CN109635551B - Method for anti-counterfeiting tracing and authenticating information data through digital intelligent terminal - Google Patents
Method for anti-counterfeiting tracing and authenticating information data through digital intelligent terminal Download PDFInfo
- Publication number
- CN109635551B CN109635551B CN201811561049.9A CN201811561049A CN109635551B CN 109635551 B CN109635551 B CN 109635551B CN 201811561049 A CN201811561049 A CN 201811561049A CN 109635551 B CN109635551 B CN 109635551B
- Authority
- CN
- China
- Prior art keywords
- intelligent terminal
- digital intelligent
- information
- account
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a method for anti-counterfeiting tracing and authenticating information data through a digital intelligent terminal, which comprises the following steps: s1, a communication device sends a signal packet with account information of the communication device to a digital intelligent terminal, the digital intelligent terminal carries out address marking on the signal packet, establishes a corresponding tracing account storage address mark and returns the signal packet with the address mark to the corresponding communication device; s2, the communication equipment extracts an address mark after receiving the signal packet, carries out address marking on a self information source and a self channel and establishes communication connection with the digital intelligent terminal; and S3, the digital intelligent terminal checks the account and the address mark after receiving the information sent by the communication equipment, and broadcasts the unmatched address mark. The invention realizes the anti-counterfeiting traceability and authenticity of various information without equipment verification by connecting the digital intelligent terminal with the information.
Description
Technical Field
The invention belongs to the technical field of digital intelligent terminal communication, and particularly relates to a method for performing anti-counterfeiting traceability authentication on information data through a digital intelligent terminal.
Background
With the progress of science and technology, the society develops towards intellectualization, and the demand that the public can use intelligent equipment to carry out autonomous operation is more the livelihood. However, with the development of informatization, information security becomes a big problem in information communication. At present, methods such as two-dimensional codes, RFID labels, password verification, user common login addresses and the like are generally adopted for anti-counterfeiting traceability authentication in communication.
The two-dimensional code and the RFID label are mainly used for food information anti-counterfeiting traceability, a regional whole-course food circulation safety traceability system is established through an RFID technology and a related information transmission technology and an information processing technology, links such as livestock breeding, slaughtering processing and vegetable planting, food processing, transportation, wholesale and retail are brought into a supply chain online supervision system, links such as livestock breeding, slaughtering processing and vegetable planting, food processing, transportation, wholesale and retail are brought into the supply chain online supervision system, the whole-course traceability of food circulation is realized, fake and shoddy food can be found and processed at the first time, problems can be found and processed early, the probability of problems is effectively reduced, the confidence of consumers is improved, and the health and life safety of people are guaranteed. The password verification method is mainly used for password verification of each system and platform user, and comprises the steps that a server side searches a user with the user name admin from a database, then extracts the password of the user and compares the password with the password transmitted by the server side, and if the password is consistent with the password, successful information is returned to a client side. Or a is not encrypted, but its characteristics are extracted, for example, if the password is 123, the characteristics may be "a string of numbers, consecutive to each other, three digits", so that there are many passwords corresponding to the characteristics, such as 456, 789, etc., and if the granularity of the characteristics is fine to a certain extent, it can be regarded as representing a password completely, but not absolutely one-to-one. The Hash algorithm Hash is used to operate this process. The common login address of user is stored in the user account information, and is verified before login, and if login is in other place, equipment verification is required
However, in practice, the method can only truly check out the authenticity when the two-dimensional code, the RFID tag and the password are used for checking, but cannot trace back the address of the false information, and cannot truly realize the anti-counterfeiting tracing. The password verification mode is also easy to cause the conditions that the password is stolen and the password is cracked, so that the real authentication cannot be realized. The user common login address verification method can be used for distinguishing the user login address abnormity, but the user common login address verification method cannot judge whether the user is operating by himself or not, and when the user equipment is not around, verification cannot be completed, and normal login cannot be achieved.
The digital intelligent terminal is a service station which is arranged in each area and provides a transfer service station, and each area of a city can be respectively provided with one service station for public culture transmission, display of surrounding environments such as buildings, roads and various public facilities and provision of some convenient facilities and local area network communication. The anti-counterfeiting tracing and source distinguishing method has the advantages that various devices established in cities are combined, and great convenience is brought to establishment of anti-counterfeiting tracing and source distinguishing of various information data.
Disclosure of Invention
The invention aims to: the method solves the problems that some methods really check whether the information data is true or false, but can not trace the address of false information, and can not really realize anti-counterfeiting tracing in the information data transmission process, and some checking methods can distinguish the abnormal user login address, but can not judge whether the user operates the user, and when the user equipment is not around, the verification can not be completed, and the user can not normally login, and provides the method for carrying out anti-counterfeiting tracing and authenticating on the information data through a digital intelligent terminal.
The technical scheme adopted by the invention is as follows:
the method for anti-counterfeiting tracing and authenticating information data through the digital intelligent terminal comprises the following steps:
s1, all communication devices in a divided area send signal packets with communication device account information to a digital intelligent terminal in the same divided area, the digital intelligent terminal carries out address marking on the received signal packets, establishes an address mark corresponding to a tracing account storage account corresponding to an information account of each communication device on the digital intelligent terminal, and then returns the signal packets with the address marks to the corresponding communication devices;
s2, after receiving the signal packet with the address mark, the communication equipment extracts the address mark, carries out address marking on the information source and the channel of the communication equipment on the basis of the address mark, and establishes communication connection between the digital intelligent terminal and all the communication equipment in the divided region;
and S3, the communication equipment carries out information communication with the digital intelligent terminal according to the established communication connection, the digital intelligent terminal carries out account and address mark verification on the information sent by the communication equipment in the divided area after receiving the information, if the information source and the channel mark of the digital intelligent terminal are matched with the address mark of the traceability account on the digital intelligent terminal, the verification information is true, and if one of the information source and the channel mark is not matched with the address mark of the traceability account on the digital intelligent terminal, the verification information is false.
Further, the method for marking the address of the information source and the channel in step S2 adopts pulse coding marking, and marks a unique pulse waveform signal for the signal packet of each communication device.
Further, in step S3, when the verification information is false, the digital intelligent terminal broadcasts the received result that the information source and/or the channel mark and the verification information are not matched and are false to all communication devices that establish communication connection with the digital intelligent terminal.
Further, in the step S3, a crc method is adopted by the digital intelligent terminal for verifying the account and the address mark.
Further, the digital intelligent terminal information accounts and then carries out coding management on an information account database.
Further, the divided area is a circular area with a diameter in a range of 10-100 km.
In summary, due to the adoption of the technical scheme, the invention has the beneficial effects that:
1. in the invention, considering that some methods really verify whether the information is true or false, but the address of the false information cannot be traced back, and the anti-counterfeiting tracing cannot be really realized, some verification methods can distinguish the abnormal user login address, but cannot judge whether the information is self operation, when the equipment of the user is not nearby, the verification cannot be completed, and the normal login cannot be realized, based on the digital intelligent terminals arranged in various regions in a city, the digital intelligent terminals distributed in various regions are taken as transfer stations, the anti-counterfeiting tracing is carried out on the information data of all communication equipment in the region, the address mark corresponding to a tracing account storage account is established, the information source address and the channel mark are read and matched with the information sent by the communication equipment establishing a connection relationship, the information can be identified and traced, the user can log in a different place successfully, but if the information is not self login, the operation information can be verified as false, and if the operation is not self login cannot be confirmed, the problem that the user can not normally receive the information can be solved, and the problem that the user can not normally verify the self login can be solved.
2. In the invention, the method for marking the address of the information source and the channel in the step S2 adopts pulse coding marking, and a unique pulse waveform signal is marked on the signal packet of each communication device, because the pulse waveform signals have more characteristics and strong changeability, the uniqueness of the address marking is ensured, and the pulse waveform signal has wide decoding application range, thereby ensuring the applicability to most communication devices.
3. In the invention, the method for verifying the account and the address mark by the digital intelligent terminal adopts a crc (crc) verification method, so that the efficiency is high and the reliability is high.
4. In the invention, the digital intelligent terminal carries out coding management on the information account database after the information account, thereby improving the information management efficiency of the digital terminal and avoiding the disordered matching caused by the huge information account database.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
FIG. 1 is a block diagram of the method of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the detailed description and specific examples, while indicating the preferred embodiment of the invention, are intended for purposes of illustration only and are not intended to limit the scope of the invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
It is noted that relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.
The digital intelligent terminal is used for being distributed in each area to provide a function of a transfer service station, and each area of a city can be respectively provided with one service station for public culture propagation, displaying of surrounding environments such as buildings, roads and various public facilities and providing some convenient facilities and local area network communication.
The method for anti-counterfeiting tracing and authenticating information data through the digital intelligent terminal comprises the following steps:
s1, all communication devices in a division area send signal packets with communication device account information to a digital intelligent terminal of the same division area, the digital intelligent terminal carries out address marking on the received signal packets, an address mark corresponding to a tracing account storage account corresponding to an information account of each communication device is established on the digital intelligent terminal, and then the signal packets with the address marks are returned to the corresponding communication devices;
s2, after receiving the signal packet with the address mark, the communication equipment extracts the address mark, carries out address marking on the information source and the channel of the communication equipment on the basis of the address mark, and establishes communication connection between the digital intelligent terminal and all the communication equipment in the divided region;
and S3, the communication equipment carries out information communication with the digital intelligent terminal according to the established communication connection, the digital intelligent terminal carries out account and address mark verification on the information sent by the communication equipment in the divided area after receiving the information, if the information source and the channel mark of the digital intelligent terminal are matched with the address mark of the traceability account on the digital intelligent terminal, the verification information is true, and if one of the information source and the channel mark is not matched with the address mark of the traceability account on the digital intelligent terminal, the verification information is false.
The invention considers that some methods really verify true and false but cannot trace back the address of false information, and cannot really perform anti-counterfeiting tracing, and some verification methods can distinguish the abnormal user login address, but cannot judge whether the user operates the user, when the user equipment is not around, the verification cannot be completed, and the user cannot normally log in.
When the anti-counterfeiting traceability system is used for the anti-counterfeiting traceability function of food information, the real source and information of each food are stored in a mode of establishing a corresponding account, and the data are stored on the terminal equipment which is used as communication equipment to communicate with the digital intelligent terminal. When the food information is verified, the terminal equipment is selected, an information packet with the address code of the food information is sent to the digital intelligent terminal for verification, namely the address code of the food information is verified, if the address code of the food information is not matched, the verification result is false, and the digital intelligent terminal returns the verification result to the communication equipment comprising the terminal equipment. All people know the food information which is false and the address information thereof.
Further, in the step S2, the method for marking the addresses of the source and the channel adopts pulse coding marking, and marks a unique pulse waveform signal for the signal packet of each communication device. Because the pulse waveform signal has more characteristics and strong changeability, the uniqueness of the address mark is ensured, the decoding application range of the pulse waveform signal is wide, and the applicability to most communication equipment is ensured.
The pulse code mark may specifically adopt the following methods: dividing the transformed pulse signal into a plurality of sub-bands; performing a first sinusoidal pulse encoding operation on the sub-bands; determining an execution region of a second sinusoidal pulse encoding operation among the sub-bands based on encoding information of the first sinusoidal pulse encoding operation; and performing the second sinusoidal pulse encoding operation on the determined execution region, wherein the first sinusoidal pulse encoding operation is variably performed according to the encoding information, and when an audio signal in a higher layer is encoded or decoded by a hierarchical sinusoidal pulse encoding scheme, the quality of a synthesized signal can be further improved by considering sinusoidal pulse encoding of a lower layer.
Further, in step S3, when the verification information is false, the digital intelligent terminal broadcasts the received result that the information source and/or the channel mark and the verification information are not matched and are false to all communication devices that establish communication connection with the digital intelligent terminal.
Further, in the step S3, the method for verifying the account and the address mark by the digital intelligent terminal adopts a crc method. The efficiency is high and the reliability is strong. In the CRC algorithm, a binary data stream is taken as a coefficient of a polynomial, and then multiplication-division of the polynomial is performed. For example, we have two binary numbers, respectively: 1101, and 1011. 1101 is linked to the following polynomial:
1x3+1x2+0x1+1x0= x3+ x2+ x01011 is associated with the polynomial as follows: multiplication of two polynomials 1x3+1x2+ 1x0= x3+ x1+ x0: (x 3+ x2+ x 0) (x 3+ x1+ x 0) = x6+ x5+ x4+ x3+ x3+ x2+ x1+ x0.
After the result is obtained, modulo-2 operation is adopted when the same kind of items are combined. That is, the multiplication and division uses normal polynomial multiplication and division, and the addition and subtraction uses modulo-2 operation. The modulo-2 operation is the division of the result by 2 to get the remainder. Such as 3 mod 2=1. Thus, the above resulting polynomial is: x6+ x5+ x4+ x3+ x2+ x1+ x0, the corresponding binary number: 111111.
the addition and subtraction method adopts modulo-2 operation, and then becomes an operation which is generally called exclusive-or operation.
Further, the digital intelligent terminal information accounts and then carries out coding management on an information account database. The information management efficiency of the digital terminal is improved, and the problem of disordered matching after an information account database is huge is avoided. The Mysql in the database of the digital intelligent terminal manages the character coding, using three different levels, respectively: client (client _ set _ client): i.e. the client, in what encoded form the data will be prepared; server (character _ set _ server): namely the server, in what encoded form the data will be saved; connector _ set _ connection): i.e. what encoding scheme to communicate between the client and the server. Mysql sets the character encoding format for each database, each table, and each field separately.
Further, the divided area is a circular area with a diameter in a range of 10-100 km.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.
Claims (6)
1. The method for anti-counterfeiting tracing and authenticating information data through the digital intelligent terminal is characterized by comprising the following steps: the method comprises the following steps:
s1, all communication devices in a divided area send signal packets with communication device account information to a digital intelligent terminal in the same divided area, the digital intelligent terminal carries out address marking on the received signal packets, establishes an address mark corresponding to a tracing account storage account corresponding to an information account of each communication device on the digital intelligent terminal, and then returns the signal packets with the address marks to the corresponding communication devices;
s2, after receiving the signal packet with the address mark, the communication equipment extracts the address mark, carries out address marking on the information source and the channel of the communication equipment on the basis of the address mark, and establishes communication connection between the digital intelligent terminal and all the communication equipment in the divided region;
and S3, the communication equipment carries out information communication with the digital intelligent terminal according to the established communication connection, the digital intelligent terminal checks the account and the address mark after receiving the information sent by the communication equipment in the divided area, if the information source and the channel mark of the digital intelligent terminal are matched with the address mark of the source tracing account on the digital intelligent terminal, the check information is true, if one of the information source and the channel mark is not matched with the address mark of the source tracing account on the digital intelligent terminal, the check information is false, and the unmatched address mark is broadcasted.
2. The method for anti-counterfeiting tracing and authenticating information data through the digital intelligent terminal according to claim 1, which is characterized in that: in the step S2, the method for marking the addresses of the information source and the channel adopts pulse coding marking, and marks a unique pulse waveform signal for the signal packet of each communication device.
3. The method for anti-counterfeiting tracing and authenticating information data through the digital intelligent terminal according to claim 1, which is characterized in that: in step S3, when the verification information is false, the digital intelligent terminal broadcasts the received result that the information source and/or the channel are not matched and the verification information is false to all communication devices that establish communication connection with the digital intelligent terminal.
4. The method for anti-counterfeiting traceability authentication of information data through the digital intelligent terminal according to claim 1, wherein: in the step S3, the method for verifying the account and the address mark by the digital intelligent terminal adopts a crc method.
5. The method for anti-counterfeiting tracing and authenticating information data through the digital intelligent terminal according to claim 1, which is characterized in that: and the digital intelligent terminal information account carries out coding management on the information account database.
6. The method for anti-counterfeiting traceability authentication of information data through the digital intelligent terminal according to claim 1, wherein: the divided area is a circular area with the diameter of 10-100 km.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811561049.9A CN109635551B (en) | 2018-12-18 | 2018-12-18 | Method for anti-counterfeiting tracing and authenticating information data through digital intelligent terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811561049.9A CN109635551B (en) | 2018-12-18 | 2018-12-18 | Method for anti-counterfeiting tracing and authenticating information data through digital intelligent terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109635551A CN109635551A (en) | 2019-04-16 |
CN109635551B true CN109635551B (en) | 2022-11-22 |
Family
ID=66075661
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811561049.9A Active CN109635551B (en) | 2018-12-18 | 2018-12-18 | Method for anti-counterfeiting tracing and authenticating information data through digital intelligent terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109635551B (en) |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104463606B (en) * | 2014-12-25 | 2017-09-05 | 张世龙 | A kind of false proof source tracing method and system based on mobile intelligent terminal |
CN106022805B (en) * | 2016-05-25 | 2019-09-24 | 华中科技大学 | A kind of anti-fake traceability system and method based on tag readable degree |
US10102526B1 (en) * | 2017-03-31 | 2018-10-16 | Vijay K. Madisetti | Method and system for blockchain-based combined identity, ownership, integrity and custody management |
-
2018
- 2018-12-18 CN CN201811561049.9A patent/CN109635551B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN109635551A (en) | 2019-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109347635A (en) | A kind of Internet of Things security certification system and authentication method based on national secret algorithm | |
CN101094383A (en) | IPTV authentication and authorization method, server and system | |
CN103929411B (en) | Information displaying method, terminal, safety server and system | |
CN104299140A (en) | Two-dimensional code anti-counterfeiting traceability system and method based on e-commerce | |
CN104618334A (en) | Method and system for generating and verifying dynamic two-dimensional code | |
Krombholz et al. | QR Code Security--How Secure and Usable Apps Can Protect Users Against Malicious QR Codes | |
GB2546025A (en) | A Transaction authenticating device and method | |
US11449820B2 (en) | Electronic signing method and apparatus | |
CN102594806B (en) | Verification method and advertisement releasing server | |
CN105243715A (en) | Dynamic two-dimensional bar code based automatic registration method and system for district visiting users | |
WO2015154482A1 (en) | One-time certificate anti-counterfeiting tracing system based on mobile terminal and rfid | |
CN112348596B (en) | Bid quotation method, system, equipment and storage medium based on blockchain | |
CN105162604A (en) | Feature image identification based verification method and system, and verification server | |
RU2007111902A (en) | METHODS AND DEVICES INTENDED FOR TRANSFER OF CONFIGURATION INFORMATION TO WIRELESS TERMINALS IN A WIRELESS COMMUNICATION NETWORK | |
CN108243177A (en) | A kind of data transmission method and device | |
CN114051006A (en) | Data transmission method, data transmission device, computer equipment and storage medium | |
KR20170003905A (en) | System architecture and method for ensuring network information security | |
CN107241408B (en) | A kind of data transmission method and device, terminal device, storage medium | |
CN109635551B (en) | Method for anti-counterfeiting tracing and authenticating information data through digital intelligent terminal | |
CN104243026A (en) | Information sending method and information receiving method, device and system | |
CN111050326B (en) | Block chain-based short message verification method, device, equipment and medium | |
CN102868534B (en) | RFID (Radio Frequency Identification) safety certification method based on two-deck searching | |
CN103905205B (en) | Digital signature and verification method of a kind of striding equipment based on data image coding across application | |
CN113824727B (en) | Webpage login verification method and device, server and storage medium | |
CN108830626A (en) | A kind of two-dimension code anti-counterfeit traceability system and method suitable for e-commerce |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |