CN108933666B - Method and device for acquiring capsule information - Google Patents

Method and device for acquiring capsule information Download PDF

Info

Publication number
CN108933666B
CN108933666B CN201710388920.9A CN201710388920A CN108933666B CN 108933666 B CN108933666 B CN 108933666B CN 201710388920 A CN201710388920 A CN 201710388920A CN 108933666 B CN108933666 B CN 108933666B
Authority
CN
China
Prior art keywords
capsule
key
information
decryption
keys
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710388920.9A
Other languages
Chinese (zh)
Other versions
CN108933666A (en
Inventor
曾彬
凌波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Supor Electrical Appliances Manufacturing Co Ltd
Original Assignee
Zhejiang Supor Electrical Appliances Manufacturing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Supor Electrical Appliances Manufacturing Co Ltd filed Critical Zhejiang Supor Electrical Appliances Manufacturing Co Ltd
Priority to CN201710388920.9A priority Critical patent/CN108933666B/en
Publication of CN108933666A publication Critical patent/CN108933666A/en
Application granted granted Critical
Publication of CN108933666B publication Critical patent/CN108933666B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10297Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs, e.g. ISO/IEC 14443 and 18092
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation

Abstract

The embodiment of the application provides a method and a device for acquiring capsule information, wherein the method comprises the following steps: acquiring data information by scanning a radio frequency code on the capsule; acquiring a decryption key for decryption; and decrypting the data information by using the decryption key to obtain the capsule information of the capsule. Therefore, the embodiment of the application can obtain the capsule information of the radio frequency code on the capsule through a series of decryption operations, so that the safety of the capsule can be ensured and the counterfeit can be avoided.

Description

Method and device for acquiring capsule information
Technical Field
The application relates to the field of cooking, in particular to a method and a device for acquiring capsule information.
Background
There is currently a capsule for encapsulating food materials that can be mounted on a cooking appliance for cooking the food materials. Typically, the capsule has a radio frequency code (Radio Frequency Identity, RFID) thereon, and the capsule information of the capsule can be obtained by scanning the radio frequency code.
Due to the popularization of smart phones and the like at present, the capsule information can be conveniently obtained by scanning the radio frequency code, so that great potential safety hazards exist, for example, illegal personnel can imitate similar capsules based on the radio frequency code, not only economic losses are caused for manufacturers of the capsules, but also users can purchase and use food materials imitating the capsules, and also the problem of food safety can exist, so that physical discomfort is caused.
Disclosure of Invention
The present application has been made in view of the above-described problems. The application provides a method and a device for acquiring capsule information, which can acquire the capsule information through decryption operation, so that the safety of capsules can be ensured.
In a first aspect, a method for obtaining capsule information is provided, comprising:
acquiring data information by scanning a radio frequency code on the capsule;
acquiring a decryption key for decryption;
and decrypting the data information by using the decryption key to obtain the capsule information of the capsule.
Illustratively, the obtaining a decryption key for decryption includes:
acquiring a first key and a second key;
and determining the decryption key according to the first key and the second key.
Illustratively, the first key includes N1 first short keys, the second key includes N2 second short keys, and the obtaining the first key and the second key includes:
combining the N1 first short keys by using a first arrangement algorithm to obtain the first keys;
combining the N2 second short keys by using a second permutation algorithm to obtain the second keys,
wherein, N1 and N2 are positive integers greater than 1.
Illustratively, the encryption bits holding the N1 first keys and the encryption bits holding the N2 second keys are set to be unreadable by a tool.
Illustratively, the first key is denoted as x, the second key is denoted as y, and determining the decryption key from the first key and the second key includes:
and f1 (x, y) is used for calculating to obtain the decryption key, wherein f1 is a key function.
Illustratively, the decryption Key is denoted as Key, the data information is denoted as D, and decrypting the data information with the decryption Key to obtain capsule information of the capsule includes:
and obtaining capsule information of the capsule by using f2 (D, key), wherein f2 is a decryption function.
Illustratively, the capsule is for containing food material or water to be cooked, the method further comprising: and cooking the food materials in the capsule according to the capsule information.
Illustratively, if the capsule is for containing food material to be cooked, the capsule information comprises at least one of: the name, variety, weight, production place, crop planting information, processing information, logistics information, cooking curve and corresponding water consumption of the food materials; if the capsule is for containing water, the capsule information includes at least one item: water quantity, water source information and pH value.
In a second aspect, there is provided an apparatus for acquiring capsule information, comprising:
the first acquisition module is used for acquiring data information by scanning the radio frequency code on the capsule;
the second acquisition module is used for acquiring a decryption key for decryption;
and the decryption module is used for decrypting the data information by using the decryption key to obtain the capsule information of the capsule.
Illustratively, the apparatus is a cooking appliance. The apparatus of the second aspect can be used to implement the method of acquiring capsule information of the foregoing first aspect and various examples thereof.
Therefore, the embodiment of the application can obtain the capsule information of the radio frequency code on the capsule through a series of decryption operations, so that the safety of the capsule can be ensured and the counterfeit can be avoided. The radio frequency code encryption stability is good, the encryption effect is good, the implementation is easy, and the engineering implementation is easy.
Drawings
The foregoing and other objects, features and advantages of the application will be apparent from the following more particular description of embodiments of the application, as illustrated in the accompanying drawings. The accompanying drawings, which are included to provide a further understanding of embodiments of the application and are incorporated in and constitute a part of this specification, illustrate and together with the embodiments of the application and serve to explain the application. In the drawings, the same reference numbers generally represent the same or similar components or steps.
FIG. 1 is a schematic flow chart of a method of obtaining capsule information according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a storage form of a first key and a second key according to an embodiment of the present application;
FIG. 3 is a schematic block diagram of an apparatus for acquiring capsule information according to an embodiment of the present application;
fig. 4 is another schematic block diagram of an apparatus for acquiring capsule information according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, exemplary embodiments according to the present application will be described in detail with reference to the accompanying drawings. It should be apparent that the described embodiments are only some embodiments of the present application and not all embodiments of the present application, and it should be understood that the present application is not limited by the example embodiments described herein. Based on the embodiments of the application described in the present application, all other embodiments that a person skilled in the art would have without inventive effort shall fall within the scope of the application.
Fig. 1 is a schematic flow chart of a method of acquiring capsule information according to an embodiment of the present application. The method shown in fig. 1 may be performed by a cooking appliance, the method comprising:
s101, acquiring data information by scanning a radio frequency code on a capsule;
s102, obtaining a decryption key for decryption;
and S103, decrypting the data information by using the decryption key to obtain the capsule information of the capsule.
The cooking appliance in the embodiment of the application can be an electric cooker, an electric pressure cooker, a cooking machine, a soymilk machine, an electric stewpot or other electric heating appliances, and can have various functions of cooking porridge and the like besides the function of cooking rice.
A capsule herein, may consist of a body having an opening and a cover film covering the opening; the flexible material can be integrally packaged, wherein the strength of the flexible material is uniform everywhere; it is also possible to provide the capsule with a weakening, wherein the weakening is of a lower strength and/or thickness than the rest of the capsule.
The cooking appliance may include a capsule mounting device in which the capsule may be accommodated. The capsule mounting means may be provided with one or more capsule receiving slots, each of which may receive one capsule. The plurality of capsule placing grooves can be regularly arranged or irregularly arranged, correspondingly, the plurality of capsules can be regularly arranged or irregularly arranged, and the plurality of capsules can be arranged according to actual needs by a person skilled in the art.
The capsule may be used to contain food materials to be cooked, such as rice, millet, beans, etc. Alternatively, a single food material may be stored in the capsule, or a mixture of multiple food materials may be stored. By packaging the food material to be cooked in the capsule, the pollution of various severe environments of the food material in transportation to the food material can be avoided, and the quality of the food material can be well maintained. In addition, the capsule is used on the cooking utensil, and the food material can be encapsulated by the capsule when the food material is just produced, so that a user can eat the freshest food material. In addition, substances beneficial to human bodies can be added into the encapsulated capsules so as to meet the needs of special people.
The capsule may be used to contain water. The water can be purified water or water added with substances beneficial to human body. For example, it may be sugar water or brine.
The capsule is provided with a radio frequency code which can be positioned at least one position of the side wall, the top wall and the bottom wall of the capsule. Wherein the radio frequency code can be stuck on the outer surface of the capsule, corresponds to the position of the radio frequency identification instrument arranged on the cooking utensil, and the like. The encryption stability of the radio frequency code is good, the encryption effect is good, the implementation is easy, and the engineering implementation is easy.
The radio frequency code may also be referred to as an identification tag, an identification tag card, an identification tag chip, an electronic tag card, an electronic tag soft card, or the like.
For example, S101 may be performed by a scanning apparatus. I.e. the cooking appliance may have scanning means for scanning the radio frequency code on the capsule placed in the capsule receiving slot. The scanning device can be realized by an electronic tag reading circuit board. For example, the scanning device is a radio frequency identification device. The data information may be a series of sequences or a string of characters, for example.
Illustratively, S102 may include: acquiring a first key and a second key; and determining the decryption key according to the first key and the second key. Wherein the decryption key may also be referred to as a public key.
Wherein the first keys may include N1 first short keys and the second keys may include N2 second short keys. Acquiring the first key and the second key may include: combining the N1 first short keys by using a first arrangement algorithm to obtain the first keys; and combining the N2 second short keys by using a second arrangement algorithm to obtain the second keys, wherein N1 and N2 are positive integers greater than 1.
In the memory of the cooking appliance, the first key and the second key may be stored in segments, for example, the first key may be stored in N1 segments, each segment may be referred to as a first short key, and N1 first short keys are stored out of order; the second key is stored in N2 segments, each segment may be referred to as a second short key, and N2 second short keys are stored out of order. Wherein N1 and N2 may be equal or unequal. As an example, let n1=n2=3, as shown in fig. 2 as one example of a memory segment. The random numbers shown in fig. 2 refer to: other information than the first key and the second key.
The N1 first short keys and the N2 second short keys may be read from the memory, and then rearranged according to a predetermined arrangement algorithm, to obtain the first key and the second key. For convenience of description, it is assumed in this embodiment that the first key is denoted as x, and the second key is denoted as y.
For example, taking the example of fig. 2, where n1=n2=3, it can be assumed that the first key x (n11+n12+n13) is reached and the second key y (n21+n22+n23).
Illustratively, if the first key is denoted as x and the second key is denoted as y, determining the decryption key based on the first key and the second key may include: and f1 (x, y) is used for calculating to obtain the decryption key, wherein f1 is a key function. That is, the decryption key may be determined based on the first key and the second key based on the key function.
Specifically, the decryption Key may be calculated by key=f1 (x, y), where Key represents the decryption Key and the Key function f1 is stored in advance in the memory of the cooking appliance.
Therefore, the decryption Key can be obtained through segmented reading and Key functions, which is equivalent to scattered storage and double encryption, and even if the hex file is illegally obtained, the decryption Key can not be obtained through disassembly. Furthermore, in order to prevent the hex file in the singlechip from being read, the encryption bit in the singlechip can be set when the program is burnt, so that the encryption bit cannot be read by a tool, and the decryption Key can be more effectively protected.
That is, the encryption bit storing the N1 first keys and the encryption bit storing the N2 second keys may be set to be unreadable by a tool.
Illustratively, S103 may include: and obtaining the capsule information of the capsule by using f2 (D, key), wherein f2 is a decryption function, D represents data information, and Key represents a decryption Key.
Specifically, the capsule information may be obtained by z=f2 (D, key), where Z represents the capsule information and the decryption function f2 is stored in advance in the memory of the cooking appliance.
The Memory may be a Read-Only Memory (ROM), so that illegal writing and illegal modification of the segment keys in the Memory can be prevented, and the security of the first key, the second key, the key function and the decryption function can be protected. For example, the Memory is an electrically erasable read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM).
If the capsule is used to hold the food material to be cooked, the capsule information in the embodiment of the present application may include at least one of the following: the name, variety, weight, production place, crop planting information, processing information, logistics information, cooking curve and corresponding water consumption of the food materials.
Wherein the cooking profile may represent a time-dependent relationship of a cooking parameter, which may include at least one of power, temperature, pressure.
Alternatively, the cooking profile may represent a time-dependent relationship of the cooking program. The cooking program may include: soaking, absorbing water, heating, keeping boiling, stewing and preserving heat. And it is understood that the cooking parameters of different cooking programs are different, e.g., at least one of power, temperature, and pressure of different cooking programs is different.
The corresponding water consumption can be the water consumption required when cooking the food material.
If the capsule is to contain the water, the capsule information includes at least one of: water quantity, water source information and pH value. The water amount information can be the weight or the volume of water, such as 100g or 100 ml. The source location information may be location information, for example, latitude/longitude information. The pH value may be also referred to as hydrogen ion concentration index, pH value, or the like, and the pH value is a positive number, for example, 6.9.
The cooking appliance may include a main control circuit board, and S102 and S103 may be performed by the main control circuit board. Specifically, after the radio frequency code is scanned, the electronic tag reading circuit board can send the read data information to the main control circuit board, and the main control circuit board executes the decryption process.
The embodiment of the application relates to a decryption process based on data information, and it can be understood that in the production process of a manufacturer, the decryption process can be performed through an encryption function, so that D=f3 (Z, key) is achieved, and corresponding radio frequency codes are manufactured according to the obtained data information D. Key is a decryption Key which is strictly kept secret by factories and the like.
Therefore, the embodiment of the application can obtain the capsule information of the radio frequency code on the capsule through a series of decryption operations, so that the safety of the capsule can be determined and the counterfeit can be avoided.
Illustratively, if the capsule contains food material, after S103, it may further include: and cooking the food materials in the capsule according to the capsule information. Specifically, the food material in the capsule may be added to the pan and water is added through the sump or water capsule (or the user is instructed to add water) and the cooking process is initiated. For example, the capsule information includes a cooking profile according to which cooking may be performed. For example, the capsule information includes the variety and weight of the food material, a cooking profile may be determined, and then cooking may be performed according to the cooking profile.
Illustratively, if the capsule contains water, after S103, it may further include: water is added to the pan and the cooking process is started to boil the water. Alternatively, it may further include: adding water into the pan, adding food material through the food material capsule or instructing the user to add food material, and starting the cooking process.
And, it can be appreciated that the encrypted capsule can only be identified by the authenticated cooking appliance. While other card readers compatible with the chip can read the data information, the read data information is meaningless messy codes. On the other hand, the authenticated cooking appliance can be set to only identify the corresponding encrypted capsule, and other capsules cannot be correctly identified and verified, but can be regarded as illegal capsules and cannot be used.
Fig. 3 is a schematic block diagram of an apparatus for acquiring capsule information according to an embodiment of the present application. The apparatus 30 shown in fig. 3 comprises a first acquisition module 301, a second acquisition module 302 and a decryption module 303.
A first acquisition module 301, configured to acquire data information by scanning a radio frequency code on the capsule;
a second obtaining module 302, configured to obtain a decryption key for decryption;
the decryption module 303 is configured to decrypt the data information acquired by the first acquisition module 301 by using the decryption key acquired by the second acquisition module 302, so as to obtain capsule information of the capsule.
Illustratively, as shown in FIG. 4, the second acquisition module 302 may include an acquisition sub-module 3021 and a determination sub-module 3022.
The acquisition sub-module 3021 may be used to acquire the first key and the second key;
the determining submodule 3022 may be configured to determine the decryption key based on the first key and the second key.
Illustratively, the first key includes N1 first short keys, the second key includes N2 second short keys, and the obtaining submodule 3021 may be specifically configured to: combining the N1 first short keys by using a first arrangement algorithm to obtain the first keys; and combining the N2 second short keys by using a second permutation algorithm to obtain the second keys. Wherein, N1 and N2 are positive integers greater than 1. For example, n1=n2=n.
Illustratively, the encryption bits holding the N1 first keys and the encryption bits holding the N2 second keys are set to be unreadable by a tool.
Illustratively, the first key is denoted as x, the second key is denoted as y, and the determining submodule 3022 may be specifically configured to: and f1 (x, y) is used for calculating to obtain the decryption key, wherein f1 is a key function.
Illustratively, the decryption Key is denoted as Key, the data information is denoted as D, and the decryption module 303 may be specifically configured to: and obtaining capsule information of the capsule by using f2 (D, key), wherein f2 is a decryption function.
Illustratively, the capsule is for holding food material or water to be cooked, as shown in fig. 4, the apparatus 30 may further comprise a cooking module 304 for: and cooking the food materials or the water in the capsule according to the capsule information.
For example, if the capsule is for containing food material to be cooked, the capsule information may include at least one of: the name, variety, weight, production place, crop planting information, processing information, logistics information, cooking curve and corresponding water consumption of the food materials. If the capsule is to contain water, the capsule information may include at least one of: water quantity, water source information and pH value.
Illustratively, the apparatus 30 may be a cooking appliance.
The device 30 can be used to implement the method for acquiring capsule information shown in fig. 1, and is not described here again to avoid repetition.
In addition, the embodiment of the application also provides a device for acquiring the capsule information, which comprises a memory, a processor and a computer program stored in the memory and running on the processor, wherein the processor realizes the steps of the method shown in the figure 1 when executing the program. Illustratively, the apparatus is a cooking appliance.
In addition, the embodiment of the application also provides a computer storage medium, on which the computer program is stored. The steps of the method shown in fig. 1 described above may be implemented when the computer program is executed by a processor. The computer storage medium is, for example, a computer-readable storage medium.
Therefore, the embodiment of the application can obtain the capsule information of the radio frequency code on the capsule through a series of decryption operations, so that the safety of the capsule can be ensured and the counterfeit can be avoided.
Although the illustrative embodiments have been described herein with reference to the accompanying drawings, it is to be understood that the above illustrative embodiments are merely illustrative and are not intended to limit the scope of the present application thereto. Various changes and modifications may be made therein by one of ordinary skill in the art without departing from the scope and spirit of the application. All such changes and modifications are intended to be included within the scope of the present application as set forth in the appended claims.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, e.g., the division of the elements is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple elements or components may be combined or integrated into another device, or some features may be omitted or not performed.
In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the application may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in order to streamline the application and aid in understanding one or more of the various inventive aspects, various features of the application are sometimes grouped together in a single embodiment, figure, or description thereof in the description of exemplary embodiments of the application. However, the method of the present application should not be construed as reflecting the following intent: i.e., the claimed application requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this application.
It will be understood by those skilled in the art that all of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or units of any method or apparatus so disclosed, may be combined in any combination, except combinations where the features are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings), may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features but not others included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the application and form different embodiments. For example, in the claims, any of the claimed embodiments may be used in any combination.
Various component embodiments of the application may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that some or all of the functions of some of the modules in an item analysis device according to embodiments of the present application may be implemented in practice using a microprocessor or Digital Signal Processor (DSP). The present application can also be implemented as an apparatus program (e.g., a computer program and a computer program product) for performing a portion or all of the methods described herein. Such a program embodying the present application may be stored on a computer readable medium, or may have the form of one or more signals. Such signals may be downloaded from an internet website, provided on a carrier signal, or provided in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the application, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The application may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The use of the words first, second, third, etc. do not denote any order. These words may be interpreted as names.
The foregoing description is merely illustrative of specific embodiments of the present application and the scope of the present application is not limited thereto, and any person skilled in the art can easily think about variations or substitutions within the scope of the present application. The protection scope of the application is subject to the protection scope of the claims.

Claims (11)

1. A method of obtaining information about a capsule, comprising:
acquiring encrypted data information carried by a radio frequency code on the capsule in a radio frequency identification mode;
acquiring a first secret key and a second secret key, wherein the first secret key comprises N1 first short secret keys, the second secret key comprises N2 second short secret keys, the N1 first short secret keys are combined by utilizing a first arrangement algorithm to obtain the first secret key, and the N2 second short secret keys are combined by utilizing a second arrangement algorithm to obtain the second secret key, wherein N1 and N2 are positive integers larger than 1;
determining a decryption key for decryption according to the first key and the second key, wherein the first key is expressed as x, the second key is expressed as y, and f1 (x, y) is used for calculating to obtain the decryption key, and f1 is a key function;
and decrypting the data information by using the decryption key to obtain the capsule information of the capsule.
2. The method of claim 1, wherein the encryption bits holding the N1 first keys and the encryption bits holding the N2 second keys are set to be unreadable by a tool.
3. The method of claim 1, wherein the decryption Key is denoted as Key, the data information is denoted as D,
the decrypting the data information by using the decrypting key to obtain the capsule information of the capsule comprises the following steps:
and obtaining capsule information of the capsule by using f2 (D, key), wherein f2 is a decryption function.
4. The method of claim 1, wherein the capsule is for containing food material or water to be cooked, the method further comprising:
and cooking the food materials or the water in the capsule according to the capsule information.
5. The method according to any one of claim 1 to 4,
if the capsule is for containing food material to be cooked, the capsule information includes at least one of: the name, variety, weight, production place, crop planting information, processing information, logistics information, cooking curve and corresponding water consumption of the food materials;
if the capsule is for containing water, the capsule information includes at least one of: water quantity, water source information and pH value.
6. An apparatus for obtaining information about a capsule, comprising:
the first acquisition module is used for acquiring encrypted data information carried by the radio frequency code on the capsule in a radio frequency identification mode;
a second acquisition module for acquiring a decryption key for decryption, the second acquisition module comprising:
the device comprises an acquisition sub-module, a first arrangement module and a second arrangement module, wherein the acquisition sub-module is used for acquiring a first secret key and a second secret key, the first secret key comprises N1 first short secret keys, the second secret key comprises N2 second short secret keys, the acquisition sub-module is also used for combining the N1 first short secret keys by using a first arrangement algorithm to obtain the first secret key, and the N2 second short secret keys are combined by using a second arrangement algorithm to obtain the second secret key, wherein N1 and N2 are positive integers larger than 1;
a determining submodule, configured to determine the decryption key according to the first key and the second key, where the first key is denoted as x, the second key is denoted as y, and the determining submodule is further configured to calculate the decryption key using f1 (x, y), where f1 is a key function;
and the decryption module is used for decrypting the data information by using the decryption key to obtain the capsule information of the capsule.
7. The apparatus of claim 6, wherein the encryption bits holding the N1 first keys and the encryption bits holding the N2 second keys are set to be unreadable by a tool.
8. The apparatus of claim 6, wherein the decryption Key is denoted as Key, the data information is denoted as D, and the decryption module is configured to:
and obtaining capsule information of the capsule by using f2 (D, key), wherein f2 is a decryption function.
9. The apparatus of claim 6, wherein the capsule is for containing food material or water to be cooked, further comprising a cooking module for:
and cooking the food materials or the water in the capsule according to the capsule information.
10. The apparatus of claim 6, wherein,
if the capsule is for containing food material to be cooked, the capsule information includes at least one of: the name, variety, weight, production place, crop planting information, processing information, logistics information, cooking curve and corresponding water consumption of the food materials;
if the capsule is for containing water, the capsule information includes at least one of: water quantity, water source information and pH value.
11. The device according to any one of claims 6 to 10, wherein the device is a cooking appliance.
CN201710388920.9A 2017-05-27 2017-05-27 Method and device for acquiring capsule information Active CN108933666B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710388920.9A CN108933666B (en) 2017-05-27 2017-05-27 Method and device for acquiring capsule information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710388920.9A CN108933666B (en) 2017-05-27 2017-05-27 Method and device for acquiring capsule information

Publications (2)

Publication Number Publication Date
CN108933666A CN108933666A (en) 2018-12-04
CN108933666B true CN108933666B (en) 2023-10-31

Family

ID=64451683

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710388920.9A Active CN108933666B (en) 2017-05-27 2017-05-27 Method and device for acquiring capsule information

Country Status (1)

Country Link
CN (1) CN108933666B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1565002A (en) * 2001-09-04 2005-01-12 Ip和创新控股有限公司 System and method of authenticating an article
CN102100078A (en) * 2008-07-18 2011-06-15 汤姆森许可贸易公司 Method and device for key generation
CN103119613A (en) * 2010-09-24 2013-05-22 锡克拜控股有限公司 Two-dimensional identification pattern, article including such a pattern, and methods for marking and identifying such a pattern
CN103283177A (en) * 2010-12-23 2013-09-04 莫雷加系统股份有限公司 Cryptography module for use with fragmented key and methods for use therewith
CN103560892A (en) * 2013-11-21 2014-02-05 深圳中兴网信科技有限公司 Secret key generation method and secret key generation device
CN104709717A (en) * 2015-01-06 2015-06-17 云南龙润药业有限公司 Food packaging system
CN105138682A (en) * 2015-09-15 2015-12-09 珠海优特电力科技股份有限公司 Convenient dish and digital recipe matching method, server and terminal
CN106326960A (en) * 2015-07-01 2017-01-11 佛山市顺德区美的电热电器制造有限公司 Control method for cooking device and cooking device
CN106691207A (en) * 2017-03-06 2017-05-24 浙江苏泊尔家电制造有限公司 Cooking utensil

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160147976A1 (en) * 2014-11-26 2016-05-26 RxAdvance Corporation Medication Identification, Tracking And Adherence Management

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1565002A (en) * 2001-09-04 2005-01-12 Ip和创新控股有限公司 System and method of authenticating an article
CN102100078A (en) * 2008-07-18 2011-06-15 汤姆森许可贸易公司 Method and device for key generation
CN103119613A (en) * 2010-09-24 2013-05-22 锡克拜控股有限公司 Two-dimensional identification pattern, article including such a pattern, and methods for marking and identifying such a pattern
CN103283177A (en) * 2010-12-23 2013-09-04 莫雷加系统股份有限公司 Cryptography module for use with fragmented key and methods for use therewith
CN103560892A (en) * 2013-11-21 2014-02-05 深圳中兴网信科技有限公司 Secret key generation method and secret key generation device
CN104709717A (en) * 2015-01-06 2015-06-17 云南龙润药业有限公司 Food packaging system
CN106326960A (en) * 2015-07-01 2017-01-11 佛山市顺德区美的电热电器制造有限公司 Control method for cooking device and cooking device
CN105138682A (en) * 2015-09-15 2015-12-09 珠海优特电力科技股份有限公司 Convenient dish and digital recipe matching method, server and terminal
CN106691207A (en) * 2017-03-06 2017-05-24 浙江苏泊尔家电制造有限公司 Cooking utensil

Also Published As

Publication number Publication date
CN108933666A (en) 2018-12-04

Similar Documents

Publication Publication Date Title
US11048936B2 (en) IC card for authentication and a method for authenticating the IC card
CN109242718B (en) Supply chain system and recording medium for recording program
US8534544B1 (en) System and method for authenticating a manufactured product with a mobile device
EP2474936A1 (en) Product identity digital identification apparatus, inspection apparatus, product and anti-counterfeiting inspection method
CN105787738A (en) Electronic-label-based goods anti-counterfeiting tracing method and system
CN107111733A (en) Use the method and product that product is followed the trail of and identified of being used for of electrically conductive ink
MXPA05010431A (en) Contactless type communication tag, portable tag reader for verifying a genuine article, and method for providing information of whether an article is genuine or not.
CN108932269B (en) Cooking method, device and system
EP2850557A1 (en) System and method for authenticating a manufactured product with a mobile device
CN105431888B (en) For distributing the distributing equipment of food product
WO2013155562A1 (en) Nfc card lock
US8534543B1 (en) System and method for authenticating a manufactured product with a mobile device
CN205451172U (en) Anti -fake system based on electronic tags
US20160036786A1 (en) System and method facilitating enhanced inter-object and human-object interactivity using networked electronic devices
KR100512064B1 (en) contactless type communication tag and portable tag reader for verifying a genuine article
US20140101063A1 (en) Counterfeit detection
KR102290250B1 (en) Access control method for easy dishes and digital cookbook, system therefor and smart device
CN104102621A (en) Method for associating convenient dishes with convenient dish menus, convenient dish products and intelligent cooking system
CN104598800A (en) Authentication method and authentication system for identity information of grain depot and terminal equipment
CN108933666B (en) Method and device for acquiring capsule information
CN106446697A (en) Method and device for saving private data
KR100524176B1 (en) Mobile phone capable of reading genuine article verifying information stored in a RF-tag and method for administrating service management executable in a computer communicating with the same phone
CN107241328A (en) Electronic equipment method for opening and closing and system
US20160093185A1 (en) Mobile Security System and A Security Method of the Same
CN108038383B (en) File encryption method, file decryption method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant