CN107483427A - A kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips - Google Patents

A kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips Download PDF

Info

Publication number
CN107483427A
CN107483427A CN201710675116.9A CN201710675116A CN107483427A CN 107483427 A CN107483427 A CN 107483427A CN 201710675116 A CN201710675116 A CN 201710675116A CN 107483427 A CN107483427 A CN 107483427A
Authority
CN
China
Prior art keywords
password
server
information
certification
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710675116.9A
Other languages
Chinese (zh)
Other versions
CN107483427B (en
Inventor
徐舟
樊彦龙
周富豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Guan Lin Ring Technology Co Ltd
Original Assignee
Beijing Guan Lin Ring Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Guan Lin Ring Technology Co Ltd filed Critical Beijing Guan Lin Ring Technology Co Ltd
Priority to CN201710675116.9A priority Critical patent/CN107483427B/en
Publication of CN107483427A publication Critical patent/CN107483427A/en
Application granted granted Critical
Publication of CN107483427B publication Critical patent/CN107483427B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B5/00Near-field transmission systems, e.g. inductive or capacitive transmission systems
    • H04B5/70Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes
    • H04B5/77Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for interrogation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Power Engineering (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of self-reinforcing anti-fake scheme design based on Ntag21X family chips, there is provided two kinds of anti-fake certificate patterns:Regular authentication and enhancing certification.Under regular authentication pattern, the mode parsed using cloud server to chip information is authenticated;Strengthen under certification mode, cloud server uses the authentication mode of one-time pad with reference to mobile terminal on the basis of chip information is parsed.Authentication phase, mobile terminal send the chip data read to high in the clouds, requesting cooperative certification;After high in the clouds receives data, according to actual conditions, decide whether to enable enhanced anti-fake certificate, the present invention effectively reduces the risk that encryption chip is replicated, improve the security of anti-fake certificate by introducing self-reinforcing type anti-counterfeiting design.

Description

A kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips
Technical field
The present invention relates to communication technology application field, and in particular to carries out the false proof conceptual design traced to the source using NFC technique.
Background technology
With the development of the social economy, many illegal businessmans by interests trend, carry out counterfeit to brand article, directly lead Cause in the market commercial quality very different, it is hard to tell whether it is true or false.At present, the most commodity counterfeit prevention means of in the market still concentrate on code inquiry False proof, optical material is false proof to wait traditional approach, but traditional counterfeit protection measures have the defects of intrinsic, as code inquires about false proof step Rapid cumbersome, customer inquiries rate is relatively low;The progress of imitation technology also causes the reliability of optical material anti-counterfeiting technology to substantially reduce.
In recent years, NFC technique is gradually applied to every field, in particular by the promotion of technology of Internet of things, NFC technique Even more become the focus of electronic information circle, and it is false proof trace to the source be exactly NFC technique application a key areas.Compared to traditional Counterfeit protection measures, NFC is false proof to have unique advantage, and its unique No. UID is previously written by chip production producer and can not be changed, High degree reduces the risk that chip is copied in batches.
The domestic Patent No. CN201120176321.9 Antiforge system based on NFC mobile terminals, by electronic tag, NFC Mobile terminal and anti-counterfeit server three parts are formed, and built-in reading code radio-frequency module, reads NFC cores in NFC mobile terminal Identification information in piece, chip identification information is then reached by cloud server by data network and parsed, is realized false proof Trace to the source function.However, the data in NFC chip are open readable, any digital independent for meeting communication protocol is legal , therefore, under certain condition, the data in chip can be replicated, even if can not know the volume of Data within the chip Code or cipher mode.Specifically replicating flow is:All information in chip are read using the terminal with NFC read functions and are protected Deposit, production clone chip, information is completely written in blank chip, completes the duplication of chip again.In consideration of it, moved based on NFC The Antiforge system of moved end still has security risk.
Similar to the Antiforge system based on NFC mobile terminals, domestic Patent No. CN201220005393.9 one kind is based on The Comodity anti-fake system of NFC mobile phone, by commodity, RFID, there is the mobile phone of NFC function, Benefits in Mobile Phone Communication Services system And the most of composition of background management system five.RFID label tag is attached on commodity, background management system storage and management business The anti-counterfeiting information of product.The mobile phone for possessing NFC function obtains chip information, and information is reached into back-stage management using Communications service network System carries out genuine/counterfeit discriminating.But the Antiforge system still enough not can effectively solve the problem that the problem of RFID label tag is replicated, once Label is replicated, and the system just can not effectively differentiate the true and false of commodity, the risk of " it is true to recognize puppet " be present.
In summary, the simple information read using terminal device in RFID chip, is then transmitted back to high in the clouds parsing simultaneously The conceptual design of certification is unsafe, can not successfully manage the problem of chip is replicated, even if information is encryption in chip.
The content of the invention
The technical problem to be solved in the present invention is to provide a kind of false proof skill of the self-reinforcing type based on Ntag21X family chips Art, to solve the problems, such as to mention in background technology.
To achieve the above object, the present invention provides following technical scheme:
A kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips, is comprised the steps of:
A, product and encryption information are write into Ntag21X chips, while by corresponding product information typing high in the clouds data Storehouse, complete the initialization of system;
B, when certification is initiated in mobile terminal, chip UID information is read from Ntag213 chips, and by data according to certain Coded system is back to cloud server, and request server carries out collaboration certification;
What C, cloud server received mobile terminal asks summed data, and product information is authenticated, and by authentication information It is back to mobile terminal;
D, after the mobile-terminated authentication information for receiving server, authentication information is parsed, and final information is returned It is back to server;
E, server receives the information that mobile terminal is transmitted again, and is parsed.
Preferred scheme as the present invention:The step C is specifically included:
1. server extracts chip UID plain codes and the UID passwords of encryption from the information received, UID ciphertexts are carried out Decryption, chip UID is inquired about from database, if inquiring specified UID, be transferred in next step, if inquiry is less than certification is lost Lose information and be back to mobile terminal, Server Authentication process terminates;
2. the UID that server inquires from database is corresponded to and decruption key is obtained in row, and UID passwords are solved It is close, while be compared with UID plain codes, check whether consistent.If consistent, it is transferred in next step, if inconsistent, certification is lost Lose information and be back to mobile terminal, Server Authentication process terminates;
3. according to the UID rows inquired, the flag bit in corresponding enhancing field is found.If flag bit is effective, that is, enable Strengthen certification, be transferred to step 4., if flag bit is invalid, i.e., do not enable enhancing certification, the successful information of certification is back to shifting Moved end, Server Authentication process terminate;
4. in the case of flag bit is effective, enhancing authentication mechanism is enabled, chip UID is inquired and is expert at corresponding cipher word Password in section, the encryption key in encryption key field, the decruption key in decruption key field and generation cipher key field In generation key chip in cipher decoding mode, as shown in formula (I)
Po=D (password, decryption) (I)
In formula (I), PoFor real chip password, password is the data of password field, and decryption is decryption Key, D () are decipherment algorithm;
After server calculates chip password, in Old Password PoOn the basis of generate new chip password, such as formula (II) institute Show
In formula (II), PnFor newly-generated password, generator is generation key,For mould 2 plus computing;
After new password generates, server is by Po, PnAnd enhancing authentication information is back to mobile terminal, while wait shifting Moved end information back.
Preferred scheme as the present invention:After the mobile-terminated information for receiving server and passing back of a, authentication information is entered first Row parsing, is then judged, if such as enhancing certification, is transferred to step b, if non-reinforcing certification, and authentication information is to recognize Demonstrate,prove successfully, mobile terminal displaying authentication success message, Product Certification terminates;If non-reinforcing certification, and authentication information is Authentification failure, mobile terminal displaying authentication failure message, Product Certification terminate;
After b mobile terminals parse enhancing authentication information, the true and false of product is determined whether, returned using server Po, it is P to attempt to reset chip passwordn, and monitor chip response.If resetting password failure, mobile terminal displaying authentification failure letter Breath, and authentication failure message is sent to server end;If resetting password success, mobile terminal sends information to server End, and certification success is shown, and authentication success message is sent to server end.
Preferred scheme as the present invention:The step E is specifically included:Server receives the letter that mobile terminal is transmitted again Breath, and parsed;If resetting password failure, server is without any processing, and Product Certification terminates, if resetting close Code success, server is by PnIt is encrypted, generates new chip password, as shown in formula (III)
Password'=E (Pn,encryption) (Ⅲ)
In formula (III), password' is new storage password, and encryption is the encryption key of step 4. middle acquisition, E () is AES;After new storage password generation, database is written into, replacement step is 4. close in middle password field Code, Product Certification terminate.
Compared with prior art, the beneficial effects of the invention are as follows:The present invention provides two kinds of anti-fake certificate patterns:Regular authentication With strengthening certification.Under regular authentication pattern, the mode parsed using cloud server to chip information is authenticated;Enhancing Under certification mode, cloud server uses the authentication mode of one-time pad with reference to mobile terminal on the basis of chip information is parsed. Authentication phase, mobile terminal send the chip data read to high in the clouds, requesting cooperative certification;After high in the clouds receives data, root According to actual conditions, decide whether to enable enhanced anti-fake certificate, if do not enabled, differentiate that result is back to mobile terminal by pre-, such as open With high in the clouds generates new chip password, will differentiate result in advance, chip is new, Old Password is back to mobile terminal in the lump;Mobile terminal according to Receive data to judge whether to enable enhanced anti-fake certificate, if do not enabled, displaying anticipation result, such as enable, it is old using chip Password, chip password is arranged to new password, if it succeeds, by certification, if it fails, then not by certification, finally Authentication result is back to high in the clouds.The present invention effectively reduces encryption chip and answered by introducing self-reinforcing type anti-counterfeiting design The risk of system, improve the security of anti-fake certificate.
Brief description of the drawings
Fig. 1 is self-reinforcing type anti-fake scheme design cycle block diagram of the present invention;
Fig. 2 is Ntag213 Data within the chip institutional framework schematic diagrames;
Fig. 3 is high in the clouds identifying procedure block diagram.
Fig. 4 is mobile terminal identifying procedure block diagram.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
Fig. 1-4 are referred to, a kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips, are comprised the following steps:
(1) product and encryption information are write into Ntag21X chips, while by corresponding product information typing high in the clouds data Storehouse, the initialization of system is completed, red boxes include the initialization section that part is system in Fig. 1, and its detailed process is as follows;
(1.1) key workout system is mainly for generation of encryption key required in verification process, decruption key and life Into key, chip password is initialized, as shown in formula (IV)
[encryption,decryption,generator,Pi]=KeySys () (IV)
In formula (IV), encryption, decryption, generator, PiRepresent encryption key respectively, decruption key, Generate key and initialization chip password.No. UID of chip is encrypted using encryption key, cipher mode such as formula (V) institute Show
UID'=E (UID, encryption) (V)
In formula (V), UID' is the chip UID after encryption, and encryption is that the encryption of key workout system generation is close Key, E () are AES;
(1.2) as shown in Fig. 2 by taking Ntag213 chip internal storage organizations as an example, by the UID UID' after encryption, initially Change password PiBeing respectively written into chip, (UID' storage address index is page 4,5,6, PiStorage address index is page 43), set simultaneously Chip reads for exploitation, and write-in encryption, Ntag213 chips are to write in the case where not obtaining cipher authentication in this mode , and cipher leaf content can not be read, and security is higher.
(1.3) to PiIt is encrypted, obtains P', shown in encryption method such as formula (V), by UID, P', encryption, Decryption, generator are saved in database after corresponding field respectively, and system initialization is completed;
(2) Fig. 1 right half parts are overall identifying procedure.When certification is initiated in mobile terminal, read from Ntag213 chips The two information of UID, UID', and data are back to cloud server according to certain coded system, request server is assisted Same certification;
(3) what cloud server received mobile terminal asks summed data, and product information is authenticated, and by authentication information It is back to mobile terminal;
Its process is specific as follows:
(3.1) server authentication process chart is illustrated in figure 3, server extracts chip from the information received UID and UID', from database inquire about chip UID, if inquiring specified UID, be transferred to step (3.2), if inquiry less than, Authentication failure message is back to mobile terminal, Server Authentication process terminates;
(3.2) UID that server inquires from database corresponds to acquisition decruption key decryption in row, and right UID' is decrypted, shown in decryption method such as formula (VI)
UIDd=D (UID', decryption) (VI)
In formula (VI), D () is decipherment algorithm, UIDdFor the chip serial number after decryption, and compared in plain text with UID It is right, check whether consistent.If consistent, step (3.3) is transferred to, if inconsistent, authentication failure message is back to mobile terminal, Server Authentication process terminates;
(3.3) according to the UID rows inquired, the flag bit in corresponding enhancing field is found.If flag bit is effective, that is, open With enhancing certification, step (3.4) is transferred to, if flag bit is invalid, i.e., does not enable enhancing certification, the successful information of certification is returned To mobile terminal, Server Authentication process terminates;
(3.4) in the case of flag bit is effective, enable enhancing authentication mechanism, inquire chip UID be expert at it is corresponding close The encryption key encryption in password P', encryption key field, the decruption key in decruption key field in code field Generation key generator in decryption and generation cipher key field, the cipher decoding mode in chip, such as formula (VII) It is shown
Po=D (password, decryption) (VII)
In formula (VII), PoFor real chip password, password is the data of password field, and decryption is decryption Key, D () are decipherment algorithm;
After server parses chip password, in Old Password PoOn the basis of generate new chip password, such as formula (VIII) institute Show
In formula (VIII), PnFor newly-generated password, generator is generation key,For mould 2 plus computing;
After new password generates, server is by Po, PnAnd enhancing authentication information is back to mobile terminal, while wait shifting Moved end information back;
(4) after the mobile-terminated authentication information for receiving server, authentication information is parsed, and final information is returned It is back to server.
Its process is specific as follows:
(4.1) it is illustrated in figure 4 mobile terminal authentication processing flow chart, after the mobile-terminated information for receiving server and passing back, Authentication information is parsed first, is then judged, if such as enhancing certification, step (4.2) is transferred to, if non-reinforcing recognize Card, and authentication information is certification success, and mobile terminal shows authentication success message, and Product Certification terminates;It is if non-reinforcing Certification, and authentication information is authentification failure, and mobile terminal shows authentication failure message, and Product Certification terminates;
(4.2) after mobile terminal parses enhancing authentication information, the true and false of product is determined whether, utilizes server The chip password P of returno, it is P to attempt to reset chip passwordn, and monitor chip response.If reset password failure, Ntag213 The coding corresponding to authorization failure, mobile terminal displaying authentication failure message can be then returned, and authentication failure message is sent to clothes Business device end;If resetting password success, Ntag213 can then return to the content that storage address indexes preceding 2 bytes in page 44, displaying Certification success, and authentication success message is sent to server end, as shown in figure 4, blue Blocked portion is final authentication result;
(5) server receives the information that mobile terminal is transmitted again, and is parsed;If reset password failure, service Device is without any processing, and Product Certification terminates, if resetting password success, server is by PnIt is encrypted, generates new Chip password, as shown in formula (VIII)
P'=E (Pn,encryption) (Ⅷ)
In formula (VIII), P' is the chip password that newly stores, and encryption is the encryption key obtained in step (1.1), E () is AES;
After new storage password generation, database is written into, the chip code data in replacement data storehouse.

Claims (4)

1. a kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips, it is characterised in that comprise the steps of:
A, product and encryption information are write into Ntag21X chips, while by corresponding product information typing cloud database, it is complete Into the initialization of system;
B, when certification is initiated in mobile terminal, chip UID information is read from Ntag213 chips, and by data according to certain coding Mode is back to cloud server, and request server carries out collaboration certification;
What C, cloud server received mobile terminal asks summed data, product information is authenticated, and authentication information is returned To mobile terminal;
D, after the mobile-terminated authentication information for receiving server, authentication information is parsed, and final information is back to Server;
E, server receives the information that mobile terminal is transmitted again, and is parsed.
2. a kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips according to claim 1, its feature exist In the step C is specifically included:
1. server extracts chip UID plain codes and the UID passwords of encryption from the information received, UID ciphertexts are decrypted, Chip UID is inquired about from database, if inquiring specified UID, is transferred in next step, if inquiry is less than authentification failure is believed Breath is back to mobile terminal, and Server Authentication process terminates;
2. the UID that server inquires from database is corresponded to and decruption key is obtained in row, and UID passwords are decrypted, together When be compared with UID plain codes, check whether consistent.If consistent, it is transferred in next step, if inconsistent, authentification failure is believed Breath is back to mobile terminal, and Server Authentication process terminates;
3. according to the UID rows inquired, the flag bit in corresponding enhancing field is found.If flag bit is effective, that is, enable enhancing Certification, it is transferred to step 4., if flag bit is invalid, i.e., does not enable enhancing certification, the successful information of certification is back to mobile terminal, Server Authentication process terminates;
4. in the case of flag bit is effective, enhancing authentication mechanism is enabled, chip UID is inquired and is expert in corresponding password field Password, the encryption key in encryption key field, the decruption key in decruption key field and generation cipher key field in The cipher decoding mode in key chip is generated, as shown in formula (I)
Po=D (password, decryption) (I)
In formula (I), PoFor real chip password, password is the data of password field, and decryption is decruption key, D () is decipherment algorithm;
After server calculates chip password, in Old Password PoOn the basis of generate new chip password, as shown in formula (II)
<mrow> <msub> <mi>P</mi> <mi>n</mi> </msub> <mo>=</mo> <msub> <mi>P</mi> <mi>o</mi> </msub> <mo>&amp;CirclePlus;</mo> <mi>g</mi> <mi>e</mi> <mi>n</mi> <mi>e</mi> <mi>r</mi> <mi>a</mi> <mi>t</mi> <mi>o</mi> <mi>r</mi> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mi>I</mi> <mi>I</mi> <mo>)</mo> </mrow> </mrow>
In formula (II), PnFor newly-generated password, generator is generation key,For mould 2 plus computing;
After new password generates, server is by Po, PnAnd enhancing authentication information is back to mobile terminal, while wait mobile terminal Information back.
3. a kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips according to claim 1, its feature exist In the step D is specifically:
After the mobile-terminated information for receiving server and passing back of a, authentication information is parsed first, then judged, if It is enhancing certification, is transferred to step b, if non-reinforcing certification, and authentication information is certification success, and mobile terminal displaying certification is successful Information, Product Certification terminate;If non-reinforcing certification, and authentication information is authentification failure, and mobile terminal displaying certification is lost Information is lost, Product Certification terminates;
After b mobile terminals parse enhancing authentication information, the true and false of product is determined whether, the P returned using servero, It is P to attempt to reset chip passwordn, and monitor chip response.If resetting password failure, mobile terminal displaying authentication failure message, And authentication failure message is sent to server end;If resetting password success, mobile terminal sends information to server end, and Certification success is shown, and authentication success message is sent to server end.
4. a kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips according to claim 1, its feature exist In the step E is specifically included:Server receives the information that mobile terminal is transmitted again, and is parsed;If reset password Failure, server is without any processing, and Product Certification terminates, if resetting password success, server is by PnIt is encrypted, New chip password is generated, as shown in formula (III)
Password'=E (Pn,encryption) (Ⅲ)
In formula (III), password' is new storage password, and encryption is the encryption key of step 4. middle acquisition, and E () is AES;After new storage password generation, database is written into, the replacement step 4. password in middle password field, production Product verification process terminates.
CN201710675116.9A 2017-08-09 2017-08-09 Self-enhanced anti-counterfeiting method based on Ntag21X series chips Expired - Fee Related CN107483427B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710675116.9A CN107483427B (en) 2017-08-09 2017-08-09 Self-enhanced anti-counterfeiting method based on Ntag21X series chips

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710675116.9A CN107483427B (en) 2017-08-09 2017-08-09 Self-enhanced anti-counterfeiting method based on Ntag21X series chips

Publications (2)

Publication Number Publication Date
CN107483427A true CN107483427A (en) 2017-12-15
CN107483427B CN107483427B (en) 2020-10-16

Family

ID=60598968

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710675116.9A Expired - Fee Related CN107483427B (en) 2017-08-09 2017-08-09 Self-enhanced anti-counterfeiting method based on Ntag21X series chips

Country Status (1)

Country Link
CN (1) CN107483427B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109685523A (en) * 2018-11-19 2019-04-26 武汉天喻信息产业股份有限公司 Anti-counterfeiting system and note validating method based on cloud environment on-line authentication bill
CN111756534A (en) * 2020-06-24 2020-10-09 北京字节跳动网络技术有限公司 Network password updating method and device, network access device and storage medium
CN115913528A (en) * 2022-09-22 2023-04-04 深圳市雄帝科技股份有限公司 Quantum key management method based on security chip and cloud cooperation

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1235445A (en) * 1998-01-13 1999-11-17 日本电气株式会社 Password updating apparatus and recording medium used therefor
US20090254749A1 (en) * 2007-12-19 2009-10-08 Beijing Lenovo Software Ltd. Cooperation method and system of hardware secure units, and application device
CN102104870A (en) * 2009-12-21 2011-06-22 英特尔公司 Wireless device and method for rekeying with reduced packet loss for high-throughput wireless communications
CN102546175A (en) * 2011-03-18 2012-07-04 贾松仁 Anti-counterfeiting device and anti-counterfeiting method
CN103065168A (en) * 2012-12-19 2013-04-24 深圳市江波龙电子有限公司 Anti-fake method and system of radio frequency identification
US20130304651A1 (en) * 2012-05-10 2013-11-14 Mastercard International Incorporated Systems and method for providing multiple virtual secure elements in a single physical secure element of a mobile device
CN103684782A (en) * 2013-11-26 2014-03-26 飞天诚信科技股份有限公司 Method for activating token equipment in token authentication system
US20140344585A1 (en) * 2011-07-15 2014-11-20 Cavium, Inc. Secure Software And Hardware Association Technique
CN104320250A (en) * 2014-08-12 2015-01-28 北京傲飞商智软件有限公司 Anti-counterfeiting authentication method based on NFC chip
CN105654170A (en) * 2014-11-14 2016-06-08 苏州海博智能系统有限公司 Security label, security method and security system based on dynamic ciphers
US20160188910A1 (en) * 2014-12-30 2016-06-30 Data I/O Corporation Automated manufacturing system with adapter security mechanism and method of manufacture thereof
CN205375533U (en) * 2015-11-27 2016-07-06 北京华联印刷有限公司 Collect structure that sets up of drawing label
US20160307194A1 (en) * 2012-12-31 2016-10-20 Piyush Bhatnagar System and method for point of sale payment data credentials management using out-of-band authentication
US20160371683A1 (en) * 2015-06-19 2016-12-22 uQontrol, Inc. Multi-purpose data storage key

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1235445A (en) * 1998-01-13 1999-11-17 日本电气株式会社 Password updating apparatus and recording medium used therefor
US20090254749A1 (en) * 2007-12-19 2009-10-08 Beijing Lenovo Software Ltd. Cooperation method and system of hardware secure units, and application device
CN102104870A (en) * 2009-12-21 2011-06-22 英特尔公司 Wireless device and method for rekeying with reduced packet loss for high-throughput wireless communications
CN102546175A (en) * 2011-03-18 2012-07-04 贾松仁 Anti-counterfeiting device and anti-counterfeiting method
US20140344585A1 (en) * 2011-07-15 2014-11-20 Cavium, Inc. Secure Software And Hardware Association Technique
US20130304651A1 (en) * 2012-05-10 2013-11-14 Mastercard International Incorporated Systems and method for providing multiple virtual secure elements in a single physical secure element of a mobile device
CN103065168A (en) * 2012-12-19 2013-04-24 深圳市江波龙电子有限公司 Anti-fake method and system of radio frequency identification
US20160307194A1 (en) * 2012-12-31 2016-10-20 Piyush Bhatnagar System and method for point of sale payment data credentials management using out-of-band authentication
CN103684782A (en) * 2013-11-26 2014-03-26 飞天诚信科技股份有限公司 Method for activating token equipment in token authentication system
CN104320250A (en) * 2014-08-12 2015-01-28 北京傲飞商智软件有限公司 Anti-counterfeiting authentication method based on NFC chip
CN105654170A (en) * 2014-11-14 2016-06-08 苏州海博智能系统有限公司 Security label, security method and security system based on dynamic ciphers
US20160188910A1 (en) * 2014-12-30 2016-06-30 Data I/O Corporation Automated manufacturing system with adapter security mechanism and method of manufacture thereof
US20160371683A1 (en) * 2015-06-19 2016-12-22 uQontrol, Inc. Multi-purpose data storage key
CN205375533U (en) * 2015-11-27 2016-07-06 北京华联印刷有限公司 Collect structure that sets up of drawing label

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109685523A (en) * 2018-11-19 2019-04-26 武汉天喻信息产业股份有限公司 Anti-counterfeiting system and note validating method based on cloud environment on-line authentication bill
CN111756534A (en) * 2020-06-24 2020-10-09 北京字节跳动网络技术有限公司 Network password updating method and device, network access device and storage medium
CN115913528A (en) * 2022-09-22 2023-04-04 深圳市雄帝科技股份有限公司 Quantum key management method based on security chip and cloud cooperation
CN115913528B (en) * 2022-09-22 2024-06-11 深圳市雄帝科技股份有限公司 Quantum key management method based on security chip and cloud cooperation

Also Published As

Publication number Publication date
CN107483427B (en) 2020-10-16

Similar Documents

Publication Publication Date Title
CN102663592B (en) Article identity dicode identification method based on Quick Response Code
US11042791B2 (en) Method and apparatus for generating and reading composite two-dimensional code
CN108460605B (en) Block chain-based tracing and anti-counterfeiting method and system for paper artwork
CN105024824B (en) The generation and verification method and system of credible label based on rivest, shamir, adelman
CN202019354U (en) Article identity authenticating and anti-counterfeiting system based on NFC (near field communication) cellphone
CN1588386B (en) System and method for realizing article information detection by radio frequency identification and mobile communication combination
CN107169776A (en) Product certification method for anti-counterfeit based on block chain technology
CN113627958B (en) NFC anti-counterfeiting tracing method and server
CN100576942C (en) A kind of mobile antifogery method and system thereof based on mobile phone
CN101009014A (en) Secure anti-counterfeiting method and system thereof
CN107181765A (en) Network digital identity identifying method based on block chain technology
CN102930307A (en) Anti-counterfeiting authentication method for famous wine
CN105701661A (en) Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data
CN106548352A (en) A kind of commodity counterfeit prevention traceability system and its implementation
CN104463016B (en) Data safety storing method suitable for IC cards and two-dimension codes
CN109345268A (en) Two-dimensional code anti-counterfeiting label, label register method and label identification method based on NFC
CN103310254B (en) A kind of safety anti-fake voucher and preparation method thereof
CN101110728A (en) Security validating system and method for RFID certificate of title
KR20220113307A (en) System to provide genuinity verification and ownership change records of product esset by using a blockchain and a genuine authentiation tag technologies
CN103530785A (en) Double anti-counterfeiting system and method based on near field communication (NFC) function
CN112800464A (en) Anti-counterfeiting tracing method and system based on block chain
CN107483427A (en) A kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips
CN104424579A (en) Security traceability management system
WO2015154482A1 (en) One-time certificate anti-counterfeiting tracing system based on mobile terminal and rfid
CN109450915A (en) A kind of homing pigeon foot ring and its recognition methods based on NFC

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201016

Termination date: 20210809