CN105703904A - Anti-fake method based on public key cipher and system - Google Patents

Anti-fake method based on public key cipher and system Download PDF

Info

Publication number
CN105703904A
CN105703904A CN201410699445.3A CN201410699445A CN105703904A CN 105703904 A CN105703904 A CN 105703904A CN 201410699445 A CN201410699445 A CN 201410699445A CN 105703904 A CN105703904 A CN 105703904A
Authority
CN
China
Prior art keywords
certificate
pki
random challenge
private key
manufacturer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410699445.3A
Other languages
Chinese (zh)
Other versions
CN105703904B (en
Inventor
荆继武
韩晔
章庆隆
向继
高能
刘宗斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Data Assurance and Communication Security Research Center of CAS
Original Assignee
Data Assurance and Communication Security Research Center of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Data Assurance and Communication Security Research Center of CAS filed Critical Data Assurance and Communication Security Research Center of CAS
Priority to CN201410699445.3A priority Critical patent/CN105703904B/en
Publication of CN105703904A publication Critical patent/CN105703904A/en
Application granted granted Critical
Publication of CN105703904B publication Critical patent/CN105703904B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses an anti-fake method based on a public key cipher and a system. A first public/private key pair is generated by the factory marking equipment, a second public/private key pair is generated by an anti-fake module, through generating a root certificate at a registration step, a manufacturer certificate related to the first public key and a commodity certificate related to the first private key and the second public key and generating the random challenge information in a verification step and the random challenge response information related to the second private key are generated, verification is carried out gradually, and the safety is improved.

