Disclosure of Invention
The content of the invention is divided into a plurality of parts such as anti-counterfeiting payment brief description, anti-counterfeiting payment detailed description (including introduction of irregular materials), currency, bank cards and the like, which are respectively described below.
1. Brief description of anti-counterfeiting Payment
1.1 false proof Payment
In the past, the anti-counterfeiting technology and the electronic payment technology are generally 2 unrelated technical fields, but the combination of the 2 technologies not only can maintain the rights and interests of consumers (the consumers can make payment after confirming the authenticity of the goods), but also has a lot of benefits. The payment method combining the anti-counterfeiting payment and the electronic payment is hereinafter referred to as the anti-counterfeiting payment. Specifically, this is not only a 1-payment technique but also a 1-forgery prevention technique, and since it combines forgery prevention with payment, it has many advantages described below, and thus it cannot be said that it is a 1-payment technique, nor a 1-forgery prevention technique. If the anti-counterfeiting and payment are split, many benefits of the anti-counterfeiting and payment are lost, so that the anti-counterfeiting and payment are 1 new concept thing, 1 new type technology which is not available before, and 1 cross-border technology. But the method for determining the collection account number of the commodity as a specific account number is 1 business method and may not be authorized, and the method for improving the security of anti-counterfeiting payment is proposed.
The combination of electronic payment and anti-counterfeiting can reduce counterfeit behaviors: in the process of commodity circulation, it is difficult to ensure the uniqueness of commodities, and for the serial numbers (also called numbers) and anti-counterfeiting codes of the same commodities, the corresponding commodities can be exchanged. But the only payment can be realized, the payment collection account of the payment of the specific commodity (the commodity with the specific number and the anti-counterfeiting code) can be limited to the account of the specific seller, and the payment is unique. Thus, even if counterfeited commodities are purchased by the buyer, the payment of the commodities cannot reach the account of the counterfeiter, and the counterfeiter is meaningless, so that the counterfeiter can be fundamentally prohibited from counterfeiting. The prior direct anti-counterfeiting method is difficult to completely ensure that the commodity is genuine, but the effect is much better because the anti-counterfeiting is indirectly realized through electronic payment. In this way, the reliability of the authenticity of the purchased product is far higher than that of the purchased product in the conventional physical store. In the past, electronic commerce, particularly network auction and the like, is not trusted by many people, but the situation can be changed at present. The invention mainly aims at online shopping and also comprises a method for online shopping.
And after the electronic payment is combined with the anti-counterfeiting, the payment is safer. Electronic payment is often started by confirming the identity of a subject, and in the past, a user logs in a payment platform by using a computer and often inputs a (static) password (called password in cryptography). When the internet bank is used, the U shield is often used, and the U shield also sends out the password, and the password is dynamic (changing). The anti-counterfeiting information (anti-counterfeiting codes and the like) can be used as verification elements (passwords and secret keys) for payment, and the passwords (anti-counterfeiting codes) are in the one-time pad level, so that the security of the anti-counterfeiting information is far higher than that of the existing electronic payment technology, and the anti-counterfeiting information can resist attack of quantum computing. In the existing payment technology, a human face, a fingerprint and the like are also used as verification elements, but actually, the verification elements are static and easy to copy, the copying difficulty is only a little higher, and the security of the existing payment technology is far from the high security of the payment technology of the grade of the one-time pad. The password and the key used in the conventional electronic payment are not bound with the collection account and the payment account, so that a hacker can randomly steal funds as long as the password and the key are cracked.
And the package and the parcel are adopted as carriers, the password and the secret key can be transported along with the commodity, the cost for transmitting the password and the secret key is negligible, and the problem that the password and the secret key of the one-time pad are difficult to transmit is solved. This combination of security codes with payment has not been available. The cost of adopting the measures is very low, while the cost of attack is very high, and the attack on the common commodities is not worth at all.
I have proposed 1 patent entitled "1 electronic payment system and method through specialized service organization" which uses a package to deliver a one-time pad payment password, which is the basis of I's patent, but the password therein is only used for payment, has no anti-counterfeiting function, has essential differences between them, and only uses 1 truly random dynamic password, which is simpler.
But the combination of anti-counterfeiting and payment is far from enough, and the following measures are provided for improving the safety: the anti-counterfeiting code in the past is only bound with the number of the anti-counterfeiting code (combined to be verified), the anti-counterfeiting code label can be attached to any 1 commodity at will, but the anti-counterfeiting code is bound with an order number, a service station number (the number of an offline service network), a serial number and the like, and if someone steals the anti-counterfeiting code on other commodities, the anti-counterfeiting code cannot pass verification. Even if the anti-counterfeiting code is discarded, the anti-counterfeiting code is not afraid of being stolen by others. The existing anti-counterfeiting and electronic commerce are not tightly combined, so that the anti-counterfeiting and electronic commerce can not be bound with an order number, a service station number and the like. This not only increases the amount of information of the authentication information, but also ensures that the user name and the service station number of the buyer can be personally confirmed by the buyer and the personnel at the service station (offline service network). The anti-fake code, the serial number of the anti-fake code and the serial number of the commodity can be copied and changed at will, and the information is difficult for buyers and service stations to distinguish true from false.
After the identity of the main body is verified, the main task of the conventional electronic payment is encryption, namely encryption of a collection account number and the amount of money, which is to prevent an enemy from tampering the collection account number and the amount of money. In the past, a collection account number is submitted to a payment platform and a bank by a buyer, and the strength of the buyer is very thin. For this purpose, the collection account number can be determined by the central control, i.e. converted by the user name of the seller. The collection account is not open, so that people cannot directly inquire the relationship between the collection account and the user name. The buyer determines the user name of the seller on a specific shopping platform, and the shopping platform can list a real and reliable list of the seller (manufacturer) according to the type, trademark, application and the like of goods submitted by the buyer, so that the counterfeit of the seller can be greatly reduced by determining the user name of the seller. The user name (and the collection account number) of the seller is determined at the beginning of ordering the commodity, and the buyer can hardly distinguish the authenticity of a large number of intermediaries through a plurality of links in the conventional commodity sales. In the past business model of the entity, the number of the middlemans is larger, people can hardly distinguish the truth of the middlemans, only electronic commerce is adopted, a manufacturer can be determined at the beginning of ordering, and the anti-counterfeiting code is bound with the collection account number and the like. In the past, people have few intermediate links in electronic commerce, and only know that the intermediate links can reduce cost and improve turnover speed, but rarely realize the anti-counterfeiting effect.
This process of determining a collection account number is divided into a number of steps: firstly, a buyer submits information such as the use, the type, the trademark and the like of a commodity to be purchased; providing a list of reliable sellers by a particular shopping platform; then the buyer determines the user name of the seller; after submitting the order, the seller produces and delivers the commodity to the buyer according to the order; when receiving the commodity, the buyer checks the commodity type, the user name of the seller and the like, and if the buyer orders the commodity, the buyer sends out a 'true random anti-counterfeiting code' through the mobile phone or the equipment of the service station so as to confirm the user name of the seller and the like; and the joint control center and the like convert the corresponding collection account number through the user name of the seller.
If the buyer has ordered more goods, he may not remember which goods he ordered and the amount of money, which makes the confirmation difficult, and a more feasible solution is: the buyer installs corresponding software on a mobile phone or a computer, the operation of ordering the commodity is carried out on the mobile phone or the computer through the software, the software records the information of the name, the trademark, the name of the seller, the amount of money and the like of the commodity after confirming the order, the information of the commodity is sent to the mobile phone or the computer of the corresponding buyer by a service station after the commodity is sent to the service station, the software on the mobile phone or the computer of the buyer compares the record with the software on the mobile phone or the computer of the buyer and gives a comparison result (the match or the disagree), and the buyer confirms the order and denies the order according to the comparison result and sends confirmation information by the mobile phone or the computer. In order to improve the security, the order information recorded on the mobile phone can not be accessed through the network, the order information is not output after the order is submitted, only the comparison result is output, and the comparison result is output only after the identity of the accessed main body (the service station or the joint control center) is verified.
This is to confirm and convert the collection account number by 1 system, which is more complicated but more reliable, and also brings convenience to the consumer to distinguish the seller, but there is no system for helping the buyer to confirm the collection account number. In the past, the anti-fake code has not been used as a password, and the true random password has not been used for completing payment. The combination of anti-counterfeiting and electronic payment is available in the past, but the combination of the anti-counterfeiting and electronic payment is not tight, people do not deeply dig the benefits of combining the anti-counterfeiting and electronic payment, and effective measures are not provided for improving the safety, so that the following improvements are provided for improving the safety of payment and the anti-counterfeiting effect.
1.2 System composition
I propose several more sophisticated systems: we set up 1 central server (hereinafter, the central server and its management organization are called as "joint control center") for controlling anti-counterfeit activity (activity of verifying anti-counterfeit code, irregular material, etc.) and payment activity, which can include payment platform (so that information transmission is more direct, and therefore security is higher), or physically connect with server of bank (so that information transmission is also direct), and usually does not include payment platform due to restrictions of payment license plate, investment, etc. In addition, a plurality of offline service nodes (hereinafter referred to as "service stations", and the main server of a service station is also referred to as a service station according to the convention) are also required to be set up for completing various transactions. For users who do not purchase and pay electronically, the service station can complete electronic shopping and payment for the users. These service stations for identifying the authenticity of goods and submitting goods form 1 new commercial service system together with the joint control center.
At present, many units do not have own servers and websites, and cannot finish verification of anti-counterfeiting codes by themselves, and the units can provide proxy services for the units (a certain proxy fee can be charged for the units by a joint control center), namely, 1 module for finishing verification of anti-counterfeiting codes and anti-counterfeiting materials (especially irregular materials) for sellers is added outside the joint control center, and the modules are hereinafter referred to as proxy modules. And a terminal for contact (a terminal for receiving an order, notifying that the order is passed through verification, encrypting an anti-counterfeiting code and the like) is set at the seller, and the terminal is hereinafter referred to as a notification terminal. For the sake of distinction, the joint control center and the agent module may be referred to as a "management center". However, the joint control center and the management center may be simply referred to as "management centers" without causing ambiguity. Certainly, some units have own servers and websites, can automatically complete verification of the anti-counterfeiting codes, can provide anti-counterfeiting and payment services for the units without using an agent module, and the servers of the units are hereinafter referred to as seller terminals.
Any person needs to verify the authenticity of the commodity through the joint control center and complete payment of the commodity, a user name (hereinafter, referred to as a personal name) needs to be registered in a service station through a line, and the personal name (without the name) can prevent the privacy and the payment account number from being leaked and needs to be unique. It is preferably specified by the service station so that it is not easily duplicated and the number has a small number of digits. When ordering goods on the network, the user also needs to submit the service station number, and the service station number is the basis for the joint control center to determine the decryption and encryption keys.
The user name is registered for any unit to sell the commodity, verify the authenticity of the commodity through the joint control center and finish payment, and is called the unit name for short hereinafter. The unit name is different from the company name, and the company name usually has a plurality of characters, is troublesome to call and input, and is easy to make mistakes. The unit name appointed by the joint control center can be obtained only by submitting relevant data to the joint control center and passing the audit. The unit names may be composed of letters, Chinese characters, etc. for easy discrimination, while the unit names may be composed of numbers for difficult discrimination. The use of the unit name is also advantageous for preventing the leakage of the account number for payment. Further, the user name of the buyer, hereinafter simply referred to as the buyer name, and the user name of the seller, hereinafter simply referred to as the seller name. Since 1 unit, a seller and a buyer are used, the seller and the buyer may not be able to distinguish whether they are individuals or units, and the name of each individual and the name of each unit are collectively called the user name.
Certainly, these functions (generating true random anti-counterfeiting codes and keys, and verifying anti-counterfeiting codes and anti-counterfeiting materials by sellers, etc.) can also be added to the payment platform, which is hereinafter referred to as a proxy platform. In the past, when the electronic commerce website pays, a strong encryption method is often adopted to send a payment instruction to a payment platform, which not only has high cost, but also is easy to attack. If the joint control center sends a true random password (namely an anti-counterfeiting code) to the agent platform, a strong encryption method is not needed, so that the cost is low and the security is high. The anti-counterfeiting payment is completed by using the agent platform, and the method is more advanced than the method for completing the anti-counterfeiting payment by using the agent module.
Certainly, the agent platform and the owned platform, or even the joint control center, can be integrated into 1 platform, so that after the buyer submits the order, the owned platform can directly transmit the serial number of the order to the agent platform, and the agent platform determines the order number (which is an important basis for determining the order information) according to the serial number. Therefore, the serial number of the order can not be exposed on a public network, and an adversary can not know the serial number and the order number, so that legal verification information can not be disguised and funds can not be stolen. The functions are respectively completed by different modules which are physically adjacent, so that the link of encrypting and transmitting information between the joint control center and the payment platform can be omitted, the cost can be reduced, and the safety can be improved. The platform is called a comprehensive payment platform, which is called a comprehensive payment platform for short, but the investment for building the comprehensive payment platform is large, and only the payment platform and the agent module are easy to integrate, and the following discussion is mainly developed aiming at the agent platform. And the method of encrypting by adopting a truly random secret key for each 1 link can well ensure the safety.
While in a service station there may be a busy job, only 1 computer cannot meet the demand, for which such a lan can be used: and setting 1 main server which is connected with the outside in a wired or wireless mode. In addition, a plurality of computers are adopted, the computers are connected with the main server in a wired mode and cannot be directly connected with the outside, and each 1 computer is only responsible for specific 1 or more tasks. They are classified into 2 types, and 1 type is responsible for simpler tasks such as registration of buyers, package collection and the like, and is hereinafter referred to as an auxiliary machine. The computer responsible for charging, recording delivery time, determining delivery plan and other important tasks is hereinafter referred to as the host computer. The tasks of each host and slave machine can be designated by the host server, for example, a buyer 1 is designated to which slave machine 1 gets to pick up the package. In the local area network, the main machine and the auxiliary machine are terminals, but not centers, wherein the center only has 1 computer of the main server, so that the computers are easy to coordinate. When the workload is less, only 1 host can be set, and the above-mentioned work of the main server is also completed, that is, the main server is also the host. The staff of the service station is hereinafter referred to as a teller, the teller operating the host is hereinafter referred to as a master teller, and the teller operating the slave is hereinafter referred to as an assistant teller.
The application of the existing anti-counterfeiting code has a plurality of defects, the object with the anti-counterfeiting label is not necessarily a genuine product, and the anti-counterfeiting label can confirm that the product is produced by the enterprise, but the product can be a fake product. Consumers believe commodities with known trademarks frequently, but counterfeit websites and sellers often appear in real life, so that the consumers are disadvantaged, and the authenticity of the commodities cannot be proved only by anti-counterfeiting codes, and the following methods are proposed for the consumers: the joint control center provides 1 shopping platform or adopts 1 shopping platform approved by the joint control center, which is called self platform for short, and the platform can be directly adjacent to the joint control center physically or far away from the joint control center. The platform comprises 1 special database, which only stores the name (including user name and company name) of the reliable seller authenticated by the joint control center, and the trademark, name, specification, usage, telephone, address and other information of the commodity provided by the seller. In the past, a plurality of network stores exist on a shopping website, and a consumer has difficulty in knowing whether the network stores are trustable or not. The own platform usually only allows manufacturers and reliable distributors to sell the commodities, so that the number of intermediaries is small, and convenience is brought to the selection of sellers by consumers. In the past, in the physical business, the number of distributors of the same 1 kind of commodities is thousands, so that the authenticity of the distributors is difficult to judge. In the past e-commerce, the number of the online stores selling the same 1 product on the same 1 shopping platform is as large as that of the sea, which certainly makes the consumers hard to distinguish the true from the false. The network stores are allowed to sell the commodities on the own platform, but only the certified network stores can sell the commodities on the own platform, the quantity of the commodities is strictly controlled, the network stores are definitely marked on the own platform instead of the manufacturers, and the reduction of the quantity of the sellers brings great convenience to consumers for selecting the sellers. The self-owned platform also allows larger business enterprises to distribute various commodities of certain categories (such as cosmetics, daily necessities and the like), and consumers have more trust in some large business enterprises and can select commodities more conveniently. The conventional shopping platform simply allows people to open online stores on the platform, and the commodities distributed by the online stores are not strictly checked and are left to be self-extinguished, which is improper and can be discarded by consumers if more perfect services can not be provided for the consumers.
The buyer can input the purpose, trademark, name, specification, name of seller, etc. of commodity on the platform, after searching and selecting, the buyer can directly submit the order on the platform, the platform transfers the order to the joint control center, the joint control center determines the corresponding contact way of the seller according to the name of the seller, etc. and informs the seller of the order in a reliable way (such as encryption and sending to a notification end). And the seller starts to produce and deliver goods after receiving the order. After the seller receives the order, the amount of the commodity can be checked, and if the amount of the commodity is lower than a preset price, an objection can be made.
This platform grasps the name and contact of the correct seller corresponding to the brand, trade name, etc., which prevents a counterfeit seller from deceiving a buyer with the name (especially, the name of a web store, a website), a brand, etc., of a similar seller. In order to facilitate the buyer to accurately distinguish the authenticity of the manufacturer of a certain 1 commodity, the following method can be adopted: firstly, a buyer submits information on the platform about the type of goods to be purchased, trademarks, names of goods, specifications, names of companies, addresses of companies and the like; the platform returns a list of 1 commodity of the category, wherein similar trademarks (such as prosperous phoenix, precious phoenix, vinegar, etc.), commodity names, company names, product introduction and company addresses are listed, so that each seller can be published with sales, sales ranking, good evaluation number, good evaluation rate, bad evaluation number, bad evaluation rate, etc. for distinguishing true from false, and the sellers can be sorted according to the sales, the good evaluation rate, the bad evaluation rate, etc. (sellers with large sales are generally real sellers, and counterfeiters have small sales); the buyer determines the name of the seller of the commodity to be purchased according to the list, and then submits an order for the name of the seller directly on the platform (usually, a "enter shopping cart" button is set behind the name of the seller, and the buyer can enter an order editing page by clicking the button, and then complete various operations of submitting the order).
For 1 kind of commodities, we list a plurality of trademarks similar to each other, and detailed manufacturer, product introduction and the like, which are easy to distinguish by buyers and are not easy to be deceived by counterfeit trademarks. It is reliable to determine the seller by the trademark, and the trademark law stipulates that anyone cannot infringe the exclusive right of registered trademark without permission of the trademark registrant, and the seller registered in the own platform must submit certificates such as a business license, while the agent (seller) selling the commodities of the same trademark as 1 cannot permit the registration in the own platform if the seller cannot submit the license material of the trademark registrant. The own platform also has a strict limit on the number of agents of the same manufacturer as 1.
The above method cannot provide anti-counterfeiting and payment services for goods sold by a shopping platform (hereinafter referred to as a non-owned platform) other than the owned platform, and in order to provide anti-counterfeiting and payment services for the non-owned platform, the following method is proposed: the buyer selects the commodity with known trademark on the non-owned platform, confirms the information of the trademark, seller, commodity name, amount, quantity and the like of the purchased commodity, confirms the order to the platform, the website sends the edited order information to the mail box (which can be provided by the joint control center) of the buyer, and the buyer checks the order information, approves the trademark, the name, the amount and the like of the seller and submits the order information to the joint control center. The joint control center converts the name of the seller into a corresponding real 'IP address' according to the record of the name and the IP address of the seller confirmed before, then randomly generates 1 check code, sends out an encrypted order and the check code to the joint control center, and records an order number, a personal name, a unit name, a commodity name, the amount of money and the like of the order for completing the subsequent authentication and payment (establishing a binding relationship between the order number and the personal name and the unit name). After receiving the information, the seller decrypts the information to obtain the order and the check code, and returns the information of the received order to the joint control center, wherein the information comprises the check code encrypted by a specific secret key. And the joint control center compares the decrypted check code with the record after receiving the information, if the check code is consistent with the record, a message of successful verification is returned, and if not, a message of failed verification is returned. The seller, upon receiving a message that the verification is successful, may prepare for shipment.
The main method for preventing the payment amount from being falsified in the conventional electronic payment is to encrypt the amount, and some means can be added here: the buyer checks the amount of money after seeing the order sent by the shopping website from the mailbox, and submits the money to the joint control center after considering that the amount of money is correct. The joint control center forwards the order to the seller, and the seller checks the received order and returns a response to the joint control center if the amount of money is consistent with the type and the quantity of the commodity. And after receiving the response of the step 1, the joint control center records the response, and the payment command can be sent only if the payment sum is matched with the record during payment, otherwise, the corresponding payment command is not sent.
The joint control center issues the key for decrypting and encrypting the order information and the check code to a legal seller (through an offline way) after being checked in advance. Only the real seller has the decrypted, encrypted key, which prevents counterfeiting by the seller. The buyer can only judge the authenticity of the seller, and the joint control center can judge the authenticity of the seller more reliably. After the shopping website sends the mail to the buyer, the order is sent to the seller through the joint control center after the mail is audited by the buyer, and the counterfeiting of the shopping website is prevented. And the seller receiving the order is judged to be the real seller by only the returned order information, and the seller is unreliable because the order information can be leaked on the network before, and the check code is difficult to obtain from the network by ordinary people, so that the safety (for verifying the identity of the seller) can be improved by using the check code. The reason why the order information is edited by the shopping website is that the order information often includes numbers, letters and the like and has many characters, so that the buyer can feel bored by editing the order information by himself or herself. This is more costly to run than the above-described method using an own platform ("shopping" in conjunction with "confirming manufacturer's identity" 2).
The mobile phone or computer of the buyer is also an important component of the system. Since mobile phones are most suitable devices because they are convenient to carry, the following discussion is mainly directed to mobile phones, and certainly, computers and the like can be used.
The above mentioned several methods for composing the system of anti-counterfeit payment, the main 1 of them is composed of the joint control center, the agent platform, the own platform, the buyer's mobile phone, the notification end, the main server, the host computer and the auxiliary machine. Or the system can also consist of a joint control center, an agent module, a payment platform, an own platform, a mobile phone of a buyer, a notification end, a main server, a host and an auxiliary machine. The seller side can also be used without using the agent module. Instead of using an own platform, a non-own platform may be used. In the system, the server of the service station is also 1 center, but not only 1 center of the joint control center, and the conventional electronic payment is usually only 1 center of the payment platform.
1 vulnerable weak point in anti-counterfeiting payment is a link for a buyer to submit an order on a shopping platform, the encryption capacity of the buyer is weak, if an enemy cracks a user name and a password of a certain buyer 1, the buyer can submit a forged order on the shopping platform, and accordingly, when the buyer receives a commodity, 1 true random password (hereinafter referred to as a buyer password) for indicating the identity of the buyer is sent to an agent platform to confirm the order.
In such electronic payments, the collection account number is not freely determined and submitted directly by the purchaser. In the past, when people shop on the internet, the seller possibly knows the collection account number of the seller directly from the internet, then the payment is finished through the payment platform, the seller sends the goods after receiving the payment, and the collection account number of the seller is directly submitted to the payment platform by a buyer; or directly submitting an order on a shopping website and then jumping to a payment platform to complete electronic payment; or after receiving the commodity, confirming the order and the collection account number on the guarantee payment platform through the guarantee payment platform, and confirming that the payment is completed after receiving the commodity. These methods are relatively simple and have many potential safety hazards. The conventional online shopping payment account is determined, submitted and confirmed randomly, so that great convenience is brought to hacker attack. In the past, when people buy online, people often submit payment accounts on a payment platform directly, and safety is guaranteed through user names and payment passwords, so that a lot of potential safety hazards exist, and the following improvements are provided for people: the method uses completely random anti-counterfeiting codes as payment passwords, which is fundamentally different from the prior payment technology and can resist attack of quantum computation. The collection account is not directly submitted by the buyer, and is converted by the joint control center according to the name of the seller in the order submitted by the buyer and encrypted to be sent to the payment platform. The confirmation of the collection account is not directly carried out by the buyer on the payment platform to submit confirmation information, but is completed through a safer channel (after the buyer receives the commodity, the buyer sends an anti-counterfeiting code and a buyer password after confirming the variety, the amount and the like of the commodity are correct), thereby eliminating important potential safety hazards.
The collection account is not usually an account of a network store, but is a regulated account of a manufacturer or a reliable distributor (explained below), and the relationship between the collection account and the manufacturer is not directly disclosed on the network, and the conversion is realized through a joint control center and the like. The determination and confirmation of the payment account is more complete, and is not submitted and confirmed by the buyer at will, but confirmed by transmitting a true random challenge value and a true random password (buyer password) for multiple times (see the following text in detail). Because the collection account number is established, the buyer's funds remain in the payment account and are not lost after the payment has failed. The method and the system have the advantages that the anti-counterfeiting code is directly confirmed in a correct and incorrect mode, namely, the anti-counterfeiting code is directly sent to the joint control center by the service station and is verified by the joint control center or the agent module, so that the link that a seller server returns the verification result of the anti-counterfeiting code to the anti-counterfeiting center is eliminated, and 1 important potential safety hazard is eliminated.
The method is characterized in that a unique user name is determined only for a real 1 seller, a true random anti-counterfeiting code and irregular materials are issued only to the true seller through a secure way, and an agent module and an agent platform judge the true identity of the seller of the commodity received by a final buyer through the true random anti-counterfeiting code and the anti-counterfeiting materials. The joint control center can also transfer the user data to the agent platform, so that the agent platform can directly complete the conversion between the user name and the collection account number, and the processing speed is higher and safer.
After the seller receives the order, the price of the commodity can be checked, and if the price is lower than the preset price, objection can be made. When the buyer receives the commodity (information), the price of the commodity can be checked through a mobile phone or manually, and if the price is higher than the preset price, objection can be proposed. Before the anti-fake code is verified, the joint control center can also compare the amount of money of the commodity with the record, and if the amount of money of the commodity does not accord with the record, the process can be stopped. And the previous third party payment and online bank payment have no link of comparing the amount of money with the record.
However, only the above measures cannot ensure absolute security, and the above measures must be combined with 1 new anti-counterfeit material, which can not only improve the security of electronic payment, but also improve the security of currency, bank cards, and the like, as described in detail below.
2. Details of anti-counterfeit payment
2.1 irregular Material
Now, the use of 1-time verified anti-counterfeiting code is wide, the anti-counterfeiting code can well prevent copying, and of course, the 1-time verified anti-counterfeiting code is also 1-time used (namely, invalid after verification), but the anti-counterfeiting code leaves 1 time of counterfeiting opportunity for an adversary, and 1 time of counterfeiting is favorable for commodities with higher jewelry equivalence. Even if the anti-counterfeiting and payment are combined, the collection account is fixed, the enemy can pack the commodities and sell the genuine commodities through the physical store to gain profit. The most important problem of the conventional anti-counterfeiting code and anti-counterfeiting material is easy copying, and 1 new anti-counterfeiting materials (hereinafter referred to as "irregular materials") which are difficult to copy are proposed, and are divided into materials with irregular shapes (which take shapes as main inspection bases), materials with irregular physical shapes (which take physical quantities as inspection bases) and the like. Rather, it is not necessary to use irregular materials if not for 1-time counterfeiting prevention. Now, 1-time anti-counterfeiting codes are used much, and the cost is much lower.
The materials with irregular shapes are classified into 1-dimensional, 2-dimensional and 3-dimensional 3 types. For example, filing 1 plastic rod with a flat surface with 1 irregular file with an irregular line would result in 1 irregular surface. If the 1-dimensional irregular material has a large surface irregularity, each portion can be inspected by 1 straight line, and the 1-dimensional irregular material will be hereinafter referred to as a 1-dimensional material. If the unevenness is large, it is impossible to inspect each portion in 1 straight line, and if the inspected portion is distributed on 1 plane, such irregular material will be hereinafter referred to as 2-dimensional material. If the examined regions are not distributed on 1 plane but are three-dimensional, the irregular material is hereinafter referred to as 3-dimensional material, which is extremely expensive to copy, but also expensive to manufacture.
The inspection of the irregular material is performed at a designated position (hereinafter referred to as an inspection position) by using a magnifying glass, a microscope, or the like. According to the figure checked at the appointed position, the processing is carried out according to a certain rule (for example, the conversion is 1, the conversion is not 0, the coordinate of the dust and the like can be directly converted into the data, or the quantity of the dust and the like in each square is converted into the data, the methods are many, and the invention does not strictly limit the method), the specific data can be obtained, and the authenticity of the commodity can be verified according to the data. Such data and inspected patterns are hereinafter collectively referred to as "inspection results". And the inspection positions are random and irregular, 1 or more groups of inspection positions can be randomly determined before the irregular material is sent out, and the inspection positions and the inspection results are recorded. When the buyer receives the commodity, after the primary verification (the verification of the anti-counterfeiting code and the identity of the buyer) is passed, the buyer sends out the checking positions to a specific person or equipment (such as a server of a service station) and checks according to the positions, so that the transmitted data volume is small.
If the server sends out the inspection result and the seller directly verifies the irregular materials, it is more beneficial to determine the identity of the buyer, but less beneficial to determine the identity of the seller. If the seller sends 1 check value (generated by irreversible algorithms such as randomly extracting a plurality of digits and the like) to the joint control center by taking the check result as source data before the seller sends the check position, then the seller sends the check position to the joint control center, and then the service station sends the check result to the joint control center, and the joint control center also generates 1 check value according to the check result and checks whether the check values are consistent or not, so that whether the identity of the seller is correct or not can be judged. And the verification value is generated according to the irregular material, and since the inspection position is uncertain, it is difficult for an adversary to obtain an accurate inspection result and generate the verification value. The check value is generated by an irreversible algorithm, so that an adversary can be prevented from deducing the checking result. And the inspection result is used as the source data, so that the method is more reliable than the conventional method for generating the dynamic password, because the source data is truly random. If the service station sends out the checking positions (1 in 1 specific group of positions can be randomly adopted), the seller sends out the checking results (checking a plurality of specific positions in advance), which is favorable for determining the identity of the seller, but the overall security is poor.
If the verification of the irregular materials is completed through the agent module (agent platform), the agent module sends out the inspection position through the joint control center, and the service station returns the inspection result, so that the safety is higher. Therefore, the adversary cannot pretend to be a legal seller to cheat, and also cannot pretend to be a joint control center to cheat. Every 1 request sent by the joint control center to the service station has a record, a specific serial number and the like, and corresponding responses are checked, so that if an adversary sends information which looks legal to the service station, the adversary cannot pass the check.
The methods for preparing irregular materials are numerous and can be said to be unlimited. Not only the above-mentioned method of filing with a file, but also the shape of a torn, broken, or broken portion of a material such as paper may be irregular. We can also do this by using 1 file with irregular surface to file 1 piece of plastic with flat surface in irregular route and speed; printing on materials such as paper or plastics by using the plastic as a printing plate (hereinafter referred to as a filing plate); the printed paper or plastic can be printed with 1 straight line or curve to check the graph on the straight line or curve. It is of course also possible to not print a line but to inform the examiner of the position of the line used for the examination, so that it is difficult for the adversary to perform the examination. The material can be cut out according to irregular directions and positions, and 1 side edge of the cut material is straight and is positioned at a position with more printed points and lines. These irregular materials are hereinafter referred to as rasped materials. If the examined part of the material is on 1 straight line, the material is actually 1-dimensional material. The proportion of the file materials printed by the same 1 file printing plate to the total file materials is controlled under a certain standard, so that the file materials commonly encountered by people are different.
In addition, opaque dust (fine solid particles) can be scattered, irregular vibration is applied to a screen carrying the dust to increase the randomness of the falling position of the dust, and the dust is fixed after falling on the base material. When the irregular material (hereinafter referred to as a solid particle material) is observed, the position is not easy to determine, lines and the like can be printed on the irregular material to assist positioning, but the thinnest of the lines which can be printed by a common printing technology can only reach 0.06 mm, and the small area is difficult to mark. The color blocks with specific size and certain distance can be printed (hereinafter referred to as positioning color blocks, which can be similar to the pattern of zebra stripes), and the boundaries of the color blocks are used as the basis for determining the position. The irregular material can be provided with fibers (hereinafter referred to as positioning fibers) to assist positioning, which can help positioning better, and the fibers are not provided under the condition of low requirement, so that the cost is reduced. It is also possible to use fibres of different thickness or colour for marking the positions, the thick fibres representing 1 and the thin fibres representing 0, 4 fibres in 1 group, which means 15 positions. Even if the position of the fiber is not very accurate, it can be 1 kind of position irregular mark. The surface of the material may be marked in a positive direction to facilitate the determination of the coordinates of the dust, the location of the inspected area. Thus, when fixing and checking irregular materials, the first thing to do is to determine the positive direction. The printed lines can be marked with scales and the like so as to calculate the deformation proportion and the like. Dots or other shaped markings for location may also be printed on the irregular material.
In particular such material may be such (see fig. 1, 2 a): transparent plastic with high strength or glass is used as a base material, so that the material is not easy to deform, and materials such as steel wires and plastic can be added into the base material or adhered below (outside) the base material to improve the strength, so that the material can be bent properly; the method comprises the steps of firstly coating a transparent adhesive (generally diluted by an organic solvent) on 1 surface of a base material, volatilizing the solvent, placing positioning fibers on the base material at intervals, facing the positioning fibers upwards, applying irregular vibration to a screen bearing dust to scatter the dust from the upper part, and disturbing by irregular air flow, wherein the movement of the air flow in a small space is irregular, so that the movement of the dust also becomes irregular. After the dust fell down, 1 transparent protective film was further coated thereon. The dust is preferably irregular in shape to increase the difficulty of copying. The base material has high strength, can prevent the material from deforming, but is easy to take off. The strength of the base material is low, so that the material can be prevented from being torn off. If the material for reinforcing such as plastic is adhered to the protective film of the irregular material and has a large width, a bad person can cut the irregular material at the places to steal the irregular material, and the irregular material is not damaged, so that the situation should be avoided.
The base material of the irregular material is transparent, which is convenient for direct observation by a microscope, but if the irregular material is attached to a commodity which is transparent or semitransparent, the background can influence the inspection result by direct observation by a magnifying glass and a microscope. For this purpose, an opaque substrate (see fig. 2b) can be used, and the color of the substrate needs to be different from the color of the dust, for example, white and black, respectively, otherwise it is difficult to distinguish the substrate from the dust. For the convenience of observation, a metal film can be attached under the adhesive to reflect light.
But randomly determining the inspection locations, which may be exactly on the positioning fibers; it is also possible that in certain locations there is too much dust and there is no significant gap between the dust; or the converted data is lack of randomness due to the fact that the dust is too little and a blank area is formed. These locations may be abandoned and additional locations may be searched for inspection until a suitable location is found.
In addition, the material can also be prepared by a method of spraying paint, coating, ink and the like, namely, the liquid such as the paint, the coating, the ink and the like is sprayed out under pressure, irregular airflow is used for disturbing liquid drops, a part of the liquid drops are attached to a base material such as plastic and the like, and a protective film is covered after the liquid drops such as the paint, the coating and the like are dried, wherein the irregular material is hereinafter referred to as a liquid drop material. The droplet material is the same as the solid particle material, and the inspection method is hereinafter collectively referred to as a particle material. Dry droplets, dust, etc., are opaque, fine particles.
We can also make such 1 irregular material (see fig. 3a, 3 b): the surface of the substrate is covered with 1 layer of opaque material (e.g. paint, paint) from which the solvent is evaporated, and then moved over the surface of the material in an irregular path using 1 or more (steel) needles (the distance between which is unequal and irregular) (e.g. the movement of the substrate is controlled by 1 motor, the movement of the steel needles is controlled by another 2 motors, 1 movement in the left-right direction is achieved, 1 rotation of the part on which the steel needles are mounted is achieved, the speed of movement of which is irregular). Thus, the steel needle will not have paint, coating, etc. in the place where the steel needle is stroked (the paint, coating, etc. will be scraped off), and thus an irregular pattern will be formed on the surface of the irregular material. The point of the steel needle is very small, so the mark drawn by the steel needle is very thin, and the adversary can hardly reproduce the same irregular material. Such irregular material is hereinafter referred to as "scratch material". To protect the coating, 1 protective film can be adhered on the surface of the coating. In order to prevent copying, a substrate can be coated with a coating, paint or the like which has high viscosity and cannot be used for printing, and people can only copy patterns by using ink or the like in the past.
Generally, the inspection of all scratches is not needed, and only 1 scratch needs to be inspected. Moreover, we do not need to record data for all the 1 scratch, and only need to check some parts. We need to do finer checks on smaller parts, so the amount of data is smaller. And which 1 (scratch) is used, hereinafter also referred to as the inspection position. Generally, a thicker needle can be used, the number of the needles is not too large, so that the scratch is thicker and less, the examination is easy, the manufacturing cost of the label is lower, and the label is suitable for commodities with lower value. For higher value goods, thinner and more pins can be used to increase the difficulty and cost of label duplication. It is easier to examine than particulate materials, but is easier to replicate.
We can use such an inspection device: 1 convex lens, 1 glass plate for determining the position of irregular material, 1 light source for illuminating the inspection part, and 1 CCD for light sensing. The CCD is positioned at the imaging position, the positions of the convex lens, the glass plate and the CCD are fixed, and the magnification of the image is also fixed. When the glass plate is used, the irregular material is placed on the glass plate, and an enlarged image can be generated. The glass plate may be printed with lines to facilitate location determination. And the irregular material may move according to the location of the inspection.
The packages for commodities having high value in the past are mostly disposable, because people should prevent forgery by these packages. But after the irregular material is adopted, the anti-counterfeiting technology does not depend on the package any more, so that the package can be simpler and can be recycled, the packaging cost can be greatly reduced, and the other 1 indirect benefit (beyond payment) of the anti-counterfeiting technology is realized.
There are many kinds of physical irregular materials, for example, the color depth can be used as the physical quantity to be considered, and 1 piece of white paper is sprayed with droplets of dye dissolved by volatile organic solvent, then sprayed with droplets of colorless volatile organic solvent, and then heated, blown by wind, etc. to rapidly volatilize the solvent, and then covered with 1 protective film. At this time, the dye is not completely diffused, and the concentration difference of the dye is large at each place. The paper is made of fibers, the dye is easy to migrate (commonly called feathering) through capillary action, so that the color of each part on the paper has good randomness, and the material is called feathering material in the following. To prevent migration of the dye, additional materials to prevent dye diffusion may be added after the solvent has evaporated, such as by spraying with melted wax, which, upon cooling, becomes a solid and prevents dye diffusion. However, it is difficult to develop a technique for determining the color depth at each location, and the cost is high.
We can also use refractive index as the property under investigation. For example, transparent plastics may be doped with substances that alter the direction of refraction of light (e.g., other types of plastic or glass debris, where the debris resulting from grinding the glass is highly irregular). A screen (which may be divided into sections, see fig. 4) containing debris of various types of material may be rotated and vibrated at irregular speeds and then disturbed by irregular airflow; after reaching a certain thickness, the raw materials are heated and pressed to form a body 1. These materials should not be mixed thoroughly or the randomness of the results obtained from examining the material everywhere is poor. Although the relative cost is high, the imitation is difficult, and the method is promising when being used in the fields of national defense, national security and the like.
It is also possible to mix lead, tin, copper, iron, graphite, etc. with different resistivity powders (materials with different resistivity should be used as much as possible to increase randomness) (the same method is used above), and then press them into 1 body, which can contain fine bubbles to increase randomness, and this material is called resistance material hereinafter. However, the air bubbles containing oxygen oxidize the metal, and for this purpose, the metal can be produced in an atmosphere filled with an inert gas such as nitrogen. There are many ways to examine the resistance material, and the present invention is not limited thereto. If 1 electrode is placed at a fixed position and the probe is placed at a different position, different resistances will be formed. The 2 probes can also be used to measure the resistance between 2 probes and convert the resistance into a checking result through a certain rule, and the distance between the 2 probes should be larger to improve the difficulty of attack. The resistance distribution associated with the inspection results for the 2 groups of positions is more complicated than that associated with the inspection results for the 1 group of positions, 4 groups being more complicated, and 16 groups being more complicated, even if the positions are regular (e.g., the distances between adjacent points are the same). The resistance between 2 points is related to the material at multiple locations, and this relationship is very complicated and difficult to deduce by calculation, and if the resistance material is to be reproduced, errors at 1 may result in different inspection results. This material is very difficult to reproduce, easy to store (not easily damaged), and low in cost for inspection, and is promising. There may also be 2 electrodes and the voltage, resistance, etc. measured at multiple locations (the position of these probes, electrodes, hereinafter collectively referred to as the interrogation location, which may be 1 set of locations, not necessarily 1 location alone) which is more difficult to copy. When the current between 2 electrodes is different, the change of the voltage at each position is nonlinear, so that the examination can be carried out under the condition of different currents, and the examination can also be carried out under the condition of different voltages between 2 electrodes, and the examination conditions are hereinafter referred to as examination conditions. In the prior art, it is costly to accurately control the current and it is easy to measure the resistance, so the method of changing the inspection condition is not discussed in the following.
The magnetic medium can be used to make irregular material, making the track irregular as much as possible, and using a sensitive magnetic head for examination.
The properties of irregular materials are irregular, theoretically infinite, so that it is difficult for an adversary to reproduce completely. And the examination according to the designated position leads the transmitted data volume to be smaller, thus being easy to inquire. If the inspection position is unknown, even if the enemy steals the irregular material, the correct inspection result cannot be obtained. This material is easy to manufacture but difficult to replicate, the cost of replication far exceeding that of manufacture. Of course, under certain technical conditions, the precision of checking irregular materials is limited, and it is also possible to reproduce irregular materials with such precision, but the cost thereof is generally very high and therefore difficult to realize. However, different irregular materials have different copying difficulties, and some of the current technologies cannot be copied according to a certain precision.
For the commodities with low value, only a small label made of irregular materials (hereinafter referred to as an irregular label) is needed to be pasted at the sealing part of the package, so that the bad can be prevented from packing the commodities, for the commodities with high value (such as diamonds), the bad can still pack the commodities from places except the irregular label, and the genuine commodities are sold through an irregular channel, so that only anti-counterfeiting payment and the irregular label are insufficient. The package can be covered by large irregular material, and the package can effectively prevent the commodity with high value from being changed. The irregular package can be divided into a package and a seal 2, and after the commodity is put into the package, the irregular material for sealing is attached to the seal. The packaging part can use the firmer base material to facilitate the recycling; the sealing part can be removed by using the base material with lower strength. After the irregular material with a firmer base material is produced in large quantities, the irregular material is difficult to distinguish from other irregular materials after being recycled due to the large quantity of the irregular material, so that the irregular material can be recycled for a plurality of times, and the cost of each use is low. After each use, the writing such as the serial number of the commodity and the buyer is washed away or torn off, and a new serial number is printed or a label such as a new serial number is attached when the product is used again. The inspection positions of the irregular package must cover the sealing position, and other enough positions (the interval between the inspection positions cannot be larger than the minimum linear degree of the goods), otherwise, the adversary can cut the irregular package from the inspection positions to carry out bag adjustment. For the irregular label, the position passing through the sealing position is checked, so that the checking position only needs to pass through the sealing position.
The inspection of irregular materials requires special equipment, so the inspection is usually completed at a service station. If the buyer requires to go to the delivery, the goods can be left in the service station, and the buyer is informed that the goods are delivered to the service station, and the information such as the type of the goods is informed, after the buyer checks the goods information, if the buyer orders the goods, the goods are confirmed, after the system checks the identity of the buyer, the service station sends an anti-counterfeiting code to the joint control center, after the anti-counterfeiting code passes the verification, the agent module sends a checking position of irregular materials to the service station through the joint control center, after the service station obtains the checking result of the irregular materials, the system returns to the joint control center and the agent module, after the verification passes, the system completes the payment, and the service station delivers the goods to the buyer, so that the buyer has the right to start the verification activity, the trust of the buyer is easy to get, and the delivery of the buyer does not need to run 2; the goods can be left in the service station, the anti-counterfeiting code label and the like are delivered to the buyer, the buyer submits the anti-counterfeiting code information through the mobile phone, the service station checks the irregular materials after the anti-counterfeiting information is verified, and the goods are delivered to the buyer if the verification is passed, so that the delivery person needs to run for 2 times, and the buyer has a long time waiting for processing results.
In the transportation of goods, each link of handing over is the most prone to cause problems, and to ensure that goods received by a last buyer are not regulated, problems do not occur in each 1 link, otherwise, once the goods are regulated, all former dealers are probably suspects, and the criminals are difficult to accurately determine. The simpler method is that when the goods are enough to be held by the safe, the goods are held by the safe, and every 1 new department, the goods in the safe are transferred or the password is changed. The links except for the goods transfer are safer, but the link of the goods transfer has problems. The safe may not be problematic, but the goods may be exchanged.
More reliable method is that when the safe is locked, 1 irregular label (hereinafter referred to as cross-over label) is stuck on the door seam of the safe door, and the specific part is checked, and the checking position and the checking result are recorded; when the goods arrive at the next 1 department or unit, the last 1 department or unit informs the inspection position of the goods, after the inspection result is obtained, the last 1 department or unit is returned, the last 1 department or unit carries out the authentication according to the record, and the authentication result is informed to the next 1 department or unit. If the verification is passed, then 1 new handover label is attached besides the handover label attached to the upper 1 department or unit, and the above operations are repeated (the specific part of the handover label is inspected, the inspection position and the inspection result are recorded, when the goods arrive at the next 1 department or unit, the upper 1 department or unit informs the inspection position, after the inspection result is obtained, the upper 1 department or unit returns, the upper 1 department or unit performs verification according to the record, and informs the verification result to the next 1 department or unit). If the verification fails, the relevant aspects are immediately informed to stop the transfer of the goods, so that the possible crime occurrence range is small, the suspect is easy to determine, and the criminal is greatly deterred. The hand-over label is not easy to copy like a conventional anti-counterfeit label, so that the safety can be greatly improved.
If the goods are large and many, it is impossible to hold 1 safe, and 1 large box for storing goods, hereinafter referred to as "safe box", can be manufactured. When the safe box is locked, 1 cross-over label is stuck on the door seam of the box door, and 1 new cross-over label is stuck when the safe box reaches the next 1 department or unit, and the verification method is adopted. If the conditions allow, the corner of the storage box can be provided with a cross-over label to prevent the goods from being taken out and packaged. If the quantity of certain commodities (such as mobile phones and the like) is large, the delivery unit can also use the safe deposit box to hold a plurality of commodities for 1 time, so that the anti-counterfeiting cost is reduced.
If the inspection position of the irregular material is informed, the inspection position is made by an unsafe method (namely, the irregular material is used more simply), so that many opportunities are given to the enemy, and the effect of the irregular material is greatly reduced. If the adversary steals 1 piece of irregular material and also knows the related key, etc., the verification request can be forged and the checking position can be obtained, so that the checking result can be obtained, and other measures are necessary for application. The accurate person and equipment can obtain the checking position in a reliable mode, the effect of irregular materials can be really played, and the identity of a buyer and a service station is confirmed through an anti-counterfeiting code, so that the system is more reliable.
And (5) verifying irregular materials, and placing the irregular materials at the last so as to achieve the highest safety. The final issuing of the payment instruction (or the execution of the payment operation of the agent platform) (generated by the joint control center) is performed after the previous multi-step verification (of anti-counterfeiting codes, irregular materials and the like), which is greatly different from the previous electronic payment, the previous electronic payment mainly only verifies the identity of a requester and encrypts payment information, and the verification of seller identity, order content, anti-counterfeiting codes and irregular materials and the verification of real objects are not strictly performed. However, the setting of these barriers will certainly bring great difficulty to hackers and also greatly improve the security of payment. In the past, the incidents that bank cards are swiped illegally are very common, but by adopting the payment method, the fund is much safer.
The irregular material is closely combined with reliable authentication and commodity anti-counterfeiting technology to have application value, and the anti-counterfeiting of the entity and the digital anti-counterfeiting are combined. If the identity of the person or entity who sends the authentication request cannot be verified, the inspection position is freely disclosed, and the safety is not high. It is very important to combine the use of irregular materials with the verification of the anti-counterfeiting code. The security code, irregular material, and the buyer password are also used to verify the identity of the buyer.
The characteristics of 1 person are unlimited and include not only name, telephone number, password, fingerprint, portrait, but also much content, which the adversary cannot completely copy. The buyer can go to the service station to pick up goods by himself, media such as membership card and U shield are provided before picking up goods, or passwords are input, fingerprints can be checked at places with conditional conditions to check the identity, and the characteristics under the lines are difficult to be copied by the enemy. This can be done initially (before the service station sends a verification request to the central control unit) and only a telephone call is made to pick up the goods, and there is no guarantee that the person who picked up the goods is the true buyer.
Of course, the use of irregular materials is troublesome and high in cost, and under the condition of low requirements, people only need to use anti-counterfeiting codes. With the development of economy, the requirements of people on the quality of commodities are higher and higher, and the use of irregular materials is also higher and higher.
If the seller end is adopted to finish verification, if the service station sends out an inspection result of irregular materials, the seller end can determine that the service station and the buyer are real, so that the joint control center can determine the authenticity of the identities of the service station and the buyer conveniently, but the identity of the seller end is determined to be unfavorable by the service station, an adversary can pretend to be a certain 1 seller, and a response of successful verification is returned to the received inspection result.
2.2 regulating Account Numbers and the like
In this payment, the collection account is not directly determined by the buyer (there is no operation of the buyer to determine the account number of the seller), and is determined by 1 highly functional joint control center, and the information communication between the joint control center and many entities is reliable, and the collection account number can never be easily modified by hackers. The binding of the payment account and the collection account cannot be realized at all depending on the payment platform or the bank. Furthermore, the security code is bound to the buyer of the transaction, the seller's account number, order number, product number, etc. In order to ensure that the binding relationship is reliable, the buyer, the shopping website can send order information such as the user name of the buyer, the name of the seller, the name of the commodity and the like to the joint control center after determining the order. If the same record cannot be found for a subsequent authentication request, a response can be given that the authentication failed (this 1 authentication request may be forged). Indeed, this binding is done not directly by the payment platform or bank, but by the central control, but in fact forms a binding between the corresponding accounts in the payment platform or bank.
To secure the buyer's funds, we can also take such measures: the buyer sets up a unique account (hereinafter referred to as a control account, and the account is referred to as a "control account") specially used for anti-counterfeiting payment on a specific payment platform (reliably connected with the joint control center, that is, encrypted and decrypted by using a reliable secret key) or in a bank, the buyer only uses the account to pay the payment when shopping, and the binding relationship is established between the user name of the buyer and the control account (of the buyer). Each 1 seller also opens a unique account number specially used for receiving the payment through the joint control center on a specific payment platform or bank, and the account number is also called as a 'control account number' in the following. Therefore, the buyer and the seller can not use (expose) the account number for payment in the process of shopping and payment; and when the joint control center generates a payment instruction, converting a corresponding account according to the binding relationship between the user name and the account thereof. As only 1 account is provided for each seller and buyer in the anti-counterfeiting payment, the joint control center and the like are not easy to make mistakes during conversion. Large producers can frequently access the funds of the control accounts, the producers need to obtain the funds and use the funds, only 1 transfer account of the control accounts can be used for ensuring the safety, so that the transfer accounts are fixed, and the flow direction of the funds is easy to control. The same 1 unit and person may be the seller and the buyer in different situations, and need to pay and obtain funds, so that it is not easy to limit the regulated account to only receive or pay funds.
To improve the security of electronic payments, the funds transferred can be classified into 2 categories: there is funds corresponding to the order (hereinafter referred to as "with the order", which is generally referred to as "make money"), and there is no funds corresponding to the order (hereinafter referred to as "without the order"). The joint control center is only responsible for payment of single money and does not participate in transfer without single money. The method has the advantages that the method has the correspondence between the single money and the order, buyers and sellers can be clearly determined, and the transfer of the single money is not easy to control, so that the method limits the payment to the transfer of the single money is 1 simple method and can improve the safety. For an individual, only the commodity is usually purchased, but the commodity is rarely sold, so that for the individual, the 'control account' can only send out single money and receive no single money, only receives a payment instruction for paying the fund sent by the joint control center, and does not receive the payment instruction for paying the fund sent by an organization outside the joint control center. For the unit, the unit can only limit, and the joint control center only completes the transfer of the funds with the single income and payment of the 'control account', but does not complete the transfer of the funds with the single income and payment of the 'control account'.
The binding relationship between the management account and the user name cannot be directly inquired on the network, and is usually stored in a server station, an associated control center, a payment platform or a server of a bank. The same 1 buyer can have a plurality of accounts on the payment platform or the bank, but only 1 buyer is used by the joint control center, so that the binding relationship is easy to realize, namely the binding relationship is realized by the joint control center instead of the payment platform or the bank. For safety, the operation of binding the user name and the regulated account number should be completed at the service station, and if the operation is directly completed by the user on the public network, the information may be leaked.
The user name corresponding to the payment account is determined by the order submitted by the buyer when shopping begins, and is personally determined by the buyer and the teller when checking and receiving the commodity, which greatly limits the range of the payment account, so that a hacker is difficult to realize transferring the funds of the buyer to the account controlled by the hacker; the buyer is required to pay, and the payment can be completed only by checking and receiving the commodity (real object) and then confirming. The hacker can steal the fund by forging 1 order and payment instruction, which is difficult to happen.
The seller's account (collection account) is only the one bound by the seller in the central office, and the range of the collection account can be further limited, which is beneficial to ensuring the safety of the buyer's funds. In order to limit the range of the collection account, for every 1 unit registered in the joint control center, the joint control center preferably only adopts 1 collection account number in a payment instruction sent by a payment platform or a bank for paying the goods, so that the range of the collection account number is smaller, and the payment safety is higher. While the seller does not have to (expose) his account number to collect on the web; when the joint control center sends a payment instruction to the agent module (or sends payment information to the agent platform), a corresponding account is converted according to the binding relationship between the user name of the seller and the account collected by the seller.
The conventional virtual account on the payment platform is opened, so that the application is random, strict examination and verification are not needed, and a plurality of virtual accounts can be opened by 1 person. The controlled account number cannot be applied at will, and the account number must be bound with real names and names after strict verification of identity and the like, and 1 person can only use 1 controlled account on 1 joint control center. This is important to protect the benefit of the buyer. The same 1 unit needs to sell the commodity and also needs to buy the commodity, and the collection account and the payment account can be the same as or separate from 1 account, but the buying and selling of the commodity need to use the only account respectively.
In the past, people usually directly use account numbers to pay, and the account numbers are composed of meaningless numbers, so that the account numbers are difficult to remember and difficult to manually identify, and convenience is brought to telecom fraud and hacker attack. This situation may be altered by completing the payment indirectly through the name of the seller. Each 1 seller only uses a unique user name in anti-counterfeiting payment, and the anti-counterfeiting payment system is composed of letters, Chinese characters and the like, and is easy to identify and remember. And the relation between the name of the seller and the name of the corresponding unit can be inquired on the network, and a cheater cannot obscure the relation. The conventional bank account can not check information such as units on the internet, and a fraudster can take advantage of the information.
In this kind of payment activity, only if the goods are sent to the service station or the buyer, the teller and the buyer at the service station can complete the payment if they see the goods, which is also 1 kind of payment method for the goods delivery, so the condition of two empty goods of the buyer will not occur. In such payment, confirmation of the payment information is not performed by decryption of the order information but by a person (buyer, teller). Payment may only be completed if the buyer approves the order 1 (especially payee, payer). If the buyer finds that the goods are not correct or the money is not correct, the buyer can propose an objection and stop the process at any time. If the goods are correct, the buyer will usually acknowledge the order as authentic unless the buyer wants to regret (allowing the return of goods because of the reasons of feeling too expensive, or not paying money, etc., which is also 1 important means of attracting customers, not allowing the return of goods to be inappropriate), but in these cases, the order is also authentic, and if the buyer and seller have made a prior contract, or if the confirmation of the transaction can provide what evidence, the seller can legally strive for his own rights. The process of confirming the order is completely different from the prior machine to process the ciphertext, is not 1 process which can be automatically completed by the machine, and is not only reliable, but also low in cost (complex encryption and decryption are not needed). This confirmation is performed by a specific key (key for the service station to contact the central office, key for the service station to contact the buyer), password, challenge value, etc. The delivery of the goods proves the existence of the order and the type of the goods can be reflected by the goods; its manufacturer, which can be determined according to the characteristics of the label or goods; the buyer of the goods can also be determined by the label on the goods and the previous records, which are all difficult to repudiate, and the information of the order corresponding to the goods is carried by the goods and is not obtained by a decryption means. Moreover, if the buyer does not acknowledge the order, he cannot obtain the goods (the goods will not be submitted to him by the teller), he originally has a strong will to decide to buy the 1 item, he may indeed need the 1 item very much, so there is less chance to repent. Confirmation of the order in this way is very reliable.
The receiving account is bound to the user name of the order and the buyer by an anti-counterfeit code, a check code, and the like. In the past, when a buyer starts to order, an order, a collection account number and the like are sent to a payment platform, and the binding can be realized, but the encryption and decryption capabilities mastered by an individual are limited, so the security is poor and the buyer cannot take the order. The seller (or the agent module) can determine that the buyer is real and accurate according to the anti-counterfeiting code, and the transaction 1 is real and accurate, which indicates that the identity of the seller is better. The seller is afraid of maliciously cheating the buyer to pick up the goods (the goods are not paid after being received), and in the payment method, the buyer is strictly verified, so that the condition is greatly reduced. Initially, the shopping platform or website may also determine the identity of the buyer by entering a login password or the like. Since the true buyer is known, the buyer can be easily found even if the payment for the goods is not paid.
The 1 more reliable method is that the united control center delivers the data to the U disk of the seller in advance through a offline way, wherein 1 item of data for verifying the identity of the seller (hereinafter referred to as the seller password) is stored. After the seller verifies the anti-counterfeiting information, if the verification is passed, the seller sends a seller password to the joint control center, and the joint control center confirms that the information is sent by the seller. The method has higher cost, and the seller does not need to use the password if the seller requests the agent module to complete verification and payment.
The anti-counterfeiting code in the past is often transmitted in the clear, and can be easily obtained by anyone, so that the anti-counterfeiting code can be used on other commodities by a baddie, and the commodities obtained by buyers are not necessarily true. In addition, the anti-counterfeiting code is not verified and is discarded at will for reasons of trouble, unwilling to spend on the internet and the like, so that the anti-counterfeiting code is easy to leak. A plurality of service stations for providing anti-counterfeiting code verification for buyers can be set on line, and the buyers can verify the authenticity of the commodities, so that convenience is brought to users, and the anti-counterfeiting code verification is more reliable. The supermarket can join the members, so that the cost of the site, labor and the like can be reduced.
Our anti-counterfeiting code can be generated using a true random number generator (e.g., a Chua's circuit), which is somewhat costly but can fundamentally prevent the anti-counterfeiting code from being broken. The security code may be encrypted when printed on a label (or placed on or in the packaging of the merchandise), so that it is difficult for ordinary people to know the true security code when obtaining the security information.
If the seller has a server (namely the seller end), verification is not completed through the agent module, and the anti-counterfeiting code can be generated by the seller end, encrypted and printed on a label and placed in a package of the commodity. After the commodity is sent to the service station, the package is opened, the anti-counterfeiting information is recorded into the server, and then the anti-counterfeiting information is encrypted and sent to the joint control center. The joint control center decrypts the anti-counterfeiting code by using a corresponding key to obtain a plaintext of the anti-counterfeiting code, encrypts the plaintext by using a specific key (certainly, the encryption can also be called as 1-time encryption by using a specific algorithm), sends the plaintext to a corresponding seller end, verifies the anti-counterfeiting code by the seller end to obtain a result, and returns the encrypted verification result to the joint control center. Here, the anti-counterfeit code is converted 3 times in total, that is, the seller side encryption, the service station encryption, and the joint control center encryption, which are hereinafter referred to as "3-time encryption". And the (encrypted and decrypted) keys are issued to the approved units (sellers), so that the counterfeit can be prevented from the source. The method (using the seller end) does not need to transmit true random passwords offline (from the joint control center to the seller), has lower cost and poorer security, and is only suitable for transactions with lower money amount. The weak link which is most easily attacked is that after the anti-counterfeiting information is confirmed to be correct, the seller end sends confirmation information to the joint control center, and if an adversary cracks the encrypted algorithm and the encrypted key, the attack can be implemented.
At present, many units do not have own servers and websites and cannot complete the processing, for the processing, a proxy module can be set up to provide proxy services for the units, and then a notification end is set up at a seller, and the processing flow is as follows: the agent module generates an anti-counterfeiting code (hereinafter also referred to as J1), copies J2 to a U disk after encryption (hereinafter also referred to as J2, the same applies), and dispatches the U disk storing a plurality of J2 to the seller; after the buyer submits the order, the joint control center sends the order to the notification end; after receiving the order, the notification end sends a notification to departments such as warehouses, workshops and the like to find, produce and purchase commodities, and when the commodities are sent, the notification end calls out J2 from a U disk (randomly or sequentially), encrypts the J2 (J3) and then prints the encrypted J8932 on a label; after the goods are sent to the service station, a worker (hereinafter, referred to as a teller) of the service station inputs a cipher text J3 of the anti-counterfeiting code and the serial number thereof into the server; after the server of the service station encrypts (J4), the server sends the encrypted information to the joint control center, the joint control center transfers the encrypted information to the agent module, and the agent module completes the verification of the anti-counterfeiting code; if the verification is passed, the joint control center sends a payment instruction to the payment platform, and after the payment (transfer) of the payment of the goods is completed, the payment platform returns a response of 'completing the payment'; the joint control center also returns a response of 'completing payment' to the notification terminal and the service station. Here, since the anti-counterfeit code is also converted 3 times (i.e., encryption of the agent module, encryption of the notification side, and encryption of the service station), the anti-counterfeit code is hereinafter also referred to as "3-time encryption".
In addition, the service can also be provided through the proxy platform, and the processing flow is as follows: the agent platform generates an anti-counterfeiting code (hereinafter also referred to as J1), copies J2 into a U disk after encryption (hereinafter also referred to as J2, the same applies), and dispatches the U disk storing a plurality of J2 to the seller through the service station; after the buyer submits the order, the joint control center sends the order to the notification end; after receiving the order, the notification end sends a notification to departments such as warehouses, workshops and the like to find, produce and purchase commodities, and when the commodities are sent, the notification end calls out J2 from a U disk (randomly or sequentially), encrypts the J2 (J3) and then prints the encrypted J8932 on a label; after the goods are sent to the service station, the teller records the cipher text J3 of the anti-counterfeiting code and the serial number thereof into the server; after the server of the service station encrypts (J4), the server sends the encrypted information to the joint control center, the joint control center transfers the encrypted information to the agent platform, and the agent platform completes the verification of the anti-counterfeiting code; if the verification is passed, the agent platform completes payment (transfer) of the payment of the goods and returns a response of 'completing payment'; the joint control center also returns a response of 'completing payment' to the notification terminal and the service station.
In the prior anti-counterfeiting system, the anti-counterfeiting code is encrypted, the encryption method is similar to 3 times of encryption, and the 3 times of encryption is not the key point of the invention. The use of true random anti-counterfeiting codes, buyer passwords and irregular materials is the key point of the invention.
If the irregular material is used, a method that the seller randomly determines the inspection position of the irregular material, obtains the inspection result and then encrypts and transmits the inspection position and the inspection result back to the joint control center can be adopted. But such vendors would set up the server themselves, which is not easily implemented by many merchants. We can also use another 1 method: the agent platform randomly determines the checking position of a certain amount of irregular materials (marked with numbers) in advance, records the checking result, and records the numbers of the irregular materials, the checking position, the checking result, the specific anti-counterfeiting code and the numbers thereof, wherein the numbers can be stored in a U disk and transmitted to a seller through a line. After the seller uses the irregular materials on the commodity (small irregular labels are attached to the sealing positions or a plurality of irregular materials are used for wrapping the commodity completely), the serial number of the commodity and the serial number of the irregular materials used on the commodity are encrypted and sent to the joint control center (the joint control center knows the corresponding relation between the serial number of the commodity and the irregular materials and anti-counterfeiting codes), and then the verification is completed by the agent platform. Under the condition of low requirement, the serial numbers of the commodities and the serial numbers of the irregular materials are not uploaded, so that the cost is reduced. This method has advantages that the inspection position and the inspection result do not need to be exposed on the network in advance, and the cost is low, but has a disadvantage that the inspection position is not easy to be determined. In order to determine the inspection position, more marks (such as a star mark) for positioning may be printed or marked on the irregular material, and the inspection position may be indirectly determined by the positional relationship between the marks for positioning and the inspection position.
In addition, the agent module can generate J1, key for encrypting checking position and checking result, and key for encrypting order number, buyer's user name and commodity number, which can be printed on label and transmitted with commodity. In contrast, in the conventional encryption, a relatively fixed key is often used, and the use of these 1-time keys makes it difficult for an adversary to generate an accurate ciphertext by paying (and verifying authenticity) the product of a specific buyer. Because the information such as order number is mainly composed of numbers, the enemy can hardly crack the information.
If the joint control center is physically adjacent to the payment platform, complex encryption is not needed to ensure the safety of information transmission. If the joint control center is not physically adjacent to the payment platform, complex encryption is used to ensure the safety of information transmission, so that the cost is high. Therefore, the situation that the seller sends the confirmation information to the joint control center after confirming the correctness of the anti-counterfeiting information and is attacked by an enemy does not occur. However, the anti-counterfeiting information needs to be transmitted offline, and the cost is high. In order to reduce the transportation cost, the USB flash disk can be delivered indirectly through the service station. The agent module generates true random anti-fake code and other data, stores the data in a U disk (for distinction, the U disk can be called as an anti-fake U disk), and sends the data to a service station to allow a seller to assign a person to receive the U disk. After getting, connecting the data with the notification end, and loading the data. When the notification end uses a certain USB flash disk for the 1 st time, the serial number of the USB flash disk is sent out, so that the agent module can know which 1 USB flash disk is picked up by the seller. The notification end can use J2 according to the serial number of J2, and can randomly call J2, wherein the J2 is higher in safety but higher in cost. Due to the fact that the number of the service stations is large and the service stations are widely distributed, the seller can conveniently obtain the USB flash disk, and the transportation cost is low. Of course, irregular materials can be indirectly delivered through a service station to reduce the cost.
The link of the buyer submitting the order on the shopping platform is easy to attack, and if an enemy monitors, the user name, the order content and the like (which are key information for determining transfer information) are easy to crack. In order to improve the security, the user name of the buyer, the user name of the seller and the order number can be encrypted to increase the attack difficulty. The specific method comprises the following steps: the agent platform sends the data to the U disk of the seller, and then 3 items of data of true random keys for decrypting the user name of the buyer, the user name of the seller and the order number are added; after the buyer submits the order, the agent platform determines the order number (certainly, the clear text of the order number cannot be revealed on the internet before), encrypts the order number, the user name of the buyer and the user name of the seller by using a true random key and sends the encrypted result to the joint control center; the joint control center encrypts and sends the information to a corresponding notification end; the notification end receives the information and then notifies the relevant department, when sending the commodity, the notification end decrypts the buyer name, the seller name and the order number by using the secret key in the U disk (if the conditions allow, when the agent platform sends the order information to the notification end through an online way, 1 secret key for encrypting the user name and the order number can be added, the secret key can be called as a network secret key for short, then the network secret key is used for encryption, the attack of an adversary after the information in the U disk is leaked can be prevented), and then the buyer name, the seller name, the order number (which can be simply encrypted) and the number of an anti-counterfeiting code and the like are printed on the label, but the service station number cannot be (strongly) encrypted, otherwise, the commodity cannot be sent to a correct goods receiving address; after receiving the goods, the service station sends verification information to the joint control center (the buyer name, the seller name, the order number, the serial number of the anti-counterfeiting code, the anti-counterfeiting code and the like are encrypted by using a secret key for the contact between the service station and the joint control center and are sent to the joint control center together); the joint control center transfers the information to the agent platform, the agent platform completes verification according to the number of the anti-counterfeiting code, the order number and the like, and then determines a payment account and a collection account according to the name of the buyer and the name of the seller to complete payment.
Because the key for encrypting the order number and the user name is random and used for 1 time, and the order number and the (plaintext) of the user name are also composed of meaningless contents such as numbers, the order number and the user name are difficult to be cracked by an adversary according to a ciphertext sent by the proxy platform. The user name is a basis for determining a collection account and a payment account, and if an adversary grasps the user name, stealing can be realized. Today, with the development of information technology, the greatest risk comes from the internet, so that it is more important to protect against attacks on the internet than against attacks off-line. Although we also provide electronic payment, key factors are controlled by means that are offline. In the above method, the plaintext of the order number is not revealed on the network until the service station sends out the authentication information. Although the enemy can obtain some anti-counterfeiting information from an off-line way, the efficiency is low, the cost is high, and the large-scale operation is difficult.
The user name is very important, and the agent platform does not know which 1 notification terminal to send information to without knowing the name of the seller; without knowing the buyer name, the service station number, the information from the service station cannot be decrypted (because the decryption key cannot be determined). Therefore, it is not feasible to simply adopt the conventional shopping platform, and at least the conventional shopping platform should be modified to grasp the accurate name of the seller and the name of the buyer, and the shopping platform and the payment platform are preferably integrated.
The agent platform and the notification terminal determine the number of the anti-counterfeiting code and can obtain the number according to the order of the orders received by the same notification terminal. If the order is generated by different shopping platforms, the order sequence of the order received by the same 1 notification terminal must be calculated respectively for different shopping platforms, if the 1 shopping platform cannot be firmly connected with the agent platform, the order sequence of the order received by the same 1 notification terminal is difficult to accurately determine, the serial number of the anti-counterfeiting code is difficult to accurately determine, and errors occur in the subsequent verification, so that the integration of the shopping platform and the payment (agent) platform is very important, and the conventional shopping platform is not enough to be simply used. The anti-counterfeiting codes are determined in sequence, and the number of the anti-counterfeiting codes can not be exposed, so that the safety can be improved.
In addition, in order to increase the attack difficulty, the anti-counterfeiting code (number of the anti-counterfeiting code) and the order number can be determined out of order. If the anti-counterfeiting code and the order number are determined in sequence, the enemy can be determined in sequence according to the sequence. The anti-counterfeiting code can be determined by: after receiving the USB flash disk sent by the agent platform, the seller returns the serial number of the USB flash disk through the notification end, and the agent platform determines the serial number of the anti-counterfeiting code mastered by the agent platform according to the serial number of the USB flash disk. After the buyer submits an order and transfers a deposit on the self platform, the agent platform randomly determines 1 anti-counterfeiting code (for convenience of operation, the anti-counterfeiting codes in a smaller range, such as 100 codes, can be selected each time) in the currently unused anti-counterfeiting codes of the notification end, sends the number of the anti-counterfeiting code to the notification end, and the notification end determines the anti-counterfeiting code used by the notification end and prints the anti-counterfeiting code (which can be simply encrypted) on the label.
The method of determining the order number may be: the agent platform is sent to the U disk of the seller, a secret key (used for 1 time) for decrypting the order number is stored, after a buyer submits an order on the self platform (1 serial number can be generated firstly for operation), the agent platform randomly determines 1 of the available order numbers, calls out a corresponding encryption secret key according to the serial number of the anti-counterfeiting code, encrypts the order number and sends the order number to the notification end, and the notification end decrypts the order number and prints the order number on a label (encrypted). In practice, the number of the anti-counterfeit code and the ciphertext of the order number, 1, are usually sent to the notification end, otherwise, the notification end cannot determine the relationship between the number of the anti-counterfeit code and the order number.
If the seller directly determines which 1 irregular material is used when the seller packages the goods, the verification is completed, and after the seller sends the goods, the seller needs to transmit the checking position and the result to the joint control center. If they are delivered by a sub-line route, which is inefficient and costly, we can use this approach: the agent platform transmits the information to 1U disk of the seller, wherein keys used for encrypting the checking position and the checking result are stored in the U disk, and the information is encrypted by using the keys and then transmitted to the joint control center, so that the agent platform is very safe. Since the inspection position and the inspection result are meaningless numbers, it is sufficient to prevent the information from being decrypted by using 1 key for the same number of 1 group of inspection position and inspection result (the encryption object is truly random and used for 1 time).
It is needless to say that the seller does not determine which 1 irregular material is used, that is, the agent platform records the information of the irregular material (before sending out the irregular material, records the serial number and the checking position, the checking result, etc.) first, and after 1 batch of the irregular material is sent to the seller, the agent platform returns the batch number, and the agent platform can determine the serial number of the irregular material owned by the seller, etc. The number of the anti-counterfeiting code and the number of the irregular material can be bound, and the anti-counterfeiting code and the irregular material are transmitted and used together, so that the number of the irregular material cannot be disclosed.
When the seller (notification end) receives the order information (herein, the order information also includes the serial number of the anti-counterfeit code, the cryptograph of the order number, the name of the product, the service station number of the buyer, etc., instead of only including the product name, the user name of the buyer, the service station number, etc.), 1 irregular material is sequentially adopted for a certain product 1. The seller sequentially adopts irregular materials (sequentially determines the numbers of the corresponding irregular materials) according to the sequence of the numbers of the anti-counterfeiting codes in the received USB flash disk; and the agent platform determines the numbers of the corresponding irregular materials in sequence according to the sequence of the numbers of the sent anti-counterfeiting codes. For a simple example, the agent platform uses the 1 st irregular material (numbered 1) for the 1 st order sent to a 1 st notification end; for the 2 nd order sent to a certain 1 notification end, adopting a 2 nd irregular material (the number is 2) … … to notify the end that the 1 st order is received (for convenience of operation, 1 serial number can be adopted), and adopting a 1 st irregular material (the number is 1); for the received 2 nd order, the 2 nd irregular material (number 2) … … is adopted, theoretically, the relation between the serial number of the U disk and the serial number of the irregular material is relatively fixed, the relation between the U disk and the irregular material can be determined when the agent platform sends the U disk and the irregular material, so that the related information is not required to be exposed on a network, but for the convenience of operation, the relation can be determined by a notification end or a service station (the serial number of the package of the irregular material and the serial number of the package of the U disk are sent to the agent platform at the same time, and the agent platform determines the serial number of the used irregular material through the serial number of the package), so that the sequence of sending the U disk and the irregular material to the service station and delivering the U disk to a seller is changed, and the relation is not related. However, the number of the anti-counterfeiting codes in the USB flash disk must be equal to the number of the irregular materials delivered to the seller, and otherwise, the anti-counterfeiting codes are difficult to match. The sales volume of the commodity of each seller is difficult to be determined in advance, and the number of the USB flash disk and the like to be used is also difficult to be expected, so that the relationship between the number of the notification terminal and the numbers of the anti-counterfeiting USB flash disk and the irregular material is convenient to be determined temporarily when the seller takes the USB flash disk and the irregular material according to the situation. Although the method is simple and convenient, if the irregular materials are placed and used in sequence, errors can be caused, and the serial numbers of the irregular materials and the order numbers of the commodities can be encrypted and transmitted back to the joint control center so as to complete verification. This has the disadvantage that the order number is again present on the public network, which provides the possibility to crack the order number.
To prevent cracking the order number, this can be done: the irregular material delivered to the seller is contained in a specific box. At the time of boxing, irregular materials are randomly adopted (from recycled old irregular materials or new unused irregular materials); sequentially sticking 1 'running water number (which is arranged in sequence)' label on each irregular material; and then placing the irregular materials in the box according to the serial number sequence, and simultaneously recording the relation between the serial number and the serial number of the irregular materials. If the recycled old irregular materials are used, the inspection position of each irregular material should be determined again, and the inspection result should be recorded because the data has been leaked.
When the joint control center sends order information to the notification terminals, an order number and a serial number of the irregular material are sent for each 1 notification terminal (the serial numbers are determined in sequence). When the seller sends out the commodity, the corresponding irregular material of the serial number is used for the commodity of each order number. Therefore, the seller does not need to transmit the serial number and the order number of the irregular materials back to the joint control center. This is actually a random change in the number of irregular material, and the adversary cannot deduce the number from its serial number alone. The relation between the order number and the number of the irregular material is determined by the joint control center, and the notification end is not needed to transmit the relation back to the joint control center.
In these links, the serial number of the anti-counterfeiting code can be usually encrypted in plaintext or simply encrypted, so that the serial number can be used as a reliable basis for determining order numbers, anti-counterfeiting codes, irregular materials and the like.
In practice, the seller and the buyer may not be in the same 1 city but far away from each other, so that payment and verification of anti-counterfeit information cannot be directly completed through the same 1 joint control center, and therefore, a plurality of joint control centers and agent platforms, hereinafter referred to as branch centers, need to be established in various places (usually in units of cities). It is also necessary to establish a mechanism for communicating and managing the respective branch centers, for example, a mechanism for establishing a joint control center for managing cities in Jiangsu province, which will be referred to as "regional center" hereinafter. It can also be set up with the mechanism for communicating and managing the center of each region, for example, the mechanism for managing the joint control center of each province in China, which is hereinafter referred to as "general center".
Thus, the overall process of verification may be: firstly, generating J1 from the decentration A; transmitting a ciphertext J2 of J1 to a seller A in the region to which the seller A belongs through a sub-route; when seller A sends out the commodity, the cipher text J3 of J2 is printed on the label and placed in the package of the commodity. After the commodity is transported to the corresponding service station of another 1 city, the service station encrypts and sends J3 to the branch center B in the area to which the commodity belongs, and the branch center B encrypts and sends the commodity to the branch center A (directly or indirectly). If the sub-center a and the sub-center B are adjacent or closer, they can easily agree on and exchange the encryption and decryption keys used in the contact, but if they are far apart, they may not easily agree on and exchange the encryption and decryption keys used in the contact, and the information can be transferred through the main center. For every 1 sub-centre, it is sufficient to have only the key for contact with the master centre, whereas there are many sets of keys if there is a key for contact with every 1 sub-centre. The promotion of international trade is very important, but the past events of imitating foreign famous brand products are rare, if the quality of commodities can be guaranteed, the business of related merchants can be done much better, and the service institution for anti-counterfeiting payment can be developed to the foreign countries, so that the quality of foreign products bought by the merchants can be guaranteed, and the foreign products can be sold more easily. And the number of the agent modules and the platform is more.
If the irregular material and the goods are placed and transported separately (the goods and the irregular material are marked with numbers, personal names and the like for determining the corresponding relation between the goods and the irregular material), although the verification link is increased, the working speed is reduced, the cost is improved, the chance of information leakage can be reduced, and the method is worthy of some goods with higher value and larger volume, but is not applicable to goods with smaller volume and easy package adjustment. For the goods with low value and large quantity (such as drinks), a plurality of goods are usually loaded together by trays, and if the order is received, the delivery time is delayed by finding out irregular materials and packing, it is feasible to print numbers on each goods, pack a plurality of goods, print numbers, anti-counterfeiting codes, user names and the like separately (encryption can be carried out simply) when the goods are delivered, and send irregular labels (can be locked by a code box) to the receiver together with the goods (or transmit the labels separately).
Of course, the irregular material may be transported together with the goods (the number of the irregular material, the inspection result, and the like may be recorded in advance, and the irregular material may be determined for each piece of goods at the time of shipment), and the label on which information such as the anti-counterfeit code is printed may be transmitted separately from the goods. This not only makes it difficult for the adversary to obtain the location of the inspection and to complete the verification, but also prevents the bag from being adjusted, which is exactly the best 1 combination method.
Without a service station, reliable encryption and decryption are difficult to realize, and safe, separate transportation and centralized verification of anti-counterfeiting information and goods are difficult to realize. Some anti-counterfeiting APPs are installed on mobile phones of some consumers in the past, but if software can be downloaded from the internet at will, great convenience is brought to the enemies. The enemy can deceive the buyer by letting the buyer download software containing viruses and malicious programs. We can let the buyer download the software directly at the service station, and fill the truly random key, which is much more secure.
The way of transmitting information used by ordinary people is easy to listen, and the service station can transmit information by using a strong encryption mode, even a special network can be used, and the safety is higher. And the encryption is carried out through the service station, so that the encryption cost is lower, and the cost can be shared by a plurality of users because the same equipment and device can be used for a plurality of times. For example, although the use of the U-shield can improve the security, the number of people who really use the U-shield is not large, because 1 is that many people do not want to buy the U-shield.
The anti-counterfeiting code in the past is simple to use, is usually only bound with the number of the anti-counterfeiting code (combined together for verification), and anti-counterfeiting code labels can be randomly attached to any 1 commodity. However, the anti-counterfeiting code is bound with a serial number, an order number, a user name of a buyer, a service station number, a commodity name, money, shopping time and the like, and if a person embezzles the anti-counterfeiting code on other commodities, the anti-counterfeiting code cannot pass verification. Even if the anti-counterfeiting code is discarded, the anti-counterfeiting code is not afraid of being stolen by others. This can only be done in conjunction with e-commerce. The serial number is corresponding to the batch number of the raw material, the work number of the corresponding worker and the like, so that the serial number cannot be randomly pasted. In the past, after a new anti-counterfeiting code is generated, a system needs to compare with records in a database, and only the anti-counterfeiting code different from the records can be used to ensure the uniqueness of the anti-counterfeiting code. However, the anti-counterfeiting code is bound with an anti-counterfeiting code number, a personal name, a service station number and the like, so that even if the newly generated anti-counterfeiting code is the same as the existing anti-counterfeiting code, the relation is irrelevant, and the comparison link 1 can be omitted. This can improve efficiency and reduce cost. The anti-counterfeiting code number, the service station number and the like can be encrypted by different keys and algorithms with the anti-counterfeiting code so as to increase the attack difficulty.
In practical situations, the total amount of the commodity is very huge, and if the anti-counterfeiting code is to be unique, the number of digits of the anti-counterfeiting code needs to be large, which brings great troubles to scanning, packaging and databases. The space occupied by the bar code is large, so that the packaging is large, the printing cost is high, the identification during scanning is difficult, different parts can be scanned for many times, the information quantity of the data stored in the database is large, and the information quantity of the transmitted data is large. After the anti-counterfeiting code is bundled with the user name and the like, a small number of digits can be adopted, and the related multiple items of cost are reduced.
In order to improve the security, 1 verification link can be added, after the agent module verifies the anti-counterfeiting code, or after the joint control center sends the encrypted anti-counterfeiting code to the seller end, if the anti-counterfeiting code passes the verification, the joint control center generates 1 verification code (hereinafter referred to as a transaction verification code) for the buyer of the anti-counterfeiting code, the verification code is sent to the mobile phone of the user by means of short message or WeChat, and the user returns the verification code to the joint control center; if the verification fails, the system directly returns 'fail' information to the service station, and the system starts an alarm program (namely, informs relevant units and departments and takes corresponding measures) from the 'fail' information, and sends the information to the mobile phone of the user in short messages or WeChat and other ways. The mobile phone number of the user can not be disclosed to the seller, so that the possibility of revealing the mobile phone number can be reduced. And after the transaction verification code passes the verification, returning a message of successful verification to the service station or directly to the mobile phone of the buyer. This prevents counterfeit stations from deceiving buyers, and increases user trust, since authentication can only be accomplished if one participates in the operation, and others cannot substitute. These verification activities are all done electronically, and the cost increase is limited. This is not only to use the SIM or USIM card to verify the identity of the buyer, but also to inform the buyer to inform the transaction or payment.
Of course, the duplication of SIM and USIM cards is common nowadays, so this is not enough. If the enemy knows the mobile phone number of a certain buyer and copies the SIM card and USIM card with the same number, the buyer can be pretended to be a legal buyer (especially, the information sent by the enemy cannot be received by the mobile phone of the real buyer when sending the information). The APP installed on the mobile phone can prevent the attack (the APPs on different mobile phones can use different keys to transmit information), but the keys used for the APP installed on the mobile phone to communicate with the outside (such as a payment platform) are generated according to a certain algorithm and can be cracked by an adversary. For this we can append a truly random (used in connection with the service station) key to the APP (by the service station) via an offline path, which can further improve security.
2.3 challenge verification method
If the mobile phone of the buyer contacts the joint control center by using the fixed secret key, the enemy can crack the secret key and forge a correct response after monitoring for a long time. Therefore, the joint control center can generate 1 challenge request and send the challenge request to the mobile phone of the buyer; after receiving the challenge request, the mobile phone of the buyer generates 1 truly random challenge value (hereinafter referred to as a challenge value A) and sends the challenge value A to the joint control center; meanwhile, the buyer's mobile phone also generates 1 response value (hereinafter referred to as B response value, the key can be directly annotated by the joint control center through the public network to prevent falsification of the service station), if the joint control center receives 2 or more different a challenge values, it indicates that there is an enemy attacking (so the enemy cannot conceal its illegal action from the joint control center), then sends the prompt message of "there is an enemy attacking" to the buyer's mobile phone, and stops the flow. After receiving the challenge value A, the joint control center encrypts the challenge value A to generate 1 response value (hereinafter referred to as A response value) and sends the response value to the mobile phone of the buyer; if the answer value A received by the mobile phone of the buyer is different from the answer value (answer value B) generated by the challenge value A sent by the mobile phone of the buyer, or 2 or more different answer values A are received, which also indicates that the enemy is attacking, the information of 'attack by the enemy' is sent to the joint control center, after the information is received by the joint control center, the information of 'attack by the enemy' is sent to the corresponding service station and the seller, the information of 'flow process stopped' is sent to the mobile phone, and the flow process is stopped. However, if the buyer's mobile phone sends a challenge request and a challenge value to the central control center at first, the technical effect cannot be produced. This method of preventing the disguise of an adversary by a truly random challenge value has not been available. The method for judging the identity of a subject (whether an adversary is attacking or not) by using the challenge value A and the like is hereinafter referred to as a challenge verification method, and is 1 original method. The irregular materials on the commodity can be used for verifying the authenticity of the commodity and also can be used for verifying the identity of a buyer, and the commodity is highly safe. Challenge-proof methods and irregular materials are the most important 2 innovation points in the invention.
2.4 site passwords, etc
In the past, when a consumer shops in a physical store, a store clerk directly submits commodities to the consumer, and the method is simple and easy. However, in electronic commerce, many customers require to be delivered to the home, which is troublesome in delivering goods, and particularly, it is more difficult to ensure the security of goods with high value and small volume, such as jewelry. The customer can take the goods in the service station by himself and can directly complete the verification operation (such as inputting a user name and a password to log in the system), which is simpler. However, if the customer is delivered to the home, the customer may require the verification operation (the verification information is submitted on the mobile phone) to be completed at home, which puts higher demands on us, and the demands can be met only by putting forward proper measures.
In order to facilitate the buyer to determine the identity of the delivery person and the identity of the service station to which the delivery person belongs, when the buyer completes the registration procedure at the service station, a server of the service station randomly generates a certain number (for example, 100) of passwords (hereinafter, referred to as site passwords) for determining the identity of the service station, and prints the passwords as a paper document (two-dimensional code or one-dimensional bar code) or displays the passwords on a display, so that the buyer can scan the passwords with a mobile phone and store the passwords. Thus, when the buyer receives the goods, the buyer can scan the website password by the mobile phone to determine the identity (whether the identity is correct) of the service station for the buyer to service. The use of the site password is 1-time, so that the security is higher. When the site password is low (for example, 10% remains), a certain number of site passwords can be randomly generated by the server of the service station and sent to the worker for home delivery. At the time of delivery, 1 (for example, the last 1) or more site passwords which have not been used before can be presented to indicate the identity, and after the buyer scans the site passwords with the mobile phone, the verification result is obtained, and if the verification is passed, the new site passwords are scanned and stored. The website password can prevent the situation that a fake website, seller and service station deceive a consumer from happening, and is also in a one-time pad level and is transmitted offline, so that the security is very high. In the past, people generally think that the cost of transmitting the password at the one-time pad level under the line is high, and the user and the delivery person can carry the password in order, so that the transmission cost is low. The website password is transmitted to the mobile phone in a wireless and wired mode, so that the website password is easy to steal by hackers, and the website password is directly submitted through offline ways such as paper files and the like, so that the method is safe. Certainly, the verification of the site password can also be completed without using a mobile phone, and the buyer directly verifies the site password manually according to the paper file, so that the situation that the site password is lost due to the loss of the mobile phone is avoided, but the situation is troublesome.
Before dispatching a delivery person (hereinafter referred to as a delivery person), a server of a service station randomly generates 1 verification code (hereinafter referred to as a pickup verification code) for determining the identity of a buyer for every 1 piece of goods, and sends the verification code to a mobile phone of the buyer, so that the delivery person determines the identity of the buyer. If more goods are to be picked up by 1 buyer at the same time, only 1 picking verification code can be generated and used. In this way, only the so-called "buyer" who presents the pick verification code to the delivery person can obtain the corresponding goods without delivery errors. In addition, before dispatching the delivery person, the server of the service station sends the serial number of the delivery person to the mobile phone of the corresponding buyer, so that the buyer can judge whether the identity of the delivery person is correct or not through the serial number of the delivery person. In order to prevent a delivery person from packing the goods during delivery, the goods can be stored in a code case for the goods with higher value. Before the delivery person starts, the teller determines which 1 combination lock (the combination lock has a label with a number) to use and locks the goods together with the corresponding station password in the combination lock. The password for unlocking the lock of the password box is randomly generated by the server and set by the teller. And the server sends the number of the code box and the unlocking code to the mobile phone of the corresponding buyer. The password for unlocking does not tell the delivery person. The goods taking verification code, the goods delivery person number, the code case number and the unlocking code of the code case can be sent together or separately. After the buyer receives the goods and verifies that the goods are correct, the buyer can use the mobile phone to generate 1 verification code (hereinafter referred to as work verification code) for indicating that the goods delivery work is completed. The bought home mobile phone sends the work verification code to a corresponding service station, and the work verification code is also told to a delivery person. After the delivery person returns to the service station, the delivery person informs the teller of the work verification code, and if the work verification code is the same as the record, the system confirms that the goods are delivered. Conventionally, when a purchaser receives a package, only a manual signature is performed, but when a delivery person pretends to be the purchaser and performs the signature, the confirmation is difficult and the time of finding the signature is often late.
There are 1 weakness in the above method: and (4) a step of submitting an order by a buyer on a shopping platform. For this, the buyer password, the shipping password may be used: if the buyer receives the goods at the service station, the order can be confirmed directly at the service station, and the buyer password is directly sent out by the service station. If the delivery is carried out by the delivery person, the service station generates 1 truly random password (namely the delivery password) and adds the password to a device (such as a mobile phone) carried by the delivery person, when the buyer receives the goods at home (or a working unit and the like), the buyer confirms on the device carried by the delivery person and sends out the delivery password, and after the verification of the password by the service station is passed, the buyer password is sent out to the agent platform through the joint control center. And after the verification is passed, the agent platform completes payment of the payment. The use of service stations and delivery personnel equipment is more reliable. And a truly random password is difficult to attack by an adversary. The delivery password can be generated by a server of the service station and then added into equipment carried by a delivery person, so that the delivery password can be sent by a buyer at home, and the delivery password is easier and lower in cost. And the mobile phone of the buyer downloads more passwords for 1 time, which is not only troublesome (the buyer can run for many times), but also unsafe. The buyer password can be generated by the agent platform, stored by using a USB flash disk (which can be called as a 'buyer password USB flash disk' for the sake of distinction), and transmitted to the service station, and then the staff member of the service station connects the USB flash disk with the main server to load the data. The buyer password is truly random, which determines that it cannot be time synchronized, cannot be algorithmically derived, can only be transmitted through a offline path, can be event synchronized, and can also be synchronized by number. The event-based synchronization (sequential synchronization) can be performed in order of 1 buyer, or in order of sending verification information from the service station, and the enemy cannot easily grasp the sequence, so that the security is high. The synchronization is performed according to the serial number of the password (the serial number is also sent out when the password is sent out every time, and the buyer password can be used in sequence according to the order of sending out the verification information), so the cost is lower, the implementation is easy and the operation is more feasible. The anti-counterfeiting USB flash disk can not be bound with anti-counterfeiting codes, so that the USB flash disk does not need to be corresponding to the anti-counterfeiting USB flash disk, and the anti-counterfeiting USB flash disk is convenient to operate and low in cost. Under the situation of low requirement, the buyer password U disk and the buyer password can not be used, so that the cost is reduced. The anti-counterfeiting U disk can only contain the anti-counterfeiting code and the number thereof, wherein the number is derived from the number of the irregular material (2 is the same). And the service station submits the irregular materials to the seller and also submits the corresponding anti-counterfeiting U disk, wherein the number of the corresponding irregular materials and the corresponding anti-counterfeiting code are stored. When the joint control center sends an order to the seller, the joint control center does not send the serial number of the order, but sends a corresponding anti-counterfeiting code number, uses the anti-counterfeiting code number as the order number, and stores the corresponding relation between the serial number of the order and the anti-counterfeiting code, so that the cost is lowest.
At present, mobile payment is more and more widely applied, brings great convenience to people, and even a lot of people do not carry purses at ordinary times. But the biggest problem of mobile payment is insufficient security, which is the main reason that most people do not accept electronic payment. The mobile payment brings convenience to people and hackers. To secure mobile payments, dynamic passwords, preferably truly random dynamic passwords, must be used. However, it is difficult and unreliable to deliver the means for generating the dynamic password (e.g., the U-shield) directly to the user by the payment platform. It is more difficult to directly transfer the truly random dynamic password. Only by setting a large number of service stations, the Udun and true random dynamic password can be reliably and cheaply transmitted. The payment method is highly safe and even exceeds the safety of payment of a bank system. People who can not electronically shop and pay can finish the operation at the service station instead of a teller, and the operation of the buyer is simpler. Therefore, the promotion of electronic payment can be promoted by the adoption of the technology.
For the commodity with high jewelry equivalent value, if the user orders the commodity and repels the goods to return, great loss is caused to the seller. Especially personalized and customized products, are difficult to sell again after return. For these goods, the seller typically requires the buyer to pay a subscription before the order can be validated. For this case, we can continue with other processes (notify seller, etc.) after the buyer pays the subscription. Of course, for the less valuable commodities, the step of collecting the deposit may not be provided.
If the plaintext of the true random anti-counterfeiting code is simply transmitted, the true random anti-counterfeiting code is easy to leak and is easily copied by people. By means of the joint control center, multiple times of encryption can effectively prevent the decryption of the secret key of the encryption order number and the like and the copying of the anti-counterfeiting code, but the decryption of the secret key of the encryption order number and the like and the copying of the anti-counterfeiting code (bag transfer) cannot be prevented fundamentally. And the use of irregular materials can prevent the decryption of the key encrypted for 3 times. The security of electronic payment using irregular materials is far from comparable to that of the existing electronic payment technologies.
The true random password can be used only for transferring the payment of the amount corresponding to the order of the buyer to the specific account of the seller, so that if the password is successfully verified, the payment is transferred to the seller; if the password is not successfully verified, the payment is still on the purchaser's account and does not fly. In the past, the payment account can be determined at will, which brings great convenience to hackers. The buyer and seller of the certain 1 commodity are determined, so that the victim and the responsible person can be easily determined for the counterfeit behavior, which is also beneficial to the prevention of the counterfeit. Even if the counterfeiting is successful and the payment is cheated, the tracing is easy.
The irregular label can prevent the anti-counterfeit label from being copied, but the goods are difficult to be completely eliminated and wrapped. The 1-time verified anti-counterfeiting code can well protect against copying the anti-counterfeiting code, but this still leaves the enemy with 1-time counterfeiting opportunity. After the anti-counterfeiting and the payment are combined, even if the buyer obtains counterfeit goods, the money is paid, and the goods money can only be transferred to the correct seller and cannot be transferred to the opponent of the bag. In the past, most people buy commodities through the traditional offline way, and the commodities exchanged by the bags can be sold. However, when most people shop electronically, the genuine products exchanged by the enemy bag will be difficult to sell because of the lack of legal anti-counterfeit codes. Large, well-known units do not receive such merchandise, while unknown units are difficult to sell. The certification of the manufacturer is very important to prevent the adversary from selling the packaged goods through the famous unit, and the certification of the manufacturer by the above method is much stricter than that of the past method.
In the above method, most of the key information is transmitted through the offline path (the transmission of the key, the anti-counterfeiting code, the irregular material, the input of the password by the buyer, etc.), which greatly increases the difficulty of the attack.
Only a unique user name is determined for a certain 1 real seller, and only a true random anti-counterfeiting code, irregular materials and the like are issued to the seller in a safe way, and the agent module and the agent platform also judge the true identity of a manufacturer (seller) of the commodity received by the final buyer through the true random anti-counterfeiting code and the anti-counterfeiting materials. The judgment is very reliable and is realized by a system formed by closely combining a series of multiple links, and the improvement is made on the possible multiple links. However, through the conventional business system in the traditional mode, the identity of the manufacturer of the commodity cannot be accurately judged at all, because the number of links that the commodity passes through is too many, and each 1 link may have problems, and the identity and the qualification of the dealers are difficult to be clarified only by the power of a single consumer.
Apparently, the use of truly random passwords, keys, irregular materials results in higher costs, but after the security is improved, the trade volume will be increased, the overall efficiency will be higher, so the total profit will be higher, and the total cost will be reduced. Manufacturers who do not use these methods lose trust and manufacturers who use these methods increase reputation. The producer actively engaged in these activities when the methods began to be used, is itself 1 brand marketing.
Certainly, some units have great strength and large sales amount, and can sell commodities directly through the website of an enterprise without selling the commodities through the shopping website, so that the link of communicating with the shopping website can be eliminated, and the specific method is as follows: the buyer orders the goods on his/her corporate web site, which in turn sends the order to the mailbox in the buyer's corporate control center, after the buyer verifies the order, it submits it to the corporate control center, which in turn returns a response … … (the same applies below) to the corporate web site that the order has been verified and recorded.
In the past, most of the goods with higher value are bought in a physical store, because people think that buying goods on the internet causes problems, related responsible persons can not be found, and the goods are difficult to obtain compensation, after-sales service and the like; when the user goes to a physical store for shopping, the user can find out related persons in charge even if the goods are in trouble, and the user can easily obtain compensation, after-sales service and the like. The physical store operator is hard to avoid the responsibility and is also reluctant to sell the counterfeit goods because of the serious operation. However, the reliability of authentication of a commodity purchased through an electronic route using the above method is far higher than that of a commodity purchased through a brick-and-mortar store. The reasons include that the anti-counterfeiting code is encrypted for 3 times, is truly random (can prevent the anti-counterfeiting code from being cracked), uses irregular materials (can prevent the anti-counterfeiting information from being copied), and also has the following advantages: in the past, most of the sales of commodities were done through physical stores, and in this business model, it was difficult to accurately determine (the location of) the final buyer for each 1 commodity. Therefore, the anti-counterfeiting code label can be attached to any 1 of 1 batch of commodities, the anti-counterfeiting code is not bound with the commodity number and a buyer, and even a plurality of commodities do not adopt the number. Therefore, the range of commodities possibly corresponding to the 1 anti-counterfeiting code is larger, and the problem is difficult to trace. If some of the commodities are exchanged or the anti-counterfeiting code is copied, the commodities are difficult to be found and the responsible person is difficult to be identified. The way and the situation of the transportation and the storage of the commodity corresponding to the anti-counterfeiting code 1 are uncertain, so that strict management and pursuit are difficult to perform. In conjunction with electronic commerce, it is easy to determine the destination of the buyer and the goods. The destination is determined, and strict management is easy to realize for transportation and storage. Which goods should be located in which 1 time period can be found out, and the range of the person in charge can be easily determined when a problem occurs. The whole process of storing and transporting the commodities is recorded, so that the process of storing and transporting each 1 commodity can be traced, and the range of the responsible person is much smaller.
And the verification elements such as user names, service station numbers and the like are added, so that the authenticity identification is more accurate, and the range of commodity sales can be reduced. If 1 anti-counterfeiting code appears outside the service station to which the anti-counterfeiting code belongs and is to be sold to others, the anti-counterfeiting code can be judged to be a counterfeit, and a counterfeiter can be found out by tracing. And the buyer is determined, if the commodity is exchanged, the exchanged genuine commodity is difficult to sell because the genuine commodity cannot pass the verification. The product 'real name system' can greatly improve the reliability of anti-counterfeiting identification. In electronic commerce, the time that a product spends from the warehouse to the ultimate purchaser is short. In the past, however, the time from the warehouse to the final buyer of the product is long, and even if a problem occurs, the problem is difficult to be found in time. And the service point is set up, the anti-counterfeiting code can be encrypted and decrypted, and the anti-counterfeiting code can be prevented from being copied. Even if someone steals the anti-counterfeiting code or the ciphertext of the anti-counterfeiting code, the anti-counterfeiting code cannot be verified because the encrypted key is not mastered. In the normal case, the product 1 can be delivered to the corresponding buyer only through a specific service station. The counterfeiter has difficulty in selling the counterfeit goods through a regular channel. In addition, the off-line service station is set up, and the trust of the consumer is easy to obtain (because of the problem, the customer is easy to find).
In the past, after a consumer bought a commodity, the anti-counterfeiting code is often not verified due to reasons such as trouble, the anti-counterfeiting code is often discarded at will, and a service point is set up, so that the measures can be taken: the anti-counterfeiting code is not verified, the commodity is not allowed to be submitted, and the anti-counterfeiting code must be destroyed after verification. These measures can greatly reduce counterfeit and improve the accuracy of true-false identification.
Whereas 1 producer, in 1 region, sells its goods only through this service system and also publicizes widely to consumers: products produced in region 1 from time 1 are sold through a service station of such a service architecture. The customer can then easily identify (according to their date of production, place of distribution): the so-called products produced by this producer (after that date), which are purchased via the offline route (sold at a location other than these service stations), are usually counterfeit goods.
While some physical stores also often sell stock, in which case there is no corresponding order, the number of the service station serving the store (user name) may be used as the user name of the buyer, the user name of the seller also uses the user name of the seller, and the order number may be determined from the invoice. Before the verification, the seller should submit the corresponding information (buyer name, seller name, order number, anti-counterfeit code number, etc.) to the joint control center, and may mark an indication that the goods are in stock (e.g. add 1 field, 0 indicates that the goods need to be ordered, 1 indicates that the goods are in stock), otherwise, the verification cannot be passed.
3. Signature
The irregular material is provided in the process of seeking an anti-counterfeiting method for commodities, but soon, the irregular material is found to be not only used for anti-counterfeiting of the commodities, but also has multiple purposes. It can also be used as 1 signature with extremely high security. Signature is the thing that proves the acceptance of the contract by the first and second parties. Handwritten signatures may be imitated. Electronic signatures cannot guarantee absolute security, and as long as the key is stolen or cracked, anyone can forge the electronic signature. And with irregular materials, much more reliable.
1 person can obtain 1 irregular material after the terms of one contract 1 are approved, randomly determine the checking position and record the checking result; then the text of the contract and the irregular materials are delivered to a reliable mechanism (such as a notarization department) together for storage, so that ordinary people can hardly contact the irregular materials again; when the signer needing to prove the contract surely signs the contract, the signer can inform the signer of the original checking position and the original checking result for checking the irregular materials; the organization for storing the irregular materials obtains the checking results according to the checking positions and compares the checking results, if 2 persons are matched, the signer of the contract can be proved to really sign the contract, because the irregular materials are difficult to copy and ordinary persons are difficult to know the checking positions. If the signer of the contract is certified multiple times and the contract is indeed signed, multiple groups of checking positions can be determined in advance and the checking results are recorded.
4. Secure transmission of information
Irregular materials may also be used for secure transmission of information. The secure transmission of information is very important. The most secure encryption method is the one-time pad, but the transfer of the key is often difficult. The irregular material can be used as a carrier of 1 kind of keys, and the amount of information contained in the irregular material is almost unlimited, so that if the checking position cannot be known, the keys carried by the 1 irregular material cannot be read out, and the generated ciphertext cannot be decoded. Generally, the irregular material can be transmitted separately from the information of the checking position so as to prevent the attack of the enemy. The specific method can be as follows: randomly determining 1 group of checking positions aiming at 1 irregular material to obtain a checking result, and converting the checking result into an encryption key according to a certain rule; encrypting the plaintext by using the encryption keys to generate a ciphertext; transmitting the irregular material, the checking position and the ciphertext separately; after the receiver of the information obtains the irregular material, the checking position and the ciphertext, the checking result is obtained according to the irregular material and the checking position, and the checking result is converted into a decryption key according to a certain rule; the ciphertext is decrypted by the decryption keys to generate plaintext.
In addition, the irregular material can also be used for bearing a ciphertext, and if a certain 1 plaintext is corresponding to 1 irregular material, the characteristics of each 1 position on the irregular material can be obtained, and which key is used for decryption. The key, and the location of the verification, and the irregular material are then separately transmitted to the recipient of the message. Even if 1 of the keys and the irregular materials is obtained by an adversary, the plaintext cannot be cracked. The specific method can be as follows: randomly determining 1 group of inspection positions and obtaining an inspection result aiming at 1 irregular material, and obtaining data according to the inspection result and a certain rule; according to the data and the plaintext, a decryption key is obtained according to a certain rule; transmitting the irregular material, the checking position and the decryption key separately; after the receiver of the information obtains the irregular material, the checking position and the decryption key, the checking result is obtained according to the irregular material and the checking position, and the decryption key is used to be converted into a plaintext according to a certain rule.
5. Money and bill
After a long time, I find many more important purposes of irregular materials, the counterfeiting of the entity currency is forbidden frequently at present, the counterfeit currency causes great harm to common people, the government and the national finance, the manufacturing cost of the entity currency is very high due to the prevention of counterfeiting, and in order to prevent counterfeiting, the country must reissue new-style currency at certain intervals to abandon old-style currency, which causes great waste, but the use of the irregular materials completely changes the situations.
Nowadays, the counterfeiting of 1 yuan currency is increasingly common, and the cost is unacceptable when the country uses a higher-level anti-counterfeiting technology for the currency with the low denomination, so that some places begin to refuse to use 1 yuan coins, and the embarrassment can be changed by irregular materials.
Many banks, however, can only use the method of printing the crown word number in order to avoid the user from being responsible for the counterfeit money. This is not only cumbersome, but also unreliable.
Banknotes are present in order to reduce the cost of manufacturing currency. Chinese people often honor the 1 st country in the world where paper money is created. However, the technology of making coins in China has been lagged behind in the western world for a long time, and although the technology of China is continuously improved, the technology of China still does not exceed that of the western world. If we can create currency with lower cost and higher security than paper money and a new technology for checking the authenticity of the currency, a new chapter of currency history will be opened, and honor will be brought to Chinese again for 1 time.
We can manufacture solid currency from irregular materials (resistive materials are particularly suitable) which can be manufactured at low cost, but at high imitation costs, far exceeding the manufacturing costs. This currency is hereinafter referred to as "true cryptocurrency", meaning currency that uses a true random password (password).
At present, networking verification is used on currency detectors, but the range of application is small, and the networking verification is really important for the anti-counterfeiting of currency. The unique number is used for each 1 entity currency, and the currency number and the number of the checking device are uploaded at each 1-time checking, so that the existence of the counterfeit currency can be judged as long as the number of the currency number and the number of the checking device are more than 1. However, the possibility of checking the counterfeit money and the original money at the same time is low, and the existence of the counterfeit money can be judged more reliably only if the distance spanned by the same number 1 in a certain time exceeds a certain standard. If the time exceeds the standard and the distance is lower than the standard, accurate judgment is difficult to make. Moreover, the requirement for the server is high, the spatial span of the places where a large number of numbers appear and the transfer speed are calculated at the same time, and the implementation cost is high.
Networking records, which make the currency flow traceable, can prevent actions such as counterfeit currency, money laundering, etc. to some extent, but are still insufficient, and have 1 important defect: when the same 1 number appears in many places simultaneously, it is difficult to distinguish the authenticity. So the networked verification must be combined with the use of irregular materials.
When the same 1 currency number appears in multiple places simultaneously, the authenticity can be distinguished: the true secret coin can be checked in a normal (approved and reliable) service station (the server is called an inspection server hereinafter, usually arranged in a bank or outside the bank) for authenticity, and when 1 time of inspection, a user inserts the true secret coin into a special device, the device reads the serial number of the true secret coin and sends a verification request (comprising the service station number, the currency number and the like) to a central server; the central server calls the serial number of the previous service station (the server is hereinafter referred to as the server 1) for verifying the currency according to the serial number of the currency, and sends a verification request to the server 1 (if the verification is carried out for the 1 st time after the delivery, the verification request is directly sent to a production plant); the service station returns the checking position (1 position or 1 group position) corresponding to the currency number; the central server forwards the inspection position to the inspection server; the checking server obtains a checking result according to the checking position and returns the checking result; the server in the previous step 1 verifies the checking result and returns the checking result; if the verification result is passed, the ping server randomly generates 1 or 1 group of new ping positions again, and records the ping result. In the next 1 time of checking the authenticity, the new checking service station sends … … a verification request (including service station number, currency number, etc.) to the central server to improve the security, and the central server can also verify the identity of the service station to prevent the counterfeit station from stealing the anti-counterfeit information. The identities of the bearer, payer, payee (e.g., username, identification number, etc.) may also be verified and recorded simultaneously, as conditions permit. In the method, the system does not need to store a large amount of anti-counterfeiting information, and the cost is lower. Moreover, the system does not need to frequently calculate the moving speed of the same number 1, and the calculation load is small. In the past, the cost of transmitting a true random password was high, but in the above-mentioned method using a true secret token, the password is transmitted by the user himself, and the cost is low.
In order to improve the security, in each verification of 1 time, the central server calls the verification position verified in the last verification of 1 time and sends the verification position to the verification server, the verification server obtains the verification result, and if the verification is passed, the central server sends a verification request to the server 1. Since the inspection position and the inspection result have been leaked out on the network, the value thereof has been reduced. This may improve the reliability of the verification to the ping server, but may increase the cost. The central server records the checking position and the checking result, which increases the burden of the central server, but reduces the burden of the service station and improves the payment speed.
If the same currency belongs to more than 1 person at the same time, counterfeit currency is necessary, and the method can be realized only by combining informatization and electronic commerce.
Sometimes, dirt exists on the true secret coin, which affects the inspection, and if the inspection position is sent at the moment, sensitive information can be leaked. The checking device can check the true and secret coin, if the serious pollution is found, the warning can be sent out to require the operator to clean the true and secret coin, and the operation can be continued only if the standard is met.
The verification method completed in the relay is very safe, but the number of the service stations is limited, the checking equipment (hereinafter referred to as a simple terminal) used by a small shop outside the service stations is not reliable enough, the online of 24 hours cannot be guaranteed, and the verification method completed in the relay cannot be used. If the simple terminal randomly generates 1 or 1 group of new checking positions again and records the checking result, the data may be stolen when the authenticity is checked for the next 1 time. But the small stores usually only collect money with less money, the collection has no motivation to use the false money, the collection only pays attention to the receipt of the false money, and therefore the stores have strong willingness to prevent the false money. The simple terminal for the small shop can be very simple, and the communication function can be realized by using a computer and a mobile phone, so that the simple terminal is far cheaper than the conventional currency detector and is easy to popularize.
While the small shop usually needs to change for selling things, in order to prevent the small shop from paying false money, the money number and the terminal number can be uploaded to the central server when checking the money, a mail can be sent to a mail box of a buyer (which can be provided by the system without charge), the money can be stamped, and the like, so that the source can be found when the false money is detected. In addition, information of a plurality of positions can be recorded in a production plant for verification.
In addition, the customer may consider that the money checked by the simple terminal found by the small store is not reliable, and in order to improve the security, the customer may not send the check result by the small store, and the check result may be sent by the mobile phone of the customer and returned to the customer.
For lower value currencies, the cost can be reduced by: the link of asking for the checking position from the server is omitted, the checking position and the checking result are directly sent out by the terminal, the server only records the checking results of some specific positions, and the terminal only checks the positions. To improve security, the ping location used by the terminal is randomly selected from these locations. To increase the processing speed, the inspection position may be adjusted 1 time per day or per batch of banknotes. In order to reduce the cost of storing the anti-counterfeiting information, only the numerical value of a specific digit (for example, 3 rd digit) after a decimal point can be stored. The verification result of a plurality of positions may not be verified every 1 time of verification, and the verification result of fewer positions may be verified, which is low in cost. To increase the difficulty of the attack (the adversary listening to the information and making a copy), the ping positions of the adjacent 2 verifications can be made different. Moreover, recording the inspection results of multiple locations makes the replication cost high and is not worth replicating. However, if the inspection results of a plurality of very similar locations are recorded at the same time, the difficulty of copying is greatly increased, and it is difficult to precisely copy such materials by the conventional technique. In fact, the cost of duplication is higher than the currency value, so that the true coin with a smaller currency value only needs to record and check less position information, and the true coin with a larger currency value only needs to record and check more position information.
The counterfeiting of the true secret currency is greatly different from the counterfeiting of the traditional currency. With 1 currency number, only the appearance at 1 is allowed. Even if the adversary copies the money which is completely the same as the original money, the counterfeit money is difficult to formally circulate, and the way of recording the number of the checking device also makes the circulation of the counterfeit money easy to trace, so that the counterfeit money is meaningless. The counterfeit money is difficult to change hands, and a plurality of people do not want to buy and accept the counterfeit money. Even if a counterfeiter can use the counterfeit money 1 or 2 times, the cost is very high, and the profit is little. The counterfeit cost of the conventional coin is similar to the manufacturing cost of the government, the government does not have great advantages, and the ratio of the counterfeit cost to the production cost of the genuine and confidential coin is very large.
In order to prevent the circulation of counterfeit money, a system can be established, the true secret money can only be circulated in 1 province of the same 1 country (the serial number of the region can be added at the beginning of the serial number), the true secret money and the foreign currency need to be converted into the currencies circulated by other provinces and countries, namely the true secret money is deposited in a bank (becoming electronic currency) before the foreign province and the country, and then the true secret money is converted into the entity currency after the foreign province and the country; or after the entity currency is brought to the foreign province and the country, the entity currency is exchanged into the entity currency circulated in the foreign province and the country in a regular bank, and then the entity currency is intensively transferred to the original province and country by the bank; the currency of the adjacent provinces can be directly transported in a centralized way by the bank without being exchanged. Thus, the central server can be set up in different countries, and the server can be set up in each province, which not only reduces the burden of the server, but also avoids the condition that the verification cannot be carried out due to the network failure among the provinces. The long-distance transport with a large amount of entity money is also avoided as much as possible in the past, so the measures can not bring great trouble to people. The money can be issued by a level 1-saving organization, so that the physical money does not need to be transported remotely, and the transportation cost is reduced.
According to the report of the New York Union store, the American Cash Accident 2/3 circulates in foreign countries worldwide, so the threat of counterfeiting is mainly foreign. And more RMB are used abroad. With conventional methods, it is difficult to reliably prevent counterfeiting of physical currency used in remote countries. If the issuing organization is directly set up in a foreign country and the true secret coin is verified through the server of the issuing organization in a networking way, the authentication cost can be very low and the effect is much better.
The password of the genuine dense money can be classified into 3 types, wherein the 1 type is the password used by a simple terminal, a manual terminal and the like, the 1 type is the password used by a service station, and the 1 type is the password used for verification. The password used by the core is not used normally, and is reused if the password is not matched with the position or other suspicious conditions occur. After confirming that the currency is true, the checking position can be determined again, the checking result is recorded, and the currency number is changed.
In addition, the serial number of the true secret coin can be changed regularly (the true secret coin can be measured according to time or using times), the checking position is determined again, the checking result is recorded, and the like, which is called currency updating for short, so that the attack of a terminal which is counterfeited to be legal by an enemy can be prevented. The irregular material can be used continuously, and because the information is truly random, and the new checking position is truly random, after the number is changed, the enemy can hardly determine the information of the true secret coin with the new number, and the cost of the modification is low, but the modification is reliable. In the currency update, not only the number but also the position of the irregular material can be changed to increase the difficulty of the attack (increase the cost of the attack). It is not only possible to move in the left-right direction but also to rotate. In order to move, the outer edge of the irregular material can be added with a plurality of parts for fixing. The inspected area should also be less than the entire surface of the irregular material. The frame for fixing the irregular material can be made of hard plastic, and the irregular material can be taken out and installed by heating the plastic. The method is convenient to operate and low in cost, and can also be used for: the irregular material does not change the position, but 1 part is added on the true coin, which is called as a transformation data area for short, the transformation parameter of the randomly generated checking position is printed on the true coin, and the checking position is adjusted according to the parameter during each checking. The calculation amount is small, so the implementation is easy, the frequency of currency change can be high, the currency change is not needed after hundreds of times of use, the counterfeit prevention effect is very effective, and the serial number of the prior currency is difficult to change. While changing the parameters for currency updates, the irregular material does not move, which is advantageous for manufacturing.
The anti-counterfeiting characteristics and information of the prior entity currency are usually static, and only new anti-counterfeiting technologies can be continuously adopted for preventing counterfeiting, and the new technologies can be rapidly mastered by enemies. In order to prevent possible counterfeiting, governments can develop new technologies in advance and eliminate old technologies only according to a certain period, the development cost is very high, and the elimination of the old technologies can cause huge waste. In the past, the printing technology is leaked for many times, and the loss caused by the leakage is extremely huge. Many new coinage techniques are very complex and difficult to implement. For example, new edition of U.S. dollars has been released since 2011 in 5 months and 10 months in the same year and 8 days in 2013 in 10 months, more than 2 years have passed, and two-degree publication of the production process of printing has been in the meantime that significant quality problems and serious losses have occurred. The technology completely changes the situation, and the same 1 true secret coin can be used all the time as long as the true secret coin is not damaged (the serial number is variable, and irregular materials are not changed). The used technology is simple, the implementation difficulty is low, the cost is low, and the basic reason is that the anti-counterfeiting information is variable, truly random and difficult to completely copy.
In addition, the combination with informatization is also very important. Conventional paper money is required to be manufactured very highly, and paper quality, ink, and the like are not qualified if there is a slight change, so that the manufacturing is difficult and the cost is high. Especially color-changing printing, optically variable inks, are very costly. The manufacturing cost of the true secret coin is much lower. And each country often issues new edition paper currency, and the currency examine machine in the past is hardly adapted to these changes, and if only there is change such as pattern, the intelligent machine can be solved through the method of update data, but just can't do nothing to new type anti-fake characteristic, and the expense of change upgrading currency examine machine, ATM is huge too. The intelligent currency detector has stronger performance but is more expensive, while the true dense currency detector has lower price but far better performance.
The true secret may be such that: to protect the examination area, a sheath 1 may be provided outside the resistive material, and a portion containing the resistive material, hereinafter referred to as an inner core, is provided, see fig. 5 a. For easy examination, the shape of the sheath may be rectangular, etc., and a circle does not facilitate the orientation of the currency. If the length is the same as the width, it is not convenient to determine the positive direction of the currency, the length may be 1.5 times the width, etc. There may also be 1 hole for fixing currency, hereinafter referred to as fixing hole. To reduce the inspection cost, currencies having different denominations may be used in the same size. The genuine coins with different currency types are preferably the same size. The situation of clamping and missing money is easily caused by different sizes, the design of the money counter is difficult, and the probability of wrong money amount statistics is increased. And because the sizes are the same, the true and secret coins with different currency values can be stored separately and easily. The former currency is often different in size, so that the currency is difficult to sort.
The thickness of the paper money is very small, and each paper money can only be separated by methods such as money twisting and the like, so the condition of inaccurate counting is often generated, while the thickness of the true dense money is larger, the separation is easy, and the condition of inaccurate counting is greatly reduced. To reduce the storage space, the size can be made smaller.
The service life of the paper money is short, the paper money is circulated for 300 times on average, the service life of the paper money is only 1/100 times of the service life of the coin, and the situations of residue, old, rotten, falling of a safety line and the like are easy to occur. Although the service life of the coin is long, the coin is hard to be counterfeit because of the hardness, and the pattern and the like are difficult to be made on the coin, so that the counterfeit is relatively more, and the coin is generally only used for the money with small currency value. For the government, the cost of manufacturing coins is also high, and the financial burden is also large. The cost of recycling old coin versions, which are currently over 2% counterfeit by pound 1 coins in old versions, is very high in the uk, according to england bank disclosure.
In order to distinguish the front side, the back side, the left side and the right side of the checking device, 1 bar code or magnetic strip, metal strip, etc. for representing the position information (for example 0123 on the front side from left to right and 4567 on the back side) can be respectively arranged in the middle of the front side and the back side of the sheath, and in addition, the number, the currency value, the currency type, etc. are marked, and the part for bearing the information is hereinafter referred to as an information area. The front and back sides are marked with currency numbers, conversion parameters (same numerical values) and the like, so that the cost of the checking device can be reduced, and the cost is higher when 1 sensing device is respectively arranged on the front and back sides. The information area can also be positioned on the upper side and the lower side as well as the left side and the right side 2, and the position of the mark (square, star, etc.) of the currency value can be different according to the currency value, and the color can also be different, so that the currency value is easier to distinguish, and the method is favorable for rapidly counting the total amount and distinguishing the currency type and the currency value. In nature, the money may be stored upside down, left to right, and up to down, so the denomination mark should be present on the 2-side. For 1 pile of true dense coins, the side face of the coin can be photographed, and the photos can be automatically counted by using software in a computer, a mobile phone and the like, so that the method is fast and accurate. When the account is checked, the cash and the account can be checked quickly, and even if the account is not checked immediately, the operator can be proved not to be fake if the account is checked together with the photo. The traditional mechanical cash counter can be omitted, and cameras of a computer and a mobile phone can be used, which are not imaginable for the prior paper money. This is also a barcode technology, and the past barcodes are not well adapted to this situation, and a new type of barcode needs to be developed. In the past, China has not led to the development of a new type of barcode, which changes history.
If the currency is small, in order to facilitate the identification of the currency value by human eyes, the information can be carried by not using a bar code (or a magnetic strip, a metal strip and the like), but paint for displaying the currency value is coated on the surface; the checking device can also be additionally provided with 1 magnifier to facilitate reading the bar code, so that the characters can be larger, and the bar code can be smaller. To prevent compromise, the transformation parameters may be encrypted. The space of the information area is very limited, especially the side information area, it is not easy to represent so much information in such a small space, and the kinds of money are many, so 1 standard must be established to make each kind of money easily distinguishable. For example, a two-dimensional code representing currency, how many elements should be. The country that established the standard at the earliest can use a more easily discernable, simple code. In the past, different currency detectors are adopted for the detection of the currency of different countries, customers often have doubts about the performance of the currency detectors, and due to the great difference of anti-counterfeiting characteristics, the currency detectors of the same country can detect the currency of different countries by adopting the technology, so that the functions of the currency detectors can be greatly increased, the cost of banks and governments is reduced, and the currency detection device is also beneficial to commerce and trade among different countries.
Establish 1 groove that is used for placing the inner core in the middle of the sheath, can establish 1 iron sheet on the sheath (can not establish on the surface to increase the space of printing currency value), set up 1 magnet in the corresponding position on the inner core, can fix sheath and inner core in order to protect the inner core when not examining, pull out the inner core when examining. In order to pull out the inner core, 1 notch can be reserved at the opening of the groove, 1 part for transmission is arranged outside the resistance material and is contacted with the resistance material by a rubber wheel, and the inner core is pulled out and pushed in. Or arranging a bulge 1 at the tail end of the inner core, and pulling out and pushing in the inner core by a mechanical hand. In order to prevent the inner core from slipping, 1 protrusion can be arranged on the inner core, 1 obstacle and 1 corresponding groove are arranged on the sheath, which are referred to as anti-slipping grooves hereinafter, and fig. 5b is referred to. The inner core should also be marked with numbers, currency, etc. so that data can be recovered when the numbers, etc. on the sheath are damaged or the sheath is confused, which part is also referred to as information area hereinafter.
The sides of the inner core may be used to determine the inspection position, the long side being hereinafter referred to as the calibration side and the short side being hereinafter referred to as the start side. In order to improve the strength, the edge can be made of materials such as steel sheets, and the plastic is easy to wear and deform. The position of the probe can not be accurately determined only by using a common ruler, and the requirement on precision is high. The position of the probe can be manually determined by using a vernier caliper, and the conventional vernier caliper can be purchased only by tens of yuan, so that the method is easy to implement (the method can be used for a precise terminal, and is shown below). And we need to adopt 2 rectangular steel sheets, hereinafter referred to as auxiliary sheets, the long side of which is a straight line (the precision requirement is higher) and is perpendicular to the adjacent side (the precision requirement is not high). The position of the probe can be expressed in x, y coordinates. The body of the vernier caliper is flush with the calibration edge, the left cutting edge of the measuring jaw is attached to the starting edge, and the x coordinate is determined by the right cutting edge. When the reading is made to coincide with the target value, the auxiliary piece is attached to the right cutting edge, and the auxiliary piece is fixed by a fastening screw. The edge of the vernier caliper is perpendicular to the edge of the measuring jaw, so that the long edge of the auxiliary sheet is perpendicular to the calibrating edge. And measuring the position of the auxiliary sheet which is consistent with the target value of the y coordinate, attaching another 1 auxiliary sheet to the right cutting edge, and fixing the auxiliary sheet by fastening screws. The intersection of the edges of the 2 auxiliary pieces is the position where the probe should be.
2V-shaped notches can be arranged on 2 edges of the inner core, and the top points of the 2 notches are used for positioning. The inspection position can be limited to the line of the points at the top end of the notch, which can improve the positioning accuracy and speed. New gaps can be carved at regular intervals to increase the difficulty of attack. The non-conductive paint can be used for printing marks such as grid lines and the like for positioning, or metal lines are printed on the surface of the non-conductive material outside the resistance material, and the metal lines are positioned by the conductive property of the probe. Iron oxide can also be patterned and magnetized, which can be positioned with a magnetic head. If the surface of the resistance material is covered with steel, the resistance material can be directly magnetized. The prior art of positioning by using a magnetic head is mature, has high positioning precision and low price, and is easy to realize. The magnetic head is not contacted with the resistance material, so the magnetic head is not easy to wear.
For the currency with lower currency value, a plastic-lined steel sheet for 1 positioning (the plastic is not lined can change the conductive property of a resistance material and the like) can be arranged on an inner core, the positioning sheet is called as a positioning sheet hereinafter, and the checking position is selected only on the edge of the positioning sheet, so that the randomness of the checking position is reduced, but the positioning precision is higher, the positioning speed is higher, and the method is more suitable for occasions with low requirements. If the spacer is made of plastic, it may be deformed greatly due to temperature change. The positioning sheet and the inner core can be fixed by welding, gluing and the like. The position of the locating plate can be changed at regular intervals so as to increase the difficulty of attack. The position of the locating plate can be randomly generated by using a random function and the like without a computer, so that the manufacturing cost is low.
When the raw material particles for manufacturing the resistance material are small, a fine change in the inspection position results in a large change in the inspection result, so that the positioning accuracy needs to be high. In order to reduce the positioning accuracy, reduce the cost of the checking device and improve the checking speed, the double-sided circuit board (hereinafter referred to as target board) can be manufactured: the 1 surface of the device has a plurality of flat (e.g. 1mm square) metal sheets (hereinafter referred to as targets) with large area, and referring to fig. 5c, the lower end of the device also has a plurality of metal sheets (hereinafter referred to as targets), and there are wires, vias, metal foils, etc. connecting the targets with the targets, and the targets are insulated and the targets are also insulated. And 1 target plate is respectively arranged on 2 surfaces of the resistance material (the vertical direction is opposite), so that the probe can be inspected only by contacting with a measuring target, and the positioning precision requirement can be greatly reduced.
We can manufacture the target plate by: a plurality of plastic strips with rectangular cross sections are manufactured, 3 surfaces of the plastic strips are printed with liquid mixed with copper (or other metals, the same below) powder to form lines (the copper powder can be made in an oxidation-proof manner at present, the copper powder can be ground by an iron wheel, the ground iron powder can be mixed in, and then more metal (a copper foil with thicker and higher strength) is plated by an electroplating method, so that the production can be completed quickly and on a large scale, and the formed whole is referred to as a c plate below, and see fig. 5 d. In this way, each 1 copper foil is formed into a c shape, 2 sections of the tail end become a measuring target and a contact target, the measuring target and the contact target are connected by the copper foil (hereinafter referred to as a guide foil), and sufficient space is reserved between the measuring target and the contact target for insulation. Then, a plurality of c plates are stacked together (glue can be coated firstly), and then the c plates are heated and pressed to form a whole, namely, the substrate is provided with a measuring target, a contact target and a guide foil, and the position and the size of each measuring target are specific.
We can also do this: a plurality of plastic strips with rectangular cross sections are manufactured, 3 surfaces of the plastic strips are wrapped with copper foils, glue can be coated on a plastic block for tight combination, latticed rubber is pressed on the plastic strips, then the plastic strips are immersed in liquid, the parts except a measuring target and the like are corroded, and then the plastic strips are cleaned, so that the c plate is formed. And stacking a plurality of c plates together, heating and pressing to form the substrate.
We can also do this: cutting a plurality of rectangular copper foils, folding and pressing for 2 times to form a c shape, cutting off the c-shaped part, putting a plastic block in the middle (gluing can be performed on the plastic block for tight combination), cutting into small blocks (the thickness is about 1 mm), plugging the small blocks with the small plastic blocks which are not wrapped with the copper foils to form 1 strip, putting the strip on a plastic sheet with a certain size together to form a c plate, stacking the c plates together, heating and pressing to form a whole. The method needs to cut for multiple times, is low in efficiency, and can also cut a plurality of small blocks for 1 time by using a plurality of blades. The method for manufacturing the target plate is more, and the metal foil can be plated on the plastic strip by an electroless plating method, so that the cost is higher. Of course, the substrate can be drilled and the via holes are plated with copper, so that the cost is high, but the positions of the via holes can be random, and the safety is high.
Then, the measuring target and the contact target (the metal exposed on the surface) can be electroplated with more metals such as copper, nickel and the like to improve the strength, a rubber plate can be placed on the substrate, a plurality of holes are formed on the rubber plate, and the shielded part can not be plated with the metal. After plating, the rubber plate is removed and can be recycled. The holes in the rubber plate for plating the contact targets may be slightly larger than the contact targets and have different shapes, which may increase the difficulty of attack. The target may then be plated with tin or the like to prevent oxidation. The measuring target can be protected by sticking a plastic film with a plurality of holes on the surface, and the positions of the holes are positioned above the measuring target and are slightly smaller than the measuring target. Although the randomness of the data is adversely affected by the fixed position and shape of the foil, the number of combinations of inspection positions is very large if the number of targets is large, and the current replication technology is considered to be nearly infinite.
In order to achieve good contact between the resistive material and the target plate, the resistive material may be first tin-plated on the contact target, heated and pressed to form the resistive material, and then the resistive material at a certain temperature is pressed to the target plate, which may melt (partially) the tin on the contact target and then cooled. Alternatively, after the resistive material is pressed, the surface of the resistive material is heated for a short time after the temperature is reduced and then pressed against the target plate. This uncertainty in melting can also present significant challenges to the attack. The contact position between the contact target and the resistance material is 1 surface, so that the randomness of the inspection result is greatly improved, and the difficulty of attack is also greatly improved.
For currency with lower currency value, the number of the targets can be reduced, the area of each target can be increased, the cost of the checking device can be reduced, the cost of manufacturing the true secret currency (a protective layer can be printed by adopting a screen printing method without exposure) can be reduced, and the like. The insulating portion around the target is small, so that the area of the target can be large, the possibility that the probe touches the target to be found is large, but the possibility that the probe touches the target around the target to be found by mistake is also large, and the difficulty is brought to printing, so that the manufacturing cost is increased, therefore, the insulating portion is not as small as possible, if the insulating portion is large, a screen printing protective film can be adopted, the exposure is not needed, the unexposed part is not needed to be cleaned, and the method is suitable for the currency with low currency value. By using the target, the inspection can be performed without using a probe, the tip of the probe is sharp and is easy to damage the target, and the small roller can be contacted with the target plate. In addition, the irregular material without the target plate can be manufactured, and the requirement on positioning accuracy is high, so that the inspection cost is high, the method is not easy to be widely adopted, and the method is suitable for occasions with high requirements on bank cards, identity cards and the like.
The resistance material is used as the currency, the hardness is high, the service life is long, the resistance material is not easy to deform, and the thickness is large. The anti-counterfeit label made of the resistance material can be bent, and the adhered part of the anti-counterfeit label is not flat, so that the thickness of the anti-counterfeit label needs to be reduced, materials which are not easy to bend, such as graphite, and materials which are easy to bend, tin and the like need to be reduced. The substrate of the target plate can be made of a material which is easy to bend.
The device for checking the true secret currency is hereinafter referred to as a checking machine, generally, the checking machine is divided into 4 types, 1 type is used for processing more currency, the structure is more complex, and the checking machine is hereinafter referred to as a network point terminal; the type 1 is used for processing small shops with less money and the like, only the inner core provided with the measuring target can be checked, the structure is simple, namely the checking speed is high due to the simple terminal; the type 1 can be positioned by manual operation of a user, only an inner core provided with a measuring target can be inspected, and the inner core is called a manual terminal for short, so that the cost is low, and the inspection speed is high; the type 1 can be automatically or manually positioned, can be used for checking inner cores without measuring targets, is called a precision terminal for short, has slightly high cost, low checking speed and high precision, and can be used for currencies with higher currency values, checks, bank cards and the like (see below). Usually only cores provided with targets need to be used, only for high monetary values etc. cores without targets. The person receives the money, may suspect the true or false, even if the person uses the checking machine to check, it is not reliable, and can be relieved by carrying 1 manual terminal with oneself.
The network point terminal is divided into a sorting part, an inspection part and the like. Sorting part, separating funnel, conveying belt, mechanical arm, etc. and it may be controlled by one-chip computer. The currency may not be oriented generally. The sales volume of the website terminal is also large, so banks, large stores and the like are concerned about the authenticity of the currency, the amount of the currency received every day is huge, and even if the proportion of counterfeit currency is low, the loss is large. The currency is poured from a hopper with a triangular cross-section with 1 vertical side and 2 vertical and inclined conveyors below, see fig. 7, where it is easily caught by a horizontal conveyor (toothed belt). The hopper is left with 1V-shaped opening for the outgoing currency, the height of which can be 1.4 currency widths, so that the erected currency can be laid down, followed by 1 segment of horizontal conveyor belt, hereinafter referred to as horizontal conveyor belt, see fig. 8; teeth with a height of about 0.8 currency thickness, 1 baffle in front of it, and a gap of about 1.5 currency thickness, which allows the separation of the overlapping currency; the distance between 2 tines is slightly longer than the length of the banknote, so that there is only 1 banknote between 2 tines; there are 1 brush which can rotate backward above it, so that the coin is positioned in front of the teeth behind, thus the position of the coin can be determined preliminarily and the handling is convenient. In order to facilitate the mechanical arm to extend into and grab the money, gaps can be arranged on the teeth, and holes can also be arranged on the conveying belt.
In practice, when a customer inputs money, the input money is often too much to be checked immediately, and the money needs to be stored first. In addition, the currency checking is that the currency number is sent out firstly, then the checking position is received, then the checking result can be obtained, if the checking position is waited after the number is sent out for each 1 currency, the processing speed is lower, the currency can be sent out firstly and then stored, and the corresponding currency is checked after the checking position is received. Money can be stored as follows: the coin is accessed by a component similar to a bullet belt, which is a belt with a plurality of holes, hereinafter referred to as an access belt, the size and distance of the holes are fixed, and the coin can be accessed at any position at any time by referring to fig. 9. The structure of the device for depositing and withdrawing the currency is similar to a magnetic tape, 2 ends are fixed on 2 reels, 2 guide rollers are further arranged, and 2 rotating directions are respectively used for depositing and withdrawing, and the structure is shown in figure 10. To facilitate locating the access location, a marker may be placed adjacent each aperture. To facilitate insertion of currency into the aperture, a projection may be provided on the access band. The apparatus for reading the position information, the money number, the conversion parameter, etc. may be provided on the horizontal conveyor belt, and if the apparatus is provided at a position such as the access belt, the processing speed may be reduced.
When checking the currency, the inner core is pulled out first, and then the edge of the inner core is used for positioning. Then, the single chip microcomputer correspondingly changes the checking position according to the positive, negative, left and right sides of the currency, and then adjusts the position of the probe and checks the currency. If the currency is checked on one side, the direction of the currency needs to be adjusted (the two-side checking is not used, and the combination of the probe positions is more), and the currency can be sorted by a mechanical arm. To facilitate the orientation of the banknote, 1 hole, hereinafter referred to as a directional hole, may be provided at corner 1 (e.g. the upper left corner of the front). In front of the horizontal conveyor belt, there are 1 coin receiving table, the system senses that the coin falls into the coin receiving table, and after the coin is basically in place, 4 push rods push the coin to a preset position accurately. The direction of rotation is determined according to the orientation hole. The rotating part 2 is a part which is rotated in the vertical direction (for the person with the reverse side facing upwards) first, and then is a part which is rotated in the horizontal direction (for the person with the left-right error), and the latter can be rotated backwards, so that the 2 persons can not interfere. In order to avoid interference, only 2 clamps (such as left and upper, right and lower) are needed, and the clamps are reset after the work is finished. If the user is wrong in both right and left directions, 2 rotations are required. The currency can be directly conveyed to the goods opening by the mechanical arm after rotating only by the currency which rotates in the vertical direction. The money is positioned in a specific direction by the manipulator, which is high in cost and slow in processing speed, so that the checking method without direction adjustment is preferably adopted.
For a manual terminal and a simple terminal, only single-side checking can be carried out, the position of the probe is manually adjusted firstly, then the inner core of the currency is pulled out, the checked 1 surface is downward and is placed into a coin slot, and the position is adjusted.
Nowadays, electronic money (bank cards, electronic money corresponding to virtual payment account) is used more and more, because the use is very convenient, and the physical money still has some advantages, such as credible value (the amount of the fund corresponding to 1 bank card is uncertain, a seller cannot be sure that the fund is enough to pay the goods), fear of damaging the fund due to virus or hacker attack, and the like, so that the electronic money still has strong vitality. Especially in protecting property, the advantages are unmatched. Banks seem powerful but are in fact very fragile, with many banks losing customer data in the event of 911. The establishment of a disaster backup center is not only expensive, but also difficult to ensure that all data is accurate. Electronic money is easy to lose and tamper due to the limitation of the form of the electronic money, and the defects can be exactly compensated by physical money. In the past, entity currency rarely has a large face value, the reason 1 is that the face value of the entity currency stimulates the desire of huge counterfeiting, once the counterfeiting succeeds, huge harm is caused, but the current situation changes, the larger the face value of the true dense currency is, the larger the effect of protecting property is, the face value can be completely 1 ten thousand and 1 million, even the face value (such as 235 ten thousand) is determined according to the requirement of a client, and the defect that the amount of the entity currency is fixed can be overcome. Of course, too large a face value may be inconvenient to use, and arbitrary determination of the face value may result in lower security, which needs to be avoided. The use of true secret coins (which can be similar to the existing entity's large-volume deposit list) must be networked (while the true secret coins with larger face value often actively go to a reliable service station to operate instead of a roadside shop, so the relay verification method described above is just applicable), enemies cannot directly use the true secret coins, and if the use of the true secret coins is combined with the identity verification of an operator, even if the true secret coins are stolen, thieves cannot use the true secret coins, and the identity of the true secret coins is exposed, which is 1 of the most important uses of the true secret coins.
For convenient use, the operation can be as follows: each bank or central bank sets up 1 special warehouse (hereinafter referred to as true secret coin bank) in each 1 city, the user needs to deposit money or pay, and can apply for the bank, the true secret coin bank changes the owner of the true secret coin with the corresponding amount into the current user, and then the new checking position and the checking result of the true secret coin are encrypted (as numbers or two-dimensional codes and the like), and then printed into paper materials (hereinafter referred to as certification materials with the action similar to deposit list) and delivered to the user through the way under the line, and the user can certify that the paper materials are the owner of the money according to the above. In order to facilitate users, paper documents can be only stored in bank outlets, and the users can call the documents according to the index numbers and can also use a U shield and the like to carry out remote operation. The paper document is used as a fundamental operation basis, so that the possibility of data loss is greatly reduced. The transmission can be encrypted by an on-line approach, and even simple encryption is difficult to crack because the encrypted object is truly random. The certification material can be transmitted to a corresponding service station for the user to carry. The user pays, and the original certification material needs to be delivered to the bank, just like cashing deposit receipt 1. The proving material is 1 evidence of the true secret coin, the electronic operation is carried out through the proving material, the proving material is more convenient, and if a user personally delivers the true secret coin to a payee, the proving material is not only troublesome, but also unsafe. The position of the true secret coin is not changed, but the ownership is changed, so that the method is convenient and safe. Operators using genuine banknotes need to indicate their identity and perform a reliable check (e.g. using bank cards, identification cards, etc.) to improve security. The medium with the true secret money as a representative value is much more reliable than the medium for storing data such as a magnetic tape and a hard disk (a conventional bank). In the conventional electronic money, data is easily lost. The true secret coins are different, if the true secret coins are stored in a warehouse, the true secret coins are not easy to damage, and paper certificates stored by a user are not easy to lose. If the user stores the true secret coin, the bank can store the paper certificate or record the data on the optical disk in real time, so the data is not easy to lose. The entity currency and the electronic currency have advantages and disadvantages, and can be really successful only by reasonably fusing the entity medium and informatization.
Many people will be reluctant to idle the fund and need to deposit the fund into the bank, and the large amount of true secret money can be used as the principal money of deposit. If the bank were to credit the deposit, the funds could be obtained using the authentic coin as a mortgage and the information of the person using the coin registered.
In the past, people often draft funds by bills such as checks, drafts and the like, and true secret coins can play the same role, and the specific method is as follows: the accurate terminal for checking the true secret coin can be produced (the functions of calculation, networking and the like can be finished by a computer and a mobile phone of a client), the operation is finished by the client, and the terminal is low in price and easy to popularize. The customer firstly arrives at the service station (hereinafter referred to as coin outlet point) to receive a plurality of true secret coins, the coin outlet point (which can be used for randomly determining and recording a plurality of groups of checking positions (used as passwords, encryption keys and keys for checking money) and checking results (in advance), the checking positions are hereinafter referred to as password positions, encryption key positions and key checking positions, and the true secret coins are delivered to the customer. When the client wants to send out the fund, 1 true secret coin is taken out and the serial number is sent to the coin outlet point, the coin outlet point returns to the password position, the client uses the precision terminal to obtain the password according to the password, and returning to the coin outlet point, after the password passes the verification, returning to the encryption key position and checking the key position by the coin outlet point, obtaining the encryption key by the precision terminal according to the encryption key, inputting the account number, the amount and other information of the payee into the computer by the client, encrypting and sending the collection account number and the like to the coin outlet point, decrypting the coin outlet point to obtain the collection account number and the like, and the received account number and the like are encrypted and returned by the check key, the precision terminal obtains the check key according to the position of the check key, the account number and the like are decrypted, and if the payment is matched with the record, returning a response of passing the verification to the currency outlet point, completing the payment of the fund (such as sending a payment instruction to a modern payment system) by the currency outlet point, and returning a response of successful payment after the payment is successful. In addition, the true secret coin can also play the role of a conventional invoice and the like: the tax bureau or the bank delivers the true secret money to the enterprise, and the enterprise finishes the operation by using the true secret money when declaring the tax.
The use of true secret currency to transmit password and secret key is much safer than paper bills, electronic certificates, U shields and the like, and the method integrates the convenience of electronic operation and the safety of entity media, thereby having great value and magical function.
Of course, the above-mentioned anti-counterfeit payment method can also be used for transmitting the password and the secret key without using the USB flash disk, and transmitting the password and the secret key by using irregular materials.
6. Membership cards, bank cards, identity cards, or the like
Irregular materials are suitable for membership cards and the like. The membership card is usually only used in the same 1 place, so that after each verification, a new checking position can be directly and randomly generated by the same 1 server, and a checking result is recorded, so that the new checking position and the checking result can not be leaked on the network, and more anti-counterfeiting information does not need to be stored, so that the storage cost is lower.
Irregular materials can also be used for manufacturing bank cards, hereinafter referred to as secret cards. The bank card of the prior magnetic medium is easy to copy and is gradually eliminated, people start to replace the bank card with a chip card, but the production cost of the chip card is higher, the verification cost is higher, and theoretically, the chip card can also be copied as long as related keys and the like are cracked (particularly after the quantum computing technology is successfully obtained), but the manufacturing cost of the real card is very low, the copying is very difficult, the verification cost is also lower, and therefore, the advantages are very great. If the card is used only in the same location as 1, the method of using the card can be the same as that of using the membership card. If the operation is carried out on the network, in order to prevent the leakage of the verification data caused by the repeated use of irregular materials, the true secret coin can be reused to send out a password to verify the identity.
If the card is used in a different location (bank outlet or terminal), this can be done: when issuing, 1 checking position is randomly determined for 1 card in issuing unit (factory or bank) of the real card, and checking result is obtained, then the checking result and card number are stored in issuing unit; the 1 st network point using the card sends out the verification request to the issuing unit, the issuing unit returns the checking position after receiving the request, the network point gets the checking result according to the checking position and returns the checking result to the issuing unit, the issuing unit gets the verification result according to the checking position and returns the verification result to the central server, the central server forwards the message to the network point, after receiving the message, the network point randomly determines 1 new checking position, gets the checking result and stores the checking result and the card number in the server of the network point; then, each time of verification, a verification request is sent to the last 1 mesh point, the last 1 mesh point returns to the checking position, after the checking result is obtained, the last 1 mesh point completes the verification, and returns the verification result; after the verification is passed, a new inspection position is generated again, and the inspection result is recorded. Before each verification 1 time, the verification position and the verification result are not disclosed on the network, so that even if the real card is stolen, an adversary cannot obtain useful data, and the information is transmitted by using the real card in a highly safe way. And the authentication request is sent, the number of the network point must be marked, and the real network point can also receive the relevant information and respond, so that the fake network point server is difficult to cheat (cheat to check the position, use a fake card and the like).
The privacy card may also be used to pass keys, passwords, etc. After 1 card passes the verification of 1 reliable network, the server of the network randomly generates 2 (group) new checking positions (hereinafter referred to as key positions and password positions), and the obtained checking results are respectively used as keys and passwords after certain processing (for example, the number of data bits is fixed). The amount of money transferred, account number, etc. are encrypted with the key the next time the user uses the privacy card. The password can be used for indicating the identity when the server returns the confirmation information and preventing the disguise of the enemy.
If the user does not think of bank operation and wants to finish the operation at home, the operation can be carried out as follows: the user hands the card to the bank, the equipment of the bank randomly determines a plurality of checking positions and records checking results, and the user goes home and uses a precision terminal and a manual terminal to finish the operation. If the same 1 security card is used for multiple times, the probability that the same 1 checking position is used again is high, which increases the security risk. In this regard, we can also do so; the user gets a plurality of true secret coins from the coin outlet point in advance, the coin outlet point binds the information of the true secret coins with the account number of the user, and when the user goes home, the identity is indicated by the true secret card, and then the true secret card is used for encryption and the like. This can combine the convenience of electronic payment with the security of physical media, which will likely bring the bank card to 1 new era.
If the user does not have a manual terminal or the like, the user can borrow the information from the service point, and in order to improve the security, the user can not send out the check result and the like from the service point but only send out the check result and the like through the mobile phone of the user, so that the adversary can be prevented from stealing the check result (mainly an encryption key) and the like.
The advantage of a privacy card over a genuine (physical) currency is that the amount paid can vary. In the past, cash is often used for small payment, and large payment is mostly carried out in an electronic way (particularly by a bank). And perhaps, future true secret cards are used mainly for small (electronic) payments, and (physical) true secret coins are used for large payments, exactly the opposite of today.
Electronic payments are now becoming more widely used, and many are prepaid payments (transfer of funds from prepaid accounts) which may be secure every 1 payment (such as the anti-counterfeit payment technique described above), but funds in prepaid accounts are usually transferred from bank cards, which is a risky link, and once an adversary is able to gain his or her grip, the amount of funds stolen can be very large. In the past, no perfect technology for transferring accounts between a payment platform and a bank system exists, and the safety can be greatly improved by using irregular materials in the link. Each bank can issue a rechargeable card made of irregular materials, randomly determine a plurality of groups of checking positions before sending out the rechargeable card, record checking results, respectively take the checking results as a password, a key for encrypting the rechargeable amount, a key for encrypting a return receiving result and the like (the corresponding checking positions are hereinafter referred to as password positions, rechargeable key positions, return key positions and the like), and then transmit the rechargeable card to each service station through a safe way; when the user recharges, firstly, the service station verifies the identity (the prior art can be adopted, and the secret card can also be used), and then, a recharging request (including the card number) is sent out; the bank calls out the password position, the recharging key position and the returning key position according to the card number and sends the password position, the recharging key position and the returning key position to the service station; the service station obtains an inspection result according to the positions, encrypts the recharge amount and the related account according to the inspection result, and sends the recharge amount and the related account to the bank; after the bank finishes recharging, the recharging amount is encrypted by a return key and returned to the service station; the service station obtains a decryption key according to the returned key, decrypts the returned ciphertext, and sends a notification of successful recharging to the user if the amount of money conforms to the record. If a plurality of users recharge from the same 1 bank, a plurality of encryption keys can be used for 1 time. Of course, it is also possible to operate directly with a true card (without using a special recharge card), whereas the so-called bank cards of the past are usually used only for inter-bank transfers, such a true card being rather not a bank card.
In addition, the irregular material can also be used as a certificate for identity certification. Today, in many important situations, people use fingerprints as a basis for determining the identity of an individual. However, since fingerprints are 1 static object, an adversary can reproduce fingerprints using a material such as rubber to deceive the adversary. In more important situations, people also use smart cards to prove identity, and passwords generated by the smart cards are changed, but the passwords are often generated by fixed algorithms, are regularly recyclable and can be cracked. If the identification (hereinafter referred to as a true secret card) is made of irregular materials, a direct random password and a secret key can be used, so that an adversary cannot crack the password and the secret key. The essential difference between the technology and the smart card 1 is that the data is generated by using a special medium which is difficult to copy, particularly in the online verification occasion, an adversary cannot cheat through the traditional electronic equipment at all, and the traditional situation that a hacker attacks through methods such as key cracking and the like cannot happen, so that the technology is the most safe technology for verifying the identity of a person in the online environment at present, and the technology and the smart card have wide and important application in the fields of national security, national defense and the like. The cost of the prior passport and the like is high, and the cost of the real secret card is much lower. Irregular materials, 1 new-born thing, have many characteristics and uses, and are not known at present.