CN105844472A - RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention - Google Patents
RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention Download PDFInfo
- Publication number
- CN105844472A CN105844472A CN201510015098.2A CN201510015098A CN105844472A CN 105844472 A CN105844472 A CN 105844472A CN 201510015098 A CN201510015098 A CN 201510015098A CN 105844472 A CN105844472 A CN 105844472A
- Authority
- CN
- China
- Prior art keywords
- message
- commodity
- rfid
- false
- true
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The objective of the invention is to solve a problem that the safety is lower during merchandise anti-counterfeiting identification because some user mobile terminals do not have a function of RFID and just employ the two-dimensional code technology independently. In order to achieve the above purpose, the invention employs a technical scheme that the system comprises a system server, RFID electronic tags and two-dimensional codes which are disposed on all merchandises, or a random number generator. The system achieves the good combination of the technology of RFID anti-counterfeiting identification and the technology of two-dimensional code anti-counterfeiting identification. When the user mobile terminal does not support a function of RFID reading and writing, the system is compatible with a two-dimensional code anti-counterfeiting scheme with the lower safety. Because of the protection from a one-time one-card RFID high-safety system scheme and the convenience and popularization of the two-dimensional code scheme, the system gives full consideration to high safety and high universality.
Description
Technical field
The present invention relates to anti-counterfeiting technology field, be specifically related to Quick Response Code and the false proof knowledge of RFID
Not.
Background technology
Along with the development of mobile communication technology, it is based particularly on mobile phone 2.45GHz RF identification skill
Art and the development of mobile phone near field communication (NFC) (NFC 13.56MHz), mobile phone and movement
The closely identification function of terminal is become stronger day by day.Mobile Internet and the life of Internet of Things forward people
Detachable collar territory is permeated.Anti-counterfeit recognition technology based on this technology emerges in an endless stream.Such as, Chinese patent
" a kind of based on mobile terminal and the Comodity anti-fake system of RFID " and Chinese patent
" a kind of one time one card anti-fake traceability system based on mobile terminal and RFID " etc. are exactly Internet of Things
The mobile interchange mode successful expansive approach on product information is reviewed and verified is crossed by Netcom.This is
Row technology has surmounted the encryption authentication system of traditional A → B (→ C ...), has founded brand-new
The closed loop authenticated encryption theoretical system of A → A, because of its high security and high reliability, effectively
Stop RFID RFID when field of authentication uses and illegally cracked brought security breaches,
Improve the level of security of RFID certification, well prevent manufacturing and marketing fake behavior, in practice
In have also been obtained successfully application.But because the most all of smart mobile phone can't be reached at present
All there is radio frequency recognition function (NFC function), make comprehensive popularization and application of this technology be subject to
One definite limitation.Planar bar code technology is widely used in various application scenario because it is convenient universal,
But Yin Qiyi is cracked and copied, safety is relatively low, is unsuitable for being directly used in commodity counterfeit prevention and traces to the source
Field.
Summary of the invention
Present invention aim to address that, when commodity counterfeit prevention differentiates, certain customers' mobile terminal does not has
Standby RFID radio frequency recognition function, and the safety ratio being used alone planar bar code technology is relatively low
Problem.
Employed technical scheme comprise that such for realizing the object of the invention, a kind of the most compatible two
The dimension false proof RFID commodity counterfeit prevention traceability system of code, including system server, be arranged on each
RFID on part commodity and two-dimension code label.
In RFID on any one commodity, it is written with message T1i,j.Described disappear
Breath T1i,jIt it is the RFID digital identity certificate of commodity.Wherein, i is the sequence number of commodity, i=1,
2 ... n, j are the number of times of RFID write message, j=1,2 ... m.
System server storage massage set S={T2i,1、T2i,2……T2i,j, described message T2i,j
With message T1i,jCorrespondence, is used for and message T1i,jCompare computing, to verify commodity true and false.
When any one commodity dispatch from the factory for the first time, the RFID being arranged on these part commodity is write
Enter T1i,1, system server storage massage set S={T2i,1, i.e. j=1.
In two-dimension code label electronic tag on any one commodity, it is written with message T3i.Institute
State message T3iIt it is the Quick Response Code digital identity certificate of commodity.System server storage massage set
Q={T4i, i=1,2 ... n}.Described message T4iWith message T3iCorrespondence, for and
Message T3iCompare computing, to verify commodity true and false.Any one commodity dispatch from the factory for the first time
Time, the two-dimension code label write T3 being arranged on these part commodityi, system server storage message
Set Q={T4i}。
When carrying out fake certification by mobile scanning terminal commodity, there is following two mode:
Mode one: if described mobile terminal has the function of read-write RFID, then lead to
Commodity are verified by overscanning RFID.
RFID anti-counterfeit recognition process is as follows:
1), after described mobile terminal device scans the RFID on commodity to be measured, will read
Message X in the RFID got is sent to described system server;
2) true and false of commodity is verified: described server is by message X and described massage set S
Element compare computing, verify commodity true and false;
3) if checking commodity are false, it is false that described system server sends commodity to mobile terminal
Information, terminate RFID anti-counterfeit recognition;
If checking commodity are true, described system server sends commodity for really to believe to mobile terminal
Breath.Described system server record also stores in this items scanning RFID corresponding
Message T2i,jAnd sweep time and geographical position;And the digital identity certificate of more new commodity;
If checking commercial articles true and false is suspicious, described system server sends commercial articles true and false to mobile terminal
Suspicious information, and enter relevant counterfeit goods and trace to the source the processing routine of location;
The digital identity certificate process of described more new commodity is as follows:
Described system server generates message T1i,j+1, and it is sent to described mobile terminal;Pass through
Described mobile terminal is by message T1i,j+1Write verification result is the RFID electronics on genuine commodity
In label, to replace original T1i,j;Described message T1i,j+1It is the RFID of new representative commodity
These part commodity are carried out using during true and false certification by digital identity certificate for user next time;System
System server storage and message T1i,j+1Corresponding message T2i,j+1, the most described massage set S updates
For { T2i,1、T2i,2……T2i,j、T2i,j+1};Described message T2i,j+1For next time and message
T1i,j+1Compare computing, to verify commodity true and false.
Described counterfeit goods trace to the source location processing routine as follows:
In described message T2i,j+1On the premise of being present in described system server, described system takes
Business device receives message T1 to be verified that described mobile terminal is senti,k, from T1i,kObtain correspondence
T2i,k∈{T2i,1、T2i,2……T2i,j、T2i,j+1And during k≤j, i.e. judge message T1i,k
It is stolen, and is written with in the RFID on counterfeit goods;Described system service
Device record also submits sweep time of mobile terminal and the geographical position of this items scanning to, simultaneously
Call and submit to out system server described in last time to receive T1i,kTime mobile scanning terminal commodity
The time of RFID and geographical position, for false proof crack down on counterfeit goods provide counterfeiter's possible false making time and
Geographical position.
Mode two: if described mobile terminal does not have the function of read-write RFID, adopt
With two-dimension code anti-counterfeit identification, commodity are verified:
If it is false for testing out commodity to be measured, it is false that described system server sends commodity to mobile terminal
Information;
If it is true for testing out commodity to be measured, it is true that described system server sends commodity to mobile terminal
Information.
After verifying, described system server returns these commodity to mobile terminal and has used two dimension
The number of times of code anti-counterfeit recognition, and send information, described information suggestion user to user
Commodity are verified by " mode one " described in employing, to obtain more reliable checking.
Further, step 2 in described " mode one ") checking commodity true and false, divides following three kinds
Situation:
A) if by described comparison calculation, in described message X and massage set S any one
Element does not mates, and described message X is not message T1i,j, it is false for testing out commodity to be measured, terminates
True and false verification operation;
B) if by described comparison calculation, described message X and message T2 in massage set Si,j
Coupling, the most described message X is message T1i,j, it is true for testing out commodity to be measured, terminates true and false verification
Operation;
C) if by described comparison calculation, except message in described message X and massage set S
T2i,jOther outer Match of elemental compositions, described message X is not message T1i,j, described system server
Draw the conclusion that commercial articles true and false is suspicious, terminate true and false verification operation.
Further, described system also includes randomizer.
Described message T1i,jBy message CAiWith message MBi,jCombine, i.e. T1i,j=
CAi&MBi,j, wherein, message CAiIt is to MAiImplement what cryptographic calculation obtained, i.e. CAi=E (MAi),
MAiIt is the corresponding one section of message being made up of serial number of i-th commodity.Message MBi,jIt is by described
The random number that randomizer produces, as described message MAiRFID digital ID card
Book.
Described message T2i,j=MAi&CBi,j, described message CBi,jIt is to MBi,jImplement cryptographic calculation
Obtain, CBi,j=H (MBi,j)。
Step 2 in described " mode one ") verify that the process of commodity true and false is as follows:
After described system server receives message X that reader sends, first determine whether the form of X
With combined message T1i,jThe most identical.If it is not, the most described commodity to be measured are false, i.e. message X
It it not combined message T1i,j, terminate true and false verification operation.
If the form of message X and combined message T1i,jIdentical, then message X is split as XA and
XB two parts, wherein, the form of XA and CAiIdentical, the form of XB and MBi,jIdentical, i.e.
X=XA&XB.Described message XA is decrypted computing, obtains MXA=E-1(XA), if MXA
≠MAiThen commodity are false, i.e. message X is not combined message T1i,j, terminate true and false verification operation.
If MXA=MAi, then MA is found outiCorresponding CBi,j, XB is carried out one-way function computing and obtains
CXB=H (XB), is divided into following three kinds of situations:
A) if CXB is not { CBi,1、CBi,2……CBi,jAny one element, message X in }
It it not combined message T1i,j, it is false for testing out commodity to be measured, terminates true and false verification operation;
B) if CXB=CBi,j, the most described commodity to be measured are true, and message X i.e. read is group
Close message T1i,j, it is true for testing out commodity to be measured, terminates true and false verification operation;
C) if CXB is { CBi,1、CBi,2……CBi,jExcept CB in }i,jAny one outer unit
Element, described message X is not message T1i,j, described system server show that commercial articles true and false is suspicious
Judge, terminate true and false verification operation.
Further, step 3 in described " mode one ") in more new authentication, T1i,j+1=CAi&MBi,j+1,
T2i,j+1=MAi&CBi,j+1。
CBi,j+1=H (MBi,j+1), MBi,j+1For step 2) judge that commodity are true time, described system takes
One new random number of business device stochastic generation, as message MAiNew digital identity certificate.
Further, described two-dimension code anti-counterfeit identification process is as follows:
After described mobile terminal device scans the two-dimension code label on commodity to be measured, by read
Message Y in two-dimension code label is sent to described system server, and in described massage set Q
Element compare computing, to verify commodity true and false.
Point following two situation:
If 1. by described comparison calculation, in described message Y and massage set Q any one
Element does not mates, and described message Y is not message T3i, it is false for testing out commodity to be measured, described
It is false information that system server sends commodity to mobile terminal, and terminates true and false verification operation.
If 2. by described comparison calculation, described message Y and message T4iCoupling, i.e. described in disappear
Breath Y is message T3i, it is genuine information that described system server sends commodity to mobile terminal,
And terminate true and false verification operation.
Further,
T3i=FAi&IBi, wherein message FAiIt is to MAiImplement what cryptographic calculation obtained, i.e. FAi
=G (MAi).Message IBiIt is the random number produced by described randomizer, as described
Message MAiQuick Response Code digital identity certificate.
T4i=MAi&FBi, described message FBiIt is to IBiImplement what cryptographic calculation obtained, i.e. FBi
=J (IBi)。
Described two-dimension code anti-counterfeit identification process is as follows:
After described mobile terminal device scans the two-dimension code label on commodity to be measured, by read
Message Y in two-dimension code label is sent to described system server.
After described system server receives message Y that reader sends, first determine whether the form of Y
With combined message T3iThe most identical.If it is not, the most described commodity to be measured are false, i.e. message Y is not
It it is combined message T3i, terminate true and false verification operation.
If the form of message Y and combined message T3iIdentical, then message Y is split as YA and
YB two parts, wherein, the form of YA and FAiIdentical, the form of YB and IBiIdentical, i.e.
Y=YA&YB.Described message YA is decrypted computing, obtains value MYA=G-1(YA), if MYA
≠MAiThen commodity are false, i.e. message Y is not combined message T3i, terminate true and false verification operation.
If MYA=MAi, i=1,2 ... n, then find out MAiCorresponding FBi.YB is carried out
One-way function computing obtains FYB=J (YB), is divided into following two situation:
If 1. FYB is not { FBi, any one element in i=1,2 ... n}, message
Y is not combined message T3i, it is false for testing out commodity to be measured, terminates true and false verification operation.
If 2. FYB=FBi, i=1,2 ... n, the most described commodity to be measured are genuine piece, i.e. read
Message X got is combined message T3i, it is true for testing out commodity to be measured, terminates true and false verification behaviour
Make.
Further,
T2i,jWith T1i,jRelation be one of following three kinds of situations:
A) described T2i,jEqual to T1i,j。
B) described T2i,jIt is T1i,jOne encryption after message.
C) described T2i,jIt is T1i,jCryptographic Hash after Hash operation.
T4iWith T3iRelation be one of following three kinds of situations:
D) described T4iEqual to T3i。
E) described T4iIt is T3iOne encryption after message.
F) described T4iIt is T3iCryptographic Hash after Hash operation.
Further, T3i=CAi, T4i=MAi。
Further, the combined message being previously written in the RFID on each commodity
T1i,jThere is randomness and uniqueness.Described CAiAnd MBi,jAt T1i,j=CAi&MBi,jIt is written into
After RFID, it is not present in system server, T1i,j=CAi&MBi,jValue can not be led to
Cross attacking system server stolen by scale and replicate.
Described MBi,jIn partial bytes as to CAiImplement the key of deciphering.
Described message MAiOr MBi,jA length of 8~1024.Described commodity sequence number portion
MAiInclude commodity production time and commodity sequence number.
Further, combined message T3 being previously written in the two-dimension code label on each commodityi
There is randomness and uniqueness.Described FAiAnd IBiAt T3i=FAi&IBiIt is written into Quick Response Code mark
After label, it is not present in system server, T3i=FAi&IBiValue can not be taken by attacking system
Business device is stolen by scale and replicates.
Described message MAiOr IBiA length of 8~1024.Described commodity sequence number portion
MAiInclude commodity production time and commodity sequence number.
Described IBiIn partial bytes as to FAiImplement the key of deciphering.
Further, when described commodity are activated, described RFID is destroyed, described
Two-dimension code label is destroyed.Described have read-write RFID mobile terminal for
Radio frequency recognition function or the mobile phone of close range wireless communication NFC function or mobile terminal.
Further, described CAiIn, according to certain rule, it is implied with CAiImplement deciphering
Key.Described FAiIn, according to certain rule, it is implied with FAiImplement the key of deciphering.
Further, described FAi=CAi。
Further, when using described two-dimension code anti-counterfeit identification that commodity are verified, mobile terminal
Require to use the reader for two-dimension code in specific authentication APP.
The present invention is well by RFID anti-counterfeit recognition and two kinds of technical compatibilities of two-dimension code anti-counterfeit identification
To together, when customer mobile terminal does not support RFID read-write function, compatible secure simultaneously
More relatively low two-dimension code anti-counterfeit scheme.Because there being the RFID high safety demonstrate,proved for one time one
Escorting of system schema, then the convenience with Quick Response Code scheme of holding concurrently is universal, makes this Antiforge system
High safety and high popularization are had to greatest extent concurrently.
Detailed description of the invention
Below in conjunction with embodiment, the invention will be further described, but should not be construed this
Invent above-mentioned subject area and be only limitted to following embodiment.Without departing from the above-mentioned technological thought of the present invention
In the case of, according to ordinary skill knowledge and customary means, make various replacement and change
More, all should include within the scope of the present invention.
Embodiment 1:
The while that the present embodiment disclosing a kind of, the RFID commodity counterfeit prevention of compatibility two-dimension code anti-counterfeit is traced to the source and is
System, the RFID including system server, being arranged on each commodity and two dimension
Code label.
In RFID on any one commodity, it is written with message T1i,j.Described disappear
Breath T1i,jIt it is the RFID digital identity certificate of commodity.Wherein, i is the sequence number of commodity, i=1,
2 ... n, j are the number of times of RFID write message, j=1,2 ... m.
System server storage massage set S={T2i,1、T2i,2……T2i,j, described message T2i,j
With message T1i,jCorrespondence, is used for and message T1i,jCompare computing, to verify commodity true and false.
When any one commodity dispatch from the factory for the first time, the RFID being arranged on these part commodity is write
Enter T1i,1, system server storage massage set S={T2i,1, i.e. j=1.
In two-dimension code label electronic tag on any one commodity, it is written with message T3i.Institute
State message T3iIt it is the Quick Response Code digital identity certificate of commodity.System server storage massage set
Q={T4i, i=1,2 ... n}.Described message T4iWith message T3iCorrespondence, for and
Message T3iCompare computing, to verify commodity true and false.Any one commodity dispatch from the factory for the first time
Time, the two-dimension code label write T3 being arranged on these part commodityi, system server storage message
Set Q={T4i}。
When carrying out fake certification by mobile scanning terminal commodity, there is following two mode:
Mode one: if described mobile terminal has the function of read-write RFID, then lead to
Commodity are verified by overscanning RFID.
RFID anti-counterfeit recognition process is as follows:
1), after described mobile terminal device scans the RFID on commodity to be measured, will read
Message X in the RFID got is sent to described system server;
2) true and false of commodity is verified: described server is by message X and described massage set S
Element compare computing, verify commodity true and false;
3) if checking commodity are false, it is false that described system server sends commodity to mobile terminal
Information, terminate RFID anti-counterfeit recognition;
If checking commodity are true, described system server sends commodity for really to believe to mobile terminal
Breath.Described system server record also stores in this items scanning RFID corresponding
Message T2i,jAnd sweep time and geographical position;And the digital identity certificate of more new commodity;
If checking commercial articles true and false is suspicious, described system server sends commercial articles true and false to mobile terminal
Suspicious information, and enter relevant counterfeit goods and trace to the source the processing routine of location.
The digital identity certificate process of described more new commodity is as follows:
Described system server generates message T1i,j+1, and it is sent to described mobile terminal;Pass through
Described mobile terminal is by message T1i,j+1Write verification result is the RFID electronics on genuine commodity
In label, to replace original T1i,j;Described message T1i,j+1It is the RFID of new representative commodity
These part commodity are carried out using during true and false certification by digital identity certificate for user next time;System
System server storage and message T1i,j+1Corresponding message T2i,j+1, the most described massage set S updates
For { T2i,1、T2i,2……T2i,j、T2i,j+1};Described message T2i,j+1For next time and message
T1i,j+1Compare computing, to verify commodity true and false.
Described counterfeit goods trace to the source location processing routine as follows:
In described message T2i,j+1On the premise of being present in described system server, described system takes
Business device receives message T1 to be verified that described mobile terminal is senti,k, from T1i,kObtain correspondence
T2i,k∈{T2i,1、T2i,2……T2i,j、T2i,j+1And during k≤j, i.e. judge message T1i,k
It is stolen, and is written with in the RFID on counterfeit goods;Described system service
Device record also submits sweep time of mobile terminal and the geographical position of this items scanning to, simultaneously
Call and submit to out system server described in last time to receive T1i,kTime mobile scanning terminal commodity
The time of RFID and geographical position, for false proof crack down on counterfeit goods provide counterfeiter's possible false making time and
Geographical position.
Mode two: if described mobile terminal does not have the function of read-write RFID, adopt
With two-dimension code anti-counterfeit identification, commodity are verified:
If it is false for testing out commodity to be measured, it is false that described system server sends commodity to mobile terminal
Information;
If it is true for testing out commodity to be measured, it is true that described system server sends commodity to mobile terminal
Information.
After verifying, described system server returns these commodity to mobile terminal and has used two dimension
The number of times of code anti-counterfeit recognition, and send information, described information suggestion user to user
Commodity are verified by " mode one " described in employing, to obtain more reliable checking.
Further, when described commodity are activated, described RFID is destroyed, described
Two-dimension code label is destroyed.Described have read-write RFID mobile terminal for
Radio frequency recognition function or the mobile phone of close range wireless communication NFC function or mobile terminal.
Further, when using described two-dimension code anti-counterfeit identification that commodity are verified, mobile terminal
Require to use the reader for two-dimension code in specific authentication APP.
Embodiment 2:
The while that the present embodiment disclosing a kind of, the RFID commodity counterfeit prevention of compatibility two-dimension code anti-counterfeit is traced to the source and is
System, primary structure with embodiment 1,
Further, T2i,jWith T1i,jRelation be one of following three kinds of situations:
A) described T2i,jEqual to T1i,j。
B) described T2i,jIt is T1i,jOne encryption after message.
C) described T2i,jIt is T1i,jCryptographic Hash after Hash operation.
Further, T4iWith T3iRelation be one of following three kinds of situations:
D) described T4iEqual to T3i。
E) described T4iIt is T3iOne encryption after message.
F) described T4iIt is T3iCryptographic Hash after Hash operation.
Embodiment 3:
The while that the present embodiment disclosing a kind of, the RFID commodity counterfeit prevention of compatibility two-dimension code anti-counterfeit is traced to the source and is
System, primary structure is with embodiment 1, further,
Further, step 2 in described " mode one ") checking commodity true and false, divides following three kinds
Situation:
A) if by described comparison calculation, in described message X and massage set S any one
Element does not mates, and described message X is not message T1i,j, it is false for testing out commodity to be measured, terminates
True and false verification operation;
B) if by described comparison calculation, described message X and message T2 in massage set Si,j
Coupling, the most described message X is message T1i,j, it is true for testing out commodity to be measured, terminates true and false verification
Operation;
C) if by described comparison calculation, except message in described message X and massage set S
T2i,jOther outer Match of elemental compositions, described message X is not message T1i,j, described system server
Draw the conclusion that commercial articles true and false is suspicious, terminate true and false verification operation.
Further, described in " mode two ", two-dimension code anti-counterfeit identification process is as follows:
After described mobile terminal device scans the two-dimension code label on commodity to be measured, by read
Message Y in two-dimension code label is sent to described system server, and in described massage set Q
Element compare computing, to verify commodity true and false.
Point following two situation:
If 1. by described comparison calculation, in described message Y and massage set Q any one
Element does not mates, and described message Y is not message T3i, it is false for testing out commodity to be measured, described
It is false information that system server sends commodity to mobile terminal, and terminates true and false verification operation.
If 2. by described comparison calculation, described message Y and message T4iCoupling, i.e. described in disappear
Breath Y is message T3i, it is genuine information that described system server sends commodity to mobile terminal,
And terminate true and false verification operation.
Embodiment 4:
The while that the present embodiment disclosing a kind of, the RFID commodity counterfeit prevention of compatibility two-dimension code anti-counterfeit is traced to the source and is
System, primary structure is with embodiment 1, and described system also includes randomizer, further,
Described message T1i,jBy message CAiWith message MBi,jCombine, i.e. T1i,j=
CAi&MBi,j, wherein, message CAiIt is to MAiImplement what cryptographic calculation obtained, i.e. CAi=E (MAi),
MAiIt is the corresponding one section of message being made up of serial number of i-th commodity.Message MBi,jIt is by described
The random number that randomizer produces, as described message MAiDigital identity certificate.
Described message T2i,j=MAi&CBi,j, described message CBi,jIt is to MBiImplement encryption fortune
Obtain, CBi,j=H (MBi,j)。
Step 2 in described " mode one ") verify that the true and false process of commodity is as follows:
After described system server receives message X that reader sends, first determine whether the form of X
With combined message T1i,jThe most identical.If it is not, the most described commodity to be measured are false, i.e. message X
It it not combined message T1i,j, terminate true and false verification operation.
If the form of message X and combined message T1i,jIdentical, then message X is split as XA and
XB two parts, wherein, the form of XA and CAiIdentical, the form of XB and MBi,jIdentical, i.e.
X=XA&XB.Described message XA is decrypted computing, obtains MXA=E-1(XA), if MXA
≠MAiThen commodity are false, i.e. message X is not combined message T1i,j, terminate true and false verification operation.
If MXA=MAi, then MA is found outiCorresponding CBi,j, XB is carried out one-way function computing and obtains
CXB=H (XB), is divided into following three kinds of situations:
A) if CXB is not { CBi,1、CBi,2……CBi,jAny one element, message X in }
It it not combined message T1i,j, it is false for testing out commodity to be measured, terminates true and false verification operation;
B) if CXB=CBi,j, the most described commodity to be measured are true, and message X i.e. read is group
Close message T1i,j, it is true for testing out commodity to be measured, terminates true and false verification operation;
C) if CXB is { CBi,1、CBi,2……CBi,jExcept CB in }i,jAny one outer unit
Element, described message X is not message T1i,j, described system server show that commercial articles true and false is suspicious
Judge, terminate true and false verification operation.
Further, step 3 in described " mode one ") the digital identity certificate mistake of more new commodity
Cheng Zhong, T1i,j+1=CAi&MBi,j+1, T2i,j+1=MAi&CBi,j+1;
CBi,j+1=H (MBi,j+1)。MBi,j+1For step 2) judge that commodity are true time, described system takes
One new random number of business device stochastic generation, as message MAiNew digital identity certificate.
Further, the combined message being previously written in the RFID on each commodity
T1i,jThere is randomness and uniqueness.Described CAiAnd MBi,jAt T1i,j=CAi&MBi,jIt is written into
After RFID, it is not present in system server, T1i,j=CAi&MBi,jValue can not be led to
Cross attacking system server stolen by scale and replicate.
Embodiment 5
The while that the present embodiment disclosing a kind of, the RFID commodity counterfeit prevention of compatibility two-dimension code anti-counterfeit is traced to the source and is
System, primary structure is with embodiment 4, further,
Described MBi,jIn partial bytes as to CAiImplement the key of deciphering.
Described message MAiOr MBi,jA length of 8~1024.Described commodity sequence number portion
MAiInclude commodity production time and commodity sequence number.
Further, described CAiIn, according to certain rule, it is implied with CAiImplement deciphering
Key.
Further, T3i=CAi, T4i=MAi。
Embodiment 6
The while that the present embodiment disclosing a kind of, the RFID commodity counterfeit prevention of compatibility two-dimension code anti-counterfeit is traced to the source and is
System, primary structure with embodiment 4,
T3i=FAi&IBi, wherein message FAiIt is to MAiImplement what cryptographic calculation obtained, i.e. FAi
=G (MAi).Message IBiIt is the random number produced by described randomizer, as described
Message MAiQuick Response Code digital identity certificate.
T4i=MAi&FBi, described message FBiIt is to IBiImplement what cryptographic calculation obtained, i.e. FBi
=J (IBi)。
Further, described in " mode two ", two-dimension code anti-counterfeit identification process is as follows:
After described mobile terminal device scans the two-dimension code label on commodity to be measured, by read
Message Y in two-dimension code label is sent to described system server.
After described system server receives message Y that reader sends, first determine whether the form of Y
With combined message T3iThe most identical.If it is not, the most described commodity to be measured are false, i.e. message Y is not
It it is combined message T3i, terminate true and false verification operation.
If the form of message Y and combined message T3iIdentical, then message Y is split as YA and
YB two parts, wherein, the form of YA and FAiIdentical, the form of YB and IBiIdentical, i.e.
Y=YA&YB.Described message YA is decrypted computing, obtains value MYA=G-1(YA), if MYA
≠MAiThen commodity are false, i.e. message Y is not combined message T3i, terminate true and false verification operation.
If MYA=MAi, i=1,2 ... n, then find out MAiCorresponding FBi.YB is carried out list
Obtain FYB=J (YB) to functional operation, be divided into following two situation:
If 1. FYB is not { FBi, any one element in i=1,2 ... n}, message
Y is not combined message T3i, it is false for testing out commodity to be measured, terminates true and false verification operation.
If 2. FYB=FBi, i=1,2 ... n, the most described commodity to be measured are genuine piece, i.e. read
Message X got is combined message T3i, it is true for testing out commodity to be measured, terminates true and false verification behaviour
Make.
Embodiment 7:
The RFID commodity counterfeit prevention traceability system of compatibility two-dimension code anti-counterfeit, the primary structure while of a kind of
With embodiment 6, further, described FAi=CAi。
Embodiment 8:
The RFID commodity counterfeit prevention traceability system of compatibility two-dimension code anti-counterfeit, the primary structure while of a kind of
With embodiment 6,
Further, combined message T3 being previously written in the two-dimension code label on each commodityi
There is randomness and uniqueness.Described FAiAnd IBiAt T3i=FAi&IBiIt is written into Quick Response Code mark
After label, it is not present in system server, T3i=FAi&IBiValue can not be taken by attacking system
Business device is stolen by scale and replicates.
Described message IBiA length of 8~1024.Described IBiIn partial bytes conduct
To FAiImplement the key of deciphering.
Described FAiIn, according to certain rule, it is implied with FAiImplement the key of deciphering.
Claims (14)
1. the RFID commodity counterfeit prevention traceability system of the most compatible two-dimension code anti-counterfeit, it is characterised in that: include system server, the RFID being arranged on each commodity and two-dimension code label;
In RFID on any one commodity, it is written with message T1i,j;Described message T1i,jIt it is the RFID digital identity certificate of commodity;Wherein, i is the sequence number of commodity, i=1,2 ... n, and j is the number of times of RFID write message, j=1,2 ... m;System server storage massage set S={ T2i,1、T2i,2……T2i,j};Described message T2i,jWith message T1i,jCorrespondence, is used for and message T1i,jCompare computing, to verify commodity true and false;When any one commodity dispatch from the factory for the first time, the RFID write T1 being arranged on these part commodityi,1, system server storage massage set S={ T2i,1, i.e. j=1;
In two-dimension code label electronic tag on any one commodity, it is written with message T3i;Described message T3iIt it is the Quick Response Code digital identity certificate of commodity;System server storage massage set Q={ T4i, i=1,2 ... n };Described message T4iWith message T3iCorrespondence, is used for and message T3iCompare computing, to verify commodity true and false;When any one commodity dispatch from the factory for the first time, the two-dimension code label write T3 being arranged on these part commodityi, system server storage massage set Q={ T4i};
When carrying out fake certification by mobile scanning terminal commodity, there is following two mode;
Mode one: if described mobile terminal has the function of read-write RFID, then by scanning RFID, commodity are verified;
RFID anti-counterfeit recognition process is as follows:
1), after described mobile terminal device scans the RFID on commodity to be measured, message X in the RFID that will read is sent to described system server;
2) true and false of commodity is verified: the element in message X and described massage set S is compared computing by described server, verifies commodity true and false;
3) if checking commodity are false, it is false information that described system server sends commodity to mobile terminal, terminates RFID anti-counterfeit recognition;
If checking commodity are true, it is genuine information that described system server sends commodity to mobile terminal;Described system server record also stores corresponding message T2 in this items scanning RFIDi,jAnd sweep time and geographical position;And the digital identity certificate of more new commodity;
If checking commercial articles true and false is suspicious, described system server sends the suspicious information of commercial articles true and false to mobile terminal, and enters relevant counterfeit goods and trace to the source the processing routine of location;
The digital identity certificate process of described more new commodity is as follows:
Described system server generates message T1i,j+1, and it is sent to described mobile terminal;By described mobile terminal by message T1i,j+1Write verification result is in the RFID on genuine commodity, to replace original T1i,j;Described message T1i,j+1It is the RFID digital identity certificate of new representative commodity, carries out these part commodity for user using during true and false certification next time;System server storage and message T1i,j+1Corresponding message T2i,j+1, the most described massage set S is updated to { T2i,1、T2i,2……T2i,j、T2i,j + 1};Described message T2i,j+1For next time with message T1i,j+1Compare computing, to verify commodity true and false;
Described counterfeit goods trace to the source location processing routine as follows:
In described message T2i,j+1On the premise of being present in described system server, described system server receives message T1 to be verified that described mobile terminal is senti,k, from T1i,kObtain the T2 of correspondencei,k∈ { T2i,1、T2i,2……T2i,j、T2i,j+1And during k≤j, i.e. judge message T1i,kIt is stolen, and is written with in the RFID on counterfeit goods;Described system server record also submits sweep time of mobile terminal and the geographical position of this items scanning to, calls simultaneously and submits to out system server described in last time to receive T1i,kTime time of mobile scanning terminal commodity RFID and geographical position, for the false proof false making time and geographical position cracked down on counterfeit goods and provide counterfeiter possible;
Mode two: if described mobile terminal does not have the function of read-write RFID, uses two-dimension code anti-counterfeit identification to verify commodity;
If it is false for testing out commodity to be measured, it is false information that described system server sends commodity to mobile terminal;
If it is true for testing out commodity to be measured, it is genuine information that described system server sends commodity to mobile terminal;
After verifying, described system server returns these commodity to mobile terminal and has used the number of times of two-dimension code anti-counterfeit identification, and sending information to user, described information suggestion user uses described " mode one " to verify commodity, to obtain more reliable checking.
The most according to claim 1 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: step 2 in described " mode one ") checking commodity true and false, point following three kinds of situations:
A) if by described comparison calculation, described message X is not mated with any one element in massage set S, and described message X is not message T1i,j, it is false for testing out commodity to be measured, terminates true and false verification operation;
B) if by described comparison calculation, described message X and message T2 in massage set Si,jCoupling, the most described message X is message T1i,j, it is true for testing out commodity to be measured, terminates true and false verification operation;
C) if by described comparison calculation, except message T2 in described message X and massage set Si,jOther outer Match of elemental compositions, described message X is not message T1i,j, described system server draws the conclusion that commercial articles true and false is suspicious, terminates true and false verification operation.
The most according to claim 1 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: described system also includes randomizer;
Described message T1i,jBy message CAiWith message MBi,jCombine, i.e. T1i,j=CAi&MBi,j, wherein, message CAiIt is to MAiImplement what cryptographic calculation obtained, i.e. CAi=E (MAi), MAiIt is the corresponding one section of message being made up of serial number of i-th commodity;Message MBi,jIt is the random number produced by described randomizer, as described message MAiRFID digital identity certificate;
Described message T2i,j=MAi&CBi,j, described message CBi,jIt is to MBi,jImplement what cryptographic calculation obtained, CBi,j=H (MBi,j);
Step 2 in described " mode one ") verify that the process of commodity true and false is as follows:
After described system server receives message X that reader sends, first determine whether form and combined message T1 of Xi,jThe most identical;If it is not, the most described commodity to be measured are false, i.e. message X is not combined message T1i,j, terminate true and false verification operation;
If the form of message X and combined message T1i,jIdentical, then message X is split as XA and XB two parts, wherein, the form of XA and CAiIdentical, the form of XB and MBi,jIdentical, i.e. X=XA&XB;Described message XA is decrypted computing, obtains MXA=E-1(XA), if MXA ≠ MAiThen commodity are false, i.e. message X is not combined message T1i,j, terminate true and false verification operation;If MXA=MAi, then MA is found outiCorresponding CBi,j, XB is carried out one-way function computing and obtains CXB=H (XB), be divided into following three kinds of situations:
A) if CXB is not { CBi,1、CBi,2……CBi,jAny one element in }, message X is not combined message T1i,j, it is false for testing out commodity to be measured, terminates true and false verification operation;
B) if CXB=CBi,j, the most described commodity to be measured are true, and message X i.e. read is combined message T1i,j, it is true for testing out commodity to be measured, terminates true and false verification operation;
C) if CXB is { CBi,1、CBi,2……CBi,jExcept CB in }i,jAny one outer element, described message X is not message T1i,j, described system server draws the judgement that commercial articles true and false is suspicious, terminates true and false verification operation.
The most according to claim 3 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: in described " mode one " during the digital identity certificate of step 3) more new commodity, T1i,j+1=CAi&MBi,j+1
, T2i,j+1=MAi&CBi,j+1;
CBi,j+1=
H(MBi,j+1);MBi,j+1For step 2) judge that commodity are true time, a new random number of described system server stochastic generation, as message MAiNew RFID digital identity certificate.
The most according to claims 1 to 4 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: described two-dimension code anti-counterfeit identification process is as follows:
After described mobile terminal device scans the two-dimension code label on commodity to be measured, message Y in the two-dimension code label that will read is sent to described system server, compares computing with the element in described massage set Q, to verify commodity true and false;
Point following two situation:
If by described comparison calculation, described message Y is not mated with any one element in massage set Q, and described message Y is not message T3i, it is false for testing out commodity to be measured, and it is false information that described system server sends commodity to mobile terminal, and terminates true and false verification operation;
If by described comparison calculation, described message Y and message T4iCoupling, the most described message Y is message T3i, it is genuine information that described system server sends commodity to mobile terminal, and terminates true and false verification operation.
6. according to the RFID commodity counterfeit prevention traceability system of compatibility two-dimension code anti-counterfeit while of a kind of described in claim 3 or 4, it is characterised in that:
T3i=FAi&IBi, wherein message FAiIt is to MAiImplement what cryptographic calculation obtained, i.e. FAi=G (MAi);Message IBiIt is the random number produced by described randomizer, as described message MAiQuick Response Code digital identity certificate;
T4i=MAi&FBi, described message FBiIt is to IBiImplement what cryptographic calculation obtained, i.e. FBi=J (IBi);
In described " mode two ", two-dimension code anti-counterfeit identification process is as follows:
After described mobile terminal device scans the two-dimension code label on commodity to be measured, message Y in the two-dimension code label that will read is sent to described system server;
After described system server receives message Y that reader sends, first determine whether form and combined message T3 of YiThe most identical;If it is not, the most described commodity to be measured are false, i.e. message Y is not combined message T3i, terminate true and false verification operation;
If the form of message Y and combined message T3iIdentical, then message Y is split as YA and YB two parts, wherein, the form of YA and FAiIdentical, the form of YB and IBiIdentical, i.e. Y=YA&YB;Described message YA is decrypted computing, obtains value MYA=G-1(YA), if MYA ≠ MAi, i=1,2 ... n, then commodity are false, i.e. message Y is not combined message T3i, terminate true and false verification operation;If MYA=MAi, then MA is found outiCorresponding FBi;YB is carried out one-way function computing and obtains FYB=J (YB), be divided into following two situation:
If FYB is not { FBi, i=1,2 ... n } in any one element, message Y is not combined message T3i, it is false for testing out commodity to be measured, terminates true and false verification operation;
If FYB=FBi, i=1,2 ... n, the most described commodity to be measured are genuine piece, and message X i.e. read is combined message T3i, it is true for testing out commodity to be measured, terminates true and false verification operation.
The most according to claim 1 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that:
T2i,jWith T1i,jRelation be one of following three kinds of situations:
A) described T2i,jEqual to T1i,j;
B) described T2i,jIt is T1i,jOne encryption after message;
C) described T2i,jIt is T1i,jCryptographic Hash after Hash operation;
T4iWith T3iRelation be one of following three kinds of situations:
D) described T4iEqual to T3i;
E) described T4iIt is T3iOne encryption after message;
F) described T4iIt is T3iCryptographic Hash after Hash operation.
The most according to claim 3 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: T3i=CAi, T4i=MAi。
The most according to claim 3 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: combined message T1 being previously written in the RFID on each commodityi,jThere is randomness and uniqueness;Described CAiAnd MBi,jAt T1i,j=CAi&MBi,jAfter being written into RFID, it is not present in system server, T1i,j=CAi&MBi,jValue can not be stolen by scale by attacking system server and replicate;
Described MBi,jIn partial bytes as to CAiImplement the key of deciphering;
Described message MAiOr MBi,jA length of 8~1024;Described commodity sequence number portion MAiInclude commodity production time and commodity sequence number.
The most according to claim 6 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: combined message T3 being previously written in the two-dimension code label on each commodityiThere is randomness and uniqueness;Described FAiAnd IBiAt T3i=FAi&IBiAfter being written into two-dimension code label, it is not present in system server, T3i=FAi&IBiValue can not be stolen by scale by attacking system server and replicate;
Described message MAiOr IBiA length of 8~1024;Described commodity sequence number portion MAiInclude commodity production time and commodity sequence number;
Described IBiIn partial bytes as to FAiImplement the key of deciphering.
11. according to claim 1 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: when described commodity are activated, described RFID is destroyed, and described two-dimension code label is destroyed;The described mobile terminal with read-write RFID is with radio frequency recognition function or the mobile phone of close range wireless communication NFC function or mobile terminal.
12. according to claim 6 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: described CAiIn, according to certain rule, it is implied with CAiImplement the key of deciphering;Described FAiIn, according to certain rule, it is implied with FAiImplement the key of deciphering.
13. according to claim 6 a kind of while compatibility two-dimension code anti-counterfeit RFID commodity counterfeit prevention traceability system, it is characterised in that: described FAi= CAi。
14. according to the RFID commodity counterfeit prevention traceability system of compatibility two-dimension code anti-counterfeit while of a kind of described in claim 1~13, it is characterized in that: when using described two-dimension code anti-counterfeit identification to verify commodity, mobile terminal requires to use the reader for two-dimension code in specific authentication APP.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510015098.2A CN105844472A (en) | 2015-01-13 | 2015-01-13 | RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510015098.2A CN105844472A (en) | 2015-01-13 | 2015-01-13 | RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105844472A true CN105844472A (en) | 2016-08-10 |
Family
ID=57178122
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510015098.2A Pending CN105844472A (en) | 2015-01-13 | 2015-01-13 | RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105844472A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106408067A (en) * | 2016-09-24 | 2017-02-15 | 广州市雄冠条码实业有限公司 | Two-dimensional code anti-counterfeiting label and verification method |
CN106934639A (en) * | 2017-03-08 | 2017-07-07 | 章哲成 | A kind of false proof retroactive method of paper diaper based on RFID and Quick Response Code |
CN107862221A (en) * | 2017-10-31 | 2018-03-30 | 郑州云海信息技术有限公司 | A kind of method of server component anti-fake certificate |
CN108416414A (en) * | 2018-03-26 | 2018-08-17 | 中国人民银行印制科学技术研究所 | Self checking anti-fake two-dimension code and production method and device, self checking method and apparatus |
CN108881166A (en) * | 2017-05-16 | 2018-11-23 | 江峰 | A kind of virtual account block chain of band external fixture reason node type verifies system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103854185A (en) * | 2012-11-30 | 2014-06-11 | 上海透云物联网科技有限公司 | QR code, anti-counterfeiting code, RFID tag and mobile application combined anti-counterfeiting system |
CN103971247A (en) * | 2014-03-18 | 2014-08-06 | 四川谦泰仁投资管理有限公司 | Combined encryption system for commodity forgery proofing |
CN103971250A (en) * | 2014-04-09 | 2014-08-06 | 四川谦泰仁投资管理有限公司 | One-time-one-certificate anti-fake traceability system based on mobile terminal and RFID (radio frequency identification) |
CN103971245A (en) * | 2014-01-30 | 2014-08-06 | 四川谦泰仁投资管理有限公司 | Combined encryption system for commodity electronic forgery proofing |
CN103971248A (en) * | 2014-03-18 | 2014-08-06 | 四川谦泰仁投资管理有限公司 | Commodity anti-counterfeiting tracing system on basis of two-dimension codes and RFID (radio frequency identification device) technology |
CN103971246A (en) * | 2014-01-30 | 2014-08-06 | 四川谦泰仁投资管理有限公司 | One-way function bidirectional encryption based electronic commodity security system |
-
2015
- 2015-01-13 CN CN201510015098.2A patent/CN105844472A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103854185A (en) * | 2012-11-30 | 2014-06-11 | 上海透云物联网科技有限公司 | QR code, anti-counterfeiting code, RFID tag and mobile application combined anti-counterfeiting system |
CN103971245A (en) * | 2014-01-30 | 2014-08-06 | 四川谦泰仁投资管理有限公司 | Combined encryption system for commodity electronic forgery proofing |
CN103971246A (en) * | 2014-01-30 | 2014-08-06 | 四川谦泰仁投资管理有限公司 | One-way function bidirectional encryption based electronic commodity security system |
CN103971247A (en) * | 2014-03-18 | 2014-08-06 | 四川谦泰仁投资管理有限公司 | Combined encryption system for commodity forgery proofing |
CN103971248A (en) * | 2014-03-18 | 2014-08-06 | 四川谦泰仁投资管理有限公司 | Commodity anti-counterfeiting tracing system on basis of two-dimension codes and RFID (radio frequency identification device) technology |
CN103971250A (en) * | 2014-04-09 | 2014-08-06 | 四川谦泰仁投资管理有限公司 | One-time-one-certificate anti-fake traceability system based on mobile terminal and RFID (radio frequency identification) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106408067A (en) * | 2016-09-24 | 2017-02-15 | 广州市雄冠条码实业有限公司 | Two-dimensional code anti-counterfeiting label and verification method |
CN106934639A (en) * | 2017-03-08 | 2017-07-07 | 章哲成 | A kind of false proof retroactive method of paper diaper based on RFID and Quick Response Code |
CN108881166A (en) * | 2017-05-16 | 2018-11-23 | 江峰 | A kind of virtual account block chain of band external fixture reason node type verifies system |
CN108876399A (en) * | 2017-05-16 | 2018-11-23 | 江峰 | A kind of finite field block catenary system with closed loop Verification System |
CN108881166B (en) * | 2017-05-16 | 2021-03-26 | 江峰 | Virtual account block chain verification system with external fixed physical node |
CN108876399B (en) * | 2017-05-16 | 2022-04-29 | 江峰 | Finite field block chain system with closed-loop authentication system |
CN107862221A (en) * | 2017-10-31 | 2018-03-30 | 郑州云海信息技术有限公司 | A kind of method of server component anti-fake certificate |
CN108416414A (en) * | 2018-03-26 | 2018-08-17 | 中国人民银行印制科学技术研究所 | Self checking anti-fake two-dimension code and production method and device, self checking method and apparatus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103971250B (en) | A kind of one time one card anti-fake traceability system based on mobile terminal and RFID | |
CN202019354U (en) | Article identity authenticating and anti-counterfeiting system based on NFC (near field communication) cellphone | |
CN105844472A (en) | RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention | |
US20140095398A1 (en) | Double ID Anti-Counterfeit Method and System | |
CN105046504A (en) | Multiple key checking, inspection and forgery prevention source forming method and forgery prevention label | |
CN104854597B (en) | Certificate server, Verification System and authentication method | |
CN107886333A (en) | A kind of Antiforge system and its method for anti-counterfeit with dynamic anti-fake information | |
CN103218591A (en) | Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same | |
CN101945123A (en) | RFID mobile phone and combination key technology-based authenticity identification method | |
CN103810588A (en) | Electronic seal system and electronic seal | |
CN103971245B (en) | A kind of combined ciphering system false proof for electronic article | |
CN108082723B (en) | Anti-counterfeiting bottle cap based on CPU (Central processing Unit) password chip and working method thereof | |
CN110598433A (en) | Anti-counterfeiting information processing method and device based on block chain | |
CN104574119A (en) | Commodity identifying and tracing method | |
CN103971246B (en) | One-way function bidirectional encryption based electronic commodity security system | |
CN202870898U (en) | Radio frequency-based commodity information identification system | |
KR101638787B1 (en) | Mobile ticket security system and method of based location information and terminal unique number | |
CN109450915A (en) | A kind of homing pigeon foot ring and its recognition methods based on NFC | |
KR101242684B1 (en) | User certification system and method for 2 dimensional barcode | |
CN103971247B (en) | A kind of combined ciphering system for commodity counterfeit prevention | |
CN106712952B (en) | Radio frequency tag security identification method and system | |
CN106815614A (en) | A kind of bank acceptance Antiforge system of use NFC anti-counterfeiting technologies | |
CN104091191B (en) | A kind of efficiently and effectively false proof authenticating method | |
CN110011805A (en) | Two-way authentication anti-counterfeiting system and method based on low-power consumption bluetooth system | |
CN111951032A (en) | Third-party article anti-counterfeiting authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160810 |
|
RJ01 | Rejection of invention patent application after publication |