CN105024824A - Method for generating and verifying credible label based on asymmetrical encryption algorithm and system - Google Patents

Method for generating and verifying credible label based on asymmetrical encryption algorithm and system Download PDF

Info

Publication number
CN105024824A
CN105024824A CN201510454896.5A CN201510454896A CN105024824A CN 105024824 A CN105024824 A CN 105024824A CN 201510454896 A CN201510454896 A CN 201510454896A CN 105024824 A CN105024824 A CN 105024824A
Authority
CN
China
Prior art keywords
credible
label
information
credible label
tag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510454896.5A
Other languages
Chinese (zh)
Other versions
CN105024824B (en
Inventor
祝国龙
许田
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang code PhD anti-counterfeit technology Co., Ltd.
Original Assignee
祝国龙
许田
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 祝国龙, 许田 filed Critical 祝国龙
Priority to CN201510454896.5A priority Critical patent/CN105024824B/en
Publication of CN105024824A publication Critical patent/CN105024824A/en
Priority to PCT/CN2016/084875 priority patent/WO2017016318A1/en
Application granted granted Critical
Publication of CN105024824B publication Critical patent/CN105024824B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Abstract

The invention provides a method and system for generating and verifying a credible label based on an asymmetrical encryption algorithm. The credible label is generated according to credible label original information, a label identifier, a commodity identifier, the public key information of the asymmetrical encryption algorithm, digital certificate information, digital signature information and credible time stamp or credible identity time stamp information. When the credible label needs to be used or verified, the credible label generation time and the validity and integrity of content are ensured by verification of the credible time stamp or credible identity time stamp information in the credible label; the identity of a credible label owner is authenticated by verification of the validity of a digital certificate in the credible label or the legality of a public key; the integrity of credible label content is determined by verification of the digital signature in the credible label; and an anti-counterfeiting function of a commodity is implemented by verification of the uniqueness of the label identifier and the uniqueness of the commodity identifier.

