CN109360001A - A kind of RFID anti-counterfeiting platform - Google Patents
A kind of RFID anti-counterfeiting platform Download PDFInfo
- Publication number
- CN109360001A CN109360001A CN201811085187.4A CN201811085187A CN109360001A CN 109360001 A CN109360001 A CN 109360001A CN 201811085187 A CN201811085187 A CN 201811085187A CN 109360001 A CN109360001 A CN 109360001A
- Authority
- CN
- China
- Prior art keywords
- rfid
- fake
- enterprise
- verifying
- legal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Abstract
A kind of RFID anti-counterfeiting platform, comprising: be mainly responsible for the digital signature for checking verifying enterprise and user, confirm the authentication module of its legal identity;The data input module of merchandise news and current intelligence input system that enterprise and user are provided;The anti-fake trace back block of information query, fake certification and product back-tracing inquiry is provided;It is responsible for the data management module of the management of database.The platform has many advantages, such as that certification is safe and reliable, is suitble to be widely used in existing RFID anti-counterfeit field.
Description
Technical field
The present invention relates to a kind of RFID anti-counterfeiting platforms.
Background technique
RFID at home and abroad be used widely by every profession and trade at present, covers RFID unlocking, attendance, enters and leaves important portion
Door, identification or even the noninductive payment of bank card, importance are self-evident.
However the safety of RFID chip itself and RFID near field communicate born physical security problem, and RFID is caused to exist
Very big security risk is faced in practical application.The appearance of the imitative chip of height, cause can Mass production RFID sequence number, and then substitute
The RFID device of distant place can be mapped to really by legal effective RFID, the identification of RFID card by remotely mapping card-reading apparatus
RFID card-reading apparatus on, and then realize long-range mapping authentication.
Summary of the invention
The present invention provides a kind of RFID anti-counterfeiting platform, to overcome above-mentioned technical problem.
The present invention provides a kind of RFID anti-counterfeiting platform, comprising:
It is mainly responsible for the digital signature for checking verifying enterprise and user, confirms the authentication module of its legal identity;
The data input module of merchandise news and current intelligence input system that enterprise and user are provided;
The anti-fake trace back block of information query, fake certification and product back-tracing inquiry is provided;
It is responsible for the data management module of the management of database;
The authentication module is mainly responsible for the digital signature for checking verifying enterprise and user, determines its legal identity,
Including obtaining digital certificates, functions are regularly updated etc. to certificate;
The authentication module receives application for registration and relevant information from enterprise and user, by authentication module
Determine whether the identity of enterprise and user are legal, if legal, provide public key certificate, certificate is stored in data management mould
Block sends the illegal feedback of information to user, it is desirable that resubmit related application if illegal.
The data input module is responsible for the merchandise news for providing enterprise and user and current intelligence input system, packet
Include the encrypting and decrypting etc. in message transmitting procedure;The merchandise news that enterprise and user are provided and current intelligence typing system
System.
The data input module is responsible for the merchandise news for providing enterprise and user and current intelligence input system, tool
For body, data input module receives the authentication request from enterprise and user, transfers public key card to authentication center
Book, and it is whether legal by authentication module verifying identity, if illegal, it is illegal anti-that information is sent to user
Feedback, it is desirable that resubmit related application.If legal, merchandise news ciphertext is received, decryption judges whether data input terminates,
If be not finished, continues logging data if finished and store information into data management module.
The anti-fake trace back block is responsible for providing the retrospect inquiry of information query, fake certification and product, provides net
A variety of inquiry means such as page, short message, the communication of reader terminal guarantee to provide whole inquiring and authenticating service;
The anti-fake trace back block carries out fake certification to product, is divided into two stages: production phase and Qualify Phase.
Production phase anti-fake trace back block carries out fake certification to product, and enterprise extracts the EPC code of product by SHA-1
Digital digest, and be encrypted with the private key of itself, digital signature is obtained, the EPC code of product is deposited together with signature
Enter label;
The anti-fake trace back block of Qualify Phase carries out fake certification to product, and anti-fake trace back block is on the one hand by EPC code
SHA-1 processing is carried out, expected digital digest is obtained, on the other hand its digital signature is solved with the public key that enterprise provides
It is close, actual digital digest is obtained, by being compared after the anti-fake formality verifying of twice with desired value, if equal, label
It is legal to be effectively submitted to data base querying product specifying information and return the result, it is on the contrary then invalid.
It is compared after the anti-fake formality verifying by twice with desired value, is divided into two kinds: random number verification and distance
Verifying.
The random number verification refers to: for RFID in each verifying, card reader a random number can be written into RFID (such as
EEDD33), while this number can be recorded in data management module.When each RFID verifying, in addition to band in verifying RFID
Have outside the information of signature, also to compare when whether time RFID random number consistent with data management module, if consistent verifying at
Function, while new random number is written;If it is inconsistent, verifying does not pass through and alarms to data management module.
The distance verifying refers to: taking secondary verification mode to complete the identification process of RFID, scans RFID for the first time
When complete basic verifying and apart from identification, then card reader can send continuous read-write to RFID, utilize RFID card reader
Round-trip electromagnetic wave is measured, is considered as legal scanning in the range of serial timing allows, if time of return transfinites, depending on
For illegal act.Because the normal reading/writing distance of RFID M1 cartoon uses mapping mode to read within 10 centimetres, data will be sent
To distal end, two-way time can be obviously increased, therefore judge whether scanned RFID is legal effectively by way of returning to timing,
It alarms if invalid to data management module.
Detailed description of the invention:
Fig. 1 is platform feature template schematic diagram
Fig. 2 is identity registration process
Fig. 3 is merchandise news typing process
Specific embodiment:
As shown in Figure 1 to Figure 3, a kind of RFID anti-counterfeiting platform of the invention, comprising:
It is mainly responsible for the digital signature for checking verifying enterprise and user, confirms the authentication module of its legal identity;
The data input module of merchandise news and current intelligence input system that enterprise and user are provided;
The anti-fake trace back block of information query, fake certification and product back-tracing inquiry is provided;
It is responsible for the data management module of the management of database;
Specifically, the authentication module is mainly responsible for the digital signature for checking verifying enterprise and user, determines it
Legal identity, including digital certificates are obtained, functions are regularly updated etc. to certificate;
The data input module is responsible for the merchandise news for providing enterprise and user and current intelligence input system, packet
Include the encrypting and decrypting etc. in message transmitting procedure;The merchandise news that enterprise and user are provided and current intelligence typing system
System.
The authentication module is mainly responsible for the digital signature for checking verifying enterprise and user, determines its legal identity,
Specifically, authentication module receives application for registration and relevant information from enterprise and user, true by authentication module
Whether the identity for determining enterprise and user is legal, if legal, provides public key certificate, and certificate is stored in data management module,
If illegal, the illegal feedback of information is sent to user, it is desirable that resubmit related application.
The data input module is responsible for the merchandise news for providing enterprise and user and current intelligence input system, tool
For body, data input module receives the authentication request from enterprise and user, transfers public key card to authentication center
Book, and it is whether legal by authentication module verifying identity, if illegal, it is illegal anti-that information is sent to user
Feedback, it is desirable that resubmit related application.If legal, merchandise news ciphertext is received, decryption judges whether data input terminates,
If be not finished, continues logging data if finished and store information into data management module.
The anti-fake trace back block is responsible for providing the retrospect inquiry of information query, fake certification and product, provides net
A variety of inquiry means such as page, short message, the communication of reader terminal guarantee to provide whole inquiring and authenticating service;
The anti-fake trace back block carries out fake certification to product, is divided into two stages: in the production phase, producer is by product
EPC code digital digest is extracted by SHA-1, and be encrypted with the private key of itself, digital signature obtained, by product
EPC code is stored in label together with signature;In Qualify Phase, EPC code is on the one hand subjected to SHA-1 processing, obtains expected number
Word abstract, is on the other hand decrypted its digital signature with the public key that the producer provides, obtains actual digital digest, pass through
It is compared after the anti-fake formality verifying of twice with desired value, if equal, label is legal effectively, is submitted to data base querying production
Product specifying information simultaneously returns the result, on the contrary then invalid.Label E PC code pass through SHA-1 and ECC encryption twice, attacker without
Method forges digital signature, has also just prevented a possibility that EPC code is copied and distorted.Allow to estimate producer's commodity
EPC code can not also copy its signature, cannot forge label.Current EPC coding structure standard includes: EPC-64, EPC-96,
EPC-256 considers the mainstream coding system developed at present and cost and shipment amount, and EPC-96 is selected to be encoded, and encodes
Length is 96bit, is divided into gauge outfit 8bit, Corporate Identity code 28bit, item category code 24bit and sequence number 36bit tetra-
Part.For the same enterprise, Corporate Identity code be it is identical, for same commodity, item category code
It is identical, and sequence number then distinguishes every commodity.
According to the control of the anti-fake needs of system and cost, using the Class1 type RFID electricity of passive type hyperfrequency (UHF)
Subtab.Destruction design for label, has software corruption and hardware to destroy two kinds at present.Software corruption mode is to pass through authorization
Reader to label send kill instruction, make label by permanent damage.The mode that hardware destroys, i.e. the storage mould of label
Block and antenna are divided into two parts in label, are connected by conducting wire, and when product is opened, label is destroyed.
Be compared after the anti-fake formality verifying by twice with desired value, specifically: RFID in each verifying,
A random number (such as EEDD33) can be written in card reader into RFID, while this number can be recorded in data management module
Come.When each RFID verifying, other than the information with signature in verifying RFID, also to compare when time RFID random number and data
Whether management module is consistent, is proved to be successful if consistent, while new random number is written;If it is inconsistent, verifying is obstructed
It crosses and alarms to data management module.In addition to this, secondary verification mode is taken to complete the identification process of RFID, for the first time
Basic verifying is completed when scanning RFID and apart from identification, then card reader can send continuous read-write to RFID, utilize
RFID card reader measures round-trip electromagnetic wave, is considered as legal scanning in the range of serial timing allows, if returned
Between transfinite, then be considered as illegal act.Because the normal reading/writing distance of RFIDM1 cartoon uses mapping mode to read within 10 centimetres
It takes, data will be sent to distal end, and two-way time can obviously increase, therefore judge that scanned RFID is by way of returning to timing
It is no legal effective, it alarms if invalid to data management module.
The data management module is directly responsible for the management of database, product information, regular number when having been subjected to as deleted
According to backup, data export etc., guarantee database normal operation.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to
So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into
Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme.
Claims (10)
1. a kind of RFID anti-counterfeiting platform, comprising:
It is mainly responsible for the digital signature for checking verifying enterprise and user, confirms the authentication module of its legal identity;
The data input module of merchandise news and current intelligence input system that enterprise and user are provided;
The anti-fake trace back block of information query, fake certification and product back-tracing inquiry is provided;
It is responsible for the data management module of the management of database.
2. anti-counterfeiting platform according to claim 1, which is characterized in that the authentication module receives to come from enterprise and use
The application for registration and relevant information at family determine whether the identity of enterprise and user are legal by authentication module, if legal,
Public key certificate is provided, certificate is stored in data management module, if illegal, it is illegal anti-to send information to user
Feedback, it is desirable that resubmit related application.
3. anti-counterfeiting platform according to claim 1, which is characterized in that the data input module is responsible for enterprise and user
The merchandise news and current intelligence input system of offer, specifically, data input module are received from enterprise and user
Whether authentication request transfers public key certificate to authentication center, and legal by authentication module verifying identity, such as
Fruit is illegal, then sends the illegal feedback of information to user, it is desirable that resubmit related application;If legal, commodity are received
Information ciphertext, decryption, judges whether data input terminates, if be not finished, continues logging data, if finished, by information
Store data management module.
4. anti-counterfeiting platform according to claim 1, which is characterized in that the anti-fake trace back block is responsible for providing product information
The retrospect inquiry of inquiry, fake certification and product provides a variety of inquiry means such as webpage, short message, the communication of reader terminal, guarantees
Whole inquiring and authenticating service is provided.
5. anti-counterfeiting platform according to claim 4, which is characterized in that the anti-fake trace back block carries out anti-fake test to product
Card, is divided into two stages: production phase and Qualify Phase.
6. anti-counterfeiting platform according to claim 5, which is characterized in that the production phase anti-fake trace back block to product into
Row fake certification, the EPC code of product is extracted digital digest by SHA-1 by enterprise, and is encrypted with the private key of itself,
Digital signature is obtained, the EPC code of product is stored in label together with signature.
7. anti-counterfeiting platform according to claim 5, which is characterized in that the anti-fake trace back block of Qualify Phase to product into
On the one hand EPC code is carried out SHA-1 processing, obtains expected digital digest by row fake certification, anti-fake trace back block, on the other hand
Its digital signature is decrypted with the public key that enterprise provides, obtains actual digital digest, is verified by the anti-fake formality of twice
It is compared afterwards with desired value, if equal, label is legal effectively, is submitted to data base querying product specifying information and returns
As a result, otherwise then invalid.
8. anti-counterfeiting platform according to claim 7, which is characterized in that after the anti-fake formality verifying by twice with expection
Value is compared, and is divided into two kinds: random number verification and apart from verifying.
9. anti-counterfeiting platform according to claim 8, which is characterized in that the random number verification refers to: RFID is being tested every time
When card, a random number can be written in card reader into RFID, while this number can be recorded in data management module;Every time
When RFID is verified, other than the information with signature in verifying RFID, also to compare when time RFID random number and data management mould
Whether block is consistent, is proved to be successful if consistent, while new random number is written;If it is inconsistent, verifying do not pass through and
It alarms to data management module.
10. anti-counterfeiting platform according to claim 8, which is characterized in that the distance verifying refers to: the identification to RFID
Journey takes secondary verification mode to complete, and completes basic verifying and apart from identification, then card reader meeting when scanning RFID for the first time
Continuous read-write is sent to RFID, round-trip electromagnetic wave is measured using RFID card reader, in the model that serial timing allows
It is considered as legal scanning in enclosing, if time of return transfinites, is considered as illegal act;Because the normal reading/writing distance of RFID M1 cartoon exists
Within 10 centimetres, and mapping mode is used to read, data will be sent to distal end, and two-way time can obviously increase, therefore pass through return
The mode of timing judges whether scanned RFID is legal effectively, alarms if invalid to data management module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811085187.4A CN109360001A (en) | 2018-09-18 | 2018-09-18 | A kind of RFID anti-counterfeiting platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811085187.4A CN109360001A (en) | 2018-09-18 | 2018-09-18 | A kind of RFID anti-counterfeiting platform |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109360001A true CN109360001A (en) | 2019-02-19 |
Family
ID=65350978
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811085187.4A Pending CN109360001A (en) | 2018-09-18 | 2018-09-18 | A kind of RFID anti-counterfeiting platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109360001A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112036910A (en) * | 2020-08-26 | 2020-12-04 | 北京软通智慧城市科技有限公司 | Method and device for verifying authenticity of article, storage medium and equipment |
CN117574939A (en) * | 2024-01-15 | 2024-02-20 | 中安网脉(北京)技术股份有限公司 | Real asset right determining method based on RFID technology and application thereof |
-
2018
- 2018-09-18 CN CN201811085187.4A patent/CN109360001A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112036910A (en) * | 2020-08-26 | 2020-12-04 | 北京软通智慧城市科技有限公司 | Method and device for verifying authenticity of article, storage medium and equipment |
CN117574939A (en) * | 2024-01-15 | 2024-02-20 | 中安网脉(北京)技术股份有限公司 | Real asset right determining method based on RFID technology and application thereof |
CN117574939B (en) * | 2024-01-15 | 2024-04-19 | 中安网脉(北京)技术股份有限公司 | Real asset right determining method based on RFID technology and application thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108053001B (en) | Information security authentication method and system for electronic warehouse receipt | |
JP5139415B2 (en) | Article information acquisition method and apparatus | |
CN102609846B (en) | Anti-false verification method and system based on communication network | |
US7703676B2 (en) | Encrypting the output of a card reader in a card authentication system | |
AU2006203515B2 (en) | Protection of Non-Promiscuous Data in an RFID Transponder | |
US8447991B2 (en) | Card authentication system | |
CN100576942C (en) | A kind of mobile antifogery method and system thereof based on mobile phone | |
CN107822208A (en) | Electronic cigarette and electronic cigarette activation system | |
KR101813658B1 (en) | RFID based genuine product certification service system and method using cipher update algorithm for forgery prevention | |
CN104281954A (en) | Anti-counterfeiting method for product | |
CN101009014A (en) | Secure anti-counterfeiting method and system thereof | |
JP2001512873A (en) | Data carrier authentication inspection method | |
EP1689117B1 (en) | A method for transferring data, a computer program product, a data provision and a data receiving device and a communication system | |
JP2015525386A (en) | Payment device, payment system, and payment method | |
US20190005495A1 (en) | Method for verifying transactions in chip cards | |
KR100723868B1 (en) | Method for verifying RFID tag and reader each other in EPC C1G2 RFID system | |
CN101866411B (en) | Security certification and encryption method and system of multi-application noncontact-type CPU card | |
CN105849739B (en) | Authentication system and authentication method | |
Ferradi et al. | When organized crime applies academic results: a forensic analysis of an in-card listening device | |
CN109360001A (en) | A kind of RFID anti-counterfeiting platform | |
CN107392001A (en) | A kind of authorization method, system and card | |
US20180205714A1 (en) | System and Method for Authenticating Electronic Tags | |
CN107423609A (en) | A kind of authoring system, method and card | |
CN115660021B (en) | RFID anti-counterfeiting bidirectional authentication reading method and RFID anti-counterfeiting system | |
CN112862501A (en) | Commodity anti-counterfeiting method based on NFC encryption chip |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190219 |
|
WD01 | Invention patent application deemed withdrawn after publication |