information of precious and jade, medium information of physical medium and dynamic coded lock generated by the anti-counterfeiting system of the precious and jade according to claims 8 to 14, and half code segments of the dynamic coded lock are stored in each memory chip;
the identification medium is used for identifying login requests and unlocking applications from users at the terminal and verifying binding information of the two physical media;
and responding to an unlocking application of a user received by the identification medium from the terminal, and unlocking the dynamic coded lock after the two half code segments mutually authenticate and form the dynamic coded lock through mutual scanning among the anti-fake cards, between the anti-fake boxes or scanning completed by inserting the anti-fake cards into the anti-fake boxes.
16. The security assembly of claim 15 wherein the memory chip is a physically unclonable chip.
17. A computer-readable storage medium, in which a computer program is stored which, when run on a computer, causes the computer to perform the anti-counterfeiting method according to any one of claims 1 to 7.
CN202310165434.6A 2023-02-24 2023-02-24 Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting assembly for precious stones Active CN115860037B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310165434.6A CN115860037B (en) 2023-02-24 2023-02-24 Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting assembly for precious stones

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310165434.6A CN115860037B (en) 2023-02-24 2023-02-24 Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting assembly for precious stones

Publications (2)

Publication Number Publication Date
CN115860037A CN115860037A (en) 2023-03-28
CN115860037B true CN115860037B (en) 2023-06-06

Family

ID=85658906

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310165434.6A Active CN115860037B (en) 2023-02-24 2023-02-24 Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting assembly for precious stones

Country Status (1)

Country Link
CN (1) CN115860037B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103413227A (en) * 2013-08-02 2013-11-27 四川航天系统工程研究所 Product fake prevention tracing system and method for implementing fake prevention tracing checking thereof
CN107316075A (en) * 2017-07-04 2017-11-03 上海宝玉石交易中心有限公司 Jewelry identity reviews the integral multidimensional binding method for anti-counterfeit of material evidence and external member
CN208207867U (en) * 2018-05-29 2018-12-07 成都川联芯创信息工程有限公司 A kind of automatic check system of jewelry

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8705873B2 (en) * 2008-03-20 2014-04-22 Universite De Geneve Secure item identification and authentication system and method based on unclonable features
US20090289107A1 (en) * 2008-05-26 2009-11-26 Wayne Douglas Prentice Multi-use durable goods card and system
CN101504715B (en) * 2009-03-04 2011-11-16 深圳市众合联科技有限公司 Product identity digital identification apparatus, inspection apparatus, product and anti-fake inspection method
CN106850699B (en) * 2017-04-10 2019-11-29 中国工商银行股份有限公司 A kind of mobile terminal login authentication method and system
CN108171019B (en) * 2018-01-12 2021-08-03 深圳芯易德科技有限公司 Anti-counterfeiting verification method, anti-counterfeiting verification system, anti-counterfeiting verification device and storage medium
CN108573384B (en) * 2018-03-07 2022-05-06 北京安讯奔科技有限责任公司 Product with double identification codes and product tracing anti-counterfeiting verification method and device
CN108876332B (en) * 2018-06-04 2020-09-22 清华大学 Block chain safe transaction method and device based on biometric feature mark authentication
CN112288442A (en) * 2020-10-15 2021-01-29 江苏图码信息科技有限公司 Associated customized image code anti-counterfeiting tracing system and application component
CN218318364U (en) * 2022-11-06 2023-01-17 重庆五盾科技有限公司 Coded lock bottle cap sleeve with NFC dynamic encryption chip

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103413227A (en) * 2013-08-02 2013-11-27 四川航天系统工程研究所 Product fake prevention tracing system and method for implementing fake prevention tracing checking thereof
CN107316075A (en) * 2017-07-04 2017-11-03 上海宝玉石交易中心有限公司 Jewelry identity reviews the integral multidimensional binding method for anti-counterfeit of material evidence and external member
CN208207867U (en) * 2018-05-29 2018-12-07 成都川联芯创信息工程有限公司 A kind of automatic check system of jewelry

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于RFID技术的防伪平台的设计与实现;芦佳;卫强;陈兵;;计算机技术与发展(第05期);全文 *

Also Published As

Publication number Publication date
CN115860037A (en) 2023-03-28

Similar Documents

Publication Publication Date Title
US10637665B1 (en) Blockchain-based digital identity management (DIM) system
US10829088B2 (en) Identity management for implementing vehicle access and operation management
US10142324B2 (en) Method for reading attributes from an ID token
CN102959559B (en) For the method producing certificate
CN111552955B (en) Personal identity authentication method and device based on block chain and IPFS
US6904416B2 (en) Signature verification using a third party authenticator via a paperless electronic document platform
US8627437B2 (en) Method for reading attributes from an ID token
EP1571525B1 (en) A method, a hardware token, and a computer program for authentication
ES2251415T3 (en) ELECTRONIC METHOD FOR STORAGE AND RECOVERING ORIGINAL AUTHENTICATED DOCUMENTS.
CN101107611B (en) Private and controlled ownership sharing method, device and system
CN109241726B (en) User authority control method and device
US11128604B2 (en) Anonymous communication system and method for subscribing to said communication system
US20100241571A1 (en) System and method for cardless secure on-line credit card/debit card purchasing
CN101110728A (en) Security validating system and method for RFID certificate of title
CN108243182B (en) Block chain management authorization method, sub-management end, root management end and storage medium
EA012094B1 (en) Security token and method for authentication of a user with the security token
CN102906755A (en) Content control method using certificate revocation lists
CN113450092A (en) Block chain network-based article safe and efficient transaction method, system and storage medium
CN104123777A (en) Access control remote authorization method
CA3216881A1 (en) Trusted custody chain for verifiable claims
US20020053028A1 (en) Process and apparatus for improving the security of digital signatures and public key infrastructures for real-world applications
CN115860037B (en) Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting assembly for precious stones
WO2024015105A1 (en) Delivering random number keys securely for one-time pad symmetric key encryption
JPS59158639A (en) Automatically collating method and device
JP4671561B2 (en) IC card authentication method, authentication system, and reader / writer system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40090162

Country of ref document: HK