CN107483427A - A kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips - Google Patents
A kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips Download PDFInfo
- Publication number
- CN107483427A CN107483427A CN201710675116.9A CN201710675116A CN107483427A CN 107483427 A CN107483427 A CN 107483427A CN 201710675116 A CN201710675116 A CN 201710675116A CN 107483427 A CN107483427 A CN 107483427A
- Authority
- CN
- China
- Prior art keywords
- password
- server
- information
- certification
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000005516 engineering process Methods 0.000 title claims description 14
- 230000002708 enhancing effect Effects 0.000 claims abstract description 22
- 238000000034 method Methods 0.000 claims description 24
- 230000008569 process Effects 0.000 claims description 15
- 238000003860 storage Methods 0.000 claims description 9
- 230000003014 reinforcing effect Effects 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 4
- 239000000284 extract Substances 0.000 claims description 3
- 238000004519 manufacturing process Methods 0.000 claims description 3
- 230000007246 mechanism Effects 0.000 claims description 3
- 230000004044 response Effects 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 2
- 238000013461 design Methods 0.000 abstract description 6
- 238000004891 communication Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- FGRBYDKOBBBPOI-UHFFFAOYSA-N 10,10-dioxo-2-[4-(N-phenylanilino)phenyl]thioxanthen-9-one Chemical compound O=C1c2ccccc2S(=O)(=O)c2ccc(cc12)-c1ccc(cc1)N(c1ccccc1)c1ccccc1 FGRBYDKOBBBPOI-UHFFFAOYSA-N 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000003362 replicative effect Effects 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B5/00—Near-field transmission systems, e.g. inductive or capacitive transmission systems
- H04B5/70—Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes
- H04B5/77—Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for interrogation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Power Engineering (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of self-reinforcing anti-fake scheme design based on Ntag21X family chips, there is provided two kinds of anti-fake certificate patterns:Regular authentication and enhancing certification.Under regular authentication pattern, the mode parsed using cloud server to chip information is authenticated;Strengthen under certification mode, cloud server uses the authentication mode of one-time pad with reference to mobile terminal on the basis of chip information is parsed.Authentication phase, mobile terminal send the chip data read to high in the clouds, requesting cooperative certification;After high in the clouds receives data, according to actual conditions, decide whether to enable enhanced anti-fake certificate, the present invention effectively reduces the risk that encryption chip is replicated, improve the security of anti-fake certificate by introducing self-reinforcing type anti-counterfeiting design.
Description
Technical field
The present invention relates to communication technology application field, and in particular to carries out the false proof conceptual design traced to the source using NFC technique.
Background technology
With the development of the social economy, many illegal businessmans by interests trend, carry out counterfeit to brand article, directly lead
Cause in the market commercial quality very different, it is hard to tell whether it is true or false.At present, the most commodity counterfeit prevention means of in the market still concentrate on code inquiry
False proof, optical material is false proof to wait traditional approach, but traditional counterfeit protection measures have the defects of intrinsic, as code inquires about false proof step
Rapid cumbersome, customer inquiries rate is relatively low;The progress of imitation technology also causes the reliability of optical material anti-counterfeiting technology to substantially reduce.
In recent years, NFC technique is gradually applied to every field, in particular by the promotion of technology of Internet of things, NFC technique
Even more become the focus of electronic information circle, and it is false proof trace to the source be exactly NFC technique application a key areas.Compared to traditional
Counterfeit protection measures, NFC is false proof to have unique advantage, and its unique No. UID is previously written by chip production producer and can not be changed,
High degree reduces the risk that chip is copied in batches.
The domestic Patent No. CN201120176321.9 Antiforge system based on NFC mobile terminals, by electronic tag, NFC
Mobile terminal and anti-counterfeit server three parts are formed, and built-in reading code radio-frequency module, reads NFC cores in NFC mobile terminal
Identification information in piece, chip identification information is then reached by cloud server by data network and parsed, is realized false proof
Trace to the source function.However, the data in NFC chip are open readable, any digital independent for meeting communication protocol is legal
, therefore, under certain condition, the data in chip can be replicated, even if can not know the volume of Data within the chip
Code or cipher mode.Specifically replicating flow is:All information in chip are read using the terminal with NFC read functions and are protected
Deposit, production clone chip, information is completely written in blank chip, completes the duplication of chip again.In consideration of it, moved based on NFC
The Antiforge system of moved end still has security risk.
Similar to the Antiforge system based on NFC mobile terminals, domestic Patent No. CN201220005393.9 one kind is based on
The Comodity anti-fake system of NFC mobile phone, by commodity, RFID, there is the mobile phone of NFC function, Benefits in Mobile Phone Communication Services system
And the most of composition of background management system five.RFID label tag is attached on commodity, background management system storage and management business
The anti-counterfeiting information of product.The mobile phone for possessing NFC function obtains chip information, and information is reached into back-stage management using Communications service network
System carries out genuine/counterfeit discriminating.But the Antiforge system still enough not can effectively solve the problem that the problem of RFID label tag is replicated, once
Label is replicated, and the system just can not effectively differentiate the true and false of commodity, the risk of " it is true to recognize puppet " be present.
In summary, the simple information read using terminal device in RFID chip, is then transmitted back to high in the clouds parsing simultaneously
The conceptual design of certification is unsafe, can not successfully manage the problem of chip is replicated, even if information is encryption in chip.
The content of the invention
The technical problem to be solved in the present invention is to provide a kind of false proof skill of the self-reinforcing type based on Ntag21X family chips
Art, to solve the problems, such as to mention in background technology.
To achieve the above object, the present invention provides following technical scheme:
A kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips, is comprised the steps of:
A, product and encryption information are write into Ntag21X chips, while by corresponding product information typing high in the clouds data
Storehouse, complete the initialization of system;
B, when certification is initiated in mobile terminal, chip UID information is read from Ntag213 chips, and by data according to certain
Coded system is back to cloud server, and request server carries out collaboration certification;
What C, cloud server received mobile terminal asks summed data, and product information is authenticated, and by authentication information
It is back to mobile terminal;
D, after the mobile-terminated authentication information for receiving server, authentication information is parsed, and final information is returned
It is back to server;
E, server receives the information that mobile terminal is transmitted again, and is parsed.
Preferred scheme as the present invention:The step C is specifically included:
1. server extracts chip UID plain codes and the UID passwords of encryption from the information received, UID ciphertexts are carried out
Decryption, chip UID is inquired about from database, if inquiring specified UID, be transferred in next step, if inquiry is less than certification is lost
Lose information and be back to mobile terminal, Server Authentication process terminates;
2. the UID that server inquires from database is corresponded to and decruption key is obtained in row, and UID passwords are solved
It is close, while be compared with UID plain codes, check whether consistent.If consistent, it is transferred in next step, if inconsistent, certification is lost
Lose information and be back to mobile terminal, Server Authentication process terminates;
3. according to the UID rows inquired, the flag bit in corresponding enhancing field is found.If flag bit is effective, that is, enable
Strengthen certification, be transferred to step 4., if flag bit is invalid, i.e., do not enable enhancing certification, the successful information of certification is back to shifting
Moved end, Server Authentication process terminate;
4. in the case of flag bit is effective, enhancing authentication mechanism is enabled, chip UID is inquired and is expert at corresponding cipher word
Password in section, the encryption key in encryption key field, the decruption key in decruption key field and generation cipher key field
In generation key chip in cipher decoding mode, as shown in formula (I)
Po=D (password, decryption) (I)
In formula (I), PoFor real chip password, password is the data of password field, and decryption is decryption
Key, D () are decipherment algorithm;
After server calculates chip password, in Old Password PoOn the basis of generate new chip password, such as formula (II) institute
Show
In formula (II), PnFor newly-generated password, generator is generation key,For mould 2 plus computing;
After new password generates, server is by Po, PnAnd enhancing authentication information is back to mobile terminal, while wait shifting
Moved end information back.
Preferred scheme as the present invention:After the mobile-terminated information for receiving server and passing back of a, authentication information is entered first
Row parsing, is then judged, if such as enhancing certification, is transferred to step b, if non-reinforcing certification, and authentication information is to recognize
Demonstrate,prove successfully, mobile terminal displaying authentication success message, Product Certification terminates;If non-reinforcing certification, and authentication information is
Authentification failure, mobile terminal displaying authentication failure message, Product Certification terminate;
After b mobile terminals parse enhancing authentication information, the true and false of product is determined whether, returned using server
Po, it is P to attempt to reset chip passwordn, and monitor chip response.If resetting password failure, mobile terminal displaying authentification failure letter
Breath, and authentication failure message is sent to server end;If resetting password success, mobile terminal sends information to server
End, and certification success is shown, and authentication success message is sent to server end.
Preferred scheme as the present invention:The step E is specifically included:Server receives the letter that mobile terminal is transmitted again
Breath, and parsed;If resetting password failure, server is without any processing, and Product Certification terminates, if resetting close
Code success, server is by PnIt is encrypted, generates new chip password, as shown in formula (III)
Password'=E (Pn,encryption) (Ⅲ)
In formula (III), password' is new storage password, and encryption is the encryption key of step 4. middle acquisition, E
() is AES;After new storage password generation, database is written into, replacement step is 4. close in middle password field
Code, Product Certification terminate.
Compared with prior art, the beneficial effects of the invention are as follows:The present invention provides two kinds of anti-fake certificate patterns:Regular authentication
With strengthening certification.Under regular authentication pattern, the mode parsed using cloud server to chip information is authenticated;Enhancing
Under certification mode, cloud server uses the authentication mode of one-time pad with reference to mobile terminal on the basis of chip information is parsed.
Authentication phase, mobile terminal send the chip data read to high in the clouds, requesting cooperative certification;After high in the clouds receives data, root
According to actual conditions, decide whether to enable enhanced anti-fake certificate, if do not enabled, differentiate that result is back to mobile terminal by pre-, such as open
With high in the clouds generates new chip password, will differentiate result in advance, chip is new, Old Password is back to mobile terminal in the lump;Mobile terminal according to
Receive data to judge whether to enable enhanced anti-fake certificate, if do not enabled, displaying anticipation result, such as enable, it is old using chip
Password, chip password is arranged to new password, if it succeeds, by certification, if it fails, then not by certification, finally
Authentication result is back to high in the clouds.The present invention effectively reduces encryption chip and answered by introducing self-reinforcing type anti-counterfeiting design
The risk of system, improve the security of anti-fake certificate.
Brief description of the drawings
Fig. 1 is self-reinforcing type anti-fake scheme design cycle block diagram of the present invention;
Fig. 2 is Ntag213 Data within the chip institutional framework schematic diagrames;
Fig. 3 is high in the clouds identifying procedure block diagram.
Fig. 4 is mobile terminal identifying procedure block diagram.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
Fig. 1-4 are referred to, a kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips, are comprised the following steps:
(1) product and encryption information are write into Ntag21X chips, while by corresponding product information typing high in the clouds data
Storehouse, the initialization of system is completed, red boxes include the initialization section that part is system in Fig. 1, and its detailed process is as follows;
(1.1) key workout system is mainly for generation of encryption key required in verification process, decruption key and life
Into key, chip password is initialized, as shown in formula (IV)
[encryption,decryption,generator,Pi]=KeySys () (IV)
In formula (IV), encryption, decryption, generator, PiRepresent encryption key respectively, decruption key,
Generate key and initialization chip password.No. UID of chip is encrypted using encryption key, cipher mode such as formula (V) institute
Show
UID'=E (UID, encryption) (V)
In formula (V), UID' is the chip UID after encryption, and encryption is that the encryption of key workout system generation is close
Key, E () are AES;
(1.2) as shown in Fig. 2 by taking Ntag213 chip internal storage organizations as an example, by the UID UID' after encryption, initially
Change password PiBeing respectively written into chip, (UID' storage address index is page 4,5,6, PiStorage address index is page 43), set simultaneously
Chip reads for exploitation, and write-in encryption, Ntag213 chips are to write in the case where not obtaining cipher authentication in this mode
, and cipher leaf content can not be read, and security is higher.
(1.3) to PiIt is encrypted, obtains P', shown in encryption method such as formula (V), by UID, P', encryption,
Decryption, generator are saved in database after corresponding field respectively, and system initialization is completed;
(2) Fig. 1 right half parts are overall identifying procedure.When certification is initiated in mobile terminal, read from Ntag213 chips
The two information of UID, UID', and data are back to cloud server according to certain coded system, request server is assisted
Same certification;
(3) what cloud server received mobile terminal asks summed data, and product information is authenticated, and by authentication information
It is back to mobile terminal;
Its process is specific as follows:
(3.1) server authentication process chart is illustrated in figure 3, server extracts chip from the information received
UID and UID', from database inquire about chip UID, if inquiring specified UID, be transferred to step (3.2), if inquiry less than,
Authentication failure message is back to mobile terminal, Server Authentication process terminates;
(3.2) UID that server inquires from database corresponds to acquisition decruption key decryption in row, and right
UID' is decrypted, shown in decryption method such as formula (VI)
UIDd=D (UID', decryption) (VI)
In formula (VI), D () is decipherment algorithm, UIDdFor the chip serial number after decryption, and compared in plain text with UID
It is right, check whether consistent.If consistent, step (3.3) is transferred to, if inconsistent, authentication failure message is back to mobile terminal,
Server Authentication process terminates;
(3.3) according to the UID rows inquired, the flag bit in corresponding enhancing field is found.If flag bit is effective, that is, open
With enhancing certification, step (3.4) is transferred to, if flag bit is invalid, i.e., does not enable enhancing certification, the successful information of certification is returned
To mobile terminal, Server Authentication process terminates;
(3.4) in the case of flag bit is effective, enable enhancing authentication mechanism, inquire chip UID be expert at it is corresponding close
The encryption key encryption in password P', encryption key field, the decruption key in decruption key field in code field
Generation key generator in decryption and generation cipher key field, the cipher decoding mode in chip, such as formula (VII)
It is shown
Po=D (password, decryption) (VII)
In formula (VII), PoFor real chip password, password is the data of password field, and decryption is decryption
Key, D () are decipherment algorithm;
After server parses chip password, in Old Password PoOn the basis of generate new chip password, such as formula (VIII) institute
Show
In formula (VIII), PnFor newly-generated password, generator is generation key,For mould 2 plus computing;
After new password generates, server is by Po, PnAnd enhancing authentication information is back to mobile terminal, while wait shifting
Moved end information back;
(4) after the mobile-terminated authentication information for receiving server, authentication information is parsed, and final information is returned
It is back to server.
Its process is specific as follows:
(4.1) it is illustrated in figure 4 mobile terminal authentication processing flow chart, after the mobile-terminated information for receiving server and passing back,
Authentication information is parsed first, is then judged, if such as enhancing certification, step (4.2) is transferred to, if non-reinforcing recognize
Card, and authentication information is certification success, and mobile terminal shows authentication success message, and Product Certification terminates;It is if non-reinforcing
Certification, and authentication information is authentification failure, and mobile terminal shows authentication failure message, and Product Certification terminates;
(4.2) after mobile terminal parses enhancing authentication information, the true and false of product is determined whether, utilizes server
The chip password P of returno, it is P to attempt to reset chip passwordn, and monitor chip response.If reset password failure, Ntag213
The coding corresponding to authorization failure, mobile terminal displaying authentication failure message can be then returned, and authentication failure message is sent to clothes
Business device end;If resetting password success, Ntag213 can then return to the content that storage address indexes preceding 2 bytes in page 44, displaying
Certification success, and authentication success message is sent to server end, as shown in figure 4, blue Blocked portion is final authentication result;
(5) server receives the information that mobile terminal is transmitted again, and is parsed;If reset password failure, service
Device is without any processing, and Product Certification terminates, if resetting password success, server is by PnIt is encrypted, generates new
Chip password, as shown in formula (VIII)
P'=E (Pn,encryption) (Ⅷ)
In formula (VIII), P' is the chip password that newly stores, and encryption is the encryption key obtained in step (1.1), E
() is AES;
After new storage password generation, database is written into, the chip code data in replacement data storehouse.
Claims (4)
1. a kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips, it is characterised in that comprise the steps of:
A, product and encryption information are write into Ntag21X chips, while by corresponding product information typing cloud database, it is complete
Into the initialization of system;
B, when certification is initiated in mobile terminal, chip UID information is read from Ntag213 chips, and by data according to certain coding
Mode is back to cloud server, and request server carries out collaboration certification;
What C, cloud server received mobile terminal asks summed data, product information is authenticated, and authentication information is returned
To mobile terminal;
D, after the mobile-terminated authentication information for receiving server, authentication information is parsed, and final information is back to
Server;
E, server receives the information that mobile terminal is transmitted again, and is parsed.
2. a kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips according to claim 1, its feature exist
In the step C is specifically included:
1. server extracts chip UID plain codes and the UID passwords of encryption from the information received, UID ciphertexts are decrypted,
Chip UID is inquired about from database, if inquiring specified UID, is transferred in next step, if inquiry is less than authentification failure is believed
Breath is back to mobile terminal, and Server Authentication process terminates;
2. the UID that server inquires from database is corresponded to and decruption key is obtained in row, and UID passwords are decrypted, together
When be compared with UID plain codes, check whether consistent.If consistent, it is transferred in next step, if inconsistent, authentification failure is believed
Breath is back to mobile terminal, and Server Authentication process terminates;
3. according to the UID rows inquired, the flag bit in corresponding enhancing field is found.If flag bit is effective, that is, enable enhancing
Certification, it is transferred to step 4., if flag bit is invalid, i.e., does not enable enhancing certification, the successful information of certification is back to mobile terminal,
Server Authentication process terminates;
4. in the case of flag bit is effective, enhancing authentication mechanism is enabled, chip UID is inquired and is expert in corresponding password field
Password, the encryption key in encryption key field, the decruption key in decruption key field and generation cipher key field in
The cipher decoding mode in key chip is generated, as shown in formula (I)
Po=D (password, decryption) (I)
In formula (I), PoFor real chip password, password is the data of password field, and decryption is decruption key, D
() is decipherment algorithm;
After server calculates chip password, in Old Password PoOn the basis of generate new chip password, as shown in formula (II)
<mrow>
<msub>
<mi>P</mi>
<mi>n</mi>
</msub>
<mo>=</mo>
<msub>
<mi>P</mi>
<mi>o</mi>
</msub>
<mo>&CirclePlus;</mo>
<mi>g</mi>
<mi>e</mi>
<mi>n</mi>
<mi>e</mi>
<mi>r</mi>
<mi>a</mi>
<mi>t</mi>
<mi>o</mi>
<mi>r</mi>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mi>I</mi>
<mi>I</mi>
<mo>)</mo>
</mrow>
</mrow>
In formula (II), PnFor newly-generated password, generator is generation key,For mould 2 plus computing;
After new password generates, server is by Po, PnAnd enhancing authentication information is back to mobile terminal, while wait mobile terminal
Information back.
3. a kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips according to claim 1, its feature exist
In the step D is specifically:
After the mobile-terminated information for receiving server and passing back of a, authentication information is parsed first, then judged, if
It is enhancing certification, is transferred to step b, if non-reinforcing certification, and authentication information is certification success, and mobile terminal displaying certification is successful
Information, Product Certification terminate;If non-reinforcing certification, and authentication information is authentification failure, and mobile terminal displaying certification is lost
Information is lost, Product Certification terminates;
After b mobile terminals parse enhancing authentication information, the true and false of product is determined whether, the P returned using servero,
It is P to attempt to reset chip passwordn, and monitor chip response.If resetting password failure, mobile terminal displaying authentication failure message,
And authentication failure message is sent to server end;If resetting password success, mobile terminal sends information to server end, and
Certification success is shown, and authentication success message is sent to server end.
4. a kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips according to claim 1, its feature exist
In the step E is specifically included:Server receives the information that mobile terminal is transmitted again, and is parsed;If reset password
Failure, server is without any processing, and Product Certification terminates, if resetting password success, server is by PnIt is encrypted,
New chip password is generated, as shown in formula (III)
Password'=E (Pn,encryption) (Ⅲ)
In formula (III), password' is new storage password, and encryption is the encryption key of step 4. middle acquisition, and E () is
AES;After new storage password generation, database is written into, the replacement step 4. password in middle password field, production
Product verification process terminates.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710675116.9A CN107483427B (en) | 2017-08-09 | 2017-08-09 | Self-enhanced anti-counterfeiting method based on Ntag21X series chips |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710675116.9A CN107483427B (en) | 2017-08-09 | 2017-08-09 | Self-enhanced anti-counterfeiting method based on Ntag21X series chips |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107483427A true CN107483427A (en) | 2017-12-15 |
CN107483427B CN107483427B (en) | 2020-10-16 |
Family
ID=60598968
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710675116.9A Expired - Fee Related CN107483427B (en) | 2017-08-09 | 2017-08-09 | Self-enhanced anti-counterfeiting method based on Ntag21X series chips |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107483427B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109685523A (en) * | 2018-11-19 | 2019-04-26 | 武汉天喻信息产业股份有限公司 | Anti-counterfeiting system and note validating method based on cloud environment on-line authentication bill |
CN111756534A (en) * | 2020-06-24 | 2020-10-09 | 北京字节跳动网络技术有限公司 | Network password updating method and device, network access device and storage medium |
CN115913528A (en) * | 2022-09-22 | 2023-04-04 | 深圳市雄帝科技股份有限公司 | Quantum key management method based on security chip and cloud cooperation |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1235445A (en) * | 1998-01-13 | 1999-11-17 | 日本电气株式会社 | Password updating apparatus and recording medium used therefor |
US20090254749A1 (en) * | 2007-12-19 | 2009-10-08 | Beijing Lenovo Software Ltd. | Cooperation method and system of hardware secure units, and application device |
CN102104870A (en) * | 2009-12-21 | 2011-06-22 | 英特尔公司 | Wireless device and method for rekeying with reduced packet loss for high-throughput wireless communications |
CN102546175A (en) * | 2011-03-18 | 2012-07-04 | 贾松仁 | Anti-counterfeiting device and anti-counterfeiting method |
CN103065168A (en) * | 2012-12-19 | 2013-04-24 | 深圳市江波龙电子有限公司 | Anti-fake method and system of radio frequency identification |
US20130304651A1 (en) * | 2012-05-10 | 2013-11-14 | Mastercard International Incorporated | Systems and method for providing multiple virtual secure elements in a single physical secure element of a mobile device |
CN103684782A (en) * | 2013-11-26 | 2014-03-26 | 飞天诚信科技股份有限公司 | Method for activating token equipment in token authentication system |
US20140344585A1 (en) * | 2011-07-15 | 2014-11-20 | Cavium, Inc. | Secure Software And Hardware Association Technique |
CN104320250A (en) * | 2014-08-12 | 2015-01-28 | 北京傲飞商智软件有限公司 | Anti-counterfeiting authentication method based on NFC chip |
CN105654170A (en) * | 2014-11-14 | 2016-06-08 | 苏州海博智能系统有限公司 | Security label, security method and security system based on dynamic ciphers |
US20160188910A1 (en) * | 2014-12-30 | 2016-06-30 | Data I/O Corporation | Automated manufacturing system with adapter security mechanism and method of manufacture thereof |
CN205375533U (en) * | 2015-11-27 | 2016-07-06 | 北京华联印刷有限公司 | Collect structure that sets up of drawing label |
US20160307194A1 (en) * | 2012-12-31 | 2016-10-20 | Piyush Bhatnagar | System and method for point of sale payment data credentials management using out-of-band authentication |
US20160371683A1 (en) * | 2015-06-19 | 2016-12-22 | uQontrol, Inc. | Multi-purpose data storage key |
-
2017
- 2017-08-09 CN CN201710675116.9A patent/CN107483427B/en not_active Expired - Fee Related
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1235445A (en) * | 1998-01-13 | 1999-11-17 | 日本电气株式会社 | Password updating apparatus and recording medium used therefor |
US20090254749A1 (en) * | 2007-12-19 | 2009-10-08 | Beijing Lenovo Software Ltd. | Cooperation method and system of hardware secure units, and application device |
CN102104870A (en) * | 2009-12-21 | 2011-06-22 | 英特尔公司 | Wireless device and method for rekeying with reduced packet loss for high-throughput wireless communications |
CN102546175A (en) * | 2011-03-18 | 2012-07-04 | 贾松仁 | Anti-counterfeiting device and anti-counterfeiting method |
US20140344585A1 (en) * | 2011-07-15 | 2014-11-20 | Cavium, Inc. | Secure Software And Hardware Association Technique |
US20130304651A1 (en) * | 2012-05-10 | 2013-11-14 | Mastercard International Incorporated | Systems and method for providing multiple virtual secure elements in a single physical secure element of a mobile device |
CN103065168A (en) * | 2012-12-19 | 2013-04-24 | 深圳市江波龙电子有限公司 | Anti-fake method and system of radio frequency identification |
US20160307194A1 (en) * | 2012-12-31 | 2016-10-20 | Piyush Bhatnagar | System and method for point of sale payment data credentials management using out-of-band authentication |
CN103684782A (en) * | 2013-11-26 | 2014-03-26 | 飞天诚信科技股份有限公司 | Method for activating token equipment in token authentication system |
CN104320250A (en) * | 2014-08-12 | 2015-01-28 | 北京傲飞商智软件有限公司 | Anti-counterfeiting authentication method based on NFC chip |
CN105654170A (en) * | 2014-11-14 | 2016-06-08 | 苏州海博智能系统有限公司 | Security label, security method and security system based on dynamic ciphers |
US20160188910A1 (en) * | 2014-12-30 | 2016-06-30 | Data I/O Corporation | Automated manufacturing system with adapter security mechanism and method of manufacture thereof |
US20160371683A1 (en) * | 2015-06-19 | 2016-12-22 | uQontrol, Inc. | Multi-purpose data storage key |
CN205375533U (en) * | 2015-11-27 | 2016-07-06 | 北京华联印刷有限公司 | Collect structure that sets up of drawing label |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109685523A (en) * | 2018-11-19 | 2019-04-26 | 武汉天喻信息产业股份有限公司 | Anti-counterfeiting system and note validating method based on cloud environment on-line authentication bill |
CN111756534A (en) * | 2020-06-24 | 2020-10-09 | 北京字节跳动网络技术有限公司 | Network password updating method and device, network access device and storage medium |
CN115913528A (en) * | 2022-09-22 | 2023-04-04 | 深圳市雄帝科技股份有限公司 | Quantum key management method based on security chip and cloud cooperation |
CN115913528B (en) * | 2022-09-22 | 2024-06-11 | 深圳市雄帝科技股份有限公司 | Quantum key management method based on security chip and cloud cooperation |
Also Published As
Publication number | Publication date |
---|---|
CN107483427B (en) | 2020-10-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102663592B (en) | Article identity dicode identification method based on Quick Response Code | |
US11042791B2 (en) | Method and apparatus for generating and reading composite two-dimensional code | |
CN108460605B (en) | Block chain-based tracing and anti-counterfeiting method and system for paper artwork | |
CN105024824B (en) | The generation and verification method and system of credible label based on rivest, shamir, adelman | |
CN202019354U (en) | Article identity authenticating and anti-counterfeiting system based on NFC (near field communication) cellphone | |
CN1588386B (en) | System and method for realizing article information detection by radio frequency identification and mobile communication combination | |
CN107169776A (en) | Product certification method for anti-counterfeit based on block chain technology | |
CN113627958B (en) | NFC anti-counterfeiting tracing method and server | |
CN100576942C (en) | A kind of mobile antifogery method and system thereof based on mobile phone | |
CN101009014A (en) | Secure anti-counterfeiting method and system thereof | |
CN107181765A (en) | Network digital identity identifying method based on block chain technology | |
CN102930307A (en) | Anti-counterfeiting authentication method for famous wine | |
CN105701661A (en) | Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data | |
CN106548352A (en) | A kind of commodity counterfeit prevention traceability system and its implementation | |
CN104463016B (en) | Data safety storing method suitable for IC cards and two-dimension codes | |
CN109345268A (en) | Two-dimensional code anti-counterfeiting label, label register method and label identification method based on NFC | |
CN103310254B (en) | A kind of safety anti-fake voucher and preparation method thereof | |
CN101110728A (en) | Security validating system and method for RFID certificate of title | |
KR20220113307A (en) | System to provide genuinity verification and ownership change records of product esset by using a blockchain and a genuine authentiation tag technologies | |
CN103530785A (en) | Double anti-counterfeiting system and method based on near field communication (NFC) function | |
CN112800464A (en) | Anti-counterfeiting tracing method and system based on block chain | |
CN107483427A (en) | A kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips | |
CN104424579A (en) | Security traceability management system | |
WO2015154482A1 (en) | One-time certificate anti-counterfeiting tracing system based on mobile terminal and rfid | |
CN109450915A (en) | A kind of homing pigeon foot ring and its recognition methods based on NFC |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20201016 Termination date: 20210809 |