CN106529969B - Method and system for checking fake source by NFC - Google Patents

Method and system for checking fake source by NFC Download PDF

Info

Publication number
CN106529969B
CN106529969B CN201610876009.8A CN201610876009A CN106529969B CN 106529969 B CN106529969 B CN 106529969B CN 201610876009 A CN201610876009 A CN 201610876009A CN 106529969 B CN106529969 B CN 106529969B
Authority
CN
China
Prior art keywords
article
public key
random number
mobile terminal
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610876009.8A
Other languages
Chinese (zh)
Other versions
CN106529969A (en
Inventor
顾建良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou TCL Mobile Communication Co Ltd
Original Assignee
Huizhou TCL Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou TCL Mobile Communication Co Ltd filed Critical Huizhou TCL Mobile Communication Co Ltd
Priority to CN201610876009.8A priority Critical patent/CN106529969B/en
Publication of CN106529969A publication Critical patent/CN106529969A/en
Application granted granted Critical
Publication of CN106529969B publication Critical patent/CN106529969B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and a system for checking fake traceability by using NFC, wherein the method comprises the following steps: A. the mobile terminal reads a public key of the NFC label and acquires corresponding basic information of the article in the block chain according to the public key; B. the mobile terminal judges the effectiveness of the NFC label, and acquires corresponding article source information from the block chain when the NFC label is effective. The method determines whether the NFC label article is a fake and fake article according to the comparison of random numbers before encryption and after decryption, and can distinguish the authenticity of the article; when the NFC label is confirmed to be true, the source information of the article is sent to the mobile terminal, so that the information which is not suitable for being completely disclosed of the article can be conveniently found, and the safety of the article information can be ensured.