Description

Based on the generation of the credible label of rivest, shamir, adelman and verification method and system
Technical field
The present invention relates to cryptography, computer network security and product false proof field, specifically, The present invention gives a kind of generation of the credible label based on rivest, shamir, adelman and verification method and system.
Background technology
Rivest, shamir, adelman is a kind of time slot scrambling of key.Rivest, shamir, adelman needs two keys: public-key cryptography (publickey) and private cipher key (private key).Public-key cryptography and private cipher key are a pair, if be encrypted data with public-key cryptography, only had and could decipher with corresponding private cipher key; If be encrypted data with private cipher key, so only had and could decipher with corresponding public-key cryptography.Because encryption and decryption use two different keys, this algorithm is called rivest, shamir, adelman.
The cryptographic system (Identity-Based Cryptograph is called for short IBC) of identity-based mark is a kind of asymmetrical public key cryptography system.The Objective Concept Shamir of id password proposed in 1984, and its main viewpoint is the not certificate of necessity in system, uses the mark of user if name, IP address, E-mail address, phone number etc. are as PKI.The private key of user is calculated according to system master key and user ID by key generation centre (Key Generate Center is called for short KGC).The PKI of user is uniquely determined by user ID, thus user does not need third party to ensure the authenticity of PKI.
Conbined public or double key CPK (Combined Public Key) is a kind of universal method become by existing public key system based on the public key system identified, by setting up the framework of science, many algorithms is combined dexterously, achieve the secret generating based on mark, the digital signature based on mark and cipher key change can be supported.The well-known information security of China and cryptographist Nan Xianghao teach the conception proposing CPK combined public-key scheme in 1999, and the externally formal announcement in 2003.
PKI (Public Key Infrastructure) i.e. " PKIX ", that a kind of PKI concept and technology are implemented and provide the security infrastructure with universality of security service, it is a kind of key management platform following written standards, it can provide encryption and the cryptographic service such as digital signature and necessary key and certificate management system for all-network application, in simple terms, PKI is exactly the infrastructure providing security service utilizing PKI theory and technology to set up.PKI technology is the core of information security technology, is also key and the basic technology of ecommerce.
PKI technology adopts certificate management PKI, by third-party trusted authorities-CA (Certificate Authority) authentication center, other identification informations of the PKI of user and user is bundled, the identity of authentication of users on the internet.At present, general way adopts the digital certificate be based upon on PKI basis, by the digital information that will transmit being encrypted and signing, and confidentiality, authenticity, integrality and non-repudiation that guarantee information is transmitted, thus the safe transmission of guarantee information.PKI is based on public key algorithm and technology, for Internet communication provides the infrastructure of security service, is the aggregate creating, issue, manage, nullify all softwares involved by public key certificate, hardware.Its core element is digital certificate, and core executor is ca authentication mechanism.
The basic comprising parts such as the necessary authoritative digital certificate authentication center of tool (CA) of complete PKI system, digital certificate storehouse, cipher key backup and recovery system, certificate calcellation system, application interface (API), build PKI and also will set about building round this five big systems.The basic technology of PKI comprises encryption, digital signature, data integrity mechanism, digital envelope, dual digital signature etc.Typical case, complete, an effective PKI application system at least should have with lower part:
Public key certificate manages.
The issue of blacklist and management.
The backup of key and recovery.
Automatic more new key.
Automatic management history key.
Support cross-certification.
Digital signature, also public key digital signature is claimed, refer to and be attached to one group of specific symbol in a certain electronic document or code, it utilizes mathematical method and cryptographic algorithm carry out key message extraction to this electronic document and are encrypted and are formed, for identification issuer identity and sign originator to the accreditation of electronic document, and person can be received be used for verifying whether this electronic document is tampered or forges in transmitting procedure.Digital signing operations detailed process is as follows: transmit leg does digital digest to signed e-file (claiming electronic message in Electronic Signature Law) with hash algorithm, again asymmetric encryption is done to digital digest signature private key, namely digital signature is done, be the PKI of above signature and e-file original text and signing certificate is added together form signature result and send to debit afterwards, treat that debit verifies.After recipient receives data, first the public key decryptions digital signature of transmit leg is used, derive digital digest, and same hash algorithm is done to e-file original text, obtain a new digital digest, the cryptographic Hash that two are made a summary is carried out results contrast, if result is identical, signature is verified, otherwise it is invalid to sign.
Digital certificate, be again " digital ID card ", " digital ID ", provided by authentication center and authenticated center CA digital signature, comprise a kind of e-file of public-key cryptography owner and public-key cryptography relevant information, can be used for proving the true identity of digital certificate holder.The simplest certificate comprises the digital signature of public-key cryptography, title and a certificate authority.Generally also comprise the effective time of key in certificate, the title of licence issuing authority (certificate authority), the information such as the sequence number of this certificate, the form of certificate follows ITUT X.509 international standard.
HASH, i.e. hash, also claim Hash, not only the input of random length (but also being called preliminary mapping, pre-image), by HASH algorithm, be transformed into the output of regular length, this output is exactly HASH value (also known as digital digest).This conversion is a kind of compressing mapping, and namely the space of hash HASH value is usually much smaller than the space of input, and different inputs may generate identical output, but can not carry out unique determination input value from hashed value.
Trusted timestamp be by authoritative trusted timestamp service centre according to international time one of stabbing that standard " RFC3161 " signs and issues can prove electronic message (e-file) a time point be that existed, complete, can verify, possesses the electronic certificate of legal effect, trusted timestamp is mainly used in e-file anti-tamper and deny afterwards, determines the correct time that e-file produces.Trusted timestamp (time-stamp) is a voucher document formed after encryption, and it comprises three parts:
(1) digital digest (digest) of the file that need add timestamp;
(2) trusted timestamp server receives the date and time of file;
(3) digital signature (generating according to (1) and (2) content) of trusted timestamp server.
X.500 be the directory standard defined by international standard committee ISO (Internetional Standards Organization), include from X.501 to a series of catalogue data service such as X.509.Agreement for X.500 client computer and server communication is DAP (Directory Access Protocol).X.500 there is important effect to PKI, it define the scheme of data storage and access in PKI system, use at the LIST SERVER access entrance place of PKI system standardized method to complete the memory access of the data structure such as certificate and certificate revocation list.
LDAP (Lightweight Directory Access Protocol) is the simple version produced in X.500 standard base, it is a subset of X.500 directory access protocol DAP in standard, simplify complete X.500 practical function, and extend the support to ICP/IP protocol system.
Quick Response Code, also known as two-dimensional bar code, the chequered with black and white graphic recording data symbol information that distributes in plane (two-dimensional directional) according to certain rules with certain specific geometric figure, coding utilizes the concept of " 0 ", " 1 " bit stream forming computer-internal logical foundations dexterously, the geometrical body using several corresponding with binary system, to represent word numerical information, is processed to realize information automatically by image input device or photoelectric scanning device automatically identifying and reading.It has some general character of barcode technology: often kind of code system has its specific character set; Each character occupies certain width; There is certain verifying function etc.Also have simultaneously and the features such as change are rotated to the information automatic identification function of different rows and processing graphics.Conventional code system has: Data Matrix, MaxiCode, Aztec, QR Code, Vericode, PDF417, Ultracode, Code 49, Code 16K etc.
Error correction coding: on demand by code word data sequence piecemeal, and according to the code word of error-correction level and piecemeal, produce error correction code word, and error correction code word is joined after code word data sequence, becomes a new sequence.
When Quick Response Code specification and error-correction level are determined, in fact it can hold code word sum and error correcting code number of words also just determine, such as: version 10, when error-correction level is H, altogether can hold 346 code words, wherein 224 error correction code words.In other words in two-dimension code area, the code word of about 1/3 is redundancy.For these 224 error correction code words, it can correct 112 substitute mistake (as confuse right and wrongs) or 224 refuse read error (cannot read or cannot decoding), such error correction capability is: 112/346=32.4%
RFID (Radio Frequency Identification), i.e. radio-frequency (RF) identification, also known as electronic tag, is a kind of contactless automatic identification technology.It is by the specific target of radio signals identification, and the data that read-write is relevant, and do not need recognition system and this target to have machinery or optical contact.Each RFID label tag has unique electronic code.
NFC (Near Field Communication), i.e. wireless near field communication is initiated by PHILIPS Co., combined the wireless technology promoted mainly by the well-known manufacturer such as Nokia, Sony.NFC is developed by non-contact radio-frequency identification (RFID) and the Technology Integration that interconnects, combining induction card reader, induction type card and point-to-point function on one chip, can carry out identifying and exchanges data with compatible equipment in short distance.This technology is the simple merging of RFID technique and network technology at first, and developed into a kind of short-distance wireless communication technology now, developing state is quite rapid.
Credible label described in this patent refers to limited storage space, and carry the graphical label of anti-tamper and anti-repudiation information, digital label or chip tag, the information carried in this label has carried out signature authentication or encryption by asymmetric encryption techniques method, its form of expression can be Quick Response Code, RFID label tag, NFC label, electronic tag, chip tag, sensor tag etc.
Along with the development of computer security technique, rivest, shamir, adelman is at home and abroad widely used.But the technology of this maturation is never used to the safety issue properly settling the label such as Quick Response Code or NFC, the problem of one of them essence is because the intrinsic information storage space of the labels such as Quick Response Code, RFID label tag or NFC label is extremely limited, cannot comprise for ensureing safe complete digital certificate, digital signature, timestamp again while the more raw information of carrying, or other asymmetric encryption information, therefore the distribution problem of described authorization information can not be solved, just described asymmetric encryption techniques cannot be applied.In this patent, we have proposed the method properly settling described distribution problem.
Traditional anti-counterfeiting technology comprises Laser Holographic Counterfeit-proof Technique, chemical ink anti-counterfeiting technology, latent image anti-counterfeiting technology, micro anti-counterfeiting technology etc.These existing technology do not possess uniqueness and exclusivity, are easily replicated thus cannot to realize truly false proof.Also occurred that some are by realizing false proof technological means to Quick Response Code or radio-frequency (RF) tag encryption at present, but the encryption of anti-counterfeiting information of the prior art is realized by the privately owned technology of publisher, therefore different publishers needs to verify with different equipment or software, cause Authentication devices or software cannot generalization, and fail safe also can not be guaranteed, thus the promotion and application of these anti-counterfeiting technologies are made to be subject to great restriction.
Summary of the invention
The object of the present invention is to provide a kind of generation of credible label and verification method and system, be intended to solve prior art poor stability, realize complicated, the problems such as cost is high, poor universality.
Propose in the present invention directly digital certificate to be embedded to realize the distribution problem of certificate in credible label, therefore authentication module can obtain the digital certificate of credible label owner easily, thus utilizes digital signature to realize the anti-tamper object of label substance.In addition, according to the different purposes of digital certificate, CA can specify the different terms of validity when signing and issuing digital certificate.When after digital certificate expires, CA will no longer ensure the authenticity of its content information, and therefore expired digital certificate is invalid, incredible.For some reason, to leak as private key for user or the identity of the user initiative that changes abolishes former certificate, thus digital certificate lost efficacy to cause CA to announce.These factors constrain the term of validity of credible label.This patent introduces Digital Time-stamp in credible label, is used for proving the Production Time of credible label, thus efficiently solves this defect.Because digital signature and timestamp can guarantee information integrality thus reach anti-tamper object, therefore in specific implementation, the anti-tamper of content such as the network address of label raw information, tag identifier and commodity sign, authentication server can be realized by digital signature and timestamp simultaneously, also can respectively by both one of realize.
Credible label owner needs the digital certificate for oneself to pay the annual fee of great number every year, therefore in order to reduce the cost of credible label owner, proposes the scheme exempting from digital certificate in the present invention, or the unsymmetrical key using label owner oneself to generate.The public-key cryptography of credible label owner and private cipher key can be generated by three kinds of approach: 1) generate public-key cryptography and private cipher key by the key generation centre (KGC) of IBC, can using the identify label of credible label owner if the information such as Business Name, IP address, E-mail address, phone number are as public-key cryptography; 2) public-key cryptography and private cipher key is generated by the key generation centre of CPK, can using the identify label of credible label owner if the information such as Business Name, IP address, E-mail address, phone number be as the user ID generating key; 3) public-key cryptography and private cipher key is generated by unsymmetrical key Core Generator, and public-key cryptography and identity information are kept in the public-key cryptography storehouse in this locality or high in the clouds, by whether there is the validity that the disclosure key verifies public-key cryptography in retrieval public-key cryptography storehouse.In order to prevent credible label substance to be tampered, private cipher key, relevant parameter that credible label owner utilizes above-mentioned three kinds of methods to generate, and the content of signature algorithm to credible label is signed.Because by the signature that private cipher key obtains, can only could be verified by corresponding public-key cryptography, thus ensure that authenticity and the non repudiation of owner's identity of credible label.
In order to simplify generation and the checking of credible label, and conveniently do not have the credible label owner of digital certificate to generate credible label, this patent proposes trusted identity timestamp on the basis of trusted timestamp.Be with the different characteristic of traditional trusted timestamp, trusted identity timestamp adds identity information, is namely made up of four parts:
(1) digital digest (digest) of the file that need add timestamp;
(2) identity information through certification of the owner of the file that need add timestamp;
(3) trusted timestamp server receives the date and time of file;
(4) digital signature (according to (1), (2) and (3) content generates) of trusted timestamp server.
Compared with trusted timestamp, trusted identity timestamp not only can be used for e-file anti-tamper and deny afterwards, determines the correct time that e-file produces, and can verify the trusted identity of e-file owner.Therefore, trusted identity timestamp is not only applicable to credible label, is applicable to the e-file of other form yet, as electronic contract, and electronic insurance policy, electronic invoice etc.
In order to save the expense of credible label and solve the defect of credible label intrinsic information limited space, can with the network storage address of label information element (network address etc. as label raw information, digital certificate, digital signature, tag identifier, commodity sign, public key information, timestamp, authentication server) or the complete content replacing label information element for the Query Information of Query Database, obtained the complete content of label information element when verifying label by web download or Query Database, or directly verify beyond the clouds.
Because digital signature and timestamp can guarantee information integrality thus reach anti-tamper object, therefore in specific implementation, the anti-tamper of label information element (network address etc. as label raw information, digital certificate, digital signature, tag identifier, commodity sign, public key information, timestamp, authentication server) content can be realized by digital signature and timestamp simultaneously, also can respectively by both one of realize.
As shown in Figure 5, when high-resolution patterned credible label the first impression, republish with copying and printing time, because printed resolution is lower than the output resolution ratio required by credible label graphic, therefore can produce information dropout.Therefore, be replicated to prevent the credible label of graphic form, can by adjusting resolution and the printed dimensions of the credible label generated, the picture making the credible label obtained after republishing or copying or the digital information that comprises different, thus by the picture that compares verified label or whether consistent with the information of the credible label of the first impression of the preserving object reaching credible label anti-copying of digital information comprised; Also can by adjusting resolution and the printed dimensions of the credible label generated, although the label making the first impression obtain creates the loss of information or the mistake of information, but still can correctly be distinguished by error correction, but lose more information by the label copying the described first impression or introduce more mistake, to such an extent as to exceeded the error correcting capability of credible label to such an extent as to cannot correctly distinguish, thus reach the object of credible label anti-copying; In order to avoid duplicator to evade the loss of printing information by amplifying the method for credible label graphic, the dimension information of the credible label of the first impression can be comprised in credible label, and digital signature is carried out to prevent from being tampered to described size, when verifying credible label, by the dimension information comprised in the printed dimensions of more current credible label and label, realize the object of credible label anti-copying.
Specifically, the present invention discloses a kind of generation and verification method of the credible label based on rivest, shamir, adelman, comprises the following steps:
Step one: raw information is set to credible tag format;
Step 2: credible tag encryption protocol module is set;
Step 3: according to raw information and the believable credible label of credible tag encryption protocol module generation encryption of credible tag format;
Step 4: when verifying credible label, by verifying credible tag encryption protocol module, determines integrality and the non-repudiation of credible label raw information, and the authenticity of credible label owner identity and non repudiation;
Described credible tag encryption protocol module comprises digital certificate information and digital signature information; Can beacon in step 4 checking
When signing cryptographic protocol module, by verifying that the validity of the digital certificate information in credible label examines credible label owner
Identity, determined the integrality of credible label raw information by the digital signature information verifying in credible label.
Based on generation and the verification method of the credible label of rivest, shamir, adelman, comprise the following steps:
Step one: raw information is set to credible tag format;
Step 2: credible tag encryption protocol module is set;
Step 3: according to raw information and the believable credible label of credible tag encryption protocol module generation encryption of credible tag format;
Step 4: when verifying credible label, by verifying credible tag encryption protocol module, determines integrality and the non-repudiation of credible label raw information, and the authenticity of credible label owner identity and non repudiation;
Described credible tag encryption protocol module comprises digital certificate information, digital signature information, trusted timestamp or credible
Identity timestamp information; When step 4 verifies credible tag encryption protocol module, by verifying the numeral in credible label
The identity of the credible label owner of validity certification of certificate information, true by verifying the digital signature information in credible label
The integrality of the raw information of fixed credible label, by verifying trusted timestamp in credible label or trusted identity time
Stamp information guarantees the integrality of credible label rise time and content.
Based on generation and the verification method of the credible label of rivest, shamir, adelman, comprise the following steps:
Step one: raw information is set to credible tag format;
Step 2: credible tag encryption protocol module is set;
Step 3: according to raw information and the believable credible label of credible tag encryption protocol module generation encryption of credible tag format;
Step 4: when verifying credible label, by verifying credible tag encryption protocol module, determines integrality and the non-repudiation of credible label raw information, and the authenticity of credible label owner identity and non repudiation;
Described credible tag encryption protocol module comprises trusted identity timestamp information; At the credible tag encryption protocol module of checking
Time, by verifying the trusted identity timestamp information in credible label, guarantee the complete of credible label rise time and content
Whole property, and the identity of the credible label owner of certification.
Based on generation and the verification method of the credible label of rivest, shamir, adelman, comprise the following steps:
Step one: raw information is set to credible tag format;
Step 2: credible tag encryption protocol module is set;
Step 3: according to raw information and the believable credible label of credible tag encryption protocol module generation encryption of credible tag format;
Step 4: when verifying credible label, by verifying credible tag encryption protocol module, determines integrality and the non-repudiation of credible label raw information, and the authenticity of credible label owner identity and non repudiation;
Described cryptographic protocol module comprises public key information and digital signature information;
When verifying credible tag encryption protocol module, examine the true of label owner identity by checking public key information
Property and non repudiation, determine the integrality of credible label raw information by the digital signature information verifying in credible label
And non repudiation.
Based on generation and the verification method of the credible label of rivest, shamir, adelman, comprise the following steps:
Step one: raw information is set to credible tag format;
Step 2: credible tag encryption protocol module is set;
Step 3: according to raw information and the believable credible label of credible tag encryption protocol module generation encryption of credible tag format;
Step 4: when verifying credible label, by verifying credible tag encryption protocol module, determines integrality and the non-repudiation of credible label raw information, and the authenticity of credible label owner identity and non repudiation;
Described credible tag encryption protocol module comprises public key information, digital signature information, trusted timestamp or credible
Identity timestamp information;
When verifying credible tag encryption protocol module, examine the true of label owner identity by checking public key information
Property and non repudiation, determine the integrality of credible label raw information by the digital signature information verifying in credible label
And non repudiation, can beacon by verifying that trusted timestamp in credible label or trusted identity timestamp information are guaranteed
Sign the integrality of rise time and content.
Public key information in described credible label, the identity according to the credible label owner of following method validation:
If A. public-key cryptography and private cipher key are generated by the key generation centre of identity-based id password system (IBC), then described public key information comprises the parameter information of public-key cryptography and certifying signature, or comprise the network address information storing public key information, or comprise for the Query Information of inquiry packet containing the database of public key information; If the digital signature authentication in credible label is passed through, then prove that public-key cryptography is legal, the identity also just demonstrating credible label owner is credible;
If B. public-key cryptography and private cipher key are generated by the key generation centre of Conbined public or double key management system (CPK), then described public key information comprises PKI matrix and mapping algorithm, or comprise the network address information storing public key information, or comprise for the Query Information of inquiry packet containing the database of public key information; If the digital signature authentication in credible label is passed through, then the entity identification comprised in attestation-signatures is legal, and the identity also just demonstrating credible label owner is credible;
If C. public-key cryptography is the common key not comprising identification information, and be not included in digital certificate, then described public key information comprises public-key cryptography, or comprise the network address information storing public key information, or comprise for the Query Information of inquiry packet containing the database of public-key cryptography, the public-key cryptography storehouse of inquiry in this locality or cloud server is needed when verifying public-key cryptography legitimacy
If the digital signature authentication existed in public-key cryptography storehouse in described public-key cryptography and credible label is passed through, then think that the identity of credible label owner is credible, otherwise insincere;
If the private cipher key that public-key cryptography is corresponding has leaked or lost efficacy, then in the public-key cryptography storehouse in local or high in the clouds, delete corresponding public key information; Signature or cryptographic algorithm can be included in public key information, also can be stored in this locality or high in the clouds;
If D. public-key cryptography is included in the digital certificate of signature, the identity of certification is credible label owner uses the method for described C; If public-key cryptography is included in the digital certificate that authentication center CA signs and issues, then described public key information comprises digital certificate information, or comprise the network address information storing digital certificate information, or comprise for the Query Information of inquiry packet containing the database of digital certificate information, if digital certificate authentication passes through, and the digital signature authentication in credible label is passed through, then the identity of credible label owner is credible, otherwise insincere.
Described trusted identity timestamp, to from the precise date of authoritative time source and time by trusted identity time stamp server, according to the digital digest that credible label raw information generates, through the identity information of the credible label owner of examination & verification, carry out digital signature and generate.
If credible label is a kind of graphical label, because output resolution ratio=image resolution ratio ÷ output image size, so by adjusting the resolution of credible label and the printed dimensions of credible label that generate, make the output resolution ratio of requirement higher than the output resolution ratio of actual printing equipment, the picture making the credible label obtained after republishing or copying or the digital information difference comprised, thus by the picture that compares verified label or whether consistent with the information of the credible label of the first impression of the preserving object reaching credible label anti-copying of digital information comprised,
If credible label has error correcting capability, then can adjust the graphics resolution of credible label and the printed dimensions of credible label, make the output resolution ratio of requirement higher than the output resolution ratio of actual printing equipment, therefore each printing all will introduce new misprint, make the mistake produced during the first impression not exceed level of error correction set by credible label, therefore still correctly can be distinguished by successful correction; But when again being printed by the credible label graphic copying the first impression, because introduce more misprint thus exceed the level of error correction set by credible label, therefore this credible label copied cannot correctly be distinguished, thus realize the anti-copying of credible label;
If credible label is a kind of graphical label of anti-copying, then can comprise label sizes information in the label, when verifying credible label, determine whether graphical label is replicated and revises by the size of nominal in the full-size(d) of comparison current Graphics label and label.
Comprise credible tag identifier in the raw information of described credible label, be one for identifying unique coding of a credible label;
Comprise commodity sign in the raw information of described credible label, be one for identifying unique coding of commodity;
If a credible label can be replicated, then need when each credible label comprising credible tag identifier is verified first, record checking event information in authentication module or background server, thus evade same credible label and be reused, in addition in order to realize the repeatedly fake certification to commodity, need on these part commodity, use multiple credible label with the Unique Product mark of these commodity, wherein each credible label has the commodity sign of these identical part commodity and tag identifier unique separately, in addition, because these are credible, label can be replicated, so each credible label is secret (as increased cover layer) before checking first,
If a credible label is not reproducible (as chip tag has unique not reproducible ID, then can using the part of this information as tag identifier or tag identifier, thus ensure uniqueness and the non-reproduction of this credible label), so namely the label comprising certain part commodity sign may be used for the false proof of these part commodity, and do not need to do any secrecy processing to this credible label before verifying first;
If the tag identifier of a credible label is not reproducible and other content of label can be written, then this label can record and reclaim after commodity are used in background program, then re-write false proof for another part commodity of new commodity sign, thus reduce false proof cost;
If do not wish that credible label is reused, then credible label and commodity can be made to bind, when commodity are used, credible tags from merchandise peeled off and destroyed.
The effective storage life of this label can be comprised in the raw information of described credible label, when verifying credible label, whether simultaneous verification current time is in the effective storage life of this label, if current time is not in the effective storage life of this label, then this credible label is insincere.
If comprise digital certificate information in credible label, then, when being verified, in display module, show digital certificate information, thus facilitate verifier to understand the identity information of credible label owner and the issuer information of digital certificate;
If comprise timestamp information in credible label, then when being verified in display module Presentation Time Stamp information, thus facilitate verifier to understand the rise time of credible label;
If comprise trusted identity timestamp in credible label, then show trusted identity timestamp information when being verified, thus facilitate verifier to understand the rise time of credible label, and the identity information of credible label owner;
If successful acquisition is to the time t2 that this is verified and positional information P2, and the time t1 of good authentication last time and positional information P1, then calculate displacement R=(P2 – P1) and the time difference T=(t2 – t1) of twice checking, and obtain speed V=R/T, if the value of speed V exceedes the early warning speed (as 100 kilometers per hour) of setting, then produce warning information at display module or high in the clouds, represent during this checking and checking last time, verify that label runs more than the speed of V, according to the actual conditions of verified label and the size of speed V, can detect whether verified label is replicated to a certain extent.
A. described credible label comprise following one of at least:
A. complete digital certificate content;
B. the partial content of digital certificate;
C. the network storage address of digital certificate;
D. digital certificate library information;
E. digital certificate LIST SERVER information;
F. complete digital certificate chains;
G. the network storage address of digital certificate chains;
H. the Query Information of the database of digital certificate or digital certificate chains is contained for inquiry packet;
I. complete digital signature;
J. the network storage address of digital signature;
K. for the Query Information of inquiry packet containing the database of digital signature;
L. complete public key information;
M. the network storage address of public key information;
N. for the Query Information of inquiry packet containing the database of public key information;
O. the tag identifier of credible label;
P. the commodity sign of credible label;
Q. the term of validity of credible label;
R. complete credible label raw information;
S. the HASH value of credible label raw information;
T. the network storage address of credible label raw information;
U. for the Query Information of inquiry packet containing the database of raw information;
V. the identity information of credible label owner;
W. the network address of credible label authentication server;
If B. described credible label comprises the network storage address of digital certificate or digital certificate chains, by web download digital certificate when verifying credible tag encryption protocol module;
If C. described credible label comprises the information of digital certificate storehouse or LIST SERVER, then by web download or enquiring digital certificate when verifying credible tag encryption protocol module;
If D. described credible label comprises the network storage address of public key information, by web download public key information when verifying credible tag encryption protocol module;
If E. described credible label comprises the network storage address of digital signature, then by web download digital signature when verifying credible tag encryption protocol module;
If F. described credible label comprises the network storage address of trusted timestamp or trusted identity timestamp, then by web download trusted timestamp or trusted identity timestamp when verifying credible tag encryption protocol module;
