CN105916146A - Method for verifying whether garment product is certified product or not through cellphone - Google Patents

Method for verifying whether garment product is certified product or not through cellphone Download PDF

Info

Publication number
CN105916146A
CN105916146A CN201610244719.9A CN201610244719A CN105916146A CN 105916146 A CN105916146 A CN 105916146A CN 201610244719 A CN201610244719 A CN 201610244719A CN 105916146 A CN105916146 A CN 105916146A
Authority
CN
China
Prior art keywords
focus
client
information
server
checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610244719.9A
Other languages
Chinese (zh)
Inventor
徐美琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shishi Ruifang Textile Trading Co Ltd
Original Assignee
Shishi Ruifang Textile Trading Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shishi Ruifang Textile Trading Co Ltd filed Critical Shishi Ruifang Textile Trading Co Ltd
Priority to CN201610244719.9A priority Critical patent/CN105916146A/en
Publication of CN105916146A publication Critical patent/CN105916146A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Abstract

The invention discloses a method for verifying whether a garment product is a certified product or not through a cellphone, and the method is used among a client, a hot spot and a server. The client is installed on the cellphone, and the client judges whether the verification result is passes or not. If the verification result is not passed, the connection with the hot spot is cut off. If the verification result is passes, a camera is started for starting the scanning of a two-dimensional code. The client analyzes the two-dimensional code, obtains the information of the two-dimensional code, and transmits the information to the server through the hot spot. The server verifies the information of the two-dimensional code, and returns a certified production verification product, the number of verification times and the verification time to the client. According to the technical scheme of the invention, the method can achieve the verification whether the garment product is certified product or not, and prevents the illegal use of the hot spot from causing the inaccurate verification result.

Description

A kind of method utilizing mobile phone checking medicated clothing whether certified products
Technical field
The present invention relates to textile certified products verification technique field, particularly relate to a kind of method utilizing mobile phone checking medicated clothing whether certified products.
Background technology
Existing medicated clothing there is also counterfeit situation, and consumer is difficult to differentiate.And the method that medicated clothing there is no checking.Some verification methods also rest on above note or phone, and checking cost is the highest.Existing WIFI becomes more and more popular, everybody all with, a device that can provide WIFI signal is exactly focus.Mobile phone is more universal, carries out checking by free WIFI and can greatly reduce cost.
Summary of the invention
For this reason, it may be necessary to provide a kind of method utilizing mobile phone checking medicated clothing whether certified products, solve the problem that existing medicated clothing certified products checking cost is high.
For achieving the above object, inventor provide a kind of method utilizing mobile phone checking medicated clothing whether certified products, being applied between client, focus and server, client is arranged on mobile phone, and medicated clothing is provided with label, Quick Response Code it is provided with on label, Quick Response Code is provided above with password and scrapes overlay film, and focus has unique first encryption method, and server has the first decryption method corresponding with the first encryption method, it is characterized in that, this method comprises the steps:
Client sets up connection by the WIFI module being attached thereto to focus;
Client sends and counts to focus at random;
Focus uses the first encryption method to be verified information after random number is encrypted computing;
Focus replys checking information to client;
Client sends focus identification information, checking information and counts to server at random;
Server obtains first decryption method according to focus identification information;
After server uses first decryption method to be decrypted checking information and compare with random number and obtain authentication result;
Server replys authentication result to client;
Client judges whether authentication result is passed through;
If do not passed through, then disconnect the connection between focus;
If passed through, then start photographic head and start to scan Quick Response Code;
Client obtains 2 D code information after resolving Quick Response Code and is sent to server by focus;
Certified products the result, checking number of times, proving time be returned to client after server authentication 2 D code information.
Further, having unique second encryption method between server, client has second decryption method corresponding with the second encryption method, wherein:
When client sends authentication information to server, client sends client identification information to server;
After server obtains authentication result, obtaining the second encryption method according to client identification information, use the second encryption method to be encrypted authentication result and random number, the authentication result after then server replys encryption is to client;
Client judges, when whether authentication result is passed through, to be decrypted authentication result initially with the second decryption method, it is judged that whether random number is the most correct passes through with authentication result;
If random number is correct and authentication result is passed through, then proceed to scan Quick Response Code step;
Otherwise, then the connection between focus is disconnected.
Further, client sends and the information of reception server includes: client is sent by mobile phone radio frequency module and receives server info.
Further, before this method starts, further comprise the steps of:
Client judges around whether there is the focus that two or more ssid information is identical with mac information, if it has, then point out this focus.
Further, also comprise the steps: to detect focus signal intensity, after focus signal intensity is less than preset value, disconnects the connection with focus and delete hot information.
Being different from prior art, technique scheme passes through server, it is possible to achieve the whether checking of the certified products of clothes, and server first demonstrates the uniqueness certification of focus simultaneously, it is ensured that focus is that safety is the most legal.
Detailed description of the invention
By describing the technology contents of technical scheme, structural feature in detail, being realized purpose and effect, it is explained in detail below in conjunction with specific embodiment.
Present embodiments providing a kind of method utilizing mobile phone checking medicated clothing whether certified products, be applied between client, focus and server, client is arranged on mobile phone, and client can be mobile phone or notebook client.Label it is provided with on medicated clothing, can print the information relevant to clothes on label, label is provided with Quick Response Code, Quick Response Code is provided above with password and scrapes overlay film, i.e. scraping password off and scrape overlay film it can be seen that Quick Response Code, user is verifying whether that certified products can be scraped overlay film verify Quick Response Code by scraping password off.Focus has unique first encryption method, i.e. the most different from other focuses, can carry out uniqueness association by the identification information of focus.Server has the first decryption method corresponding with the first encryption method.
This method comprises the steps: that client is typically mounted in operating system, and operating system has certified products proving program, and operating system connects WIFI module, and application program can be communicated with external program by WIFI module.
Client sets up connection by the WIFI module being attached thereto to focus;Client can show the focus that WIFI module searches, and after user clicks on focus, i.e. can set up with thermotropism point and connect.
Client sends and counts to focus at random;Client can generate a random number, this random number have various ways.Focus uses the first encryption method to be verified information after random number is encrypted computing;Checking information is i.e. the random number after encryption.
Focus replys checking information to client;Client sends focus identification information, checking information and counts to server at random.Focus identification information can be mac address information or other information of focus, if other information, can send focus identification information together to client by focus focus replys checking information to client when.
Server obtains first decryption method according to focus identification information;After server uses first decryption method to be decrypted checking information and compare with random number and obtain authentication result;Server replys authentication result to client;Client judges whether authentication result is passed through.
If do not passed through, then disconnect the connection between focus;If passed through, then start photographic head and start to scan Quick Response Code;Client obtains 2 D code information after resolving Quick Response Code and is sent to server by focus;Certified products the result, checking number of times, proving time be returned to client after server authentication 2 D code information.By checking number of times and proving time, user, it is known that the thing of oneself is verified the most for the first time, if for the first time, being then certified products, if not for the first time, may be exactly counterfeit.
If do not passed through, then disconnect the connection between focus.So, random number owing to not knowing encryption method, then can not be encrypted and obtain correct checking information by the focus falsely used, and cannot authenticate the most on the server and pass through.Then client just can disconnect and the connection of the focus falsely used, thus avoids the connection of illegal focus.Thereby may be ensured that certified products the result, checking number of times, the safety of proving time, as long as so producer arranges the WIFI of a certified products checking in brand shop, client just can connect this WIFI and carry out certified products verification.
Focus in order to avoid falsely using directly transmits legal authentication result to client, in certain embodiments, unique second encryption method is had between server, client has second decryption method corresponding with the second encryption method, wherein: when client sends authentication information to server, client sends client identification information to server;After server obtains authentication result, obtaining the second encryption method according to client identification information, use the second encryption method to be encrypted authentication result and random number, the authentication result after then server replys encryption is to client;Client judges, when whether authentication result is passed through, to be decrypted authentication result initially with the second decryption method, it is judged that whether random number is the most correct passes through with authentication result;If random number is correct and authentication result is passed through, then proceed to scan Quick Response Code step;Otherwise, then the connection between focus is disconnected.So, authentication result is also the data of encryption, if the focus falsely used at will sends other legal authentication results, does not then encrypt through the second encryption method due to this authentication result, then cannot decipher and obtain correct random number and authentication result.Thus avoid the focus falsely used and arbitrarily send other legal authentication result to client, and cause the problem that client connects.
Certainly, as long as client is not by being the WIFI module acquisition that is authenticated result, just can be greatly improved the correctness of authentication result, as passed through mobile phone radio frequency module (2G, 3G, 4G communication module etc.), client sends and receives the information of server and includes: client is sent by mobile phone radio frequency module and receives server info.WIFI pattern when so the focus owing to falsely using is carried out, and mobile phone radio frequency module cannot be falsely used, then client is legal authentication result from the authentication result that mobile phone radio frequency module gets.
Many times, the focus falsely used and legal focus are in a place, for this illegal in the case of, need to remind in time user.Then before this method starts, further comprise the steps of: client judges around whether there is the focus that two or more ssid information is identical with mac information, if it has, then point out this focus.Prompting can be carried out by dialog box or by the way of being highlighted, and user one sees such situation, will vigilance relatively when of connection.
In order to avoid connecting illegal focus elsewhere, present invention additionally comprises following steps: detection focus signal intensity, after focus signal intensity is less than preset value, disconnection and the connection of focus also delete hot information.After deleting hot information, the equipment installing client just cannot connect this hot information automatically, thus ensures safety.
Although the various embodiments described above being described; but those skilled in the art once know basic creative concept; then these embodiments can be made other change and amendment; so the foregoing is only embodiments of the invention; not thereby the scope of patent protection of the present invention is limited; every equivalent structure utilizing description of the invention content to be made or equivalence flow process conversion; or directly or indirectly it is used in other relevant technical fields, within being the most in like manner included in the scope of patent protection of the present invention.

Claims (2)

1. the method utilizing mobile phone checking medicated clothing whether certified products, is applied to client, focus and service Between device, client is arranged on mobile phone, and medicated clothing is provided with label, and label is provided with Quick Response Code, and two Dimension code is provided above with password and scrapes overlay film, and focus has unique first encryption method, server have with The first decryption method that first encryption method is corresponding, it is characterised in that this method comprises the steps:
Client sets up connection by the WIFI module being attached thereto to focus;
Client sends and counts to focus at random;
Focus uses the first encryption method to be verified information after random number is encrypted computing;
Focus replys checking information to client;
Client sends focus identification information, checking information and counts to server at random;
Server obtains first decryption method according to focus identification information;
After server uses first decryption method to be decrypted checking information and compare with random number To authentication result;
Server replys authentication result to client;
Client judges whether authentication result is passed through;
If do not passed through, then disconnect the connection between focus;
If passed through, then start photographic head and start to scan Quick Response Code;
Client obtains 2 D code information after resolving Quick Response Code and is sent to server by focus;
Certified products the result, checking number of times, proving time be returned to visitor after server authentication 2 D code information Family end;
Detection focus signal intensity, after focus signal intensity is less than preset value, disconnects the connection with focus And delete hot information.
The method utilizing mobile phone checking medicated clothing whether certified products the most according to claim 1, its feature exists In, before this method starts, further comprise the steps of:
Client judges around whether there is the focus that two or more ssid information is identical with mac information, as Fruit has, then point out this focus.
CN201610244719.9A 2016-04-19 2016-04-19 Method for verifying whether garment product is certified product or not through cellphone Pending CN105916146A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610244719.9A CN105916146A (en) 2016-04-19 2016-04-19 Method for verifying whether garment product is certified product or not through cellphone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610244719.9A CN105916146A (en) 2016-04-19 2016-04-19 Method for verifying whether garment product is certified product or not through cellphone

Publications (1)

Publication Number Publication Date
CN105916146A true CN105916146A (en) 2016-08-31

Family

ID=56747421

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610244719.9A Pending CN105916146A (en) 2016-04-19 2016-04-19 Method for verifying whether garment product is certified product or not through cellphone

Country Status (1)

Country Link
CN (1) CN105916146A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246863A (en) * 2013-04-02 2013-08-14 包晗 Identifying system and identifying method for interactive anti-counterfeiting based on identifying codes
CN103391540A (en) * 2012-05-08 2013-11-13 华为终端有限公司 Method and system for generating secret key information, terminal device and access network device
CN104156862A (en) * 2014-08-07 2014-11-19 四川途谷信息技术有限公司 Wechat-platform-based two-dimensional code anti-fake and anti-channel conflict inquiry system and method
CN105188055A (en) * 2015-08-14 2015-12-23 中国联合网络通信集团有限公司 Wireless network access method, wireless access point and server
CN105469260A (en) * 2014-09-01 2016-04-06 上海涌杰信息科技有限公司 Product anti-counterfeiting and anti-bugselling method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103391540A (en) * 2012-05-08 2013-11-13 华为终端有限公司 Method and system for generating secret key information, terminal device and access network device
CN103246863A (en) * 2013-04-02 2013-08-14 包晗 Identifying system and identifying method for interactive anti-counterfeiting based on identifying codes
CN104156862A (en) * 2014-08-07 2014-11-19 四川途谷信息技术有限公司 Wechat-platform-based two-dimensional code anti-fake and anti-channel conflict inquiry system and method
CN105469260A (en) * 2014-09-01 2016-04-06 上海涌杰信息科技有限公司 Product anti-counterfeiting and anti-bugselling method and system
CN105188055A (en) * 2015-08-14 2015-12-23 中国联合网络通信集团有限公司 Wireless network access method, wireless access point and server

Similar Documents

Publication Publication Date Title
TWI634771B (en) Wisdom device and method and device for establishing Bluetooth connection between devices
CN105119939B (en) The cut-in method and device, providing method and device and system of wireless network
CN105516103B (en) Method, device and system for binding intelligent household electrical appliance
US9485261B2 (en) Web security protection method, device and system
US11337067B2 (en) Systems and methods for providing wireless access security by interrogation
CN109982322B (en) Screen projection method, device, system and storage medium
CN105471815A (en) Internet-of-things data security method and Internet-of-things data security device based on security authentication
CN106559785B (en) Authentication method, device and system, access device and terminal
CN108306793B (en) Intelligent device, intelligent home gateway, and method and system for establishing connection
CN105357224A (en) Intelligent household gateway register, remove method and system
CN104837159A (en) OAuth protocol misuse security detection method on Android platform
CN105873034A (en) Safe hot spot information processing method
CN105873035A (en) Safe AP (access point) information processing method
CN105916147A (en) Method for shoe verification through server
CN105761092A (en) Method for performing clothing verification through server
CN106162644A (en) A kind of WiFi system preventing camouflage equipment and safe verification method thereof
CN105916146A (en) Method for verifying whether garment product is certified product or not through cellphone
CN105916148A (en) Garment certified product verification method based on WIFI
CN105871860A (en) Method for quality product verification of shoes based on WIFI
CN106101058A (en) A kind of hot information processing method based on Quick Response Code
CN103745364A (en) Scan code differential scanning-based anti-fake method and scan code differential scanning method
CN105743923A (en) Method for verifying whether shoes are quality products or not by utilizing mobile phone
CN104732400A (en) Commodity authenticity detecting method and system based on two-dimension code
CN106028328A (en) NFC-based hotspot authentication method
CN106028327A (en) Method for realizing hotspot security through authentication server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160831

RJ01 Rejection of invention patent application after publication