CN105703904A - Anti-fake method based on public key cipher and system - Google Patents
Anti-fake method based on public key cipher and system Download PDFInfo
- Publication number
- CN105703904A CN105703904A CN201410699445.3A CN201410699445A CN105703904A CN 105703904 A CN105703904 A CN 105703904A CN 201410699445 A CN201410699445 A CN 201410699445A CN 105703904 A CN105703904 A CN 105703904A
- Authority
- CN
- China
- Prior art keywords
- certificate
- pki
- random challenge
- private key
- manufacturer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The invention discloses an anti-fake method based on a public key cipher and a system. A first public/private key pair is generated by the factory marking equipment, a second public/private key pair is generated by an anti-fake module, through generating a root certificate at a registration step, a manufacturer certificate related to the first public key and a commodity certificate related to the first private key and the second public key and generating the random challenge information in a verification step and the random challenge response information related to the second private key are generated, verification is carried out gradually, and the safety is improved.
Description
Technical field
The present invention relates to key security fields, particularly to a kind of method for anti-counterfeit based on public key cryptography and system。
Background technology
The existing Antiforge system based on password mainly adopts symmetric cryptographic algorithm。Symmetric cryptographic algorithm is again conventional cipher algorithm sometimes, it is simply that encryption key can calculate out from decruption key, utilizes encryption key also can extrapolate decruption key in turn。In most of symmetry algorithms, encrypted decryption key is identical, and it requires that sender and recipient are before secure communication, decides through consultation a key, utilizes same key to encrypt and decrypt。Therefore, based on the system of symmetric cryptographic algorithm, its safety depends on key, and leakage key means that message can be encrypted deciphering by anyone。
The advantage of symmetric cryptographic algorithm is in that efficiency is high, and algorithm is simple, and overhead is little, is suitable for encryption mass data。Although symmetric cipher has some excellent characteristics, but it there is also significantly defect。First, need to carry out in a secure manner key exchange before securely communicating;And carry out the exchange of safe key in some cases can be extremely difficult, even cannot realize。Secondly, scale is complicated;For example, the key between A and B two people, necessarily different from the key between A and C two people, will be on the hazard otherwise to the safety of the message of B;Therefore, in the group having 1000 users, A needs to keep at least 999 keys;For other user in this group, this kind of situation equally exists, and this group needs altogether 500,000 different keys nearly, and in the same way, the group of n user needs n2/ 2 different keys。
Owing to symmetric cryptographic algorithm itself has above deficiency so that the existing Antiforge system based on symmetric cryptographic algorithm faces bigger challenge in key management and key distribution;The same key that in symmetric key algorithm, encryption and decryption uses, or can be easy to release decruption key from encryption key, once the person of being hacked steals, whole Antiforge system also will be cracked。
Summary of the invention
In view of this, present invention is primarily targeted at a kind of method for anti-counterfeit based on public key cryptography of offer and system, while avoiding key scale complexity, improve safety。
For achieving the above object, the invention provides a kind of method for anti-counterfeit based on public key cryptography, including:
Registration step:
Anti-fake certificate is centrally generated root certificate, sends root certificate to verifying equipment;
The marking equipment that dispatches from the factory generates the first private key, and generates the first PKI by public key algorithm, and sends the first PKI to anti-fake certificate center;
Described anti-fake certificate center generates manufacturer's certificate according to described first PKI, and sends described manufacturer certificate to the marking equipment that dispatches from the factory;
It is arranged at the false proof module treating in anti-fake product and generates the second private key and the second PKI, and by the marking equipment that dispatches from the factory described in described second PKI transmission extremely;
The described marking equipment that dispatches from the factory utilizes described first private key and the second PKI to generate commercial product certificate, and sends described manufacturer certificate and commercial product certificate to described false proof module;
Verification step:
Checking equipment generates random challenge information and sends described random challenge information to described false proof module;
Described false proof module utilizes described second private key and described random challenge information to generate random challenge response message, and sends described random challenge response message, manufacturer's certificate and commercial product certificate to described checking equipment;
Checking equipment verifies root certificate, manufacturer's certificate, commercial product certificate and random challenge response message successively。
Further, anti-fake certificate described in registration step is centrally generated root certificate and includes:
Described anti-fake certificate is centrally generated the 3rd PKI and the 3rd private key;
Described anti-fake certificate center utilizes described 3rd private key that described 3rd PKI is signed, and generates described certificate。
Further, in registration step, described anti-fake certificate center utilizes described 3rd private key that described first PKI is signed, and generates described manufacturer certificate。
Further, registration step is arranged at the false proof module treating in anti-fake product and generates the second private key and the second PKI, and the marking equipment that dispatches from the factory described in described second PKI transmission extremely is included:
Described false proof module becomes random number, according to described generating random number the second private key;
Described false proof module generates the second PKI according to described second private key and public key algorithm;
Described false proof module is by the marking equipment that dispatches from the factory described in described second PKI transmission extremely。
Further, the marking equipment that dispatches from the factory described in registration step utilizes described first private key and the second PKI to generate commercial product certificate, and described manufacturer certificate and commercial product certificate transmission is included to described false proof module:
The described marking equipment that dispatches from the factory utilizes described first private key that described second PKI is signed, and generates described commercial product certificate;
Described manufacturer certificate and commercial product certificate are sent to described false proof module。
Further, false proof module described in verification step utilizes described second private key and described random challenge information to generate random challenge response message, and the extremely described checking equipment that described random challenge response message, manufacturer's certificate and commercial product certificate sent includes:
Described false proof module utilizes described second private key that described random challenge information is signed, and generates described random challenge response message;
Described random challenge response message, manufacturer's certificate and commercial product certificate are sent to described checking equipment by described false proof module。
Further, the described checking equipment in verification step verifies that root certificate, manufacturer's certificate, commercial product certificate and random challenge response message include successively:
Described certificate is carried out signature authentication by described checking equipment, is derived from the 3rd PKI;
Described manufacturer certificate is carried out signature verification by the 3rd PKI that described checking equipment utilization obtains, it is thus achieved that the first PKI;
Described commercial product certificate is carried out signature verification by the first PKI that described checking equipment utilization obtains, it is thus achieved that the second PKI;
Described random challenge response message is carried out signature verification by the second PKI that described checking equipment utilization obtains, it is thus achieved that random challenge information;
The random challenge information that the contrast of described checking equipment is generated with described checking equipment by the random challenge information obtained in described random challenge response message, if consistent, is proved to be successful, if inconsistent, authentication failed。
Present invention also offers a kind of Antiforge system based on public key cryptography, including: the marking equipment that dispatches from the factory, anti-fake certificate center, false proof module and checking equipment;
Wherein, the marking equipment that dispatches from the factory described in includes the first key production module and commercial product certificate generation module;Described first key production module, for generating the first private key at registration phase, generates the first PKI by public key algorithm, and sends the first PKI to described anti-fake certificate center;Described commercial product certificate generation module is for utilizing described first private key and the second PKI to generate commercial product certificate at registration phase;
Described anti-fake certificate center is used for, at registration phase generation root certificate, sending root certificate to verifying equipment, and for generating manufacturer's certificate according to described first PKI, and by the marking equipment that dispatches from the factory described in the certificate transmission extremely of described manufacturer;
Described false proof module is arranged to be treated in anti-fake product, including the second key production module and random challenge response message module;Described second key production module is used for generating the second private key and the second PKI at registration phase, and by the marking equipment that dispatches from the factory described in described second PKI transmission extremely;Described random challenge response message module is for utilizing described second private key and random challenge information to generate random challenge response message at Qualify Phase, and sends described random challenge response message, manufacturer's certificate and commercial product certificate to described checking equipment;
Described checking equipment includes at Qualify Phase for generating random challenge information and described random challenge information being sent the random challenge generation module to described false proof module;And the authentication module for checking root certificate, manufacturer's certificate, commercial product certificate and random challenge response message successively。
Adopt a kind of method for anti-counterfeit based on public key cryptography provided by the invention and system, the first public and private key pair is generated by the marking equipment that dispatches from the factory, the second public and private key pair is generated by false proof module, by the commercial product certificate that the manufacturer certificate relevant at registration step generation root certificate and the first PKI and the first private key and the second PKI are relevant, and in verification step, generate random challenge information and the random challenge response message relevant to the second private key, gradually verify, which thereby enhance safety。
Accompanying drawing explanation
Fig. 1 is a kind of method for anti-counterfeit schematic flow sheet based on public key cryptography of the present invention;
Fig. 2 is a kind of method for anti-counterfeit exemplary embodiments schematic flow sheet based on public key cryptography of the present invention。
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearly understand, develop simultaneously embodiment referring to accompanying drawing, the present invention is described in further detail。
The present invention is based on realization considered below:
Public key cryptography, also referred to as asymmetric cryptography, is a kind of cipher system, for instance current most widely used RSA Algorithm and elliptic curve (SM2)。In asymmetric cryptosystem, AES uses different keys with decipherment algorithm: one is PKI, and one is private key。Public key algorithm expressly will convert ciphertext to in two keys, recovers expressly from ciphertext with another key。In prior art, public-key cryptosystem application be mainly encryption deciphering, digital signature and key exchange。
The advantage of public key algorithm makes it can serve as authentication, and key sends the fairly simple safety of mode, improves the safety of whole Antiforge system, it is possible to the false proof protection of improving product preferably。
Based on above-mentioned consideration, as it is shown in figure 1, the invention provides a kind of method for anti-counterfeit based on public key cryptography, including:
Anti-fake certificate is centrally generated root certificate, sends root certificate to verifying equipment;
The marking equipment that dispatches from the factory generates the first private key, and generates the first PKI by public key algorithm, and sends the first PKI to anti-fake certificate center;
Described anti-fake certificate center generates manufacturer's certificate according to described first PKI, and sends described manufacturer certificate to the marking equipment that dispatches from the factory;
It is arranged at the false proof module treating in anti-fake product and generates the second private key and the second PKI, and by the marking equipment that dispatches from the factory described in described second PKI transmission extremely;
The described marking equipment that dispatches from the factory utilizes described first private key and the second PKI to generate commercial product certificate, and sends described manufacturer certificate and commercial product certificate to described false proof module;
Verification step:
Checking equipment generates random challenge information and sends described random challenge information to described false proof module;
Described false proof module utilizes described second private key and described random challenge information to generate random challenge response message, and sends described random challenge response message, manufacturer's certificate and commercial product certificate to described checking equipment;
Checking equipment verifies root certificate, manufacturer's certificate, commercial product certificate and random challenge response message successively。
Below in conjunction with accompanying drawing 2, the exemplary embodiments of the application is described in detail:
Registration step:
Step 1.1 anti-fake certificate is centrally generated the 3rd private key and the 3rd PKI;
Step 1.2 anti-fake certificate center utilizes the 3rd private key that the 3rd PKI is signed, and generates root certificate;
Root certificate is sent to verifying equipment by step 1.3 anti-fake certificate center;
Step 1.4 marking equipment that dispatches from the factory generates the first private key, and generates the first PKI by key algorithm;
Step 1.5 dispatch from the factory marking equipment by first PKI send to anti-fake certificate center;
Step 1.6 anti-fake certificate center utilizes the 3rd private key that the first PKI is signed, and generates manufacturer's certificate;
Manufacturer's certificate is sent to the marking equipment that dispatches from the factory by step 1.7 anti-fake certificate center;
The false proof module of step 1.8 generates random number;
The false proof module of step 1.9 is according to generating random number the second private key;
The false proof module of step 2.0 generates the second PKI according to the second private key and public key algorithm;
Second PKI is sent to the marking equipment that dispatches from the factory by the false proof module of step 2.1;
Step 2.2 marking equipment that dispatches from the factory utilizes the first private key to the second public key signature, generates commercial product certificate;
Step 2.1 goes out plant and sends manufacturer's certificate and commercial product certificate to false proof module。
Verification step:
Step 3.1 verifies that equipment generates random challenge information;
Step 3.2 verifies that random challenge information is sent to false proof module by equipment;
The false proof module of step 3.3 utilizes the second private key that described random challenge information is signed, and generates random challenge response message;
Random challenge response message, manufacturer's certificate and commercial product certificate are sent to verifying equipment by the false proof module of step 3.4;
Step 3.5 verifies that root certificate is carried out signature verification by equipment, is derived from the 3rd PKI;
Step 3.6 verifies that manufacturer's certificate is carried out signature verification by equipment utilization the 3rd PKI, is derived from the first PKI;
Step 3.7 verifies that commercial product certificate is carried out signature verification by the first PKI that equipment utilization obtains, and is derived from the second PKI;
Step 3.8 verifies that random challenge response message is carried out signature verification by the second PKI that equipment utilization obtains, and is derived from random challenge information;
Step 3.9 verifies the random challenge information that equipment contrast is generated with checking equipment by the random challenge information obtained in described random challenge response message, if consistent, is proved to be successful, if inconsistent, authentication failed。
In the present embodiment, in the present embodiment, the signature carried out in registration step and verification step, existing signature algorithm can be adopted to carry out, for instance SM2 signature algorithm, signature concretely comprise the following steps general knowledge known in this field, do not repeat them here;Further, in verification step, the checking flow process to the existing corresponding signature algorithm of checking employing of root certificate, do not repeat them here, be proved to be successful, illustrate that the 3rd PKI is believable, the 3rd PKI is used for verification step thereafter。
Process according to above-mentioned signature, the detailed process to the signature verification of manufacturer's certificate carried out in the present embodiment is also adopted by the checking flow process that existing signature algorithm is corresponding, if being proved to be successful, thinking that the first PKI in manufacturer's certificate is credible, being derived from the first PKI;Similar with this process, to commercial product certificate signature authentication success, then it is assumed that the second PKI in commercial product certificate is credible, is derived from the second PKI;In like manner, the signature authentication success to random challenge response message, then it is assumed that the random challenge information in random challenge response message is credible。
Corresponding with the method for anti-counterfeit based on public key cryptography provided by the invention, present invention also offers a kind of Antiforge system based on public key cryptography, including the marking equipment that dispatches from the factory, anti-fake certificate center, false proof module and checking equipment;
Based on the Antiforge system of public key cryptography, including: the marking equipment that dispatches from the factory, anti-fake certificate center, false proof module and checking equipment;
Wherein, the marking equipment that dispatches from the factory described in includes the first key production module and commercial product certificate generation module;Described first key production module, for generating the first private key at registration phase, generates the first PKI by public key algorithm, and sends the first PKI to described anti-fake certificate center;Described commercial product certificate generation module is for utilizing described first private key and the second PKI to generate commercial product certificate at registration phase;
Described anti-fake certificate center is used for, at registration phase generation root certificate, sending root certificate to verifying equipment, and for generating manufacturer's certificate according to described first PKI, and by the marking equipment that dispatches from the factory described in the certificate transmission extremely of described manufacturer;
Described false proof module is arranged to be treated in anti-fake product, including the second key production module and random challenge response message module;Described second key production module is used for generating the second private key and the second PKI at registration phase, and by the marking equipment that dispatches from the factory described in described second PKI transmission extremely;Described random challenge response message module is for utilizing described second private key and random challenge information to generate random challenge response message at Qualify Phase, and sends described random challenge response message, manufacturer's certificate and commercial product certificate to described checking equipment;
Described checking equipment includes at Qualify Phase for generating random challenge information and described random challenge information being sent the random challenge generation module to described false proof module;And the authentication module for checking root certificate, manufacturer's certificate, commercial product certificate and random challenge response message successively。
It should be noted that, the marking equipment that dispatches from the factory in above-mentioned Antiforge system, anti-fake certificate center, false proof module and checking equipment, and respectively correspond to concrete function performed in preceding method flow process, those skilled in the art all can be realized by embedded software based on hardware device, does not repeat them here。
In sum, adopt a kind of method for anti-counterfeit based on public key cryptography provided by the invention and system, the first public and private key pair is generated by the marking equipment that dispatches from the factory, the second public and private key pair is generated by false proof module, by the commercial product certificate that the manufacturer certificate relevant at registration step generation root certificate and the first PKI and the first private key and the second PKI are relevant, and in verification step, generate random challenge information and the random challenge response message relevant to the second private key, gradually verify, which thereby enhance safety。
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all within the spirit and principles in the present invention, any amendment of making, equivalent replacement, improvement etc., should be included within the scope of protection of the invention。
Claims (8)
1. the method for anti-counterfeit based on public key cryptography, it is characterised in that including:
Registration step:
Anti-fake certificate is centrally generated root certificate, sends root certificate to verifying equipment;
The marking equipment that dispatches from the factory generates the first private key, and generates the first PKI by public key algorithm, and sends the first PKI to anti-fake certificate center;
Described anti-fake certificate center generates manufacturer's certificate according to described first PKI, and sends described manufacturer certificate to the marking equipment that dispatches from the factory;
It is arranged at the false proof module treating in anti-fake product and generates the second private key and the second PKI, and by the marking equipment that dispatches from the factory described in described second PKI transmission extremely;
The described marking equipment that dispatches from the factory utilizes described first private key and the second PKI to generate commercial product certificate, and sends described manufacturer certificate and commercial product certificate to described false proof module;
Verification step:
Checking equipment generates random challenge information and sends described random challenge information to described false proof module;
Described false proof module utilizes described second private key and described random challenge information to generate random challenge response message, and sends described random challenge response message, manufacturer's certificate and commercial product certificate to described checking equipment;
Checking equipment verifies root certificate, manufacturer's certificate, commercial product certificate and random challenge response message successively。
2. method according to claim 1, it is characterised in that anti-fake certificate described in registration step is centrally generated root certificate and includes:
Described anti-fake certificate is centrally generated the 3rd PKI and the 3rd private key;
Described anti-fake certificate center utilizes described 3rd private key that described 3rd PKI is signed, and generates described certificate。
3. method according to claim 2, it is characterised in that in registration step, described anti-fake certificate center utilizes described 3rd private key that described first PKI is signed, and generates described manufacturer certificate。
4. method according to claim 3, it is characterised in that be arranged at the false proof module treating in anti-fake product in registration step and generate the second private key and the second PKI, and the marking equipment that dispatches from the factory described in described second PKI transmission extremely is included:
Described false proof module becomes random number, according to described generating random number the second private key;
Described false proof module generates the second PKI according to described second private key and public key algorithm;
Described false proof module is by the marking equipment that dispatches from the factory described in described second PKI transmission extremely。
5. method according to claim 4, it is characterised in that the marking equipment that dispatches from the factory described in registration step utilizes described first private key and the second PKI to generate commercial product certificate, and described manufacturer certificate and commercial product certificate transmission is included to described false proof module:
The described marking equipment that dispatches from the factory utilizes described first private key that described second PKI is signed, and generates described commercial product certificate;
Described manufacturer certificate and commercial product certificate are sent to described false proof module。
6. method according to claim 5, it is characterized in that, false proof module described in verification step utilizes described second private key and described random challenge information to generate random challenge response message, and the extremely described checking equipment that described random challenge response message, manufacturer's certificate and commercial product certificate sent includes:
Described false proof module utilizes described second private key that described random challenge information is signed, and generates described random challenge response message;
Described random challenge response message, manufacturer's certificate and commercial product certificate are sent to described checking equipment by described false proof module。
7. method according to claim 6, it is characterised in that the described checking equipment in verification step verifies that root certificate, manufacturer's certificate, commercial product certificate and random challenge response message include successively:
Described certificate is carried out signature authentication by described checking equipment, is derived from the 3rd PKI;
Described manufacturer certificate is carried out signature verification by the 3rd PKI that described checking equipment utilization obtains, it is thus achieved that the first PKI;
Described commercial product certificate is carried out signature verification by the first PKI that described checking equipment utilization obtains, it is thus achieved that the second PKI;
Described random challenge response message is carried out signature verification by the second PKI that described checking equipment utilization obtains, it is thus achieved that random challenge information;
The random challenge information that the contrast of described checking equipment is generated with described checking equipment by the random challenge information obtained in described random challenge response message, if consistent, is proved to be successful, if inconsistent, authentication failed。
8. the Antiforge system based on public key cryptography, it is characterised in that including: the marking equipment that dispatches from the factory, anti-fake certificate center, false proof module and checking equipment;
Wherein, the marking equipment that dispatches from the factory described in includes the first key production module and commercial product certificate generation module;Described first key production module, for generating the first private key at registration phase, generates the first PKI by public key algorithm, and sends the first PKI to described anti-fake certificate center;Described commercial product certificate generation module is for utilizing described first private key and the second PKI to generate commercial product certificate at registration phase;
Described anti-fake certificate center is used for, at registration phase generation root certificate, sending root certificate to verifying equipment, and for generating manufacturer's certificate according to described first PKI, and by the marking equipment that dispatches from the factory described in the certificate transmission extremely of described manufacturer;
Described false proof module is arranged to be treated in anti-fake product, including the second key production module and random challenge response message module;Described second key production module is used for generating the second private key and the second PKI at registration phase, and by the marking equipment that dispatches from the factory described in described second PKI transmission extremely;Described random challenge response message module is for utilizing described second private key and random challenge information to generate random challenge response message at Qualify Phase, and sends described random challenge response message, manufacturer's certificate and commercial product certificate to described checking equipment;
Described checking equipment includes at Qualify Phase for generating random challenge information and described random challenge information being sent the random challenge generation module to described false proof module;And the authentication module for checking root certificate, manufacturer's certificate, commercial product certificate and random challenge response message successively。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410699445.3A CN105703904B (en) | 2014-11-27 | 2014-11-27 | A kind of method for anti-counterfeit and system based on public key cryptography |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410699445.3A CN105703904B (en) | 2014-11-27 | 2014-11-27 | A kind of method for anti-counterfeit and system based on public key cryptography |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105703904A true CN105703904A (en) | 2016-06-22 |
CN105703904B CN105703904B (en) | 2019-02-01 |
Family
ID=56294673
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410699445.3A Expired - Fee Related CN105703904B (en) | 2014-11-27 | 2014-11-27 | A kind of method for anti-counterfeit and system based on public key cryptography |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105703904B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110086623A (en) * | 2019-03-13 | 2019-08-02 | 捷德(中国)信息科技有限公司 | A kind of firmware method for anti-counterfeit and safety element based on safety element |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060235805A1 (en) * | 2005-04-13 | 2006-10-19 | Mr. Feng Peng | Universal anti-counterfeit method and system |
CN101236677A (en) * | 2008-02-15 | 2008-08-06 | 黄欣阳 | False proof and false proof tax control integrated system for commodity product |
US20090083833A1 (en) * | 2007-09-19 | 2009-03-26 | Verayo, Inc. | Authentication with physical unclonable functions |
CN101593264A (en) * | 2008-05-28 | 2009-12-02 | 北京中食新华科技有限公司 | Method for anti-counterfeit based on radio-frequency (RF) identification |
CN102496113A (en) * | 2011-11-18 | 2012-06-13 | 祝启忠 | Method and system for realizing commodity authentication service |
CN102663591A (en) * | 2012-03-19 | 2012-09-12 | 樊俊锋 | Product anti-counterfeiting method and system based on electronic tag |
-
2014
- 2014-11-27 CN CN201410699445.3A patent/CN105703904B/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060235805A1 (en) * | 2005-04-13 | 2006-10-19 | Mr. Feng Peng | Universal anti-counterfeit method and system |
US20090083833A1 (en) * | 2007-09-19 | 2009-03-26 | Verayo, Inc. | Authentication with physical unclonable functions |
CN101236677A (en) * | 2008-02-15 | 2008-08-06 | 黄欣阳 | False proof and false proof tax control integrated system for commodity product |
CN101593264A (en) * | 2008-05-28 | 2009-12-02 | 北京中食新华科技有限公司 | Method for anti-counterfeit based on radio-frequency (RF) identification |
CN102496113A (en) * | 2011-11-18 | 2012-06-13 | 祝启忠 | Method and system for realizing commodity authentication service |
CN102663591A (en) * | 2012-03-19 | 2012-09-12 | 樊俊锋 | Product anti-counterfeiting method and system based on electronic tag |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110086623A (en) * | 2019-03-13 | 2019-08-02 | 捷德(中国)信息科技有限公司 | A kind of firmware method for anti-counterfeit and safety element based on safety element |
Also Published As
Publication number | Publication date |
---|---|
CN105703904B (en) | 2019-02-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11323276B2 (en) | Mutual authentication of confidential communication | |
CN106506470B (en) | network data security transmission method | |
CN108886468B (en) | System and method for distributing identity-based key material and certificates | |
CN104158653B (en) | A kind of safety communicating method based on the close algorithm of business | |
CN105162599B (en) | A kind of data transmission system and its transmission method | |
TWI444030B (en) | Method for keys generation, member authentication and security communication in a dynamic group | |
CN105025024B (en) | One kind is based on no certificate conditions proxy re-encryption System and method for | |
JP2009503934A (en) | Cryptographic authentication and / or shared encryption key configuration using signature keys encrypted with non-one-time pad cryptography, including but not limited to technology with improved security against malleable attacks | |
CN110087240B (en) | Wireless network security data transmission method and system based on WPA2-PSK mode | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN110535626B (en) | Secret communication method and system for identity-based quantum communication service station | |
CN106685969A (en) | Hybrid-encrypted information transmission method and transmission system | |
CN103036880A (en) | Network information transmission method, transmission equipment and transmission system | |
CN104424446A (en) | Safety verification and transmission method and system | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN106713349B (en) | Inter-group proxy re-encryption method capable of resisting attack of selecting cipher text | |
US11722466B2 (en) | Methods for communicating data utilizing sessionless dynamic encryption | |
CN103297230B (en) | Information encipher-decipher method, Apparatus and system | |
JP2015226132A (en) | Signature verification system, communication device, verification device, signature generation method and signature verification method | |
CN104200154A (en) | Identity based installation package signing method and identity based installation package signing device | |
CN102970144A (en) | Identity-based authentication method | |
CN104243493A (en) | Network identity authentication method and system | |
CN104753682A (en) | Generating system and method of session keys | |
GB2543359A (en) | Methods and apparatus for secure communication | |
Kim et al. | Secure and efficient anonymous authentication scheme in global mobility networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190201 Termination date: 20191127 |