CN105844472A - RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention - Google Patents

RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention Download PDF

Info

Publication number
CN105844472A
CN105844472A CN201510015098.2A CN201510015098A CN105844472A CN 105844472 A CN105844472 A CN 105844472A CN 201510015098 A CN201510015098 A CN 201510015098A CN 105844472 A CN105844472 A CN 105844472A
Authority
CN
China
Prior art keywords
message
commodity
rfid
false
true
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510015098.2A
Other languages
Chinese (zh)
Inventor
江峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SICHUAN QIANTAIREN INVESTMENT CO Ltd
Original Assignee
SICHUAN QIANTAIREN INVESTMENT CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SICHUAN QIANTAIREN INVESTMENT CO Ltd filed Critical SICHUAN QIANTAIREN INVESTMENT CO Ltd
Priority to CN201510015098.2A priority Critical patent/CN105844472A/en
Publication of CN105844472A publication Critical patent/CN105844472A/en
Pending legal-status Critical Current

Links

Abstract

The objective of the invention is to solve a problem that the safety is lower during merchandise anti-counterfeiting identification because some user mobile terminals do not have a function of RFID and just employ the two-dimensional code technology independently. In order to achieve the above purpose, the invention employs a technical scheme that the system comprises a system server, RFID electronic tags and two-dimensional codes which are disposed on all merchandises, or a random number generator. The system achieves the good combination of the technology of RFID anti-counterfeiting identification and the technology of two-dimensional code anti-counterfeiting identification. When the user mobile terminal does not support a function of RFID reading and writing, the system is compatible with a two-dimensional code anti-counterfeiting scheme with the lower safety. Because of the protection from a one-time one-card RFID high-safety system scheme and the convenience and popularization of the two-dimensional code scheme, the system gives full consideration to high safety and high universality.

Description

The RFID commodity counterfeit prevention traceability system of compatibility two-dimension code anti-counterfeit while of a kind of
Technical field
The present invention relates to anti-counterfeiting technology field, be specifically related to Quick Response Code and the false proof knowledge of RFID Not.
Background technology
Along with the development of mobile communication technology, it is based particularly on mobile phone 2.45GHz RF identification skill Art and the development of mobile phone near field communication (NFC) (NFC 13.56MHz), mobile phone and movement The closely identification function of terminal is become stronger day by day.Mobile Internet and the life of Internet of Things forward people Detachable collar territory is permeated.Anti-counterfeit recognition technology based on this technology emerges in an endless stream.Such as, Chinese patent " a kind of based on mobile terminal and the Comodity anti-fake system of RFID " and Chinese patent " a kind of one time one card anti-fake traceability system based on mobile terminal and RFID " etc. are exactly Internet of Things The mobile interchange mode successful expansive approach on product information is reviewed and verified is crossed by Netcom.This is Row technology has surmounted the encryption authentication system of traditional A → B (→ C ...), has founded brand-new The closed loop authenticated encryption theoretical system of A → A, because of its high security and high reliability, effectively Stop RFID RFID when field of authentication uses and illegally cracked brought security breaches, Improve the level of security of RFID certification, well prevent manufacturing and marketing fake behavior, in practice In have also been obtained successfully application.But because the most all of smart mobile phone can't be reached at present All there is radio frequency recognition function (NFC function), make comprehensive popularization and application of this technology be subject to One definite limitation.Planar bar code technology is widely used in various application scenario because it is convenient universal, But Yin Qiyi is cracked and copied, safety is relatively low, is unsuitable for being directly used in commodity counterfeit prevention and traces to the source Field.
Summary of the invention
Present invention aim to address that, when commodity counterfeit prevention differentiates, certain customers' mobile terminal does not has Standby RFID radio frequency recognition function, and the safety ratio being used alone planar bar code technology is relatively low Problem.
Employed technical scheme comprise that such for realizing the object of the invention, a kind of the most compatible two The dimension false proof RFID commodity counterfeit prevention traceability system of code, including system server, be arranged on each RFID on part commodity and two-dimension code label.
In RFID on any one commodity, it is written with message T1i,j.Described disappear Breath T1i,jIt it is the RFID digital identity certificate of commodity.Wherein, i is the sequence number of commodity, i=1, 2 ... n, j are the number of times of RFID write message, j=1,2 ... m. System server storage massage set S={T2i,1、T2i,2……T2i,j, described message T2i,j With message T1i,jCorrespondence, is used for and message T1i,jCompare computing, to verify commodity true and false. When any one commodity dispatch from the factory for the first time, the RFID being arranged on these part commodity is write Enter T1i,1, system server storage massage set S={T2i,1, i.e. j=1.
In two-dimension code label electronic tag on any one commodity, it is written with message T3i.Institute State message T3iIt it is the Quick Response Code digital identity certificate of commodity.System server storage massage set Q={T4i, i=1,2 ... n}.Described message T4iWith message T3iCorrespondence, for and Message T3iCompare computing, to verify commodity true and false.Any one commodity dispatch from the factory for the first time Time, the two-dimension code label write T3 being arranged on these part commodityi, system server storage message Set Q={T4i}。
When carrying out fake certification by mobile scanning terminal commodity, there is following two mode:
Mode one: if described mobile terminal has the function of read-write RFID, then lead to Commodity are verified by overscanning RFID.
RFID anti-counterfeit recognition process is as follows:
1), after described mobile terminal device scans the RFID on commodity to be measured, will read Message X in the RFID got is sent to described system server;
2) true and false of commodity is verified: described server is by message X and described massage set S Element compare computing, verify commodity true and false;
3) if checking commodity are false, it is false that described system server sends commodity to mobile terminal Information, terminate RFID anti-counterfeit recognition;
If checking commodity are true, described system server sends commodity for really to believe to mobile terminal Breath.Described system server record also stores in this items scanning RFID corresponding Message T2i,jAnd sweep time and geographical position;And the digital identity certificate of more new commodity;
If checking commercial articles true and false is suspicious, described system server sends commercial articles true and false to mobile terminal Suspicious information, and enter relevant counterfeit goods and trace to the source the processing routine of location;
The digital identity certificate process of described more new commodity is as follows:
Described system server generates message T1i,j+1, and it is sent to described mobile terminal;Pass through Described mobile terminal is by message T1i,j+1Write verification result is the RFID electronics on genuine commodity In label, to replace original T1i,j;Described message T1i,j+1It is the RFID of new representative commodity These part commodity are carried out using during true and false certification by digital identity certificate for user next time;System System server storage and message T1i,j+1Corresponding message T2i,j+1, the most described massage set S updates For { T2i,1、T2i,2……T2i,j、T2i,j+1};Described message T2i,j+1For next time and message T1i,j+1Compare computing, to verify commodity true and false.
Described counterfeit goods trace to the source location processing routine as follows:
In described message T2i,j+1On the premise of being present in described system server, described system takes Business device receives message T1 to be verified that described mobile terminal is senti,k, from T1i,kObtain correspondence T2i,k∈{T2i,1、T2i,2……T2i,j、T2i,j+1And during k≤j, i.e. judge message T1i,k It is stolen, and is written with in the RFID on counterfeit goods;Described system service Device record also submits sweep time of mobile terminal and the geographical position of this items scanning to, simultaneously Call and submit to out system server described in last time to receive T1i,kTime mobile scanning terminal commodity The time of RFID and geographical position, for false proof crack down on counterfeit goods provide counterfeiter's possible false making time and Geographical position.
Mode two: if described mobile terminal does not have the function of read-write RFID, adopt With two-dimension code anti-counterfeit identification, commodity are verified:
If it is false for testing out commodity to be measured, it is false that described system server sends commodity to mobile terminal Information;
If it is true for testing out commodity to be measured, it is true that described system server sends commodity to mobile terminal Information.
After verifying, described system server returns these commodity to mobile terminal and has used two dimension The number of times of code anti-counterfeit recognition, and send information, described information suggestion user to user Commodity are verified by " mode one " described in employing, to obtain more reliable checking.
Further, step 2 in described " mode one ") checking commodity true and false, divides following three kinds Situation:
A) if by described comparison calculation, in described message X and massage set S any one Element does not mates, and described message X is not message T1i,j, it is false for testing out commodity to be measured, terminates True and false verification operation;
B) if by described comparison calculation, described message X and message T2 in massage set Si,j Coupling, the most described message X is message T1i,j, it is true for testing out commodity to be measured, terminates true and false verification Operation;
C) if by described comparison calculation, except message in described message X and massage set S T2i,jOther outer Match of elemental compositions, described message X is not message T1i,j, described system server Draw the conclusion that commercial articles true and false is suspicious, terminate true and false verification operation.
Further, described system also includes randomizer.
Described message T1i,jBy message CAiWith message MBi,jCombine, i.e. T1i,j= CAi&MBi,j, wherein, message CAiIt is to MAiImplement what cryptographic calculation obtained, i.e. CAi=E (MAi), MAiIt is the corresponding one section of message being made up of serial number of i-th commodity.Message MBi,jIt is by described The random number that randomizer produces, as described message MAiRFID digital ID card Book.
Described message T2i,j=MAi&CBi,j, described message CBi,jIt is to MBi,jImplement cryptographic calculation Obtain, CBi,j=H (MBi,j)。
Step 2 in described " mode one ") verify that the process of commodity true and false is as follows:
After described system server receives message X that reader sends, first determine whether the form of X With combined message T1i,jThe most identical.If it is not, the most described commodity to be measured are false, i.e. message X It it not combined message T1i,j, terminate true and false verification operation.
If the form of message X and combined message T1i,jIdentical, then message X is split as XA and XB two parts, wherein, the form of XA and CAiIdentical, the form of XB and MBi,jIdentical, i.e. X=XA&XB.Described message XA is decrypted computing, obtains MXA=E-1(XA), if MXA ≠MAiThen commodity are false, i.e. message X is not combined message T1i,j, terminate true and false verification operation. If MXA=MAi, then MA is found outiCorresponding CBi,j, XB is carried out one-way function computing and obtains CXB=H (XB), is divided into following three kinds of situations:
A) if CXB is not { CBi,1、CBi,2……CBi,jAny one element, message X in } It it not combined message T1i,j, it is false for testing out commodity to be measured, terminates true and false verification operation;
B) if CXB=CBi,j, the most described commodity to be measured are true, and message X i.e. read is group Close message T1i,j, it is true for testing out commodity to be measured, terminates true and false verification operation;
C) if CXB is { CBi,1、CBi,2……CBi,jExcept CB in }i,jAny one outer unit Element, described message X is not message T1i,j, described system server show that commercial articles true and false is suspicious Judge, terminate true and false verification operation.
Further, step 3 in described " mode one ") in more new authentication, T1i,j+1=CAi&MBi,j+1, T2i,j+1=MAi&CBi,j+1
CBi,j+1=H (MBi,j+1), MBi,j+1For step 2) judge that commodity are true time, described system takes One new random number of business device stochastic generation, as message MAiNew digital identity certificate.
Further, described two-dimension code anti-counterfeit identification process is as follows:
After described mobile terminal device scans the two-dimension code label on commodity to be measured, by read Message Y in two-dimension code label is sent to described system server, and in described massage set Q Element compare computing, to verify commodity true and false.
Point following two situation:
If 1. by described comparison calculation, in described message Y and massage set Q any one Element does not mates, and described message Y is not message T3i, it is false for testing out commodity to be measured, described It is false information that system server sends commodity to mobile terminal, and terminates true and false verification operation.
If 2. by described comparison calculation, described message Y and message T4iCoupling, i.e. described in disappear Breath Y is message T3i, it is genuine information that described system server sends commodity to mobile terminal, And terminate true and false verification operation.
Further,
T3i=FAi&IBi, wherein message FAiIt is to MAiImplement what cryptographic calculation obtained, i.e. FAi =G (MAi).Message IBiIt is the random number produced by described randomizer, as described Message MAiQuick Response Code digital identity certificate.
T4i=MAi&FBi, described message FBiIt is to IBiImplement what cryptographic calculation obtained, i.e. FBi =J (IBi)。
Described two-dimension code anti-counterfeit identification process is as follows:
After described mobile terminal device scans the two-dimension code label on commodity to be measured, by read Message Y in two-dimension code label is sent to described system server.
After described system server receives message Y that reader sends, first determine whether the form of Y With combined message T3iThe most identical.If it is not, the most described commodity to be measured are false, i.e. message Y is not It it is combined message T3i, terminate true and false verification operation.
If the form of message Y and combined message T3iIdentical, then message Y is split as YA and YB two parts, wherein, the form of YA and FAiIdentical, the form of YB and IBiIdentical, i.e. Y=YA&YB.Described message YA is decrypted computing, obtains value MYA=G-1(YA), if MYA ≠MAiThen commodity are false, i.e. message Y is not combined message T3i, terminate true and false verification operation. If MYA=MAi, i=1,2 ... n, then find out MAiCorresponding FBi.YB is carried out One-way function computing obtains FYB=J (YB), is divided into following two situation:
If 1. FYB is not { FBi, any one element in i=1,2 ... n}, message Y is not combined message T3i, it is false for testing out commodity to be measured, terminates true and false verification operation.
If 2. FYB=FBi, i=1,2 ... n, the most described commodity to be measured are genuine piece, i.e. read Message X got is combined message T3i, it is true for testing out commodity to be measured, terminates true and false verification behaviour Make.
Further,
T2i,jWith T1i,jRelation be one of following three kinds of situations:
A) described T2i,jEqual to T1i,j
B) described T2i,jIt is T1i,jOne encryption after message.
C) described T2i,jIt is T1i,jCryptographic Hash after Hash operation.
T4iWith T3iRelation be one of following three kinds of situations:
D) described T4iEqual to T3i
E) described T4iIt is T3iOne encryption after message.
F) described T4iIt is T3iCryptographic Hash after Hash operation.
Further, T3i=CAi, T4i=MAi
Further, the combined message being previously written in the RFID on each commodity T1i,jThere is randomness and uniqueness.Described CAiAnd MBi,jAt T1i,j=CAi&MBi,jIt is written into After RFID, it is not present in system server, T1i,j=CAi&MBi,jValue can not be led to Cross attacking system server stolen by scale and replicate.
Described MBi,jIn partial bytes as to CAiImplement the key of deciphering.
Described message MAiOr MBi,jA length of 8~1024.Described commodity sequence number portion MAiInclude commodity production time and commodity sequence number.
Further, combined message T3 being previously written in the two-dimension code label on each commodityi There is randomness and uniqueness.Described FAiAnd IBiAt T3i=FAi&IBiIt is written into Quick Response Code mark After label, it is not present in system server, T3i=FAi&IBiValue can not be taken by attacking system Business device is stolen by scale and replicates.
Described message MAiOr IBiA length of 8~1024.Described commodity sequence number portion MAiInclude commodity production time and commodity sequence number.
Described IBiIn partial bytes as to FAiImplement the key of deciphering.
Further, when described commodity are activated, described RFID is destroyed, described Two-dimension code label is destroyed.Described have read-write RFID mobile terminal for Radio frequency recognition function or the mobile phone of close range wireless communication NFC function or mobile terminal.
Further, described CAiIn, according to certain rule, it is implied with CAiImplement deciphering Key.Described FAiIn, according to certain rule, it is implied with FAiImplement the key of deciphering.
Further, described FAi=CAi
Further, when using described two-dimension code anti-counterfeit identification that commodity are verified, mobile terminal Require to use the reader for two-dimension code in specific authentication APP.
The present invention is well by RFID anti-counterfeit recognition and two kinds of technical compatibilities of two-dimension code anti-counterfeit identification To together, when customer mobile terminal does not support RFID read-write function, compatible secure simultaneously More relatively low two-dimension code anti-counterfeit scheme.Because there being the RFID high safety demonstrate,proved for one time one Escorting of system schema, then the convenience with Quick Response Code scheme of holding concurrently is universal, makes this Antiforge system High safety and high popularization are had to greatest extent concurrently.
Detailed description of the invention
Below in conjunction with embodiment, the invention will be further described, but should not be construed this Invent above-mentioned subject area and be only limitted to following embodiment.Without departing from the above-mentioned technological thought of the present invention In the case of, according to ordinary skill knowledge and customary means, make various replacement and change More, all should include within the scope of the present invention.
Embodiment 1:
The while that the present embodiment disclosing a kind of, the RFID commodity counterfeit prevention of compatibility two-dimension code anti-counterfeit is traced to the source and is System, the RFID including system server, being arranged on each commodity and two dimension Code label.
In RFID on any one commodity, it is written with message T1i,j.Described disappear Breath T1i,jIt it is the RFID digital identity certificate of commodity.Wherein, i is the sequence number of commodity, i=1, 2 ... n, j are the number of times of RFID write message, j=1,2 ... m. System server storage massage set S={T2i,1、T2i,2……T2i,j, described message T2i,j With message T1i,jCorrespondence, is used for and message T1i,jCompare computing, to verify commodity true and false. When any one commodity dispatch from the factory for the first time, the RFID being arranged on these part commodity is write Enter T1i,1, system server storage massage set S={T2i,1, i.e. j=1.
In two-dimension code label electronic tag on any one commodity, it is written with message T3i.Institute State message T3iIt it is the Quick Response Code digital identity certificate of commodity.System server storage massage set Q={T4i, i=1,2 ... n}.Described message T4iWith message T3iCorrespondence, for and Message T3iCompare computing, to verify commodity true and false.Any one commodity dispatch from the factory for the first time Time, the two-dimension code label write T3 being arranged on these part commodityi, system server storage message Set Q={T4i}。
When carrying out fake certification by mobile scanning terminal commodity, there is following two mode:
Mode one: if described mobile terminal has the function of read-write RFID, then lead to Commodity are verified by overscanning RFID.
RFID anti-counterfeit recognition process is as follows:
1), after described mobile terminal device scans the RFID on commodity to be measured, will read Message X in the RFID got is sent to described system server;
2) true and false of commodity is verified: described server is by message X and described massage set S Element compare computing, verify commodity true and false;
3) if checking commodity are false, it is false that described system server sends commodity to mobile terminal Information, terminate RFID anti-counterfeit recognition;
If checking commodity are true, described system server sends commodity for really to believe to mobile terminal Breath.Described system server record also stores in this items scanning RFID corresponding Message T2i,jAnd sweep time and geographical position;And the digital identity certificate of more new commodity;
If checking commercial articles true and false is suspicious, described system server sends commercial articles true and false to mobile terminal Suspicious information, and enter relevant counterfeit goods and trace to the source the processing routine of location.
The digital identity certificate process of described more new commodity is as follows:
Described system server generates message T1i,j+1, and it is sent to described mobile terminal;Pass through Described mobile terminal is by message T1i,j+1Write verification result is the RFID electronics on genuine commodity In label, to replace original T1i,j;Described message T1i,j+1It is the RFID of new representative commodity These part commodity are carried out using during true and false certification by digital identity certificate for user next time;System System server storage and message T1i,j+1Corresponding message T2i,j+1, the most described massage set S updates For { T2i,1、T2i,2……T2i,j、T2i,j+1};Described message T2i,j+1For next time and message T1i,j+1Compare computing, to verify commodity true and false.
Described counterfeit goods trace to the source location processing routine as follows:
In described message T2i,j+1On the premise of being present in described system server, described system takes Business device receives message T1 to be verified that described mobile terminal is senti,k, from T1i,kObtain correspondence T2i,k∈{T2i,1、T2i,2……T2i,j、T2i,j+1And during k≤j, i.e. judge message T1i,k It is stolen, and is written with in the RFID on counterfeit goods;Described system service Device record also submits sweep time of mobile terminal and the geographical position of this items scanning to, simultaneously Call and submit to out system server described in last time to receive T1i,kTime mobile scanning terminal commodity The time of RFID and geographical position, for false proof crack down on counterfeit goods provide counterfeiter's possible false making time and Geographical position.
Mode two: if described mobile terminal does not have the function of read-write RFID, adopt With two-dimension code anti-counterfeit identification, commodity are verified:
If it is false for testing out commodity to be measured, it is false that described system server sends commodity to mobile terminal Information;
If it is true for testing out commodity to be measured, it is true that described system server sends commodity to mobile terminal Information.
After verifying, described system server returns these commodity to mobile terminal and has used two dimension The number of times of code anti-counterfeit recognition, and send information, described information suggestion user to user Commodity are verified by " mode one " described in employing, to obtain more reliable checking.
Further, when described commodity are activated, described RFID is destroyed, described Two-dimension code label is destroyed.Described have read-write RFID mobile terminal for Radio frequency recognition function or the mobile phone of close range wireless communication NFC function or mobile terminal.
Further, when using described two-dimension code anti-counterfeit identification that commodity are verified, mobile terminal Require to use the reader for two-dimension code in specific authentication APP.
Embodiment 2:
The while that the present embodiment disclosing a kind of, the RFID commodity counterfeit prevention of compatibility two-dimension code anti-counterfeit is traced to the source and is System, primary structure with embodiment 1,
Further, T2i,jWith T1i,jRelation be one of following three kinds of situations:
A) described T2i,jEqual to T1i,j
B) described T2i,jIt is T1i,jOne encryption after message.
C) described T2i,jIt is T1i,jCryptographic Hash after Hash operation.
Further, T4iWith T3iRelation be one of following three kinds of situations:
D) described T4iEqual to T3i
E) described T4iIt is T3iOne encryption after message.
F) described T4iIt is T3iCryptographic Hash after Hash operation.
Embodiment 3:
The while that the present embodiment disclosing a kind of, the RFID commodity counterfeit prevention of compatibility two-dimension code anti-counterfeit is traced to the source and is System, primary structure is with embodiment 1, further,
Further, step 2 in described " mode one ") checking commodity true and false, divides following three kinds Situation:
A) if by described comparison calculation, in described message X and massage set S any one Element does not mates, and described message X is not message T1i,j, it is false for testing out commodity to be measured, terminates True and false verification operation;
B) if by described comparison calculation, described message X and message T2 in massage set Si,j Coupling, the most described message X is message T1i,j, it is true for testing out commodity to be measured, terminates true and false verification Operation;
C) if by described comparison calculation, except message in described message X and massage set S T2i,jOther outer Match of elemental compositions, described message X is not message T1i,j, described system server Draw the conclusion that commercial articles true and false is suspicious, terminate true and false verification operation.
Further, described in " mode two ", two-dimension code anti-counterfeit identification process is as follows:
After described mobile terminal device scans the two-dimension code label on commodity to be measured, by read Message Y in two-dimension code label is sent to described system server, and in described massage set Q Element compare computing, to verify commodity true and false.
Point following two situation:
If 1. by described comparison calculation, in described message Y and massage set Q any one Element does not mates, and described message Y is not message T3i, it is false for testing out commodity to be measured, described It is false information that system server sends commodity to mobile terminal, and terminates true and false verification operation.
If 2. by described comparison calculation, described message Y and message T4iCoupling, i.e. described in disappear Breath Y is message T3i, it is genuine information that described system server sends commodity to mobile terminal, And terminate true and false verification operation.
Embodiment 4:
The while that the present embodiment disclosing a kind of, the RFID commodity counterfeit prevention of compatibility two-dimension code anti-counterfeit is traced to the source and is System, primary structure is with embodiment 1, and described system also includes randomizer, further,
Described message T1i,jBy message CAiWith message MBi,jCombine, i.e. T1i,j= CAi&MBi,j, wherein, message CAiIt is to MAiImplement what cryptographic calculation obtained, i.e. CAi=E (MAi), MAiIt is the corresponding one section of message being made up of serial number of i-th commodity.Message MBi,jIt is by described The random number that randomizer produces, as described message MAiDigital identity certificate.
Described message T2i,j=MAi&CBi,j, described message CBi,jIt is to MBiImplement encryption fortune Obtain, CBi,j=H (MBi,j)。
Step 2 in described " mode one ") verify that the true and false process of commodity is as follows:
After described system server receives message X that reader sends, first determine whether the form of X With combined message T1i,jThe most identical.If it is not, the most described commodity to be measured are false, i.e. message X It it not combined message T1i,j, terminate true and false verification operation.
If the form of message X and combined message T1i,jIdentical, then message X is split as XA and XB two parts, wherein, the form of XA and CAiIdentical, the form of XB and MBi,jIdentical, i.e. X=XA&XB.Described message XA is decrypted computing, obtains MXA=E-1(XA), if MXA ≠MAiThen commodity are false, i.e. message X is not combined message T1i,j, terminate true and false verification operation. If MXA=MAi, then MA is found outiCorresponding CBi,j, XB is carried out one-way function computing and obtains CXB=H (XB), is divided into following three kinds of situations:
A) if CXB is not { CBi,1、CBi,2……CBi,jAny one element, message X in } It it not combined message T1i,j, it is false for testing out commodity to be measured, terminates true and false verification operation;
B) if CXB=CBi,j, the most described commodity to be measured are true, and message X i.e. read is group Close message T1i,j, it is true for testing out commodity to be measured, terminates true and false verification operation;
C) if CXB is { CBi,1、CBi,2……CBi,jExcept CB in }i,jAny one outer unit Element, described message X is not message T1i,j, described system server show that commercial articles true and false is suspicious Judge, terminate true and false verification operation.
Further, step 3 in described " mode one ") the digital identity certificate mistake of more new commodity Cheng Zhong, T1i,j+1=CAi&MBi,j+1, T2i,j+1=MAi&CBi,j+1
CBi,j+1=H (MBi,j+1)。MBi,j+1For step 2) judge that commodity are true time, described system takes One new random number of business device stochastic generation, as message MAiNew digital identity certificate.
Further, the combined message being previously written in the RFID on each commodity T1i,jThere is randomness and uniqueness.Described CAiAnd MBi,jAt T1i,j=CAi&MBi,jIt is written into After RFID, it is not present in system server, T1i,j=CAi&MBi,jValue can not be led to Cross attacking system server stolen by scale and replicate.
Embodiment 5
The while that the present embodiment disclosing a kind of, the RFID commodity counterfeit prevention of compatibility two-dimension code anti-counterfeit is traced to the source and is System, primary structure is with embodiment 4, further,
Described MBi,jIn partial bytes as to CAiImplement the key of deciphering.
Described message MAiOr MBi,jA length of 8~1024.Described commodity sequence number portion MAiInclude commodity production time and commodity sequence number.
Further, described CAiIn, according to certain rule, it is implied with CAiImplement deciphering Key.
Further, T3i=CAi, T4i=MAi
Embodiment 6
The while that the present embodiment disclosing a kind of, the RFID commodity counterfeit prevention of compatibility two-dimension code anti-counterfeit is traced to the source and is System, primary structure with embodiment 4,
T3i=FAi&IBi, wherein message FAiIt is to MAiImplement what cryptographic calculation obtained, i.e. FAi =G (MAi).Message IBiIt is the random number produced by described randomizer, as described Message MAiQuick Response Code digital identity certificate.
T4i=MAi&FBi, described message FBiIt is to IBiImplement what cryptographic calculation obtained, i.e. FBi =J (IBi)。
Further, described in " mode two ", two-dimension code anti-counterfeit identification process is as follows:
After described mobile terminal device scans the two-dimension code label on commodity to be measured, by read Message Y in two-dimension code label is sent to described system server.
After described system server receives message Y that reader sends, first determine whether the form of Y With combined message T3iThe most identical.If it is not, the most described commodity to be measured are false, i.e. message Y is not It it is combined message T3i, terminate true and false verification operation.
If the form of message Y and combined message T3iIdentical, then message Y is split as YA and YB two parts, wherein, the form of YA and FAiIdentical, the form of YB and IBiIdentical, i.e. Y=YA&YB.Described message YA is decrypted computing, obtains value MYA=G-1(YA), if MYA ≠MAiThen commodity are false, i.e. message Y is not combined message T3i, terminate true and false verification operation. If MYA=MAi, i=1,2 ... n, then find out MAiCorresponding FBi.YB is carried out list Obtain FYB=J (YB) to functional operation, be divided into following two situation:
If 1. FYB is not { FBi, any one element in i=1,2 ... n}, message Y is not combined message T3i, it is false for testing out commodity to be measured, terminates true and false verification operation.
If 2. FYB=FBi, i=1,2 ... n, the most described commodity to be measured are genuine piece, i.e. read Message X got is combined message T3i, it is true for testing out commodity to be measured, terminates true and false verification behaviour Make.
Embodiment 7:
The RFID commodity counterfeit prevention traceability system of compatibility two-dimension code anti-counterfeit, the primary structure while of a kind of With embodiment 6, further, described FAi=CAi
Embodiment 8:
The RFID commodity counterfeit prevention traceability system of compatibility two-dimension code anti-counterfeit, the primary structure while of a kind of With embodiment 6,
Further, combined message T3 being previously written in the two-dimension code label on each commodityi There is randomness and uniqueness.Described FAiAnd IBiAt T3i=FAi&IBiIt is written into Quick Response Code mark After label, it is not present in system server, T3i=FAi&IBiValue can not be taken by attacking system Business device is stolen by scale and replicates.
Described message IBiA length of 8~1024.Described IBiIn partial bytes conduct To FAiImplement the key of deciphering.
Described FAiIn, according to certain rule, it is implied with FAiImplement the key of deciphering.

Claims (14)

1. the RFID commodity counterfeit prevention traceability system of the most compatible two-dimension code anti-counterfeit, it is characterised in that: include system server, the RFID being arranged on each commodity and two-dimension code label;
In RFID on any one commodity, it is written with message T1i,j;Described message T1i,jIt it is the RFID digital identity certificate of commodity;Wherein, i is the sequence number of commodity, i=1,2 ... n, and j is the number of times of RFID write message, j=1,2 ... m;System server storage massage set S={ T2i,1、T2i,2……T2i,j};Described message T2i,jWith message T1i,jCorrespondence, is used for and message T1i,jCompare computing, to verify commodity true and false;When any one commodity dispatch from the factory for the first time, the RFID write T1 being arranged on these part commodityi,1, system server storage massage set S={ T2i,1, i.e. j=1;
In two-dimension code label electronic tag on any one commodity, it is written with message T3i;Described message T3iIt it is the Quick Response Code digital identity certificate of commodity;System server storage massage set Q={ T4i, i=1,2 ... n };Described message T4iWith message T3iCorrespondence, is used for and message T3iCompare computing, to verify commodity true and false;When any one commodity dispatch from the factory for the first time, the two-dimension code label write T3 being arranged on these part commodityi, system server storage massage set Q={ T4i};
When carrying out fake certification by mobile scanning terminal commodity, there is following two mode;
Mode one: if described mobile terminal has the function of read-write RFID, then by scanning RFID, commodity are verified;
RFID anti-counterfeit recognition process is as follows:
1), after described mobile terminal device scans the RFID on commodity to be measured, message X in the RFID that will read is sent to described system server;
2) true and false of commodity is verified: the element in message X and described massage set S is compared computing by described server, verifies commodity true and false;
3) if checking commodity are false, it is false information that described system server sends commodity to mobile terminal, terminates RFID anti-counterfeit recognition;
If checking commodity are true, it is genuine information that described system server sends commodity to mobile terminal;Described system server record also stores corresponding message T2 in this items scanning RFIDi,jAnd sweep time and geographical position;And the digital identity certificate of more new commodity;
If checking commercial articles true and false is suspicious, described system server sends the suspicious information of commercial articles true and false to mobile terminal, and enters relevant counterfeit goods and trace to the source the processing routine of location;
The digital identity certificate process of described more new commodity is as follows:
Described system server generates message T1i,j+1, and it is sent to described mobile terminal;By described mobile terminal by message T1i,j+1Write verification result is in the RFID on genuine commodity, to replace original T1i,j;Described message T1i,j+1It is the RFID digital identity certificate of new representative commodity, carries out these part commodity for user using during true and false certification next time;System server storage and message T1i,j+1Corresponding message T2i,j+1, the most described massage set S is updated to { T2i,1、T2i,2……T2i,j、T2i,j + 1};Described message T2i,j+1For next time with message T1i,j+1Compare computing, to verify commodity true and false;
Described counterfeit goods trace to the source location processing routine as follows:
In described message T2i,j+1On the premise of being present in described system server, described system server receives message T1 to be verified that described mobile terminal is senti,k, from T1i,kObtain the T2 of correspondencei,k∈ { T2i,1、T2i,2……T2i,j、T2i,j+1And during k≤j, i.e. judge message T1i,kIt is stolen, and is written with in the RFID on counterfeit goods;Described system server record also submits sweep time of mobile terminal and the geographical position of this items scanning to, calls simultaneously and submits to out system server described in last time to receive T1i,kTime time of mobile scanning terminal commodity RFID and geographical position, for the false proof false making time and geographical position cracked down on counterfeit goods and provide counterfeiter possible;
Mode two: if described mobile terminal does not have the function of read-write RFID, uses two-dimension code anti-counterfeit identification to verify commodity;
If it is false for testing out commodity to be measured, it is false information that described system server sends commodity to mobile terminal;
If it is true for testing out commodity to be measured, it is genuine information that described system server sends commodity to mobile terminal;
After verifying, described system server returns these commodity to mobile terminal and has used the number of times of two-dimension code anti-counterfeit identification, and sending information to user, described information suggestion user uses described " mode one " to verify commodity, to obtain more reliable checking.
The most according to claim 1 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: step 2 in described " mode one ") checking commodity true and false, point following three kinds of situations:
A) if by described comparison calculation, described message X is not mated with any one element in massage set S, and described message X is not message T1i,j, it is false for testing out commodity to be measured, terminates true and false verification operation;
B) if by described comparison calculation, described message X and message T2 in massage set Si,jCoupling, the most described message X is message T1i,j, it is true for testing out commodity to be measured, terminates true and false verification operation;
C) if by described comparison calculation, except message T2 in described message X and massage set Si,jOther outer Match of elemental compositions, described message X is not message T1i,j, described system server draws the conclusion that commercial articles true and false is suspicious, terminates true and false verification operation.
The most according to claim 1 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: described system also includes randomizer;
Described message T1i,jBy message CAiWith message MBi,jCombine, i.e. T1i,j=CAi&MBi,j, wherein, message CAiIt is to MAiImplement what cryptographic calculation obtained, i.e. CAi=E (MAi), MAiIt is the corresponding one section of message being made up of serial number of i-th commodity;Message MBi,jIt is the random number produced by described randomizer, as described message MAiRFID digital identity certificate;
Described message T2i,j=MAi&CBi,j, described message CBi,jIt is to MBi,jImplement what cryptographic calculation obtained, CBi,j=H (MBi,j);
Step 2 in described " mode one ") verify that the process of commodity true and false is as follows:
After described system server receives message X that reader sends, first determine whether form and combined message T1 of Xi,jThe most identical;If it is not, the most described commodity to be measured are false, i.e. message X is not combined message T1i,j, terminate true and false verification operation;
If the form of message X and combined message T1i,jIdentical, then message X is split as XA and XB two parts, wherein, the form of XA and CAiIdentical, the form of XB and MBi,jIdentical, i.e. X=XA&XB;Described message XA is decrypted computing, obtains MXA=E-1(XA), if MXA ≠ MAiThen commodity are false, i.e. message X is not combined message T1i,j, terminate true and false verification operation;If MXA=MAi, then MA is found outiCorresponding CBi,j, XB is carried out one-way function computing and obtains CXB=H (XB), be divided into following three kinds of situations:
A) if CXB is not { CBi,1、CBi,2……CBi,jAny one element in }, message X is not combined message T1i,j, it is false for testing out commodity to be measured, terminates true and false verification operation;
B) if CXB=CBi,j, the most described commodity to be measured are true, and message X i.e. read is combined message T1i,j, it is true for testing out commodity to be measured, terminates true and false verification operation;
C) if CXB is { CBi,1、CBi,2……CBi,jExcept CB in }i,jAny one outer element, described message X is not message T1i,j, described system server draws the judgement that commercial articles true and false is suspicious, terminates true and false verification operation.
The most according to claim 3 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: in described " mode one " during the digital identity certificate of step 3) more new commodity, T1i,j+1=CAi&MBi,j+1 , T2i,j+1=MAi&CBi,j+1
CBi,j+1= H(MBi,j+1);MBi,j+1For step 2) judge that commodity are true time, a new random number of described system server stochastic generation, as message MAiNew RFID digital identity certificate.
The most according to claims 1 to 4 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: described two-dimension code anti-counterfeit identification process is as follows:
After described mobile terminal device scans the two-dimension code label on commodity to be measured, message Y in the two-dimension code label that will read is sent to described system server, compares computing with the element in described massage set Q, to verify commodity true and false;
Point following two situation:
If by described comparison calculation, described message Y is not mated with any one element in massage set Q, and described message Y is not message T3i, it is false for testing out commodity to be measured, and it is false information that described system server sends commodity to mobile terminal, and terminates true and false verification operation;
If by described comparison calculation, described message Y and message T4iCoupling, the most described message Y is message T3i, it is genuine information that described system server sends commodity to mobile terminal, and terminates true and false verification operation.
6. according to the RFID commodity counterfeit prevention traceability system of compatibility two-dimension code anti-counterfeit while of a kind of described in claim 3 or 4, it is characterised in that:
T3i=FAi&IBi, wherein message FAiIt is to MAiImplement what cryptographic calculation obtained, i.e. FAi=G (MAi);Message IBiIt is the random number produced by described randomizer, as described message MAiQuick Response Code digital identity certificate;
T4i=MAi&FBi, described message FBiIt is to IBiImplement what cryptographic calculation obtained, i.e. FBi=J (IBi);
In described " mode two ", two-dimension code anti-counterfeit identification process is as follows:
After described mobile terminal device scans the two-dimension code label on commodity to be measured, message Y in the two-dimension code label that will read is sent to described system server;
After described system server receives message Y that reader sends, first determine whether form and combined message T3 of YiThe most identical;If it is not, the most described commodity to be measured are false, i.e. message Y is not combined message T3i, terminate true and false verification operation;
If the form of message Y and combined message T3iIdentical, then message Y is split as YA and YB two parts, wherein, the form of YA and FAiIdentical, the form of YB and IBiIdentical, i.e. Y=YA&YB;Described message YA is decrypted computing, obtains value MYA=G-1(YA), if MYA ≠ MAi, i=1,2 ... n, then commodity are false, i.e. message Y is not combined message T3i, terminate true and false verification operation;If MYA=MAi, then MA is found outiCorresponding FBi;YB is carried out one-way function computing and obtains FYB=J (YB), be divided into following two situation:
If FYB is not { FBi, i=1,2 ... n } in any one element, message Y is not combined message T3i, it is false for testing out commodity to be measured, terminates true and false verification operation;
If FYB=FBi, i=1,2 ... n, the most described commodity to be measured are genuine piece, and message X i.e. read is combined message T3i, it is true for testing out commodity to be measured, terminates true and false verification operation.
The most according to claim 1 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that:
T2i,jWith T1i,jRelation be one of following three kinds of situations:
A) described T2i,jEqual to T1i,j
B) described T2i,jIt is T1i,jOne encryption after message;
C) described T2i,jIt is T1i,jCryptographic Hash after Hash operation;
T4iWith T3iRelation be one of following three kinds of situations:
D) described T4iEqual to T3i
E) described T4iIt is T3iOne encryption after message;
F) described T4iIt is T3iCryptographic Hash after Hash operation.
The most according to claim 3 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: T3i=CAi, T4i=MAi
The most according to claim 3 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: combined message T1 being previously written in the RFID on each commodityi,jThere is randomness and uniqueness;Described CAiAnd MBi,jAt T1i,j=CAi&MBi,jAfter being written into RFID, it is not present in system server, T1i,j=CAi&MBi,jValue can not be stolen by scale by attacking system server and replicate;
Described MBi,jIn partial bytes as to CAiImplement the key of deciphering;
Described message MAiOr MBi,jA length of 8~1024;Described commodity sequence number portion MAiInclude commodity production time and commodity sequence number.
The most according to claim 6 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: combined message T3 being previously written in the two-dimension code label on each commodityiThere is randomness and uniqueness;Described FAiAnd IBiAt T3i=FAi&IBiAfter being written into two-dimension code label, it is not present in system server, T3i=FAi&IBiValue can not be stolen by scale by attacking system server and replicate;
Described message MAiOr IBiA length of 8~1024;Described commodity sequence number portion MAiInclude commodity production time and commodity sequence number;
Described IBiIn partial bytes as to FAiImplement the key of deciphering.
11. according to claim 1 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: when described commodity are activated, described RFID is destroyed, and described two-dimension code label is destroyed;The described mobile terminal with read-write RFID is with radio frequency recognition function or the mobile phone of close range wireless communication NFC function or mobile terminal.
12. according to claim 6 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: described CAiIn, according to certain rule, it is implied with CAiImplement the key of deciphering;Described FAiIn, according to certain rule, it is implied with FAiImplement the key of deciphering.
13. according to claim 6 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: described FAi= CAi
14. according to the RFID commodity counterfeit prevention traceability system of compatibility two-dimension code anti-counterfeit while of a kind of described in claim 1~13, it is characterized in that: when using described two-dimension code anti-counterfeit identification to verify commodity, mobile terminal requires to use the reader for two-dimension code in specific authentication APP.
CN201510015098.2A 2015-01-13 2015-01-13 RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention Pending CN105844472A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510015098.2A CN105844472A (en) 2015-01-13 2015-01-13 RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510015098.2A CN105844472A (en) 2015-01-13 2015-01-13 RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention

Publications (1)

Publication Number Publication Date
CN105844472A true CN105844472A (en) 2016-08-10

Family

ID=57178122

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510015098.2A Pending CN105844472A (en) 2015-01-13 2015-01-13 RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention

Country Status (1)

Country Link
CN (1) CN105844472A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106408067A (en) * 2016-09-24 2017-02-15 广州市雄冠条码实业有限公司 Two-dimensional code anti-counterfeiting label and verification method
CN106934639A (en) * 2017-03-08 2017-07-07 章哲成 A kind of false proof retroactive method of paper diaper based on RFID and Quick Response Code
CN107862221A (en) * 2017-10-31 2018-03-30 郑州云海信息技术有限公司 A kind of method of server component anti-fake certificate
CN108416414A (en) * 2018-03-26 2018-08-17 中国人民银行印制科学技术研究所 Self checking anti-fake two-dimension code and production method and device, self checking method and apparatus
CN108881166A (en) * 2017-05-16 2018-11-23 江峰 A kind of virtual account block chain of band external fixture reason node type verifies system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103854185A (en) * 2012-11-30 2014-06-11 上海透云物联网科技有限公司 QR code, anti-counterfeiting code, RFID tag and mobile application combined anti-counterfeiting system
CN103971247A (en) * 2014-03-18 2014-08-06 四川谦泰仁投资管理有限公司 Combined encryption system for commodity forgery proofing
CN103971250A (en) * 2014-04-09 2014-08-06 四川谦泰仁投资管理有限公司 One-time-one-certificate anti-fake traceability system based on mobile terminal and RFID (radio frequency identification)
CN103971245A (en) * 2014-01-30 2014-08-06 四川谦泰仁投资管理有限公司 Combined encryption system for commodity electronic forgery proofing
CN103971248A (en) * 2014-03-18 2014-08-06 四川谦泰仁投资管理有限公司 Commodity anti-counterfeiting tracing system on basis of two-dimension codes and RFID (radio frequency identification device) technology
CN103971246A (en) * 2014-01-30 2014-08-06 四川谦泰仁投资管理有限公司 One-way function bidirectional encryption based electronic commodity security system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103854185A (en) * 2012-11-30 2014-06-11 上海透云物联网科技有限公司 QR code, anti-counterfeiting code, RFID tag and mobile application combined anti-counterfeiting system
CN103971245A (en) * 2014-01-30 2014-08-06 四川谦泰仁投资管理有限公司 Combined encryption system for commodity electronic forgery proofing
CN103971246A (en) * 2014-01-30 2014-08-06 四川谦泰仁投资管理有限公司 One-way function bidirectional encryption based electronic commodity security system
CN103971247A (en) * 2014-03-18 2014-08-06 四川谦泰仁投资管理有限公司 Combined encryption system for commodity forgery proofing
CN103971248A (en) * 2014-03-18 2014-08-06 四川谦泰仁投资管理有限公司 Commodity anti-counterfeiting tracing system on basis of two-dimension codes and RFID (radio frequency identification device) technology
CN103971250A (en) * 2014-04-09 2014-08-06 四川谦泰仁投资管理有限公司 One-time-one-certificate anti-fake traceability system based on mobile terminal and RFID (radio frequency identification)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106408067A (en) * 2016-09-24 2017-02-15 广州市雄冠条码实业有限公司 Two-dimensional code anti-counterfeiting label and verification method
CN106934639A (en) * 2017-03-08 2017-07-07 章哲成 A kind of false proof retroactive method of paper diaper based on RFID and Quick Response Code
CN108881166A (en) * 2017-05-16 2018-11-23 江峰 A kind of virtual account block chain of band external fixture reason node type verifies system
CN108876399A (en) * 2017-05-16 2018-11-23 江峰 A kind of finite field block catenary system with closed loop Verification System
CN108881166B (en) * 2017-05-16 2021-03-26 江峰 Virtual account block chain verification system with external fixed physical node
CN108876399B (en) * 2017-05-16 2022-04-29 江峰 Finite field block chain system with closed-loop authentication system
CN107862221A (en) * 2017-10-31 2018-03-30 郑州云海信息技术有限公司 A kind of method of server component anti-fake certificate
CN108416414A (en) * 2018-03-26 2018-08-17 中国人民银行印制科学技术研究所 Self checking anti-fake two-dimension code and production method and device, self checking method and apparatus

Similar Documents

Publication Publication Date Title
CN103971250B (en) A kind of one time one card anti-fake traceability system based on mobile terminal and RFID
CN202019354U (en) Article identity authenticating and anti-counterfeiting system based on NFC (near field communication) cellphone
CN105844472A (en) RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention
US20140095398A1 (en) Double ID Anti-Counterfeit Method and System
CN105046504A (en) Multiple key checking, inspection and forgery prevention source forming method and forgery prevention label
CN104854597B (en) Certificate server, Verification System and authentication method
CN107886333A (en) A kind of Antiforge system and its method for anti-counterfeit with dynamic anti-fake information
CN103218591A (en) Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same
CN101945123A (en) RFID mobile phone and combination key technology-based authenticity identification method
CN103810588A (en) Electronic seal system and electronic seal
CN103971245B (en) A kind of combined ciphering system false proof for electronic article
CN108082723B (en) Anti-counterfeiting bottle cap based on CPU (Central processing Unit) password chip and working method thereof
CN110598433A (en) Anti-counterfeiting information processing method and device based on block chain
CN104574119A (en) Commodity identifying and tracing method
CN103971246B (en) One-way function bidirectional encryption based electronic commodity security system
CN202870898U (en) Radio frequency-based commodity information identification system
KR101638787B1 (en) Mobile ticket security system and method of based location information and terminal unique number
CN109450915A (en) A kind of homing pigeon foot ring and its recognition methods based on NFC
KR101242684B1 (en) User certification system and method for 2 dimensional barcode
CN103971247B (en) A kind of combined ciphering system for commodity counterfeit prevention
CN106712952B (en) Radio frequency tag security identification method and system
CN106815614A (en) A kind of bank acceptance Antiforge system of use NFC anti-counterfeiting technologies
CN104091191B (en) A kind of efficiently and effectively false proof authenticating method
CN110011805A (en) Two-way authentication anti-counterfeiting system and method based on low-power consumption bluetooth system
CN111951032A (en) Third-party article anti-counterfeiting authentication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160810

RJ01 Rejection of invention patent application after publication