Description

A kind of method for anti-counterfeit based on public key cryptography and system
Technical field
The present invention relates to key security fields, particularly to a kind of method for anti-counterfeit based on public key cryptography and system。
Background technology
The existing Antiforge system based on password mainly adopts symmetric cryptographic algorithm。Symmetric cryptographic algorithm is again conventional cipher algorithm sometimes, it is simply that encryption key can calculate out from decruption key, utilizes encryption key also can extrapolate decruption key in turn。In most of symmetry algorithms, encrypted decryption key is identical, and it requires that sender and recipient are before secure communication, decides through consultation a key, utilizes same key to encrypt and decrypt。Therefore, based on the system of symmetric cryptographic algorithm, its safety depends on key, and leakage key means that message can be encrypted deciphering by anyone。
The advantage of symmetric cryptographic algorithm is in that efficiency is high, and algorithm is simple, and overhead is little, is suitable for encryption mass data。Although symmetric cipher has some excellent characteristics, but it there is also significantly defect。First, need to carry out in a secure manner key exchange before securely communicating;And carry out the exchange of safe key in some cases can be extremely difficult, even cannot realize。Secondly, scale is complicated;For example, the key between A and B two people, necessarily different from the key between A and C two people, will be on the hazard otherwise to the safety of the message of B;Therefore, in the group having 1000 users, A needs to keep at least 999 keys;For other user in this group, this kind of situation equally exists, and this group needs altogether 500,000 different keys nearly, and in the same way, the group of n user needs n2/ 2 different keys。
Owing to symmetric cryptographic algorithm itself has above deficiency so that the existing Antiforge system based on symmetric cryptographic algorithm faces bigger challenge in key management and key distribution;The same key that in symmetric key algorithm, encryption and decryption uses, or can be easy to release decruption key from encryption key, once the person of being hacked steals, whole Antiforge system also will be cracked。
Summary of the invention
In view of this, present invention is primarily targeted at a kind of method for anti-counterfeit based on public key cryptography of offer and system, while avoiding key scale complexity, improve safety。
For achieving the above object, the invention provides a kind of method for anti-counterfeit based on public key cryptography, including:
Registration step:
Anti-fake certificate is centrally generated root certificate, sends root certificate to verifying equipment;
The marking equipment that dispatches from the factory generates the first private key, and generates the first PKI by public key algorithm, and sends the first PKI to anti-fake certificate center;
Described anti-fake certificate center generates manufacturer's certificate according to described first PKI, and sends described manufacturer certificate to the marking equipment that dispatches from the factory;
It is arranged at the false proof module treating in anti-fake product and generates the second private key and the second PKI, and by the marking equipment that dispatches from the factory described in described second PKI transmission extremely;
The described marking equipment that dispatches from the factory utilizes described first private key and the second PKI to generate commercial product certificate, and sends described manufacturer certificate and commercial product certificate to described false proof module;
Verification step:
Checking equipment generates random challenge information and sends described random challenge information to described false proof module;
Described false proof module utilizes described second private key and described random challenge information to generate random challenge response message, and sends described random challenge response message, manufacturer's certificate and commercial product certificate to described checking equipment;
Checking equipment verifies root certificate, manufacturer's certificate, commercial product certificate and random challenge response message successively。
Further, anti-fake certificate described in registration step is centrally generated root certificate and includes:
Described anti-fake certificate is centrally generated the 3rd PKI and the 3rd private key;
Described anti-fake certificate center utilizes described 3rd private key that described 3rd PKI is signed, and generates described certificate。
Further, in registration step, described anti-fake certificate center utilizes described 3rd private key that described first PKI is signed, and generates described manufacturer certificate。
Further, registration step is arranged at the false proof module treating in anti-fake product and generates the second private key and the second PKI, and the marking equipment that dispatches from the factory described in described second PKI transmission extremely is included:
Described false proof module becomes random number, according to described generating random number the second private key;
Described false proof module generates the second PKI according to described second private key and public key algorithm;
Described false proof module is by the marking equipment that dispatches from the factory described in described second PKI transmission extremely。
Further, the marking equipment that dispatches from the factory described in registration step utilizes described first private key and the second PKI to generate commercial product certificate, and described manufacturer certificate and commercial product certificate transmission is included to described false proof module:
The described marking equipment that dispatches from the factory utilizes described first private key that described second PKI is signed, and generates described commercial product certificate;
Described manufacturer certificate and commercial product certificate are sent to described false proof module。
Further, false proof module described in verification step utilizes described second private key and described random challenge information to generate random challenge response message, and the extremely described checking equipment that described random challenge response message, manufacturer's certificate and commercial product certificate sent includes:
Described false proof module utilizes described second private key that described random challenge information is signed, and generates described random challenge response message;
Described random challenge response message, manufacturer's certificate and commercial product certificate are sent to described checking equipment by described false proof module。
Further, the described checking equipment in verification step verifies that root certificate, manufacturer's certificate, commercial product certificate and random challenge response message include successively:
Described certificate is carried out signature authentication by described checking equipment, is derived from the 3rd PKI;
Described manufacturer certificate is carried out signature verification by the 3rd PKI that described checking equipment utilization obtains, it is thus achieved that the first PKI;
Described commercial product certificate is carried out signature verification by the first PKI that described checking equipment utilization obtains, it is thus achieved that the second PKI;
Described random challenge response message is carried out signature verification by the second PKI that described checking equipment utilization obtains, it is thus achieved that random challenge information;
The random challenge information that the contrast of described checking equipment is generated with described checking equipment by the random challenge information obtained in described random challenge response message, if consistent, is proved to be successful, if inconsistent, authentication failed。
Present invention also offers a kind of Antiforge system based on public key cryptography, including: the marking equipment that dispatches from the factory, anti-fake certificate center, false proof module and checking equipment;
Wherein, the marking equipment that dispatches from the factory described in includes the first key production module and commercial product certificate generation module;Described first key production module, for generating the first private key at registration phase, generates the first PKI by public key algorithm, and sends the first PKI to described anti-fake certificate center;Described commercial product certificate generation module is for utilizing described first private key and the second PKI to generate commercial product certificate at registration phase;
Described anti-fake certificate center is used for, at registration phase generation root certificate, sending root certificate to verifying equipment, and for generating manufacturer's certificate according to described first PKI, and by the marking equipment that dispatches from the factory described in the certificate transmission extremely of described manufacturer;
Described false proof module is arranged to be treated in anti-fake product, including the second key production module and random challenge response message module;Described second key production module is used for generating the second private key and the second PKI at registration phase, and by the marking equipment that dispatches from the factory described in described second PKI transmission extremely;Described random challenge response message module is for utilizing described second private key and random challenge information to generate random challenge response message at Qualify Phase, and sends described random challenge response message, manufacturer's certificate and commercial product certificate to described checking equipment;
Described checking equipment includes at Qualify Phase for generating random challenge information and described random challenge information being sent the random challenge generation module to described false proof module;And the authentication module for checking root certificate, manufacturer's certificate, commercial product certificate and random challenge response message successively。
Adopt a kind of method for anti-counterfeit based on public key cryptography provided by the invention and system, the first public and private key pair is generated by the marking equipment that dispatches from the factory, the second public and private key pair is generated by false proof module, by the commercial product certificate that the manufacturer certificate relevant at registration step generation root certificate and the first PKI and the first private key and the second PKI are relevant, and in verification step, generate random challenge information and the random challenge response message relevant to the second private key, gradually verify, which thereby enhance safety。
Accompanying drawing explanation
Fig. 1 is a kind of method for anti-counterfeit schematic flow sheet based on public key cryptography of the present invention;
Fig. 2 is a kind of method for anti-counterfeit exemplary embodiments schematic flow sheet based on public key cryptography of the present invention。
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearly understand, develop simultaneously embodiment referring to accompanying drawing, the present invention is described in further detail。
The present invention is based on realization considered below:
Public key cryptography, also referred to as asymmetric cryptography, is a kind of cipher system, for instance current most widely used RSA Algorithm and elliptic curve (SM2)。In asymmetric cryptosystem, AES uses different keys with decipherment algorithm: one is PKI, and one is private key。Public key algorithm expressly will convert ciphertext to in two keys, recovers expressly from ciphertext with another key。In prior art, public-key cryptosystem application be mainly encryption deciphering, digital signature and key exchange。
The advantage of public key algorithm makes it can serve as authentication, and key sends the fairly simple safety of mode, improves the safety of whole Antiforge system, it is possible to the false proof protection of improving product preferably。
Based on above-mentioned consideration, as it is shown in figure 1, the invention provides a kind of method for anti-counterfeit based on public key cryptography, including:
Anti-fake certificate is centrally generated root certificate, sends root certificate to verifying equipment;
The marking equipment that dispatches from the factory generates the first private key, and generates the first PKI by public key algorithm, and sends the first PKI to anti-fake certificate center;
Described anti-fake certificate center generates manufacturer's certificate according to described first PKI, and sends described manufacturer certificate to the marking equipment that dispatches from the factory;
It is arranged at the false proof module treating in anti-fake product and generates the second private key and the second PKI, and by the marking equipment that dispatches from the factory described in described second PKI transmission extremely;
The described marking equipment that dispatches from the factory utilizes described first private key and the second PKI to generate commercial product certificate, and sends described manufacturer certificate and commercial product certificate to described false proof module;
Verification step:
Checking equipment generates random challenge information and sends described random challenge information to described false proof module;
Described false proof module utilizes described second private key and described random challenge information to generate random challenge response message, and sends described random challenge response message, manufacturer's certificate and commercial product certificate to described checking equipment;
Checking equipment verifies root certificate, manufacturer's certificate, commercial product certificate and random challenge response message successively。
Below in conjunction with accompanying drawing 2, the exemplary embodiments of the application is described in detail:
Registration step:
Step 1.1 anti-fake certificate is centrally generated the 3rd private key and the 3rd PKI;
Step 1.2 anti-fake certificate center utilizes the 3rd private key that the 3rd PKI is signed, and generates root certificate;
Root certificate is sent to verifying equipment by step 1.3 anti-fake certificate center;
Step 1.4 marking equipment that dispatches from the factory generates the first private key, and generates the first PKI by key algorithm;
Step 1.5 dispatch from the factory marking equipment by first PKI send to anti-fake certificate center;
Step 1.6 anti-fake certificate center utilizes the 3rd private key that the first PKI is signed, and generates manufacturer's certificate;
Manufacturer's certificate is sent to the marking equipment that dispatches from the factory by step 1.7 anti-fake certificate center;
The false proof module of step 1.8 generates random number;
The false proof module of step 1.9 is according to generating random number the second private key;
The false proof module of step 2.0 generates the second PKI according to the second private key and public key algorithm;
Second PKI is sent to the marking equipment that dispatches from the factory by the false proof module of step 2.1;
Step 2.2 marking equipment that dispatches from the factory utilizes the first private key to the second public key signature, generates commercial product certificate;
Step 2.1 goes out plant and sends manufacturer's certificate and commercial product certificate to false proof module。
Verification step:
Step 3.1 verifies that equipment generates random challenge information;
Step 3.2 verifies that random challenge information is sent to false proof module by equipment;
The false proof module of step 3.3 utilizes the second private key that described random challenge information is signed, and generates random challenge response message;
Random challenge response message, manufacturer's certificate and commercial product certificate are sent to verifying equipment by the false proof module of step 3.4;
Step 3.5 verifies that root certificate is carried out signature verification by equipment, is derived from the 3rd PKI;
Step 3.6 verifies that manufacturer's certificate is carried out signature verification by equipment utilization the 3rd PKI, is derived from the first PKI;
Step 3.7 verifies that commercial product certificate is carried out signature verification by the first PKI that equipment utilization obtains, and is derived from the second PKI;
Step 3.8 verifies that random challenge response message is carried out signature verification by the second PKI that equipment utilization obtains, and is derived from random challenge information;
Step 3.9 verifies the random challenge information that equipment contrast is generated with checking equipment by the random challenge information obtained in described random challenge response message, if consistent, is proved to be successful, if inconsistent, authentication failed。
In the present embodiment, in the present embodiment, the signature carried out in registration step and verification step, existing signature algorithm can be adopted to carry out, for instance SM2 signature algorithm, signature concretely comprise the following steps general knowledge known in this field, do not repeat them here;Further, in verification step, the checking flow process to the existing corresponding signature algorithm of checking employing of root certificate, do not repeat them here, be proved to be successful, illustrate that the 3rd PKI is believable, the 3rd PKI is used for verification step thereafter。
Process according to above-mentioned signature, the detailed process to the signature verification of manufacturer's certificate carried out in the present embodiment is also adopted by the checking flow process that existing signature algorithm is corresponding, if being proved to be successful, thinking that the first PKI in manufacturer's certificate is credible, being derived from the first PKI;Similar with this process, to commercial product certificate signature authentication success, then it is assumed that the second PKI in commercial product certificate is credible, is derived from the second PKI;In like manner, the signature authentication success to random challenge response message, then it is assumed that the random challenge information in random challenge response message is credible。
Corresponding with the method for anti-counterfeit based on public key cryptography provided by the invention, present invention also offers a kind of Antiforge system based on public key cryptography, including the marking equipment that dispatches from the factory, anti-fake certificate center, false proof module and checking equipment;
Based on the Antiforge system of public key cryptography, including: the marking equipment that dispatches from the factory, anti-fake certificate center, false proof module and checking equipment;
Wherein, the marking equipment that dispatches from the factory described in includes the first key production module and commercial product certificate generation module;Described first key production module, for generating the first private key at registration phase, generates the first PKI by public key algorithm, and sends the first PKI to described anti-fake certificate center;Described commercial product certificate generation module is for utilizing described first private key and the second PKI to generate commercial product certificate at registration phase;
Described anti-fake certificate center is used for, at registration phase generation root certificate, sending root certificate to verifying equipment, and for generating manufacturer's certificate according to described first PKI, and by the marking equipment that dispatches from the factory described in the certificate transmission extremely of described manufacturer;
Described false proof module is arranged to be treated in anti-fake product, including the second key production module and random challenge response message module;Described second key production module is used for generating the second private key and the second PKI at registration phase, and by the marking equipment that dispatches from the factory described in described second PKI transmission extremely;Described random challenge response message module is for utilizing described second private key and random challenge information to generate random challenge response message at Qualify Phase, and sends described random challenge response message, manufacturer's certificate and commercial product certificate to described checking equipment;
Described checking equipment includes at Qualify Phase for generating random challenge information and described random challenge information being sent the random challenge generation module to described false proof module;And the authentication module for checking root certificate, manufacturer's certificate, commercial product certificate and random challenge response message successively。
It should be noted that, the marking equipment that dispatches from the factory in above-mentioned Antiforge system, anti-fake certificate center, false proof module and checking equipment, and respectively correspond to concrete function performed in preceding method flow process, those skilled in the art all can be realized by embedded software based on hardware device, does not repeat them here。
In sum, adopt a kind of method for anti-counterfeit based on public key cryptography provided by the invention and system, the first public and private key pair is generated by the marking equipment that dispatches from the factory, the second public and private key pair is generated by false proof module, by the commercial product certificate that the manufacturer certificate relevant at registration step generation root certificate and the first PKI and the first private key and the second PKI are relevant, and in verification step, generate random challenge information and the random challenge response message relevant to the second private key, gradually verify, which thereby enhance safety。
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all within the spirit and principles in the present invention, any amendment of making, equivalent replacement, improvement etc., should be included within the scope of protection of the invention。

Claims (8)

1. the method for anti-counterfeit based on public key cryptography, it is characterised in that including:
Registration step:
Anti-fake certificate is centrally generated root certificate, sends root certificate to verifying equipment;
The marking equipment that dispatches from the factory generates the first private key, and generates the first PKI by public key algorithm, and sends the first PKI to anti-fake certificate center;
Described anti-fake certificate center generates manufacturer's certificate according to described first PKI, and sends described manufacturer certificate to the marking equipment that dispatches from the factory;
It is arranged at the false proof module treating in anti-fake product and generates the second private key and the second PKI, and by the marking equipment that dispatches from the factory described in described second PKI transmission extremely;
The described marking equipment that dispatches from the factory utilizes described first private key and the second PKI to generate commercial product certificate, and sends described manufacturer certificate and commercial product certificate to described false proof module;
Verification step:
Checking equipment generates random challenge information and sends described random challenge information to described false proof module;
Described false proof module utilizes described second private key and described random challenge information to generate random challenge response message, and sends described random challenge response message, manufacturer's certificate and commercial product certificate to described checking equipment;
Checking equipment verifies root certificate, manufacturer's certificate, commercial product certificate and random challenge response message successively。
2. method according to claim 1, it is characterised in that anti-fake certificate described in registration step is centrally generated root certificate and includes:
Described anti-fake certificate is centrally generated the 3rd PKI and the 3rd private key;
Described anti-fake certificate center utilizes described 3rd private key that described 3rd PKI is signed, and generates described certificate。
3. method according to claim 2, it is characterised in that in registration step, described anti-fake certificate center utilizes described 3rd private key that described first PKI is signed, and generates described manufacturer certificate。
4. method according to claim 3, it is characterised in that be arranged at the false proof module treating in anti-fake product in registration step and generate the second private key and the second PKI, and the marking equipment that dispatches from the factory described in described second PKI transmission extremely is included:
Described false proof module becomes random number, according to described generating random number the second private key;
Described false proof module generates the second PKI according to described second private key and public key algorithm;
Described false proof module is by the marking equipment that dispatches from the factory described in described second PKI transmission extremely。
5. method according to claim 4, it is characterised in that the marking equipment that dispatches from the factory described in registration step utilizes described first private key and the second PKI to generate commercial product certificate, and described manufacturer certificate and commercial product certificate transmission is included to described false proof module:
The described marking equipment that dispatches from the factory utilizes described first private key that described second PKI is signed, and generates described commercial product certificate;
Described manufacturer certificate and commercial product certificate are sent to described false proof module。
6. method according to claim 5, it is characterized in that, false proof module described in verification step utilizes described second private key and described random challenge information to generate random challenge response message, and the extremely described checking equipment that described random challenge response message, manufacturer's certificate and commercial product certificate sent includes:
Described false proof module utilizes described second private key that described random challenge information is signed, and generates described random challenge response message;
Described random challenge response message, manufacturer's certificate and commercial product certificate are sent to described checking equipment by described false proof module。
7. method according to claim 6, it is characterised in that the described checking equipment in verification step verifies that root certificate, manufacturer's certificate, commercial product certificate and random challenge response message include successively:
Described certificate is carried out signature authentication by described checking equipment, is derived from the 3rd PKI;
Described manufacturer certificate is carried out signature verification by the 3rd PKI that described checking equipment utilization obtains, it is thus achieved that the first PKI;
Described commercial product certificate is carried out signature verification by the first PKI that described checking equipment utilization obtains, it is thus achieved that the second PKI;
Described random challenge response message is carried out signature verification by the second PKI that described checking equipment utilization obtains, it is thus achieved that random challenge information;
The random challenge information that the contrast of described checking equipment is generated with described checking equipment by the random challenge information obtained in described random challenge response message, if consistent, is proved to be successful, if inconsistent, authentication failed。
8. the Antiforge system based on public key cryptography, it is characterised in that including: the marking equipment that dispatches from the factory, anti-fake certificate center, false proof module and checking equipment;
Wherein, the marking equipment that dispatches from the factory described in includes the first key production module and commercial product certificate generation module;Described first key production module, for generating the first private key at registration phase, generates the first PKI by public key algorithm, and sends the first PKI to described anti-fake certificate center;Described commercial product certificate generation module is for utilizing described first private key and the second PKI to generate commercial product certificate at registration phase;
Described anti-fake certificate center is used for, at registration phase generation root certificate, sending root certificate to verifying equipment, and for generating manufacturer's certificate according to described first PKI, and by the marking equipment that dispatches from the factory described in the certificate transmission extremely of described manufacturer;
Described false proof module is arranged to be treated in anti-fake product, including the second key production module and random challenge response message module;Described second key production module is used for generating the second private key and the second PKI at registration phase, and by the marking equipment that dispatches from the factory described in described second PKI transmission extremely;Described random challenge response message module is for utilizing described second private key and random challenge information to generate random challenge response message at Qualify Phase, and sends described random challenge response message, manufacturer's certificate and commercial product certificate to described checking equipment;
Described checking equipment includes at Qualify Phase for generating random challenge information and described random challenge information being sent the random challenge generation module to described false proof module;And the authentication module for checking root certificate, manufacturer's certificate, commercial product certificate and random challenge response message successively。
CN201410699445.3A 2014-11-27 2014-11-27 A kind of method for anti-counterfeit and system based on public key cryptography Expired - Fee Related CN105703904B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410699445.3A CN105703904B (en) 2014-11-27 2014-11-27 A kind of method for anti-counterfeit and system based on public key cryptography

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410699445.3A CN105703904B (en) 2014-11-27 2014-11-27 A kind of method for anti-counterfeit and system based on public key cryptography

Publications (2)

Publication Number Publication Date
CN105703904A true CN105703904A (en) 2016-06-22
CN105703904B CN105703904B (en) 2019-02-01

Family

ID=56294673

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410699445.3A Expired - Fee Related CN105703904B (en) 2014-11-27 2014-11-27 A kind of method for anti-counterfeit and system based on public key cryptography

Country Status (1)

Country Link
CN (1) CN105703904B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110086623A (en) * 2019-03-13 2019-08-02 捷德(中国)信息科技有限公司 A kind of firmware method for anti-counterfeit and safety element based on safety element

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060235805A1 (en) * 2005-04-13 2006-10-19 Mr. Feng Peng Universal anti-counterfeit method and system
CN101236677A (en) * 2008-02-15 2008-08-06 黄欣阳 False proof and false proof tax control integrated system for commodity product
US20090083833A1 (en) * 2007-09-19 2009-03-26 Verayo, Inc. Authentication with physical unclonable functions
CN101593264A (en) * 2008-05-28 2009-12-02 北京中食新华科技有限公司 Method for anti-counterfeit based on radio-frequency (RF) identification
CN102496113A (en) * 2011-11-18 2012-06-13 祝启忠 Method and system for realizing commodity authentication service
CN102663591A (en) * 2012-03-19 2012-09-12 樊俊锋 Product anti-counterfeiting method and system based on electronic tag

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060235805A1 (en) * 2005-04-13 2006-10-19 Mr. Feng Peng Universal anti-counterfeit method and system
US20090083833A1 (en) * 2007-09-19 2009-03-26 Verayo, Inc. Authentication with physical unclonable functions
CN101236677A (en) * 2008-02-15 2008-08-06 黄欣阳 False proof and false proof tax control integrated system for commodity product
CN101593264A (en) * 2008-05-28 2009-12-02 北京中食新华科技有限公司 Method for anti-counterfeit based on radio-frequency (RF) identification
CN102496113A (en) * 2011-11-18 2012-06-13 祝启忠 Method and system for realizing commodity authentication service
CN102663591A (en) * 2012-03-19 2012-09-12 樊俊锋 Product anti-counterfeiting method and system based on electronic tag

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110086623A (en) * 2019-03-13 2019-08-02 捷德(中国)信息科技有限公司 A kind of firmware method for anti-counterfeit and safety element based on safety element

Also Published As

Publication number Publication date
CN105703904B (en) 2019-02-01

Similar Documents

Publication Publication Date Title
US11323276B2 (en) Mutual authentication of confidential communication
CN106506470B (en) network data security transmission method
CN108886468B (en) System and method for distributing identity-based key material and certificates
CN104158653B (en) A kind of safety communicating method based on the close algorithm of business
CN105162599B (en) A kind of data transmission system and its transmission method
TWI444030B (en) Method for keys generation, member authentication and security communication in a dynamic group
CN105025024B (en) One kind is based on no certificate conditions proxy re-encryption System and method for
JP2009503934A (en) Cryptographic authentication and / or shared encryption key configuration using signature keys encrypted with non-one-time pad cryptography, including but not limited to technology with improved security against malleable attacks
CN110087240B (en) Wireless network security data transmission method and system based on WPA2-PSK mode
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN110535626B (en) Secret communication method and system for identity-based quantum communication service station
CN106685969A (en) Hybrid-encrypted information transmission method and transmission system
CN103036880A (en) Network information transmission method, transmission equipment and transmission system
CN104424446A (en) Safety verification and transmission method and system
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN106713349B (en) Inter-group proxy re-encryption method capable of resisting attack of selecting cipher text
US11722466B2 (en) Methods for communicating data utilizing sessionless dynamic encryption
CN103297230B (en) Information encipher-decipher method, Apparatus and system
JP2015226132A (en) Signature verification system, communication device, verification device, signature generation method and signature verification method
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
CN102970144A (en) Identity-based authentication method
CN104243493A (en) Network identity authentication method and system
CN104753682A (en) Generating system and method of session keys
GB2543359A (en) Methods and apparatus for secure communication
Kim et al. Secure and efficient anonymous authentication scheme in global mobility networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190201

Termination date: 20191127