Description

Method and system for checking fake source by NFC
Technical Field
The invention relates to the technical field of NFC application, in particular to a method and a system for checking fake traceability by utilizing NFC.
Background
Most of existing methods for checking the counterfeit goods or tracing the source of the goods store the information of the goods in the two-dimensional code through the two-dimensional code, and the information of the corresponding goods is obtained by scanning the two-dimensional code, but the process is complex and needs an independent two-dimensional code. Currently, a mobile terminal is usually provided with an NFC function, which is abbreviated as Near Field Communication, namely, a short-range wireless Communication technology. The NFC mobile terminal is a mobile terminal with an NFC module, and the mobile terminal with the NFC module can be applied to a plurality of corresponding applications, but the existing NFC function is too single, so that the value of NFC cannot be fully exerted.
Thus, the prior art has yet to be improved and enhanced.
Disclosure of Invention
In view of the defects of the prior art, the present invention aims to provide a method and a system for tracing by using a two-dimensional code to solve the technical problem that the tracing by using a two-dimensional code is complicated in the prior art.
The technical scheme of the invention is as follows:
a method for checking pseudo tracing source by NFC, comprising the following steps:
A. the mobile terminal reads a public key of the NFC label and acquires corresponding basic information of the article in the block chain according to the public key;
B. the mobile terminal judges the effectiveness of the NFC label, and acquires corresponding article source information from the block chain when the NFC label is effective.
The method for checking the fake source by using the NFC, wherein the step A specifically comprises the following steps:
a1, the mobile terminal with the NFC function reads the public key in the NFC label;
a2, searching corresponding basic information of the article in the block chain according to the obtained public key;
a3, when the basic information of the article corresponding to the public key is found in the block chain, sending the corresponding basic information of the article to the mobile terminal; and ending when the basic information of the article corresponding to the public key does not exist in the block chain.
The method for checking the fake source by using the NFC specifically comprises the following steps:
b1, when the mobile terminal receives the basic information of the article, generating a first random number, storing the first random number in the mobile terminal and sending the first random number to the NFC label;
b2, the NFC label encrypts the first random number and feeds the first random number back to the mobile terminal for decryption to obtain a second random number;
and B3, judging whether the first random number is the same as the second random number, and feeding back corresponding article source information to the mobile terminal according to the judgment result.
The method for checking the fake source by using NFC includes, in step B2:
b21, the NFC label encrypts the first random number according to the private key to generate a key and sends the key to the mobile terminal;
b22, the mobile terminal decrypts the key according to the read public key to obtain a second random number.
The method for checking the fake source by using NFC includes, in step B3:
b31, judging whether the first random number is the same as the second random number;
b32, if the public key is the same as the public key, sending the public key to the blockchain, and sending the source information of the article corresponding to the public key to the mobile terminal by the blockchain;
and B33, when the difference is not equal, ending.
A system for pseudo traceability using NFC, comprising:
the basic information acquisition module is used for reading a public key of the NFC label by the mobile terminal and acquiring corresponding basic information of the article in the block chain according to the public key;
and the fake tracing module is used for judging the effectiveness of the NFC label by the mobile terminal and acquiring corresponding article source information from the block chain when the NFC label is effective.
The system for checking the counterfeit source by using the NFC includes:
the public key acquisition unit is used for reading a public key in the NFC label by the mobile terminal with the NFC function;
the information searching unit is used for searching corresponding basic information of the article in the block chain according to the acquired public key;
the information feedback unit is used for sending the corresponding basic information of the article to the mobile terminal when the basic information of the article corresponding to the public key is found in the block chain; and ending when the basic information of the article corresponding to the public key does not exist in the block chain.
The system for checking the fake tracing source by using the NFC comprises the following specific steps:
the first random number unit is used for generating a first random number when the mobile terminal receives the basic information of the article, storing the first random number in the mobile terminal and sending the first random number to the NFC label;
the second random number unit is used for encrypting the first random number by the NFC tag and feeding the encrypted first random number back to the mobile terminal for decryption to obtain a second random number;
and the judging unit is used for judging whether the first random number is the same as the second random number or not and feeding back corresponding article source information to the mobile terminal according to a judgment result.
The system for checking the pseudo-tracing source by using NFC specifically includes:
the encryption unit is used for encrypting the first random number by the NFC label according to the private key of the NFC label to generate a secret key and sending the secret key to the mobile terminal;
and the decryption unit is used for decrypting the secret key by the mobile terminal according to the read public key to obtain a second random number.
The system for checking the counterfeit source by using the NFC includes:
a comparison unit for judging whether the first random number is the same as the second random number;
the first feedback unit is used for sending the public key to the block chain when the public key is the same as the public key, and the block chain sends the article source information corresponding to the public key to the mobile terminal;
and the second feedback unit is used for ending when the difference is not the same.
Has the advantages that: the invention provides a method and a system for checking a fake tracing source by using NFC, wherein a random number is encrypted by a private key and decrypted by a public key, and whether an NFC label article is a fake and shoddy article is determined according to the comparison of the random number before encryption and the random number after decryption, so that the authenticity of the article can be distinguished; when the NFC label is confirmed to be true, the source information of the article is sent to the mobile terminal, so that the information which is not suitable for being completely disclosed of the article can be conveniently found, and the safety of the article information can be ensured; and when the NFC reads data, only the mobile terminal needs to be close to the NFC label, so that steps required by equipment association are reduced, and user interaction operation is reduced to the maximum extent.
Drawings
Fig. 1 is a flowchart of a method for checking a pseudo trace source by using NFC according to the present invention.
Fig. 2 is a block diagram of a system for checking a fake source by using NFC according to the present invention.
Detailed Description
The invention provides a method and a system for checking fake traceability by using NFC, and the invention is further described in detail below in order to make the purpose, the technical scheme and the effect of the invention clearer and more clear. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention checks whether the random number before encryption and the random number after decryption are the same or not through the ways of private key encryption and public key decryption, and carries out the identification of the authenticity of the NFC label; and after the NFC label is true, tracing the source of the article, and sending the source information of the article to the mobile terminal, so that a user can obtain the source information of the article. As shown in fig. 1, a flowchart of a method for checking a fake source by NFC according to the present invention includes:
s1, the mobile terminal reads the public key of the NFC label and obtains corresponding basic information of the article in the block chain according to the public key;
s2, the mobile terminal judges the effectiveness of the NFC label, and acquires corresponding source information of the article from the block chain when the NFC label is effective.
In this embodiment, the mobile terminal performs the subsequent steps after reading the public key of the NFC tag, so that the step S1 is preceded by the step S0: a block chain is set. The block chain is a data node, which can be any computer, and the public key and the corresponding article information are stored in the block chain. The article information comprises article basic information and article source information. The basic information of the article comprises the name, the manufacturer, the model and the production date of the article; the source information of the article comprises information which is not suitable for being completely disclosed by the production process, the supplier and the like of the article.
Nfc (near Field communication) is a short-range high-frequency radio technology, and combines functions of an inductive card reader, an inductive card and a point-to-point on a single chip, so as to perform identification and data exchange with a compatible device within a short distance, and then the step S1 specifically includes:
and 11, reading the public key in the NFC label by the mobile terminal with the NFC function.
And (3) enabling the mobile terminal with the NFC function to be close to the NFC label, and reading the public key in the NFC label by the mobile terminal. The NFC label comprises a pair of public keys and a private key, and the public keys and the private key correspond to one item information. The article information comprises article basic information and article source information. The public key and the private key are asymmetric encryption algorithms, the private key is responsible for encryption, and the public key is responsible for decryption.
And step 12, searching corresponding basic information of the article in the block chain according to the obtained public key.
The public key and the article information are stored in the block chain in a one-to-one correspondence mode, and the corresponding article basic information can be found through the read public key.
Step 13, when the basic information of the article corresponding to the public key is found in the block chain, sending the corresponding basic information of the article to the mobile terminal; and ending when the basic information of the article corresponding to the public key does not exist in the block chain.
And only the article information of the anti-counterfeiting label and the corresponding public key are stored in the block chain. If the article is a fake and shoddy article, the article information corresponding to the public key does not exist in the block chain, and the corresponding article information cannot be found in the block chain through the public key read by the NFC label. If the read public key can find the basic information of the article, the article information needs to be sent to the mobile terminal for further checking. The two-step fake checking process is provided, so that the fake checking process is more reliable, and the problem that the article information is disclosed because the false NFC label cannot be well identified when the false NFC label contains a true public key is avoided. If the corresponding article information cannot be found, the NFC label can be judged to be false, and the fake tracing process is directly finished.
When the NFC tag is further checked for counterfeit, the first random number needs to be compared with the second random number for judgment, step S2 is to generate the first random number and the second random number, and the comparison between the first random number and the second random number is described in detail, where the step S2 specifically includes:
and 21, when the mobile terminal receives the basic information of the article, generating a first random number, storing the first random number in the mobile terminal and sending the first random number to the NFC tag.
When the mobile terminal receives the basic information of the article, the mobile terminal is triggered to generate a random number. After the first random number signal is generated, the first random number is firstly stored, and the stored first random number is compared with the second random number generated after decryption. The first random number is also to be transmitted to the NFC tag, and the transmitted first random number is an initial value for performing the checking. The generation of the random numbers is completely random and may be achieved by some algorithms, such as elliptic curve cryptography, RSA algorithms, etc.
And step 22, the NFC label encrypts the first random number and feeds the first random number back to the mobile terminal for decryption to obtain a second random number.
After the first random number is sent to the NFC label, the NFC label encrypts the first random number according to a private key of the NFC label to generate a secret key and sends the secret key to the mobile terminal; and the mobile terminal decrypts the secret key according to the read public key to obtain a second random number.
And step 23, judging whether the first random number is the same as the second random number, and feeding back corresponding article source information to the mobile terminal according to the judgment result.
The step 23 of generating the second random number based on the first random number, which must be compared with the first random number to determine whether the second random number is true or false, specifically includes:
231, judging whether the first random number is the same as the second random number;
as described above, the first random number and the second random number are generated as numerical values, and when comparing, the numerical values may be compared by subtraction or division, or other methods for comparing whether the numerical values are the same. When the subtraction is used for comparison, the random number difference = second random number — first random number. When the difference value of the random numbers is equal to zero, the random numbers and the random numbers are the same; when the difference value of the random numbers is not equal to zero, the random numbers are different from zero. When the comparison is performed by division, the random number ratio = second random number/first random number. When the random number ratio is equal to 1, the random number ratio is the same as the random number ratio; when the random number ratio is not equal to 1, the two are different.
And step 232, if the public key is the same as the source information, sending the public key to the block chain, and sending the source information of the article corresponding to the public key to the mobile terminal by the block chain.
When the second random number is the same as the first random number, the NFC tag is true, and at the moment, reliable article source information can be sent to the mobile terminal, namely, the tracing function of the article information is realized, so that a user can conveniently check the article source information. The first random number is the same as the second random number, and the successfully decrypted public key is sent to the block chain, so that the corresponding basic information of the article can be found in the block chain through the public key, and meanwhile, the corresponding source information of the article can also be found. And sending the searched source information of the article to the mobile terminal, or sending all article information including the basic information of the article and the source information of the article to the mobile terminal. The user traces the source of the article by viewing the article information.
And step 233, ending when the two are different.
When the second random number is different from the first random number, the NFC tag is false, the article fake-checking and source tracing process is ended, and the article source information is not read.
Based on the method for checking the pseudo trace source by using the NFC provided in the foregoing embodiment, the present invention further provides a system for checking the pseudo trace source by using the NFC, as shown in fig. 2, where the system includes:
a basic information obtaining module 100, configured to read a public key of an NFC tag by a mobile terminal, and obtain corresponding basic information of an article in a block chain according to the public key;
and the fake tracing module 200 is used for the mobile terminal to judge the effectiveness of the NFC tag and obtain corresponding article source information from the block chain when the NFC tag is effective.
The basic information acquiring module 100 specifically includes:
a public key obtaining unit 101, configured to read a public key in an NFC tag by a mobile terminal having an NFC function;
the information searching unit 102 is configured to search corresponding basic information of the article in the block chain according to the obtained public key;
the information feedback unit 103 is configured to send the corresponding basic article information to the mobile terminal when the basic article information corresponding to the public key is found in the block chain; and ending when the basic information of the article corresponding to the public key does not exist in the block chain.
The pseudo-tracing module 200 specifically includes:
the first random number unit 201 is used for generating a first random number when the mobile terminal receives the basic information of the article, storing the first random number in the mobile terminal and sending the first random number to the NFC tag;
a second random number unit 202, configured to encrypt the first random number and then feed back the encrypted first random number to the mobile terminal for decryption by the NFC tag, to obtain a second random number;
the judging unit 203 is configured to judge whether the first random number is the same as the second random number, and feed back corresponding information to the mobile terminal according to a judgment result.
The second random number unit 202 specifically includes:
the encryption unit is used for encrypting the first random number according to the private key of the NFC label to generate a secret key and sending the secret key to the mobile terminal;
and the decryption unit is used for decrypting the secret key by the mobile terminal according to the read public key to obtain a second random number.
The determining unit 203 specifically includes:
a comparison unit for judging whether the first random number is the same as the second random number;
the first feedback unit is used for sending the successfully decrypted public key to the block chain when the public key is the same as the public key, and the block chain sends the source information of the article corresponding to the public key to the mobile terminal;
and the second feedback unit is used for ending when the difference is not the same.
In summary, according to the method and system for checking the counterfeit source by using the NFC, disclosed by the invention, the random number is encrypted by the private key and decrypted by the public key, and whether the NFC tag article is a counterfeit or shoddy article is determined according to the comparison between the random number before encryption and the random number after decryption, so that the authenticity of the article can be distinguished; when the NFC label is confirmed to be true, the source information of the article is sent to the mobile terminal, so that the information which is not suitable for being completely disclosed of the article can be conveniently found, and the safety of the article information can be ensured. And when the NFC reads data, only the mobile terminal needs to be close to the NFC label, so that steps required by equipment association are reduced, and user interaction operation is reduced to the maximum extent.
The division of the functional modules is only used for illustration, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the functions may be divided into different functional modules to complete all or part of the functions described above.
It will be understood by those skilled in the art that all or part of the processes in the methods of the embodiments described above may be implemented by using a computer (mobile terminal) program to instruct related hardware, where the computer (mobile terminal) program may be stored in a computer (mobile terminal) -readable storage medium, and when the computer (mobile terminal) program is executed, the processes may include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a Random Access Memory (RAM), or the like.
It is to be understood that the invention is not limited to the examples described above, but that modifications and variations may be effected thereto by those of ordinary skill in the art in light of the foregoing description, and that all such modifications and variations are intended to be within the scope of the invention as defined by the appended claims.

Claims (6)

1. A method for checking pseudo tracing source by NFC is characterized by comprising the following steps:
A. the mobile terminal reads a public key of the NFC label and acquires corresponding basic information of the article in the block chain according to the public key;
the step A specifically comprises the following steps:
a1, the mobile terminal with the NFC function reads the public key in the NFC label;
a2, searching corresponding basic information of the article in the block chain according to the obtained public key;
a3, when the basic information of the article corresponding to the public key is found in the block chain, sending the corresponding basic information of the article to the mobile terminal; when the basic information of the article corresponding to the public key does not exist in the block chain, ending the process;
B. the mobile terminal judges the effectiveness of the NFC label, and acquires corresponding article source information from the block chain when the NFC label is effective;
the step B specifically comprises the following steps:
b1, when the mobile terminal receives the basic information of the article, generating a first random number, storing the first random number in the mobile terminal and sending the first random number to the NFC label;
b2, the NFC label encrypts the first random number and feeds the first random number back to the mobile terminal for decryption to obtain a second random number;
b3, judging whether the first random number is the same as the second random number, and feeding back corresponding article source information to the mobile terminal according to the judgment result;
the method comprises the steps that only article information which is an anti-counterfeiting label and a corresponding public key are stored in a block chain, if an article is a fake and shoddy article, article information which does not correspond to the public key is not stored in the block chain, the corresponding article information cannot be found in the block chain through the public key read by the NFC label, if basic article information can be found through the read public key, the article information needs to be sent to a mobile terminal for further fake checking, a two-step fake checking process is provided, the fake checking process is more reliable, the problem that when a fake NFC label contains a true public key, the article information cannot be well identified and disclosed is avoided, if the corresponding article information cannot be found, the NFC label is judged to be fake, and the fake tracing process is directly finished.
2. The method for checking the pseudo tracing source by using the NFC according to claim 1, wherein the step B2 specifically includes:
b21, the NFC label encrypts the first random number according to the private key to generate a key and sends the key to the mobile terminal;
b22, the mobile terminal decrypts the key according to the read public key to obtain a second random number.
3. The method for checking the pseudo tracing source by using the NFC according to claim 1, wherein the step B3 specifically includes:
b31, judging whether the first random number is the same as the second random number;
b32, if the public key is the same as the public key, sending the public key to the blockchain, and sending the source information of the article corresponding to the public key to the mobile terminal by the blockchain;
and B33, when the difference is not equal, ending.
4. A system for pseudo traceability using NFC, comprising:
the basic information acquisition module is used for reading a public key of the NFC label by the mobile terminal and acquiring corresponding basic information of the article in the block chain according to the public key;
the basic information acquisition module specifically includes:
the public key acquisition unit is used for reading a public key in the NFC label by the mobile terminal with the NFC function;
the information searching unit is used for searching corresponding basic information of the article in the block chain according to the acquired public key;
the information feedback unit is used for sending the corresponding basic information of the article to the mobile terminal when the basic information of the article corresponding to the public key is found in the block chain; when the basic information of the article corresponding to the public key does not exist in the block chain, ending the process;
the fake tracing module is used for judging the effectiveness of the NFC label by the mobile terminal and acquiring corresponding article source information from the block chain when the NFC label is effective;
the fake tracing module specifically comprises:
the first random number unit is used for generating a first random number when the mobile terminal receives the basic information of the article, storing the first random number in the mobile terminal and sending the first random number to the NFC label;
the second random number unit is used for encrypting the first random number by the NFC tag and feeding the encrypted first random number back to the mobile terminal for decryption to obtain a second random number;
the judging unit is used for judging whether the first random number is the same as the second random number or not and feeding back corresponding article source information to the mobile terminal according to a judging result;
the method comprises the steps that only article information which is an anti-counterfeiting label and a corresponding public key are stored in a block chain, if an article is a fake and shoddy article, article information which does not correspond to the public key is not stored in the block chain, the corresponding article information cannot be found in the block chain through the public key read by the NFC label, if basic article information can be found through the read public key, the article information needs to be sent to a mobile terminal for further fake checking, a two-step fake checking process is provided, the fake checking process is more reliable, the problem that when a fake NFC label contains a true public key, the article information cannot be well identified and disclosed is avoided, if the corresponding article information cannot be found, the NFC label is judged to be fake, and the fake tracing process is directly finished.
5. The system for checking the pseudo-tracing source by using the NFC according to claim 4, wherein the second random number unit specifically includes:
the encryption unit is used for encrypting the first random number by the NFC label according to the private key of the NFC label to generate a secret key and sending the secret key to the mobile terminal;
and the decryption unit is used for decrypting the secret key by the mobile terminal according to the read public key to obtain a second random number.
6. The system for checking the counterfeit source by using the NFC according to claim 4, wherein the determining unit specifically includes: a comparison unit for judging whether the first random number is the same as the second random number;
the first feedback unit is used for sending the public key to the block chain when the public key is the same as the public key, and the block chain sends the article source information corresponding to the public key to the mobile terminal;
and the second feedback unit is used for ending when the difference is not the same.
CN201610876009.8A 2016-10-08 2016-10-08 Method and system for checking fake source by NFC Active CN106529969B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610876009.8A CN106529969B (en) 2016-10-08 2016-10-08 Method and system for checking fake source by NFC

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610876009.8A CN106529969B (en) 2016-10-08 2016-10-08 Method and system for checking fake source by NFC

Publications (2)

Publication Number Publication Date
CN106529969A CN106529969A (en) 2017-03-22
CN106529969B true CN106529969B (en) 2020-11-13

Family

ID=58333034

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610876009.8A Active CN106529969B (en) 2016-10-08 2016-10-08 Method and system for checking fake source by NFC

Country Status (1)

Country Link
CN (1) CN106529969B (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107122938A (en) * 2017-04-27 2017-09-01 电子科技大学 A kind of freight logistics scheduling and tracking based on block chain
CN107133532A (en) * 2017-05-31 2017-09-05 无锡井通网络科技有限公司 A kind of block chain logistics based on NFC is traced to the source tracking method for anti-counterfeit
CN107274136A (en) * 2017-07-11 2017-10-20 西安工业大学 A kind of product is traced to the source information protecting method
CN111865586B (en) 2017-11-23 2023-01-10 创新先进技术有限公司 Method and device for encrypting product information
CN109961294A (en) * 2017-12-21 2019-07-02 深圳市优权天成科技有限公司 Commodity based on block chain are really weighed and ownership transfer method and system
CN108197952A (en) * 2017-12-28 2018-06-22 上海唯链信息科技有限公司 A kind of anti-fake and traceability system of the red wine based on block chain technology
CN108460605B (en) * 2018-02-09 2021-01-15 深圳市优权天成科技有限公司 Block chain-based tracing and anti-counterfeiting method and system for paper artwork
CN108376336B (en) * 2018-02-11 2021-02-05 莫冰 RFID tag chip suitable for block chain application and control method thereof
CN108537556A (en) * 2018-03-13 2018-09-14 深圳信息职业技术学院 A kind of multidate information method for anti-counterfeit based on block chain and NFC chip
CN108737374B (en) * 2018-04-12 2021-11-09 三维通信股份有限公司 Privacy protection method for data storage in block chain
CN108805585B (en) * 2018-05-28 2022-07-05 广州中科易德科技有限公司 Distributed commodity data storage system based on block chain, circulation and tracing method
CN109040781B (en) * 2018-08-27 2021-04-30 北京京东尚科信息技术有限公司 Video authentication method, device, system, electronic equipment and readable medium
CN109345256B (en) * 2018-09-14 2019-11-08 北京清大智信科技有限公司 A kind of false proof device of the credible transaction of collectibles, method and system
WO2020056597A1 (en) * 2018-09-18 2020-03-26 王健 Item identity management method, terminal, micro-processing unit, identification device and system
CN109544182B (en) * 2018-11-20 2021-05-14 孟凡富 Product anti-counterfeiting verification method and system
CN111047331A (en) * 2019-11-12 2020-04-21 武汉金运激光股份有限公司 Commodity anti-counterfeiting tracing method and system based on block chain and NFC chip

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184593A (en) * 2011-02-25 2011-09-14 惠州Tcl移动通信有限公司 One-card system based on mobile communication terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8374916B2 (en) * 2009-10-27 2013-02-12 At&T Mobility Ii Llc Secure mobile-based financial transactions
US20160012498A1 (en) * 2012-09-12 2016-01-14 Chachi Prasad System and method for identifying, verifying and communicating about oem products using unique identifiers
CN104281954B (en) * 2014-04-30 2017-11-24 上海高研明鉴信息技术有限公司 Antifake method for products
CN105991607B (en) * 2015-02-28 2019-03-05 北京天威诚信电子商务服务有限公司 A kind of Network Access Method and device
CN105915541A (en) * 2016-06-07 2016-08-31 惠州Tcl移动通信有限公司 Mobile terminal password preservation and recovery processing method based on NFC and system thereof

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184593A (en) * 2011-02-25 2011-09-14 惠州Tcl移动通信有限公司 One-card system based on mobile communication terminal

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
RFID systems integrated OTP security authentication design;Chao-Hsi Huang 等;《2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference》;20140106;全文 *
一种基于移动终端的可信消息传输方案设计;梁颖升;《信息网络安全》;20150929;第2015卷(第9期);全文 *

Also Published As

Publication number Publication date
CN106529969A (en) 2017-03-22

Similar Documents

Publication Publication Date Title
CN106529969B (en) Method and system for checking fake source by NFC
CN102831529B (en) A kind of commodity information identification method based on radio frequency and system
CN107231231B (en) Method and system for terminal equipment to safely access Internet of things
CN102855574A (en) Method and system for identifying commodity information based on NFC (Near Field Communication)
CN202870900U (en) NFC (Near Field Communication)-based commodity information identification system
CN103150655A (en) Public key infrastructure (PKI)-based radio frequency identification (RFID) anti-counterfeiting system
CN110598433B (en) Block chain-based anti-fake information processing method and device
US12003642B2 (en) System and method for authentication using non-fungible tokens
US9054881B2 (en) Radio frequency identification (RFID) tag and interrogator for supporting normal mode and secure mode, and operation method thereof
CN110969445B (en) NFC-based anti-counterfeiting method
CN113780495B (en) NFC tag data writing method and terminal
CN113792561B (en) NFC electronic tag verification method and terminal
CN202870898U (en) Radio frequency-based commodity information identification system
CN102970676A (en) Method for processing original data, internet of thing system and terminal
CN108082723B (en) Anti-counterfeiting bottle cap based on CPU (Central processing Unit) password chip and working method thereof
KR100817222B1 (en) Method for encrypting/decrypting electronic product code and rfid system using the same
CN104424568A (en) Authentication false-proof traceability system employing circuit core chip ID number as identification
CN102404118A (en) Object certification method based on short-distance communication terminal
CN102867260A (en) Bluetooth-based commodity information identification method and system
CN102662874A (en) Double-interface encryption memory card and management method and system of data in double-interface encryption memory card
US10511946B2 (en) Dynamic secure messaging
CN111448815A (en) Secure RFID tag identification
CN110533128B (en) Encryption-based anti-counterfeiting traceability data processing method, device, system and medium
CN117131552A (en) Chip operation method and device, electronic equipment and storage medium
CN104883260B (en) Certificate information processing and verification method, processing terminal and authentication server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant