CN102201100A - Object anti-counterfeiting method and system - Google Patents

Object anti-counterfeiting method and system Download PDF

Info

Publication number
CN102201100A
CN102201100A CN2011101197102A CN201110119710A CN102201100A CN 102201100 A CN102201100 A CN 102201100A CN 2011101197102 A CN2011101197102 A CN 2011101197102A CN 201110119710 A CN201110119710 A CN 201110119710A CN 102201100 A CN102201100 A CN 102201100A
Authority
CN
China
Prior art keywords
false proof
label
article
file
uniqueness
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011101197102A
Other languages
Chinese (zh)
Other versions
CN102201100B (en
Inventor
朱清明
冯濒啸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 201110119710 priority Critical patent/CN102201100B/en
Publication of CN102201100A publication Critical patent/CN102201100A/en
Application granted granted Critical
Publication of CN102201100B publication Critical patent/CN102201100B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Abstract

The invention discloses an object anti-counterfeiting method and system. The method comprises the following steps of: firstly, setting a label on an object to be anti-counterfeited, wherein the label is provided with uniqueness; reading image information displayed by the uniqueness label when anti-counterfeiting verification is carried out, and encrypting the label by utilizing a private key to generate a signature file; encoding the signature file to generate an anti-counterfeiting code so as to set the anti-counterfeiting code on the object to be anti-counterfeited; obtaining anti-counterfeiting information on the object to be anti-counterfeited through an image capturing device on a user terminal device when the truth and false of the object to be anti-counterfeited need to be verified; decoding the anti-counterfeiting code to obtain the signature file; and decrypting the signature file according to public key information corresponding to the private key to obtain and display the image information of the uniqueness label. By adopting the object anti-counterfeiting method and system, the anti-counterfeiting effect can be improved.

Description

A kind of article anti-counterfeit method and system
Technical field
The present invention relates to field of anti-counterfeit technology, relate to a kind of article anti-counterfeit method and system in particular.
Background technology
Along with the continuous fierceness of social competition, the behavior of various false makings, fraud is increasing.As, forged certificates such as various Fake Diplomas, spurious certificate constantly occur, and various counterfeit goods are of common occurrence especially.In order to identify forged certificate, counterfeit and shoddy goods, hit the behavior that false making is faked, various anti-fake certificate technology are arisen at the historic moment.
For example, for commodity counterfeit prevention, traditional method for anti-counterfeit is to stamp label for commodity, but, the label of any record merchandise news all needs to carry out authenticity examination for any the 3rd people, check whether commodity are true, generally include three partial contents: the authenticity of commodity main body, the authenticity of label substance and label publisher information, have only the label publisher that Qualification Approval is completely arranged or deny the authenticity of commodity.If the authenticity of check commodity need suppose that the proofer possesses certain knowledge, but the people of check commodity is label publisher third parties in addition usually, and as common consumer or the like, this class crowd but often lacks this knowledge.In addition, the result of this knowledge check has some shortcomings usually: at first, be lower than licensor's authority; Can't ruling produce contradiction when secondly, assay is not by approval.
Therefore, check commodity authority's method has only the publisher of commodity to get involved finally solution commodity authenticity identification problem.But after the commodity issue, when needing to check authenticity whenever and wherever possible, the commodity publisher can't show the on-the-spot authenticity of in time declaring commodity usually, and this just gives the commodity of forging, the label of counterfeiting merchandise, and the abuse Commercial goods labels provides chance.
Thus, a kind of improved method for anti-counterfeit is exactly to increase the label that is difficult to duplicate on commodity, leans on the authenticity of label to guarantee the authenticity of commodity, is equivalent to duplicate commodity if duplicate label.But the manufacture difficulty of label and the authenticity of label are judged needs still to differentiate that the people has specific knowledge, the contrast otherwise the authenticity of label is had no way of.
False proof another kind of method to commodity is provided with the information of goods information data storehouse exactly, preserves the merchandise news that the commodity publisher issued, and need compare by the merchandise news that means of communication obtains merchandise news and collection in worksite from database during check.This method have following shortcoming at least: the first, need possess the particular communication condition; 2, the identifier has the ability of using means of communication; 3, communications cost takes place; 4, need the permanent failure-free operation that keeps merchandising database; 5, need keep corresponding merchandising database for different commodity publishers.But a lot of commodity publishers do not possess technology and the economic capability of keeping database, and the data center of third party's foundation, can increase false proof cost.
Summary of the invention
The invention provides a kind of article anti-counterfeit method and system, can improve antifalse effect.
The invention provides following technical scheme:
A kind of article anti-counterfeit method treats that false proof article are provided with the uniqueness label, and described uniqueness label comprises master pattern and cover thin slice two parts on the master pattern that described thin slice is made by the transparent material of randomly changing printing opacity and reflective characteristic; Described method comprises:
Read the image information that described uniqueness label demonstrates, and the image information that is read is preserved into e-file;
Utilize private key that described e-file is encrypted the generation signature file;
To the described signature file generation security code of encoding, so that described security code is arranged on described treating on the false proof article;
When needs checkings is described when treating the true and false of false proof article, finish following operation by yard device of testing that is installed in advance on the subscriber terminal equipment:
Obtain the described security code information on the false proof article for the treatment of by the image-pickup device on the described subscriber terminal equipment;
Described security code is decoded, obtain described signature file;
PKI according to described private key correspondence is decrypted described signature file, obtains the image information of described uniqueness label;
On described terminal device, demonstrate the image of described uniqueness label, so that the user determines the described true and false for the treatment of false proof article by comparing the described image that demonstrates on uniqueness label on the false proof article and the terminal device treated.
Preferably, the descriptor and the commodity distributor information that also comprise commodity in the described e-file.
Preferably, describedly utilize private key that described e-file is encrypted to generate signature file and comprise:
Utilization is encrypted the generation signature file through the private key of the false proof central authority of third party to described e-file.
Preferably, described uniqueness label is provided with otch, and, described uniqueness label treats that described position on the false proof article can treat that false proof article are used or pack the position that needs are opened when being opened and determine according to described, attempted to take off or describedly treated that false proof article are used or pack when being opened, the destroy integrity of described uniqueness label with the described uniqueness label of box lunch.
Preferably, described security code comprises two-dimension code.
A kind of article anti-counterfeit system treats that false proof article are provided with the uniqueness label, and described uniqueness label comprises master pattern and cover thin slice two parts on the master pattern that described thin slice is made by the transparent material of randomly changing printing opacity and reflective characteristic; Described system comprises:
First reading unit is used to read the image information that described uniqueness label demonstrates, and the image information that is read is preserved into e-file;
Ciphering unit is used to utilize private key that described e-file is encrypted the generation signature file;
Coding unit is used for to the described signature file generation security code of encoding, so that described security code is arranged on described treating on the false proof article;
Second reading unit is used for obtaining the described security code information on the false proof article for the treatment of by the image-pickup device on the subscriber terminal equipment;
Decoding unit is used for described security code is decoded, and obtains described signature file;
Decryption unit is used for according to the PKI of described private key correspondence described signature file being decrypted, and obtains the image information of described uniqueness label;
Display unit is used for demonstrating the image of described uniqueness label on described terminal device, so that the user determines the described true and false for the treatment of false proof article by comparing the described image that demonstrates on uniqueness label on the false proof article and the terminal device treated.
Preferably, the descriptor and the commodity distributor information that also comprise commodity in the described e-file.
Preferably, described ciphering unit specifically is used for:
Utilization is encrypted the generation signature file through the private key of the false proof central authority of third party to described e-file.
Preferably, described uniqueness label is provided with otch, and, described uniqueness label treats that described position on the false proof article can treat that false proof article are used or pack the position that needs are opened when being opened and determine according to described, attempted to take off or describedly treated that false proof article are used or pack when being opened, the destroy integrity of described uniqueness label with the described uniqueness label of box lunch.
Preferably, the transparent material that is used to make described thin slice comprises glass, perhaps, and organic transparent material, perhaps, the potpourri of glass and organic transparent material; Make described transparent material have randomly changing printing opacity and reflective characteristic by the mode of knocking, corroding or mixing impurity.
Via above-mentioned technical scheme as can be known, compared with prior art, the article anti-counterfeit method of the embodiment of the invention is at first to treat that the uniqueness label is set on the false proof article, this uniqueness label has following characteristic: because the image of uniqueness label is observed through thin slice, therefore make it have the feature of 3-D view, for common two dimensional image, have non-reproduction or very high difficulty of reproduction, also be uniqueness.
On treating false proof article, be provided with after the uniqueness label with above-mentioned feature, just can be convenient to the true and false that the user treats false proof article in the following manner verifies: at first, by treating that false proof article publisher carries out following operation: read the uniqueness label from treating false proof article, and the image information that is read preserved into e-file, utilize private key that described e-file is encrypted the generation signature file then, to the described signature file generation security code of encoding, so just can be with security code by printing or mode such as stickup be arranged on and treats on the false proof article.Then, when the user need verify, just can finish following operation: obtain the described security code information on the false proof article for the treatment of by the image-pickup device on the described subscriber terminal equipment by yard device of testing that is installed in advance on the subscriber terminal equipment; Described security code is decoded, obtain described signature file; The PKI corresponding according to the private key when encrypting is decrypted described signature file, obtains the image information of described uniqueness label; Demonstrate the image of described uniqueness label on described terminal device, like this, the user just can determine the described true and false for the treatment of false proof article by comparing the described image that demonstrates on uniqueness label on the false proof article and the terminal device treated.
As seen, the method for the embodiment of the invention need not the verifier have special knowledge when carrying out authenticity verification, can realize article anti-counterfeit effectively.Though need use terminal devices such as mobile phone, but only need this terminal device to have the image capture function, and on this terminal device, install and test a yard device, the process of checking is finished in terminal device this locality, need not by utilizing communication function inquiry item information data storehouse just can distinguish article genuine-fake, the therefore consumption that can not produce the communication resource.The method of the embodiment of the invention need not to set up and safeguard the item information data storehouse simultaneously, has reduced the cost of inquiry article genuine-fake.And this testing in the terminal device that yard software is installed in users has been equivalent to adopt the PKI diffusion technique of a large amount of public publications, and this can prevent to test the collusion attack in yard process, can prevent that also whole anti-counterfeiting technology from testing the Single Point of Faliure of yard process.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is embodiments of the invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to the accompanying drawing that provides.
Fig. 1 is the process flow diagram of the method for the embodiment of the invention;
Fig. 2 is the synoptic diagram of the system of the embodiment of the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
Need to prove that at first about the method for anti-counterfeit of article such as certificate, the applicant applies for separately as another part patent.Its main thought is, because article such as certificate have following characteristics: have photo on the certificate usually, everyone photo all is different, has uniqueness; And certificate is only held by certificate and is used, that is to say that the photo on the holder of certificate and user and the certificate has correspondence one by one, if the adulterator is intended for someone forged certificate, then need to use this people's photo, the photo that uses others is invalid.
Have These characteristics just because of article such as certificates, make that photo can be as a kind of uniqueness label of certificate, and then just can utilize this uniqueness label to carry out the false proof of certificate.Its specific practice is: at credential issuance mechanism one end, can be verified the identity of issuer by third party's false-proof mechanism, and provide a private key that is specific to this issuer by this third party's false-proof mechanism for this issuer.Issuer can come out certificate making after getting access to this private key at first in a conventional manner, has the photo of holder and Notified Body's information or the like on the certificate; Then, just can carry out following operation: by taking pictures or mode such as scanning, read the image information in the photo on the certificate, the private key that gets access to from third party issuer before utilizing is encrypted the image information that reads, and generates a signature file; Then, with this signature file security codes such as generating two-dimension code of encoding, after generating security code, can directly security code be printed on the certificate, perhaps security code is printed on the adhesive tape, again adhesive tape is sticked on the certificate, in a word, can make certificate beyond the demonstration original information, also show a security code.Then, credential issuance mechanism just can issue and have the certificate of security code.
Accordingly, third party's false-proof mechanism can also be tested a yard software to users' public publication, this tests the function that has the decoding security code in yard software, and wherein be provided with the PKI corresponding with the private key that offers each licence issuing authority, can the signature file that decoding obtains be decrypted, obtain image information, and be presented in the terminal device.Like this, the user just can by comparison on the certificate photo and the screen of terminal device on the image that demonstrates, judge the true and false of certificate: if both unanimities, then certificate is genuine, otherwise, if both are inconsistent, perhaps can't correctly demonstrate image in the terminal device at all, then certificate is false.In a word, credential issuance mechanism provided security code according to aforementioned manner on certificate after, users only needed that this is tested mobile phone that yard software is installed in oneself etc. and have in the terminal device of image capture function, just can verify the true and false of certificate.
The checking result of said process why reliably be because:
First, the private key that is used to encrypt is to be after the identity of credential issuance mechanism is verified by third party's false-proof mechanism, licenses to credential issuance mechanism, and the adulterator is because can't be by the authentication of third party's false-proof mechanism, therefore, also just can't obtain the mandate at the false proof center of third party.
Second, the private key that is used to encrypt is all provided by the false proof center of third party with the PKI that is used to decipher, if the adulterator uses the private key of the false proof central authority of non-third party to encrypt, and finally obtain security code, then when checking, can't correctly be decrypted, also just can't demonstrate the image before encrypting.Can prove the authenticity of credential issuance mechanism thus.
The 3rd, if the adulterator wants to make forged certificate to pass through checking, then unique approach is that additional clause photo and security code are duplicated together, makes another certificate.But by preamble to the description of the characteristics of certificate as can be known, the adulterator can not do like this, this be because, forge a certificate if the adulterator is intended for user A, but the photo on the pseudo-certificate of producing but is user B, obviously, this certificate has lost its meaning.
As seen, by the way, can prevent from very effectively certificate is faked.
But, in actual applications, except certificate, also have other article may have the risk of being palmed off.For example, some commodity or the like.The difference of these article and certificate is, do not need to have labels such as holder's photo on these article, and the same a commodity of same manufacturers produce have reproducibility between different individualities, in addition, in some cases, also there is the difference between commodity itself and the commodity external packing, Commercial goods labels can only be beaten in external packing, and can't directly beat on commodity (for example mineral water, label can't directly be beaten on mineral water, and can only beat in external packing).At this moment, if still carry out false proofly, then can reduce its reliability greatly according to aforementioned manner.
For example, certain brand mineral water of equal specification is from external packing, may there be evident difference between each bottle, as long as the adulterator forges out external packing, therefore can't distinguish the true and false of external packing by preceding method, just can't distinguish more about the true and false of commodity itself.Promptly allow to allow the manufacturer of external packing stamp different patterns on the label of each mineral water bottle, and with this pattern as aforementioned uniqueness label, use preceding method to generate security code, also still can stay opportunity to the adulterator.This all is to be replicated because of pattern and security code, the verifier has no way of learning the true and false of this pattern and security code itself, the adulterator can be directly duplicates the security code of this pattern and generation get off together, prints in the external packing of forging, and package interior is put the commodity of personation outside then.Like this, the verifier time can find that in checking the image that shows on the mobile phone is consistent with pattern in the commodity packaging, and finds that unlikely in fact this pattern occurred in other one or more commodity packagings.In addition, the adulterator also may reclaim used commodity external packing, directly loads onto and counterfeits merchandise in packing then, at this moment, just can directly utilize the pattern that has in the former commodity packaging and security code.Obviously, be genuine if believe packing or commodity itself at this point, then be not right.
In a word, treat that for what commodity etc. had an external packing for the false proof article, even use the aforementioned method that is used for certificate false proof, then the adulterator still can fake by following dual mode: a kind of is pattern and the corresponding security code that duplicates in the commodity external packing; Second kind is to reclaim used commodity external packing, the commodity of the personation of packing into therein then.
The embodiment of the invention just is based on above-mentioned consideration, for commodity are waited for a kind of method for anti-counterfeit that false proof article provide.During specific implementation, at first need treat to provide the uniqueness label on the false proof article, in embodiments of the present invention, the uniqueness label has following characteristics: the uniqueness label comprises master pattern and covers thin slice two parts on the master pattern, wherein, this thin slice is made by the transparent material of randomly changing printing opacity and reflective characteristic; Wherein, in order to prevent that the adulterator from using the aforementioned second way to fake, can also on this uniqueness label, otch be set, and, this uniqueness label position on treating false proof article can be according to treating that false proof article are used or pack the position that needs are opened when being opened and determine, for example, for mineral water etc., this uniqueness label can stick on the junction of bottle cap and body, like this, attempt to take off the uniqueness label as the people, treat that perhaps false proof article are used or pack when being opened, the integrality of this uniqueness label all can be destroyed.Need to prove, for some situations that can label at commodity itself, then can only consider aforementioned first kind of fraud mode (only needing promptly to prevent that pattern and corresponding security code that the adulterator duplicates in the commodity external packing from getting final product), therefore, at this situation, the uniqueness label only need satisfy aforementioned uniqueness and get final product.
Wherein, about aforementioned thin slice, so long as getting final product of making of the transparent material of randomly changing printing opacity and reflective characteristic, during specific implementation, this material can be glass or organic transparent material, perhaps also can be both potpourris.In order to make this transparent material have randomly changing printing opacity and reflective characteristic, can be accomplished in several ways, can be that the various starting material that can make produce the various physics or the chemical method of texture.Concrete, can comprise and knock, corrode or mix impurity etc.Its principle is that aforesaid operations all has non-reproduction.For example, for the mode of mixing impurity, just be the equal of in starting material, to mix the material different with starting material, can be the lines of bubble, drop, solid particle, solid fragment or the arbitrary shape of transparent or opaque arbitrary shape or color, perhaps their combination, or the like.In a word, by the thin slice that above-mentioned variety of way intervention produces, all be different between per two.With such sheet covers on master pattern the time, even master pattern is identical, in the covering after the different thin slice, actual observation to image also have nothing in common with each other.
For master pattern, difference treats that between the false proof article individuality, original image can be identical, for example, and can be with trade mark of product etc. as master pattern.Certainly, original image also can be different.During specific implementation, can at first master pattern be printed on the adhesive tape, covering thin slice on this adhesive tape, stick on the ad-hoc location for the treatment of false proof article more together then; Perhaps, also can directly print patterns such as ATTACH LABEL, and then on this pattern, stick thin slice at the ad-hoc location for the treatment of false proof article.Aforementioned ad-hoc location just is meant previously describedly treats that false proof article are used or pack the position that need open when being opened, for example aforementioned bottle cap and body junction, or the like.
Thus, make the uniqueness label have following characteristic: at first, because the image of uniqueness label is observed through thin slice, even and if thin slice is thin again, also is by certain thickness, therefore make observed image have the feature of 3-D view, and this 3-D view is for common two dimensional image, having non-reproduction or very high difficulty of reproduction, also is uniqueness, and this forges by the mode of duplicating this label with regard to having been avoided the adulterator; Secondly, owing on the uniqueness label otch can be set, and can be provided with the position at uniqueness label place, therefore according to the open site, make the uniqueness label by being attempted to take off, treat that perhaps false proof article are used or pack and all have destructibility when being opened; Moreover, because the uniqueness label is dimerous by original image and thin slice, and thin slice is to be made by the transparent material of randomly changing printing opacity and reflective characteristic, can't produce living thin slice, therefore, making again that the uniqueness label is in a single day destroyed just has an irreducibility.By above-mentioned destructibility and irreducibility, fake by the mode that reclaims used product external packaging with regard to having avoided the adulterator.
After having had the uniqueness label of above-mentioned characteristic, treat that the false proof article producer just can carry out following processing, so that carry out fake certification.Referring to Fig. 1, the article anti-counterfeit method that the embodiment of the invention provides may further comprise the steps:
S101: read the image information that described uniqueness label demonstrates, and the image information that is read is preserved into e-file;
During specific implementation, can be by taking pictures or mode such as scanning reads the image information that the uniqueness label demonstrates.Because uniqueness information is by master pattern and covers laminar on the original image, therefore, the image that reads is through thin slice refraction and/or the image that reflected, is equivalent to also comprise in the image that reads the characteristic of thin slice.Because thin slice is to be made by the material of randomly changing printing opacity and reflective characteristic, has randomness, therefore, the image that reads has also had randomicity characteristics.
In actual applications, except the image information of this uniqueness label, the descriptor and the commodity distributor information of commodity can also be kept in the e-file together, so that the true and false of more effective checking article.
S102: utilize private key that described e-file is encrypted the generation signature file;
Wherein, the private key that is used to encrypt can commodity producers or publisher or the like determine voluntarily, also be that each producer or commodity publisher can use private key separately that the false proof article for the treatment of of oneself are encrypted.Accordingly, when verifying, then needing to use separately, the PKI of private key correspondence is decrypted.That is to say that each treats that the false proof article producer can have separately independently Antiforge system.
In order further to guarantee false proof validity, this private key that is used to encrypt also can be through the false proof central authority of third party, at this moment, treat that the false proof article producer needs to obtain the private key of mandate from the false proof center of third party in advance, have only the producer by the checking of the false proof center of third party can get access to the private key that is used to encrypt, the identity that is equivalent to be treated by the false proof center of third party the false proof article producer is like this verified.And the private key of user encryption and the PKI that is used to decipher can be by third party's false proof center unified management and distribution.
S103: to the described signature file generation security code of encoding, so that described security code is arranged on described treating on the false proof article;
The signature file that encryption obtains is encoded, can obtain security code.During specific implementation, this security code can be a two-dimension code.Concrete coding method does not belong to emphasis of the present invention, therefore repeats no more here.
After generating security code, just security code can be printed or sticked on and treat on the false proof article.Thereby make and treat not only have the uniqueness label on the false proof article, also have the security code that generates according to the uniqueness label.
So far, treat that the false proof article producer just can will treat that false proof article offer users and used.When the user uses in the process of article, the true and false of checking article just can be installed on terminal device and be tested a yard device if desired.If when generating security code, use be that each treats the private key that the false proof article producer is provided with voluntarily, then this is tested yard device and can treat false proof article producer public publication, wherein presets with this and treats the corresponding PKI of private key that the false proof article producer uses; Perhaps, if when generating security code, use be the private key of the false proof central authority of third party, then this demo plant can wherein preset the PKI that is used to decipher by third party's false proof center public publication.Test a yard device by this and finish following operation:
S104: obtain the described security code information on the false proof article for the treatment of by the image-pickup device on the described subscriber terminal equipment;
For example, usually all be equipped with camera on the terminal device, the camera function of the equipment that can open a terminal allows camera aim at security code on the article to be verified, make security code on the article be converted to the e-file in the terminal device, preserved security code information in this document.
S105: described security code is decoded, obtain described signature file;
Decoding is the inverse process of aforementioned coding.
S106: the PKI according to described private key correspondence is decrypted described signature file, obtains the image information of described uniqueness label;
As mentioned before, the PKI that is used for deciphering is preset at decoding device.
Need to prove, if each treats that the false proof article producer uses the private key of deciding in its sole discretion to encrypt, then each treats that the false proof article producer may need independent distribution decoding software separately, that is to say, if the user need carry out fake certification to multiple article, the decoding software of each article correspondence can be installed then.
And if, a decoding software of finding at the false proof center of third party then only is installed on the subscriber terminal equipment is got final product by the unified distribution in the false proof center of third party decoding device.This is because the false proof center of third party can generate different private keys for the different producers, but these private keys can corresponding same PKI.That is to say that PKI can corresponding a plurality of private keys, though each producer uses different separately private keys to encrypt, in decoding software, can adopt identical PKI to be decrypted.Particularly, how to realize the corresponding a plurality of private keys of PKI, and how to improve cryptographic algorithm crack difficulty or the like, can know according to cryptographic knowledge owing to do not relate to emphasis of the present invention, therefore repeat no more here.
S107: on described terminal device, demonstrate the image of described uniqueness label, so that the user determines the described true and false for the treatment of false proof article by comparing the described image that demonstrates on uniqueness label on the false proof article and the terminal device treated.
On the display screen of terminal device, demonstrate and decipher after the image that obtains, the user just can be by comparing the described image that demonstrates on uniqueness label on the false proof article and the terminal device treated, determine the described true and false for the treatment of false proof article, for example, if both unanimities, can prove that then article are genuine, otherwise these article may be forged.
In a word, in embodiments of the present invention, when checking article genuine-fake, though need use terminal devices such as mobile phone, but only need this terminal device to have the image capture function, and install on this terminal device and test a yard device, the process of checking is finished in terminal device this locality, need not by utilizing communication function inquiry item information data storehouse just can distinguish article genuine-fake, the therefore consumption that can not produce the communication resource.The method of the embodiment of the invention need not to set up and safeguard the item information data storehouse simultaneously, has reduced the cost of inquiry article genuine-fake.And, this testing in the terminal device that yard software is installed in users, be equivalent to adopt extensive STOCHASTIC DIFFUSION technology in distribution during PKI, this can prevent to test the collusion attack in yard process, can prevent that also whole anti-counterfeiting technology from testing the Single Point of Faliure of yard process.
Corresponding with the article anti-counterfeit method that the embodiment of the invention provides, the embodiment of the invention also provides a kind of article anti-counterfeit system, wherein, treat that false proof article are provided with the uniqueness label, described uniqueness label comprises master pattern and covers thin slice two parts on the master pattern that described thin slice is made by the transparent material of randomly changing printing opacity and reflective characteristic; Referring to Fig. 2, described system comprises:
First reading unit 201 is used to read the image information that described uniqueness label demonstrates, and the image information that is read is preserved into e-file;
Ciphering unit 202 is used to utilize private key that described e-file is encrypted the generation signature file;
Coding unit 203 is used for to the described signature file generation security code of encoding, so that described security code is arranged on described treating on the false proof article;
Second reading unit 204 is used for obtaining the described security code information on the false proof article for the treatment of by the image-pickup device on the subscriber terminal equipment;
Decoding unit 205 is used for described security code is decoded, and obtains described signature file;
Decryption unit 206 is used for according to the PKI of described private key correspondence described signature file being decrypted, and obtains the image information of described uniqueness label;
Display unit 207 is used for demonstrating the image of described uniqueness label on described terminal device, so that the user determines the described true and false for the treatment of false proof article by comparing the described image that demonstrates on uniqueness label on the false proof article and the terminal device treated.
Wherein, in order further to improve verification the verifying results, can also comprise the descriptor and the commodity distributor information of commodity in the e-file.Accordingly,, be presented at image in the terminal device except the uniqueness label image, can also comprise the descriptor and the commodity distributor information of commodity in when checking.
Wherein, ciphering unit 202 specifically can use through the private key of the false proof central authority of third party e-file to be encrypted and obtain signature file.
In order to prevent that the adulterator from using the used packing of product to fake, can also on the uniqueness label, otch be set, and, described uniqueness label treats that described position on the false proof article can treat that false proof article are used or pack the position that needs are opened when being opened and determine according to described, attempted to take off or describedly treated that false proof article are used or pack when being opened, the destroy integrity of described uniqueness label with the described uniqueness label of box lunch.
During specific implementation, the transparent material that is used to make described thin slice can be a glass, perhaps, and organic transparent material, perhaps, the potpourri of glass and organic transparent material.Can make described transparent material have randomly changing printing opacity and reflective characteristic by the mode of knocking, corroding or mixing impurity.
The concrete form of security code can have multiple, and a kind of preferred mode is a two-dimension code.
The uniqueness label that provides by the embodiment of the invention combines with the items Antiforge system, can realize effective antifalse effect.When checking article genuine-fake, though need use terminal devices such as mobile phone, but only need this terminal device to have the image capture function, and on this terminal device, install and test a yard device, the process of checking is finished in terminal device this locality, need not by utilizing communication function inquiry item information data storehouse just can distinguish article genuine-fake, the therefore consumption that can not produce the communication resource.The method of the embodiment of the invention need not to set up and safeguard the item information data storehouse simultaneously, has reduced the cost of inquiry article genuine-fake.And this testing in the terminal device that yard software is installed in users has been equivalent to adopt the PKI diffusion technique of a large amount of public publications, and this can prevent to test the collusion attack in yard process, can prevent that also whole anti-counterfeiting technology from testing the Single Point of Faliure of yard process.
Each embodiment adopts the mode of going forward one by one to describe in this instructions, and what each embodiment stressed all is and the difference of other embodiment that identical similar part is mutually referring to getting final product between each embodiment.For the disclosed device of embodiment, because it is corresponding with the embodiment disclosed method, so description is fairly simple, relevant part partly illustrates referring to method and gets final product.
To the above-mentioned explanation of the disclosed embodiments, make this area professional and technical personnel can realize or use the present invention.Multiple modification to these embodiment will be conspicuous concerning those skilled in the art, and defined herein General Principle can realize under the situation that does not break away from the spirit or scope of the present invention in other embodiments.Therefore, the present invention will can not be restricted to these embodiment shown in this article, but will meet and principle disclosed herein and features of novelty the wideest corresponding to scope.

Claims (10)

1. article anti-counterfeit method, it is characterized in that, treat that false proof article are provided with the uniqueness label, described uniqueness label comprises master pattern and covers thin slice two parts on the master pattern that described thin slice is made by the transparent material of randomly changing printing opacity and reflective characteristic; Described method comprises:
Read the image information that described uniqueness label demonstrates, and the image information that is read is preserved into e-file;
Utilize private key that described e-file is encrypted the generation signature file;
To the described signature file generation security code of encoding, so that described security code is arranged on described treating on the false proof article;
When needs checkings is described when treating the true and false of false proof article, finish following operation by yard device of testing that is installed in advance on the subscriber terminal equipment:
Obtain the described security code information on the false proof article for the treatment of by the image-pickup device on the described subscriber terminal equipment;
Described security code is decoded, obtain described signature file;
PKI according to described private key correspondence is decrypted described signature file, obtains the image information of described uniqueness label;
On described terminal device, demonstrate the image of described uniqueness label, so that the user determines the described true and false for the treatment of false proof article by comparing the described image that demonstrates on uniqueness label on the false proof article and the terminal device treated.
2. method according to claim 1 is characterized in that, also comprises the descriptor and the commodity distributor information of commodity in the described e-file.
3. method according to claim 1 is characterized in that, describedly utilizes private key that described e-file is encrypted to generate signature file and comprise:
Utilization is encrypted the generation signature file through the private key of the false proof central authority of third party to described e-file.
4. method according to claim 1, it is characterized in that, described uniqueness label is provided with otch, and, described uniqueness label treats that described position on the false proof article can treat that false proof article are used or pack the position that needs are opened when being opened and determine according to described, attempted to take off or describedly treated that false proof article are used or pack when being opened, the destroy integrity of described uniqueness label with the described uniqueness label of box lunch.
5. according to each described method of claim 1 to 4, it is characterized in that described security code comprises two-dimension code.
6. article anti-counterfeit system, it is characterized in that, treat that false proof article are provided with the uniqueness label, described uniqueness label comprises master pattern and covers thin slice two parts on the master pattern that described thin slice is made by the transparent material of randomly changing printing opacity and reflective characteristic; Described system comprises:
First reading unit is used to read the image information that described uniqueness label demonstrates, and the image information that is read is preserved into e-file;
Ciphering unit is used to utilize private key that described e-file is encrypted the generation signature file;
Coding unit is used for to the described signature file generation security code of encoding, so that described security code is arranged on described treating on the false proof article;
Second reading unit is used for obtaining the described security code information on the false proof article for the treatment of by the image-pickup device on the subscriber terminal equipment;
Decoding unit is used for described security code is decoded, and obtains described signature file;
Decryption unit is used for according to the PKI of described private key correspondence described signature file being decrypted, and obtains the image information of described uniqueness label;
Display unit is used for demonstrating the image of described uniqueness label on described terminal device, so that the user determines the described true and false for the treatment of false proof article by comparing the described image that demonstrates on uniqueness label on the false proof article and the terminal device treated.
7. system according to claim 6 is characterized in that, also comprises the descriptor and the commodity distributor information of commodity in the described e-file.
8. system according to claim 6 is characterized in that, described ciphering unit specifically is used for:
Utilization is encrypted the generation signature file through the private key of the false proof central authority of third party to described e-file.
9. system according to claim 6, it is characterized in that, described uniqueness label is provided with otch, and, described uniqueness label treats that described position on the false proof article can treat that false proof article are used or pack the position that needs are opened when being opened and determine according to described, attempted to take off or describedly treated that false proof article are used or pack when being opened, the destroy integrity of described uniqueness label with the described uniqueness label of box lunch.
10. system according to claim 6 is characterized in that, the transparent material that is used to make described thin slice comprises glass, perhaps, and organic transparent material, perhaps, the potpourri of glass and organic transparent material; Make described transparent material have randomly changing printing opacity and reflective characteristic by the mode of knocking, corroding or mixing impurity.
CN 201110119710 2011-05-10 2011-05-10 Object anti-counterfeiting method and system Expired - Fee Related CN102201100B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110119710 CN102201100B (en) 2011-05-10 2011-05-10 Object anti-counterfeiting method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110119710 CN102201100B (en) 2011-05-10 2011-05-10 Object anti-counterfeiting method and system

Publications (2)

Publication Number Publication Date
CN102201100A true CN102201100A (en) 2011-09-28
CN102201100B CN102201100B (en) 2013-04-24

Family

ID=44661754

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110119710 Expired - Fee Related CN102201100B (en) 2011-05-10 2011-05-10 Object anti-counterfeiting method and system

Country Status (1)

Country Link
CN (1) CN102201100B (en)

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102509066A (en) * 2011-11-18 2012-06-20 祝启忠 Two-dimensional code anti-counterfeiting method and identification device both based on goods feature information
CN102945471A (en) * 2012-10-22 2013-02-27 北京印刷学院 Binary anti-fake print method encrypting in opposite synchronous increasing way
CN102945392A (en) * 2012-10-22 2013-02-27 北京印刷学院 Single-parameter, gradient, opposite, synchronous and progressive encryption type binary anti-counterfeit printing method
CN102945422A (en) * 2012-10-22 2013-02-27 北京印刷学院 Shift left displacement stepping increasing encryption binary anti-counterfeit printing method
CN102945390A (en) * 2012-10-22 2013-02-27 北京印刷学院 Double-variant third-order encryption binary anti-counterfeiting printing method
CN102945406A (en) * 2012-10-22 2013-02-27 北京印刷学院 Multi-parameter transposition variable-sequence encrypted binary anti-counterfeiting printing method
CN102945398A (en) * 2012-10-22 2013-02-27 北京印刷学院 Double-variant third-order progressive encryption binary anti-counterfeiting printing method
CN102945397A (en) * 2012-10-22 2013-02-27 北京印刷学院 Variable-sequence, right-shifting, stepping and increasing encryption type binary anti-counterfeit printing method
CN102945404A (en) * 2012-10-22 2013-02-27 北京印刷学院 Multi-parameter reverse synchronous incremental encrypted binary anti-counterfeiting printing method
CN102945389A (en) * 2012-10-22 2013-02-27 北京印刷学院 Double-variant two-dimensional gradually-increased encryption binary anti-counterfeiting printing method
CN102945432A (en) * 2012-10-22 2013-02-27 北京印刷学院 Single-variable and progressive encryption type binary anti-counterfeit printing method
CN102945417A (en) * 2012-10-22 2013-02-27 北京印刷学院 Multi-parameter bivariate opposite synchronous progressive encrypted binary anti-counterfeiting printing method
CN103489106A (en) * 2012-06-11 2014-01-01 陈昶任 Chip label anti-counterfeiting method and system matched with positioning
CN103793830A (en) * 2014-02-24 2014-05-14 朱清明 Goods identifying and authenticating method and corresponding device thereof
CN103824198A (en) * 2014-03-10 2014-05-28 上海理工大学 Anti-counterfeiting code generation and verification system
CN104616313A (en) * 2015-02-16 2015-05-13 可信视科技(深圳)有限公司 Handheld device image shooting and verification method based on cloud service
CN104680226A (en) * 2013-11-29 2015-06-03 迪米特里·马琳金 Method For Protecting The Authenticity Of An Article From Imitation And Counterfeit
CN105989504A (en) * 2015-02-02 2016-10-05 沈永培 Shaping camera using different state codes
WO2017101168A1 (en) * 2015-12-17 2017-06-22 厦门纳纬信息技术有限公司 Product anti-counterfeiting authentication and product quality tracing method
CN107180356A (en) * 2016-08-17 2017-09-19 柴永 A kind of method for anti-counterfeit using kaleidoscope display pattern as distinguishing mark
CN107705139A (en) * 2017-11-03 2018-02-16 葛徽 A kind of novel article anti-counterfeiting authentication method
CN107833058A (en) * 2017-10-27 2018-03-23 葛徽 A kind of novel article anti-counterfeiting authentication method
CN108646993A (en) * 2018-05-17 2018-10-12 张安东 Output file uniqueness ensuring method based on biological attribute and fluorescent printing technology
CN108846681A (en) * 2018-05-30 2018-11-20 于东升 For the method for anti-counterfeit and device of woodwork, anti-fake traceability system
CN109117909A (en) * 2017-06-22 2019-01-01 杭州沃朴物联科技有限公司 A kind of 3 D antiforge label based on micro random bubble
CN109146370A (en) * 2018-08-07 2019-01-04 景德镇陶瓷大学 A method of transmission article is confirmed using positioning shooting
CN110827041A (en) * 2019-11-04 2020-02-21 广州布珞科技有限公司 Anti-counterfeiting tracing method, system, medium and equipment
WO2020073715A1 (en) * 2018-10-12 2020-04-16 阿里巴巴集团控股有限公司 Two-dimensional code anti-counterfeiting method, device and system based on security application
CN112785308A (en) * 2021-02-02 2021-05-11 中钞印制技术研究院有限公司 Anti-counterfeiting method, anti-counterfeiting system and securities
CN116227524A (en) * 2023-05-05 2023-06-06 杭州蚂蚁酷爱科技有限公司 Anti-fake code generation and verification method and label-based anti-fake system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070244764A1 (en) * 2006-04-17 2007-10-18 Pryor Sandra K Method and apparatus for customizing items
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102004986A (en) * 2010-10-26 2011-04-06 梁庆生 Product anti-counterfeiting method based on digital signature and public key system and verifying method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070244764A1 (en) * 2006-04-17 2007-10-18 Pryor Sandra K Method and apparatus for customizing items
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102004986A (en) * 2010-10-26 2011-04-06 梁庆生 Product anti-counterfeiting method based on digital signature and public key system and verifying method