If comprise the identity information of credible label owner in G. described credible label raw information, then can verify that whether the identity of credible label owner is credible further by the identity information in comparison credible label raw information, the identity information in digital certificate, the identity information in trusted identity timestamp when verifying credible label;
Download and the checking of H. described credible label information may operate in this locality of authentication module, also may operate in high in the clouds;
I. described raw information can be expressly, also can through encryption;
J. described raw information can be label original contents, or the HASH value of original contents, or the network storage address of original contents, or for the Query Information of inquiry packet containing the database of original contents;
If K. described credible label has full stop represent that raw information terminates, then can credible tag encryption protocol module be placed on after this full stop;
L. described credible label is the form of printing or electronics;
M. described credible label is Quick Response Code, or self-defining pattern, or RFID label tag, or NFC label, or electronic tag, chip tag, or sensor tag.
An Antiforge system for credible label, comprises unsymmetrical key or digital certificate generating center, credible tag encryption protocol module storage server, the generation of credible label and Authentication devices and credible label authentication server, it is characterized in that:
Unsymmetrical key or digital certificate generating center, generate digital certificate or unsymmetrical key for giving credible label owner; Credible tag encryption protocol module storage server, for storing the credible tag encryption protocol module information of credible label owner, comprise public key information, or digital certificate information, or digital signature information, or trusted timestamp or trusted identity timestamp information;
Credible label authentication server, for the details of the checking event and anti-counterfeit commodities that record credible label, also may be used for the authentication module performing credible label, realizes high in the clouds checking;
Generation and the Authentication devices of credible label comprise:
Trusted timestamp generation module, generates digital digest according to credible label substance, and to described trusted timestamp server application trusted timestamp, and described trusted timestamp is inputted credible tag generation module;
Trusted identity timestamp generation module, generates digital digest according to credible label raw information, and to described trusted identity time stamp server application trusted identity timestamp, and described trusted identity timestamp is inputted credible tag generation module;
The tag identifier generation module of credible label, for each label generates unique tag identifier;
The commodity sign generation module of credible label, for every part commodity generate unique commodity sign;
Unsymmetrical key generation module, for label owner generates oneself private cipher key and public-key cryptography;
Credible tag generation module, according to credible label raw information or tag identifier or commodity sign or the label term of validity or public key information or digital certificate information or digital signature information or trusted timestamp or trusted identity timestamp information, generate credible label;
Credible tag readable degree module, extracts the digital certificate information be verified in credible label, and is outputted to digital certificate authentication module; Extract the digital signature be verified in credible label, and outputted to digital signature authentication module; Extract the trusted timestamp be verified in credible label, and outputted to trusted timestamp authentication module; Extract the trusted identity timestamp be verified in credible label, and outputted to trusted identity timestamp verification module; Extract the tag identifier be verified in credible label, and outputted to tag identifier authentication module; Extract the commodity sign be verified in credible label, and outputted to commodity sign authentication module;
Digital certificate authentication module, checking digital certificate information confirms the authenticity of credible label owner identity;
Digital signature authentication module, certifying digital signature confirms the integrality of credible label substance;
Trusted timestamp authentication module, checking trusted timestamp confirms the integrality of credible label substance and the rise time of credible label;
Trusted identity timestamp verification module, the trusted identity timestamp described in checking confirms the integrality of credible label substance, the rise time of credible label, and the authenticity of credible label owner identity;
The tag identifier authentication module of credible label, inquire about this tag identifier in local or credible label authentication server and whether have checking record, if verify first, then on this locality or authentication server, record the information of this checking event, otherwise return the checking event information existed;
The commodity sign authentication module of credible label, this locality or credible label authentication server is recorded this checking event information of this commodity sign, and returns the checking event information existed;
Credible label the result display module, the digital certificate information after display is verified, or credible label rise time, or verify event information and merchandise news accordingly.
Credible tag encryption protocol module storage server is X.500 LIST SERVER, or ldap directory server, or Web server, or ftp server, or dns server, or cloud storage server;
Credible label authentication server has the data server recording credible label checking event, commodity purchasing event, commodity details;
Credible label authentication server can perform credible label authentication module (comprising digital certificate authentication module or digital signature authentication module or trusted timestamp authentication module or trusted identity timestamp verification module or tag identifier authentication module or commodity sign authentication module etc.), thus realizes the high in the clouds checking of credible label.
Compared with prior art, tool has the following advantages and beneficial effect in the present invention:
(1) the credible label that the present invention generates can distribute the digital certificate of credible label owner easily, and can realize off-line verification;
(2) the present invention utilizes timestamp effectively to extend the useful life of credible label, even if the digital certificate of credible label owner lost efficacy, but the credible label made before Certificate Revocation still can continue to use;
(3) the present invention embeds trusted identity timestamp information in credible label, not only ensure that integrality and the non repudiation of credible label, and also ensure that the genuine and believable of credible label owner identity.Therefore, credible label owner need not go to apply for digital certificate to generate credible label, thus reduces costs.And also can support the credible label of off-line verification;
(4) the present invention uses the key based on mark to replace digital certificate, thus eliminates the expense applying for and safeguard digital certificate;
(5) the present invention adds unique credible tag identifier in credible label, thus avoids same credible label to be reused;
(6) the present invention adds unique commodity sign in credible label, and guarantees same commodity use identical commodity sign, thus realizes the repeatedly fake certification to same commodity;
(7) the present invention is by recycling not reproducible credible label, thus can reduce false proof cost;
(8) the present invention adds the term of validity of credible label in credible label, thus it is ageing that credible label is provided with;
(9) the present invention can show digital certificate information in credible label the result display module, credible label rise time information, and the identity information of credible label owner, the proving time first of commodity, the information of tracing to the source in detail such as the production of commodity and logistics;
(10) the present invention is by utilizing the network storage address of label information element (as label raw information, digital certificate, digital signature, tag identifier, commodity sign, public key information etc.) or replacing the complete content of label information element for the Query Information of Query Database, achieve the object of saving credible label expense, thus make technical scheme of the present invention ideally solve the less defect in some label intrinsic information space;
(11) the present invention is by adjusting the resolution of patterned credible label and the size of output pattern that generate, the picture making the credible label obtained after republishing or copying or the digital information comprised different from the credible label that the first impression obtains, or the credible label making the credible label of the first impression correctly distinguish and copy cannot be distinguished, thus reaches the object of patterned credible label anti-copying; And in credible label, contain the dimension information of graphical label, thus prevent the figure of credible label be exaggerated copy.
In particular, the present invention is in order to realize the goal of the invention of simply distributing the digital certificate of credible label owner, in the generation adopted and verification method and system, when generating credible label, directly the digital certificate of label owner is embedded credible label, not only solve credential distribution problem, and the off-line verification of credible label can be realized.In order to make credible label can comprise more raw information, can the digital certificate content of an embedded part, or the network storage address of digital certificate, or for the Query Information of enquiring digital certificate database, thus realize the distribution of digital certificate.
The present invention is in order to solve the Problem of Failure of digital certificate, in the generation adopted and verification method and system, trusted timestamp is introduced when generating credible label, anti-tamper and while denying at the credible label of guarantee afterwards, also determine the correct time of credible forming label.Therefore, when digital certificate expired or lost efficacy time, can verify that whether credible label still credible according to the Production Time of credible label.Such as, although digital certificate is expired, credible label generates in the term of validity of digital certificate, and so credible label is still credible.
In order to reduce the cost of credible label owner and simplify the object of credible label anti-counterfeit, in the generation adopted and verification method and system, propose a kind of novel trusted timestamp with identity information.Compared with trusted timestamp, trusted identity timestamp is through to be signed and issued after applicant's identity is examined at authoritative time-stamping service center.Therefore, trusted identity timestamp be one can prove e-file be through the applicant that examines a time point just existed, complete, can verify, the valid electronic certificate of tool.After credible label owner applies for trusted identity timestamp, when not possessing digital certificate, still can generate believable credible label.
The cost that the present invention applies for reduce or remit credible label owner and safeguards digital certificate, in the generation adopted and verification method and system, when generating credible label, digital certificate information is replaced with the public key information of label owner, namely directly public key information, or the network storage address of public key information, or be embedded in credible label for the Query Information of inquiry packet containing the database of public key information.By the identify label in checking public-key cryptography or signature, or whether retrieval public-key cryptography is present in the validity verifying public-key cryptography in the public-key cryptography storehouse in this locality or high in the clouds, and verifies the identity information of credible label owner.
The present invention reuses in order to avoid credible label, in the generation adopted and verification method and system, a unique tag identifier is added in each credible label, and to verifying that event carries out record first on authentication server, comprise checking Time To Event, the IP address of verifier, the geographical location information etc. residing for verifier.
The present invention is in order to realize the repeatedly fake certification to same commodity, and in the generation adopted and verification method and system, for the multiple credible label that same commodity use arranges identical commodity sign, and this commodity sign is that these part commodity are exclusive.
The present invention is in order to reduce the use cost of credible label, in the generation adopted and verification method and system, if the tag identifier of credible label is not reproducible (as RFID has not revisable unique electronic code, this coding can be used as the mark of credible label or a part for credible tag identifier), then when after merchandise sales, can reclaim and after revising the database of authentication server, reuse this credible label, thus realize recycling.
The present invention has certain ageing to meet the credible label of some application scenarios requirement, in the generation adopted and verification method and system, adds term of validity information, thus ensure that credible label can only be verified in this term of validity in credible label.
The present invention conveniently verifier uses credible label, in the generation adopted and verification method and system, the identity information of the owner of credible label, digital certificate information, the credible label rise time, the proving time first of commodity, the details such as the production of commodity and logistics are presented at authentication module, thus guarantee that credible label verifier understands the relevant information of credible label and commodity in detail.
The present invention is by utilizing the network storage address of label information element (as label raw information, digital certificate, digital signature, tag identifier, commodity sign, public key information etc.) or replacing the complete content of label information element for the Query Information of Query Database, achieve the object of saving credible label expense, thus make technical scheme of the present invention ideally solve the less defect in some credible label intrinsic information space.
The present invention is replicated to prevent the credible label of graphic form, can by adjusting resolution and the printed dimensions of the credible label generated, the picture making the credible label obtained after republishing or copying or the digital information that comprises different, thus by the picture that compares verified label or whether consistent with the information of the credible label of the first impression of the preserving object reaching credible label anti-copying of digital information comprised; Also can by adjusting resolution and the printed dimensions of the credible label generated, although the label making the first impression obtain creates the loss of information or the mistake of information, but still can correctly be distinguished by error correction, but lose more information by the label copying the described first impression or introduce more mistake, to such an extent as to exceeded the error correcting capability of credible label to such an extent as to cannot correctly distinguish, thus reach the object of credible label anti-copying; In order to avoid duplicator to evade the loss of printing information by amplifying the method for credible label graphic, the dimension information of the credible label of the first impression can be comprised in credible label, and digital signature is carried out to prevent from being tampered to described size, when verifying credible label, by the dimension information comprised in the printed dimensions of more current credible label and label, realize the object of credible label anti-copying.
Accompanying drawing explanation
Fig. 1 is the building-block of logic that the present invention adopts generation based on the anti-tamper credible two-dimension code of the information that is applied to of PKI and verification method and system
Fig. 2 is the present invention's generation of credible two-dimension code of adopting the information that is applied to of trusted identity timestamp anti-tamper and the building-block of logic of verification method and system
Fig. 3 is that the present invention adopts and is applied to the generation of the credible label of commodity counterfeit prevention and the building-block of logic of verification method and system based on PKI
Fig. 4 be the present invention adopt trusted identity timestamp be applied to the generation of the credible label of commodity counterfeit prevention and the building-block of logic of verification method and system
Fig. 5 be the present invention adopt public-key cryptography be applied to the generation of the credible label of commodity counterfeit prevention and the building-block of logic of verification method and system
Fig. 6 is that the present invention adopts and is applied to the generation of the credible label of commodity counterfeit prevention and the building-block of logic of verification method and system based on IBC or CPK
Fig. 7 is that the present invention realizes the schematic diagram of anti-copying by the output resolution ratio of the credible label of adjustment figure
Embodiment
User can be allowed to confirm integrality and the non-repudiation of the raw information that credible label comprises by adopting technical scheme of the present invention.In order to make technical scheme of the present invention easy to understand more, combining concrete diagram for credible two-dimension code below and being further elaborated.
According to Fig. 1, specific embodiment of the invention scheme () is as described below:
Step one: authentication center CA is that Quick Response Code service provider generates digital certificate;
Step 2: Quick Response Code service provider generates digital signature by Digital Signature module, time stamp server is Quick Response Code rise time stamp;
Step 3: two-dimensional code generation module is according to Quick Response Code raw information, digital certificate information, timestamp and digital signature, and suitable generation parameter, generates Quick Response Code;
Step 4: when using or verify Quick Response Code, correctly distinguished Quick Response Code by two dimension code reading module, is extracted information wherein, and is outputted to timestamp verification module, digital certificate authentication module and digital signature authentication module;
Step 5: timestamp verification module acquisition time from reading information stabs information and to its checking, if the verification passes, then show Quick Response Code content intact, otherwise Quick Response Code is insincere;
Step 6: digital certificate authentication module obtains digital certificate information from reading information, and the identity confirming Quick Response Code service provider is verified to it;
If A. digital certificate is legal and still in the term of validity, then think that the identity of Quick Response Code service provider is credible;
If B. although digital certificate is legal but cancelled, but the rise time of timestamp is early than the digital certificate revocation time, and the reason of cancelling of certificate is that then the identity of Quick Response Code service provider is credible, and the reason of cancelling pointing out digital certificate is certificate expired because certificate expired;
If C. although digital certificate is legal but cancelled, but the rise time of timestamp is early than the digital certificate revocation time, and the reason of cancelling of certificate is because certificate private key is divulged a secret, then Quick Response Code service provider identity still has lower confidence level, needs clearly to point out the reason of cancelling of digital certificate to be that certificate private key is divulged a secret to user.
Step 7: digital signature authentication module obtains digital signature and verifies it from reading information, if the verification passes, then this Quick Response Code is not tampered or forges, and the content in Quick Response Code is credible, otherwise insincere.
User can be allowed whether to confirm to have puted up the commodity of credible label from real commodity production manufacturer by adopting technical scheme of the present invention.In order to make technical scheme of the present invention easy to understand more, be further elaborated below in conjunction with concrete diagram.
According to Fig. 3, specific embodiment of the invention scheme (two) is as described below:
Step one: authentication center CA is that commodity production manufacturer generates digital certificate; Tag identifier generation module generating labels identifies; Commodity sign generation module generates commodity sign;
Step 2: the digital certificate that commodity production manufacturer obtains described step one, raw information (comprise commerical batches, the commodity production time, production site, Corporation web site etc.), tag identifier and commodity sign input digital signature generation module to be to generate digital signature; Generate digital digest according to raw information, tag identifier and commodity sign and stab to the time stamp server application time;
Step 3: credible tag generation module is according to raw information, tag identifier, commodity sign, digital signature, digital certificate and timestamp, and suitable generation parameter, generates credible label;
Step 4: in use or when verifying credible label, by credible tag readable degree module, credible label is correctly distinguished, extract information wherein, and outputted to tag identifier authentication module, commodity sign authentication module, digital certificate authentication module, digital signature authentication module and timestamp verification module;
Step 5: timestamp verification module acquisition time from reading information stabs information and verifies it, if the verification passes, then show that credible label is complete, otherwise credible label is insincere and terminate whole proof procedure, then in credible label the result display module prompt time stamp authentication failed;
Step 6: digital certificate authentication module obtains digital certificate information from reading information, and it is verified, if authentication failed, credible label is insincere, and terminate whole proof procedure, then in credible label the result display module, point out digital certificate authentication failure, meet following three kinds of situations and can think that the identity of credible label owner (i.e. commodity production manufacturer) is credible:
If A. digital certificate is legal and still in the term of validity, then think that the identity of commodity production manufacturer is credible;
If B. although digital certificate is legal but cancelled, but the rise time of timestamp is early than the digital certificate revocation time, and the reason of cancelling of certificate is because certificate expired, then the identity of commodity production manufacturer is credible, and the reason of cancelling pointing out digital certificate in the result display module is certificate expired;
If C. although digital certificate is legal but cancelled, but the rise time of timestamp is early than the digital certificate revocation time, and the reason of cancelling of certificate is because certificate private key is divulged a secret, then the identity of commodity production manufacturer still has lower confidence level, needs clearly to point out the reason of cancelling of digital certificate to be that certificate private key is divulged a secret to user in the result display module.
Step 7: digital signature authentication module obtains digital signature and verifies it from reading information, if the verification passes, then this credible label is not tampered or forges, content in credible label is credible, otherwise label substance is insincere and terminate whole proof procedure, in credible label the result display module, then point out digital signature authentication failure;
Step 8: tag identifier authentication module obtains tag identifier from reading information, inquire about this tag identifier in credible label authentication server and whether have checking record, if there is no record, on authentication server, then record information (comprise proving time, verifier facility information used, geographical position etc. that the IP address of verifier, verifier are residing when verifying) of this checking event, and continue the checking of credible label; If there is record, and credible label is reproducible, then leap to step 10;
Step 9: commodity sign authentication module obtains commodity sign from reading information, whether had checking record, if do not have record, then on authentication server, record the information of this checking event if in credible label authentication server, inquiring about this commodity sign;
Step 10: credible label the result display module reads the result that also display label identity verification module and commodity sign authentication module return, if credible label is not reproducible, then shows proving time and merchandise news first; If credible label is reproducible, and this checking is the checking first after buying commodity, and the not tag identifier of this credible label and the checking record of commodity sign on authentication server, then these commodity come from the production firm having described digital certificate, otherwise show that this credible label obtains by copying, and judge that these commodity are fakement; Verify first if this checking is buy after commodity non-, and on authentication server not this credible label checking record but identical goods mark checking record, then show that these commodity come from the production firm having described digital certificate, and buy in this commodity sign corresponding verify time of recording first, otherwise show that this credible label to obtain and these commodity are fakement by copying.
According to Fig. 4, specific embodiment of the invention scheme (three) is as described below:
Step one: tag identifier generation module generating labels identifies; Commodity sign generation module generates commodity sign; Identity information according to label raw information, tag identifier and commodity sign and commodity production manufacturer generates digital digest, and file an application to trusted identity time-stamping service center, after the identity of commodity production manufacturer is examined at trusted identity time-stamping service center, according to described digital digest, through the identity information of examination & verification, and sign from the precise date/time of authoritative time source, generate trusted identity timestamp;
Step 2: credible tag generation module is according to the identity information of raw information, tag identifier, commodity sign, production firm and trusted identity timestamp, and suitable generation parameter, generates credible label;
Step 3: when using and verify credible label, by credible tag readable degree module, credible label is correctly distinguished, extract information wherein, and outputted to tag identifier authentication module, commodity sign authentication module and trusted identity timestamp verification module;
Step 4: trusted identity timestamp verification module obtains trusted identity timestamp information and verifies it from reading information, if the verification passes, then show that credible label is complete, otherwise credible label is insincere and terminate whole proof procedure, then in credible label the result display module, point out trusted identity timestamp authentication failed;
Step 5: tag identifier authentication module obtains tag identifier from reading information, inquire about this tag identifier in credible label authentication server and whether there is checking record, if there is no record, on authentication server, then record information (comprise proving time, verifier facility information used, geographical position etc. that the IP address of verifier, verifier are residing when verifying) of this checking event, and continue the checking of credible label; If there is record, and credible label is reproducible, then leap to step 7;
Step 6: commodity sign authentication module obtains commodity sign from reading information, inquires about this commodity sign and whether there is checking record in credible label authentication server, if do not have record, then on authentication server, records the information of this checking event;
Step 7: credible label the result display module reads the result that also display label identity verification module and commodity sign authentication module return, if credible label is not reproducible, then shows proving time and merchandise news first; If credible label is reproducible, and this checking is the checking first after buying commodity, and the not tag identifier of this credible label and the checking record of commodity sign on authentication server, then these commodity come from production firm corresponding to identity information described in trusted identity timestamp, otherwise show that this credible label obtains by copying, and judge that these commodity are fakement; Verify first if this checking is buy after commodity non-, and on authentication server not this credible label checking record but identical goods mark checking record, then show that these commodity come from production firm corresponding to identity information described in trusted identity timestamp, and buy in this commodity sign corresponding verify time of recording first, otherwise show that this credible label to obtain and these commodity are fakement by copying.
According to Fig. 5, specific embodiment of the invention scheme (four) is as described below:
Step one: commodity production manufacturer generates private cipher key and the public-key cryptography of oneself by unsymmetrical key generation module, and the identity information of public key information and production firm is updated to public key information storehouse, generated the tag identifier of credible label by tag identifier generation module, generated the commodity sign of credible label by commodity sign generation module;
Step 2: the public-key cryptography that commodity production manufacturer obtains described step one, raw information (comprise commerical batches, the commodity production time, production site, Corporation web site etc.), tag identifier and commodity sign input digital signature generation module to be to generate digital signature;
Step 3: credible tag generation module is according to credible label raw information, tag identifier, commodity sign, public key information, digital signature, and suitable generation parameter, generates credible label;
Step 4: in use or when verifying credible label, by credible tag readable degree module, credible label is correctly distinguished, extract information wherein, and outputted to public-key cryptography authentication module, digital signature authentication module, tag identifier authentication module and commodity sign authentication module;
Step 5: public-key cryptography authentication module obtains public key information from reading information, and in public-key cryptography storehouse, inquire about whether there is the disclosure key, if existed, then think that the disclosure key is legal, otherwise terminate proof procedure and assert that these commodity are fakement.
Step 6: digital signature authentication module obtains digital signature and verifies it from reading information, if the verification passes, then this credible label is not tampered or forges, and the content in credible label is credible, otherwise terminates proof procedure and assert that these commodity are fakement;
Step 7: tag identifier authentication module obtains tag identifier from reading information, inquire about this tag identifier in credible label authentication server and whether there is checking record, if there is no record, on authentication server, then record information (comprise proving time, verifier facility information used, geographical position etc. that the IP address of verifier, verifier are residing when verifying) of this checking event, and continue the checking of credible label; If there is record, and credible label is reproducible, then leap to step 9;
Step 8: the commodity sign authentication module of credible label obtains commodity sign from reading information, in credible label authentication server, inquire about this commodity sign whether there is checking record, if there is no record, on authentication server, then record the information of this checking event, otherwise the checking event information existed is exported to credible label the result display module;
Step 9: credible label the result display module reads and shows the result that the tag identifier authentication module of credible label and commodity sign authentication module return, if credible label is not reproducible, then shows proving time and merchandise news first; If credible label is reproducible, and this checking is the checking first after buying commodity, and the not tag identifier of this credible label and the checking record of commodity sign on authentication server, then these commodity come from the production firm having the disclosure key, otherwise show that this credible label obtains by copying, and judge that these commodity are fakement; Verify first if this checking is buy after commodity non-, and on authentication server not this credible label record but identical goods mark record, then show that these commodity come from the production firm having the disclosure key, and buy in this commodity sign corresponding verify time of recording first, otherwise show that this credible label to obtain and these commodity are fakement by copying.
According to Fig. 6, specific embodiment of the invention scheme (five) is as described below:
Step one: be that commodity production manufacturer generates private cipher key and public-key cryptography by IBC or CPK key generation centre, is generated the tag identifier of credible label, is generated the commodity sign of credible label by commodity sign generation module by tag identifier generation module;
Step 2: the public key information that commodity production manufacturer obtains described step one, raw information (comprise commerical batches, the commodity production time, production site, Corporation web site etc.), tag identifier and commodity sign input digital signature generation module to be to generate digital signature;
Step 3: credible tag generation module is according to credible label raw information, tag identifier, commodity sign, public key information, digital signature, and suitable generation parameter, generates credible label;
Step 4: in use or when verifying credible label, correctly distinguished credible label by credible tag readable degree module, is extracted information wherein, and is outputted to digital signature authentication module, tag identifier authentication module and commodity sign authentication module;
Step 5: digital signature authentication module obtains digital signature and verifies it from reading information, if the verification passes, then this credible label is not tampered or forges, and the content in credible label is credible, otherwise terminates proof procedure and assert that these commodity are fakement;
Step 6: tag identifier authentication module obtains tag identifier from reading information, inquire about this tag identifier in credible label authentication server and whether there is checking record, if there is no record, on authentication server, then record information (comprise proving time, verifier facility information used, geographical position etc. that the IP address of verifier, verifier are residing when verifying) of this checking event, and continue the checking of credible label; If there is record, and credible label is reproducible, then leap to step 8;
Step 7: the commodity sign authentication module of credible label obtains commodity sign from reading information, in credible label authentication server, inquire about this commodity sign whether there is checking record, if there is no record, on authentication server, then record the information of this checking event, otherwise the checking event information existed is exported to credible label the result display module;
Step 8: credible label the result display module reads and shows the result that the tag identifier authentication module of credible label and commodity sign authentication module return, if credible label is not reproducible, then shows proving time and merchandise news first; If credible label is reproducible, and this checking is the checking first after buying commodity, and the not tag identifier of this credible label and the checking record of commodity sign on authentication server, then these commodity come from the production firm having the disclosure key, otherwise show that this credible label obtains by copying, and judge that these commodity are fakement; Verify first if this checking is buy after commodity non-, and on authentication server not this credible label record but identical goods mark record, then show that these commodity come from the production firm having the disclosure key, and buy in this commodity sign corresponding verify time of recording first, otherwise show that this credible label to obtain and these commodity are fakement by copying.
More than show and describe general principle of the present invention and principal character and advantage.The technical staff of the industry should understand; the present invention is not restricted to the described embodiments; what describe in above-described embodiment and specification just illustrates principle of the present invention; without departing from the spirit and scope of the present invention; the present invention also has various change, and these changes all fall in the claimed scope of the invention.Application claims protection range is defined by appending claims.

Claims (14)

1., based on generation and the verification method of the credible label of rivest, shamir, adelman, comprise the following steps:
Step one: raw information is set to credible tag format;
Step 2: credible tag encryption protocol module is set;
Step 3: according to raw information and the believable credible label of credible tag encryption protocol module generation encryption of credible tag format;
Step 4: when verifying credible label, by verifying credible tag encryption protocol module, determines integrality and the non-repudiation of credible label raw information, and the authenticity of credible label owner identity and non repudiation;
Described credible tag encryption protocol module comprises digital certificate information and digital signature information; When step 4 verifies credible tag encryption protocol module, by verifying that the validity of the digital certificate information in credible label examines the identity of credible label owner, determined the integrality of credible label raw information by the digital signature information verifying in credible label.
2., based on generation and the verification method of the credible label of rivest, shamir, adelman, comprise the following steps:
Step one: raw information is set to credible tag format;
Step 2: credible tag encryption protocol module is set;
Step 3: according to raw information and the believable credible label of credible tag encryption protocol module generation encryption of credible tag format;
Step 4: when verifying credible label, by verifying credible tag encryption protocol module, determines integrality and the non-repudiation of credible label raw information, and the authenticity of credible label owner identity and non repudiation;
Described credible tag encryption protocol module comprises digital certificate information, digital signature information, trusted timestamp or trusted identity timestamp information; When step 4 verifies credible tag encryption protocol module, by verifying the identity of the credible label owner of the validity certification of the digital certificate information in credible label, the integrality of the raw information of credible label is determined, by verifying that trusted timestamp in credible label or trusted identity timestamp information guarantee the integrality of credible label rise time and content by the digital signature information verifying in credible label.
3., based on generation and the verification method of the credible label of rivest, shamir, adelman, comprise the following steps:
Step one: raw information is set to credible tag format;
Step 2: credible tag encryption protocol module is set;
Step 3: according to raw information and the believable credible label of credible tag encryption protocol module generation encryption of credible tag format;
Step 4: when verifying credible label, by verifying credible tag encryption protocol module, determines integrality and the non-repudiation of credible label raw information, and the authenticity of credible label owner identity and non repudiation;
Described credible tag encryption protocol module comprises trusted identity timestamp information; When verifying credible tag encryption protocol module, by verifying the trusted identity timestamp information in credible label, guarantee the integrality of credible label rise time and content, and the identity of the credible label owner of certification.
4., based on generation and the verification method of the credible label of rivest, shamir, adelman, comprise the following steps:
Step one: raw information is set to credible tag format;
Step 2: credible tag encryption protocol module is set;
Step 3: according to raw information and the believable credible label of credible tag encryption protocol module generation encryption of credible tag format;
Step 4: when verifying credible label, by verifying credible tag encryption protocol module, determines integrality and the non-repudiation of credible label raw information, and the authenticity of credible label owner identity and non repudiation;
Described cryptographic protocol module comprises public key information and digital signature information;
When verifying credible tag encryption protocol module, examine authenticity and the non repudiation of label owner identity by checking public key information, determined integrality and the non repudiation of credible label raw information by the digital signature information verifying in credible label.
5., based on generation and the verification method of the credible label of rivest, shamir, adelman, comprise the following steps:
Step one: raw information is set to credible tag format;
Step 2: credible tag encryption protocol module is set;
Step 3: according to raw information and the believable credible label of credible tag encryption protocol module generation encryption of credible tag format;
Step 4: when verifying credible label, by verifying credible tag encryption protocol module, determines integrality and the non-repudiation of credible label raw information, and the authenticity of credible label owner identity and non repudiation;
Described credible tag encryption protocol module comprises public key information, digital signature information, trusted timestamp or trusted identity timestamp information;
When verifying credible tag encryption protocol module, authenticity and the non repudiation of label owner identity is examined by checking public key information, integrality and the non repudiation of credible label raw information is determined, by verifying that trusted timestamp in credible label or trusted identity timestamp information guarantee the integrality of credible label rise time and content by the digital signature information verifying in credible label.
6. the generation of the credible label based on rivest, shamir, adelman according to claim 4 or 5 and verification method, is characterized in that: the public key information in described credible label, the identity according to the credible label owner of following method validation:
If A. public-key cryptography and private cipher key are generated by the key generation centre of identity-based id password system (IBC), then described public key information comprises the parameter information of public-key cryptography and certifying signature, or comprise the network address information storing public key information, or comprise for the Query Information of inquiry packet containing the database of public key information;
If the digital signature authentication in credible label is passed through, then prove that public-key cryptography is legal, the identity also just demonstrating credible label owner is credible;
If B. public-key cryptography and private cipher key are generated by the key generation centre of Conbined public or double key management system (CPK), then described public key information comprises PKI matrix and mapping algorithm, or comprise the network address information storing public key information, or comprise for the Query Information of inquiry packet containing the database of public key information; If the digital signature authentication in credible label is passed through, then the entity identification comprised in attestation-signatures is legal, and the identity also just demonstrating credible label owner is credible;
If C. public-key cryptography is the common key not comprising identification information, and be not included in digital certificate, then described public key information comprises public-key cryptography, or comprise the network address information storing public key information, or comprise for the Query Information of inquiry packet containing the database of public key information, the public-key cryptography storehouse of inquiry in this locality or cloud server is needed when verifying public-key cryptography legitimacy
If the digital signature authentication existed in public-key cryptography storehouse in described public key information and credible label is passed through, then think that the identity of credible label owner is credible, otherwise insincere;
If the private cipher key that public-key cryptography is corresponding has leaked or lost efficacy, then in the public-key cryptography storehouse in local or high in the clouds, delete corresponding public key information; Signature or cryptographic algorithm can be included in public key information, also can be stored in this locality or high in the clouds;
If D. public-key cryptography is included in the digital certificate of signature, the identity of certification is credible label owner uses the method for described C; If public-key cryptography is included in the digital certificate that authentication center CA signs and issues, then described public key information comprises digital certificate information, or comprise the network address information storing digital certificate information, or comprise for the Query Information of inquiry packet containing the database of digital certificate information, if digital certificate authentication passes through, and the digital signature authentication in credible label is passed through, then the identity of credible label owner is credible, otherwise insincere.
7. the generation of the credible label based on rivest, shamir, adelman according to Claims 2 or 3 and verification method, it is characterized in that: described trusted identity timestamp, to from the precise date of authoritative time source and time by trusted identity time stamp server, according to the digital digest that credible label raw information generates, through the identity information of the credible label owner of examination & verification, carry out digital signature and generate.
8., according to generation and the verification method of the described credible label based on rivest, shamir, adelman arbitrary in claim 1-5, it is characterized in that:
If credible label is a kind of graphical label, then by adjusting resolution and the graphic printing size of the credible label generated, the picture making the credible label obtained after republishing or copying or the digital information that comprises different, thus by the picture that compares verified label or the digital information that comprises whether with picture or the consistent object reaching credible label anti-copying of digital information of the credible label of the first impression of preserving;
If credible label has error correcting capability, then by resolution and the graphic printing size of the credible label graphic of adjustment, the mistake that the first impression is introduced is within the scope of the error correcting capability of credible label, and make the mistake of again printing introducing of the credible label graphic by copying the first impression exceed the error correcting capability of credible label, thus the credible label realizing the first impression can correctly be distinguished, and the credible label of copying and printing cannot correctly be distinguished;
If credible label is a kind of graphical label of anti-copying, then comprise the dimension information of label printing figure in the label, when verifying credible label, determine whether graphical label is replicated by the size of nominal in the full-size(d) of comparison current Graphics label and label.
9., according to generation and the verification method of the described credible label based on rivest, shamir, adelman arbitrary in claim 1-5, it is characterized in that:
Comprise credible tag identifier in the raw information of described credible label, be one for identifying unique coding of a credible label;
Comprise commodity sign in the raw information of described credible label, be one for identifying unique coding of commodity;
If a credible label can be replicated, then need when each credible label comprising credible tag identifier is verified first, record checking event information in authentication module or background server, these part commodity use one or more credible label with the Unique Product mark of these commodity, wherein each credible label has the commodity sign of these identical part commodity and tag identifier unique separately, and each credible label is secret before checking first;
If a credible label is not reproducible, do not need to do any secrecy processing to this credible label before verifying first;
If the tag identifier of a credible label is not reproducible and other content of label can be written, then this label can record and reclaim after commodity are used in background program, then re-writes false proof for another part commodity of new commodity sign.
10., according to generation and the verification method of the described credible label based on rivest, shamir, adelman arbitrary in claim 1-5, it is characterized in that:
The effective storage life of this label is comprised in the raw information of described credible label, when verifying credible label, whether simultaneous verification current time is in the effective storage life of this label, if current time is not in the effective storage life of this label, then this credible label is insincere.
11., according to the generation of the described credible label based on rivest, shamir, adelman arbitrary in claim 1-5 and verification method, is characterized in that:
If comprise digital certificate information in credible label, then, when being verified, in display module, show digital certificate information, thus facilitate verifier to understand the identity information of credible label owner and the issuer information of digital certificate;
If comprise timestamp information in credible label, then when being verified in display module Presentation Time Stamp information, thus
Verifier is facilitated to understand the rise time of credible label;
If comprise trusted identity timestamp in credible label, then show trusted identity timestamp information when being verified, thus facilitate verifier to understand the rise time of credible label, and the identity information of credible label owner;
If successful acquisition is to the time t2 that this is verified and positional information P2, and the time t1 of good authentication last time and positional information P1, then calculate displacement R=(P2 – P1) and the time difference T=(t2 – t1) of twice checking, and obtain speed V=R/T, if the value of speed V exceedes the early warning speed of setting, then produce warning information at display module.
12., according to the generation of the described credible label based on rivest, shamir, adelman arbitrary in claim 1-5 and verification method, is characterized in that:
A. described credible label comprise following one of at least:
A. complete digital certificate content;
B. the partial content of digital certificate;
C. the network storage address of digital certificate;
D. digital certificate library information;
E. digital certificate LIST SERVER information;
F. complete digital certificate chain information;
G. the network storage address of digital certificate chains;
H. the Query Information of the database of digital certificate or digital certificate chains is contained for inquiry packet;
I. complete digital signature;
J. the network storage address of digital signature;
K. for the Query Information of inquiry packet containing the database of digital signature;
L. complete public key information;
M. the network storage address of public key information;
N. for the Query Information of inquiry packet containing the database of public key information;
O. the tag identifier of credible label;
P. the commodity sign of credible label;
Q. the term of validity of credible label;
R. complete credible label raw information;
S. the HASH value of credible label raw information;
T. the network storage address of credible label raw information;
U. for the Query Information of inquiry packet containing the database of raw information;
V. the identity information of credible label owner;
W. the network address of credible label authentication server;
If B. described credible label comprises the network storage address of digital certificate or digital certificate chains, by web download digital certificate when verifying credible tag encryption protocol module;
If C. described credible label comprises the information of digital certificate storehouse or LIST SERVER, then by web download or enquiring digital certificate when verifying credible tag encryption protocol module;
If D. described credible label comprises the network storage address of public key information, by web download public key information when verifying credible tag encryption protocol module;
If E. described credible label comprises the network storage address of digital signature, then by web download digital signature when verifying credible tag encryption protocol module;
If F. described credible label comprises the network storage address of trusted timestamp or trusted identity timestamp, then by web download trusted timestamp or trusted identity timestamp when verifying credible tag encryption protocol module;
If comprise the identity information of credible label owner in G. described credible label raw information, then can verify that whether the identity of credible label owner is credible further by the identity information in comparison credible label raw information, the identity information in digital certificate, the identity information in trusted identity timestamp when verifying credible label;
Download and the checking of H. described credible label information may operate in this locality of authentication module, also may operate in high in the clouds;
I. described raw information can be expressly, also can through encryption;
J. described raw information can be label original contents, or the HASH value of original contents, or the network storage address of original contents, or for the Query Information of inquiry packet containing the database of original contents;
If K. described credible label has full stop represent that raw information terminates, then can credible tag encryption protocol module be placed on after this full stop;
L. described credible label is the form of printing or electronics;
M. described credible label is Quick Response Code, or self-defining pattern, or RFID label tag, or NFC label, or electronic tag, or chip tag, or sensor tag.
The Antiforge system of 13. 1 kinds of credible labels, comprises unsymmetrical key or digital certificate generating center, credible tag encryption protocol module storage server, the generation of credible label and Authentication devices and credible label authentication server, it is characterized in that:
Unsymmetrical key or digital certificate generating center, generate digital certificate or unsymmetrical key for giving credible label owner;
Credible tag encryption protocol module storage server, for storing the credible tag encryption protocol module information of credible label owner, comprise public key information, or digital certificate information, or digital signature information, or trusted timestamp or trusted identity timestamp information;
Credible label authentication server, for the details of the checking event and anti-counterfeit commodities that record credible label, also may be used for the authentication module performing credible label, realizes high in the clouds checking;
Generation and the Authentication devices of credible label comprise:
Trusted timestamp generation module, generates digital digest according to credible label substance, and to described trusted timestamp server application trusted timestamp, and described trusted timestamp is inputted credible tag generation module;
Trusted identity timestamp generation module, generates digital digest according to credible label raw information, and to described trusted identity time stamp server application trusted identity timestamp, and described trusted identity timestamp is inputted credible tag generation module;
The tag identifier generation module of credible label, for each label generates unique tag identifier;
The commodity sign generation module of credible label, for every part commodity generate unique commodity sign;
Unsymmetrical key generation module, for label owner generates oneself private cipher key and public-key cryptography;
Credible tag generation module, according to credible label raw information or tag identifier or commodity sign or the label term of validity or public key information or digital certificate information or digital signature information or trusted timestamp or trusted identity timestamp information, generate credible label;
Credible tag readable degree module, extracts the digital certificate information be verified in credible label, and is outputted to digital certificate authentication module; Extract the digital signature be verified in credible label, and outputted to digital signature authentication module; Extract the trusted timestamp be verified in credible label, and outputted to trusted timestamp authentication module; Extract the trusted identity timestamp be verified in credible label, and outputted to trusted identity timestamp verification module; Extract the tag identifier be verified in credible label, and outputted to tag identifier authentication module; Extract the commodity sign be verified in credible label, and outputted to commodity sign authentication module;
Digital certificate authentication module, checking digital certificate information confirms the authenticity of credible label owner identity;
Digital signature authentication module, certifying digital signature confirms the integrality of credible label substance;
Trusted timestamp authentication module, checking trusted timestamp confirms the integrality of credible label substance and the rise time of credible label;
Trusted identity timestamp verification module, the trusted identity timestamp described in checking confirms the integrality of credible label substance, the rise time of credible label, and the authenticity of credible label owner identity;
The tag identifier authentication module of credible label, inquire about this tag identifier in local or credible label authentication server and whether have checking record, if verify first, then on this locality or authentication server, record the information of this checking event, otherwise return the checking event information existed;
The commodity sign authentication module of credible label, this locality or credible label authentication server is recorded this checking event information of this commodity sign, and returns the checking event information existed;
Credible label the result display module, the digital certificate information after display is verified, or credible label rise time, or verify event information and merchandise news accordingly.
The Antiforge system of 14. a kind of credible labels according to claim 13, is characterized in that:
Credible tag encryption protocol module storage server is X.500 LIST SERVER, or ldap directory server, or Web server, or ftp server, or dns server, or cloud storage server;
Credible label authentication server has the data server recording credible label checking event, commodity purchasing event, commodity details;
Credible label authentication server can perform credible label authentication module thus realize the high in the clouds checking of credible label.
CN201510454896.5A 2014-11-05 2015-07-29 The generation and verification method and system of credible label based on rivest, shamir, adelman Active CN105024824B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510454896.5A CN105024824B (en) 2014-11-05 2015-07-29 The generation and verification method and system of credible label based on rivest, shamir, adelman
PCT/CN2016/084875 WO2017016318A1 (en) 2014-11-05 2016-06-04 Credible label generation and verification method and system based on asymmetric cryptographic algorithm

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN2014106181585 2014-11-05
CN201410618158 2014-11-05
CN201510454896.5A CN105024824B (en) 2014-11-05 2015-07-29 The generation and verification method and system of credible label based on rivest, shamir, adelman

Publications (2)

Publication Number Publication Date
CN105024824A true CN105024824A (en) 2015-11-04
CN105024824B CN105024824B (en) 2018-12-21

Family

ID=54414560

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510454896.5A Active CN105024824B (en) 2014-11-05 2015-07-29 The generation and verification method and system of credible label based on rivest, shamir, adelman

Country Status (2)

Country Link
CN (1) CN105024824B (en)
WO (1) WO2017016318A1 (en)

Cited By (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105427117A (en) * 2015-12-18 2016-03-23 沈阳圆梦科技有限公司 Universal traceable anti-fake system of agricultural products based on electronic data preservation technology and method of same
CN105447710A (en) * 2015-11-12 2016-03-30 东北大学 Commodity authenticity verification system and commodity authenticity verification method based on two-dimensional barcode in e-commerce
CN105490708A (en) * 2015-12-09 2016-04-13 广东欧珀移动通信有限公司 Method and device for reading and writing smart card
CN105590227A (en) * 2016-01-14 2016-05-18 姜智广 Dynamic verification method, apparatus, and system of authenticity of commodity
CN105634741A (en) * 2015-12-24 2016-06-01 上海莱柏信息科技有限公司 Identity authentication method based on trusted tag and identity authentication system based on trusted tag
CN106022738A (en) * 2016-06-02 2016-10-12 中国联合网络通信集团有限公司 Two-dimensional code safety payment method, terminal, and system
CN106027479A (en) * 2016-01-21 2016-10-12 李明 Dynamic processing method and system for identity card authentication information processing request
WO2017016318A1 (en) * 2014-11-05 2017-02-02 祝国龙 Credible label generation and verification method and system based on asymmetric cryptographic algorithm
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline
CN106452734A (en) * 2016-12-17 2017-02-22 上海莱柏信息科技有限公司 Trusted tag generation method based on secure element and trusted tag generation system thereof
CN106897761A (en) * 2017-03-06 2017-06-27 山东渔翁信息技术股份有限公司 A kind of two-dimensional code generation method and device
WO2017123152A1 (en) * 2016-01-11 2017-07-20 Mastercard Asia/Pacific Pte Ltd A method for dynamic authentication of an object
CN107067056A (en) * 2017-02-14 2017-08-18 阿里巴巴集团控股有限公司 Two-dimensional code generation method and its equipment and two-dimensional code identification method and its equipment
CN107103255A (en) * 2017-04-27 2017-08-29 百望电子发票数据服务有限公司 A kind of electronic invoice layout files verification method and system
CN107133828A (en) * 2016-02-26 2017-09-05 东芝泰格有限公司 Ticket server and its control method, electronic billing system and terminal device
CN107154848A (en) * 2017-03-10 2017-09-12 深圳市盾盘科技有限公司 A kind of data encryption based on CPK certifications and storage method and device
CN107169769A (en) * 2016-03-08 2017-09-15 广州市动景计算机科技有限公司 The brush amount recognition methods of application program, device
CN107316182A (en) * 2017-06-30 2017-11-03 福建亿榕信息技术有限公司 A kind of generation method of electronic contract chain of evidence and generation system
CN107392612A (en) * 2017-06-05 2017-11-24 广东工业大学 A kind of method based on traffic Quick Response Code transaction verification
CN107944526A (en) * 2017-10-19 2018-04-20 浙江码博士防伪科技有限公司 A kind of dimension code anti-counterfeit method of anti-tamper anti-copying
CN108366370A (en) * 2018-02-02 2018-08-03 东南大学 Quantify the information transferring method of privately owned asymmetric key based on radio channel characteristic
CN108681904A (en) * 2018-04-01 2018-10-19 蒋欣言 A kind of fake certification implementation method of bottled formula commodity
CN108764930A (en) * 2018-03-23 2018-11-06 成都众宜天成科技有限公司 The implementation method of commodity counterfeit prevention verification platform based on block chain structure
CN109034805A (en) * 2018-08-09 2018-12-18 江苏先安科技有限公司 It is a kind of to stab signature verification method suitable for the new time of block chain and built-in field
WO2019012310A1 (en) * 2017-07-11 2019-01-17 Yuen Hon Man Honmy Facility media access safeguard systems
CN109409472A (en) * 2018-08-24 2019-03-01 阿里巴巴集团控股有限公司 Two-dimensional code generation method, data processing method, device and server
CN109495268A (en) * 2017-09-12 2019-03-19 中国移动通信集团公司 A kind of two dimension code authentication method, device and computer readable storage medium
CN109543791A (en) * 2018-11-20 2019-03-29 白绍江 Product false proof electronic tag and product false proof verification method and system
CN109544182A (en) * 2018-11-20 2019-03-29 孟凡富 Product false proof verification method and system
CN109583555A (en) * 2018-11-20 2019-04-05 王建新 Product false proof electronic tag and electronic tag authentication method and system
CN109615030A (en) * 2018-10-12 2019-04-12 阿里巴巴集团控股有限公司 Dimension code anti-counterfeit method, equipment and system based on security application
CN109886006A (en) * 2019-02-28 2019-06-14 尤尼泰克(嘉兴)信息技术有限公司 A kind of information source checking method and device based on two dimensional code
CN110197244A (en) * 2018-02-26 2019-09-03 Opto电子有限公司 Two dimensional code, two dimensional code output system and method, two dimensional code read system and method
CN110472716A (en) * 2019-08-21 2019-11-19 深圳市深华方科技有限公司 A kind of generation method of two dimensional code, two-dimension code generator and anti-counterfeiting system
CN110472715A (en) * 2019-08-21 2019-11-19 深圳市深华方科技有限公司 A kind of generation method of dynamic two-dimension code, two-dimension code generator and anti-counterfeiting system
CN110830237A (en) * 2019-11-29 2020-02-21 晋商博创(北京)科技有限公司 CPK key generation method, device, entity and key center based on time
CN110912693A (en) * 2019-11-22 2020-03-24 福建金密网络安全测评技术有限公司 Digital certificate format compliance detection system
CN110955868A (en) * 2018-09-27 2020-04-03 千寻位置网络有限公司 Certificate expiration verification method and device and terminal equipment
CN110969445A (en) * 2019-10-31 2020-04-07 紫优科技(深圳)有限公司 Anti-counterfeiting method based on NFC
WO2020081976A1 (en) * 2018-10-18 2020-04-23 Cpi Card Group - Colorado, Inc. Method and system for product authentication
CN111091398A (en) * 2020-03-19 2020-05-01 北京达邦食安科技有限公司 Agricultural product traceability system
CN111178913A (en) * 2019-12-31 2020-05-19 天津津滨信钥信息技术有限公司 Product quality assurance generation and verification method, device, server and storage medium
CN111260528A (en) * 2020-02-07 2020-06-09 赵�智 Real estate information verification method based on asymmetric algorithm
WO2020143318A1 (en) * 2019-01-07 2020-07-16 平安科技(深圳)有限公司 Data verification method and terminal device
CN112865972A (en) * 2021-03-31 2021-05-28 深圳市巽震科技孵化器有限公司 Initialization method, device and system based on digital certificate platform and storage device
CN113641301A (en) * 2021-02-19 2021-11-12 中国建设银行股份有限公司 Data management method and device
CN113691560A (en) * 2016-02-05 2021-11-23 安赛飞保安有限公司 Data transfer method, method for controlling data use, and cryptographic apparatus
CN114491671A (en) * 2022-01-27 2022-05-13 宋舒涵 Market supervision commodity label tracing method and system based on block chain
CN114492491A (en) * 2022-01-24 2022-05-13 芯电智联(北京)科技有限公司 Data management system for NFC label application
CN115277093A (en) * 2022-06-24 2022-11-01 北京奕斯伟计算技术股份有限公司 Tamper verification method, system and device thereof and electronic equipment

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038470B (en) * 2017-06-09 2024-03-22 李娟� NFC network intelligent code-teaching machine
CN109617675B (en) * 2018-11-15 2024-02-06 国网电动汽车服务有限公司 Method and system for authenticating identifiers of both sides between charge and discharge facility and user terminal
CN110147666B (en) * 2019-03-29 2022-12-16 西安电子科技大学 Lightweight NFC identity authentication method in scene of Internet of things and Internet of things communication platform
CN110009079A (en) * 2019-04-17 2019-07-12 尤尼泰克(嘉兴)信息技术有限公司 A kind of label identification method and equipment based on two dimensional code
CN112464253A (en) * 2019-09-09 2021-03-09 云南天质弘耕科技有限公司 Large-scale agricultural product traceability management system based on block chain technology
CN111260010A (en) * 2020-01-20 2020-06-09 浙江中国轻纺城网络有限公司 Processing method, device and equipment for user-defined two-dimensional code label
US11645424B2 (en) 2020-04-27 2023-05-09 International Business Machines Corporation Integrity verification in cloud key-value stores
CN111698093B (en) * 2020-06-11 2022-07-15 江苏海洋大学 Digital timestamp issuing and verifying method based on PKI system
CN112699360B (en) * 2020-12-30 2023-07-04 北京天融信网络安全技术有限公司 Hardware anti-counterfeiting method and device, readable storage medium and electronic equipment
CN113556748B (en) * 2021-06-23 2023-06-16 中国联合网络通信集团有限公司 Signaling tracing identification method, device and system
US20230308439A1 (en) * 2022-03-22 2023-09-28 Cisco Technology, Inc. Distributed hierarchical authentication of system component identities
US11954007B2 (en) 2022-04-20 2024-04-09 International Business Machines Corporation Tracking usage of common libraries by means of digitally signed digests thereof
CN115913563B (en) * 2022-10-09 2023-09-29 鼎铉商用密码测评技术(深圳)有限公司 Electronic signature generation method, verification method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030063772A1 (en) * 2001-09-06 2003-04-03 Smith Joshua R. System and method for authentication and tracking of a workpiece that includes an optically active medium
CN101520865A (en) * 2009-03-31 2009-09-02 薛忠华 Anti-drug counterfeiting method using radio frequency electronic tag and public key infrastructure
CN103795546A (en) * 2014-02-18 2014-05-14 广东数字证书认证中心有限公司 Generating method and authentication method of data label and system of generating method and authentication method

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5115424B2 (en) * 2008-09-24 2013-01-09 富士ゼロックス株式会社 Time certification apparatus, time certification method, and program
CN102779263A (en) * 2012-06-19 2012-11-14 袁开国 Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature
CN104348870A (en) * 2013-08-02 2015-02-11 航天信息股份有限公司 Data management method and system of cloud storage system based on trusted timestamp
CN103514410B (en) * 2013-09-30 2017-01-18 上海市数字证书认证中心有限公司 Dependable preservation and evidence collection system and method for electronic contract
CN103839097A (en) * 2014-03-20 2014-06-04 武汉信安珞珈科技有限公司 Method and device for generating two-dimension code based on digital signature
CN104008322B (en) * 2014-06-14 2016-10-05 河南融信数据有限公司 Quick Response Code publisher's identity identifying method based on reliable digit signature
CN105024824B (en) * 2014-11-05 2018-12-21 浙江码博士防伪科技有限公司 The generation and verification method and system of credible label based on rivest, shamir, adelman
CN105635070B (en) * 2014-11-05 2019-12-27 许田 Anti-counterfeiting method and system for digital file

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030063772A1 (en) * 2001-09-06 2003-04-03 Smith Joshua R. System and method for authentication and tracking of a workpiece that includes an optically active medium
CN101520865A (en) * 2009-03-31 2009-09-02 薛忠华 Anti-drug counterfeiting method using radio frequency electronic tag and public key infrastructure
CN103795546A (en) * 2014-02-18 2014-05-14 广东数字证书认证中心有限公司 Generating method and authentication method of data label and system of generating method and authentication method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨茜雅等: "可信时间戳构筑电子档案安全堡垒", 《档案与建设》 *

Cited By (74)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017016318A1 (en) * 2014-11-05 2017-02-02 祝国龙 Credible label generation and verification method and system based on asymmetric cryptographic algorithm
CN105447710A (en) * 2015-11-12 2016-03-30 东北大学 Commodity authenticity verification system and commodity authenticity verification method based on two-dimensional barcode in e-commerce
CN105490708A (en) * 2015-12-09 2016-04-13 广东欧珀移动通信有限公司 Method and device for reading and writing smart card
CN105490708B (en) * 2015-12-09 2018-01-23 广东欧珀移动通信有限公司 A kind of method and device for reading and writing smart card
CN105427117A (en) * 2015-12-18 2016-03-23 沈阳圆梦科技有限公司 Universal traceable anti-fake system of agricultural products based on electronic data preservation technology and method of same
CN105634741A (en) * 2015-12-24 2016-06-01 上海莱柏信息科技有限公司 Identity authentication method based on trusted tag and identity authentication system based on trusted tag
WO2017123152A1 (en) * 2016-01-11 2017-07-20 Mastercard Asia/Pacific Pte Ltd A method for dynamic authentication of an object
US10396998B2 (en) 2016-01-11 2019-08-27 Mastercard Asia/Pacific Pte. Ltd. Method for dynamic authentication of an object
CN105590227A (en) * 2016-01-14 2016-05-18 姜智广 Dynamic verification method, apparatus, and system of authenticity of commodity
CN106027479A (en) * 2016-01-21 2016-10-12 李明 Dynamic processing method and system for identity card authentication information processing request
CN106027479B (en) * 2016-01-21 2019-04-05 李明 A kind of method for dynamically processing and system of authentication ids information process request
CN113691560B (en) * 2016-02-05 2023-08-25 安赛飞保安有限公司 Data transmission method, method for controlling data use, and cryptographic device
CN113691560A (en) * 2016-02-05 2021-11-23 安赛飞保安有限公司 Data transfer method, method for controlling data use, and cryptographic apparatus
CN107133828A (en) * 2016-02-26 2017-09-05 东芝泰格有限公司 Ticket server and its control method, electronic billing system and terminal device
CN107169769A (en) * 2016-03-08 2017-09-15 广州市动景计算机科技有限公司 The brush amount recognition methods of application program, device
CN106022738A (en) * 2016-06-02 2016-10-12 中国联合网络通信集团有限公司 Two-dimensional code safety payment method, terminal, and system
WO2018086515A1 (en) * 2016-11-08 2018-05-17 王栋 Verification construction method and device capable of offline verification of safety information tag
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline
CN106452756B (en) * 2016-11-08 2018-03-30 王栋 Can the safe Quick Response Code construction verification method of off-line verification and device
CN106452734A (en) * 2016-12-17 2017-02-22 上海莱柏信息科技有限公司 Trusted tag generation method based on secure element and trusted tag generation system thereof
US10693663B2 (en) 2017-02-14 2020-06-23 Alibaba Group Holding Limited Two dimensional code generation and recognition
CN107067056A (en) * 2017-02-14 2017-08-18 阿里巴巴集团控股有限公司 Two-dimensional code generation method and its equipment and two-dimensional code identification method and its equipment
CN106897761A (en) * 2017-03-06 2017-06-27 山东渔翁信息技术股份有限公司 A kind of two-dimensional code generation method and device
CN107154848A (en) * 2017-03-10 2017-09-12 深圳市盾盘科技有限公司 A kind of data encryption based on CPK certifications and storage method and device
CN107103255A (en) * 2017-04-27 2017-08-29 百望电子发票数据服务有限公司 A kind of electronic invoice layout files verification method and system
CN107392612A (en) * 2017-06-05 2017-11-24 广东工业大学 A kind of method based on traffic Quick Response Code transaction verification
CN107316182A (en) * 2017-06-30 2017-11-03 福建亿榕信息技术有限公司 A kind of generation method of electronic contract chain of evidence and generation system
WO2019012310A1 (en) * 2017-07-11 2019-01-17 Yuen Hon Man Honmy Facility media access safeguard systems
CN109495268B (en) * 2017-09-12 2020-12-29 中国移动通信集团公司 Two-dimensional code authentication method and device and computer readable storage medium
CN109495268A (en) * 2017-09-12 2019-03-19 中国移动通信集团公司 A kind of two dimension code authentication method, device and computer readable storage medium
CN107944526A (en) * 2017-10-19 2018-04-20 浙江码博士防伪科技有限公司 A kind of dimension code anti-counterfeit method of anti-tamper anti-copying
CN107944526B (en) * 2017-10-19 2021-02-23 浙江码博士防伪科技有限公司 Tamper-proof and copy-proof two-dimensional code anti-counterfeiting method
CN108366370B (en) * 2018-02-02 2019-08-02 东南大学 A kind of information transferring method quantifying privately owned asymmetric key based on radio channel characteristic
CN108366370A (en) * 2018-02-02 2018-08-03 东南大学 Quantify the information transferring method of privately owned asymmetric key based on radio channel characteristic
CN110197244A (en) * 2018-02-26 2019-09-03 Opto电子有限公司 Two dimensional code, two dimensional code output system and method, two dimensional code read system and method
CN108764930A (en) * 2018-03-23 2018-11-06 成都众宜天成科技有限公司 The implementation method of commodity counterfeit prevention verification platform based on block chain structure
CN108681904A (en) * 2018-04-01 2018-10-19 蒋欣言 A kind of fake certification implementation method of bottled formula commodity
CN109034805B (en) * 2018-08-09 2022-09-02 江苏先安科技有限公司 Timestamp signature verification method suitable for block chain and embedded field
CN109034805A (en) * 2018-08-09 2018-12-18 江苏先安科技有限公司 It is a kind of to stab signature verification method suitable for the new time of block chain and built-in field
CN109409472A (en) * 2018-08-24 2019-03-01 阿里巴巴集团控股有限公司 Two-dimensional code generation method, data processing method, device and server
CN109409472B (en) * 2018-08-24 2022-11-22 创新先进技术有限公司 Two-dimensional code generation method, data processing device and server
US10992481B2 (en) 2018-08-24 2021-04-27 Advanced New Technologies Co., Ltd. Two-dimensional code generation method, apparatus, data processing method, apparatus, and server
CN110955868A (en) * 2018-09-27 2020-04-03 千寻位置网络有限公司 Certificate expiration verification method and device and terminal equipment
CN109615030A (en) * 2018-10-12 2019-04-12 阿里巴巴集团控股有限公司 Dimension code anti-counterfeit method, equipment and system based on security application
US11568424B2 (en) 2018-10-18 2023-01-31 CPI Card Group—Colorado, Inc. Method and system for product authentication
WO2020081976A1 (en) * 2018-10-18 2020-04-23 Cpi Card Group - Colorado, Inc. Method and system for product authentication
CN109544182A (en) * 2018-11-20 2019-03-29 孟凡富 Product false proof verification method and system
CN109543791A (en) * 2018-11-20 2019-03-29 白绍江 Product false proof electronic tag and product false proof verification method and system
CN109583555A (en) * 2018-11-20 2019-04-05 王建新 Product false proof electronic tag and electronic tag authentication method and system
CN109583555B (en) * 2018-11-20 2022-02-22 王建新 Product anti-counterfeiting electronic tag authentication method and system
CN109544182B (en) * 2018-11-20 2021-05-14 孟凡富 Product anti-counterfeiting verification method and system
CN109543791B (en) * 2018-11-20 2022-01-25 白绍江 Product anti-counterfeiting verification method and system
WO2020143318A1 (en) * 2019-01-07 2020-07-16 平安科技(深圳)有限公司 Data verification method and terminal device
CN109886006A (en) * 2019-02-28 2019-06-14 尤尼泰克(嘉兴)信息技术有限公司 A kind of information source checking method and device based on two dimensional code
CN110472715A (en) * 2019-08-21 2019-11-19 深圳市深华方科技有限公司 A kind of generation method of dynamic two-dimension code, two-dimension code generator and anti-counterfeiting system
CN110472716A (en) * 2019-08-21 2019-11-19 深圳市深华方科技有限公司 A kind of generation method of two dimensional code, two-dimension code generator and anti-counterfeiting system
CN110969445A (en) * 2019-10-31 2020-04-07 紫优科技(深圳)有限公司 Anti-counterfeiting method based on NFC
CN110912693B (en) * 2019-11-22 2022-06-03 福建金密网络安全测评技术有限公司 Digital certificate format compliance detection system
CN110912693A (en) * 2019-11-22 2020-03-24 福建金密网络安全测评技术有限公司 Digital certificate format compliance detection system
CN110830237A (en) * 2019-11-29 2020-02-21 晋商博创(北京)科技有限公司 CPK key generation method, device, entity and key center based on time
CN110830237B (en) * 2019-11-29 2023-05-12 晋商博创(北京)科技有限公司 CPK key generation method, device, entity and key center based on time
CN111178913A (en) * 2019-12-31 2020-05-19 天津津滨信钥信息技术有限公司 Product quality assurance generation and verification method, device, server and storage medium
CN111260528B (en) * 2020-02-07 2021-09-28 赵�智 Real estate information verification method based on asymmetric algorithm
CN111260528A (en) * 2020-02-07 2020-06-09 赵�智 Real estate information verification method based on asymmetric algorithm
CN111091398B (en) * 2020-03-19 2020-08-25 北京达邦食安科技有限公司 Agricultural product traceability system
CN111091398A (en) * 2020-03-19 2020-05-01 北京达邦食安科技有限公司 Agricultural product traceability system
CN113641301A (en) * 2021-02-19 2021-11-12 中国建设银行股份有限公司 Data management method and device
CN112865972B (en) * 2021-03-31 2023-03-14 深圳市巽震科技孵化器有限公司 Initialization method, device and system based on digital certificate platform and storage device
CN112865972A (en) * 2021-03-31 2021-05-28 深圳市巽震科技孵化器有限公司 Initialization method, device and system based on digital certificate platform and storage device
CN114492491A (en) * 2022-01-24 2022-05-13 芯电智联(北京)科技有限公司 Data management system for NFC label application
CN114491671A (en) * 2022-01-27 2022-05-13 宋舒涵 Market supervision commodity label tracing method and system based on block chain
CN114491671B (en) * 2022-01-27 2022-10-14 宋舒涵 Market supervision commodity label tracing method and system based on block chain
CN115277093A (en) * 2022-06-24 2022-11-01 北京奕斯伟计算技术股份有限公司 Tamper verification method, system and device thereof and electronic equipment
CN115277093B (en) * 2022-06-24 2024-03-26 北京奕斯伟计算技术股份有限公司 Tamper verification method, tamper verification system, tamper verification device and electronic equipment

Also Published As

Publication number Publication date
CN105024824B (en) 2018-12-21
WO2017016318A1 (en) 2017-02-02

Similar Documents

Publication Publication Date Title
CN105024824B (en) The generation and verification method and system of credible label based on rivest, shamir, adelman
JP7385663B2 (en) Method and system for preparing and performing object authentication
CN1997953B (en) Method and device for protecting digital content in mobile applications
TWI718567B (en) Two-dimensional code generation method, data processing method, device, server and computer readable storage medium
CN102799990A (en) Double-two-dimensional product anti-counterfeiting scheme based on PKI (Public Key Infrastructure)
CN102930307A (en) Anti-counterfeiting authentication method for famous wine
CN102799989A (en) Product source tracing scheme based on PKI (Public Key Infrastructure) and two-dimensional codes
CN102385710B (en) Method and system for verifying fact or fiction
CN110309663B (en) Privacy authentication method and system based on block chain
CN104463016A (en) Data safety storing method suitable for IC cards and two-dimension codes
CN107944526B (en) Tamper-proof and copy-proof two-dimensional code anti-counterfeiting method
CN103795546A (en) Generating method and authentication method of data label and system of generating method and authentication method
JP2015162694A (en) Article authentication system, authentication server and article authentication method
WO2015154482A1 (en) One-time certificate anti-counterfeiting tracing system based on mobile terminal and rfid
CN110969445A (en) Anti-counterfeiting method based on NFC
CN110598433A (en) Anti-counterfeiting information processing method and device based on block chain
US20180205714A1 (en) System and Method for Authenticating Electronic Tags
JPH10135943A (en) Portable information storage medium, verification method and verification system
CN115511019A (en) Anti-counterfeiting verification method for binding RFID (radio frequency identification) label and article bar code
US20190026749A1 (en) Security tag and electronic system usable with molded case circuit breakers
CN111523132A (en) Data storage and transmission method and device based on identification technology
CN104243164A (en) Dynamic encryption non-contact type anti-counterfeit label and control method
CN101369296A (en) Method and system for implementing off-line printing limitation
JP4923388B2 (en) Content certification system
JP2004318645A (en) Radio tag security extension method, id management computer system, proxy server device, their programs, and recording medium of programs

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20180917

Address after: 321100 science and technology talent Park, 85 Zhiyuan Road, Lanxi, Zhejiang

Applicant after: Zhejiang code PhD anti-counterfeit technology Co., Ltd.

Address before: 226001 Room 303, 30, Hua Di Park, Hao Xi garden, Nantong, Jiangsu.

Applicant before: Zhu Guolong

Applicant before: Xu Tian

GR01 Patent grant
GR01 Patent grant