CN102622631A - Anti-counterfeiting inspection device and anti-counterfeiting method for anti-counterfeiting equipment - Google Patents

Anti-counterfeiting inspection device and anti-counterfeiting method for anti-counterfeiting equipment Download PDF

Info

Publication number
CN102622631A
CN102622631A CN2012100471301A CN201210047130A CN102622631A CN 102622631 A CN102622631 A CN 102622631A CN 2012100471301 A CN2012100471301 A CN 2012100471301A CN 201210047130 A CN201210047130 A CN 201210047130A CN 102622631 A CN102622631 A CN 102622631A
Authority
CN
China
Prior art keywords
module
false proof
code
time
dimension code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012100471301A
Other languages
Chinese (zh)
Inventor
蔡镇滨
宋建华
张华胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN RUNHONGXIN DIGITAL TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN RUNHONGXIN DIGITAL TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN RUNHONGXIN DIGITAL TECHNOLOGY Co Ltd filed Critical SHENZHEN RUNHONGXIN DIGITAL TECHNOLOGY Co Ltd
Priority to CN2012100471301A priority Critical patent/CN102622631A/en
Publication of CN102622631A publication Critical patent/CN102622631A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an anti-counterfeiting inspection device and an anti-counterfeiting method for anti-counterfeiting equipment. The anti-counterfeiting inspection device at least comprises an anti-counterfeiting inspection module, a recognition display module and a central processing unit (CPU). The anti-counterfeiting method includes: starting verification codes generated by the device, generating the verification codes into two-dimension code or digit mode; and intercepting two-dimension codes or digits and verifying the two-dimension codes or the digits. The anti-counterfeiting inspection device and the anti-counterfeiting method for anti-counterfeiting equipment can strictly perform anti-counterfeiting equipment verification, can improve anti-counterfeiting accuracy and reliability, enable customers or users to correctly recognize quality goods and counterfeited products, avoid counterfeiting of the anti-counterfeiting equipment by other people, and can avoid sale or circulation of the counterfeited products.

Description

A kind of false proof verifying attachment and method for anti-counterfeit that is used for anti counterfeit appts
Technical field
The present invention relates to false proof verifying attachment and method, in particular, relate to anti counterfeit appts and carry out false proof verifying attachment and anti-fake inspection method.
Background technology
The brand of commodity belongs to a very important aspect of intellectual property protection, also is the part of commodity value.In order to carry out identify label to the product that oneself produces, prevent personation, each famous brand all once used various anti-fake inspection methods to represent certified products, so that consumers in general discern counterfeit.
At present, adopt to come the method that antifalsification label is discerned is identified the true and false usually in the world, to reach the purpose that makes things convenient for consumers in general to discern counterfeit through false proof inspection machine.But there is a tangible leak in this method: forge label when the adulterator uses the false proof inspection machine identification of forgery, the consumer can't make right judgement.
For example; Patented claim 200910105867.2 discloses a kind of product identity digital identification apparatus, verifying attachment, product and anti-fake inspection method; In this patented claim; Product identity digital identification apparatus comprises: the identity code memory module is used to preserve the identity code of the unique correspondence of product identity digital identification apparatus therewith; Communication module is used for communicating with corresponding read write line; Matching module is used for carrying out match check according to the request of reading that communication module is sent, and only when the password of the encryption of password in the request of reading and identity code is complementary, check code is sent to communication module.This patented claim is to carry out identification through the identity code in the product identity digital identification apparatus; Though product identity digital identification apparatus has uniqueness; But identity code is owing to utilize existing password generating mode to make; Even carried out encryption, still can decode, as long as decoded identity code; Just can carry out massive duplication, so this method still can not be carried out anti-counterfeit recognition.
Summary of the invention
Based on this, primary and foremost purpose of the present invention provides a kind of false proof verifying attachment and method for anti-counterfeit that is used for anti counterfeit appts, and these apparatus and method can address the above problem, and accurately discern certified products and fake product, avoid the sale or the circulation of fake product.
Another object of the present invention is to provide a kind of false proof verifying attachment and method for anti-counterfeit that is used for anti counterfeit appts, and this device and method can be stopped the false making fakement phenomena of anti counterfeit appts at all, improves the reliability of certified products, is specially adapted to anti counterfeit appts.
Another object of the present invention is to provide a kind of false proof verifying attachment and method for anti-counterfeit that is used for anti counterfeit appts; This device and method can judge accurately and timely whether product is certified products; And can reduce false proof inspection cost effectively, improve the reliability and the checkability of check.
In order to achieve the above object, the present invention realizes through following technical scheme.
A kind of false proof verifying attachment that is used for anti counterfeit appts, this device includes at least:
False proof inspection module is the nucleus module of false proof verifying attachment, stores unique identity code, and carries out communication with the identification display module;
The identification display module is used for false proof inspection module is carried out authentication, and after authentication is passed through, this module will be that content is encrypted the generation identifying code with device code and time, then identifying code is exported to carry out follow-up checking;
This module can not freely be propagated.This module can not freely be propagated, and has guaranteed that the adulterator can't cheat consumers through implanting the false proof verifying attachment of forging to the identification display module of official's research and development.
CPU is connected to false proof inspection module and identification display module, is used to manage false proof inspection module and generates authorization information, and management identification display module generates identifying code, and the control identifying code shows.
Identity code can carry out authentication through the pin mode transmission identification display module that generates, and mode that also can agreement is discerned checking through the identification display module.
Described false proof inspection module is cured usually, so that it has the characteristic that can be verified, also has confidentiality simultaneously, avoids being replicated.
Follow-up checking comprises multiple mode, can be to show with two-dimension code or digital mode, or further verify with the form of special code, perhaps combines official's publish data to verify through wireless or cable network.
Further; Said device also includes display screen, is used to show the identifying code of representing with two-dimension code figure or digital form, perhaps other authorization information; The identification display module is verified false proof inspection module; After, generate identifying code, then identifying code is pushed to display screen with two-dimension code figure and digital form;
Other authorization information includes the anti-dummy check telephone number of current system time, official website's announcement and the anti-dummy check note shortcode that official website announces.
Said device also includes communication module, and said communication module comprises receiving element and transmitting element, receives and send checking request checking data and checking request msg respectively.
Described identification display module includes:
The module during school is used to proofread and correct current system time; Its objective is the time (error can not above 30 minutes) within error range that guarantees AES uses in the identification display module time and anti-counterfeit recognition verification platform; Because after anti-counterfeit recognition verification platform decryption verification sign indicating number obtains this time, can be done the check of a validity this time; Thereby realized the ageing of the identification identifying code that display module generated;
Identification module is used for the false proof inspection module of false proof verifying attachment is carried out authentication; The mode of checking can be passed through existing mode, for example certifying digital signature, checking internal agreement, authentication password etc.;
Encrypting module is used for through being that content is encrypted the generation identifying code with device code and time;
Display module, the result data of reception encrypting module and identification module is used for identifying code is resolved to two-dimension code figure or digital mode the line output of going forward side by side.
Wherein, module connects encrypting module during the school, to encrypting module output time data; Identification module connects display module, and the authentication structure is exported to display module, and encrypting module also is connected to display module, to display module output identifying code; Display module receives the result of encrypting module and identification module, if the authentication result of identification module is correct, then just identifying code resolves to two-dimension code figure or digital mode, the line output of going forward side by side; If the authentication erroneous results of identification module is then directly alarmed or the prompting error result.
A kind of anti-fake inspection method that is used for anti counterfeit appts may further comprise the steps:
The false proof verifying attachment of A, startup anti counterfeit appts,
Identification display module in B, the false proof verifying attachment generates identifying code,
C, with identifying code with two-dimension code or the numeral form show;
D, the above-mentioned two-dimension code of intercepting or numeral, and the two-dimension code or the numeral of institute's intercepting sent to verification platform or authentication center;
E, verification platform or authentication center are resolved two-dimension code or numeral, and analysis result is verified; And will verify that the result beams back.
In step C, the demonstration of two-dimension code or numeral normally sends to display screen with two-dimension code or numeral, shows through display screen.
In step D, the intercepting of above-mentioned two-dimension code or numeral can be carried out through this false proof verifying attachment, also can be through other external unit, and for example other portable terminal such as mobile phone carries out.
Interception way for two-dimension code; False proof verifying attachment at first generates identifying code according to specific algorithm; In order to increase false proof reliability, again identifying code is generated two-dimension code or numeral (for example identifying code being generated the QR sign indicating number through QR sign indicating number generating algorithm), to carry out quick identification and checking; During intercepting,,, then be,, then can directly duplicate the data of two-dimension code or numeral and come intercepting if utilize false proof verifying attachment through two-dimension code or digital mode intercepting of taking pictures to showing like mobile phone if utilize other external unit.
In anti counterfeit appts; In regular hour, the identification display module generates two-dimension code or numeral according to certain algorithm, and in this two-dimension code or numeral and verification platform or the authentication center; The generation of two-dimension code or numeral is unanimity or synchronous, can guarantee the checking of two-dimension code or numeral like this.Important a bit, the generating mode of two-dimension code and analysis mode will keep relevance, and the analytical algorithm of promptly resolving two-dimension code or numeral generation identifying code through the generating algorithm and the authentication center of identification display module generation identifying code is reversible.Certain irreversible mode also can realize, but can increase false proof controlling cost greatly.
For this reason, generally, a false proof check program is set in advance, this program can utilize existing electronic equipment to realize the candid photograph to two-dimension code or numeral, and gives verification platform or authentication center with two-dimension code of capturing or digital delivery.Verification platform or authentication center be mainly by module during the school, communication module, and deciphering module, inspection module and database are formed, and these are integrated in one or more server usually; Mainly realized the function identifying code being discerned and the related data of device code is inquired about in the anti-counterfeit recognition stage.The state that data are arranged to open to the outside world is so that the user carries out Antiforge inquiry and checking.
Described verification method; Among its step D; Two-dimension code or numeral with institute's intercepting send to verification platform or authentication center while, also request time are sent to verification platform or authentication center as important data, with two-dimension code or the digital time that a reality is arranged that guarantees institute's intercepting; This time allows 10-30 minute error, carries out smoothly with what guarantee to verify.
In above-mentioned step; On the basis of request time, also allow to increase a time window; Time window is exactly the time span that two-dimension code or numeral keep; Usually be exactly two-dimension code or numeral from sending to the time length of inefficacy, be normally defined 10-30 minute, can guarantee reliably carrying out of anti-dummy check.Through the setting of time window,, also can can't forge anti counterfeit appts like this because of the inefficacy of time window even one or two people intercept and capture two-dimension code or numeral.The anti-counterfeit recognition verification platform is resolved the identifying code of receiving and is obtained identifying code and request time; Judge then whether request time (in time window) and identifying code be legal, have only when the both is legal, just pass through the details of this anti counterfeit appts in the device code Query Database, and send it to the consumer, otherwise will send to the consumer to failure information.
Checking is during request time, comprises that also the checking request time whether in time window, if in the time window scope, judges that request time is legal, if not in the time window scope, judges that then request time is illegal, through checking.
Details comprise information such as the geographic position, performance, index at device code, shops's title and the shops place of anti counterfeit appts; Pass through display screen then with above-mentioned information exhibition, the consumer can be intuitively through checking the true and false that information such as shops's title, device code and current geographic position, performance, index are come the checking security verifying attachment.
The present invention is through these apparatus and method; Can strictly carry out the checking of anti counterfeit appts, can improve false proof accuracy and reliability, make consumer or user accurately discern certified products and fake product; Avoid the forgery of other people, also can avoid the sale or the circulation of fake product anti counterfeit appts.
This apparatus and method simultaneously, it is low also to have a false proof cost, and the characteristics of being convenient to realize can be discerned certified products and fake product accurately and rapidly, also can improve the checkability of anti counterfeit appts, can be widely used in anti counterfeit appts and the high-end electronic product.
Description of drawings
Fig. 1 is the structural representation of the false proof verifying attachment implemented of the present invention.
Fig. 2 is the structural representation of the identification display module implemented of the present invention.
Fig. 3 is the structural representation of the verification platform implemented of the present invention.
Fig. 4 is the control flow chart of the anti-dummy check implemented of the present invention.
Fig. 5 is the process flow diagram of the identification identifying code implemented of the present invention.
Fig. 6 is the process flow diagram that the identification display module implemented of the present invention generates identifying code.
Embodiment
Below in conjunction with accompanying drawing and preferred embodiment the present invention is further specified.
Inventive concept of the present invention is: design an anti-fake inspection method to false proof verifying attachment based on the digital code information technology; This method is source and foundation with an authority, disclosed and just official website; With a secret identifying code generating algorithm is core; Combined with hardware and software again, thus reach the purpose of anti-dummy check.
As shown in Figure 1, the device that the present invention implemented includes display screen, false proof inspection module, identification display module and CPU.
Wherein, display screen is used to show the identifying code of representing with two-dimension code figure or digital form, perhaps other authorization information; Other authorization information includes the anti-dummy check telephone number of current system time, official website's announcement and the anti-dummy check note shortcode that official website announces.
False proof inspection module is the nucleus module of false proof verifying attachment, stores unique identity code, and carries out communication with the identification display module.
The identification display module is used for false proof inspection module is carried out authentication, and after authentication is passed through, this module will be that content is encrypted the generation identifying code with device code and time, then identifying code is exported to carry out follow-up checking.
This module can not freely be propagated.This module can not freely be propagated, and has guaranteed that the adulterator can't cheat consumers through implanting the false proof verifying attachment of forging to the identification display module of official's research and development.
CPU is connected to false proof inspection module and identification display module, is used to manage false proof inspection module and generates authorization information, and management identification display module generates identifying code, and the control identifying code shows; The control communication module sends the checking request through wired or wireless network.
This device also includes communication module, to carry out communication with verification platform or authentication center, receives and send checking request checking data and checking request msg.
Most important core is the identification display module, and this module is a core with a secret identifying code generating algorithm; The consumer only need open the identification display module in the false proof verifying attachment when preventing dummy check, this module will be pushed to display screen to identifying code with two-dimension code and digital mode; The consumer can read two-dimension code through false proof check program and check identification, and false proof check program will be showed shops's title, device code and the current geographic position at false proof verifying attachment place; The consumer also can discern through dialing anti-dummy check telephone number and input validation sign indicating number, and anti-dummy check phone will be informed shops's title, device code and the current geographic position at false proof verifying attachment place; The consumer can be that the note of content is discerned to anti-dummy check note shortcode through sending with the identifying code also, prevents that dummy check note shortcode will be replied in case shops's title, device code and current geographic position that the dummy check device belongs to are the note of content.The consumer can be through checking the true and false that shops's title, device code and current geographic position come the checking security verifying attachment like this.
Identification display module (as shown in Figure 2) is module, identification module, encrypting module and display module when including the school.The identification display module mainly comprises following function: the false proof inspection module to false proof verifying attachment carries out authentication, be that content is encrypted to generate identifying code and identifying code is transferred to display screen and showed when system is carried out the school, with device code and current system time; In the different anti counterfeit appts, write down the identity that a unique device code is used to identify anti counterfeit appts in display module in each identification.
Wherein, module is used to proofread and correct current system time during the school; Its objective is the time (error can not above 30 minutes) within error range that guarantees AES uses in the identification display module time and anti-counterfeit recognition verification platform; Because after anti-counterfeit recognition verification platform decryption verification sign indicating number obtains this time, can be done the check of a validity this time; Thereby realized the ageing of the identification identifying code that display module generated.
Identification module is used for the false proof inspection module of false proof verifying attachment is carried out authentication; The mode of checking can be passed through existing mode, for example certifying digital signature, checking internal agreement, authentication password etc.
Encrypting module is used for through being that content is encrypted the generation identifying code with device code and time.
Display module, the result data of reception encrypting module and identification module is used for identifying code is resolved to two-dimension code figure or digital mode the line output of going forward side by side (exporting to display screen usually).
Wherein, module connects encrypting module during the school, to encrypting module output time data; Identification module connects display module, and the authentication structure is exported to display module, and encrypting module also is connected to display module, to display module output identifying code; Display module receives the result of encrypting module and identification module, if the authentication result of identification module is correct, then just identifying code resolves to two-dimension code figure or digital mode, the line output of going forward side by side; If the authentication erroneous results of identification module is then directly alarmed or the prompting error result.
The concrete realization that generates identifying code is as shown in Figure 6; At first start identification module, the true and false of identification module checking security inspection module is if counterfeit; Then identification module sends the check failure information and gives display module, and display module shows this information transmission to display screen.If certified products; When module is carried out the system school when then starting the school; After during the school, encrypting module is that content is encrypted the generation identifying code with device code and time, and identifying code is sent to display module; Display module generates two-dimension code and/or numeral with identifying code according to special algorithm, and two-dimension code or digital transmission are showed to display screen.
Enforcement of the present invention also needs a verification platform to cooperate with technical scheme of the present invention, and as shown in Figure 3, this verification platform is generally conventional equipment, mainly by module during the school, communication module, deciphering module, inspection module and database composition; Mainly realized the function identifying code being discerned and the related data of device code is inquired about in the anti-counterfeit recognition stage, therefore, data are opened to the outside world, so that the user verifies and inquire about, perhaps download the needed program of checking.
Simultaneously, information such as the performance of the shops's title at the false proof verifying attachment place that device code, device code are corresponding and the geographic position at shops place, anti counterfeit appts, index also can deposit in the verification platform database, inquiry during for follow-up anti-dummy check, read.
Consumer's checkout procedure is as shown in Figure 4, carefully states as example with the mode of using the mobile phone that false proof check program has been installed.False proof check program is meant that this program can utilize existing electronic equipment to realize the candid photograph to two-dimension code or numeral, and gives verification platform or authentication center with two-dimension code of capturing or digital delivery.False proof check program is not unique method that obtains two-dimension code or numeral, can also obtain through the mode of data that directly reads two-dimension code or numeral.
S01: beginning starts false proof verifying attachment.
S02: the identification display module in the false proof verifying attachment is tested to false proof inspection module, verifies whether false proof inspection module is certified products, if certified products then carries out next step; If not certified products, then directly show check identification, test ending.
S03: after verifying that false proof inspection module is certified products, the identification display module can generate identifying code (specific algorithm is described in the back) according to special algorithm according to system time and device code.
S04: for the ease of quick identification, the identification display module also can generate a two-dimension code and numeral with above-mentioned identifying code, and two-dimension code and numeral are shown through display screen.
Therefore, can demonstrate current system time, the two-dimension code that identifying code is corresponding, numeral and the out of Memory that identifying code is corresponding on the display screen; At portable terminal, the consumer only need open the two-dimension code that false proof check program captures on the false proof verifying attachment display screen and get final product.
S05: above-mentioned two-dimension code of intercepting and/or numeral, and the two-dimension code and/or the numeral of institute's intercepting sent to verification platform.
The mode of intercepting; Can take pictures through portable terminal; For example take pictures, or directly read the data of two-dimension code and/or numeral, the two-dimension code that photographed and/or numeral or two-dimension code that reads and/or the digital verification platform that sends to anti-counterfeit recognition as communication request with mobile phone.
In order further to guarantee false proof reliability; In the information such as numeral of checking two-dimension code, two-dimension code correspondence; But whether the system time that shows on the display screen of the false proof verifying attachment of simultaneous verification is the current time, and should the time sends and verify (error can not above 30 minutes) as request time.
Request time except allowing error, can also solve the error problem of time through time window.Promptly on the basis of request time, increase a time window; Time window is exactly the time span that two-dimension code or numeral keep; Two-dimension code or numeral are normally defined 10-30 minute from sending to the time length of inefficacy in other words conj.or perhaps, can guarantee reliably carrying out of anti-dummy check.Like this through the setting of time window, can guarantee the actual effect verified, the authentication failed of avoiding time delays to bring also can guarantee the reliability verified simultaneously, even one or two people intercept and capture two-dimension code and/or numeral, also can can't be through checking because of the inefficacy of time window.
S06: verification platform is resolved two-dimension code and/or numeral, and analysis result is verified; And will verify that the result beams back.
In anti counterfeit appts; In regular hour (in time error or the time window), the generation of two-dimension code or numeral is in verification platform; The generation of two-dimension code or numeral is unanimity or synchronous, can guarantee the accuracy and the reliability of the checking of two-dimension code or numeral like this.
S07: verification platform checking back (in practice, people's capable of using mobile phone or other terminal send to verification platform with two-dimension code and verify), will verify that the result sends to false proof verifying attachment or portable terminal.If verification platform verifies that successfully the data of beaming back together with the checking result so also comprise the information such as shops's title, device code, configuration, performance and current geographic position that false proof verifying attachment belongs to, the basis that supplies consumer's reference or conduct to estimate; If verification platform identification is unsuccessful, will on portable terminal, show authentication failed so, explain that then this false proof verifying attachment forges.
If because network communication problem and unsuccessful words; False proof check program on the portable terminal is incited somebody to action automatically connectivity verification platform again, will quote the network communication fault when connection all gets nowhere above 3 times, in this case; Can not forge by the equipment of being accredited as, can only carry out retry.
In the checkout procedure, relate to the generating algorithm of identifying code and the analytical algorithm of identifying code; Realize that the analytical algorithm of identifying code is realized in the encrypting module of the identification display module of the generating algorithm of identifying code in false proof verifying attachment in the deciphering module of verification platform.
The generating algorithm of identifying code is described below.
S11: the current UTC time of the system that obtains, change into 4 metric hour time sequence number then, promptly the current time be in the current year which hour because 1 year length be 366 * 24=8784 hour, so the time sequence number of getting length be 4 integers.
S12: obtain 8 decimal system device codes of current device, device code is set to 8 decimal number at present, is equivalent to when implementing, can distribute the number of devices of millions, and if desired follow-up, figure place can expand again, preferably even bit.
S13: the origin authentication sign indicating number that is combined into time sequence number and device code 12.
S14: handle 12 origin authentication sign indicating number: be merged into a byte with per two, become the origin authentication sign indicating number syllable sequence of 6 bytes, will convert syllable sequence [0x90,0x12,0x34,0x56,0x76,0x32] to as 901234567632.
S15: the identifying code syllable sequence that the origin authentication sign indicating number syllable sequence encryption of 6 bytes is converted to 6 bytes.
S16: handle the identifying code syllable sequence of 6 bytes: be split into two with each byte, become 12 identifying code, [0x74,0x90,0x98,0x32,0x98,0x35] will convert 749098329835 to like syllable sequence.
The analytical algorithm of identifying code is described below.
S21: handle 12 identifying code: be merged into a byte with per two, become the identifying code syllable sequence of 6 bytes, will convert syllable sequence [0x74,0x90,0x98,0x32,0x98,0x35] to as 749098329835.
S22: the origin authentication sign indicating number syllable sequence that the identifying code syllable sequence decryption processing of 6 bytes is converted to 6 bytes.
S23: handle the origin authentication sign indicating number syllable sequence of 6 bytes: be split into two with each byte, become 12 origin authentication sign indicating number, [0x90,0x12,0x34,0x56,0x76,0x32] will convert 901234567632 to like syllable sequence.
S24: be split into time sequence number and device code to 12 origin authentication sign indicating number.
S25: when converting to 4 time sequence numbers with the day moon is the time of form.
Like this, the analytical algorithm of the generating algorithm of identifying code and identifying code has become reversible; Certainly, above-mentioned algorithm is the description of embodiment, if use other identifying code generating algorithms and analytical algorithm also should be regarded as belonging to protection scope of the present invention; In addition, consider higher Cipher Strength, can adopt irreversible cipher mode to handle.
Generally be portable terminal intercepting two-dimension code and/or numeral through the user; Need install false proof check program this moment on portable terminal; This false proof check program just is used to resolve two-dimension code and/or numeral merely; Two-dimension code and/or numeral are resolved to identifying code, and the data that send to verification platform are an identifying code.As shown in Figure 5, description be the process of anti-counterfeit recognition verification platform identification identifying code.Verification platform at first through communication module Receipt Validation sign indicating number, resolve and obtain device code and request time then by deciphering module; After the time that the module feedback is correct during the school; Judge again whether request time and device code be legal; Have only when the both is legal, just just from database, pass through the device code data query, obtain the geographical location information at its shops's title and shops place through inspection module; And send it to consumer's portable terminal, otherwise failure information will be sent to consumer's portable terminal.
In the process of anti-counterfeit recognition verification platform identification identifying code, relate to the differentiation algorithm of time validity; Realize as follows: the system time of system time and anti-counterfeit recognition verification platform of considering false proof verifying attachment is possible inconsistent; Time zone and the time zone, anti-counterfeit recognition verification platform place of also considering false proof verifying attachment place are inconsistent, are benchmark with interior and requirement with the UTC time at 30 minutes so allow the system time of false proof verifying attachment and the error of verification platform system time; When verification platform system judgement time validity, it is legal that the absolute value of the difference of request time and system time was all thought smaller or equal to one hour.
The present invention implants the identification display module in false proof verifying attachment; The confidentiality of this module core algorithm and the temporal correlation of realizing the result; Combine the identification checking of software again; Guaranteed the reliability and the security feature of identifying code, also guaranteed reliability, finally realized false proof checking function completely to dummy check equipment to the anti-dummy check of anti counterfeit appts from two aspects of software and hardware.
The above is merely preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of within spirit of the present invention and principle, being done, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. false proof verifying attachment that is used for anti counterfeit appts is characterized in that this device includes at least:
False proof inspection module is the nucleus module of false proof verifying attachment, stores unique identity code, and carries out communication with the identification display module;
The identification display module is used for false proof inspection module is carried out authentication, and after authentication is passed through, this module will be that content is encrypted the generation identifying code with device code and time, then identifying code is exported to carry out follow-up checking;
CPU is connected to false proof inspection module and identification display module, is used to manage false proof inspection module and generates authorization information, and management identification display module generates identifying code, and the control identifying code shows.
2. the false proof verifying attachment that is used for anti counterfeit appts as claimed in claim 1 is characterized in that described identification display module comprises:
The module during school is used to proofread and correct current system time; Its objective is the time (error can not above 30 minutes) within error range that guarantees AES uses in the identification display module time and anti-counterfeit recognition verification platform; Because after anti-counterfeit recognition verification platform decryption verification sign indicating number obtains this time, can be done the check of a validity this time; Thereby realized the ageing of the identification identifying code that display module generated;
Identification module is used for the false proof inspection module of false proof verifying attachment is carried out authentication; The mode of checking can be passed through existing mode, for example certifying digital signature, checking internal agreement, authentication password etc.;
Encrypting module is used for through being that content is encrypted the generation identifying code with device code and time;
Display module, the result data of reception encrypting module and identification module is used for identifying code is resolved to two-dimension code figure or digital mode the line output of going forward side by side.
3. the false proof verifying attachment that is used for anti counterfeit appts as claimed in claim 1 is characterized in that said device also includes display screen, and display screen is used to show the identifying code of representing with two-dimension code figure or digital form after being connected in the identification display module.
4. the false proof verifying attachment that is used for anti counterfeit appts as claimed in claim 1; It is characterized in that said false proof verifying attachment; Also include communication module; Said communication module is connected in CPU, comprises receiving element and transmitting element, receives and send checking request checking data and checking request msg respectively.
5. anti-fake inspection method that is used for anti counterfeit appts is characterized in that this method may further comprise the steps:
The false proof verifying attachment of A, startup electronic product,
Identification display module in B, the false proof verifying attachment generates identifying code,
C, with identifying code with two-dimension code or the numeral form show through display screen;
D, the above-mentioned two-dimension code of intercepting or numeral, and the two-dimension code or the numeral of institute's intercepting sent to verification platform or authentication center;
E, verification platform or authentication center are resolved two-dimension code or numeral, and analysis result is verified; And will verify that the result beams back.
6. like the said anti-fake inspection method that is used for anti counterfeit appts of claim 5, it is characterized in that the intercepting of above-mentioned two-dimension code or numeral, carry out, perhaps carry out through external unit through this false proof verifying attachment.
7. like the said anti-fake inspection method that is used for anti counterfeit appts of claim 5, it is characterized in that the interception way for two-dimension code, false proof verifying attachment at first generates identifying code according to specific algorithm, again identifying code is generated two-dimension code or numeral; During intercepting,,,, then can directly duplicate the data of two-dimension code or numeral and come intercepting if utilize false proof verifying attachment through two-dimension code or digital mode intercepting of taking pictures to showing if utilize other external unit.
8. like the said anti-fake inspection method that is used for anti counterfeit appts of claim 5, it is characterized in that the generating mode of two-dimension code and analysis mode will keep relevance.
9. like the said anti-fake inspection method that is used for anti counterfeit appts of claim 5; It is characterized in that among the step D; Two-dimension code or numeral with institute's intercepting send to verification platform or authentication center while; Also request time is sent to verification platform or authentication center as important data, with the two-dimension code or the digital time that a reality is arranged that guarantee institute's intercepting, this time allows 10-30 minute error.
10. like the said anti-fake inspection method that is used for anti counterfeit appts of claim 9, it is characterized in that on the basis of request time, also allowing to increase a time window, time window is exactly the time span that two-dimension code or numeral keep, and is defined as 10-30 minute; Checking is during request time, comprises that also the checking request time whether in time window, if in the time window scope, judges that request time is legal, if not in the time window scope, judges that then request time is illegal, through checking.
CN2012100471301A 2012-02-28 2012-02-28 Anti-counterfeiting inspection device and anti-counterfeiting method for anti-counterfeiting equipment Pending CN102622631A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012100471301A CN102622631A (en) 2012-02-28 2012-02-28 Anti-counterfeiting inspection device and anti-counterfeiting method for anti-counterfeiting equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012100471301A CN102622631A (en) 2012-02-28 2012-02-28 Anti-counterfeiting inspection device and anti-counterfeiting method for anti-counterfeiting equipment

Publications (1)

Publication Number Publication Date
CN102622631A true CN102622631A (en) 2012-08-01

Family

ID=46562541

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012100471301A Pending CN102622631A (en) 2012-02-28 2012-02-28 Anti-counterfeiting inspection device and anti-counterfeiting method for anti-counterfeiting equipment

Country Status (1)

Country Link
CN (1) CN102622631A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103745353A (en) * 2014-01-23 2014-04-23 福建联迪商用设备有限公司 Electronic payment terminal verification method and system
CN104050574A (en) * 2014-06-18 2014-09-17 广州市婴曼怡贸易有限公司 Anti-fake method and system
CN104102891A (en) * 2013-04-02 2014-10-15 腾讯科技(深圳)有限公司 Information interaction method based on two dimension code, and mobile terminal
WO2015077949A1 (en) * 2013-11-28 2015-06-04 吕润春 Device for anti-counterfeiting inspection of product
CN108647763A (en) * 2018-04-17 2018-10-12 新大陆(福建)公共服务有限公司 Quick Response Code life cycle management method based on memory database and computer equipment
CN109167788A (en) * 2018-09-07 2019-01-08 飞天诚信科技股份有限公司 A kind of personalization method and system of the financial IC card with dynamic verification code
CN109862032A (en) * 2019-03-13 2019-06-07 刘兴丹 A kind of method, apparatus that two-dimensional barcode information is transmitted, forwarded
CN109886006A (en) * 2019-02-28 2019-06-14 尤尼泰克(嘉兴)信息技术有限公司 A kind of information source checking method and device based on two dimensional code
CN109918965A (en) * 2019-03-13 2019-06-21 刘兴丹 The method, apparatus that a kind of text and the two dimensional code page are shown
CN112966533A (en) * 2021-02-26 2021-06-15 陕西科技大学 Two-dimensional code password verification system and method based on multiple data verification
CN114363034A (en) * 2021-12-29 2022-04-15 上海众源网络有限公司 Verification code generation and verification method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101504715A (en) * 2009-03-04 2009-08-12 深圳市众合联科技有限公司 Product identity digital identification apparatus, inspection apparatus, product and anti-fake inspection method
US20090308530A1 (en) * 2006-02-03 2009-12-17 Advanced Track & Trace Procede et dispositif d'authentification
CN201698452U (en) * 2010-07-26 2011-01-05 贵阳高新华美龙技术有限公司 Dynamic anti-counterfeiting code recognizer

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090308530A1 (en) * 2006-02-03 2009-12-17 Advanced Track & Trace Procede et dispositif d'authentification
CN101504715A (en) * 2009-03-04 2009-08-12 深圳市众合联科技有限公司 Product identity digital identification apparatus, inspection apparatus, product and anti-fake inspection method
CN201698452U (en) * 2010-07-26 2011-01-05 贵阳高新华美龙技术有限公司 Dynamic anti-counterfeiting code recognizer

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104102891A (en) * 2013-04-02 2014-10-15 腾讯科技(深圳)有限公司 Information interaction method based on two dimension code, and mobile terminal
WO2015077949A1 (en) * 2013-11-28 2015-06-04 吕润春 Device for anti-counterfeiting inspection of product
CN103745353A (en) * 2014-01-23 2014-04-23 福建联迪商用设备有限公司 Electronic payment terminal verification method and system
CN104050574A (en) * 2014-06-18 2014-09-17 广州市婴曼怡贸易有限公司 Anti-fake method and system
CN104050574B (en) * 2014-06-18 2018-04-27 广州澳滋亚进出口贸易有限公司 A kind of method for anti-counterfeit and its anti-counterfeiting system
CN108647763A (en) * 2018-04-17 2018-10-12 新大陆(福建)公共服务有限公司 Quick Response Code life cycle management method based on memory database and computer equipment
CN109167788A (en) * 2018-09-07 2019-01-08 飞天诚信科技股份有限公司 A kind of personalization method and system of the financial IC card with dynamic verification code
CN109886006A (en) * 2019-02-28 2019-06-14 尤尼泰克(嘉兴)信息技术有限公司 A kind of information source checking method and device based on two dimensional code
CN109862032A (en) * 2019-03-13 2019-06-07 刘兴丹 A kind of method, apparatus that two-dimensional barcode information is transmitted, forwarded
CN109918965A (en) * 2019-03-13 2019-06-21 刘兴丹 The method, apparatus that a kind of text and the two dimensional code page are shown
CN112966533A (en) * 2021-02-26 2021-06-15 陕西科技大学 Two-dimensional code password verification system and method based on multiple data verification
CN114363034A (en) * 2021-12-29 2022-04-15 上海众源网络有限公司 Verification code generation and verification method and device, electronic equipment and storage medium
CN114363034B (en) * 2021-12-29 2024-02-02 上海众源网络有限公司 Verification code generation and verification method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN102622631A (en) Anti-counterfeiting inspection device and anti-counterfeiting method for anti-counterfeiting equipment
US9525549B2 (en) Method and apparatus for securing a mobile application
US20200374129A1 (en) Systems and methods for creating a digital id record and methods of using thereof
CN104765999B (en) Method, terminal and server for processing user resource information
US9864983B2 (en) Payment method, payment server performing the same and payment system performing the same
KR101296137B1 (en) A mobile phone id card security methods and system by the using of qr code
CN107181714B (en) Verification method and device based on service code and generation method and device of service code
JP2019519827A (en) Two-channel authentication agent system and method capable of detecting false alteration of application
CN101765996A (en) Remote Authentication And Transaction Signatures
CN105007274A (en) Mobile terminal-based identity authentication system and method
CN104780043A (en) Access control method and system based on two-dimension code
KR101829730B1 (en) Method for certifying a user by using mobile id through blockchain database, and terminal and server using the same
EP2690840B1 (en) Internet based security information interaction apparatus and method
KR101858653B1 (en) Method for certifying a user by using mobile id through blockchain database and merkle tree structure related thereto, and terminal and server using the same
CN109118377B (en) Processing method and system for claim settlement event based on block chain and electronic equipment
US10158493B2 (en) Solution for generating and issuing security codes with guaranteed issuer authenticity and origin
CN108833431B (en) Password resetting method, device, equipment and storage medium
CN110598433B (en) Block chain-based anti-fake information processing method and device
KR20180013710A (en) Public key infrastructure based service authentication method and system
US20180205714A1 (en) System and Method for Authenticating Electronic Tags
KR20180122843A (en) Methods and system for verifying authenticity of qr code
CN107872321B (en) Electronic identity authentication method and electronic identity terminal equipment
KR20150029664A (en) Payment gateway system using security code based on time stamp, and the operating method thereof
KR101240231B1 (en) A mobile phone id card security system
CN113242242B (en) Block chain application method and block chain application terminal device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120801