CN102571358A - Commodity anti-counterfeiting method for digital-signature-based radio frequency identification (RFID) tag - Google Patents

Commodity anti-counterfeiting method for digital-signature-based radio frequency identification (RFID) tag Download PDF

Info

Publication number
CN102571358A
CN102571358A CN2012100575103A CN201210057510A CN102571358A CN 102571358 A CN102571358 A CN 102571358A CN 2012100575103 A CN2012100575103 A CN 2012100575103A CN 201210057510 A CN201210057510 A CN 201210057510A CN 102571358 A CN102571358 A CN 102571358A
Authority
CN
China
Prior art keywords
commodity
rfid
label
digital signature
commodities
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012100575103A
Other languages
Chinese (zh)
Inventor
马建
程龙
李雄
张俊松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUXI SMART SENSING STARS TECHNOLOGY Co Ltd
Original Assignee
WUXI SMART SENSING STARS TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUXI SMART SENSING STARS TECHNOLOGY Co Ltd filed Critical WUXI SMART SENSING STARS TECHNOLOGY Co Ltd
Priority to CN2012100575103A priority Critical patent/CN102571358A/en
Publication of CN102571358A publication Critical patent/CN102571358A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a commodity anti-counterfeiting method for a digital-signature-based radio frequency identification (RFID) tag. The method comprises the following steps that: (A), a manufacture packages the RFID tag on a commodity, wherein the RFID tag stores the coded information of the commodity, a tag identifier (ID), the digital signature information of the coded information of the commodity, and the serial number of a public key for verifying the authenticity of a digital signature; and (B), a commodity user reads the RFID tag through a mobile intelligent terminal, and judges the authenticity of the commodity by verifying the authenticity of the digital signature. The method has the main advantages that: the manufacturer is not required to construct a large product information database for storing the production information of commodities and the ID information of RFID tags; an authenticity verification process is off line finished by the mobile intelligent terminal; the method is quick in response; and user experiences are effectively improved.

