CN105916146A - Method for verifying whether garment product is certified product or not through cellphone - Google Patents
Method for verifying whether garment product is certified product or not through cellphone Download PDFInfo
- Publication number
- CN105916146A CN105916146A CN201610244719.9A CN201610244719A CN105916146A CN 105916146 A CN105916146 A CN 105916146A CN 201610244719 A CN201610244719 A CN 201610244719A CN 105916146 A CN105916146 A CN 105916146A
- Authority
- CN
- China
- Prior art keywords
- focus
- client
- information
- server
- checking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Abstract
The invention discloses a method for verifying whether a garment product is a certified product or not through a cellphone, and the method is used among a client, a hot spot and a server. The client is installed on the cellphone, and the client judges whether the verification result is passes or not. If the verification result is not passed, the connection with the hot spot is cut off. If the verification result is passes, a camera is started for starting the scanning of a two-dimensional code. The client analyzes the two-dimensional code, obtains the information of the two-dimensional code, and transmits the information to the server through the hot spot. The server verifies the information of the two-dimensional code, and returns a certified production verification product, the number of verification times and the verification time to the client. According to the technical scheme of the invention, the method can achieve the verification whether the garment product is certified product or not, and prevents the illegal use of the hot spot from causing the inaccurate verification result.
Description
Technical field
The present invention relates to textile certified products verification technique field, particularly relate to a kind of method utilizing mobile phone checking medicated clothing whether certified products.
Background technology
Existing medicated clothing there is also counterfeit situation, and consumer is difficult to differentiate.And the method that medicated clothing there is no checking.Some verification methods also rest on above note or phone, and checking cost is the highest.Existing WIFI becomes more and more popular, everybody all with, a device that can provide WIFI signal is exactly focus.Mobile phone is more universal, carries out checking by free WIFI and can greatly reduce cost.
Summary of the invention
For this reason, it may be necessary to provide a kind of method utilizing mobile phone checking medicated clothing whether certified products, solve the problem that existing medicated clothing certified products checking cost is high.
For achieving the above object, inventor provide a kind of method utilizing mobile phone checking medicated clothing whether certified products, being applied between client, focus and server, client is arranged on mobile phone, and medicated clothing is provided with label, Quick Response Code it is provided with on label, Quick Response Code is provided above with password and scrapes overlay film, and focus has unique first encryption method, and server has the first decryption method corresponding with the first encryption method, it is characterized in that, this method comprises the steps:
Client sets up connection by the WIFI module being attached thereto to focus;
Client sends and counts to focus at random;
Focus uses the first encryption method to be verified information after random number is encrypted computing;
Focus replys checking information to client;
Client sends focus identification information, checking information and counts to server at random;
Server obtains first decryption method according to focus identification information;
After server uses first decryption method to be decrypted checking information and compare with random number and obtain authentication result;
Server replys authentication result to client;
Client judges whether authentication result is passed through;
If do not passed through, then disconnect the connection between focus;
If passed through, then start photographic head and start to scan Quick Response Code;
Client obtains 2 D code information after resolving Quick Response Code and is sent to server by focus;
Certified products the result, checking number of times, proving time be returned to client after server authentication 2 D code information.
Further, having unique second encryption method between server, client has second decryption method corresponding with the second encryption method, wherein:
When client sends authentication information to server, client sends client identification information to server;
After server obtains authentication result, obtaining the second encryption method according to client identification information, use the second encryption method to be encrypted authentication result and random number, the authentication result after then server replys encryption is to client;
Client judges, when whether authentication result is passed through, to be decrypted authentication result initially with the second decryption method, it is judged that whether random number is the most correct passes through with authentication result;
If random number is correct and authentication result is passed through, then proceed to scan Quick Response Code step;
Otherwise, then the connection between focus is disconnected.
Further, client sends and the information of reception server includes: client is sent by mobile phone radio frequency module and receives server info.
Further, before this method starts, further comprise the steps of:
Client judges around whether there is the focus that two or more ssid information is identical with mac information, if it has, then point out this focus.
Further, also comprise the steps: to detect focus signal intensity, after focus signal intensity is less than preset value, disconnects the connection with focus and delete hot information.
Being different from prior art, technique scheme passes through server, it is possible to achieve the whether checking of the certified products of clothes, and server first demonstrates the uniqueness certification of focus simultaneously, it is ensured that focus is that safety is the most legal.
Detailed description of the invention
By describing the technology contents of technical scheme, structural feature in detail, being realized purpose and effect, it is explained in detail below in conjunction with specific embodiment.
Present embodiments providing a kind of method utilizing mobile phone checking medicated clothing whether certified products, be applied between client, focus and server, client is arranged on mobile phone, and client can be mobile phone or notebook client.Label it is provided with on medicated clothing, can print the information relevant to clothes on label, label is provided with Quick Response Code, Quick Response Code is provided above with password and scrapes overlay film, i.e. scraping password off and scrape overlay film it can be seen that Quick Response Code, user is verifying whether that certified products can be scraped overlay film verify Quick Response Code by scraping password off.Focus has unique first encryption method, i.e. the most different from other focuses, can carry out uniqueness association by the identification information of focus.Server has the first decryption method corresponding with the first encryption method.
This method comprises the steps: that client is typically mounted in operating system, and operating system has certified products proving program, and operating system connects WIFI module, and application program can be communicated with external program by WIFI module.
Client sets up connection by the WIFI module being attached thereto to focus;Client can show the focus that WIFI module searches, and after user clicks on focus, i.e. can set up with thermotropism point and connect.
Client sends and counts to focus at random;Client can generate a random number, this random number have various ways.Focus uses the first encryption method to be verified information after random number is encrypted computing;Checking information is i.e. the random number after encryption.
Focus replys checking information to client;Client sends focus identification information, checking information and counts to server at random.Focus identification information can be mac address information or other information of focus, if other information, can send focus identification information together to client by focus focus replys checking information to client when.
Server obtains first decryption method according to focus identification information;After server uses first decryption method to be decrypted checking information and compare with random number and obtain authentication result;Server replys authentication result to client;Client judges whether authentication result is passed through.
If do not passed through, then disconnect the connection between focus;If passed through, then start photographic head and start to scan Quick Response Code;Client obtains 2 D code information after resolving Quick Response Code and is sent to server by focus;Certified products the result, checking number of times, proving time be returned to client after server authentication 2 D code information.By checking number of times and proving time, user, it is known that the thing of oneself is verified the most for the first time, if for the first time, being then certified products, if not for the first time, may be exactly counterfeit.
If do not passed through, then disconnect the connection between focus.So, random number owing to not knowing encryption method, then can not be encrypted and obtain correct checking information by the focus falsely used, and cannot authenticate the most on the server and pass through.Then client just can disconnect and the connection of the focus falsely used, thus avoids the connection of illegal focus.Thereby may be ensured that certified products the result, checking number of times, the safety of proving time, as long as so producer arranges the WIFI of a certified products checking in brand shop, client just can connect this WIFI and carry out certified products verification.
Focus in order to avoid falsely using directly transmits legal authentication result to client, in certain embodiments, unique second encryption method is had between server, client has second decryption method corresponding with the second encryption method, wherein: when client sends authentication information to server, client sends client identification information to server;After server obtains authentication result, obtaining the second encryption method according to client identification information, use the second encryption method to be encrypted authentication result and random number, the authentication result after then server replys encryption is to client;Client judges, when whether authentication result is passed through, to be decrypted authentication result initially with the second decryption method, it is judged that whether random number is the most correct passes through with authentication result;If random number is correct and authentication result is passed through, then proceed to scan Quick Response Code step;Otherwise, then the connection between focus is disconnected.So, authentication result is also the data of encryption, if the focus falsely used at will sends other legal authentication results, does not then encrypt through the second encryption method due to this authentication result, then cannot decipher and obtain correct random number and authentication result.Thus avoid the focus falsely used and arbitrarily send other legal authentication result to client, and cause the problem that client connects.
Certainly, as long as client is not by being the WIFI module acquisition that is authenticated result, just can be greatly improved the correctness of authentication result, as passed through mobile phone radio frequency module (2G, 3G, 4G communication module etc.), client sends and receives the information of server and includes: client is sent by mobile phone radio frequency module and receives server info.WIFI pattern when so the focus owing to falsely using is carried out, and mobile phone radio frequency module cannot be falsely used, then client is legal authentication result from the authentication result that mobile phone radio frequency module gets.
Many times, the focus falsely used and legal focus are in a place, for this illegal in the case of, need to remind in time user.Then before this method starts, further comprise the steps of: client judges around whether there is the focus that two or more ssid information is identical with mac information, if it has, then point out this focus.Prompting can be carried out by dialog box or by the way of being highlighted, and user one sees such situation, will vigilance relatively when of connection.
In order to avoid connecting illegal focus elsewhere, present invention additionally comprises following steps: detection focus signal intensity, after focus signal intensity is less than preset value, disconnection and the connection of focus also delete hot information.After deleting hot information, the equipment installing client just cannot connect this hot information automatically, thus ensures safety.
Although the various embodiments described above being described; but those skilled in the art once know basic creative concept; then these embodiments can be made other change and amendment; so the foregoing is only embodiments of the invention; not thereby the scope of patent protection of the present invention is limited; every equivalent structure utilizing description of the invention content to be made or equivalence flow process conversion; or directly or indirectly it is used in other relevant technical fields, within being the most in like manner included in the scope of patent protection of the present invention.
Claims (2)
1. the method utilizing mobile phone checking medicated clothing whether certified products, is applied to client, focus and service
Between device, client is arranged on mobile phone, and medicated clothing is provided with label, and label is provided with Quick Response Code, and two
Dimension code is provided above with password and scrapes overlay film, and focus has unique first encryption method, server have with
The first decryption method that first encryption method is corresponding, it is characterised in that this method comprises the steps:
Client sets up connection by the WIFI module being attached thereto to focus;
Client sends and counts to focus at random;
Focus uses the first encryption method to be verified information after random number is encrypted computing;
Focus replys checking information to client;
Client sends focus identification information, checking information and counts to server at random;
Server obtains first decryption method according to focus identification information;
After server uses first decryption method to be decrypted checking information and compare with random number
To authentication result;
Server replys authentication result to client;
Client judges whether authentication result is passed through;
If do not passed through, then disconnect the connection between focus;
If passed through, then start photographic head and start to scan Quick Response Code;
Client obtains 2 D code information after resolving Quick Response Code and is sent to server by focus;
Certified products the result, checking number of times, proving time be returned to visitor after server authentication 2 D code information
Family end;
Detection focus signal intensity, after focus signal intensity is less than preset value, disconnects the connection with focus
And delete hot information.
The method utilizing mobile phone checking medicated clothing whether certified products the most according to claim 1, its feature exists
In, before this method starts, further comprise the steps of:
Client judges around whether there is the focus that two or more ssid information is identical with mac information, as
Fruit has, then point out this focus.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610244719.9A CN105916146A (en) | 2016-04-19 | 2016-04-19 | Method for verifying whether garment product is certified product or not through cellphone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610244719.9A CN105916146A (en) | 2016-04-19 | 2016-04-19 | Method for verifying whether garment product is certified product or not through cellphone |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105916146A true CN105916146A (en) | 2016-08-31 |
Family
ID=56747421
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610244719.9A Pending CN105916146A (en) | 2016-04-19 | 2016-04-19 | Method for verifying whether garment product is certified product or not through cellphone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105916146A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103246863A (en) * | 2013-04-02 | 2013-08-14 | 包晗 | Identifying system and identifying method for interactive anti-counterfeiting based on identifying codes |
CN103391540A (en) * | 2012-05-08 | 2013-11-13 | 华为终端有限公司 | Method and system for generating secret key information, terminal device and access network device |
CN104156862A (en) * | 2014-08-07 | 2014-11-19 | 四川途谷信息技术有限公司 | Wechat-platform-based two-dimensional code anti-fake and anti-channel conflict inquiry system and method |
CN105188055A (en) * | 2015-08-14 | 2015-12-23 | 中国联合网络通信集团有限公司 | Wireless network access method, wireless access point and server |
CN105469260A (en) * | 2014-09-01 | 2016-04-06 | 上海涌杰信息科技有限公司 | Product anti-counterfeiting and anti-bugselling method and system |
-
2016
- 2016-04-19 CN CN201610244719.9A patent/CN105916146A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103391540A (en) * | 2012-05-08 | 2013-11-13 | 华为终端有限公司 | Method and system for generating secret key information, terminal device and access network device |
CN103246863A (en) * | 2013-04-02 | 2013-08-14 | 包晗 | Identifying system and identifying method for interactive anti-counterfeiting based on identifying codes |
CN104156862A (en) * | 2014-08-07 | 2014-11-19 | 四川途谷信息技术有限公司 | Wechat-platform-based two-dimensional code anti-fake and anti-channel conflict inquiry system and method |
CN105469260A (en) * | 2014-09-01 | 2016-04-06 | 上海涌杰信息科技有限公司 | Product anti-counterfeiting and anti-bugselling method and system |
CN105188055A (en) * | 2015-08-14 | 2015-12-23 | 中国联合网络通信集团有限公司 | Wireless network access method, wireless access point and server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI634771B (en) | Wisdom device and method and device for establishing Bluetooth connection between devices | |
CN105119939B (en) | The cut-in method and device, providing method and device and system of wireless network | |
CN105516103B (en) | Method, device and system for binding intelligent household electrical appliance | |
US9485261B2 (en) | Web security protection method, device and system | |
US11337067B2 (en) | Systems and methods for providing wireless access security by interrogation | |
CN109982322B (en) | Screen projection method, device, system and storage medium | |
CN105471815A (en) | Internet-of-things data security method and Internet-of-things data security device based on security authentication | |
CN106559785B (en) | Authentication method, device and system, access device and terminal | |
CN108306793B (en) | Intelligent device, intelligent home gateway, and method and system for establishing connection | |
CN105357224A (en) | Intelligent household gateway register, remove method and system | |
CN104837159A (en) | OAuth protocol misuse security detection method on Android platform | |
CN105873034A (en) | Safe hot spot information processing method | |
CN105873035A (en) | Safe AP (access point) information processing method | |
CN105916147A (en) | Method for shoe verification through server | |
CN105761092A (en) | Method for performing clothing verification through server | |
CN106162644A (en) | A kind of WiFi system preventing camouflage equipment and safe verification method thereof | |
CN105916146A (en) | Method for verifying whether garment product is certified product or not through cellphone | |
CN105916148A (en) | Garment certified product verification method based on WIFI | |
CN105871860A (en) | Method for quality product verification of shoes based on WIFI | |
CN106101058A (en) | A kind of hot information processing method based on Quick Response Code | |
CN103745364A (en) | Scan code differential scanning-based anti-fake method and scan code differential scanning method | |
CN105743923A (en) | Method for verifying whether shoes are quality products or not by utilizing mobile phone | |
CN104732400A (en) | Commodity authenticity detecting method and system based on two-dimension code | |
CN106028328A (en) | NFC-based hotspot authentication method | |
CN106028327A (en) | Method for realizing hotspot security through authentication server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160831 |
|
RJ01 | Rejection of invention patent application after publication |