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102509066A (en) * 2011-11-18 2012-06-20 祝启忠 Two-dimensional code anti-counterfeiting method and identification device both based on goods feature information
CN103489106B (en) * 2012-06-11 2016-08-10 陈昶任 Chip label anti-counterfeiting method and system matched with positioning
CN103489106A (en) * 2012-06-11 2014-01-01 陈昶任 Chip label anti-counterfeiting method and system matched with positioning
CN102945398A (en) * 2012-10-22 2013-02-27 北京印刷学院 Double-variant third-order progressive encryption binary anti-counterfeiting printing method
CN102945390A (en) * 2012-10-22 2013-02-27 北京印刷学院 Double-variant third-order encryption binary anti-counterfeiting printing method
CN102945406A (en) * 2012-10-22 2013-02-27 北京印刷学院 Multi-parameter transposition variable-sequence encrypted binary anti-counterfeiting printing method
CN102945422A (en) * 2012-10-22 2013-02-27 北京印刷学院 Shift left displacement stepping increasing encryption binary anti-counterfeit printing method
CN102945397A (en) * 2012-10-22 2013-02-27 北京印刷学院 Variable-sequence, right-shifting, stepping and increasing encryption type binary anti-counterfeit printing method
CN102945404A (en) * 2012-10-22 2013-02-27 北京印刷学院 Multi-parameter reverse synchronous incremental encrypted binary anti-counterfeiting printing method
CN102945389A (en) * 2012-10-22 2013-02-27 北京印刷学院 Double-variant two-dimensional gradually-increased encryption binary anti-counterfeiting printing method
CN102945432A (en) * 2012-10-22 2013-02-27 北京印刷学院 Single-variable and progressive encryption type binary anti-counterfeit printing method
CN102945417A (en) * 2012-10-22 2013-02-27 北京印刷学院 Multi-parameter bivariate opposite synchronous progressive encrypted binary anti-counterfeiting printing method
CN102945392A (en) * 2012-10-22 2013-02-27 北京印刷学院 Single-parameter, gradient, opposite, synchronous and progressive encryption type binary anti-counterfeit printing method
CN102945471A (en) * 2012-10-22 2013-02-27 北京印刷学院 Binary anti-fake print method encrypting in opposite synchronous increasing way
CN104680226A (en) * 2013-11-29 2015-06-03 迪米特里·马琳金 Method For Protecting The Authenticity Of An Article From Imitation And Counterfeit
CN103793830A (en) * 2014-02-24 2014-05-14 朱清明 Goods identifying and authenticating method and corresponding device thereof
CN103824198A (en) * 2014-03-10 2014-05-28 上海理工大学 Anti-counterfeiting code generation and verification system
CN105989504A (en) * 2015-02-02 2016-10-05 沈永培 Shaping camera using different state codes
CN104616313A (en) * 2015-02-16 2015-05-13 可信视科技(深圳)有限公司 Handheld device image shooting and verification method based on cloud service
WO2017101168A1 (en) * 2015-12-17 2017-06-22 厦门纳纬信息技术有限公司 Product anti-counterfeiting authentication and product quality tracing method
CN107180356A (en) * 2016-08-17 2017-09-19 柴永 A kind of method for anti-counterfeit using kaleidoscope display pattern as distinguishing mark
CN109117909A (en) * 2017-06-22 2019-01-01 杭州沃朴物联科技有限公司 A kind of 3 D antiforge label based on micro random bubble
CN109117909B (en) * 2017-06-22 2024-03-01 杭州沃朴物联科技有限公司 Three-dimensional anti-counterfeit label based on trace random bubbles
CN107833058A (en) * 2017-10-27 2018-03-23 葛徽 A kind of novel article anti-counterfeiting authentication method
CN107705139A (en) * 2017-11-03 2018-02-16 葛徽 A kind of novel article anti-counterfeiting authentication method
CN108646993B (en) * 2018-05-17 2021-08-31 张安东 Output file uniqueness guaranteeing method based on biological attribute and fluorescent printing technology
CN108646993A (en) * 2018-05-17 2018-10-12 张安东 Output file uniqueness ensuring method based on biological attribute and fluorescent printing technology
CN108846681A (en) * 2018-05-30 2018-11-20 于东升 For the method for anti-counterfeit and device of woodwork, anti-fake traceability system
CN109146370A (en) * 2018-08-07 2019-01-04 景德镇陶瓷大学 A method of transmission article is confirmed using positioning shooting
CN109146370B (en) * 2018-08-07 2021-08-10 景德镇陶瓷大学 Method for confirming conveyed article by positioning shooting
WO2020073715A1 (en) * 2018-10-12 2020-04-16 阿里巴巴集团控股有限公司 Two-dimensional code anti-counterfeiting method, device and system based on security application
CN110827041A (en) * 2019-11-04 2020-02-21 广州布珞科技有限公司 Anti-counterfeiting tracing method, system, medium and equipment
CN112785308A (en) * 2021-02-02 2021-05-11 中钞印制技术研究院有限公司 Anti-counterfeiting method, anti-counterfeiting system and securities
CN116227524A (en) * 2023-05-05 2023-06-06 杭州蚂蚁酷爱科技有限公司 Anti-fake code generation and verification method and label-based anti-fake system
CN116227524B (en) * 2023-05-05 2023-08-08 杭州蚂蚁酷爱科技有限公司 Anti-fake code generation and verification method and label-based anti-fake system

Also Published As

Publication number Publication date
CN102201100B (en) 2013-04-24

Similar Documents

Publication Publication Date Title
CN102201100B (en) Object anti-counterfeiting method and system
US11240021B2 (en) Multi-address population based on single address
CN100530253C (en) System and method of authenticating an article
US7080041B2 (en) System and method for production and authentication of original documents
JP5139415B2 (en) Article information acquisition method and apparatus
JP5739876B2 (en) Unique identifiers, methods for providing unique identifiers, and use of unique identifiers
US8421593B2 (en) Apparatus, systems and methods for authentication of objects having multiple components
Huang et al. Optical watermarking for printed document authentication
CN104166871B (en) Anti-counterfeit label and anti-counterfeit method based on combination of two-dimension codes and RFID chips
CN102147884A (en) Anti-counterfeiting and authenticity-verifying method and system for article
JP2007535682A (en) Identifying and authenticating identifiers attached to objects or organisms without using a specific reader
CA2374196A1 (en) Legitimacy protection of electronic document and a printed copy thereof
WO2007072793A1 (en) Card capable of authentication
CN101398870A (en) Electronic stamp system based on password layered system
CN1947113B (en) Pedigree code
CN107508685A (en) The implementation method of applying electronic Digital signature service system in a kind of cloud computing environment
US20230121749A1 (en) Customizable cryptocurrency card
CN106779002A (en) Complex encryption authentication method based on Quick Response Code and radio frequency compound marking
CN108596309A (en) Quick Response Code generates and verification method
CN110192194B (en) System and method for authenticating security certificates
CN1841410A (en) Anti-counterfeit method for digital certificate and digital anti-counterfeit certificate system
CN1324050A (en) Identity marked double-cipher key anti-fake network and its usage
WO2020011942A1 (en) Secure cold storage medium
EA042414B1 (en) SYSTEM AND METHOD FOR AUTHENTICATION OF SECURITY CERTIFICATES
JP2004357084A (en) Authentication system, information processor, and storage device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130424

Termination date: 20180510