Description

A kind of antiforge method for commodities of the RFID label based on digital signature
Technical field
The invention belongs to the general fit calculation field, be specially a kind of antiforge method for commodities of the RFID label based on digital signature.
Background technology
Identification technology is applied in each links such as commodity production, transportation, sale, management; Each corner is just progressively goed deep in the application of identification technology; Especially the range of application in industrial aspect is more and more wider; The complexity of using greatly increases, and makes sign become indispensable important component part in the various industry production.Along with the development of economic society, identification technology has also experienced from the bar code to the two-dimension code, and two-dimension code is to the development of REID (RFID:Radio Frequency IDentification).Compare with planar bar code technology with bar code, the RFID technology has waterproof, antimagnetic, high temperature resistant, long service life, read that distance is big, data can encrypt, store that data capacity is bigger, the stored information change waits advantage freely on the label.Under the promotion of large-scale companies such as Wal-Mart, RFID has obtained using widely.And the RFID technology also reaches its maturity, and has occurred in a large number based on the RFID The Application of Technology.It is little, in light weight that RFID has a volume; The canned data amount is big, and data such as can encrypt at characteristics, so the RFID technology can be applicable to commodity counterfeit prevention; On especially can external packing, verify the true and false of commodity through the true or false of checking RFID label data with RFID label package goods.Simultaneously, along with mobile intelligent terminal (like smart mobile phone, PDA, Touch etc.) function is popularized with the quick of mobile intelligent terminal from strength to strength.Believe that in the near future a large amount of mobile intelligent terminals will be supported the RFID read function.Adopting mobile intelligent terminal to read in the commodity external packing information in the RFID label and through network the true and false of commodity is verified, is a kind of highly effective mode of commodity counterfeit prevention.
The coding uniqueness that most of now commodity counterfeit prevention schemes based on RFID all are based on the RFID label realizes.The enforcement thinking of such scheme is; Production firm writes the RFID label with the commodity relevant information in the commodity production process; And the RFID label that will have unique ID number is encapsulated in the external packing of commodity, simultaneously ID number of each label write in the commodity data server of manufacturer with corresponding label information.When the purchase of customer commodity, can be through ID number in special RFID reader (often being laid in the sale shop) reading tag with legal business license, and send to the background data base of manufacturer and to test true query requests.The server of manufacturer is received after the query requests; The id information of storing in id information in the RFID label of receiving and the database of oneself is compared; If be encapsulated in the ID that is stored in ID number of RFID label on commodity database server with production firm coupling is arranged; And this coupling ID state is shown as as yet inquiry, and then these commodity of return results be very, and with this ID labelled notation for inquiring about; If ID number of inquiry with the manufacturer data storehouse in ID number coupling not, then these commodity of return results are vacation; If this ID number is inquired about but be designated in the database of manufacturer, then these commodity of return results are true, and have been inquired about.
In such RFID commodity counterfeit prevention scheme; Production firm must a self-built large-scale background data base in order to information such as the commodity associated production information that stores in the storage RFID label and label ID numbers; Perhaps give trusted third party with this inquiring and authenticating mechanism trustship; If the output of manufacturer is very huge, then the cost of the storage of RFID information and inquiry is with considerable in the server, and in general the inquiring and authenticating of this scheme depends on the RFID reader that is deployed in vendor; This has increased the possibility of faking on the one hand, and return results is for true when forging RFID label and the false label of the feasible inquiry of RFID reader simultaneously like the lawless person; This has weakened user experience on the other hand; The true and false of when buying commodity, not inquiring about commodity like the user; And when the user hopes to inquire about commodity true and false, must go inquiry to the vendor of appointment; This brings very big infringement to user experience, if the true and false that the user can inquire about commodity whenever and wherever possible through the mobile intelligent terminals such as mobile phone of oneself, this can bring the very big lifting of user experience.
The true and false through mobile intelligent terminals such as mobile phone inquiry commodity mainly adopts centralized solution at present; Its basic ideas still need be disposed one or more background data base system; The mobile intelligent terminal user reads the coding of RFID label; Through the true system that tests of mobile intelligent terminal access the Internet and then visit producer, system returns and tests true result.Yet mobile intelligent terminal inserts the Internet, inquires about the true system that tests of producer, receives and tests true result, and this process often has bigger time delay, can greatly reduce user experience.In addition; When the user uses centralizedly when testing true system, may expose information such as its consumer behavior (user test true behavior is inevitable is tested true system and obtain by centralized), therefore; Adopt the backstage to test the problem that really relates to secret protection, might reduce user's enthusiasm.
In addition, for the alcoholic commercial articles that image height end drinks etc. has high reserve value, be not to select to consume immediately after a lot of purchase of customer, but collect for a long time.Like this, production firm need carry out long preservation and inquiry service is provided for the RFID label information of the commodity of this long-term collection.This is a very large difficulty for production firm, also is a huge burden simultaneously.
Summary of the invention
To the deficiency that traditional RFID commodity counterfeit prevention scheme exists, the invention provides a kind of antiforge method for commodities of distributed RFID label based on digital signature.
Technical scheme of the present invention is following:
A kind of antiforge method for commodities of the RFID label based on digital signature comprises:
A. production firm is encapsulated in the RFID label on the commodity;
Said RFID tag storage has: the digital signature information of the coded message of commodity, label ID and commodity code information, be used for the numbering of the PKI of the certifying digital signature true and false;
B. whether the commodity user uses mobile intelligent terminal that the RFID label is read and is the true and false of really judging commodity through certifying digital signature.
Said antiforge method for commodities is characterized in that, the coded message of said commodity comprises: the commodity place of production, date of manufacture, shelf-life, product batch number, market etc.
Described antiforge method for commodities is characterized in that, said digital signature adopts elliptic curve digital signature.
Described antiforge method for commodities is characterized in that, said RFID label satisfies following condition: label itself is disposable, can not reuse after being damaged; Label will meet corresponding international standard (like international standard ISO 18000-16b), can read the data that are stored in the label through the RFID reader; Each label has globally unique ID number.
Described antiforge method for commodities is characterized in that, said RFID label is encapsulated in sealing of commodity, seals in case tear, and the damage forever thereupon of RFID label can not be recovered utilization.
Described antiforge method for commodities is characterized in that, the user memory that said RFID label can be write is more than or equal to 512b.
Described antiforge method for commodities is characterized in that, said mobile intelligent terminal is equipped with the RFID ocr software, and said software comprises the PKI and its corresponding PKI numbering of certifying digital signature.(being that said software can find its corresponding PKI according to the PKI numbering).
Described antiforge method for commodities is characterized in that, production firm regularly or irregularly upgrades production commodity employed PKI of appended RFID label and private key; The articles for use user tests true software through network to mobile intelligent terminal and upgrades to upgrade PKI.
Antiforge method for commodities recited above is applied to the false proof of alcoholic commercial articles, particularly vinous false proof.
Beneficial effect of the present invention: main advantage of the present invention is that production firm need not build production information and the RFID label ID information that large-scale product information database comes storing commodity; Testing true process can accomplish through the mobile intelligent terminal off-line; Have response faster, promoted user experience effectively.
Description of drawings
Fig. 1: production firm signs to the RFID label
Fig. 2: the user verifies (being example with the bottle) through mobile intelligent terminal to label
Fig. 3: mobile intelligent terminal is to the proof procedure (to be example based on digital signature of elliptic curve) of commodity
Embodiment
Production firm (mainly comprises the place of production with the relevant information of commodity after producing commodity; Date of manufacture, shelf-life, product batch number; Information such as market) be stored in the RFID label (current; The RFID label that meets ISO 18000-6B standard is to use more passive RFID tags, this type of label technical maturity, and price constantly reduces.This type of label capacity is 2Kb; Under the situation that guarantees necessary level of security; Utilize the 2Kb memory space can satisfy the requirement of storage data fully through data compression algorithm); Be stored in the label with the RFID label information with after passing through digital signature label ID number then, and label is encapsulated on the packing of commodity.The user can pack the mobile intelligent terminal of band RFID read function into (like smart mobile phone with testing true software; PDA; Pad, Touch etc.) on,, the user can verify the true and false of commodity after buying commodity through mobile intelligent terminal whenever and wherever possible apace, after the user tests true and commodity in use; The RFID label is also torn to pieces thereupon, makes this label can not reuse on other commodity.
Digital signature is some data that are attached on the data cell; Or the cryptographic transformation that the data unit is done; This data and conversion allow the recipient of data cell in order to confirm the integrality of data cell source and data cell; And protected data, prevent to be forged by people (for example recipient).Common digital signature scheme comprises the RSA digital signature scheme; The ElGamal digital signature scheme; The DSA digital signature scheme; Elliptic curve digital signature (ECDSA) etc.In general, have under the situation of equal level of security, elliptic curve digital signature has shorter key length and signature length, so elliptic curve digital signature relatively is applicable to the RFID label.This patent is the implementation of this scheme of example explanation with the elliptic curve digital signature, and the off-line RFID antiforge method for commodities that adopts other signature schemes is still within the protection range of this patent.
To adopt elliptic curve digital signature is example, and the technical scheme of this patent is described below, and the digital signature scheme based on the elliptic curve cipher system is selected by production firm; Generate corresponding public private key pair, and to the public private key pair numbering, when producing commodity; The production information of every commodity of manufacturer (mainly comprises the place of production, date of manufacture, shelf-life; Product batch number; Information such as market) encode, and use private key that the coded message and the RFID label of commodity are carried out digital signature ID number, then the coded message of commodity, the signing messages storage of gained and the employed public private key pair sequence number of signing are stored in this RFID label; Then this RFID label is encapsulated on the packing of corresponding goods, like bottle bottle cap place etc.Production firm makes corresponding mobile intelligent terminal client and tests true software, and the signature verification algorithm use software approach of correspondence is realized that the PKI that will generate simultaneously after numbering deposits in the software.When the user need test true time; At first will test true software and be installed on the mobile intelligent terminal, start-up routine, id number, commodity code information and the corresponding PKI numbering of reading RFID label on the commodity through mobile intelligent terminal; Confirm the pairing signature verification PKI of this label through numbering; Software uses public-key, label ID number, commodity code information and signing messages operation signature verification algorithm carry out commodity and test very, if the digital signature authentication result who shows be true, can judge that then these commodity are very; Otherwise commodity are false.These RFID through signature are encapsulated in the sealing part of commodity, test very and tear and seal in case carry out commodity, and the RFID label will be given thereupon damage forever.This has just prevented the recycling problem of RFID label.
As required, production firm can be termly upgrades oneself PKI and private key.Like this, the product of different times production can adopt different keys to sign.Simultaneously, production firm can announce the employed PKI of different times in the official website of oneself, connect the Internet if the mobile intelligent terminal user allows client to test true software, also can test true software to client and upgrade to upgrade PKI.The consumer only need import the production time of the product of being bought in client software when verifying, just can find corresponding public key.Like this, just can realize the replacing of key not increasing under the situation that the client uses difficulty.More help carrying out the authenticity verification of product.
The practical implementation of this scheme comprises following key step:
One) production phase of production firm:
1) finite field F selects in production firm qOn elliptic curve E q(a, b): y 2=x 3+ ax+b, wherein, q is the odd prime of a safety, a, b ∈ F qBe the parameter of elliptic curve equation, and need to satisfy: 4a 3+ 27b 2≠ 0 (modq), mod computing here representes to obtain result's behind two integral divides remainder, can be expressed as 7=1 (mod 3) like 7mod 3=1.Simultaneously, choose the basic point G=(x of elliptic curve G, y G), x G, y G∈ F q, G ∈ E q(a, b), the rank of G are prime number n, the length of the binary representation of n is generally greater than 160 bits.It is integer d ∈ [1, n-1] that production firm selects the private key of oneself at random, and corresponding public key is Q=dG, and PKI is numbered.The global parameter of production firm be (q, a, b, G, n, Q).
2) production firm is according to the RFID label of the needs order some of oneself, and this label meets the following conditions: 1, label itself is disposable, and label can be encapsulated on the packing of commodity, and after the consumer opens commodity, label will be damaged automatically.2, label will meet corresponding international standard (like ISO 18000-6B), can read the data that are stored in the label through relevant reader.3, each label has globally unique ID number, and the user memory that label can be write is about 2Kb.
3) production firm extracts the relevant information of commodity, and these information spinners will comprise the place of production, the date of manufacture, and the shelf-life, product batch number, information such as market use encryption algorithm (like lzw algorithm) that these information and the employed PKI of this label are encoded to information M.Production firm uses the RFID reader to read ID number in the label, and calculates as follows through computer:
1. select the several r between 1 to n-1 at random, calculate rG=(x 1, y 1), rG representes the some G addition on elliptic curve r time, x here 1, y 1Expression point rG on two reference axis value.
2. calculate S 1=x 1(modn), if S 1=0, then return step 1..
3. utilize label ID number, coded message M and private key to calculate S then 2=(h (ID||M)+dS 1) * r -1(modn), h representes SHA SHA-1 here, || the connection of two message of expression is 010101 like the result of 010||01.If S 2=0, then return step 1..
4. (S 1, S 2) be message id || the signing messages of M.
Production firm is with (M, S 1, S 2) deposit in the user memory in the label.
4) production firm is packaged in the sealing part of commodity with this label, and at this moment, these commodity channel that can circulate is sold.
5) making of client software and renewal: after production firm has selected cryptosystem, just can start to develop the client validation software of oneself.The function of this software mainly is to verify the correctness of the signing messages of preserving among the RFID.Main execution mode is to read ID number of RFID label, canned data in the label (M, S through user's mobile intelligent terminal 1, S 2) and public private key pair, in conjunction with the PKI (PKI of production firm) that client software itself is preserved, whether be label ID legitimate signature through the signature of storing in the corresponding signature verification proof of algorithm label then.Its detailed process is tested the description in true stage referring to the consumer.
When production firm uses pair of secret keys after a period of time, can also key be changed according to the needs of oneself.After production firm changes key, must upgrade the mobile intelligent terminal client software, so that up-to-date PKI also is included in the client software.Thereby satisfy consumer's checking needs.
Two) consumer's tests the true stage
After the consumer bought commodity, the user need be installed in the client software that production firm provides on the mobile intelligent terminal with RFID read function, read ID number of RFID label and was stored in the data in the RFID label through mobile intelligent terminal.Use then through the true and false of software verification digital signature to come commodity are tested true operation.Its concrete steps are following:
1) user reads ID number and data (M, the S in RFID tag storage district of RFID label on the commodity with the mobile intelligent terminal with RFID read function 1, S 2) and the PKI of certifying signature numbering.
2) client software finds the employed PKI Q of RFID label certifying signature on these commodity through the PKI numbering, calculates A=h (ID||M) * S 2 -1(modn), B=S 2 -1* S 1(modn), utilize PKI to calculate the some X=(x on the elliptic curve 1', y 1')=AG+BQ, x here 1', y 1The coordinate of ' expression point X on x axle and y axle.At this moment, carry out as judging: if x 1'=S 1(modn), then signature verification is true, explains that also these commodity are for true.Otherwise, if x 1' ≠ S 1(modn), then signature verification is false, explains that these commodity are counterfeit goods.
This proof procedure is not owing to can relate to net working operation, and the data volume of calculating is less relatively, and the CPU of present most of mobile intelligent terminals had very strong disposal ability, so the needed time of certifying signature will be seldom.The consumer only needs to hand the RFID label place that mobile intelligent terminal is pressed close to bottle, and moment will obtain verifying the result.The consumer can obtain extraordinary user experience.And, because production firm need not safeguard that a huge backstage supplies user inquiring, concerning production firm, has also saved many maintenance costs.
Owing in signature, be that ID number of RFID label and the coded message M of product are signed simultaneously.Like this, not only can verify, can also prevent that the lawless person from making amendment to the production information M among the RFID simultaneously the true and false of commodity.Because the production information of some commodity (such as grape wine) belongs to sensitive information, the commodity in the different year or the different places of production, its market price or reserve value etc. all are very different.Employing should the signature mode after, can eliminate this type of hidden danger.
Client is tested true software and can be designed as and can insert the Internet, and the mobile intelligent terminal user can test true software to client and be provided with, if this user is unwilling to expose its consumer behavior, this tests true behavior will can be by record (protection user's privacy).In fact, a plurality of manufacturers can share same mobile intelligent terminal and test true software, and the proper program of testing of each manufacturer is installed as a plug-in unit of this mobile intelligent terminal software.

Claims (10)

1. antiforge method for commodities based on the RFID label of digital signature comprises:
A. production firm is encapsulated in the RFID label on the commodity;
Said RFID tag storage has: the digital signature information of the coded message of commodity, label ID and commodity code information, be used for the numbering of the PKI of the certifying digital signature true and false;
B. whether the commodity user uses mobile intelligent terminal that the RFID label is read and is the true and false of really judging commodity through certifying digital signature.
2. antiforge method for commodities as claimed in claim 1 is characterized in that, the coded message of said commodity comprises: the commodity place of production, date of manufacture, shelf-life, product batch number, market.
3. antiforge method for commodities as claimed in claim 1 is characterized in that, said digital signature adopts elliptic curve digital signature.
4. antiforge method for commodities as claimed in claim 1 is characterized in that, said RFID label satisfies following condition: label itself is disposable, can not reuse after being damaged; Label meets international standard ISO 18000-16b, can read the data that are stored in the label through the RFID reader; Each label has globally unique ID number.
5. like the described antiforge method for commodities of arbitrary claim in the claim 1 to 4, it is characterized in that said RFID label is encapsulated in sealing of commodity, seal that the damage forever thereupon of RFID label can not be recovered utilization in case tear.
6. antiforge method for commodities as claimed in claim 5 is characterized in that, the user memory that said RFID label can be write is more than or equal to 512b.
7. antiforge method for commodities as claimed in claim 1 is characterized in that said mobile intelligent terminal is equipped with the RFID ocr software, and said software comprises the PKI and its corresponding PKI numbering of certifying digital signature.
8. antiforge method for commodities as claimed in claim 1 is characterized in that, production firm regularly or irregularly upgrades production commodity employed PKI of appended RFID label and private key; The articles for use user tests true software through network to mobile intelligent terminal and upgrades to upgrade PKI.
9. the described antiforge method for commodities of arbitrary claim in the claim 1~8 is applied to the false proof of alcoholic commercial articles.
10. application as claimed in claim 9, said drinks are grape wine.
CN2012100575103A 2012-03-07 2012-03-07 Commodity anti-counterfeiting method for digital-signature-based radio frequency identification (RFID) tag Pending CN102571358A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012100575103A CN102571358A (en) 2012-03-07 2012-03-07 Commodity anti-counterfeiting method for digital-signature-based radio frequency identification (RFID) tag

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012100575103A CN102571358A (en) 2012-03-07 2012-03-07 Commodity anti-counterfeiting method for digital-signature-based radio frequency identification (RFID) tag

Publications (1)

Publication Number Publication Date
CN102571358A true CN102571358A (en) 2012-07-11

Family

ID=46415899

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012100575103A Pending CN102571358A (en) 2012-03-07 2012-03-07 Commodity anti-counterfeiting method for digital-signature-based radio frequency identification (RFID) tag

Country Status (1)

Country Link
CN (1) CN102571358A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761660A (en) * 2014-02-24 2014-04-30 陈建生 Method and device for verifying authenticity of product
CN104091191A (en) * 2014-07-09 2014-10-08 上海象形通讯科技有限公司 Fast and effective anti-fake identifying method
CN104239944A (en) * 2014-09-10 2014-12-24 湖南鑫隆模塑科技开发有限公司 Commodity information identification method
CN106408310A (en) * 2016-08-25 2017-02-15 高旭磊 Information processing method, apparatus and system
WO2018018175A1 (en) * 2016-07-29 2018-02-01 吴茂全 Authentication device and method for article
CN108573181A (en) * 2018-04-11 2018-09-25 思力科(深圳)电子科技有限公司 A kind of RFID reader, RFID system and block chain network
CN109191149A (en) * 2018-08-22 2019-01-11 合肥高科创新科技有限公司 A kind of commodity digital identity generation method based on block chain
CN109889341A (en) * 2019-01-15 2019-06-14 思力科(深圳)电子科技有限公司 Data processing method, electronic tag and radio-frequency card reader
CN112887095A (en) * 2021-01-26 2021-06-01 浙江工商大学 Block chain-based data privacy protection aggregation method for smart grid secondary network
WO2021215998A1 (en) * 2019-05-16 2021-10-28 Mighty Jaxx International Pte. Ltd. An ownership data management system and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101452539A (en) * 2008-12-12 2009-06-10 龙冬阳 Mobile identification method based on NFC
US20100011211A1 (en) * 2008-07-09 2010-01-14 Theodoros Anemikos Radio Frequency Identification (RFID) Based Authentication System and Methodology
CN101945123A (en) * 2010-08-24 2011-01-12 刘彤 RFID mobile phone and combination key technology-based authenticity identification method
CN201878236U (en) * 2010-12-08 2011-06-22 卢大伟 Commodity anti-counterfeiting tracking system and mobile phone device with anti-counterfeiting function

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100011211A1 (en) * 2008-07-09 2010-01-14 Theodoros Anemikos Radio Frequency Identification (RFID) Based Authentication System and Methodology
CN101452539A (en) * 2008-12-12 2009-06-10 龙冬阳 Mobile identification method based on NFC
CN101945123A (en) * 2010-08-24 2011-01-12 刘彤 RFID mobile phone and combination key technology-based authenticity identification method
CN201878236U (en) * 2010-12-08 2011-06-22 卢大伟 Commodity anti-counterfeiting tracking system and mobile phone device with anti-counterfeiting function

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761660A (en) * 2014-02-24 2014-04-30 陈建生 Method and device for verifying authenticity of product
CN103761660B (en) * 2014-02-24 2018-01-19 苏州蓝色力量信息科技有限公司 Authenticity of products verification method and device
CN104091191A (en) * 2014-07-09 2014-10-08 上海象形通讯科技有限公司 Fast and effective anti-fake identifying method
CN104091191B (en) * 2014-07-09 2017-08-25 上海象形通讯科技股份有限公司 A kind of efficiently and effectively false proof authenticating method
CN104239944A (en) * 2014-09-10 2014-12-24 湖南鑫隆模塑科技开发有限公司 Commodity information identification method
WO2018018175A1 (en) * 2016-07-29 2018-02-01 吴茂全 Authentication device and method for article
CN106408310A (en) * 2016-08-25 2017-02-15 高旭磊 Information processing method, apparatus and system
CN108573181A (en) * 2018-04-11 2018-09-25 思力科(深圳)电子科技有限公司 A kind of RFID reader, RFID system and block chain network
CN109191149A (en) * 2018-08-22 2019-01-11 合肥高科创新科技有限公司 A kind of commodity digital identity generation method based on block chain
CN109191149B (en) * 2018-08-22 2022-02-22 合肥高科创新科技有限公司 Commodity digital identity generation method based on block chain
CN109889341A (en) * 2019-01-15 2019-06-14 思力科(深圳)电子科技有限公司 Data processing method, electronic tag and radio-frequency card reader
WO2021215998A1 (en) * 2019-05-16 2021-10-28 Mighty Jaxx International Pte. Ltd. An ownership data management system and method
CN112887095A (en) * 2021-01-26 2021-06-01 浙江工商大学 Block chain-based data privacy protection aggregation method for smart grid secondary network
CN112887095B (en) * 2021-01-26 2022-09-23 浙江工商大学 Block chain-based data privacy protection aggregation method for smart grid secondary network

Similar Documents

Publication Publication Date Title
CN102571358A (en) Commodity anti-counterfeiting method for digital-signature-based radio frequency identification (RFID) tag
CN102779284B (en) RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like
US8112626B1 (en) Method and apparatus to provide public key authentication with low complexity devices
CN101369306B (en) Electronic label security system
CN108595980B (en) Method and device for protecting commodity traceability information
CN102930307A (en) Anti-counterfeiting authentication method for famous wine
Saeed et al. An NFC based consumer-level counterfeit detection framework
CN102855577A (en) Multiple merchandise anti-counterfeiting verification method based on cloud computing
CN108573296B (en) Anti-counterfeiting device, anti-counterfeiting system and anti-counterfeiting method
CN102063633A (en) Anti-counterfeiting method based on radio frequency identification technology
CN101354753A (en) Method for making product label, method and system for verifying product genuine-fake
CN101504731B (en) Movable recognition system based on NFC
CN105956804A (en) Safe order system based on digital certificate
CN101527021A (en) RFID electronic tag reading and writing device used for product truth verification
CN102622624B (en) A kind of commodity counterfeit prevention identification system and method
Alzahrani et al. Securing pharmaceutical and high-value products against tag reapplication attacks using nfc tags
CN108399521A (en) Logistics Distribution Method, device, server and storage medium
CN110969445A (en) Anti-counterfeiting method based on NFC
CN111523907A (en) Anti-counterfeiting method
CN102054250A (en) System and method for obtaining an authorization key to use a product
Gandino et al. A security protocol for RFID traceability
CN106504007A (en) A kind of commodity counterfeit prevention management system based on NFC electronic tags
CN107318103B (en) Machine switching prevention method and system based on Internet of things SIM card
Bernardi et al. An anti-counterfeit mechanism for the application layer in low-cost RFID devices
CN114140133B (en) Method for processing tracing data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120711