200816059 九、發明說明: 【發明所屬之技術領域】 本發明是有關於一種驗證物品之真偽的方法及系統, 特別是指一種使用一可變密錄(mying secret key)來驗證 物品之真偽的方法及系統。 【先前技術】 在美國專利申請公開號20020005774中,揭露了習知 的一種驗證產品之真偽的系統。此習知的系統包含一具有 一密碼(encrypted code )且與該產品相關的射頻識別( Radio Frequency Identification,以下簡稱 RFID)標簸,及 一 RFID標籤讀取器。且該RFID標籤讀取器用來讀取該 RFID標籤的密碼且轉傳該密碼到一驗證引擎( authentication engine)驗證。 因為該RFID標籤的密碼是固定不變的,故該習知系統 容易產生欺瞒,而此為該習知系統的缺點。 美國專利申請公開號20050071231提出一種系統,該 系統可解決上述習知系統之問題,且該系統包含一 RFID標 威、一 RFID讀取器和一授權中心(authorizing entity)。該 RFID標籤與該產品相關。該rhD讀取器用於產生一詢問 信號(interrogation signal)。該RFID標籤根據該詢問信號 產生並傳送一亂數。而該RFID讀取器則轉傳該亂數給該授 權中心驗證。 雖然此被提出的系統達到了所期望的目的,但該授權 中心根據儲存在其一資料庫中的資訊驗證來自該rFIE)讀取 200816059 器的亂數。未經授權的存取該資料庫使此被提出的系統容 易產生欺瞒。 【發明内容】 因此,本發明之目的即在提供一種驗證物品之真偽的 方法及系統,且此方法及系統可以確保交易安全。200816059 IX. Description of the Invention: [Technical Field] The present invention relates to a method and system for verifying the authenticity of an article, and more particularly to using a myming secret key to verify the authenticity of an article. Method and system. [Prior Art] A system for verifying the authenticity of a product is disclosed in U.S. Patent Application Publication No. 20020005774. The conventional system includes a radio frequency identification (RFID) tag having an encrypted code and associated with the product, and an RFID tag reader. And the RFID tag reader is used to read the password of the RFID tag and forward the password to an authentication engine for verification. Since the password of the RFID tag is fixed, the conventional system is prone to fraud, which is a disadvantage of the conventional system. U.S. Patent Application Publication No. 20050071231 proposes a system that solves the problems of the prior art system described above and which includes an RFID tag, an RFID reader, and an authorizing entity. The RFID tag is associated with the product. The rhD reader is used to generate an interrogation signal. The RFID tag generates and transmits a random number based on the inquiry signal. The RFID reader then passes the random number to the authorization center for verification. Although the proposed system achieves the desired purpose, the authorization center verifies the random number of the 200816059 device from the rFIE based on the information stored in one of its databases. Unauthorized access to the database makes this proposed system prone to bullying. SUMMARY OF THE INVENTION Accordingly, it is an object of the present invention to provide a method and system for verifying the authenticity of an item, and the method and system can ensure transaction security.
於是,本發明驗證物品之真偽的方法可以一系統實現 。該系統包含一與該物品相關的射頻識別(rfid)標籤、 私子l置和一驗證中心。該方法包含以下步驟:使該電 子I置產生亚無線傳送一請求信號;根據該請求信號,使 該RFID標籤基於-可變密鑰產生一第一驗證碼,且基於該 RFID標籤的一唯一識別碼和該可變密鑰產生一第二驗證碼 ’且基於該RFID標籤的該唯-識別碼、該第—驗證碼和該 第二驗證碼產生一第三驗證碼,且無線傳送該第三驗證碼 作為該電子裝置的接收;及使該電子裝置將接收自該rfid 標藏的該第三驗證碼轉傳給該驗證中心以用於驗證。 本發明之另一層面是一種驗證物品之真偽的系統,包 3 RFID 籤、-電子裝置及_驗證中心。該腿〇標籤 與該物品相關且具有一唯一識別碼。該電子裝置用於產生 並無線傳送一請求信號。根據該請求信號,該rfid標籤基 於可’交铪鑰產生一第一驗證碼,且基於該RFID標籤的該 唯一識別碼和該可變密鑰產生一第二驗證碼,且基於該 RFID &籤的該唯-識別碼、該第—驗證碼和該第二驗證碼 產生一第三驗證碼,且無線傳送該第三驗證碼作為該電子 裳置的接收。該電子裝置將接收自該RFm標籤的該第三驗 200816059 證碼轉傳給該驗證中心以用於驗證。 本發明藉由該可變密鑰,可以達到確保交易安全的功 效。 【實施方式】 有關本發明之前述及其他技術内容、特點與功效,在 乂下配&參考圖式之二個較佳實施例的詳細說明中,將可 清楚地呈現。 在本發明被詳細描述之前,要注意的是,在以下的說 明内容中,類似的元件是以相同的編號來表示。 麥閱圖1與圖2,本發明驗證物品(圖未示)之真偽的 系統1之第一較佳實施例包含一 RFID標籤5、一電子裝置 6 和一驗證中心(authenticating center) 7。 在此實施例中,該RFID標籤5與該物品相關且具有一 唯一識別碼。 / 〇名私子裝置6包括一用於產生一請求信號的第一處理 單:61及一與該電子裝置6之第-處理單元6"馬接且被 :第處理單凡61控制的第一傳收單元62,且該第一傳收 單元62用於無線傳送該請求信號。 該汉™標籤5根據該請求信號而產生—可變⑽_ 二於騎义始鑰的第_驗證碼、一基於該r膽標籤$之唯 ^識別碼和該可變密輪的第二驗證碼、一基於該咖〇標鐵 〃識⑺碼和㈣—驗證碼與該第二驗證碼的第三驗證 ”、、,且無線傳送該第三驗證碼給該電子裝置6。 该電子裝置6的第_處理單元61進—步控制該電子裝 7 200816059 置6的第一傳收單元62以將接收自該RFID標籤5的第三 驗證碼轉傳給該驗證中心7以用於驗證。 該驗證中心7包括第一驗證裝置71和第二驗證裝置72 。該驗證中心7的第一驗證裝置71是設於一管理本發明之 系統1的服務提供者(圖未示)處。該驗證中心7的第二 驗證裝置72是設於該物品的製造商(圖未示)處。 該驗證中心7的第一驗證裝置71包括一第二處理單元 711和一與該第一驗證裝置71之第二處理單元711耦接且 被該第二處理單元711控制的第二傳收單元712。該第二傳 收單元712將接收自該電子裝置6的第三驗證碼轉傳給該 第二驗證裝置72。 該驗證中心7的第二驗證裝置72包括一第三處理單元 721和一第三傳收單元722。該第二驗證裝置72的第三處 理單元721執行一演算法以根據由該第一驗證裝置71轉傳 來的第三驗證碼,決定該RFID標籤5的唯一識別碼、該第 一驗證碼和該第二驗證碼,並基於該RFID標籤5的唯一識 別碼、該第一驗證碼和該第二驗證碼這三個中的兩個產生 一驗證碼,且比較該驗證碼與該RFID標籤5的唯一識別碼 、該第一驗證碼和該第二驗證碼這三個中剩下的那一個, 以驗證該物品的真偽。該第二驗證裝置72的第三傳收單元 722耦接到該第二驗證裝置72的第三處理單元721且受該 第三處理單元721控制以將該比較結果轉傳給該第一驗證 裝置71。 該驗證中心7之第一驗證裝置71的第二處理單元711 200816059 控制該第_綠蛾壯班 果韓僂认 弟二傳收單元712以將該比較結 果轉傳給該電子裝置6。 :亥甩子裝置6更包括一耦接到該電子裝置6之第 :早'61且受該第-處理單元61控制的告知單元63,以 仏一 X驗也中〜7之第-驗證裝置71轉傳來的比較結果 抑使用者(圖未不)。在此實施例中’該電子裝置6的告 一早:63具有一液晶顯示器(圖未示該液晶顯示器以 :文字訊息或一圖形訊息或兩者顯示該比較結果。在另一 二施例中,該電子裝置6的告知單元63具有_發光二極體 /未不),該發光二極體發出不同顏色的光以代表該比較 Ί。例如:當該告知單元63的發光二極體發出綠色光時 ^這表不该比較結果驗證出該物品是真實的。另一方面, =該告知單^ 63的發光二極體發出紅色光時,這表示該比 季乂結果驗證出該物品為偽造的。 a值得注意的是,將該比較結果告知使用者可以透過其 =方式傳達,並不限於該告知單& 63。在—實施例中,該 ^子I置6用於-轉傳模式,其中該電子裝置6自動轉傳 遠比較結果給使用者的-預設電子郵件帳號。在另一實施 例中’該電子裝置6用於-上傳模式,其中該電子裝置6 自動上傳該比較結果給-網際網路網站。在又—實施例中 邊電子裝置6用於一傳真模式,其中該電子裝置6自動 發送該比較結果給使用者的一預設傳真機。 在此實施例中,該電子裝置6的第—傳收單元Μ透過 一無線連結8將該第三驗證碼轉傳給該驗證中心7之第一 9 200816059 驗證裝置71的第二傳收單元712,且透過該無線連結8接 收來自該第二傳收單元712的比較結果。較佳地,該無線 連結8是下面所列的其中一種:網際網路連結、短訊息服 務(Short Message Service,SMS )、全球行動通信系統( Global System For Mobile Communication,GSM)連結、通 用封包無線電服務(General Packet Radio Service,GPRS ) 連結、無線保真度(Wireless Fidelity,Wi-Fi )連結。在另 一實施例中,該電子裝置6的第一傳收單元62透過一有線 連結8 (如:乙太網路(Ethernet)或匯流排(Bus)連結) 將該第三驗證碼轉傳給該驗證中心7之第一驗證裝置71的 弟一傳收卓元712 ’且透過該有線連結8接收來自該第一傳 收單元712的比較結果。 在另一實施例中,該驗證中心7省略該第二驗證襄置 72。該第一驗證裝置71的第二處理單元711根據由該電子 裝置6轉傳來的第三驗證碼,決定該RFID標籤5的唯_識 別碼、該第一驗證碼和該第二驗證碼,並基於該標藏 5的唯一識別碼、該第一驗證碼和該第二驗證碼這三個中的 兩個產生該驗證碼,且比較該驗證碼與該RFID標籤5的唯 一 5我別碼、该弟'驗證碼和該第一驗證碼這二個中剩下的 那一個。該第一驗證裝置71的第二傳收單元712耦接到該 第一驗證裝置71的第二處理單元711且受該第二處理單元 711控制以將該比較結果轉傳給該電子裝置6。 驗證物品之真偽的方法之第一較佳實施例利用上述所 提到之系統1實現,且包含圖2所示的步驟。 10 200816059 在步驟31中,該電子裝置6的第一處理單元61產生 該請求信號,且控制該電子裝置6的第一傳收單元62無線 傳送該請求信號。Thus, the method of the present invention for verifying the authenticity of an article can be implemented in one system. The system includes a radio frequency identification (rfid) tag associated with the item, a private placement, and a verification center. The method includes the steps of: causing the electronic I to generate a sub-radio transmission request signal; according to the request signal, causing the RFID tag to generate a first verification code based on the variable key, and based on a unique identification of the RFID tag And the variable key generates a second verification code' and generates a third verification code based on the unique identification code of the RFID tag, the first verification code and the second verification code, and wirelessly transmits the third The verification code is received by the electronic device; and the electronic device transmits the third verification code received from the RFID to the verification center for verification. Another aspect of the present invention is a system for verifying the authenticity of an item, including an RFID tag, an electronic device, and a verification center. The leg tag is associated with the item and has a unique identification code. The electronic device is operative to generate and wirelessly transmit a request signal. According to the request signal, the RFID tag generates a first verification code based on the 铪 key, and generates a second verification code based on the unique identification code of the RFID tag and the variable key, and based on the RFID & The unique identification code, the first verification code and the second verification code generate a third verification code, and the third verification code is wirelessly transmitted as the reception of the electronic presence. The electronic device forwards the third verification 200816059 certificate received from the RFm tag to the verification center for verification. With the variable key, the present invention can achieve the effect of ensuring transaction security. [Embodiment] The foregoing and other technical contents, features, and advantages of the present invention will be apparent from the detailed description of the preferred embodiments of the accompanying drawings. Before the present invention is described in detail, it is noted that in the following description, similar elements are denoted by the same reference numerals. Referring to Figures 1 and 2, a first preferred embodiment of the system 1 for verifying the authenticity of an article (not shown) comprises an RFID tag 5, an electronic device 6 and an authentication center 7. In this embodiment, the RFID tag 5 is associated with the item and has a unique identification code. / nickname private device 6 includes a first processing list for generating a request signal: 61 and a first processing unit 6" with the electronic device 6, and the first one controlled by the processing unit 61 The transmitting unit 62, and the first transmitting unit 62 is configured to wirelessly transmit the request signal. The HanTM tag 5 is generated according to the request signal - a variable (10) _ a second _ verification code of the ridiculous initial key, a unique identification code based on the r cipher tag $, and a second verification code of the variable dense wheel And the third verification based on the cookie (7) code and (4) - the verification code and the second verification code, and wirelessly transmitting the third verification code to the electronic device 6. The electronic device 6 The first processing unit 61 further controls the first transmitting unit 62 of the electronic device 7 200816059 to transfer the third verification code received from the RFID tag 5 to the verification center 7 for verification. The center 7 includes a first verification device 71 and a second verification device 72. The first verification device 71 of the verification center 7 is provided at a service provider (not shown) that manages the system 1 of the present invention. The second verification device 72 is disposed at the manufacturer (not shown) of the article. The first verification device 71 of the verification center 7 includes a second processing unit 711 and a second with the first verification device 71. The second transmitting unit 7 coupled to the processing unit 711 and controlled by the second processing unit 711 12. The second transmitting unit 712 forwards the third verification code received from the electronic device 6 to the second verification device 72. The second verification device 72 of the verification center 7 includes a third processing unit 721 and a The third transmitting unit 722. The third processing unit 721 of the second verification device 72 executes an algorithm to determine the unique identification code of the RFID tag 5 according to the third verification code forwarded by the first verification device 71. And the first verification code and the second verification code, and generating a verification code based on two of the three unique identifiers of the RFID tag 5, the first verification code, and the second verification code, and comparing the The verification code and the remaining one of the unique identification code of the RFID tag 5, the first verification code and the second verification code to verify the authenticity of the item. The third of the second verification device 72 The transmitting unit 722 is coupled to the third processing unit 721 of the second verification device 72 and controlled by the third processing unit 721 to transfer the comparison result to the first verification device 71. The first of the verification centers 7 The second processing unit 711 200816059 of the verification device 71 controls The first _ green moth ants, the Han dynasty accompaniment unit 712 to transfer the comparison result to the electronic device 6. The haizi device 6 further includes a first coupled to the electronic device 6: early ' 61. The notification unit 63, which is controlled by the first processing unit 61, reverses the result of the comparison transmitted by the first-verification device 71 of the first-to-one test, and the user (not shown). In this embodiment, 'The early morning of the electronic device 6: 63 has a liquid crystal display (the liquid crystal display is not shown with: a text message or a graphic message or both to display the comparison result. In the other two embodiments, the electronic device 6 The notification unit 63 has _light-emitting diodes/none, and the light-emitting diodes emit light of different colors to represent the comparison Ί. For example, when the light-emitting diode of the notification unit 63 emits green light ^ This indicates that the comparison result verifies that the item is authentic. On the other hand, when the light-emitting diode of the notification sheet 63 emits red light, this indicates that the result of the comparison is verified to be that the article is forged. a It is worth noting that the result of the comparison is informed to the user that it can be conveyed through its = mode, and is not limited to the notice & 63. In the embodiment, the sub-I is set to 6 for the transfer mode, wherein the electronic device 6 automatically forwards the far comparison result to the user's default e-mail account. In another embodiment, the electronic device 6 is used in an upload mode in which the electronic device 6 automatically uploads the comparison result to an internet website. In still another embodiment, the edge electronic device 6 is used in a fax mode in which the electronic device 6 automatically transmits the comparison result to a predetermined fax machine of the user. In this embodiment, the first transmitting unit of the electronic device 6 transmits the third verification code to the second transmitting unit 712 of the first device 9 of the verification center 71 through the wireless link 8 And receiving the comparison result from the second transmitting unit 712 through the wireless link 8. Preferably, the wireless link 8 is one of the following: an Internet link, a Short Message Service (SMS), a Global System For Mobile Communication (GSM) link, and a universal packet radio. General Packet Radio Service (GPRS) connection, Wireless Fidelity (Wi-Fi) connection. In another embodiment, the first transmission unit 62 of the electronic device 6 transmits the third verification code to the wired connection 8 (eg, Ethernet or bus connection). The first verification device 71 of the verification center 7 transmits the comparison result from the first transmission unit 712 through the wired connection 8 . In another embodiment, the verification center 7 omits the second verification device 72. The second processing unit 711 of the first verification device 71 determines the unique identifier of the RFID tag 5, the first verification code, and the second verification code according to the third verification code transferred from the electronic device 6. And generating the verification code based on two of the three unique identifiers of the label 5, the first verification code and the second verification code, and comparing the verification code with the unique 5 code of the RFID tag 5. The remaining one of the two of the "authentication code" and the first verification code. The second transmitting unit 712 of the first verification device 71 is coupled to the second processing unit 711 of the first verification device 71 and controlled by the second processing unit 711 to transfer the comparison result to the electronic device 6. A first preferred embodiment of the method of verifying the authenticity of an item is implemented using the system 1 mentioned above and includes the steps shown in Figure 2. 10 200816059 In step 31, the first processing unit 61 of the electronic device 6 generates the request signal, and the first transmitting unit 62 controlling the electronic device 6 wirelessly transmits the request signal.
在步驟32中,根據該請求信號,該RFID標籤5產生 該可變密鑰,並基於該可變密鑰產生該第一驗證碼,且基 於該RFID標籤5的唯一識別碼和該可變密鑰產生該第二驗 證碼,且基於該第一驗證碼、該第二驗證碼和該RFID標籤 5之唯一識別碼產生該第三驗證碼,且無線傳送該第三驗證 碼。 值得注意的是,該可變密鑰在它每次被產生時都會改 變。在此實施例中,該可變密鑰是曰期和時間的函數。即 ,當該RFID標籤5在2006年5月17曰的上午12:00:30接 收到來自該電子裝置6的請求信號時,該RFID標籤5以 ”yyyymmddhhmmss”的形式產生該可變密输以得到 ”20060517120030”。該RFID標籤5以該可變密鑰之數字的 反向順序產生該第一驗證碼以得到”03002171506002”。此外 ,該RFID標籤5藉由添加該可變密鑰到該RFID標籤5的 唯一識別碼(如:123456 )之後產生該第二驗證碼以得到 ”12345620060517120030”。此外,該 RFID 標籤 5 藉由將該 RFID標籤5之唯一識別碼、該第一驗證碼和該第二驗證碼 串接在一起(string together )產生該第三驗證碼以得到 ”1234560300217150600212345620060517120030” 。 在步驟33中,該電子裝置6的第一傳收單元62接收 由該RFID標籤5傳出的第三驗證碼。 200816059 在步驟34中,該電子裝置6的第一處理單元61控制 • 該電子裝置6的第一傳收單元62,以將在步驟33中接收到 的第三驗證碼轉傳給該驗證中心7以用於驗證。 在步驟35中,該驗證中心7的第一驗證裝置71的第 一傳枚單元712接收由該電子裝置6轉傳來的第三驗證瑪 〇 在步驟36中,該第一驗證裝置71的第二處理單元7 u • 控制該第一驗證裝置71的第二傳收單元712以將在步驟35 中收到的第三驗證碼轉傳給該驗證中心7的第二驗證裝置 72 〇 值得注意的是’該第一驗證裝置71可與不同的第二驗 證裝置72 (由不同的產品製造商所管理的)一起使用。在 2情形中,該RFID標籤5的唯一識別碼應該具有一第一局 部碼—(code portion)’如:,,123,,,以識別該製造商,且具 有-第二局部碼,如:”456”,以識別該製造商的產品。 • 此外,也值得注意的是,產生有互相關連(imer-他⑷的可變密鑰、第一驗證碼、第二驗證碼、第三驗證 碼的實際演算法可根據需求而隨著不同的產品製造商改變 在步驟37中,該驗證中心7之第二驗證裝置72的 三處理單元721從步驟36中接㈣的第三驗證碼決定出 心籤5的唯-識別碼、該第—驗證碼和該第二驗證 丄且基於該腿D標籤5的唯一識別碼、該第—驗證碼和 弟—驗S爱石馬這個φ & -j. , 、兩個產生該驗證碼,並比較該驗 12 200816059 碼與該RFID標籤5的唯—識別瑪、該第—驗證碼和該第二 驗證碼這三個中剩下的那一個以驗證該物品,且控制該; 二驗證裝置72的第三傳收單元722將該比較結果轉傳给該 第一驗證裝置71。 Λ 在此實施例中,該驗證中心7之第二驗證裝置72的第 三處理單it 721基於該RFID標籤5的唯_識別碼(即: 123456”)和該第一驗證碼(即··,,〇3〇〇21715〇6〇〇2,,)產生In step 32, according to the request signal, the RFID tag 5 generates the variable key, and generates the first verification code based on the variable key, and based on the unique identification code of the RFID tag 5 and the variable density The key generates the second verification code, and generates the third verification code based on the first verification code, the second verification code, and the unique identification code of the RFID tag 5, and wirelessly transmits the third verification code. It is worth noting that the variable key changes every time it is generated. In this embodiment, the variable key is a function of time and time. That is, when the RFID tag 5 receives the request signal from the electronic device 6 at 12:00:30 am on May 17, 2006, the RFID tag 5 generates the variable transmission in the form of "yyyymmddhhmmss". Get "20060517120030". The RFID tag 5 generates the first verification code in the reverse order of the number of the variable key to obtain "03002171506002". Further, the RFID tag 5 generates the second verification code by adding the variable key to the unique identification code of the RFID tag 5 (e.g., 123456) to obtain "12345620060517120030". In addition, the RFID tag 5 generates the third verification code by string together the unique identification code of the RFID tag 5, the first verification code, and the second verification code to obtain "1234560300217150600212345620060517120030". In step 33, the first transmitting unit 62 of the electronic device 6 receives the third verification code transmitted by the RFID tag 5. 200816059 In step 34, the first processing unit 61 of the electronic device 6 controls the first transmitting unit 62 of the electronic device 6 to transfer the third verification code received in step 33 to the verification center 7 For verification purposes. In step 35, the first transmitting unit 712 of the first verification device 71 of the verification center 7 receives the third verification device transferred from the electronic device 6 in step 36, the first verification device 71 The second processing unit 7 u • controls the second transmitting unit 712 of the first verification device 71 to transfer the third verification code received in step 35 to the second verification device 72 of the verification center 7 Yes, the first verification device 71 can be used with a different second verification device 72 (managed by a different product manufacturer). In the case of 2, the unique identification code of the RFID tag 5 should have a first partial code code such as:, 123,, to identify the manufacturer, and have a second partial code, such as: "456" to identify the manufacturer's product. • In addition, it is also worth noting that the actual algorithms that generate inter-correlation (imer-he (4) variable key, first verification code, second verification code, third verification code can be different according to requirements. The product manufacturer changes in step 37, the three processing unit 721 of the second verification device 72 of the verification center 7 determines the unique identification code of the heart tag 5 from the third verification code in step (4) of step S36, the first verification And the second verification code and based on the unique identification code of the leg D tag 5, the first verification code, and the φ & -j., the two generate the verification code, and compare The test 12 200816059 code and the remaining one of the three-identification of the RFID tag 5, the first verification code and the second verification code to verify the item, and control the second verification device 72 The third transmitting unit 722 forwards the comparison result to the first verification device 71. Λ In this embodiment, the third processing unit 721 of the second verification device 72 of the verification center 7 is based on the RFID tag 5 Only the _identification code (ie: 123456") and the first verification code (ie, ·,,, 3〇〇21715〇6〇〇2 ,,) produced
該驗證碼(即:,,12345620060517120030,,)。 在步驟38中,該第一驗證裝置71的第二傳收單元 接收由該第二驗證裝置72之第三傳收單元722轉傳的比^ 結果。 叙 在步驟39中,該第一驗證裝置71的第二處理單元 控制該驗證中心7之第一驗證裝置71的第二傳收單元7工2 以轉傳該比較結果給該電子裝置6。 在步驟40中,該電子裝置6的第一傳收單元62接收 該驗證中心7之第一驗證裝置71的第二傳收單元712轉傳 的比較結果。 、 在步驟41中,該電子裝置6之第一處理單元61抑制 該電子裝置6的告知單元63以將該比較結果告知使用者 圖未示)。 圖3說明本發明驗證物品之真偽的系統丨,楚一 〜 、乐一較佳 實施例。與之前的實施例相比較,該電子裝置6 > 疋弟一處 理單元61更用於產生一詢問信號(inquiry signal)。节帝子 裝置6之第一傳收單元62更被該電子裝置6之第一處理时 13 200816059 元61控制以傳送該詢問信號。該系、统 四處理單元91和-第四傳收單元% 更㈠一具有一第 代碼產生裝置9的第四處理單元 碼產生裝置9。該 可變密鑰。該代碼產生裝置9的第四傳:詢問信號產生該 該代碼產生裝置9的第四處理單元二收車二是輕㈣ 元91控制以傳送該可變密鑰給該 7亥理早 中,兮兩不狀婆(庶,t 卞衣置6。在此貫施例 中5亥私子衣置6傳送出且被該RFm 、 ^ ^ ^ -Γ ^ ^ 不籤5接收的請求信 號包括该可變密鑰。換句話說,决 、,db六士 產生遠可變密鑰的演算法 亚非存在於該RFID標籤5中。 f9在另—實施财’該驗證中心、7更包括該代碼產生裝 置y 〇 驗證物品之真爲的方法之第二較佳實施例利用上述所 ^到之糸、统1,實現,且包含圖4所示的步驟。 在步驟51中’該電子裝置6的第—處理單元61產生 :亥峨號且控制該電子裝置6的第一傳收單元62傳送該 询問信號。 在步私52中’根據該詢問信號,該 第四處理單元91產生且傳送該可變密鑰。 上在步驟53中,該電子裝置6的第一傳收單元Μ接收 由該代碼產生裝置9傳來的可變密鑰。 在步驟54中,該電子裝置6的第一處理單元61控制 該電子裝置6的第-傳收單元62以無線傳送包括該可變密 鑰的請求信號。 在步驟55中,根據該請求信號,該RFID標籤5基於 14 200816059The verification code (ie:,,,,,,,,,,,,,,,,,,,,,,,, In step 38, the second transmitting unit of the first verification device 71 receives the result of the transfer from the third transmitting unit 722 of the second verification device 72. In step 39, the second processing unit of the first verification device 71 controls the second transmission unit 7 of the first verification device 71 of the verification center 7 to transfer the comparison result to the electronic device 6. In step 40, the first transmitting unit 62 of the electronic device 6 receives the comparison result transmitted by the second transmitting unit 712 of the first verification device 71 of the verification center 7. In step 41, the first processing unit 61 of the electronic device 6 suppresses the notification unit 63 of the electronic device 6 to inform the user of the comparison result (not shown). Fig. 3 is a view showing a preferred embodiment of the system for verifying the authenticity of an article according to the present invention. Compared with the previous embodiment, the electronic device 6 > the first processing unit 61 is further used to generate an inquiry signal. The first transmitting unit 62 of the device 6 is further controlled by the first processing of the electronic device 6 13 200816059 61 to transmit the interrogation signal. The system, the fourth processing unit 91, and the fourth transmission unit % further have a fourth processing unit code generating means 9 having a code generating means 9. The variable key. The fourth transmission of the code generating means 9: the inquiry signal is generated by the fourth processing unit 2 of the code generating means 9, and the second receiving unit is controlled by the light (four) element 91 to transmit the variable key to the 7th Haili, 兮Two not-like women (庶, t 卞 clothes set 6. In this example, the request signal received by the 5 In other words, the db, the algorithm that generates the far-variable key, is present in the RFID tag 5. The f9 is in the other implementation of the verification center, and the code includes the code generation. The second preferred embodiment of the method for verifying the authenticity of the device is implemented using the above-described system, and includes the steps shown in FIG. 4. In step 51, the electronic device 6 The processing unit 61 generates: the first transmission unit 62 that controls the electronic device 6 transmits the inquiry signal. In the step 52, the fourth processing unit 91 generates and transmits the information according to the inquiry signal. Changing the key. In step 53, the first transmitting unit of the electronic device 6 receives the code generated by the code The variable key transmitted from 9. In step 54, the first processing unit 61 of the electronic device 6 controls the first-receiving unit 62 of the electronic device 6 to wirelessly transmit a request signal including the variable key. In step 55, according to the request signal, the RFID tag 5 is based on 14 200816059
該可變密鑰I -識別碼"碼?基於該RF_ 5的唯 驗蛾:山、產生该第一驗證碼,且基於該第一 驅祖碼、该第二驗證竭和 該第:W 4 RFID標戴5的唯一識別碼產生 以-―,且無線傳送該第三驗證碼。 在/^ 56中,該電子裝置6的第一傳收單元62 # 該RFID桿鏟n、,山 得收早兀(>2接收 保戴5傳迗出的第三驗證碼。 在步驟5 7中,該雷不壯里^ 該電子… 置6的第一處理單元61控制 子衣置6的弟一僂#罝& 、 2以將在步驟56中接收到 的弟二驗證碼轉傳給該驗證中心7,以用於驗證。 :傳驟58中’該驗證中心7的第-驗證裝置71的第 一傳收早7L 712接收該電子裝置 、 丁衣直b轉傳的第三驗證碼。 在步驟59中,該第一驗證穿 口 ^ 衣置71的第二處理單元711 控制該第一驗證裝置71的第_ ^ 』乐一得收早兀712以將在步驟58 中接收到的第三驗證碼轉傳仏 矜1寻、口。亥驗證中心7的第二驗證裝 置72。 在步驟60中,該驗證中7 . ^ ^ ^ 一 时 /之弟二驗證裝置72的第 二處理單元7Π根據從該第一驗證 、 w a衣置71轉傳來的第三驗 證碼,決定該RFID標籤5的唯R丨丨馆 ^ J乍識別碼、該第一驗證碼和 ό亥第一驗證碼,且基於該禅籍 ^知戴5的唯一識別碼、該第 一驗證碼和該第二驗證碼這三個中的兩個產生該驗證碼, 並比較該驗朗與該RFID標籤5的唯—識別碼、該第一驗 d碼和该弟二驗證碼這三個中乘丨 Υ利下的那一個,以驗證該物 品,且控制該第二驗證裝置72的笛— Ζ的弟二傳收單元722以將該 比較結果轉傳給該第一驗證裝置71。 15 200816059 二傳收單元712 722轉傳的比較 在步驟61中,該第一驗證裝置71的第 接收由該第二驗證裝置72的第三傳收單元 結果° 在步驟62中,該第一驗證裝置71的第二處理單元7ιι 控制該驗證中心7之第一驗證裝置71的第二傳收單元712 以將該比較結果轉傳給該電子裝置6。 在步驟63中,該電子裝置6的第—傳收單元62接收The variable key I - identification code " code? Based on the RF_5, the unique identification code is generated, and based on the first driver code, the second verification code, and the first identification code of the W4 RFID tag 5, And transmitting the third verification code wirelessly. In /^56, the first transmission unit 62 of the electronic device 6 has the RFID bar shovel n, and the mountain receives the early verification code (>2 receives the third verification code that is transmitted by the wearer 5. In step 5 In the seventh, the lightning is not strong ^ the electronic ... the first processing unit 61 of the 6 controls the younger brother of the child clothes 6 #罝 &, 2 to transfer the second verification code received in step 56 The verification center 7 is provided for verification. In the step 58, the first transmission of the first verification device 71 of the verification center 7 receives the third verification of the electronic device and the transfer of the electronic device. In step 59, the second processing unit 711 of the first verification porting device 71 controls the first verification device 71 to receive the message 712 to be received in step 58. The third verification code is transferred to the first verification device 72 of the verification center 7. In step 60, the second processing of the verification device 72 is performed in the verification. The unit 7 determines the unique identifier of the RFID tag 5, the first verification code, and the first verification code according to the third verification code transmitted from the first verification and the device 71. a first verification code, and generating the verification code based on two of the three unique identification codes of the meditation, the first verification code, and the second verification code, and comparing the verification with the RFID The one of the three multipliers of the label 5, the first identification code, the first verification code, and the second verification code, to verify the item, and control the flute of the second verification device 72. The second transmission unit 722 transmits the comparison result to the first verification device 71. 15 200816059 The comparison of the second transmission unit 712 722 is transmitted in step 61, the first reception of the first verification device 71 is The third transmission unit result of the second verification device 72 is in step 62, the second processing unit 7 of the first verification device 71 controls the second transmission unit 712 of the first verification device 71 of the verification center 7 to The comparison result is transferred to the electronic device 6. In step 63, the first transmitting unit 62 of the electronic device 6 receives
該驗證中心7之卜驗證裝置71的第二傳收單元Μ轉傳 來的比較結果。 在步驟64中,該電子裝置6的第一處理單元61控制 該電子裝置6的告知單元63以將該比較結果告知使用者( 圖未示)。 本發明的方法及系統可用於對在網際網路上販售的商 品之真偽提供證明。在此種應用中,該電子裝置6 網際網路’且在自該驗證中心、7接收該比較結果後,可上 傳該比較結果給一線上市集(如:一拍賣網站),以致該比 較結果形成與該RFID標籤相關且透過該線上市集被一賣家 販售的該物品之-項目描述網頁的—部分。因&,存取該 項目描述網頁之有興趣的買家可被提供該物品之真偽的證 明,即買家可確信被販售的該物品是真實的。 歸納上述’本發明藉由該可變密錄在它每次被產生時 都會改變,且該驗对心7不是根據儲存在-資料庫中的 資訊來驗證該第三驗證碼,肖f知相比,能麵交易安全 ,因此硌實可以達到本發明的功致。 16 200816059 &惟以上所述者,僅為本發明之較㈣施例心, 此以此限定本發明實施之範圍,即大凡依本發(二 範圍及發明說明内容所作之申明專利 屬本發明專利涵蓋之範圍内。 飾’自仍 【圖式簡單說明】 圖 例的方塊圖 圖2是本發明驗證物品之真偽的方法之 疋本發明驗證物品之直 真偽的糸統之第〜較佳實 施 例的流程圖; 圖3是本發明驗證物品之真 例的方塊圖;及 第〜較佳實 偽的系統之第一 較佳實 施 施 圖4是本發明驗證物品之真㈣〜第二較佳實施 例的流程圖 17 200816059The second transmitting unit of the verification unit 71 of the verification center 7 transmits the comparison result transmitted. In step 64, the first processing unit 61 of the electronic device 6 controls the notification unit 63 of the electronic device 6 to inform the user of the comparison result (not shown). The method and system of the present invention can be used to provide proof of the authenticity of a merchandise that is sold on the Internet. In such an application, the electronic device 6 Internet 'and after receiving the comparison result from the verification center 7 can upload the comparison result to a first-line listing set (eg, an auction website), so that the comparison result is formed A portion of the item-item description web page of the item that is associated with the RFID tag and is sold by a seller through the line. The buyer who is interested in accessing the item description page may be provided with the authenticity of the item, ie the buyer can be sure that the item being sold is authentic. In summary, the present invention is changed by the variable cipher every time it is generated, and the check center 7 does not verify the third verification code based on the information stored in the database. Compared with the fact that the face transaction is safe, it can achieve the merits of the present invention. 16 200816059 & However, the above is only the embodiment of the present invention, which is to limit the scope of the practice of the present invention, that is, the patent claimed in the present invention The scope of the patent is covered. Fig. 2 is a block diagram of the legend. FIG. 2 is a method for verifying the authenticity of an article according to the present invention. 3 is a block diagram of a true example of the verification article of the present invention; and a first preferred embodiment of the first preferred embodiment of the present invention is a true (four) to a second comparison of the verification article of the present invention. Flow chart of a preferred embodiment 17 200816059
【主要元件符號說明】 1 系統 71 * · · 第一驗證裝置 1’ *… 系統 711 * * 第二處理單元 31〜41* 步驟 712 · · 第二傳收單元 51〜64, 步驟 72·… 第二驗證裝置 5…, RFID標藏 721 · * 第三處理單元 6 * * * 電子裝置 .111、· 第三傳收單元 61··· 第一處理單元 8 連結 62,… 第一傳收單元 9 * .- 代碼產生裝置 63 * · · 告知單元 91 · · · 第四處理單元 7· 驗證中心 92· · · 第四傳收單元[Description of main component symbols] 1 System 71 * · · First verification device 1' *... System 711 * * Second processing unit 31 to 41* Step 712 · · Second transmission unit 51 to 64, Step 72·... Second verification device 5..., RFID tag 721 · * Third processing unit 6 * * * Electronic device .111, · Third transmission unit 61 ··· First processing unit 8 connection 62,... First transmission unit 9 * .- Code generation device 63 * · · Notification unit 91 · · · Fourth processing unit 7 · Authentication center 92 · · · Fourth transmission unit
1818