CN108573296A - False proof device, anti-counterfeiting system and method for anti-counterfeit - Google Patents
False proof device, anti-counterfeiting system and method for anti-counterfeit Download PDFInfo
- Publication number
- CN108573296A CN108573296A CN201810709366.4A CN201810709366A CN108573296A CN 108573296 A CN108573296 A CN 108573296A CN 201810709366 A CN201810709366 A CN 201810709366A CN 108573296 A CN108573296 A CN 108573296A
- Authority
- CN
- China
- Prior art keywords
- false proof
- proof device
- commodity
- open state
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 238000004806 packaging method and process Methods 0.000 claims abstract description 72
- 238000004891 communication Methods 0.000 claims abstract description 11
- 230000005540 biological transmission Effects 0.000 claims description 27
- 238000007726 management method Methods 0.000 claims description 19
- 230000008447 perception Effects 0.000 claims description 14
- 238000004519 manufacturing process Methods 0.000 claims description 13
- 230000006870 function Effects 0.000 claims description 7
- 238000009434 installation Methods 0.000 claims description 7
- 230000000153 supplemental effect Effects 0.000 claims description 7
- 238000013500 data storage Methods 0.000 claims description 5
- 238000012795 verification Methods 0.000 claims description 5
- 238000012360 testing method Methods 0.000 claims description 4
- 230000009471 action Effects 0.000 claims description 3
- 230000003542 behavioural effect Effects 0.000 claims description 2
- 241001269238 Data Species 0.000 claims 2
- 230000002265 prevention Effects 0.000 abstract description 4
- 238000005516 engineering process Methods 0.000 description 9
- 230000000694 effects Effects 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000005611 electricity Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000001960 triggered effect Effects 0.000 description 3
- 230000007547 defect Effects 0.000 description 2
- 230000005484 gravity Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 230000001939 inductive effect Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 239000003607 modifier Substances 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000004064 recycling Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
- G06K17/0029—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Cash Registers Or Receiving Machines (AREA)
Abstract
The present invention relates to a kind of false proof device, anti-counterfeiting system and method for anti-counterfeit, false proof device is set in commodity or commodity packaging, electronic anti-fogery module, state aware module and power module;Wherein, electronic anti-fogery module includes:NFC communication unit, storage unit are used to carry out dynamic authentication to anti-fake data by encryption/decryption algorithm for the anti-fake data of secure storage, the merchandise news of commodity and commodity or the open state and fake certification unit of commodity packaging;State aware module is connected to electronic anti-fogery module, the open state for perceiving commodity or commodity packaging, and when open state changes, and triggering electronic anti-fogery module updates open state;Power module is connected to state aware module, for providing electric energy for state aware module.The present invention can perceive the open state of commodity or commodity packaging by state aware module, and be recorded, and be effectively prevented the utilization again of false proof device, improve the reliability of commodity counterfeit prevention.
Description
Technical field
The present invention relates to a kind of anti-counterfeit field more particularly to false proof device, anti-counterfeiting system and method for anti-counterfeit.
Background technology
With becoming increasingly abundant for people's living standard, various high value-added products are constantly released, and it is daily to meet people
Demand, while these commodity are also the main target of criminal's manufacturing and marketing the fake, have upset market, to consumer, enterprise and
Dealer brings very big economic loss, while also having seriously affected enterprise product research and development enthusiasm, is unfavorable for enterprise and society
The development of meeting.Therefore the anti-counterfeiting technology of product constantly updates development also with the development in epoch and the progress of technology.Early stage people
Can be by particularly customized package design, special printing technology carries out the anti-fake of product, the code anti-fake that then grows up,
The technologies such as laser anti-counterfeit and fragile paper be anti-it is anti-fake, meet the demand to product false proof to a certain extent, but it is horizontal to manufacture the fake
Also it is gradually increased, above-mentioned product false proof in some fatal defects, can not prevent the appearance of fake products, this anti-fake hand
Section also can only be as a kind of means of auxiliary.Also there is newest anti-counterfeiting technology and method, mainly RFID (Radio at present
Frequency Identification, i.e. radio frequency identification) label anti-counterfeit, NFC (Near Field Communication, i.e.,
Wireless near field communication) safety chip is anti-fake etc..
RFID tag is anti-fake mainly by reading the unique sequence numbers of tag memory storage, then inquires the sequence in systems
Number corresponding product information is to realize the anti-fake of product.RFID manufacturers are on the increase in recent years, and RFID product categories are also constantly rich
Richness, since RFID products are without corresponding security mechanism, RFID is mainly used in logistics management etc. to security requirement
The reduction in not high field, the technical threshold of RFID also leads to the RFID for erasable sequence number occur, so this kind of anti-counterfeiting technology is deposited
In fatal defect.
Anti-fake NFC safety chips are that the anti-fake product easily torn to pieces antenna and made is added using secure NFC chip, main to utilize
The modes such as the dynamic encryption and safety certification of safety chip complete the certification to chip, have reached the mesh of the indirect certified product true and false
, prevent the duplication to NFC safety chips substantially, easily tearing to pieces antenna mode makes safety chip by destroying after product unlatching
It can not work, prevent false making molecule using genuine piece packaging false making, this plays anti-fake purpose, but this kind of side to a certain extent
Method has two, and a problem is to reconnect antenna after false making molecule can take out NFC safety chips and put
Onto false product packaging, anti-fake effect is not had not only if done so, but also boosting fake products sale;It is another
A problem is that NFC safety chips can not be read again after product is opened, therefore inquiry of consumer during subsequent product use is recognized
Card operation can not be completed.
Invention content
Technical problem to be solved by the present invention lies in, a kind of false proof device, anti-counterfeiting system and method for anti-counterfeit are provided, it can
It perceives commodity or whether commodity packaging is opened or be disassembled, and commodity or commodity packaging open state are stored, into
And enable to user during verifying the true and false, it views commodity or whether commodity packaging is opened or be disassembled, and
It will be unable to return to non-open state after commodity or commodity packaging are opened or are disassembled, and then effectively prevent false proof device
Reuse, improve the reliability of commodity counterfeit prevention.
In order to solve the above-mentioned technical problem, the first aspect of the present invention provides a kind of false proof device, be set to commodity or
In commodity packaging, including:Electronic anti-fogery module, state aware module and power module.
Wherein, electronic anti-fogery module includes:NFC communication unit, storage unit is for secure storage anti-fake data, commodity
The open state and fake certification unit of merchandise news and commodity or commodity packaging are used for through encryption/decryption algorithm to anti-fake
Data carry out dynamic authentication;
State aware module is connected to electronic anti-fogery module, the open state for perceiving commodity or commodity packaging, and
When open state changes, triggering electronic anti-fogery module updates open state;
Power module is connected to state aware module, for providing electric energy for state aware module.
Further, open state includes non-open state and has turned on state;And state aware module includes opening
State aware unit, open state perceive unit and are used to trigger electronic anti-fogery module when commodity or commodity packaging are opened, with
It is to have turned on state to make electronic anti-fogery module update open state.
Further, state aware module further includes disassembly status perception unit, and disassembly status perceives unit and is used in quotient
Electronic anti-fogery module is triggered when product or commodity packaging are disassembled, so that electronic anti-fogery module update open state is to have turned on shape
State.
Further, encryption/decryption algorithm includes the combination of symmetry algorithm or symmetry algorithm and asymmetric arithmetic.
Further, electronic anti-fogery module further includes:File management unit, security managing unit, data transmission unit and
Data storage management unit.
Wherein, file management unit is used to create one or more application or file, and to one or more application or text
Part is managed;
Security managing unit is used to carry out safe calculating and access control to one or more application and file;
Data transmission unit be used for using plaintext transmission, ciphertext transmission and check code transmission in it is one or more with it is external
Carry out the data transmission of anti-fake data, merchandise news and open state;
The power down that data storage management unit is used for anti-fake data, merchandise news and open state in electronic anti-fogery module is protected
The safe read-write of shield and storage unit.
Further, false proof device further includes:Supplemental functionality, supplemental functionality are respectively connected to electronic anti-fogery mould
Block, state aware module and power module, for controlling power module to electronic anti-fogery according to state aware module operating status
The electricity of label output.
According to a second aspect of the present invention, a kind of anti-counterfeiting system is also provided, including:NFC device, authentication center and first aspect
The false proof device;
Wherein, NFC device has the function of short-distance wireless communication and network communicating function, in false proof device and certification
Data transmission in the heart, and show true and false, commodity the merchandise newss and commodity or the open state of commodity packaging of false proof device;
Authentication center, for generating, transmitting, store and managing anti-fake data, using symmetry algorithm or symmetry algorithm and non-
The anti-fake data stored in false proof device are verified in the combination of symmetry algorithm, to be verified to the true and false of false proof device.
According to a third aspect of the present invention, a kind of method for anti-counterfeit is also provided, for the anti-counterfeiting system described in second aspect, packet
It includes:
Link is initialized, Initialize installation is carried out to false proof device by NFC device;
Production packaging link carries out fake certification to false proof device by encryption/decryption algorithm, and tests false proof device is anti-fake
After card passes through, the merchandise news of commodity is updated in false proof device, sets not commodity or the open state of commodity packaging to
Open state;
Commodity circulation links, when commodity or commodity packaging are disassembled or are opened, false proof device changes open state
To have turned on state;
Fake certification link carries out fake certification, to verify the true of false proof device by encryption/decryption algorithm to false proof device
It is false;
When false proof device is verified as true, NFC device reads merchandise news and open state.
Further, commodity circulation links, when commodity are disassembled or are opened, open state is revised as by false proof device
The step of having turned on state specifically includes:
When detecting that commodity or commodity packaging are disassembled or are opened by false proof device, storage in detection false proof device
Open state whether be non-open state;
When it is non-open state to detect open state, open state is revised as to have turned on state.
Further, encryption/decryption algorithm is symmetry algorithm;And fake certification is carried out to false proof device using symmetry algorithm
The step of, it specifically includes:
NFC device applies for the first random number to authentication center, and the first random number is sent to false proof device;
False proof device is calculated using the first random number of symmetric key pair, to obtain the first authentication data;
First authentication data is sent to authentication center by NFC device, so that the first authentication data of authentication center pair is tested
Card;
After the first authentication data is proved to be successful, NFC device is and random by second to the second random number of false proof device application
Number is sent to authentication center;
Authentication center is calculated using the second random number of symmetrical secret key pair, to obtain the second authentication data;
Second authentication data is sent to false proof device by NFC device, so that the second authentication data of false proof device pair is tested
Card.
Further, the step of initializing link, Initialize installation carried out to false proof device by NFC device, it is specific to wrap
It includes:
NFC device creates application file structure in false proof device, and initialization data is updated to application file structure;
NFC device obtains symmetric key to authentication center;
Symmetric key is sent to false proof device by NFC device;
False proof device stores symmetric key to application file structure.
Further, encryption/decryption algorithm includes the combination of symmetry algorithm and asymmetric arithmetic;And using symmetry algorithm and
The step of combination of asymmetric arithmetic carries out fake certification to false proof device, specifically includes:
NFC device reads the digital certificate stored in false proof device, and the private key by being stored in false proof device is to dynamic
Characteristic is signed, to obtain dynamic signature data;
Dynamic signature data and digital certificate are sent to authentication center by NFC device;
Authentication center verifies dynamic signature data and digital certificate;
After dynamic signature data and digital certificate authentication pass through, NFC device applies for third random number to authentication center, and
Third random number is sent to false proof device;
False proof device calculates third random number using symmetric key, to obtain third authentication data;
Third authentication data is sent to authentication center by NFC device, so that authentication center tests third authentication data
Card;
After third authentication data is proved to be successful, NFC device is and random by the 4th to the 4th random number of false proof device application
Number is sent to authentication center;
Authentication center is calculated using the 4th random number of symmetric key pair, to obtain the 4th authentication data;
4th authentication data is sent to false proof device by NFC device, so that the 4th authentication data of false proof device pair is tested
Card.
Further, the step of initializing link, Initialize installation carried out to false proof device by NFC device, it is specific to wrap
It includes:
NFC device creates application file structure in false proof device, and initialization data is updated to application file structure;
False proof device generates unsymmetrical key pair, and the private key of cipher key pair is stored to application file structure;
The public key of cipher key pair is sent to authentication center by NFC device, so that authentication center generates corresponding digital certificate;
Digital certificate is sent to false proof device by NFC device, so that false proof device extremely applies digital certificate store
File structure;
NFC device obtains symmetric key to authentication center;
Symmetric key is sent to false proof device by NFC device;
False proof device stores symmetric key to application file structure.
Further, when false proof device is verified as true, NFC device reads merchandise news and the step of open state, tool
Body includes:
After verification false proof device is very, false proof device opens the permission for reading merchandise news and open state;
NFC device reads merchandise news and open state and is shown.
Further, when false proof device is verified as true, NFC device read merchandise news and the step of open state it
Afterwards, further include:
Judge whether NFC device there is information to add permission;
After judging that NFC device has breath addition permission, NFC device obtains the 5th random number to false proof device;
5th random number and data to be added are sent to authentication center by NFC device;
Authentication center is calculated using the 5th random number of symmetric key pair and data to be added, to obtain out the 5th certification
Data;
5th authentication data and data to be added are sent to false proof device by NFC device;
The 5th authentication data of false proof device pair is verified;
After the 5th authentication data is verified, data to be added are stored to false proof device.
The present invention has clear advantage and advantageous effect compared with prior art.By above-mentioned technical proposal, the present invention
A kind of false proof device, anti-counterfeiting system and method for anti-counterfeit can reach comparable technological progress and practicability, and in industry
Extensive utility value at least has following advantages:
The present invention can perceive commodity or whether commodity packaging is opened or be disassembled, and commodity or commodity packaging are opened
The state of opening is stored, and then enables to user during verifying the true and false, view commodity or commodity packaging whether by
It opens or is disassembled, and will be unable to the non-open state of return, Jin Eryou after commodity or commodity packaging are opened or are disassembled
Reusing for false proof device is prevented to effect, improves the reliability of commodity counterfeit prevention, and false proof device is calculated by enciphering/deciphering
Method and anti-tamper security certification are effectively prevented false proof device and are replicated.
Above description is only the general introduction of technical solution of the present invention, in order to better understand the technical means of the present invention,
And can be implemented in accordance with the contents of the specification, and in order to allow the above and other objects, features and advantages of the present invention can
It is clearer and more comprehensible, it is special below to lift preferred embodiment, and coordinate attached drawing, detailed description are as follows.
Description of the drawings
Fig. 1 is the schematic block diagram of the false proof device of the embodiment of the present invention;
Fig. 2 is the schematic block diagram of anti-counterfeiting system of the embodiment of the present invention;
Fig. 3 is the flow diagram of the method for anti-counterfeit of the embodiment of the present invention.
Specific implementation mode
It is of the invention to reach the technological means and effect that predetermined goal of the invention is taken further to illustrate, below in conjunction with
Attached drawing and preferred embodiment, the specific implementation to a kind of false proof device, anti-counterfeiting system and the method for anti-counterfeit that propose according to the present invention
Mode and its effect are described in detail as after.
As shown in Figure 1, the embodiment of the present invention provides a kind of false proof device, it is set in commodity or commodity packaging, including:Electricity
The anti-fake module 10 of son, state aware module 20 and power module 30;Wherein, electronic anti-fogery module 10 includes:NFC communication unit
101, storage unit 102 is used for the anti-fake data of secure storage, the merchandise news of commodity and commodity or the open state of commodity packaging,
And fake certification unit 103 is used to carry out dynamic authentication to anti-fake data by encryption/decryption algorithm;State aware module 20 connects
It is connected to electronic anti-fogery module 10, the open state for perceiving commodity or commodity packaging, and when open state changes, touch
It sends out electronic anti-fogery module 10 and updates open state;Power module 30 is connected to state aware module 20, for being state aware mould
Block 20 provides electric energy.
Specifically, NFC communication unit 101 has the function of NFC communication, meets 14443 TYPE A/B agreements of ISO, carrier wave
Frequency is 13.56MHz;Power module 30 can be disposable battery, can also rechargeable battery, and support to rechargeable battery
It is charged using charging modes wirelessly or non-wirelessly, wherein the anti-fake data stored in storage unit 102 include:It is symmetrical close
The data such as key, unsymmetrical key and digital certificate;The merchandise news of commodity includes:Trade name, the place of production, the date of manufacture, effectively
The information such as phase.
Further, in above-mentioned false proof device, the open state of commodity or commodity packaging includes non-open state and
Open state.
Further, state aware module 20 has the function of state aware, passes through sensor or the break-make shape of inductive switch
State judges the open state of commodity or commodity packaging, once commodity or commodity packaging are opened, then passes through built-in operating system
Setting rule the open state of the commodity or commodity packaging that are stored in the storage unit 102 of electronic anti-fogery module 10 is updated to
Have turned on state, and updated state be can not inverse operation, unless could be to the opening state after specific authorization identifying
State carries out reset operation.It prevents from carrying out illegal secondary utilization to the device.
In a specific embodiment, as shown in Figure 1, state aware module 20 includes open state perception unit 201,
When commodity or commodity packaging are opened, open state perception unit 201 can be triggered, and then open state perception unit 201 produces
Raw trigger signal is sent to electronic anti-fogery module 10, and receiving open state perception unit 201 in electronic anti-fogery module 10 gives birth to
At trigger signal after, commodity or the open state of commodity packaging in electronic anti-fogery module 10 will be stored in and be revised as having turned on shape
State.Wherein open state perception unit 201 can be resistance sensor, gravity sensor, photosensitive sensor, temperature sensing
Device, pressure sensor etc..
In another specific embodiment, state aware module 20 is also wrapped while perceiving unit 201 including open state
Disassembly status perception unit 202 is included, when commodity or commodity packaging are illegally dismantled, disassembly status perception unit 202 can be triggered,
And then the trigger signal that disassembly status perception unit 202 generates is sent to electronic anti-fogery module 10, is connect in electronic anti-fogery module 10
After receiving the trigger signal that disassembly status perception unit 202 generates, commodity or commodity bundle in electronic anti-fogery module 10 will be stored in
The open state of dress is revised as having turned on state, and then effectively prevents the recycling of false proof device, improves anti-camouflage
The anti-fake reliability set.Wherein disassembly status perception unit 202 can be resistance sensor, gravity sensor, light sensor
Device, temperature sensor, pressure sensor etc..
Further, in above-mentioned false proof device, fake certification unit 103 includes at DES protocol processor and PKE public keys
Manage device, and then during carrying out fake certification, encryption/decryption algorithm can support DES algorithms, 3DES algorithms, the close SM1 of state and
The symmetry algorithms such as the close SM4 algorithms of state, while supporting the asymmetric arithmetics such as the close SM2 algorithms of RSA Algorithm, state, provide state close SM3 softwares
Library and memory-safe protection mechanism.
Further, above-mentioned false proof device, electronic anti-fogery module 10 further include:File management unit 104, safety management
Unit 105, data transmission unit 106 and data MMU memory management unit 107.
Wherein, file management unit 104, for creating one or more application or file, and to one or more application
Or file is managed;Security managing unit 105, for carrying out safe calculating and accessing to control to one or more application and file
System;Data transmission unit 106, for using plaintext transmission, ciphertext transmission and check code transmission in it is one or more with it is external
Carry out the data transmission of anti-fake data, merchandise news and open state;Data storage management unit 107 is used for electronic anti-fogery mould
The safe read-write of anti-fake data in block 10, the power down protection of merchandise news and open state and storage unit 102.
Specifically, file management unit 104 can be according to the use demand of false proof device inside electronic anti-fogery module 10
Multistage catalogue file is created, and creates different applications according to the functional requirement of application, and to the different applications and text of establishment
Part is individually managed;Security managing unit 105 can be fire wall so that the different application that file management unit 104 creates
Between safe condition and rights management be to manage independently;Data transmission unit 106 is used in electronic anti-fogery module 10 and outside
When read-write equipment carries out data exchange, using one or more into line number in plaintext transmission, ciphertext transmission and check code transmission
According to transmission, to ensure the safety of data transmission, specifically transmission data includes anti-fake data, the merchandise news of commodity and commodity
Or the data such as open state of commodity packaging;Data storage management unit 107 is used to back up the storage list of electronic anti-fogery module 10
Anti-fake data, the merchandise news of commodity and the data such as commodity or the open state of commodity packaging stored in member 102, so that energy
Situations such as powering off, ensures that above-mentioned data are not lost, and can after abnormal conditions exclusion
Restore the data of backup.
Meanwhile electronic anti-fogery module 10 can also support transparent file, fixed-length record file, variable-length record file, cycle
Record the multiple file types such as file and secure file.
Further, above-mentioned false proof device further includes supplemental functionality 40, which is respectively connected to
Electronic anti-fogery module 10, state aware module 20 and power module 30, the operating status for obtaining state aware module 20, and
The electricity that power module 30 is exported to electronic anti-fogery module 10 is controlled according to operating status.
It is understood that in order to play the purpose for saving electric energy, the electronic anti-fogery module 10 when false proof device does not work
It does not power, and when commodity or commodity packaging are opened or are disassembled, meeting triggering state sensing module 20 acts, when auxiliary work(
When energy module 40 gets the action of state aware module 20, supplemental functionality 40 can control power module 30 to electronic anti-fogery mould
Block 10 is powered, so that electronic anti-fogery module 10 is capable of the open state of more new commodity or commodity packaging.
Further, supplemental functionality 40 can also prevent commodity or commodity packaging from being shaken in the links such as transport
And state aware module 20 is caused to generate trigger signal, lead to the change of the open state of commodity or commodity packaging, effectively carries
The accuracy that state aware module 20 perceives commodity or commodity packaging open state is risen.
According to the second aspect of the invention, as shown in Fig. 2, the embodiment of the present invention additionally provides a kind of anti-counterfeiting system, including:
False proof device 3 described in NFC device 1, authentication center 2 and first aspect;Wherein, NFC device 1 has short-distance wireless communication work(
Energy and network communicating function for the data transmission between false proof device 3 and authentication center 2, and show the anti-fake letter of false proof device 3
Breath and commodity or the open state of commodity packaging;Authentication center 2 uses for generating, transmitting, store and managing anti-fake data
The anti-fake data stored in false proof device 3 are verified in the combination of symmetry algorithm or symmetry algorithm and asymmetric arithmetic, with right
The true and false of false proof device 3 is verified.
Specifically, NFC device 1 can be special NFC equipment, can also be equipped with specific identification software mobile phone or
The mobile terminals such as tablet computer, the NFC device 1 can will prevent during authentication center 2 is authenticated false proof device 3
Data in pseudo-device 3, such as digital certificate, unsymmetrical key etc. are transferred to authentication center 2, by the data in authentication center 2,
For example digital certificate, symmetric key etc. are transmitted to false proof device 3, and after the completion of 3 certification of false proof device, show false proof device
3 anti-counterfeiting information, for example, false proof device 3 information, the merchandise news of display of commodity, such as trade name, the place of production, the life such as true and false
The open state of the information such as date, the term of validity, display of commodity or commodity packaging is produced, for example has turned on state or non-open state.
According to a third aspect of the present invention, as shown in figure 3, the embodiment of the present invention also provides a kind of method for anti-counterfeit, for such as the
Anti-counterfeiting system described in two aspects, the method for anti-counterfeit include:
Step S302 initializes link, and Initialize installation is carried out to false proof device by NFC device.
It is appreciated that initialization link is the starting point of false proof device life cycle, it is anti-fake by initializing the processing of link
Device has unique identity identification information, and then has ensured that false proof device is not reproducible and forges.
The encryption/decryption algorithm used when false proof device carries out fake certification can be symmetry algorithm, can also be symmetrical
The combination of algorithm and asymmetric arithmetic.And when using different algorithms, false proof device is carried out in initialization link initial
Change setting also to differ.
In being embodied at one, when carrying out fake certification to false proof device using symmetry algorithm, link is being initialized,
It creates application file structure in false proof device by NFC device first, different applications is created according to the difference of application scenarios
File structure, including master file, application file (such as anti-counterfeit recognition application, commodity application and logistical applications), key file, two
Binary file and catalogue file etc..
And then ready initialization data is updated in corresponding application file structure, which includes anti-
Pseudo-device number, card issuer's data, using recipient's mark, enable date, validity date, application field, version and mark etc..
Further, symmetric key is obtained to authentication center by NFC device, and symmetric key is stored in false proof device
In application file structure in, specifically, can store into key file.
In another specific embodiment, false proof device is prevented when using the combination of symmetry algorithm and asymmetric arithmetic
When puppet verification, in initialization link, application file structure is created in false proof device by NFC device first, according to applied field
The difference of scape creates different application file structures, including master file, application file (such as anti-counterfeit recognition application, commodity application and
Logistical applications etc.), key file, binary file, catalogue file and digital certificate files etc..
And then ready initialization data is updated in corresponding application file structure, which includes anti-
Pseudo-device number, card issuer's data, using recipient's mark, enable date, validity date, application field, version and mark etc..
False proof device generates unsymmetrical key pair, which, will be public by NFC device to including public key and private key
Key is sent to authentication center, and authentication center generates digital certificate by the public key received, and then the digital certificate of generation is led to
It crosses NFC device and is sent to false proof device, false proof device is after receiving digital certificate, by the digital certificate store to application file
In structure, specifically, it can be stored in digital certificate files, and private key is then stored in the application file structure of false proof device
In, it can specifically be stored in key file.
Further, symmetric key is obtained to authentication center by NFC device, and symmetric key is stored in false proof device
In application file structure in, specifically, can store into key file.
Step S304, production packaging link carry out fake certification by encryption/decryption algorithm to false proof device, and anti-fake
After device fake certification passes through, the merchandise news of commodity is updated in false proof device, by commodity or the opening state of commodity packaging
State is set as non-open state.
Specifically, encryption/decryption algorithm can be symmetry algorithm, can also be the combination of symmetry algorithm and asymmetric arithmetic.
In a specific embodiment, when being verified to false proof device using symmetry algorithm, NFC device is into certification
The first random number applied is sent to false proof device by the first random number of heart application, NFC device, and is received in false proof device
It after one random number, is calculated using the first random number of symmetric key pair, to obtain the first authentication data, and then is set by NFC
Standby to be sent to authentication center through the first authentication data, the first authentication data of authentication center pair is verified, if authentication failed, is led to
NFC device prompt user authentication failure is crossed, if being verified, NFC device is to the second random number of false proof device application, and by the
Two random numbers are sent to authentication center, and authentication center passes through the second random number of symmetric key pair after receiving the second random number
It is calculated, to obtain the second authentication data, and then the second authentication data is sent to by false proof device by NFC device, it is anti-fake
The second authentication data of device pair is verified.
In another specific embodiment, false proof device is tested when using the combination of symmetry algorithm and asymmetric arithmetic
When card, NFC device reads the digital certificate stored in false proof device, and the private key by being stored in false proof device is to NFC device
In behavioral characteristics data sign, to obtain dynamic signature data, and then digital certificate and dynamic signature data are sent
To authentication center, authentication center verifies the digital certificate and dynamic signature data that receive.
If authentication failed, user's checking failure is prompted by NFC device, if being proved to be successful, NFC device is to authentication center
Apply for that the third random number applied is sent to false proof device, third is received in false proof device by third random number, NFC device
After random number, third random number is calculated using symmetric key, to obtain third authentication data, and then passes through NFC device
It is sent to authentication center through third authentication data, authentication center verifies third authentication data.If authentication failed passes through
NFC device prompts user authentication failure, if being verified, NFC device is to the 4th random number of false proof device application, and by the 4th
Random number is sent to authentication center, authentication center after receiving the 4th random number, by the 4th random number of symmetric key pair into
Row calculates, and to obtain the 4th authentication data, and then the 4th authentication data is sent to false proof device, anti-camouflage by NFC device
It sets and the 4th authentication data is verified.
Further, after false proof device is verified, merchandise news is updated in false proof device, so that false proof device
Merchandise news is stored, which includes trade name, the place of production, date of manufacture and term of validity etc..
Further, the open state of the commodity stored in false proof device or commodity packaging is stored as by NFC device
Non- open state.
Step S306 commodity circulation links, when commodity or commodity packaging are disassembled or are opened, false proof device will be opened
Status modifier is to have turned on state.
Specifically, false proof device can perceive commodity or whether commodity packaging is opened or be disassembled, therefore in Commodity Flow
Logical link, when false proof device, which perceives commodity or commodity packaging, to be opened or be disassembled, false proof device can read storage inside
Commodity or commodity packaging open state, if open state is when having turned on, to illustrate that commodity or commodity packaging have been opened
It crosses, if open state is non-open state, false proof device can be revised as the open state of storage to have turned on state.
It is understood that if commodity or commodity packaging are to open for the first time, but the commodity that are stored in false proof device or
The open state of commodity packaging is to have turned on state, then after illustrating that false proof device is disassembled, device is on commodity or commodity packaging
Secondary use is carried out, and then may determine that the commodity are counterfeit goods.
Step S308, fake certification link carry out fake certification by encryption/decryption algorithm to false proof device, anti-to verify
Pseudo-device it is true and false.
Specifically, encryption/decryption algorithm can be symmetry algorithm, can also be the combination of symmetry algorithm and asymmetric arithmetic,
Specific verification mode with above-mentioned production packaging link in such a way that symmetry algorithm carries out false proof device fake certification and
It is identical by the way of the combination progress fake certification of symmetry algorithm and asymmetric arithmetic, it is no longer repeated herein.
Step S310, when false proof device is verified as true, NFC device reads merchandise news and open state.
Specifically, work as fake certification link, it is anti-by the combined authentication of symmetry algorithm or symmetry algorithm and asymmetric arithmetic
When camouflage is set to true, false proof device, which can open, reads merchandise news and commodity or the open state of commodity packaging, and then passes through NFC
Equipment is that the merchandise news stored in false proof device and commodity or the open state of commodity packaging can be read, and is enabled a user to
Recognize the information such as trade name, the place of production, date of manufacture, the term of validity of commodity, and can recognize commodity or commodity packaging
Whether had been turned on, and then to judge whether false proof device is secondary use.
Further, after user reads the opening imformation of merchandise news and commodity or commodity packaging by NFC device,
When needing to add other information, for example, logistics information, management information etc., need the information addition permission to NFC device to test
Card can verify log-on message (such as login name information) to judge whether NFC device there is information to add permission, also may be used certainly
To be verified by other means.
When NFC device information addition Authority Verification pass through after, NFC device to the 5th random number of false proof device application, and
5th random number and information to be added are sent to authentication center, authentication center is by receiving the 5th random number and letter to be added
Breath calculates the 5th authentication data, and then the 5th authentication data and information to be added are sent to false proof device by NFC device.
The 5th authentication data and information to be added are received in false proof device, the 5th authentication data verify, and
Data to be added are stored in corresponding file after being verified, so as to follow-up tracing management, certainly can also according to
Data to be added are sent to far-end server and stored by family demand.
Invention can perceive commodity or whether commodity packaging is opened or be disassembled, and by commodity or commodity
Packaging open state is stored, and then enables to user during verifying the true and false, views commodity or commodity packaging
Whether opened or be disassembled, effectively prevents reusing for false proof device, and opened in commodity or commodity packaging
Or will be unable to return to non-open state after being disassembled, and then improve the reliability of commodity counterfeit prevention, and false proof device by add/
Decipherment algorithm and anti-tamper security certification are effectively prevented false proof device and are replicated.
The above described is only a preferred embodiment of the present invention, be not intended to limit the present invention in any form, though
So the present invention has been disclosed as a preferred embodiment, and however, it is not intended to limit the invention, any technology people for being familiar with this profession
Member, without departing from the scope of the present invention, when the technology contents using the disclosure above make a little change or modification
For the equivalent embodiment of equivalent variations, as long as being the content without departing from technical solution of the present invention, according to the technical essence of the invention
To any simple modification, equivalent change and modification made by above example, in the range of still falling within technical solution of the present invention.
Claims (15)
1. a kind of false proof device is set in commodity or commodity packaging, which is characterized in that including:Electronic anti-fogery module, state sense
Know module and power module;
Wherein, the electronic anti-fogery module includes:NFC communication unit, storage unit is for the anti-fake data of secure storage, the quotient
The open state and fake certification unit of the merchandise news of product and the commodity or the commodity packaging are used for by adding/solution
Close algorithm carries out dynamic authentication to the anti-fake data;
The state aware module is connected to the electronic anti-fogery module, for perceiving opening for the commodity or the commodity packaging
State is opened, and when the open state changes, triggers the electronic anti-fogery module and update the open state;
The power module is connected to the state aware module, for providing electric energy for the state aware module.
2. false proof device according to claim 1, which is characterized in that the open state includes non-open state and opened
Open state;And the state aware module includes open state perception unit, the open state perception unit is used in institute
It states commodity or when commodity packaging is opened triggers the electronic anti-fogery module, so that described in electronic anti-fogery module update
Open state has turned on state described in being.
3. false proof device according to claim 2, which is characterized in that the state aware module further includes disassembly status sense
Know that unit, the disassembly status perception unit are anti-for triggering the electronics when the commodity or the commodity packaging are disassembled
Pseudo- module, so that the electronic anti-fogery module updates the open state and has turned on state to be described.
4. false proof device according to claim 2 or 3, which is characterized in that the encryption/decryption algorithm include symmetry algorithm or
The combination of symmetry algorithm and asymmetric arithmetic.
5. false proof device according to claim 4, which is characterized in that the electronic anti-fogery module further includes:
File management unit, for creating one or more application or file, and to one or more of applications or file into
Row management;
Security managing unit, for carrying out safe calculating and access control to one or more of applications and file;
Data transmission unit, for using plaintext transmission, ciphertext transmission and check code transmission in it is one or more with it is external into
The row anti-fake data, the data transmission of the merchandise news and the open state;
Data storage management unit for anti-fake data described in the electronic anti-fogery module, the merchandise news and described is opened
Open the safe read-write of the power down protection and the storage unit of state.
6. false proof device according to claim 5, which is characterized in that further include:
Supplemental functionality, the supplemental functionality are respectively connected to the electronic anti-fogery module, the state aware module
With the power module, it is used to control the power module to the electronic anti-fogery according to the state aware module operating status
Module for power supply.
7. a kind of anti-counterfeiting system, which is characterized in that including:NFC device, authentication center and such as any one of claim 1 to 6 institute
The false proof device stated;
Wherein, the NFC device has the function of short-distance wireless communication and network communicating function, is used for the false proof device and institute
The data transmission between authentication center is stated, and shows true and false, commodity the merchandise newss and commodity or commodity bundle of the false proof device
The open state of dress;
The authentication center, for generating, transmitting, store and managing anti-fake data, using symmetry algorithm or symmetry algorithm and non-
The anti-fake data stored in the false proof device are verified in the combination of symmetry algorithm, with to the false proof device it is true and false into
Row verification.
8. a kind of method for anti-counterfeit is used for anti-counterfeiting system as claimed in claim 7, which is characterized in that including:
Link is initialized, Initialize installation is carried out to false proof device by NFC device;
Production packaging link carries out fake certification by encryption/decryption algorithm to the false proof device, and anti-in the false proof device
After puppet is verified, the merchandise news of commodity is updated in the false proof device, by the commodity or the commodity packaging
Open state is set as non-open state;
Commodity circulation links, when the commodity or the commodity packaging are disassembled or are opened, the false proof device will be described
Open state is revised as having turned on state;
Fake certification link carries out fake certification by the encryption/decryption algorithm to the false proof device, described anti-fake to verify
Device it is true and false;
When the false proof device is verified as true, the NFC device reads the merchandise news and the open state.
9. method for anti-counterfeit according to claim 8, which is characterized in that the commodity circulation links, when the commodity are split
When unloading or being opened, the step of false proof device is revised as the open state to have turned on state, specifically includes:
When the false proof device detects that the commodity or the commodity packaging are disassembled or are opened, the anti-camouflage is detected
Whether the open state for setting interior storage is non-open state;
When it is non-open state to detect the open state, it is revised as the open state to have turned on state.
10. method for anti-counterfeit according to claim 9, which is characterized in that the encryption/decryption algorithm includes symmetry algorithm;With
And the step of using the symmetry algorithm to carry out fake certification to the false proof device, it specifically includes:
The NFC device applies for the first random number to the authentication center, and first random number is sent to described anti-fake
Device;
The false proof device calculates first random number using symmetric key, to obtain the first authentication data;
First authentication data is sent to authentication center by the NFC device, so that the authentication center is recognized described first
Card data are verified;
After first authentication data is proved to be successful, the NFC device is incited somebody to action to second random number of false proof device application
Second random number is sent to the authentication center;
The authentication center is calculated using the second random number described in the symmetrical secret key pair, to obtain the second certification number
According to;
Second authentication data is sent to the false proof device by the NFC device, so that the false proof device is to described
Two authentication datas are verified.
11. method for anti-counterfeit according to claim 10, which is characterized in that the initialization link, by NFC device to institute
The step of false proof device carries out Initialize installation is stated, is specifically included:
The NFC device creates application file structure in the false proof device, and initialization data is updated to the application
File structure;
The NFC device obtains the symmetric key to the authentication center, and the symmetric key is sent to described anti-fake
Device;
The false proof device stores the symmetric key to the application file structure.
12. method for anti-counterfeit according to claim 9, which is characterized in that the encryption/decryption algorithm includes symmetry algorithm and non-
The combination of symmetry algorithm;And anti-fake test is carried out to the false proof device using the combination of the symmetry algorithm and asymmetric arithmetic
The step of card, specifically includes:
The NFC device reads the digital certificate stored in the false proof device, and the private by being stored in the false proof device
Key signs to behavioral characteristics data, to obtain dynamic signature data;
The dynamic signature data and the digital certificate are sent to the authentication center by the NFC device;
The authentication center verifies the dynamic signature data and the digital certificate;
After the dynamic signature data and the digital certificate authentication pass through, the NFC device is applied to the authentication center
Third random number, and the third random number is sent to the false proof device;
The false proof device calculates the third random number using the symmetric key, to obtain third authentication data;
The third authentication data is sent to authentication center by the NFC device, so that the third is recognized by the authentication center
Card data are verified;
After the third authentication data is proved to be successful, the NFC device is incited somebody to action to the 4th random number of false proof device application
4th random number is sent to the authentication center;
The authentication center calculates the 4th random number using the symmetric key, to obtain the 4th authentication data;
4th authentication data is sent to the false proof device by the NFC device, so that the false proof device is to described
Four authentication datas are verified.
13. method for anti-counterfeit according to claim 12, which is characterized in that the initialization link, by NFC device to institute
The step of false proof device carries out Initialize installation is stated, is specifically included:
The NFC device creates application file structure in the false proof device, and initialization data is updated to the application
File structure;
The false proof device generates unsymmetrical key pair, and the private key of the cipher key pair is stored to the application file
Structure;
The public key of the cipher key pair is sent to authentication center by the NFC device, so that authentication center generation is corresponding
Digital certificate;
The digital certificate is sent to the false proof device by the NFC device, so that the false proof device is by the number
Word certificate is stored to the application file structure;
The NFC device obtains symmetric key to the authentication center;
The symmetric key is sent to the false proof device by the NFC device;
The false proof device stores the symmetric key to the application file structure.
14. the method for anti-counterfeit according to claim 11 or 13, which is characterized in that described to be verified as very in the false proof device
When, it the step of NFC device reads the merchandise news and the open state, specifically includes:
Verify the false proof device be very after, the false proof device, which opens, reads the merchandise news and the open state
Permission;
The NFC device reads the merchandise news and open state and is shown.
15. method for anti-counterfeit according to claim 14, which is characterized in that described when the false proof device is verified as true
After NFC device reads the step of merchandise news and open state, further include:
Judge whether the NFC device there is information to add permission;
After judging that there is the NFC device described information to add permission, the NFC device obtains the 5th to the false proof device
Random number;
5th random number and data to be added are sent to the authentication center by the NFC device;
The authentication center calculates the 5th random number and the data to be added using the symmetric key, with
To the 5th authentication data;
5th authentication data and the data to be added are sent to the false proof device by the NFC device;
The false proof device verifies the 5th authentication data;
After the 5th authentication data is verified, the data to be added are stored to the false proof device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810709366.4A CN108573296B (en) | 2018-07-02 | 2018-07-02 | Anti-counterfeiting device, anti-counterfeiting system and anti-counterfeiting method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810709366.4A CN108573296B (en) | 2018-07-02 | 2018-07-02 | Anti-counterfeiting device, anti-counterfeiting system and anti-counterfeiting method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108573296A true CN108573296A (en) | 2018-09-25 |
CN108573296B CN108573296B (en) | 2024-03-15 |
Family
ID=63573765
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810709366.4A Active CN108573296B (en) | 2018-07-02 | 2018-07-02 | Anti-counterfeiting device, anti-counterfeiting system and anti-counterfeiting method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108573296B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110288072A (en) * | 2019-07-19 | 2019-09-27 | 云南纳光科技有限公司 | By the way that power source can be activated to realize the NFC anti-counterfeiting chip of anti-tamper detection function |
CN110298431A (en) * | 2019-07-19 | 2019-10-01 | 云南纳光科技有限公司 | It is a kind of with the active NFC anti-counterfeiting chip for distorting dynamic detection function |
CN111784368A (en) * | 2020-07-01 | 2020-10-16 | 上海弗乐酒店用品有限公司 | Intelligent anti-counterfeit package |
CN111884683A (en) * | 2020-06-11 | 2020-11-03 | 北京奇禹科技有限公司 | NFC detection system with high credibility perception capability |
CN112541769A (en) * | 2020-10-21 | 2021-03-23 | 林松 | NFC (near field communication) graphic identifier based authenticity verification method, device and equipment |
CN112801674A (en) * | 2021-02-02 | 2021-05-14 | 中钞印制技术研究院有限公司 | Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting product |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101042736A (en) * | 2006-03-24 | 2007-09-26 | 中国银联股份有限公司 | Smart card and method for accessing objects in smart card |
CN104320250A (en) * | 2014-08-12 | 2015-01-28 | 北京傲飞商智软件有限公司 | Anti-counterfeiting authentication method based on NFC chip |
CN104320252A (en) * | 2014-09-26 | 2015-01-28 | 大连声鹭科技有限公司 | A mobile online tracking and verifying electronic smart seal, electronic seal extraction management system and verifying method |
CN104517132A (en) * | 2013-09-30 | 2015-04-15 | 无锡智双科技有限公司 | Method for anti-counterfeit intelligent RIFD electronic tag chip |
CN106599975A (en) * | 2016-12-16 | 2017-04-26 | 湖北华威科智能股份有限公司 | Intelligent RFID electronic tag capable of instantly perceiving enable state |
CN106997540A (en) * | 2017-03-22 | 2017-08-01 | 北京向芯力科技有限公司 | A kind of commodity counterfeit prevention traceability system and method based on dual authentication mechanism |
CN208314828U (en) * | 2018-07-02 | 2019-01-01 | 北京广弘电子信息技术有限公司 | False proof device and anti-counterfeiting system |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102480355A (en) * | 2011-03-18 | 2012-05-30 | 贾松仁 | Anti-counterfeiting method and anti-counterfeiting device with dynamic token |
CN104217335A (en) * | 2013-06-05 | 2014-12-17 | 北京数码视讯科技股份有限公司 | Storing device and method for commodity authenticity verification information, and commodity authenticity verification method |
CN103326864B (en) * | 2013-06-24 | 2016-03-09 | 詹万泉 | A kind of electronic tag anti-fake authentication method |
CN104574092A (en) * | 2013-10-19 | 2015-04-29 | 周刚 | Commodity anti-counterfeiting system based on invoice and commodity stocks accounting and anti-counterfeiting method |
CN104281876A (en) * | 2014-07-10 | 2015-01-14 | 上海雅海网络科技有限公司 | Anti-counterfeiting method based on chip hardware ID |
CN104217241A (en) * | 2014-08-21 | 2014-12-17 | 安徽云盾信息技术有限公司 | Electronic anti-fake label and realizing method |
CN104680389A (en) * | 2015-03-13 | 2015-06-03 | 杭州沃朴物联科技有限公司 | NFC mobile phone terminal anti-fake system and method based on time encryption |
CN106296224A (en) * | 2016-08-09 | 2017-01-04 | 镇江惠通电子有限公司 | Method for anti-counterfeit, device and commodity packaging for commodity packaging |
CN107886333A (en) * | 2016-09-29 | 2018-04-06 | 珠海晶通科技有限公司 | A kind of Antiforge system and its method for anti-counterfeit with dynamic anti-fake information |
-
2018
- 2018-07-02 CN CN201810709366.4A patent/CN108573296B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101042736A (en) * | 2006-03-24 | 2007-09-26 | 中国银联股份有限公司 | Smart card and method for accessing objects in smart card |
CN104517132A (en) * | 2013-09-30 | 2015-04-15 | 无锡智双科技有限公司 | Method for anti-counterfeit intelligent RIFD electronic tag chip |
CN104320250A (en) * | 2014-08-12 | 2015-01-28 | 北京傲飞商智软件有限公司 | Anti-counterfeiting authentication method based on NFC chip |
CN104320252A (en) * | 2014-09-26 | 2015-01-28 | 大连声鹭科技有限公司 | A mobile online tracking and verifying electronic smart seal, electronic seal extraction management system and verifying method |
CN106599975A (en) * | 2016-12-16 | 2017-04-26 | 湖北华威科智能股份有限公司 | Intelligent RFID electronic tag capable of instantly perceiving enable state |
CN106997540A (en) * | 2017-03-22 | 2017-08-01 | 北京向芯力科技有限公司 | A kind of commodity counterfeit prevention traceability system and method based on dual authentication mechanism |
CN208314828U (en) * | 2018-07-02 | 2019-01-01 | 北京广弘电子信息技术有限公司 | False proof device and anti-counterfeiting system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110288072A (en) * | 2019-07-19 | 2019-09-27 | 云南纳光科技有限公司 | By the way that power source can be activated to realize the NFC anti-counterfeiting chip of anti-tamper detection function |
CN110298431A (en) * | 2019-07-19 | 2019-10-01 | 云南纳光科技有限公司 | It is a kind of with the active NFC anti-counterfeiting chip for distorting dynamic detection function |
CN111884683A (en) * | 2020-06-11 | 2020-11-03 | 北京奇禹科技有限公司 | NFC detection system with high credibility perception capability |
CN111784368A (en) * | 2020-07-01 | 2020-10-16 | 上海弗乐酒店用品有限公司 | Intelligent anti-counterfeit package |
CN112541769A (en) * | 2020-10-21 | 2021-03-23 | 林松 | NFC (near field communication) graphic identifier based authenticity verification method, device and equipment |
CN112801674A (en) * | 2021-02-02 | 2021-05-14 | 中钞印制技术研究院有限公司 | Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting product |
CN112801674B (en) * | 2021-02-02 | 2024-03-01 | 中钞印制技术研究院有限公司 | Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting product |
Also Published As
Publication number | Publication date |
---|---|
CN108573296B (en) | 2024-03-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108573296A (en) | False proof device, anti-counterfeiting system and method for anti-counterfeit | |
JP5139415B2 (en) | Article information acquisition method and apparatus | |
KR101210631B1 (en) | Anti-fake battery pack and identification system thereof | |
EP3017580B1 (en) | Signatures for near field communications | |
CN101490698A (en) | Component authentication for computer systems | |
EA008280B1 (en) | Contactless type communication tag, portable tag reader for verifying a genuine article, and method for providing information of whether an article is genuine or not | |
CN107231231B (en) | Method and system for terminal equipment to safely access Internet of things | |
CN104794626B (en) | A kind of method for anti-counterfeit and device based on hardware information | |
CN101562040A (en) | High-security mobile memory and data processing method thereof | |
CN107038587A (en) | A kind of Bluetooth label verified based on service end and its method for anti-counterfeit | |
US9679117B2 (en) | System and method for obtaining an authorization key to use a product | |
CN101504731B (en) | Movable recognition system based on NFC | |
CN109328444A (en) | Protect equipment and softdog and its application method | |
CN103235995A (en) | Electronic anti-counterfeiting and logistics management system based on NFC (near field communication) mobile phone | |
KR101527582B1 (en) | System for verifying product genuineness using double security key and method thereof | |
CN208314828U (en) | False proof device and anti-counterfeiting system | |
CN116561822A (en) | Product anti-counterfeiting method, component and system | |
KR101879326B1 (en) | Method and device for transmitting and receiving instruction information | |
US9672505B2 (en) | Method for verifying the authenticity of a terminal, corresponding device and program | |
CN112862047B (en) | Dual-authorization intelligent anti-counterfeit label generation method | |
EP2770663A1 (en) | Encryption Key-Based Product Authentication System and Method | |
US9734366B2 (en) | Tamper credential | |
WO2014134827A1 (en) | System and method for authentication | |
CN206115462U (en) | System for filter element group spare reaches rather than paiing | |
US11164185B2 (en) | Method for control of authenticity of a payment terminal and terminal thus secured |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |