CN108573296A - False proof device, anti-counterfeiting system and method for anti-counterfeit - Google Patents

False proof device, anti-counterfeiting system and method for anti-counterfeit Download PDF

Info

Publication number
CN108573296A
CN108573296A CN201810709366.4A CN201810709366A CN108573296A CN 108573296 A CN108573296 A CN 108573296A CN 201810709366 A CN201810709366 A CN 201810709366A CN 108573296 A CN108573296 A CN 108573296A
Authority
CN
China
Prior art keywords
false proof
proof device
commodity
open state
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810709366.4A
Other languages
Chinese (zh)
Other versions
CN108573296B (en
Inventor
李广
邱银虹
李斌
王文明
刘海剑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Guang Hong Electronic Information Technology Co Ltd
Original Assignee
Beijing Guang Hong Electronic Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Guang Hong Electronic Information Technology Co Ltd filed Critical Beijing Guang Hong Electronic Information Technology Co Ltd
Priority to CN201810709366.4A priority Critical patent/CN108573296B/en
Publication of CN108573296A publication Critical patent/CN108573296A/en
Application granted granted Critical
Publication of CN108573296B publication Critical patent/CN108573296B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Cash Registers Or Receiving Machines (AREA)

Abstract

The present invention relates to a kind of false proof device, anti-counterfeiting system and method for anti-counterfeit, false proof device is set in commodity or commodity packaging, electronic anti-fogery module, state aware module and power module;Wherein, electronic anti-fogery module includes:NFC communication unit, storage unit are used to carry out dynamic authentication to anti-fake data by encryption/decryption algorithm for the anti-fake data of secure storage, the merchandise news of commodity and commodity or the open state and fake certification unit of commodity packaging;State aware module is connected to electronic anti-fogery module, the open state for perceiving commodity or commodity packaging, and when open state changes, and triggering electronic anti-fogery module updates open state;Power module is connected to state aware module, for providing electric energy for state aware module.The present invention can perceive the open state of commodity or commodity packaging by state aware module, and be recorded, and be effectively prevented the utilization again of false proof device, improve the reliability of commodity counterfeit prevention.

Description

False proof device, anti-counterfeiting system and method for anti-counterfeit
Technical field
The present invention relates to a kind of anti-counterfeit field more particularly to false proof device, anti-counterfeiting system and method for anti-counterfeit.
Background technology
With becoming increasingly abundant for people's living standard, various high value-added products are constantly released, and it is daily to meet people Demand, while these commodity are also the main target of criminal's manufacturing and marketing the fake, have upset market, to consumer, enterprise and Dealer brings very big economic loss, while also having seriously affected enterprise product research and development enthusiasm, is unfavorable for enterprise and society The development of meeting.Therefore the anti-counterfeiting technology of product constantly updates development also with the development in epoch and the progress of technology.Early stage people Can be by particularly customized package design, special printing technology carries out the anti-fake of product, the code anti-fake that then grows up, The technologies such as laser anti-counterfeit and fragile paper be anti-it is anti-fake, meet the demand to product false proof to a certain extent, but it is horizontal to manufacture the fake Also it is gradually increased, above-mentioned product false proof in some fatal defects, can not prevent the appearance of fake products, this anti-fake hand Section also can only be as a kind of means of auxiliary.Also there is newest anti-counterfeiting technology and method, mainly RFID (Radio at present Frequency Identification, i.e. radio frequency identification) label anti-counterfeit, NFC (Near Field Communication, i.e., Wireless near field communication) safety chip is anti-fake etc..
RFID tag is anti-fake mainly by reading the unique sequence numbers of tag memory storage, then inquires the sequence in systems Number corresponding product information is to realize the anti-fake of product.RFID manufacturers are on the increase in recent years, and RFID product categories are also constantly rich Richness, since RFID products are without corresponding security mechanism, RFID is mainly used in logistics management etc. to security requirement The reduction in not high field, the technical threshold of RFID also leads to the RFID for erasable sequence number occur, so this kind of anti-counterfeiting technology is deposited In fatal defect.
Anti-fake NFC safety chips are that the anti-fake product easily torn to pieces antenna and made is added using secure NFC chip, main to utilize The modes such as the dynamic encryption and safety certification of safety chip complete the certification to chip, have reached the mesh of the indirect certified product true and false , prevent the duplication to NFC safety chips substantially, easily tearing to pieces antenna mode makes safety chip by destroying after product unlatching It can not work, prevent false making molecule using genuine piece packaging false making, this plays anti-fake purpose, but this kind of side to a certain extent Method has two, and a problem is to reconnect antenna after false making molecule can take out NFC safety chips and put Onto false product packaging, anti-fake effect is not had not only if done so, but also boosting fake products sale;It is another A problem is that NFC safety chips can not be read again after product is opened, therefore inquiry of consumer during subsequent product use is recognized Card operation can not be completed.
Invention content
Technical problem to be solved by the present invention lies in, a kind of false proof device, anti-counterfeiting system and method for anti-counterfeit are provided, it can It perceives commodity or whether commodity packaging is opened or be disassembled, and commodity or commodity packaging open state are stored, into And enable to user during verifying the true and false, it views commodity or whether commodity packaging is opened or be disassembled, and It will be unable to return to non-open state after commodity or commodity packaging are opened or are disassembled, and then effectively prevent false proof device Reuse, improve the reliability of commodity counterfeit prevention.
In order to solve the above-mentioned technical problem, the first aspect of the present invention provides a kind of false proof device, be set to commodity or In commodity packaging, including:Electronic anti-fogery module, state aware module and power module.
Wherein, electronic anti-fogery module includes:NFC communication unit, storage unit is for secure storage anti-fake data, commodity The open state and fake certification unit of merchandise news and commodity or commodity packaging are used for through encryption/decryption algorithm to anti-fake Data carry out dynamic authentication;
State aware module is connected to electronic anti-fogery module, the open state for perceiving commodity or commodity packaging, and When open state changes, triggering electronic anti-fogery module updates open state;
Power module is connected to state aware module, for providing electric energy for state aware module.
Further, open state includes non-open state and has turned on state;And state aware module includes opening State aware unit, open state perceive unit and are used to trigger electronic anti-fogery module when commodity or commodity packaging are opened, with It is to have turned on state to make electronic anti-fogery module update open state.
Further, state aware module further includes disassembly status perception unit, and disassembly status perceives unit and is used in quotient Electronic anti-fogery module is triggered when product or commodity packaging are disassembled, so that electronic anti-fogery module update open state is to have turned on shape State.
Further, encryption/decryption algorithm includes the combination of symmetry algorithm or symmetry algorithm and asymmetric arithmetic.
Further, electronic anti-fogery module further includes:File management unit, security managing unit, data transmission unit and Data storage management unit.
Wherein, file management unit is used to create one or more application or file, and to one or more application or text Part is managed;
Security managing unit is used to carry out safe calculating and access control to one or more application and file;
Data transmission unit be used for using plaintext transmission, ciphertext transmission and check code transmission in it is one or more with it is external Carry out the data transmission of anti-fake data, merchandise news and open state;
The power down that data storage management unit is used for anti-fake data, merchandise news and open state in electronic anti-fogery module is protected The safe read-write of shield and storage unit.
Further, false proof device further includes:Supplemental functionality, supplemental functionality are respectively connected to electronic anti-fogery mould Block, state aware module and power module, for controlling power module to electronic anti-fogery according to state aware module operating status The electricity of label output.
According to a second aspect of the present invention, a kind of anti-counterfeiting system is also provided, including:NFC device, authentication center and first aspect The false proof device;
Wherein, NFC device has the function of short-distance wireless communication and network communicating function, in false proof device and certification Data transmission in the heart, and show true and false, commodity the merchandise newss and commodity or the open state of commodity packaging of false proof device;
Authentication center, for generating, transmitting, store and managing anti-fake data, using symmetry algorithm or symmetry algorithm and non- The anti-fake data stored in false proof device are verified in the combination of symmetry algorithm, to be verified to the true and false of false proof device.
According to a third aspect of the present invention, a kind of method for anti-counterfeit is also provided, for the anti-counterfeiting system described in second aspect, packet It includes:
Link is initialized, Initialize installation is carried out to false proof device by NFC device;
Production packaging link carries out fake certification to false proof device by encryption/decryption algorithm, and tests false proof device is anti-fake After card passes through, the merchandise news of commodity is updated in false proof device, sets not commodity or the open state of commodity packaging to Open state;
Commodity circulation links, when commodity or commodity packaging are disassembled or are opened, false proof device changes open state To have turned on state;
Fake certification link carries out fake certification, to verify the true of false proof device by encryption/decryption algorithm to false proof device It is false;
When false proof device is verified as true, NFC device reads merchandise news and open state.
Further, commodity circulation links, when commodity are disassembled or are opened, open state is revised as by false proof device The step of having turned on state specifically includes:
When detecting that commodity or commodity packaging are disassembled or are opened by false proof device, storage in detection false proof device Open state whether be non-open state;
When it is non-open state to detect open state, open state is revised as to have turned on state.
Further, encryption/decryption algorithm is symmetry algorithm;And fake certification is carried out to false proof device using symmetry algorithm The step of, it specifically includes:
NFC device applies for the first random number to authentication center, and the first random number is sent to false proof device;
False proof device is calculated using the first random number of symmetric key pair, to obtain the first authentication data;
First authentication data is sent to authentication center by NFC device, so that the first authentication data of authentication center pair is tested Card;
After the first authentication data is proved to be successful, NFC device is and random by second to the second random number of false proof device application Number is sent to authentication center;
Authentication center is calculated using the second random number of symmetrical secret key pair, to obtain the second authentication data;
Second authentication data is sent to false proof device by NFC device, so that the second authentication data of false proof device pair is tested Card.
Further, the step of initializing link, Initialize installation carried out to false proof device by NFC device, it is specific to wrap It includes:
NFC device creates application file structure in false proof device, and initialization data is updated to application file structure;
NFC device obtains symmetric key to authentication center;
Symmetric key is sent to false proof device by NFC device;
False proof device stores symmetric key to application file structure.
Further, encryption/decryption algorithm includes the combination of symmetry algorithm and asymmetric arithmetic;And using symmetry algorithm and The step of combination of asymmetric arithmetic carries out fake certification to false proof device, specifically includes:
NFC device reads the digital certificate stored in false proof device, and the private key by being stored in false proof device is to dynamic Characteristic is signed, to obtain dynamic signature data;
Dynamic signature data and digital certificate are sent to authentication center by NFC device;
Authentication center verifies dynamic signature data and digital certificate;
After dynamic signature data and digital certificate authentication pass through, NFC device applies for third random number to authentication center, and Third random number is sent to false proof device;
False proof device calculates third random number using symmetric key, to obtain third authentication data;
Third authentication data is sent to authentication center by NFC device, so that authentication center tests third authentication data Card;
After third authentication data is proved to be successful, NFC device is and random by the 4th to the 4th random number of false proof device application Number is sent to authentication center;
Authentication center is calculated using the 4th random number of symmetric key pair, to obtain the 4th authentication data;
4th authentication data is sent to false proof device by NFC device, so that the 4th authentication data of false proof device pair is tested Card.
Further, the step of initializing link, Initialize installation carried out to false proof device by NFC device, it is specific to wrap It includes:
NFC device creates application file structure in false proof device, and initialization data is updated to application file structure;
False proof device generates unsymmetrical key pair, and the private key of cipher key pair is stored to application file structure;
The public key of cipher key pair is sent to authentication center by NFC device, so that authentication center generates corresponding digital certificate;
Digital certificate is sent to false proof device by NFC device, so that false proof device extremely applies digital certificate store File structure;
NFC device obtains symmetric key to authentication center;
Symmetric key is sent to false proof device by NFC device;
False proof device stores symmetric key to application file structure.
Further, when false proof device is verified as true, NFC device reads merchandise news and the step of open state, tool Body includes:
After verification false proof device is very, false proof device opens the permission for reading merchandise news and open state;
NFC device reads merchandise news and open state and is shown.
Further, when false proof device is verified as true, NFC device read merchandise news and the step of open state it Afterwards, further include:
Judge whether NFC device there is information to add permission;
After judging that NFC device has breath addition permission, NFC device obtains the 5th random number to false proof device;
5th random number and data to be added are sent to authentication center by NFC device;
Authentication center is calculated using the 5th random number of symmetric key pair and data to be added, to obtain out the 5th certification Data;
5th authentication data and data to be added are sent to false proof device by NFC device;
The 5th authentication data of false proof device pair is verified;
After the 5th authentication data is verified, data to be added are stored to false proof device.
The present invention has clear advantage and advantageous effect compared with prior art.By above-mentioned technical proposal, the present invention A kind of false proof device, anti-counterfeiting system and method for anti-counterfeit can reach comparable technological progress and practicability, and in industry Extensive utility value at least has following advantages:
The present invention can perceive commodity or whether commodity packaging is opened or be disassembled, and commodity or commodity packaging are opened The state of opening is stored, and then enables to user during verifying the true and false, view commodity or commodity packaging whether by It opens or is disassembled, and will be unable to the non-open state of return, Jin Eryou after commodity or commodity packaging are opened or are disassembled Reusing for false proof device is prevented to effect, improves the reliability of commodity counterfeit prevention, and false proof device is calculated by enciphering/deciphering Method and anti-tamper security certification are effectively prevented false proof device and are replicated.
Above description is only the general introduction of technical solution of the present invention, in order to better understand the technical means of the present invention, And can be implemented in accordance with the contents of the specification, and in order to allow the above and other objects, features and advantages of the present invention can It is clearer and more comprehensible, it is special below to lift preferred embodiment, and coordinate attached drawing, detailed description are as follows.
Description of the drawings
Fig. 1 is the schematic block diagram of the false proof device of the embodiment of the present invention;
Fig. 2 is the schematic block diagram of anti-counterfeiting system of the embodiment of the present invention;
Fig. 3 is the flow diagram of the method for anti-counterfeit of the embodiment of the present invention.
Specific implementation mode
It is of the invention to reach the technological means and effect that predetermined goal of the invention is taken further to illustrate, below in conjunction with Attached drawing and preferred embodiment, the specific implementation to a kind of false proof device, anti-counterfeiting system and the method for anti-counterfeit that propose according to the present invention Mode and its effect are described in detail as after.
As shown in Figure 1, the embodiment of the present invention provides a kind of false proof device, it is set in commodity or commodity packaging, including:Electricity The anti-fake module 10 of son, state aware module 20 and power module 30;Wherein, electronic anti-fogery module 10 includes:NFC communication unit 101, storage unit 102 is used for the anti-fake data of secure storage, the merchandise news of commodity and commodity or the open state of commodity packaging, And fake certification unit 103 is used to carry out dynamic authentication to anti-fake data by encryption/decryption algorithm;State aware module 20 connects It is connected to electronic anti-fogery module 10, the open state for perceiving commodity or commodity packaging, and when open state changes, touch It sends out electronic anti-fogery module 10 and updates open state;Power module 30 is connected to state aware module 20, for being state aware mould Block 20 provides electric energy.
Specifically, NFC communication unit 101 has the function of NFC communication, meets 14443 TYPE A/B agreements of ISO, carrier wave Frequency is 13.56MHz;Power module 30 can be disposable battery, can also rechargeable battery, and support to rechargeable battery It is charged using charging modes wirelessly or non-wirelessly, wherein the anti-fake data stored in storage unit 102 include:It is symmetrical close The data such as key, unsymmetrical key and digital certificate;The merchandise news of commodity includes:Trade name, the place of production, the date of manufacture, effectively The information such as phase.
Further, in above-mentioned false proof device, the open state of commodity or commodity packaging includes non-open state and Open state.
Further, state aware module 20 has the function of state aware, passes through sensor or the break-make shape of inductive switch State judges the open state of commodity or commodity packaging, once commodity or commodity packaging are opened, then passes through built-in operating system Setting rule the open state of the commodity or commodity packaging that are stored in the storage unit 102 of electronic anti-fogery module 10 is updated to Have turned on state, and updated state be can not inverse operation, unless could be to the opening state after specific authorization identifying State carries out reset operation.It prevents from carrying out illegal secondary utilization to the device.
In a specific embodiment, as shown in Figure 1, state aware module 20 includes open state perception unit 201, When commodity or commodity packaging are opened, open state perception unit 201 can be triggered, and then open state perception unit 201 produces Raw trigger signal is sent to electronic anti-fogery module 10, and receiving open state perception unit 201 in electronic anti-fogery module 10 gives birth to At trigger signal after, commodity or the open state of commodity packaging in electronic anti-fogery module 10 will be stored in and be revised as having turned on shape State.Wherein open state perception unit 201 can be resistance sensor, gravity sensor, photosensitive sensor, temperature sensing Device, pressure sensor etc..
In another specific embodiment, state aware module 20 is also wrapped while perceiving unit 201 including open state Disassembly status perception unit 202 is included, when commodity or commodity packaging are illegally dismantled, disassembly status perception unit 202 can be triggered, And then the trigger signal that disassembly status perception unit 202 generates is sent to electronic anti-fogery module 10, is connect in electronic anti-fogery module 10 After receiving the trigger signal that disassembly status perception unit 202 generates, commodity or commodity bundle in electronic anti-fogery module 10 will be stored in The open state of dress is revised as having turned on state, and then effectively prevents the recycling of false proof device, improves anti-camouflage The anti-fake reliability set.Wherein disassembly status perception unit 202 can be resistance sensor, gravity sensor, light sensor Device, temperature sensor, pressure sensor etc..
Further, in above-mentioned false proof device, fake certification unit 103 includes at DES protocol processor and PKE public keys Manage device, and then during carrying out fake certification, encryption/decryption algorithm can support DES algorithms, 3DES algorithms, the close SM1 of state and The symmetry algorithms such as the close SM4 algorithms of state, while supporting the asymmetric arithmetics such as the close SM2 algorithms of RSA Algorithm, state, provide state close SM3 softwares Library and memory-safe protection mechanism.
Further, above-mentioned false proof device, electronic anti-fogery module 10 further include:File management unit 104, safety management Unit 105, data transmission unit 106 and data MMU memory management unit 107.
Wherein, file management unit 104, for creating one or more application or file, and to one or more application Or file is managed;Security managing unit 105, for carrying out safe calculating and accessing to control to one or more application and file System;Data transmission unit 106, for using plaintext transmission, ciphertext transmission and check code transmission in it is one or more with it is external Carry out the data transmission of anti-fake data, merchandise news and open state;Data storage management unit 107 is used for electronic anti-fogery mould The safe read-write of anti-fake data in block 10, the power down protection of merchandise news and open state and storage unit 102.
Specifically, file management unit 104 can be according to the use demand of false proof device inside electronic anti-fogery module 10 Multistage catalogue file is created, and creates different applications according to the functional requirement of application, and to the different applications and text of establishment Part is individually managed;Security managing unit 105 can be fire wall so that the different application that file management unit 104 creates Between safe condition and rights management be to manage independently;Data transmission unit 106 is used in electronic anti-fogery module 10 and outside When read-write equipment carries out data exchange, using one or more into line number in plaintext transmission, ciphertext transmission and check code transmission According to transmission, to ensure the safety of data transmission, specifically transmission data includes anti-fake data, the merchandise news of commodity and commodity Or the data such as open state of commodity packaging;Data storage management unit 107 is used to back up the storage list of electronic anti-fogery module 10 Anti-fake data, the merchandise news of commodity and the data such as commodity or the open state of commodity packaging stored in member 102, so that energy Situations such as powering off, ensures that above-mentioned data are not lost, and can after abnormal conditions exclusion Restore the data of backup.
Meanwhile electronic anti-fogery module 10 can also support transparent file, fixed-length record file, variable-length record file, cycle Record the multiple file types such as file and secure file.
Further, above-mentioned false proof device further includes supplemental functionality 40, which is respectively connected to Electronic anti-fogery module 10, state aware module 20 and power module 30, the operating status for obtaining state aware module 20, and The electricity that power module 30 is exported to electronic anti-fogery module 10 is controlled according to operating status.
It is understood that in order to play the purpose for saving electric energy, the electronic anti-fogery module 10 when false proof device does not work It does not power, and when commodity or commodity packaging are opened or are disassembled, meeting triggering state sensing module 20 acts, when auxiliary work( When energy module 40 gets the action of state aware module 20, supplemental functionality 40 can control power module 30 to electronic anti-fogery mould Block 10 is powered, so that electronic anti-fogery module 10 is capable of the open state of more new commodity or commodity packaging.
Further, supplemental functionality 40 can also prevent commodity or commodity packaging from being shaken in the links such as transport And state aware module 20 is caused to generate trigger signal, lead to the change of the open state of commodity or commodity packaging, effectively carries The accuracy that state aware module 20 perceives commodity or commodity packaging open state is risen.
According to the second aspect of the invention, as shown in Fig. 2, the embodiment of the present invention additionally provides a kind of anti-counterfeiting system, including: False proof device 3 described in NFC device 1, authentication center 2 and first aspect;Wherein, NFC device 1 has short-distance wireless communication work( Energy and network communicating function for the data transmission between false proof device 3 and authentication center 2, and show the anti-fake letter of false proof device 3 Breath and commodity or the open state of commodity packaging;Authentication center 2 uses for generating, transmitting, store and managing anti-fake data The anti-fake data stored in false proof device 3 are verified in the combination of symmetry algorithm or symmetry algorithm and asymmetric arithmetic, with right The true and false of false proof device 3 is verified.
Specifically, NFC device 1 can be special NFC equipment, can also be equipped with specific identification software mobile phone or The mobile terminals such as tablet computer, the NFC device 1 can will prevent during authentication center 2 is authenticated false proof device 3 Data in pseudo-device 3, such as digital certificate, unsymmetrical key etc. are transferred to authentication center 2, by the data in authentication center 2, For example digital certificate, symmetric key etc. are transmitted to false proof device 3, and after the completion of 3 certification of false proof device, show false proof device 3 anti-counterfeiting information, for example, false proof device 3 information, the merchandise news of display of commodity, such as trade name, the place of production, the life such as true and false The open state of the information such as date, the term of validity, display of commodity or commodity packaging is produced, for example has turned on state or non-open state.
According to a third aspect of the present invention, as shown in figure 3, the embodiment of the present invention also provides a kind of method for anti-counterfeit, for such as the Anti-counterfeiting system described in two aspects, the method for anti-counterfeit include:
Step S302 initializes link, and Initialize installation is carried out to false proof device by NFC device.
It is appreciated that initialization link is the starting point of false proof device life cycle, it is anti-fake by initializing the processing of link Device has unique identity identification information, and then has ensured that false proof device is not reproducible and forges.
The encryption/decryption algorithm used when false proof device carries out fake certification can be symmetry algorithm, can also be symmetrical The combination of algorithm and asymmetric arithmetic.And when using different algorithms, false proof device is carried out in initialization link initial Change setting also to differ.
In being embodied at one, when carrying out fake certification to false proof device using symmetry algorithm, link is being initialized, It creates application file structure in false proof device by NFC device first, different applications is created according to the difference of application scenarios File structure, including master file, application file (such as anti-counterfeit recognition application, commodity application and logistical applications), key file, two Binary file and catalogue file etc..
And then ready initialization data is updated in corresponding application file structure, which includes anti- Pseudo-device number, card issuer's data, using recipient's mark, enable date, validity date, application field, version and mark etc..
Further, symmetric key is obtained to authentication center by NFC device, and symmetric key is stored in false proof device In application file structure in, specifically, can store into key file.
In another specific embodiment, false proof device is prevented when using the combination of symmetry algorithm and asymmetric arithmetic When puppet verification, in initialization link, application file structure is created in false proof device by NFC device first, according to applied field The difference of scape creates different application file structures, including master file, application file (such as anti-counterfeit recognition application, commodity application and Logistical applications etc.), key file, binary file, catalogue file and digital certificate files etc..
And then ready initialization data is updated in corresponding application file structure, which includes anti- Pseudo-device number, card issuer's data, using recipient's mark, enable date, validity date, application field, version and mark etc..
False proof device generates unsymmetrical key pair, which, will be public by NFC device to including public key and private key Key is sent to authentication center, and authentication center generates digital certificate by the public key received, and then the digital certificate of generation is led to It crosses NFC device and is sent to false proof device, false proof device is after receiving digital certificate, by the digital certificate store to application file In structure, specifically, it can be stored in digital certificate files, and private key is then stored in the application file structure of false proof device In, it can specifically be stored in key file.
Further, symmetric key is obtained to authentication center by NFC device, and symmetric key is stored in false proof device In application file structure in, specifically, can store into key file.
Step S304, production packaging link carry out fake certification by encryption/decryption algorithm to false proof device, and anti-fake After device fake certification passes through, the merchandise news of commodity is updated in false proof device, by commodity or the opening state of commodity packaging State is set as non-open state.
Specifically, encryption/decryption algorithm can be symmetry algorithm, can also be the combination of symmetry algorithm and asymmetric arithmetic.
In a specific embodiment, when being verified to false proof device using symmetry algorithm, NFC device is into certification The first random number applied is sent to false proof device by the first random number of heart application, NFC device, and is received in false proof device It after one random number, is calculated using the first random number of symmetric key pair, to obtain the first authentication data, and then is set by NFC Standby to be sent to authentication center through the first authentication data, the first authentication data of authentication center pair is verified, if authentication failed, is led to NFC device prompt user authentication failure is crossed, if being verified, NFC device is to the second random number of false proof device application, and by the Two random numbers are sent to authentication center, and authentication center passes through the second random number of symmetric key pair after receiving the second random number It is calculated, to obtain the second authentication data, and then the second authentication data is sent to by false proof device by NFC device, it is anti-fake The second authentication data of device pair is verified.
In another specific embodiment, false proof device is tested when using the combination of symmetry algorithm and asymmetric arithmetic When card, NFC device reads the digital certificate stored in false proof device, and the private key by being stored in false proof device is to NFC device In behavioral characteristics data sign, to obtain dynamic signature data, and then digital certificate and dynamic signature data are sent To authentication center, authentication center verifies the digital certificate and dynamic signature data that receive.
If authentication failed, user's checking failure is prompted by NFC device, if being proved to be successful, NFC device is to authentication center Apply for that the third random number applied is sent to false proof device, third is received in false proof device by third random number, NFC device After random number, third random number is calculated using symmetric key, to obtain third authentication data, and then passes through NFC device It is sent to authentication center through third authentication data, authentication center verifies third authentication data.If authentication failed passes through NFC device prompts user authentication failure, if being verified, NFC device is to the 4th random number of false proof device application, and by the 4th Random number is sent to authentication center, authentication center after receiving the 4th random number, by the 4th random number of symmetric key pair into Row calculates, and to obtain the 4th authentication data, and then the 4th authentication data is sent to false proof device, anti-camouflage by NFC device It sets and the 4th authentication data is verified.
Further, after false proof device is verified, merchandise news is updated in false proof device, so that false proof device Merchandise news is stored, which includes trade name, the place of production, date of manufacture and term of validity etc..
Further, the open state of the commodity stored in false proof device or commodity packaging is stored as by NFC device Non- open state.
Step S306 commodity circulation links, when commodity or commodity packaging are disassembled or are opened, false proof device will be opened Status modifier is to have turned on state.
Specifically, false proof device can perceive commodity or whether commodity packaging is opened or be disassembled, therefore in Commodity Flow Logical link, when false proof device, which perceives commodity or commodity packaging, to be opened or be disassembled, false proof device can read storage inside Commodity or commodity packaging open state, if open state is when having turned on, to illustrate that commodity or commodity packaging have been opened It crosses, if open state is non-open state, false proof device can be revised as the open state of storage to have turned on state.
It is understood that if commodity or commodity packaging are to open for the first time, but the commodity that are stored in false proof device or The open state of commodity packaging is to have turned on state, then after illustrating that false proof device is disassembled, device is on commodity or commodity packaging Secondary use is carried out, and then may determine that the commodity are counterfeit goods.
Step S308, fake certification link carry out fake certification by encryption/decryption algorithm to false proof device, anti-to verify Pseudo-device it is true and false.
Specifically, encryption/decryption algorithm can be symmetry algorithm, can also be the combination of symmetry algorithm and asymmetric arithmetic, Specific verification mode with above-mentioned production packaging link in such a way that symmetry algorithm carries out false proof device fake certification and It is identical by the way of the combination progress fake certification of symmetry algorithm and asymmetric arithmetic, it is no longer repeated herein.
Step S310, when false proof device is verified as true, NFC device reads merchandise news and open state.
Specifically, work as fake certification link, it is anti-by the combined authentication of symmetry algorithm or symmetry algorithm and asymmetric arithmetic When camouflage is set to true, false proof device, which can open, reads merchandise news and commodity or the open state of commodity packaging, and then passes through NFC Equipment is that the merchandise news stored in false proof device and commodity or the open state of commodity packaging can be read, and is enabled a user to Recognize the information such as trade name, the place of production, date of manufacture, the term of validity of commodity, and can recognize commodity or commodity packaging Whether had been turned on, and then to judge whether false proof device is secondary use.
Further, after user reads the opening imformation of merchandise news and commodity or commodity packaging by NFC device, When needing to add other information, for example, logistics information, management information etc., need the information addition permission to NFC device to test Card can verify log-on message (such as login name information) to judge whether NFC device there is information to add permission, also may be used certainly To be verified by other means.
When NFC device information addition Authority Verification pass through after, NFC device to the 5th random number of false proof device application, and 5th random number and information to be added are sent to authentication center, authentication center is by receiving the 5th random number and letter to be added Breath calculates the 5th authentication data, and then the 5th authentication data and information to be added are sent to false proof device by NFC device.
The 5th authentication data and information to be added are received in false proof device, the 5th authentication data verify, and Data to be added are stored in corresponding file after being verified, so as to follow-up tracing management, certainly can also according to Data to be added are sent to far-end server and stored by family demand.
Invention can perceive commodity or whether commodity packaging is opened or be disassembled, and by commodity or commodity Packaging open state is stored, and then enables to user during verifying the true and false, views commodity or commodity packaging Whether opened or be disassembled, effectively prevents reusing for false proof device, and opened in commodity or commodity packaging Or will be unable to return to non-open state after being disassembled, and then improve the reliability of commodity counterfeit prevention, and false proof device by add/ Decipherment algorithm and anti-tamper security certification are effectively prevented false proof device and are replicated.
The above described is only a preferred embodiment of the present invention, be not intended to limit the present invention in any form, though So the present invention has been disclosed as a preferred embodiment, and however, it is not intended to limit the invention, any technology people for being familiar with this profession Member, without departing from the scope of the present invention, when the technology contents using the disclosure above make a little change or modification For the equivalent embodiment of equivalent variations, as long as being the content without departing from technical solution of the present invention, according to the technical essence of the invention To any simple modification, equivalent change and modification made by above example, in the range of still falling within technical solution of the present invention.

Claims (15)

1. a kind of false proof device is set in commodity or commodity packaging, which is characterized in that including:Electronic anti-fogery module, state sense Know module and power module;
Wherein, the electronic anti-fogery module includes:NFC communication unit, storage unit is for the anti-fake data of secure storage, the quotient The open state and fake certification unit of the merchandise news of product and the commodity or the commodity packaging are used for by adding/solution Close algorithm carries out dynamic authentication to the anti-fake data;
The state aware module is connected to the electronic anti-fogery module, for perceiving opening for the commodity or the commodity packaging State is opened, and when the open state changes, triggers the electronic anti-fogery module and update the open state;
The power module is connected to the state aware module, for providing electric energy for the state aware module.
2. false proof device according to claim 1, which is characterized in that the open state includes non-open state and opened Open state;And the state aware module includes open state perception unit, the open state perception unit is used in institute It states commodity or when commodity packaging is opened triggers the electronic anti-fogery module, so that described in electronic anti-fogery module update Open state has turned on state described in being.
3. false proof device according to claim 2, which is characterized in that the state aware module further includes disassembly status sense Know that unit, the disassembly status perception unit are anti-for triggering the electronics when the commodity or the commodity packaging are disassembled Pseudo- module, so that the electronic anti-fogery module updates the open state and has turned on state to be described.
4. false proof device according to claim 2 or 3, which is characterized in that the encryption/decryption algorithm include symmetry algorithm or The combination of symmetry algorithm and asymmetric arithmetic.
5. false proof device according to claim 4, which is characterized in that the electronic anti-fogery module further includes:
File management unit, for creating one or more application or file, and to one or more of applications or file into Row management;
Security managing unit, for carrying out safe calculating and access control to one or more of applications and file;
Data transmission unit, for using plaintext transmission, ciphertext transmission and check code transmission in it is one or more with it is external into The row anti-fake data, the data transmission of the merchandise news and the open state;
Data storage management unit for anti-fake data described in the electronic anti-fogery module, the merchandise news and described is opened Open the safe read-write of the power down protection and the storage unit of state.
6. false proof device according to claim 5, which is characterized in that further include:
Supplemental functionality, the supplemental functionality are respectively connected to the electronic anti-fogery module, the state aware module With the power module, it is used to control the power module to the electronic anti-fogery according to the state aware module operating status Module for power supply.
7. a kind of anti-counterfeiting system, which is characterized in that including:NFC device, authentication center and such as any one of claim 1 to 6 institute The false proof device stated;
Wherein, the NFC device has the function of short-distance wireless communication and network communicating function, is used for the false proof device and institute The data transmission between authentication center is stated, and shows true and false, commodity the merchandise newss and commodity or commodity bundle of the false proof device The open state of dress;
The authentication center, for generating, transmitting, store and managing anti-fake data, using symmetry algorithm or symmetry algorithm and non- The anti-fake data stored in the false proof device are verified in the combination of symmetry algorithm, with to the false proof device it is true and false into Row verification.
8. a kind of method for anti-counterfeit is used for anti-counterfeiting system as claimed in claim 7, which is characterized in that including:
Link is initialized, Initialize installation is carried out to false proof device by NFC device;
Production packaging link carries out fake certification by encryption/decryption algorithm to the false proof device, and anti-in the false proof device After puppet is verified, the merchandise news of commodity is updated in the false proof device, by the commodity or the commodity packaging Open state is set as non-open state;
Commodity circulation links, when the commodity or the commodity packaging are disassembled or are opened, the false proof device will be described Open state is revised as having turned on state;
Fake certification link carries out fake certification by the encryption/decryption algorithm to the false proof device, described anti-fake to verify Device it is true and false;
When the false proof device is verified as true, the NFC device reads the merchandise news and the open state.
9. method for anti-counterfeit according to claim 8, which is characterized in that the commodity circulation links, when the commodity are split When unloading or being opened, the step of false proof device is revised as the open state to have turned on state, specifically includes:
When the false proof device detects that the commodity or the commodity packaging are disassembled or are opened, the anti-camouflage is detected Whether the open state for setting interior storage is non-open state;
When it is non-open state to detect the open state, it is revised as the open state to have turned on state.
10. method for anti-counterfeit according to claim 9, which is characterized in that the encryption/decryption algorithm includes symmetry algorithm;With And the step of using the symmetry algorithm to carry out fake certification to the false proof device, it specifically includes:
The NFC device applies for the first random number to the authentication center, and first random number is sent to described anti-fake Device;
The false proof device calculates first random number using symmetric key, to obtain the first authentication data;
First authentication data is sent to authentication center by the NFC device, so that the authentication center is recognized described first Card data are verified;
After first authentication data is proved to be successful, the NFC device is incited somebody to action to second random number of false proof device application Second random number is sent to the authentication center;
The authentication center is calculated using the second random number described in the symmetrical secret key pair, to obtain the second certification number According to;
Second authentication data is sent to the false proof device by the NFC device, so that the false proof device is to described Two authentication datas are verified.
11. method for anti-counterfeit according to claim 10, which is characterized in that the initialization link, by NFC device to institute The step of false proof device carries out Initialize installation is stated, is specifically included:
The NFC device creates application file structure in the false proof device, and initialization data is updated to the application File structure;
The NFC device obtains the symmetric key to the authentication center, and the symmetric key is sent to described anti-fake Device;
The false proof device stores the symmetric key to the application file structure.
12. method for anti-counterfeit according to claim 9, which is characterized in that the encryption/decryption algorithm includes symmetry algorithm and non- The combination of symmetry algorithm;And anti-fake test is carried out to the false proof device using the combination of the symmetry algorithm and asymmetric arithmetic The step of card, specifically includes:
The NFC device reads the digital certificate stored in the false proof device, and the private by being stored in the false proof device Key signs to behavioral characteristics data, to obtain dynamic signature data;
The dynamic signature data and the digital certificate are sent to the authentication center by the NFC device;
The authentication center verifies the dynamic signature data and the digital certificate;
After the dynamic signature data and the digital certificate authentication pass through, the NFC device is applied to the authentication center Third random number, and the third random number is sent to the false proof device;
The false proof device calculates the third random number using the symmetric key, to obtain third authentication data;
The third authentication data is sent to authentication center by the NFC device, so that the third is recognized by the authentication center Card data are verified;
After the third authentication data is proved to be successful, the NFC device is incited somebody to action to the 4th random number of false proof device application 4th random number is sent to the authentication center;
The authentication center calculates the 4th random number using the symmetric key, to obtain the 4th authentication data;
4th authentication data is sent to the false proof device by the NFC device, so that the false proof device is to described Four authentication datas are verified.
13. method for anti-counterfeit according to claim 12, which is characterized in that the initialization link, by NFC device to institute The step of false proof device carries out Initialize installation is stated, is specifically included:
The NFC device creates application file structure in the false proof device, and initialization data is updated to the application File structure;
The false proof device generates unsymmetrical key pair, and the private key of the cipher key pair is stored to the application file Structure;
The public key of the cipher key pair is sent to authentication center by the NFC device, so that authentication center generation is corresponding Digital certificate;
The digital certificate is sent to the false proof device by the NFC device, so that the false proof device is by the number Word certificate is stored to the application file structure;
The NFC device obtains symmetric key to the authentication center;
The symmetric key is sent to the false proof device by the NFC device;
The false proof device stores the symmetric key to the application file structure.
14. the method for anti-counterfeit according to claim 11 or 13, which is characterized in that described to be verified as very in the false proof device When, it the step of NFC device reads the merchandise news and the open state, specifically includes:
Verify the false proof device be very after, the false proof device, which opens, reads the merchandise news and the open state Permission;
The NFC device reads the merchandise news and open state and is shown.
15. method for anti-counterfeit according to claim 14, which is characterized in that described when the false proof device is verified as true After NFC device reads the step of merchandise news and open state, further include:
Judge whether the NFC device there is information to add permission;
After judging that there is the NFC device described information to add permission, the NFC device obtains the 5th to the false proof device Random number;
5th random number and data to be added are sent to the authentication center by the NFC device;
The authentication center calculates the 5th random number and the data to be added using the symmetric key, with To the 5th authentication data;
5th authentication data and the data to be added are sent to the false proof device by the NFC device;
The false proof device verifies the 5th authentication data;
After the 5th authentication data is verified, the data to be added are stored to the false proof device.
CN201810709366.4A 2018-07-02 2018-07-02 Anti-counterfeiting device, anti-counterfeiting system and anti-counterfeiting method Active CN108573296B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810709366.4A CN108573296B (en) 2018-07-02 2018-07-02 Anti-counterfeiting device, anti-counterfeiting system and anti-counterfeiting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810709366.4A CN108573296B (en) 2018-07-02 2018-07-02 Anti-counterfeiting device, anti-counterfeiting system and anti-counterfeiting method

Publications (2)

Publication Number Publication Date
CN108573296A true CN108573296A (en) 2018-09-25
CN108573296B CN108573296B (en) 2024-03-15

Family

ID=63573765

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810709366.4A Active CN108573296B (en) 2018-07-02 2018-07-02 Anti-counterfeiting device, anti-counterfeiting system and anti-counterfeiting method

Country Status (1)

Country Link
CN (1) CN108573296B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110288072A (en) * 2019-07-19 2019-09-27 云南纳光科技有限公司 By the way that power source can be activated to realize the NFC anti-counterfeiting chip of anti-tamper detection function
CN110298431A (en) * 2019-07-19 2019-10-01 云南纳光科技有限公司 It is a kind of with the active NFC anti-counterfeiting chip for distorting dynamic detection function
CN111784368A (en) * 2020-07-01 2020-10-16 上海弗乐酒店用品有限公司 Intelligent anti-counterfeit package
CN111884683A (en) * 2020-06-11 2020-11-03 北京奇禹科技有限公司 NFC detection system with high credibility perception capability
CN112541769A (en) * 2020-10-21 2021-03-23 林松 NFC (near field communication) graphic identifier based authenticity verification method, device and equipment
CN112801674A (en) * 2021-02-02 2021-05-14 中钞印制技术研究院有限公司 Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting product

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101042736A (en) * 2006-03-24 2007-09-26 中国银联股份有限公司 Smart card and method for accessing objects in smart card
CN104320250A (en) * 2014-08-12 2015-01-28 北京傲飞商智软件有限公司 Anti-counterfeiting authentication method based on NFC chip
CN104320252A (en) * 2014-09-26 2015-01-28 大连声鹭科技有限公司 A mobile online tracking and verifying electronic smart seal, electronic seal extraction management system and verifying method
CN104517132A (en) * 2013-09-30 2015-04-15 无锡智双科技有限公司 Method for anti-counterfeit intelligent RIFD electronic tag chip
CN106599975A (en) * 2016-12-16 2017-04-26 湖北华威科智能股份有限公司 Intelligent RFID electronic tag capable of instantly perceiving enable state
CN106997540A (en) * 2017-03-22 2017-08-01 北京向芯力科技有限公司 A kind of commodity counterfeit prevention traceability system and method based on dual authentication mechanism
CN208314828U (en) * 2018-07-02 2019-01-01 北京广弘电子信息技术有限公司 False proof device and anti-counterfeiting system

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102480355A (en) * 2011-03-18 2012-05-30 贾松仁 Anti-counterfeiting method and anti-counterfeiting device with dynamic token
CN104217335A (en) * 2013-06-05 2014-12-17 北京数码视讯科技股份有限公司 Storing device and method for commodity authenticity verification information, and commodity authenticity verification method
CN103326864B (en) * 2013-06-24 2016-03-09 詹万泉 A kind of electronic tag anti-fake authentication method
CN104574092A (en) * 2013-10-19 2015-04-29 周刚 Commodity anti-counterfeiting system based on invoice and commodity stocks accounting and anti-counterfeiting method
CN104281876A (en) * 2014-07-10 2015-01-14 上海雅海网络科技有限公司 Anti-counterfeiting method based on chip hardware ID
CN104217241A (en) * 2014-08-21 2014-12-17 安徽云盾信息技术有限公司 Electronic anti-fake label and realizing method
CN104680389A (en) * 2015-03-13 2015-06-03 杭州沃朴物联科技有限公司 NFC mobile phone terminal anti-fake system and method based on time encryption
CN106296224A (en) * 2016-08-09 2017-01-04 镇江惠通电子有限公司 Method for anti-counterfeit, device and commodity packaging for commodity packaging
CN107886333A (en) * 2016-09-29 2018-04-06 珠海晶通科技有限公司 A kind of Antiforge system and its method for anti-counterfeit with dynamic anti-fake information

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101042736A (en) * 2006-03-24 2007-09-26 中国银联股份有限公司 Smart card and method for accessing objects in smart card
CN104517132A (en) * 2013-09-30 2015-04-15 无锡智双科技有限公司 Method for anti-counterfeit intelligent RIFD electronic tag chip
CN104320250A (en) * 2014-08-12 2015-01-28 北京傲飞商智软件有限公司 Anti-counterfeiting authentication method based on NFC chip
CN104320252A (en) * 2014-09-26 2015-01-28 大连声鹭科技有限公司 A mobile online tracking and verifying electronic smart seal, electronic seal extraction management system and verifying method
CN106599975A (en) * 2016-12-16 2017-04-26 湖北华威科智能股份有限公司 Intelligent RFID electronic tag capable of instantly perceiving enable state
CN106997540A (en) * 2017-03-22 2017-08-01 北京向芯力科技有限公司 A kind of commodity counterfeit prevention traceability system and method based on dual authentication mechanism
CN208314828U (en) * 2018-07-02 2019-01-01 北京广弘电子信息技术有限公司 False proof device and anti-counterfeiting system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110288072A (en) * 2019-07-19 2019-09-27 云南纳光科技有限公司 By the way that power source can be activated to realize the NFC anti-counterfeiting chip of anti-tamper detection function
CN110298431A (en) * 2019-07-19 2019-10-01 云南纳光科技有限公司 It is a kind of with the active NFC anti-counterfeiting chip for distorting dynamic detection function
CN111884683A (en) * 2020-06-11 2020-11-03 北京奇禹科技有限公司 NFC detection system with high credibility perception capability
CN111784368A (en) * 2020-07-01 2020-10-16 上海弗乐酒店用品有限公司 Intelligent anti-counterfeit package
CN112541769A (en) * 2020-10-21 2021-03-23 林松 NFC (near field communication) graphic identifier based authenticity verification method, device and equipment
CN112801674A (en) * 2021-02-02 2021-05-14 中钞印制技术研究院有限公司 Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting product
CN112801674B (en) * 2021-02-02 2024-03-01 中钞印制技术研究院有限公司 Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting product

Also Published As

Publication number Publication date
CN108573296B (en) 2024-03-15

Similar Documents

Publication Publication Date Title
CN108573296A (en) False proof device, anti-counterfeiting system and method for anti-counterfeit
JP5139415B2 (en) Article information acquisition method and apparatus
KR101210631B1 (en) Anti-fake battery pack and identification system thereof
EP3017580B1 (en) Signatures for near field communications
CN101490698A (en) Component authentication for computer systems
EA008280B1 (en) Contactless type communication tag, portable tag reader for verifying a genuine article, and method for providing information of whether an article is genuine or not
CN107231231B (en) Method and system for terminal equipment to safely access Internet of things
CN104794626B (en) A kind of method for anti-counterfeit and device based on hardware information
CN101562040A (en) High-security mobile memory and data processing method thereof
CN107038587A (en) A kind of Bluetooth label verified based on service end and its method for anti-counterfeit
US9679117B2 (en) System and method for obtaining an authorization key to use a product
CN101504731B (en) Movable recognition system based on NFC
CN109328444A (en) Protect equipment and softdog and its application method
CN103235995A (en) Electronic anti-counterfeiting and logistics management system based on NFC (near field communication) mobile phone
KR101527582B1 (en) System for verifying product genuineness using double security key and method thereof
CN208314828U (en) False proof device and anti-counterfeiting system
CN116561822A (en) Product anti-counterfeiting method, component and system
KR101879326B1 (en) Method and device for transmitting and receiving instruction information
US9672505B2 (en) Method for verifying the authenticity of a terminal, corresponding device and program
CN112862047B (en) Dual-authorization intelligent anti-counterfeit label generation method
EP2770663A1 (en) Encryption Key-Based Product Authentication System and Method
US9734366B2 (en) Tamper credential
WO2014134827A1 (en) System and method for authentication
CN206115462U (en) System for filter element group spare reaches rather than paiing
US11164185B2 (en) Method for control of authenticity of a payment terminal and terminal thus secured

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant