CN110135542B - The method, apparatus and system of user's interactive mode Internet of Things verifying based on RF tag - Google Patents

The method, apparatus and system of user's interactive mode Internet of Things verifying based on RF tag Download PDF

Info

Publication number
CN110135542B
CN110135542B CN201910612556.9A CN201910612556A CN110135542B CN 110135542 B CN110135542 B CN 110135542B CN 201910612556 A CN201910612556 A CN 201910612556A CN 110135542 B CN110135542 B CN 110135542B
Authority
CN
China
Prior art keywords
user
commodity
information
network equipment
tag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910612556.9A
Other languages
Chinese (zh)
Other versions
CN110135542A (en
Inventor
张辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wushiwu Information Technology Co Ltd
Original Assignee
Shanghai Wushiwu Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wushiwu Information Technology Co Ltd filed Critical Shanghai Wushiwu Information Technology Co Ltd
Priority to CN201910612556.9A priority Critical patent/CN110135542B/en
Publication of CN110135542A publication Critical patent/CN110135542A/en
Application granted granted Critical
Publication of CN110135542B publication Critical patent/CN110135542B/en
Priority to PCT/CN2020/086330 priority patent/WO2021004125A1/en
Priority to AU2020203171A priority patent/AU2020203171A1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Cash Registers Or Receiving Machines (AREA)
  • Storage Device Security (AREA)

Abstract

The purpose of the application is to provide the method, apparatus and system of a kind of user's interactive mode Internet of Things verifying based on RF tag.Compared with prior art, the application is interacted by the user with order goods, to obtain set by user or the network equipment determines and is sent to the user password of user, and the chip features information of the user password and RF tag is verified jointly, to which user password is introduced into the fake certification of RF tag by interacting to realize with user, since user can be actively engaged in commodity counterfeit prevention, prevent platform side's folk prescription from manipulating anti-fake system, and it ensure that chip can refer to particular commodity with uniqueness using Internet of Things method and server calibration technology, it avoids being replaced and/or reuse, even if user password is revealed, third party's content identical with the manifolding of format chip, or chip tag is replaced, it reuses, this programme can be detected directly, it is formed commercially available complete, effective Comodity anti-fake system.

Description

The method, apparatus and system of user's interactive mode Internet of Things verifying based on RF tag
Technical field
This application involves radio frequency tag technology fields more particularly to a kind of user's interactive mode Internet of Things based on RF tag to test The technology of card.
Background technique
With the continuous development of e-commerce, needs to guarantee that commodity are not intercepted in the circulation process, exchanges, so that handy The commodity that family receives can fidelity, prevent, prevent the circulation of forgery and illegal imitation of brand-name products commodity.
Existing RF tag anti-counterfeiting system and technology are all that seller (such as producer, platform) individually implements, as seller is penetrating Specific data and content is written in frequency label chip, and the chip tag is pasted on commodity, user is only capable of reading verifying. Anti-counterfeiting design is distorted mainly for third party, replicates, is reused.
But these methods have the following deficiencies:
1. do not provide validation-cross for user, only by seller's folk prescription be written in radio frequency tag chip specific data and Content causes all data of fake certification system that can be manipulated and be distorted by seller's folk prescription;2. not providing every to client The one-to-one cryptographic check program of chip, even if some methods provide user and read tool (such as APP) account modification logging Permission, but the password Inspection program of each label chip is also directed to without providing, cause chip write-in information can be By the open reading of third party under general logon rights, increases information and be leaked, imitate the risk write;3. chip tag is physical Link specified commodity loosely: since 80% left and right area of label chip is metal antenna, necessarily there is certain degree of hardness and toughness, i.e., Make to be that special anti-of RF tag manufacturer tears to pieces " fragile paper " chip tag on the market at present, and can be completely stripped and be weighed It is multiple to use, this will lead to label chip can not uniqueness represent specified commodity, so as to cause the invalid and preceding function of Comodity anti-fake system It abandons to the greatest extent.These anti-counterfeiting characteristics during commodity circulation be easy by seller manipulate and/or by third party duplication, removing replacement or It is reused, to cannot achieve scheduled antifalse effect.
Existing radio frequency chip anti-counterfeiting technology is dedicated to in-depth read-write algorithm, data encryption level, puts forth effort to solve and mention Rise a certain technology node;The existing anti-fake system of chip be also always missing from a little or several sport technique segments and lead to not to have been formed Whole, effective anti-counterfeiting system.
Summary of the invention
The purpose of the application be to provide it is a kind of based on RF tag user's interactive mode Internet of Things verifying method, apparatus be System.
According to one embodiment of the application, a kind of side of user's interactive mode Internet of Things verifying based on RF tag is provided Method, wherein method includes the following steps:
The network equipment obtains one or more user passwords, wherein one or more of user passwords correspond to described One or more commodity ordered by user;
The network equipment obtains the chip features information of one or more RF tags, wherein the chip features letter Breath includes chip UID, and one or more of RF tags correspond respectively to one or more of commodity;
The network equipment record among the network devices user password corresponding to the commodity, the commodity institute it is right The merchandise news of the chip features information and the commodity answered, wherein the RF tag is attached to the commodity On;
When the user receives the commodity, reading equipment corresponding to the user reads the RF tag and obtains Take the chip features information of the RF tag, and based on the reading to the RF tag, with the user interact with Obtain the user password of user's input;
The chip features letter for reading the user password and the RF tag that equipment inputs the user Breath is sent to the network equipment;
The network equipment verifies the chip features information and the user password;
According to the user password and the verification result of the chip features information, the network equipment will be tested with described The relevant information of the corresponding commodity of card result is sent to the reading equipment.
Optionally, the step of network equipment acquisition one or more user password includes:
The network equipment obtains one or more user passwords set by user, wherein one or more of users are close Code corresponds to one or more commodity ordered by the user.
Optionally, the step of network equipment acquisition one or more user password includes:
The network equipment determines one or more user passwords, wherein one or more of user passwords correspond to described One or more commodity ordered by user;
Wherein, this method further include:
One or more of user passwords are sent to user corresponding with the commodity by the network equipment.
Optionally, the step of chip features information of the one or more RF tags of acquisition includes:
The network equipment reads the chip features information of one or more RF tags, wherein the chip features letter Breath includes chip UID, and the RF tag corresponds to the commodity.
Optionally, the step of chip features information of the one or more RF tags of acquisition includes:
The network equipment provides the chip features information that RF tag is obtained from device from chip features, wherein described Chip features information includes chip UID, and the RF tag corresponds to the commodity.
Optionally, the step of chip features information of the one or more RF tags of acquisition includes:
Network equipment commodity according to ordered by the user are provided from chip features corresponding with the commodity The chip features information of corresponding with commodity RF tag is obtained at device, wherein the chip features information includes Chip UID.
Optionally, this method further include:
The network equipment provides the core that one or more RF tags are obtained from device from one or more chips feature Piece characteristic information, wherein the chip features information includes chip UID, and each RF tag corresponds to one or more commodity;
Wherein, the step of chip features information of the one or more RF tags of acquisition includes:
Network equipment commodity according to ordered by the user, from the core of acquired one or more RF tags Chip features information corresponding with the commodity is selected in piece characteristic information.
Optionally, the chip features information further includes the firmware parameters information of the chip.
Optionally, this method further include:
The RF tag is written in information to be verified corresponding to the commodity by the network equipment, wherein it is described to Verification information includes the user password;
Wherein, reading equipment corresponding to the user reads the RF tag and obtains the chip of the RF tag Characteristic information, and based on the reading to the RF tag, it is interacted with the user to obtain the institute of user's input The step of stating user password include:
When the user receives the commodity, reading equipment corresponding to the user reads the RF tag and obtains Take the chip features information of the RF tag and information to be verified that the network equipment is written, and based on penetrating to described The reading of frequency marking label is interacted with the user to obtain the user password of user's input;
Wherein, this method further include:
What whether the user password of the input of user described in the reading device authentication was written with the network equipment User password in information to be verified matches;
The verification result of the information to be verified is sent to the network equipment by the reading equipment;
Wherein, the relevant information of the commodity corresponding with the verification result is sent to described by the network equipment Read equipment the step of include:
According to the network equipment to the verification result of the user password and the chip features information and described Equipment is read to the verification result of the information to be verified, the network equipment will the quotient corresponding with the verification result The relevant information of product is sent to the reading equipment.
Optionally, the information to be verified further includes additional feature information.
Optionally, the step of network equipment is recorded among the network devices include:
The network equipment user password, the commodity corresponding to commodity described in scrambled record among the network devices The merchandise news of corresponding the chip features information and the commodity, the RF tag are attached to the commodity On.
Optionally, the RF tag is attached on the commodity based on mode that is built-in or pasting.
According to another embodiment of the application, a kind of user's interactive mode Internet of Things verifying based on RF tag is additionally provided Method, wherein method includes the following steps:
The network equipment obtains one or more user passwords, wherein one or more of user passwords correspond to described One or more commodity ordered by user;
The network equipment obtains the chip features information of one or more RF tags, wherein the chip features letter Breath includes chip UID, and one or more of RF tags correspond respectively to one or more of commodity;
The network equipment record among the network devices user password corresponding to the commodity, the commodity institute it is right The merchandise news of the chip features information and the commodity answered, wherein the RF tag is attached to the commodity On;
The RF tag is written in information to be verified corresponding to the commodity by the network equipment, wherein it is described to Verification information includes the user password;
When the user receives the commodity, reading equipment corresponding to the user reads the RF tag and obtains Take the chip features information of the RF tag and information to be verified that the network equipment is written, and based on penetrating to described The reading of frequency marking label is interacted with the user to obtain the user password of user's input;
What whether the user password of the input of user described in the reading device authentication was written with the network equipment User password in information to be verified matches;
If it is described read device authentication described in user input the user password and the network equipment be written to Verification information does not match that then the reading equipment determines that the RF tag is not through verifying;
If it is described read device authentication described in user input the user password and the network equipment be written to Verification information matches, then the core for reading the user password and the RF tag that equipment inputs the user Piece characteristic information is sent to the network equipment;And the network equipment verifies the chip features information and the user is close Code, and according to the user password and the verification result of the chip features information, it will be corresponding with the verification result The relevant information of the commodity is sent to the reading equipment.
Optionally, the step of network equipment acquisition one or more user password includes:
The network equipment obtains one or more user passwords set by user, wherein one or more of users are close Code corresponds to one or more commodity ordered by the user.
Optionally, the step of network equipment acquisition one or more user password includes:
The network equipment determines one or more user passwords, wherein one or more of user passwords correspond to described One or more commodity ordered by user;
Wherein, this method further include:
One or more of user passwords are sent to user corresponding with the commodity by the network equipment.
Optionally, the information to be verified further includes additional feature information.
According to another embodiment of the application, a kind of user's interactive mode Internet of Things verifying based on RF tag is additionally provided The network equipment, wherein the network equipment includes:
For obtaining the device of one or more user passwords, wherein one or more of user passwords correspond to institute State one or more commodity ordered by user;
For obtaining the device of the chip features information of one or more RF tags, wherein the chip features information Including chip UID, one or more of RF tags correspond respectively to one or more of commodity;
Described in being recorded corresponding to user password corresponding to the commodity, the commodity among the network devices The device of chip features information and the merchandise news of the commodity, wherein the RF tag is attached on the commodity;
For obtaining the chip features information for reading the read RF tag of equipment and the user described Read the device of the user password inputted in equipment;
For verifying the device of the chip features information and the user password;
It, will be with the verification result phase for the verification result according to the user password and the chip features information The relevant information of the corresponding commodity is sent to the device for reading equipment.
Optionally, it is used for for obtaining the device of one or more user passwords:
Obtain one or more user passwords set by user, wherein one or more of user passwords correspond to One or more commodity ordered by the user.
Optionally, it is used for for obtaining the device of one or more user passwords:
Determine one or more user password, wherein one or more of user passwords correspond to ordered by the user One or more commodity of purchase;
Wherein, the network equipment further include:
For one or more of user passwords to be sent to the device of user corresponding with the commodity.
Optionally, it is used for for obtaining the device of the chip features information of one or more RF tags:
Read the chip features information of one or more RF tags, wherein the chip features information includes chip UID, the RF tag correspond to the commodity.
Optionally, it is used for for obtaining the device of the chip features information of one or more RF tags:
The chip features information that RF tag is obtained from device is provided from chip features, wherein the chip features information Including chip UID, the RF tag corresponds to the commodity.
Optionally, it is used for for obtaining the device of the chip features information of one or more RF tags:
According to commodity ordered by the user, provided from chip features corresponding with the commodity obtained from device with The chip features information of the corresponding RF tag of the commodity, wherein the chip features information includes chip UID.
Optionally, the network equipment further include:
For providing the chip features letter for obtaining one or more RF tags from device from one or more chips feature The device of breath, wherein the chip features information includes chip UID, and each RF tag corresponds to one or more commodity;
Wherein, it is used for for obtaining the device of the chip features information of one or more RF tags:
According to commodity ordered by the user, from the chip features information of acquired one or more RF tags Select chip features information corresponding with the commodity.
Optionally, the chip features information further includes the firmware parameters information of the chip.
Optionally, the network equipment further include:
For information to be verified corresponding to the commodity to be written to the device of the RF tag, wherein described to be tested Demonstrate,proving information includes the user password;
For obtaining transmitted by the reading equipment, the device of the verification result of the information to be verified;
Wherein, for the relevant information of the commodity corresponding with the verification result to be sent to the reading equipment Device be used for:
According to the network equipment to the verification result of the user password and the chip features information and described Equipment is read to the verification result of the information to be verified, by the relevant information of the commodity corresponding with the verification result It is sent to the reading equipment.
Optionally, the information to be verified further includes additional feature information.
Optionally, for record among the network devices user password corresponding to the commodity, the commodity institute it is right The device of the merchandise news of the chip features information and the commodity answered is used for:
It is described corresponding to user password, the commodity corresponding to commodity described in scrambled record among the network devices The merchandise news of chip features information and the commodity, the RF tag are attached on the commodity.
Optionally, the RF tag is attached on the commodity based on mode that is built-in or pasting.
According to another embodiment of the application, a kind of user's interactive mode Internet of Things verifying based on RF tag is additionally provided Reading equipment, wherein the reading equipment includes:
For reading RF tag and obtaining the chip features information of the RF tag, and based on to the RF tag Reading, interacted with the user to obtain the device of the user password of user input, wherein the user Password to be the user set in order goods or as the network equipment be set by commodity ordered by the user and by The network equipment is sent to the user, and the chip features information includes chip UID, and the RF tag is attached to institute It states on commodity;
The chip features information of the user password and the RF tag for inputting the user is sent to The device of the network equipment;
For obtaining the verifying transmitted by the network equipment, with the user password and the chip features information As a result the device of the relevant information of the corresponding commodity.
Optionally, the chip features information further includes the firmware parameters information of the chip.
Optionally, for reading RF tag and obtaining the chip features information of the RF tag, and based on to described The reading of RF tag is interacted with the user to obtain the device of the user password of user's input and be used for:
Read RF tag and obtain the RF tag chip features information and the network equipment in the radio frequency mark The information to be verified being written in label, and based on the reading to the RF tag, it interacts with the user to obtain State the user password of user's input, wherein the information to be verified includes user password;
Wherein, the reading equipment further include:
The letter to be verified whether user password for verifying user's input is written with the network equipment The device that user password in breath matches;
For the verification result of the information to be verified to be sent to the device of the network equipment;
Wherein, for obtaining transmitted by the network equipment, with the user password and the chip features information The devices of relevant information of the corresponding commodity of verification result be used for:
Obtain the verification result transmitted by the network equipment, with the user password and the chip features information And the equipment that reads is to the relevant information of the corresponding commodity of the verification result of the information to be verified.
According to another embodiment of the application, a kind of user's interactive mode Internet of Things verifying based on RF tag is additionally provided System, wherein the system comprises the network equipment as described in any one of the above embodiments and readings as described in any one of the above embodiments Equipment.
Optionally, the system also includes one or more RF tags.
Optionally, the system also includes frangible outer label, the frangible outer label is capped to be pasted on the radio frequency mark It signs, and the frangible external standard is signed with unique sequence numbers;
Wherein, the network equipment further include:
For storing the device with the unique sequence numbers corresponding to the RF tag,
It, will be with the radio frequency for after the network equipment verifies the chip features information and the user password The corresponding unique sequence numbers of label are sent to the device for reading equipment.
According to another embodiment of the application, a kind of computer readable storage medium is additionally provided, which is characterized in that institute Stating computer-readable recording medium storage has computer-readable instruction, when the computer-readable instruction is by one or more equipment When execution, so that the equipment executes method as described in any one of the above embodiments.
According to another embodiment of the application, a kind of user's interactive mode Internet of Things verifying based on RF tag is additionally provided System, which is characterized in that the system comprises memory and processor, computer-readable finger is stored in the memory It enables, when the computer-readable instruction is executed by the processor, the processor executes side as described in any one of the above embodiments Method.
Compared with prior art, the application is interacted by the user with order goods, to obtain set by user or net Network equipment determines and is sent to the user password of user, and the chip features information of the user password and RF tag is total to It is same to be verified, thus the application has the following advantages:
1. user password is introduced into the fake certification of RF tag by interacting to realize with user, user only needs With the reading equipment that can read RF tag, it can be actively engaged in commodity counterfeit prevention, prevent folk prescription manipulation in platform side's anti-fake System also increases user and uses confidence;
2. more can guarantee based on the chip anti-counterfeiting technology of chip features information compared to the plain codes verification technique such as two dimensional code Uniqueness certification;
3. more ensure that chip can refer to particular commodity with uniqueness using Internet of Things method and server calibration technology, avoid It is replaced and/or reuses;It further, also include frangible outer with unique sequence numbers on the RF tag of the application Label solves chip tag physical connection commodity technology node, and replacing-proof is furthermore achieved and avoids reusing;
4. even if user password leakage, third party are replaced with content identical with the manifolding of format chip or chip tag It changes, reuse, this programme can be detected directly, form commercially available complete, effective Comodity anti-fake system.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1, which is shown, verifies system according to a kind of user's interactive mode Internet of Things based on RF tag of the application one embodiment Schematic diagram;
Fig. 2 shows being combined RF tag with frangible outer label according to a kind of of the application one embodiment, to have The schematic diagram of the RF tag of frangible outer label;
Fig. 3 (a) shows a kind of user's interactive mode Internet of Things verifying based on RF tag according to the application one embodiment Method flow diagram;
Fig. 3 (b) shows a kind of user's interactive mode Internet of Things verifying based on RF tag according to the application one embodiment Method flow diagram;
Fig. 4 (a) and Fig. 4 (b) be shown respectively according to a kind of network equipment end of the application one embodiment obtain one or The system schematic of the chip features information of multiple RF tags;
Fig. 5 shows a kind of net of user's interactive mode Internet of Things verifying based on RF tag according to the application one embodiment The structural schematic diagram of network equipment;
Fig. 6 shows a kind of reading of user's interactive mode Internet of Things verifying based on RF tag according to the application one embodiment Take the structural schematic diagram of equipment;
Fig. 7 shows the exemplary system that can be used for implementing each embodiment described herein.
The same or similar appended drawing reference represents the same or similar component in attached drawing.
Specific embodiment
The application is described in further detail with reference to the accompanying drawing.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail The processing or method described as flow chart.Although operations are described as the processing of sequence by flow chart, therein to be permitted Multioperation can be implemented concurrently, concomitantly or simultaneously.In addition, the sequence of operations can be rearranged.When it The processing can be terminated when operation completion, it is also possible to have the additional step being not included in attached drawing.The processing It can correspond to method, function, regulation, subroutine, subprogram etc..
In a typical configuration of this application, terminal, the equipment of service network and trusted party include one or more Processor (CPU), input/output interface, network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices or Any other non-transmission medium, can be used for storage can be accessed by a computing device information.
The network equipment includes that one kind can be automatic to carry out numerical value calculating and letter according to the instruction for being previously set or storing The electronic equipment of processing is ceased, hardware includes but is not limited to microprocessor, specific integrated circuit (ASIC), programmable logic device (PLD), field programmable gate array (fpga), digital signal processor (dsp), embedded device etc..The network equipment packet Include but be not limited to what computer, network host, single network server, multiple network server collection or multiple servers were constituted Cloud;Here, cloud is made of a large number of computers or network servers based on cloud computing (Cloud Computing), wherein cloud meter It is one kind of distributed computing, a virtual supercomputer consisting of a loosely coupled set of computers.The net Network includes but is not limited to internet, wide area network, Metropolitan Area Network (MAN), local area network, VPN network, wireless self-organization network (Ad Hoc network) Deng.
The equipment that reads includes but is not limited to the reader device that can arbitrarily read RF tag, such as RF tag card reading Device, the mobile device that RF tag can be read, mobile device with radio frequency recognition function etc..
Wherein, the RF tag can be any type of RF tag.In one embodiment, the RF tag For RFID(Radio Frequency Identification, radio frequency identification) RF tag, used RFID chip For any type of RFID chip, including but not limited to low frequency RFID chip, high frequency RFID chip, ultrahigh frequency RFID chip, micro- Wave RFID chip etc..In another embodiment, the RF tag is NFC(Near Field Communication, near field Communication) RF tag, used NFC chip is any one NFC chip.
The application meaning user equipment includes but is not limited to any electronic product that human-computer interaction can be carried out with user, Such as smart phone, tablet computer, PC machine etc., the user equipment can use any operating system, be as android is operated System, iOS operating system etc..
Certainly, those skilled in the art will be understood that above equipment is only for example, other are existing or are likely to occur from now on Equipment be such as applicable to the application, should also be included within the application protection scope, and be incorporated herein by reference.
The application is described in further detail with reference to the accompanying drawing.
Fig. 1, which is shown, verifies system according to a kind of user's interactive mode Internet of Things based on RF tag of the application one embodiment Schematic diagram.
As shown, user's interactive mode Internet of Things verifying system is related to the network equipment 11, reads equipment 12, RF tag 13, commodity 14, user 15 ordered by user.
The user 15 orders one or more commodity by the network platform, and the network equipment 11 is the network platform The corresponding network equipment, the user 15 inputs the user password set by itself by any one user terminal, described The user password is sent to the network equipment 11 by user terminal.Here, for example, the user can be same with order information The user password of step setting commodity, can also separately be arranged the user password of commodity after the completion of order is submitted.The user is whole End includes but is not limited to such as PC non-mobile device and such as PAD or mobile phone mobile device.
In Fig. 1, commodity ordered by the user 15 are indicated with commodity 14.
The network equipment 11 gets one or more user passwords that the user 15 is inputted, and by itself and the use One or more commodity ordered by family 15 correspond;Then, the network equipment 11 obtains one or more RF tags 13 chip features information, wherein one or more of RF tags 13 correspond respectively to one or more of commodity, institute Stating chip features information includes chip UID.
Wherein, the chip UID(Unique Identifier) it is encoded for the product identification of the chip of the RF tag Fixed code, and UID is semiconductor firmware code, each whole world chip UID is unique, does not change or deletes with user's reading and writing data It removes.
Alternatively, the network equipment 11 is that ordered one or more commodity determine one or more user passwords, often A commodity both correspond to a user password.Then, the network equipment 11 obtains the chip of one or more RF tags 13 Characteristic information, wherein one or more of RF tags 13 correspond respectively to one or more of commodity, and the chip is special Reference breath includes chip UID.
In addition, the network equipment 11 pushes at least any one in channel based on short message, mail, information, by the use Family password is sent to the corresponding user 15 of the RF tag.
Here, those skilled in the art will be understood that the network equipment 11 can be to the transmission of the user password User directly transmits when buying commodity, can also be in row hair again after user receives commodity and when being scanned to the RF tag It send.In addition, determination of the network equipment 11 for user password, it can be after the user 15 have determined bought commodity It carries out, that is, the network equipment starts to determine corresponding user password after user has determined the commodity of purchase;? It can be carried out before the user determines purchase commodity, that is, the network equipment predefines corresponding user password, And when user buy commodity after, then will RF tag corresponding with the user password it is associated with the commodity.
The network equipment 11 is by the chip features corresponding to user password corresponding to the commodity, the commodity Information and the merchandise news of the commodity carry out storage record, wherein the RF tag 13 is attached on the commodity. As shown in Fig. 1, the RF tag 13 is attached on the commodity 14 based on the mode of stickup;In another embodiment In, the adhering mode, which can also be, to be built on the commodity.Here, each RF tag is attached to a specified quotient Product, it is ensured that will not remove, be replaced, so that uniqueness refers to the specified commodity.
The commodity 14 are transported in the hand of the user 15 via modes such as such as logistics.When the user 15 receives After the commodity 14, the user 15 carries out RF tag 13 accompanying on the commodity 14 by the reading equipment 12 Scanning is read.Here, the equipment 12 that reads can only include the equipment for reading RF tag, it is also possible to such as mobile phone tool There is the equipment for reading radio-frequency tag function;In one embodiment, the reading equipment 12 can be equal to the user 15 and use In the subscriber terminal equipment of input user password.
After the reading equipment 12 is read out the RF tag, the reading equipment 12 obtains the radio frequency mark The chip features information of label, and by the interaction with the user 15, obtain the user password that user is inputted.
Then, the reading equipment 12 sends out the user password that acquired chip features information and user are inputted It send to the network equipment 11;User password corresponding to the commodity that the network equipment 11 is stored based on itself and institute The chip features information corresponding to commodity is stated, above- mentioned information transmitted by the reading equipment 12 are verified.And root According to different verification results, the network equipment 11 is by the merchandise related information of the commodity corresponding with the verification result It is sent to the reading equipment 12.For example, if any one of the user password and the chip features information are not inconsistent, institute It states the network equipment 11 and provides feedback informations such as " unverified " to the reading equipment 12;If the user password and described Chip features information compares unanimously, and the network equipment 11 passes through similar to verifications such as the reading equipment 12 offers " certified products " Information, and the merchandise news of the commodity is provided to the reading equipment 12.
Via the above process, in the verification process to RF tag, the user 15 passes through the side for submitting user password Formula carries out active setting to the information verified, or by user password set by the network equipment, with special to the chip Reference breath and the user password carry out double verification, realize crosscheck, ensure that verified information can not be simple Single duplication, also can not be counterfeit, ensure that the uniqueness of verifying.
In one embodiment, a kind of system of user's interactive mode Internet of Things verifying based on RF tag, wherein the system System includes such as the described in any item network equipments of the application, and such as described in any item reading equipment of the application.
In one embodiment, a kind of system of user's interactive mode Internet of Things verifying based on RF tag, wherein the system System includes such as the described in any item network equipments of the application, the described in any item reading equipment of such as the application and for using One or more RF tags of family interactive mode Internet of Things verifying.
Fig. 2 shows being combined RF tag with frangible outer label according to a kind of of the application one embodiment, to have The schematic diagram of the RF tag of frangible outer label.
It wherein, include unique sequence numbers 133 on frangible outer label 131, which is pasted on radio frequency On label 132.In Fig. 2, the frangible outer label 131 is the rectangle label made of friable material, the unique sequence code Numbers 133 are printed on the frangible outer label 31.Those skilled in the art will be understood that the frangible outer label 131 can be Arbitrary shape.The size of the frangible outer label 131 is greater than the size of the RF tag 132, and can be by the RF tag 132 It is completely covered.The RF tag 132 includes radio frequency chip and antenna corresponding with the radio frequency chip.
Therefore, in one embodiment, the system of user's interactive mode Internet of Things verifying based on RF tag further includes RF tag and frangible outer label, the frangible outer label is capped to be pasted on the RF tag, and described frangible outer Unique sequence numbers are had on label.
In one embodiment, the size of the frangible outer label is associated with the size of the RF tag.For example, institute The size for stating frangible outer label can be identical as the RF tag, so that the frangible outer label can glue in a covered manner It is attached on the RF tag.In another embodiment, the size of the frangible outer label is greater than the ruler of the RF tag It is very little, so that the RF tag can be completely covered for the frangible outer label.
In one embodiment, the shape of the frangible outer label can have any shape, such as rectangular, round, oval, Irregular polygon, triangle etc..
In one embodiment, the unique sequence numbers that the frangible external standard is signed can be by the user of RF tag Lai really Fixed, which can be determined based on any generating mode for generating unique sequence numbers, it is only necessary to guarantee that this is frangible outer Label has uniqueness within a predetermined range.For example, each frangible outer label produced all has unique unique sequence Row number, alternatively, used frangible outer label has unique unique sequence numbers in the circulation space of the RF tag.
In one embodiment, the unique sequence numbers are printed in the frangible external standard and sign.
In one embodiment, the unique sequence numbers can be any or more of number, letter, Chinese character, figure etc. The combination of kind.
When the system of user's interactive mode Internet of Things verifying based on RF tag includes the radio frequency with the frangible outer label When label, the network equipment will also storage and the unique sequence numbers corresponding to the RF tag, and in the network It, will unique sequence numbers corresponding with the RF tag after chip features information and the user password described in device authentication It is sent to the reading equipment, is not replaced so that user intuitively verifies the RF tag, and then further determine that RF tag Chip be not replaced or reuse.
Fig. 3 (a) shows a kind of user's interactive mode Internet of Things verifying based on RF tag according to the application one embodiment Method flow diagram.
Wherein, in step sl, the network equipment obtains one or more user passwords, wherein one or more A user password corresponds to one or more commodity ordered by the user;
In step s 2, the network equipment obtains the chip features information of one or more RF tags, wherein described Chip features information includes chip UID, and one or more of RF tags correspond respectively to one or more of commodity;
In step s3, the network equipment record among the network devices user password corresponding to the commodity, The chip features information and the merchandise news of the commodity corresponding to the commodity, wherein the RF tag is attached In on the commodity;
In step s 4, when the user receives the commodity, described in the reading of reading equipment corresponding to the user RF tag and the chip features information for obtaining the RF tag, and based on the reading to the RF tag, with the use Family is interacted to obtain the user password of user's input;
In step s 5, the equipment user password that inputs the user and the RF tag of reading Chip features information is sent to the network equipment;
In step s 6, the network equipment verifies the chip features information and the user password;
In the step s 7, it is set according to the user password and the verification result of the chip features information, the network It is standby that the relevant information of the commodity corresponding with the verification result is sent to the reading equipment.
Above-mentioned steps are specifically described below.
In step sl, the network equipment obtains one or more user passwords, wherein one or more of users Password corresponds to one or more commodity ordered by the user.
In one embodiment, the network equipment obtains one or more user passwords set by user, wherein institute One or more user passwords are stated corresponding to one or more commodity ordered by the user.
Specifically, in step sl, it is close by any one user terminal to input the user set by itself by the user The user password is sent to the network equipment by code, the user terminal.For example, the user by pc port, H5 or APP mobile phone port, customized handheld terminal network remote mode submit set user password to the network equipment.Here, The user terminal includes but is not limited to such as PC non-mobile device and such as PAD or mobile phone mobile device.The user is close Code can directly be submitted with goods orders in order goods, can also separately be submitted after submitting order.
Here, the user can input one or more passwords that correspondence is arranged for some or all of ordered commodity Password.For example, a user password can correspond to one or more order goods, (such as an order corresponds to a use Family password), or different user passwords is respectively set in each order goods.From the angle of ordered commodity, if needing Anti-fake for some commodity progress RF tag, then the commodity will correspond to a user password namely every commodity pair The radio frequency chip answered distributes a password.
In another embodiment, the network equipment determines one or more user passwords, wherein one or more A user password corresponds to one or more commodity ordered by the user;Wherein, this method further includes step (not shown): One or more of user passwords are sent to user corresponding with the commodity by the network equipment.
Specifically, the network equipment 11 by automatically generate or manual type it is determining with corresponding to the RF tag User password;In addition, the network equipment 11 pushes at least any one in channel based on short message, mail, information, by the use Family password is sent to the corresponding user of the RF tag.
Here, those skilled in the art will be understood that the network equipment 11 can be to the transmission of the user password User directly transmits when buying commodity, can also be in row hair again after user receives commodity and when being scanned to the RF tag It send.In addition, determination of the network equipment 11 for user password, can determine that bought commodity are laggard in the user Row, that is, the network equipment starts to determine corresponding user password after user has determined the commodity of purchase;It can also To be carried out before the user determines purchase commodity, that is, the network equipment predefines corresponding user password, and When user buy commodity after, then will RF tag corresponding with the user password it is associated with the commodity.
In step s 2, the network equipment obtains the chip features information of one or more RF tags, wherein described Chip features information includes chip UID, and one or more of RF tags correspond respectively to one or more of commodity.
Specifically, in one embodiment, the network equipment directly reads the chip spy of one or more RF tags Reference breath.Here, described read comprising reading blank radio frequency chip or reading the radio frequency core being attached in advance on commodity Piece, that is, by directly reading chip to obtain chip features information.
In one embodiment, the chip features information further includes the firmware parameters information of the chip.Specifically, institute State firmware parameters information include but is not limited to tag types, version, format, used technology, communication protocol relevant parameter (such as ATQA: the rank having for judging UID, SAK: for the response to anti-collision and card selection), memory information, vendor code etc. one Item is multinomial, and firmware parameters information possessed by different types of radio frequency chip is different, can be using wherein at least in the application Any one is as reading/record firmware parameters information, by firmware parameters information also as one of the information verified.? This, the application be for the processing mode of the firmware parameters information it is same or similar with the processing mode of chip UID, herein not It repeats again.
Fig. 4 (a), which is shown, obtains one or more RF tags according to a kind of network equipment end of the application one embodiment Chip features information system schematic.By taking a commodity as an example, the network equipment 11 selects a blank RF tag 13, and as the RF tag for corresponding to the commodity;Then, the network equipment 11 is by directly reading or reading with other Card writer interacts, to obtain the chip features information of the blank RF tag.In another embodiment, the radio frequency mark Label 13 are the RF tags being attached in advance on commodity, and the RF tag also can be read directly in the network equipment 11 Chip features information.
Here, the chip features information includes chip UID.It, should other than the chip UID in reading process The network equipment 11 or other read-write card apparatus can also read the firmware parameters information of the RF tag.
In one embodiment, the read-write card apparatus can be the mobile device with read-write card function, such as mobile phone;? In another embodiment, the read-write card apparatus can be the equipment (such as pc client) without read-write card function and have The combination of the peripheral hardware (such as PC card reader/writer) of read-write card function, equipment without read-write card function and has the function of read-write card Peripheral hardware between can be attached for example, by forms such as ActiveX webpage controls.
In another embodiment, the network equipment provides the chip spy that RF tag is obtained from device from chip features Reference breath, wherein the chip features information includes chip UID, and the RF tag corresponds to the commodity.
Specifically, it includes but is not limited to the chip features information for being stored with RF tag that the chip features, which provide device, Database, the RF tag are corresponding with the commodity.For example, may include storage in the network platform of order goods There is the database of a certain commodity and the chip features information of its corresponding RF tag, the RF tag already is allocated to The commodity, if user has subscribed the commodity, the network equipment obtains the radio frequency from chip features offer device The chip features information of label;Alternatively, other third party devices, if goods providers can also be directly commodity provided by it RF tag is distributed, and is stored with the chip features information of the commodity and the RF tag corresponding to it, the network equipment It can directly interact with the third party device, to obtain the chip features information of the RF tag.
Fig. 4 (b), which is shown, obtains one or more RF tags according to a kind of network equipment end of the application one embodiment Chip features information system schematic.By taking a commodity as an example, the network equipment 11 needs to obtain quotient ordered by user The chip features information of RF tag 13 corresponding to product, then the network equipment 11 be stored with radio frequency corresponding to the commodity The chip features of the chip features information of label 13 provide device, i.e. DB-UID is interacted, to obtain corresponding to the commodity Chip features information.For example, the network equipment 11 sends the information such as the title, batch, number of the commodity to the DB-UID, The chip features information of RF tag 13 corresponding to the commodity is sent to the network equipment 11 by the DB-UID.
Wherein, in one embodiment, network equipment commodity according to ordered by the user, from the commodity Corresponding chip features provide the chip features information that RF tag corresponding with the commodity is obtained at device, wherein The chip features information includes chip UID.
Specifically, after the user places an order order goods, the network equipment is according to ordered commodity, from described Chip features provide the chip features information that RF tag corresponding with the commodity is obtained at device;That is, only in the use After the order goods of family, the network equipment just provides device to the chip features and sends request, special to obtain corresponding chip Reference breath.
In another embodiment, this method further comprises the steps of: the network equipment and mentions from one or more chips feature For obtaining the chip features information of one or more RF tags at device, wherein the chip features information includes chip UID, each RF tag correspond to one or more commodity;Wherein, the step S2 includes: the network equipment according to Commodity ordered by user, selection and the commodity phase from the chip features information of acquired one or more RF tags Corresponding chip features information.
That is, the network equipment can be provided from the chip features in advance obtains one or more radio frequency marks from device The chip features information of label is to be stored, since each RF tag corresponds to one or more commodity, when user orders quotient When product, then the network equipment is then according to ordered commodity, selection and the quotient from acquired said chip characteristic information The corresponding chip features information of product.
Above two embodiment, which can be realized, to be provided the network equipment to device with chip features and sets up separately, for example, if network is set Standby to correspond to network delivery platform, chip features provide device and correspond to manufacturer UID database, then can by way of setting up separately It prevents manufacturer side from disposably revealing UID database, realizes the storage safety of UID data.
Here, by taking user buys honey as an example, honey manufacturer is that each bottle of honey is assigned with a RF tag, and Each bottle of honey and the chip UID of its corresponding RF tag are had recorded in DB-UID;When user is in network delivery platform purchase When buying a certain bottle honey, network platform of delivering submits the purchase information of user to the honey manufacturer, and honey manufacturer is from DB- The chip UID of honey and its corresponding RF tag that user is bought is obtained in UID, and chip UID information is sent Give network delivery platform;
Alternatively, network delivery platform can also in advance from honey manufacturer from more bottles of honey of acquisition and with the more bottles of bees The chip UID of the corresponding RF tag of honey, when user buys wherein one bottle of honey, then the network delivery platform calls The information of chip UID corresponding with the honey.
In step s3, the network equipment record among the network devices user password corresponding to the commodity, The chip features information and the merchandise news of the commodity corresponding to the commodity, wherein the RF tag is attached In on the commodity.
Specifically, the network equipment is in the network device by user password corresponding to the commodity, commodity institute The corresponding chip features information and the merchandise news of the commodity are stored, here, the merchandise news include but It is not limited to such as product name, lot number, shelf-life, the place of production, order relevant information information, the order relevant information includes order Time, O/No., lower single user's name etc..The RF tag is by pasting or the modes such as built-in are attached to the commodity On.
In one embodiment, in step s3, network equipment quotient described in scrambled record among the network devices User password corresponding to product, the chip features information and the merchandise news of the commodity corresponding to the commodity, institute RF tag is stated to be attached on the commodity.
Specifically, the record can be scrambled record.Here, can believe the user password, the chip features Breath and the merchandise news are encrypted respectively, can use identical or different Encryption Algorithm when encrypting respectively;It can also With at least wantonly two progress common cryptographic in the user password, the chip features information and the merchandise news, After combining the two into a character string, encrypted using same Encryption Algorithm.
The Encryption Algorithm can be any symmetrical expression or unsymmetrical tridiagonal matrix algorithm for information encryption.Encrypted Cheng Zhong can directly encrypt above- mentioned information using special algorithm, and it is special that other encryptions can also be added in ciphering process Reference is ceased to enhance confidentiality.
Those skilled in the art will be understood that when the merchandise news for recording the commodity with the cipher mode, the quotient When the chip features information corresponding to user password corresponding to product and the commodity, in verifying, correspondingly have Corresponding manner of decryption, the above- mentioned information recorded are decrypted, thus with reading equipment institute corresponding to the user The user password of user input and the chip features information of the electronic tag obtained is verified.
In step s 4, when the user receives the commodity, described in the reading of reading equipment corresponding to the user RF tag and the chip features information for obtaining the RF tag, and based on the reading to the RF tag, with the use Family is interacted to obtain the user password of user's input.
Specifically, when the user receives the commodity, corresponding reading equipment is can be used to described in the user RF tag is scanned;After scanning the RF tag, the reading equipment can request the use according to the scanning information Family inputs the user password.Here, the request can be the input request that the reading equipment is voluntarily sent;It is also possible to After the reading equipment and the service equipment interact, request transmitted by the service equipment is obtained, and be based on the request The user is requested to input user password in the reading equipment.
For example, the reading equipment can pop up input frame to require the user to input user password.
Meanwhile when the reading equipment is read out the RF tag, the reading equipment can obtain described The chip features information of RF tag.
In step s 5, the reading equipment is by encryption or non-encrypted communication mode, the institute that the user is inputted The chip features information for stating user password and the RF tag is sent to the network equipment.
In step s 6, the network equipment verifies the chip features information and the user password.
Specifically, the network equipment is interacted with the reading equipment, obtains the use transmitted by the reading equipment The user password of family input and the chip features information of the RF tag;Then, the network equipment end will be from institute It states the information for reading and obtaining at equipment to be matched with the information that the network equipment end itself stores, that is, the reading is set User password that standby acquired user password and the network equipment are stored, by the read chip spy of the readings equipment Reference breath carries out matching verifying with the chip features information that the network equipment is stored respectively, and obtains verification result.Here, The process of the matching verifying can be carried out based on scheduled matching order, such as first match user password, then matching chip is special Reference breath, or vice versa;Alternatively, the process of the matching verifying can carry out simultaneously, i.e., while respectively match user password and core Piece characteristic information.
In one embodiment, above-mentioned one or more information are stored by encryption, then at the time of reading, the network Equipment is based on scheduled manner of decryption and is decrypted.
Here, the matching result includes but is not limited to:
The chip features information can not match: the read chip features information of the reading equipment is simultaneously not recorded in In the network equipment;
The chip features information matches but user password can not match;
The chip features information is mismatched with the user password;
The chip features information is matched with the user password.
In the step s 7, it is set according to the user password and the verification result of the chip features information, the network It is standby that the relevant information of the commodity corresponding with the verification result is sent to the reading equipment.
Specifically, the relevant information of the commodity is sent to described by the network equipment according to different verification results Read equipment, the relevant information of the commodity include but is not limited to all information of the commodity, partial information, related information or Person is the relevant empty information of the commodity (as refusal provides the information of the commodity).
For example, that is, described read chip features information of reading equipment is simultaneously if the chip features information can not match It is not recorded in the network equipment, then the network equipment provides the letter such as " non-this system card " or " can not pass through verifying " Breath;Preferably, the network equipment terminates further verification and feedback.
If if the chip features information matches but the user password can not match or the chip features information and institute It states user password to mismatch, then the network equipment provides information such as " can not pass through verifying ";Preferably, the network equipment Terminate further verification and feedback.
If the chip features information is matched with the user password, the network equipment provides " certified products " or " logical Cross fake certification " etc. information, and the merchandise news of the commodity is pushed to the reading equipment.Preferably, if the radio frequency mark It signs covering and is pasted with the frangible outer label with unique sequence numbers, then the network equipment can also will be stored in the network equipment In unique sequence numbers push to the reading equipment.
In one embodiment, the method also includes step S8(to be not shown), step S9(is not shown), step S10(not Show), wherein in step s 8, the radio frequency mark is written in information to be verified corresponding to the commodity by the network equipment Label, wherein the information to be verified includes user password set by the user;In step s 4, when the user receives When the commodity, reading equipment corresponding to the user reads the RF tag and obtains the chip spy of the RF tag The information to be verified that reference breath, the user password of user input and the network equipment are written;In step S9 In, it is to be verified whether the user password for reading the input of user described in device authentication is written with the network equipment User password in information matches;In step slo, the equipment that reads sends the verification result of the information to be verified To the network equipment;In the step s 7, the network equipment is according to the network equipment to the user password and described The verification result of chip features information and the reading equipment, will be with the verifyings to the verification result of the information to be verified As a result the relevant information of the corresponding commodity is sent to the reading equipment.
Specifically, in step s 8, the network equipment, will be corresponding to the commodity directly or by read-write card apparatus The chip of the RF tag is written in information to be verified.Here, the network equipment or read-write card apparatus can first read described penetrate Frequency marking label, with parameters such as the chip format, communication protocol, the chip UID that obtain the RF tag;Then, it is based on above-mentioned parameter, By the information of required write-in, the user password set by the user be written to as described in RF tag.In a kind of implementation In example, the information to be verified can also include the merchandise news of such as described commodity.
In one embodiment, the information to be verified further includes additional feature information, i.e., the described network equipment or described Other additional feature informations can also be written in the RF tag by read-write card apparatus.The network equipment can also be by institute It states in additional feature information storage and the network equipment.The additional feature information includes that end is not limited to feature code, feature Information etc..Herein, it is preferable that the additional feature information can be written based on any one algorithm.
In one embodiment, the read-write card apparatus can be the mobile device with read-write card function, such as utilize hand Machine, to realize read-write by the APP on mobile phone;In another embodiment, the read-write card apparatus, which can be, does not have read-write The combination of the equipment (such as pc client) of card function and the peripheral hardware (such as PC card reader/writer) with read-write card function does not have and reads Writing can carry out between the equipment of card function and the peripheral hardware with read-write card function for example, by forms such as ActiveX webpage controls Connection, for example, by ActiveX webpage control, controlling PC card reader/writer from the particular webpage on pc client and being written and read.
In step s 4, the reading equipment corresponding to the user is when reading the RF tag, in addition to obtaining institute It states the chip features information of RF tag and based on the reading to the RF tag, interacts with the user to obtain The user password of user input, the information to be verified that also network equipment described in the RF tag is written into Row is read.
In step s 9, described to read the user password that inputs according to the user of equipment, by the user password with it is described The user password in information to be verified that the network equipment is written matches, in the reading equipment end to the user password It is verified.In one embodiment, if the user password is unverified, " verifying directly can be provided to the user Do not pass through " prompt.
In one embodiment, the verification result of the information to be verified is sent to the network and set by the reading equipment It is standby.Here, the verification result that the verification result includes the information to be verified is tested by verifying or the information to be verified It is unverified to demonstrate,prove result.
In step s 6, the network equipment executes verifying to the chip features information and the user password.
Then, in the step s 7, the network equipment end according to the network equipment end to the user password and The verification result of the chip features information and the equipment end that reads determine most the verification result of the information to be verified Whole verification result, and the relevant information of the commodity corresponding with the verification result is sent to the reading equipment.
For example, if the network equipment or the verification result of any one for reading equipment are " unverified ", The network equipment provides the information of " can not pass through verifying " to the reading equipment;
For example, if when the network equipment and the reading equipment pass through verifying, the network equipment is to described It reads equipment and the information such as " certified products " or " passing through fake certification " is provided, and the merchandise news of the commodity is pushed to the reading and is set It is standby.
Fig. 3 (b) shows a kind of user's interactive mode Internet of Things verifying based on RF tag according to the application one embodiment Method flow diagram.
Wherein, in step S1 ', the network equipment obtains one or more user passwords, wherein one or more A user password corresponds to one or more commodity ordered by the user;
In step S2 ', the network equipment obtains the chip features information of one or more RF tags, wherein institute Stating chip features information includes chip UID, and one or more of RF tags correspond respectively to one or more of commodity;
In step S3 ', the network equipment record among the network devices user password corresponding to the commodity, The chip features information and the merchandise news of the commodity corresponding to the commodity, wherein the RF tag is attached In on the commodity;
In step S4 ', the RF tag is written in information to be verified corresponding to the commodity by the network equipment, Wherein, the information to be verified includes user password set by the user;
In step S5 ', when the user receives the commodity, described in the reading of reading equipment corresponding to the user RF tag simultaneously obtains the chip features information of the RF tag and information to be verified that the network equipment is written, and Based on the reading to the RF tag, interacted with the user to obtain the user password of user's input;
In step S6 ', it is described read device authentication described in user input the user password whether with the network The user password in information to be verified that equipment is written matches;
In step S71 ', if the user password for reading the input of user described in device authentication is set with the network The standby information to be verified being written does not match that then the reading equipment determines that the RF tag is not through verifying;
In step S721 ', if the user password and the network for reading the input of user described in device authentication The information to be verified that equipment is written matches, then described to read the user password and institute that equipment inputs the user The chip features information for stating RF tag is sent to the network equipment;In step S722 ', described in the network equipment verifying Chip features information and the user password, and according to the user password and the verifying knot of the chip features information The relevant information of the commodity corresponding with the verification result is sent to the reading equipment by fruit.
Above-mentioned steps are specifically described below.
Here, the step S1 in described step S1 ' and Fig. 3 (a) is same or similar, in the step S2 ' and Fig. 3 (a) Step S2 is same or similar, and the step S3 in described step S3 ' and Fig. 3 (a) is same or similar, therefore details are not described herein, and will Above-mentioned steps S1, step S2 and step S3 and its related embodiment are incorporated herein by reference.
In step S4 ', the network equipment, will be to be verified corresponding to the commodity directly or by read-write card apparatus The chip of the RF tag is written in information.Here, the network equipment or read-write card apparatus can first read the RF tag, With parameters such as the chip format, communication protocol, the chip UID that obtain the RF tag;Then, it is based on above-mentioned parameter, it will be required The information to be written, the user password set by the user be written to as described in RF tag.In one embodiment, institute State the merchandise news that information to be verified can also include such as described commodity.
In one embodiment, the information to be verified further includes additional feature information, i.e., the described network equipment or described Other additional feature informations can also be written in the RF tag by read-write card apparatus.The network equipment can also be by institute It states in additional feature information storage and the network equipment.The additional feature information includes that end is not limited to feature code, feature Information etc..Herein, it is preferable that the additional feature information can be written based on any one algorithm.
In one embodiment, the read-write card apparatus can be the mobile device with read-write card function, such as utilize hand Machine, to realize read-write by the APP on mobile phone;In another embodiment, the read-write card apparatus, which can be, does not have read-write The combination of the equipment (such as pc client) of card function and the peripheral hardware (such as PC card reader/writer) with read-write card function does not have and reads Writing can carry out between the equipment of card function and the peripheral hardware with read-write card function for example, by forms such as ActiveX webpage controls Connection, for example, by ActiveX webpage control, controlling PC card reader/writer from the particular webpage on pc client and being written and read.
In step S5 ', the reading equipment corresponding to the user is when reading the RF tag, in addition to obtaining institute The chip features information of RF tag and the user password of user input are stated, also to described in the RF tag The information to be verified that the network equipment is written is read out.
In step S6 ', the reading equipment will interact the user that acquired, described user is inputted with the user Password is matched with from the user password in the information to be verified read in the RF tag.If in the RF tag The information to be verified stored is encryption storage, then will match after the information decryption to be verified.
If it fails to match, S71 ' is thened follow the steps;If successful match, S721 ' and step S722 ' is thened follow the steps.
If it fails to match, i.e., the described user password and the network equipment for reading the input of user described in device authentication The information to be verified being written does not match that, then in step S71 ', the reading equipment determines that the RF tag does not lead to Verifying is crossed, and provides a user verification result information, terminates verification process, i.e., the described reading equipment is no longer to the network equipment It sends follow-up and avoids the resource consumption of the network equipment so as to avoid the transmitting of a large amount of invalid informations.In a kind of embodiment In, the reading equipment can send the information that the secondary verifying has failed to the network equipment.
If successful match, i.e., the described user password and the network equipment for reading the input of user described in device authentication The information to be verified being written matches, then in step S721 ', then the reading equipment passes through encryption or non-encrypted communication The chip features information of the user password and the RF tag that the user inputs is sent to the network by mode Equipment;Then, in step S722 ', the network equipment verifies the chip features information and the user password, and root It, will the commodity corresponding with the verification result according to the user password and the verification result of the chip features information Relevant information be sent to the reading equipment.
Step S6 in described step S722 ' and Fig. 3 (a) and the corresponding operating in step S7 are same or similar, therefore herein It repeats no more, and above-mentioned steps S6 and step S7 and its related embodiment is incorporated herein by reference.
That is, in one embodiment, if it fails to match in the reading equipment end, the reading equipment end directly to User provides the prompt such as " authentication failed ", and no longer sends the user password and institute that the user inputs to the network equipment State the information such as the chip features information of RF tag;If in the reading equipment end successful match, the reading equipment just meeting The user password and the chip features information of the RF tag etc. that the user inputs are provided to the network equipment Information, so that the network equipment end is further verified.
Fig. 5 shows a kind of net of user's interactive mode Internet of Things verifying based on RF tag according to the application one embodiment The structural schematic diagram of network equipment.The network equipment 50 include device 501, device 502, device 503, device 504, device 505, Device 506.
Wherein, described device 501 is for obtaining one or more user passwords, wherein one or more of users are close Code corresponds to one or more commodity ordered by the user;
Described device 502 is used to obtain the chip features information of one or more RF tags, wherein the chip features Information includes chip UID, and one or more of RF tags correspond respectively to one or more of commodity;
Described device 503 for recording user password corresponding to the commodity, the commodity among the network devices The merchandise news of corresponding the chip features information and the commodity, wherein the RF tag is attached to institute It states on commodity;
Described device 504 is used to obtain the reading chip features information of the read RF tag of equipment and described The user password that user is inputted in the reading equipment;
Described device 505 is for verifying the chip features information and the user password;
Described device 506 is used for the verification result according to the user password and the chip features information, will be with institute The relevant information for stating the corresponding commodity of verification result is sent to the reading equipment.
Above-mentioned apparatus is specifically described below.
Described device 501 is for obtaining one or more user passwords, wherein one or more of user passwords are corresponding One or more commodity ordered by the user.
In one embodiment, described device 501 obtains one or more user passwords set by user, wherein institute One or more user passwords are stated corresponding to one or more commodity ordered by the user.
Specifically, the user inputs the user password set by itself, the user by any one user terminal The user password is sent to the described device 501 of the network equipment by terminal.For example, the user passes through pc port, H5 Or APP mobile phone port, customized handheld terminal network remote mode submit set user password to the network equipment.? This, the user terminal includes but is not limited to such as PC non-mobile device and such as PAD or mobile phone mobile device.The user Password can directly be submitted with goods orders in order goods, can also separately be submitted after submitting order.
Here, the user can input one or more passwords that correspondence is arranged for some or all of ordered commodity Password.For example, a user password can correspond to one or more order goods, (such as an order corresponds to a use Family password), or different user passwords is respectively set in each order goods.From the angle of ordered commodity, if needing Anti-fake for some commodity progress RF tag, then the commodity will correspond to a user password namely every commodity pair The radio frequency chip answered distributes a password.
In another embodiment, described device 501 determines one or more user passwords, wherein one or more A user password corresponds to one or more commodity ordered by the user;Wherein, the network equipment further includes for inciting somebody to action One or more of user passwords are sent to the device (not shown) of user corresponding with the commodity.
Specifically, described device 501 is by automatically generating or manual type is determining with use corresponding to the RF tag Family password;In addition, the network equipment 11 pushes at least any one in channel based on short message, mail, information, by the user Password is sent to the corresponding user of the RF tag.
Here, those skilled in the art will be understood that the network equipment 11 can be to the transmission of the user password User directly transmits when buying commodity, can also be in row hair again after user receives commodity and when being scanned to the RF tag It send.In addition, determination of the network equipment 11 for user password, can determine that bought commodity are laggard in the user Row, that is, the network equipment starts to determine corresponding user password after user has determined the commodity of purchase;It can also To be carried out before the user determines purchase commodity, that is, the network equipment predefines corresponding user password, and When user buy commodity after, then will RF tag corresponding with the user password it is associated with the commodity.
Described device 502 is used to obtain the chip features information of one or more RF tags, wherein the chip features Information includes chip UID, and one or more of RF tags correspond respectively to one or more of commodity.
Specifically, in one embodiment, described device 502 directly reads the chip features of one or more RF tags Information.Here, described read comprising reading blank radio frequency chip or reading the radio frequency chip being attached in advance on commodity, That is, by directly reading chip to obtain chip features information.
In one embodiment, the chip features information further includes the firmware parameters information of the chip.Specifically, institute State firmware parameters information include but is not limited to tag types, version, format, used technology, communication protocol relevant parameter (such as ATQA: the rank having for judging UID, SAK: for the response to anti-collision and card selection), memory information, vendor code etc. one Item is multinomial, and firmware parameters information possessed by different types of radio frequency chip is different, can be using wherein at least in the application Any one is as reading/record firmware parameters information, by firmware parameters information also as one of the information verified.? This, the application be for the processing mode of the firmware parameters information it is same or similar with the processing mode of chip UID, herein not It repeats again.
In another embodiment, described device 502 is used to provide the core for obtaining RF tag from device from chip features Piece characteristic information, wherein the chip features information includes chip UID, and the RF tag corresponds to the commodity.
Specifically, it includes but is not limited to the chip features information for being stored with RF tag that the chip features, which provide device, Database, the RF tag are corresponding with the commodity.For example, may include storage in the network platform of order goods There is the database of a certain commodity and the chip features information of its corresponding radio frequency chip, the radio frequency chip already is allocated to The commodity, if user has subscribed the commodity, described device 502 obtains the radio frequency mark from chip features offer device The chip features information of label;Alternatively, other third party devices, if goods providers can also be directly commodity point provided by it With RF tag, and it is stored with the chip features information of the commodity and the RF tag corresponding to it, described device 502 can be with It directly interacts with the third party device, to obtain the chip features information of the RF tag.
Wherein, in one embodiment, the commodity according to ordered by the user of described device 502, from the commodity Corresponding chip features provide the chip features information that RF tag corresponding with the commodity is obtained at device, wherein The chip features information includes chip UID.
Specifically, after the user places an order order goods, described device 502 is according to ordered commodity, from described Chip features provide the chip features information that RF tag corresponding with the commodity is obtained at device;That is, only in the use After the order goods of family, 502 ability of described device provides device to the chip features and sends request, to obtain corresponding chip features Information.
In another embodiment, the network equipment further includes for providing from device from one or more chips feature Obtaining the device of the chip features information of one or more RF tags, wherein the chip features information includes chip UID, Each RF tag corresponds to one or more commodity;Wherein, described device 502 is used for the quotient according to ordered by the user Product select chip features corresponding with the commodity from the chip features information of acquired one or more RF tags Information.
That is, the network equipment can be provided from the chip features in advance obtains one or more radio frequency marks from device The chip features information of label is to be stored, since each RF tag corresponds to one or more commodity, when user orders quotient When product, then described device 502 is then according to ordered commodity, selection and the commodity from acquired said chip characteristic information Corresponding chip features information.
Above two embodiment, which can be realized, to be provided the network equipment to device with chip features and sets up separately, for example, if network is set Standby to correspond to network delivery platform, chip features provide device and correspond to manufacturer UID database, then can by way of setting up separately It prevents manufacturer side from disposably revealing UID database, realizes the storage safety of UID data.
Described device 503 for recording user password corresponding to the commodity, the commodity among the network devices The merchandise news of corresponding the chip features information and the commodity, wherein the RF tag is attached to described On commodity.
Specifically, described device 503 is right by user password corresponding to the commodity, commodity institute in the network device The merchandise news of the chip features information and the commodity answered is stored, here, the merchandise news includes but not It is limited to such as product name, lot number, shelf-life, the place of production, order relevant information information, when the order relevant information includes order Between, O/No., lower single user's name etc..The RF tag is by pasting or the modes such as built-in are attached on the commodity.
In one embodiment, described device 503 is for corresponding to commodity described in scrambled record among the network devices User password, the chip features information and the merchandise news of the commodity corresponding to the commodity, the radio frequency mark Label are attached on the commodity.
Specifically, the record can be scrambled record.Here, can believe the user password, the chip features Breath and the merchandise news are encrypted respectively, can use identical or different Encryption Algorithm when encrypting respectively;It can also With at least wantonly two progress common cryptographic in the user password, the chip features information and the merchandise news, After combining the two into a character string, encrypted using same Encryption Algorithm.
The Encryption Algorithm can be any symmetrical expression or unsymmetrical tridiagonal matrix algorithm for information encryption.Encrypted Cheng Zhong can directly encrypt above- mentioned information using special algorithm, and it is special that other encryptions can also be added in ciphering process Reference is ceased to enhance confidentiality.
Those skilled in the art will be understood that when the merchandise news for recording the commodity with the cipher mode, the quotient When the chip features information corresponding to user password corresponding to product and the commodity, in verifying, correspondingly have Corresponding manner of decryption, the above- mentioned information recorded are decrypted, thus with reading equipment institute corresponding to the user The user password of user input and the chip features information of the electronic tag obtained is verified.
When the user receives the commodity, described device 504 reads the read radio frequency of equipment for obtaining The user password that the chip features information of label and the user are inputted in the reading equipment.
Specifically, when the user receives the commodity, corresponding reading equipment is can be used to described in the user RF tag is scanned;After scanning the RF tag, the reading equipment can request the use according to the scanning information Family inputs the user password.Here, the request can be the input request that the reading equipment is voluntarily sent;It is also possible to After the reading equipment and the service equipment interact, request transmitted by the service equipment is obtained, and be based on the request The user is requested to input user password in the reading equipment.
The reading equipment by encryption or non-encrypted communication mode, the user password that the user is inputted with And the chip features information of the RF tag is sent to the network equipment, correspondingly, described device 504 is set with the reading It is standby to interact to obtain above- mentioned information.
Described device 505 is for verifying the chip features information and the user password.
Specifically, described device 505 for will from it is described reading equipment from obtain information and the network equipment in itself The information of storage is matched, that is, user password acquired in the reading equipment and the network equipment are stored User password, the chip features information for being stored the reading read chip features information of equipment and the network equipment Matching verifying is carried out respectively, and obtains verification result.Here, the process of the matching verifying can be based on scheduled matching order It carries out, such as first matches user password, then matching chip characteristic information, or vice versa;Alternatively, the process of the matching verifying can be with It carries out simultaneously, i.e., while respectively matches user password and chip features information.
In one embodiment, above-mentioned one or more information are stored by encryption, then at the time of reading, the network Equipment is based on scheduled manner of decryption and is decrypted.
Here, the matching result includes but is not limited to:
The chip features information can not match: the read chip features information of the reading equipment is simultaneously not recorded in In the network equipment;
The chip features information matches but user password can not match;
The chip features information is mismatched with the user password;
The chip features information is matched with the user password.
Described device 506 is used for the verification result according to the user password and the chip features information, will be with institute The relevant information for stating the corresponding commodity of verification result is sent to the reading equipment.
Specifically, described device 506 is used to that the relevant information of the commodity to be sent to institute according to different verification results Reading equipment is stated, the relevant information of the commodity includes but is not limited to all information, partial information, related information of the commodity The either relevant empty information of the commodity (as refusal provides the information of the commodity).
For example, that is, described read chip features information of reading equipment is simultaneously if the chip features information can not match It is not recorded in the network equipment, then described device 506 provides the information such as " non-this system card " or " can not pass through verifying "; Preferably, the network equipment terminates further verification and feedback.
If if the chip features information matches but the user password can not match or the chip features information and institute It states user password to mismatch, then described device 506 provides information such as " can not pass through verifying ";Preferably, the network equipment Terminate further verification and feedback.
If the chip features information is matched with the user password, described device 506 provides " certified products " or " passes through The information such as fake certification ", and the merchandise news of the commodity is pushed to the reading equipment.Preferably, if the RF tag Upper covering is pasted with the frangible outer label with unique sequence numbers, then described device 506 can also will be stored in the network equipment Unique sequence numbers push to the reading equipment.
In one embodiment, the network equipment further includes that device 507(is not shown) and device 508(be not shown), Wherein, described device 507 is used to the information to be verified corresponding to the commodity RF tag is written, wherein it is described to Verification information includes user password set by the user;Described device 508 for obtaining transmitted by the reading equipment, The verification result of the information to be verified;Described device 506 is used for according to the network equipment to the user password and institute The verification result for stating chip features information and the reading equipment will test the verification result of the information to be verified with described The relevant information of the corresponding commodity of card result is sent to the reading equipment.
Specifically, described device 507 writes information to be verified corresponding to the commodity directly or by read-write card apparatus Enter the chip of the RF tag.Here, described device 507 or read-write card apparatus can first read the RF tag, to obtain The parameters such as chip format, communication protocol, the chip UID of the RF tag;Then, it is based on above-mentioned parameter, by required write-in Information, the user password set by the user be written to as described in RF tag.In one embodiment, described to be tested Card information can also include the merchandise news of such as described commodity.
In one embodiment, the information to be verified further includes additional feature information, i.e. described device 507 or the reading Other additional feature informations can also be written in the RF tag by card writer.The network equipment can also will be described In additional feature information storage and the network equipment.The additional feature information includes that end is not limited to feature code, feature letter Breath etc..Herein, it is preferable that the additional feature information can be written based on any one algorithm.
In one embodiment, the read-write card apparatus can be the mobile device with read-write card function, such as utilize hand Machine, to realize read-write by the APP on mobile phone;In another embodiment, the read-write card apparatus, which can be, does not have read-write The combination of the equipment (such as pc client) of card function and the peripheral hardware (such as PC card reader/writer) with read-write card function does not have and reads Writing can carry out between the equipment of card function and the peripheral hardware with read-write card function for example, by forms such as ActiveX webpage controls Connection, for example, by ActiveX webpage control, controlling PC card reader/writer from the particular webpage on pc client and being written and read.
Described device 508 obtains the reading equipment to the verification result of the information to be verified.Here, the verifying knot Fruit includes that the verification result of the information to be verified is unverified by the verification result of verifying or the information to be verified.
Then, described device 506 is according to the network equipment to the user password and the chip features information Verification result and the equipment that reads final verification result is determined to the verification result of the information to be verified, and will The relevant information of the commodity corresponding with the verification result is sent to the reading equipment.
For example, if the verification result of the network equipment end or any one for reading equipment end is " not by testing Card ", then the network equipment provides the information of " can not pass through verifying " to the reading equipment end;
For example, if when the network equipment end and the reading equipment end pass through verifying, the network equipment to The reading equipment end provides the information such as " certified products " or " passing through fake certification ", and the merchandise news of the commodity is pushed to described Read equipment.
Fig. 6 shows a kind of reading of user's interactive mode Internet of Things verifying based on RF tag according to the application one embodiment Take the structural schematic diagram of equipment.Wherein, the reading equipment 60 includes device 601, device 602 and device 603.
Specifically, described device 601 is used to read RF tag and obtains the chip features information of the RF tag, and Based on the reading to the RF tag, interacted with the user to obtain the user password of user's input, Wherein, to be the user set in order goods or is quotient ordered by the user as the network equipment for the user password Product are set and are sent to the user by the network equipment, and the chip features information includes chip UID, the radio frequency mark Label are attached on the commodity;
The chip features of the user password and the RF tag that described device 602 is used to input the user Information is sent to the network equipment;
Described device 603 for obtaining transmitted by the network equipment, it is special with the user password and the chip The relevant information of the corresponding commodity of verification result of reference breath.
Above-mentioned apparatus is specifically described below.
When the user receives the commodity, the described device 601 of reading equipment corresponding to the user reads institute It states RF tag and obtains the chip features information of the RF tag, and based on the reading to the RF tag, and it is described User interacts to obtain the user password of user's input.
Specifically, when the user receives the commodity, the corresponding dress for reading equipment is can be used in the user 601 pairs of RF tags are set to be scanned;After scanning the RF tag, described device 601 for reading equipment The user is requested to input the user password according to the scanning information.Here, the request can be the reading equipment voluntarily The input of transmission is requested;It is also possible to the reading equipment and after the service equipment interacts, obtains the service equipment institute The request of transmission, and request the user to input user password in the reading equipment based on the request.
For example, the reading equipment can pop up input frame to require the user to input user password.
Meanwhile when the reading equipment is read out the RF tag, the reading equipment can obtain described The chip features information of RF tag.
In one embodiment, the chip features information further includes the firmware parameters information of the chip.Specifically, institute State firmware parameters information include but is not limited to tag types, version, format, used technology, communication protocol relevant parameter (such as ATQA: the rank having for judging UID, SAK: for the response to anti-collision and card selection), memory information, vendor code etc. one Item is multinomial, and firmware parameters information possessed by different types of radio frequency chip is different, can be using wherein at least in the application Any one is as reading/record firmware parameters information, by firmware parameters information also as one of the information verified.? This, the application be for the processing mode of the firmware parameters information it is same or similar with the processing mode of chip UID, herein not It repeats again.
Described device 602 is used for close by encryption or non-encrypted communication mode, the user that the user is inputted The chip features information of code and the RF tag is sent to the network equipment.
Described device 603 for obtaining transmitted by the network equipment, it is special with the user password and the chip The relevant information of the corresponding commodity of verification result of reference breath.
Here, different verification results corresponds to the relevant information of different commodity;
For example, that is, described read chip features information of reading equipment is simultaneously if the chip features information can not match It is not recorded in the network equipment, then it is " non-this system card " or " can not pass through verifying " that described device 603, which is got, Etc. information.
If if the chip features information matches but the user password can not match or the chip features information and institute It states user password to mismatch, then it is information such as " can not pass through verifying " that described device 603, which is got,.
If the chip features information is matched with the user password, it is " certified products " that described device 603, which is got, Or information such as " passing through fake certification ", it is preferable that the merchandise news of the commodity can also be obtained.Preferably, if the radio frequency Covering is pasted with the frangible outer label with unique sequence numbers on label, then described device 603 can also obtain the network and set Unique sequence numbers in the standby transmitted network equipment.
In one embodiment, the reading equipment further includes that device 604(is not shown) and device 605(be not shown). Wherein, described device 601 is used to read RF tag and obtains the chip features information and the network equipment of the RF tag The information to be verified being written in the RF tag, and based on the reading to the RF tag, it is carried out with the user Interaction is to obtain the user password that the user inputs, wherein the information to be verified includes the user password;
Whether the user password that described device 604 is used to verify user's input is written with the network equipment Information to be verified in the device that matches of user password;
Described device 605 is used to for the verification result of the information to be verified being sent to the device of the network equipment;
Described device 603 for obtaining transmitted by the network equipment, it is special with the user password and the chip The verification result of reference breath and the reading equipment are to the corresponding commodity of the verification result of the information to be verified Relevant information.
Specifically, described device 601 is when reading RF tag, at the same read the network equipment be written it is to be verified Information, the information to be verified include user password set by the user.In one embodiment, the information to be verified It can also include the merchandise news of such as described commodity;In one embodiment, the information to be verified further includes supplementary features Information, the additional feature information include that end is not limited to feature code, characteristic information etc..
The user password that described device 604 is inputted according to the user, the user password and the network equipment are write The user password in information to be verified entered matches, to verify in the reading equipment end to the user password.? In a kind of embodiment, if the user password is unverified, mentioning for " verifying not passing through " directly can be provided to the user Show;Further, it is described read equipment no longer to the network equipment send the user password that the user inputs and The chip features information of the RF tag, the verification process have terminated.
The verification result of the information to be verified is sent to the network equipment by described device 605.Here, the verifying As a result the verification result including the information to be verified is unverified by the verification result of verifying or the information to be verified.
The relevant information of the commodity acquired in described device 603 and the network equipment to the user password with And the chip features information verification result and the reading equipment it is corresponding to the verification result of the information to be verified.
For example, if the network equipment or the verification result of any one for reading equipment are " unverified ", The network equipment provides the information of " can not pass through verifying " to the reading equipment;
For example, if when the network equipment and the reading equipment pass through verifying, the network equipment is to described It reads equipment and the information such as " certified products " or " passing through fake certification " is provided, and the merchandise news of the commodity is pushed to the reading and is set It is standby.
Fig. 7 shows the exemplary system that can be used for implementing each embodiment described herein.
In some embodiments, system 700 can be as Fig. 1, Fig. 2, Fig. 3 (a), Fig. 3 (b), Fig. 4 (a), Fig. 4 (b), figure 5, any one remote computing device in embodiment shown in fig. 6 or other described embodiments.In some embodiments, system 700 may include one or more computer-readable mediums (for example, system storage or NVM/ storage equipment 720) with instruction And it is coupled with the one or more computer-readable medium and is configured as executing instruction to realize module thereby executing this Shen Please described in movement one or more processors (for example, (one or more) processor 705).
For one embodiment, system control module 710 may include any suitable interface controller, with to (one or It is multiple) at least one of processor 705 and/or any suitable equipment or component that communicate with system control module 710 mentions For any suitable interface.
System control module 710 may include Memory Controller module 730, to provide interface to system storage 715. Memory Controller module 730 can be hardware module, software module and/or firmware module.
System storage 715 can be used for for example, load of system 700 and storing data and/or instruction.For a reality Example is applied, system storage 715 may include any suitable volatile memory, for example, DRAM appropriate.In some embodiments In, system storage 715 may include four Synchronous Dynamic Random Access Memory of Double Data Rate type (DDR4SDRAM).
For one embodiment, system control module 710 may include one or more input/output (I/O) controller, To store equipment 720 and the offer interface of (one or more) communication interface 725 to NVM/.
For example, NVM/ storage equipment 720 can be used for storing data and/or instruction.NVM/ storage equipment 720 may include appointing It anticipates nonvolatile memory appropriate (for example, flash memory) and/or to may include that any suitable (one or more) is non-volatile deposit Equipment is stored up (for example, one or more hard disk drives (HDD), one or more CD (CD) drivers and/or one or more Digital versatile disc (DVD) driver).
NVM/ storage equipment 720 may include a part for the equipment being physically mounted on as system 700 Storage resource or its can by the equipment access without a part as the equipment.For example, NVM/ storage equipment 720 can It is accessed by network via (one or more) communication interface 725.
(one or more) communication interface 725 can be provided for system 700 interface with by one or more networks and/or with Other any equipment communications appropriate.System 700 can be according to any in one or more wireless network standards and/or agreement Standard and/or agreement are carried out wireless communication with the one or more components of wireless network.
For one embodiment, at least one of (one or more) processor 705 can be with system control module 710 The logic of one or more controllers (for example, Memory Controller module 730) is packaged together.For one embodiment, (one It is a or multiple) at least one of processor 705 can encapsulate with the logic of one or more controllers of system control module 710 Together to form system in package (SiP).For one embodiment, at least one of (one or more) processor 705 It can be integrated on same mold with the logic of one or more controllers of system control module 710.For one embodiment, At least one of (one or more) processor 705 can be with the logic of one or more controllers of system control module 710 It is integrated on same mold to form system on chip (SoC).
In various embodiments, system 700 can be, but not limited to be: server, work station, desk-top calculating equipment or shifting It is dynamic to calculate equipment (for example, lap-top computing devices, handheld computing device, tablet computer, net book etc.).In each embodiment In, system 700 can have more or fewer components and/or different frameworks.For example, in some embodiments, system 700 is wrapped Include one or more video cameras, keyboard, liquid crystal display (LCD) screen (including touch screen displays), nonvolatile memory end Mouth, mutiple antennas, graphic chips, specific integrated circuit (ASIC) and loudspeaker.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies Within, then the application is also intended to include these modifications and variations.
It should be noted that the application can be carried out in the assembly of software and/or software and hardware, for example, can adopt With specific integrated circuit (ASIC), general purpose computer or any other realized similar to hardware device.In one embodiment In, the software program of the application can be executed to implement the above steps or functions by processor.Similarly, the application Software program (including relevant data structure) can be stored in computer readable recording medium, for example, RAM memory, Magnetic or optical driver or floppy disc and similar devices.In addition, hardware can be used to realize in some steps or function of the application, example Such as, as the circuit cooperated with processor thereby executing each step or function.
In addition, a part of the application can be applied to computer program product, such as computer program instructions, when its quilt When computer executes, by the operation of the computer, it can call or provide according to the present processes and/or technical solution. Those skilled in the art will be understood that the existence form of computer program instructions in computer-readable medium includes but is not limited to Source file, executable file, installation package file etc., correspondingly, the mode that computer program instructions are computer-executed include but Be not limited to: the computer directly execute the instruction or the computer compile the instruction after execute program after corresponding compiling again, Perhaps the computer reads and executes the instruction or after the computer reads and install and execute corresponding installation again after the instruction Program.Here, computer-readable medium can be for computer access any available computer readable storage medium or Communication media.
Communication media includes whereby including, for example, computer readable instructions, data structure, program module or other data Signal of communication is transmitted to the medium of another system from a system.Communication media may include having the transmission medium led (such as electric Cable and line (for example, optical fiber, coaxial etc.)) and can propagate wireless (not having the transmission the led) medium of energy wave, such as sound, electricity Magnetic, RF, microwave and infrared.Computer readable instructions, data structure, program module or other data can be embodied as example wireless Medium (such as carrier wave or be such as embodied as spread spectrum technique a part similar mechanism) in modulated message signal. Term " modulated message signal " refers to that one or more feature is modified or is set in a manner of encoded information in the signal Fixed signal.Modulation can be simulation, digital or Hybrid Modulation Technology.
As an example, not a limit, computer readable storage medium may include such as computer-readable finger for storage Enable, the volatile and non-volatile that any method or technique of the information of data structure, program module or other data is realized, can Mobile and immovable medium.For example, computer readable storage medium includes, but are not limited to volatile memory, such as with Machine memory (RAM, DRAM, SRAM);And nonvolatile memory, such as flash memory, various read-only memory (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memory (MRAM, FeRAM);And magnetic and optical storage is set Standby (hard disk, tape, CD, DVD);Or capable of storing for other currently known media or Future Development uses for computer system Computer-readable information/data.
Here, including a device according to one embodiment of the application, which includes for storing computer program The memory of instruction and processor for executing program instructions, wherein when the computer program instructions are executed by the processor When, trigger method and/or technology scheme of the device operation based on aforementioned multiple embodiments according to the application.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned exemplary embodiment, Er Qie In the case where without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and scope of the present application is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included in the application.Any reference signs in the claims should not be construed as limiting the involved claims.This Outside, it is clear that one word of " comprising " does not exclude other units or steps, and odd number is not excluded for plural number.The meaning of " plurality " is two or more It is more, unless otherwise specifically defined.The multiple units or device stated in device claim can also be by a units Or device is implemented through software or hardware.The first, the second equal words are used to indicate names, and are not offered as any specific Sequentially.
The various aspects of each embodiment are defined in detail in the claims.Each reality is defined in following number clause Apply these and other aspects of example:
1. a kind of method of user's interactive mode Internet of Things verifying based on RF tag, wherein method includes the following steps:
The network equipment obtains one or more user passwords, wherein one or more of user passwords correspond to described One or more commodity ordered by user;
The network equipment obtains the chip features information of one or more RF tags, wherein the chip features letter Breath includes chip UID, and one or more of RF tags correspond respectively to one or more of commodity;
The network equipment record among the network devices user password corresponding to the commodity, the commodity institute it is right The merchandise news of the chip features information and the commodity answered, wherein the RF tag is attached to the commodity On;
When the user receives the commodity, reading equipment corresponding to the user reads the RF tag and obtains Take the chip features information of the RF tag, and based on the reading to the RF tag, with the user interact with Obtain the user password of user's input;
The chip features letter for reading the user password and the RF tag that equipment inputs the user Breath is sent to the network equipment;
The network equipment verifies the chip features information and the user password;
According to the user password and the verification result of the chip features information, the network equipment will be tested with described The relevant information of the corresponding commodity of card result is sent to the reading equipment.
2. according to method described in clause 1, wherein the network equipment obtains the step of one or more user passwords and includes:
The network equipment obtains one or more user passwords set by user, wherein one or more of users are close Code corresponds to one or more commodity ordered by the user.
3. according to method described in clause 1, wherein the network equipment obtains the step of one or more user passwords and includes:
The network equipment determines one or more user passwords, wherein one or more of user passwords correspond to described One or more commodity ordered by user;
Wherein, this method further include:
One or more of user passwords are sent to user corresponding with the commodity by the network equipment.
4. the method according to any one of clause 1 to 3, wherein the chip for obtaining one or more RF tags is special Reference cease the step of include:
The network equipment reads the chip features information of one or more RF tags, wherein the chip features letter Breath includes chip UID, and the RF tag corresponds to the commodity.
5. the method according to any one of clause 1 to 3, wherein the chip for obtaining one or more RF tags is special Reference cease the step of include:
The network equipment provides the chip features information that RF tag is obtained from device from chip features, wherein described Chip features information includes chip UID, and the RF tag corresponds to the commodity.
6. according to method described in clause 5, wherein the step of obtaining the chip features information of one or more RF tags Include:
Network equipment commodity according to ordered by the user are provided from chip features corresponding with the commodity The chip features information of corresponding with commodity RF tag is obtained at device, wherein the chip features information includes Chip UID.
7. according to method described in clause 5, wherein this method further include:
The network equipment provides the core that one or more RF tags are obtained from device from one or more chips feature Piece characteristic information, wherein the chip features information includes chip UID, and each RF tag corresponds to one or more commodity;
Wherein, the step of chip features information of the one or more RF tags of acquisition includes:
Network equipment commodity according to ordered by the user, from the core of acquired one or more RF tags Chip features information corresponding with the commodity is selected in piece characteristic information.
8. the method according to any one of clause 1 to 7, wherein the chip features information further includes the chip Firmware parameters information.
9. the method according to any one of clause 1 to 8, wherein this method further include:
The RF tag is written in information to be verified corresponding to the commodity by the network equipment, wherein it is described to Verification information includes the user password;
Wherein, reading equipment corresponding to the user reads the RF tag and obtains the chip of the RF tag Characteristic information, and based on the reading to the RF tag, it is interacted with the user to obtain the institute of user's input The step of stating user password include:
When the user receives the commodity, reading equipment corresponding to the user reads the RF tag and obtains Take the chip features information of the RF tag and information to be verified that the network equipment is written, and based on penetrating to described The reading of frequency marking label is interacted with the user to obtain the user password of user's input;
Wherein, this method further include:
What whether the user password of the input of user described in the reading device authentication was written with the network equipment User password in information to be verified matches;
The verification result of the information to be verified is sent to the network equipment by the reading equipment;
Wherein, the relevant information of the commodity corresponding with the verification result is sent to described by the network equipment Read equipment the step of include:
According to the network equipment to the verification result of the user password and the chip features information and described Equipment is read to the verification result of the information to be verified, the network equipment will the quotient corresponding with the verification result The relevant information of product is sent to the reading equipment.
10. according to method described in clause 9, wherein the information to be verified further includes additional feature information.
11. the method according to any one of clause 1 to 10, wherein the network equipment is among the network devices The step of being recorded include:
The network equipment user password, the quotient corresponding to commodity described in scrambled record among the network devices The chip features information and the merchandise news of the commodity, the RF tag corresponding to product are attached to the commodity On.
12. the method according to any one of clause 1 to 11, wherein the RF tag is based on built-in or stickup Mode is attached on the commodity.
13. a kind of method of user's interactive mode Internet of Things verifying based on RF tag, wherein this method includes following step It is rapid:
The network equipment obtains one or more user passwords, wherein one or more of user passwords correspond to described One or more commodity ordered by user;
The network equipment obtains the chip features information of one or more RF tags, wherein the chip features letter Breath includes chip UID, and one or more of RF tags correspond respectively to one or more of commodity;
The network equipment record among the network devices user password corresponding to the commodity, the commodity institute it is right The merchandise news of the chip features information and the commodity answered, wherein the RF tag is attached to the commodity On;
The RF tag is written in information to be verified corresponding to the commodity by the network equipment, wherein it is described to Verification information includes the user password;
When the user receives the commodity, reading equipment corresponding to the user reads the RF tag and obtains Take the chip features information of the RF tag and information to be verified that the network equipment is written, and based on penetrating to described The reading of frequency marking label is interacted with the user to obtain the user password of user's input;
What whether the user password of the input of user described in the reading device authentication was written with the network equipment User password in information to be verified matches;
If it is described read device authentication described in user input the user password and the network equipment be written to Verification information does not match that then the reading equipment determines that merchandise related information corresponding with the commodity determines the radio frequency Label is not through verifying;
If it is described read device authentication described in user input the user password and the network equipment be written to Verification information matches, then the core for reading the user password and the RF tag that equipment inputs the user Piece characteristic information is sent to the network equipment;And the network equipment verifies the chip features information and the user Password, and according to the user password and the verification result of the chip features information, it will be corresponding with the verification result The relevant informations of the commodity be sent to the reading equipment.
14. according to method described in clause 13, wherein the network equipment obtains the step of one or more user passwords and wraps It includes:
The network equipment obtains one or more user passwords set by user, wherein one or more of users are close Code corresponds to one or more commodity ordered by the user.
15. according to method described in clause 13, wherein the network equipment obtains the step of one or more user passwords and wraps It includes:
The network equipment determines one or more user passwords, wherein one or more of user passwords correspond to described One or more commodity ordered by user;
Wherein, this method further include:
One or more of user passwords are sent to user corresponding with the commodity by the network equipment.
16. the method according to any one of clause 13 to 15, wherein obtain the core of one or more RF tags The step of piece characteristic information includes:
The network equipment reads the chip features information of one or more RF tags, wherein the chip features letter Breath includes chip UID, and the RF tag corresponds to the commodity.
17. the method according to any one of clause 13 to 15, wherein obtain the core of one or more RF tags The step of piece characteristic information includes:
The network equipment provides the chip features information that RF tag is obtained from device from chip features, wherein described Chip features information includes chip UID, and the RF tag corresponds to the commodity.
18. according to method described in clause 17, wherein obtain the step of the chip features information of one or more RF tags Suddenly include:
Network equipment commodity according to ordered by the user are provided from chip features corresponding with the commodity The chip features information of corresponding with commodity RF tag is obtained at device, wherein the chip features information includes Chip UID.
19. according to method described in clause 17, wherein this method further include:
The network equipment provides the core that one or more RF tags are obtained from device from one or more chips feature Piece characteristic information, wherein the chip features information includes chip UID, and each RF tag corresponds to one or more commodity;
Wherein, the step of chip features information of the one or more RF tags of acquisition includes:
Network equipment commodity according to ordered by the user, from the core of acquired one or more RF tags Chip features information corresponding with the commodity is selected in piece characteristic information.
20. the method according to any one of clause 13 to 19, wherein the chip features information further includes described The firmware parameters information of chip.
21. the method according to any one of clause 13 to 20, wherein the information to be verified further includes additional spy Reference breath.
22. the method according to any one of clause 13 to 21, wherein the network equipment is in the network equipment In the step of being recorded include:
The network equipment user password, the commodity corresponding to commodity described in scrambled record among the network devices The merchandise news of corresponding the chip features information and the commodity, the RF tag are attached to the commodity On.
23. the method according to any one of clause 13 to 22, wherein the RF tag is based on built-in or pastes Mode be attached on the commodity.
24. a kind of network equipment of user's interactive mode Internet of Things verifying based on RF tag, wherein the network equipment Include:
For obtaining the device of one or more user passwords, wherein one or more of user passwords correspond to institute State one or more commodity ordered by user;
For obtaining the device of the chip features information of one or more RF tags, wherein the chip features information Including chip UID, one or more of RF tags correspond respectively to one or more of commodity;
Described in being recorded corresponding to user password corresponding to the commodity, the commodity among the network devices The device of chip features information and the merchandise news of the commodity, wherein the RF tag is attached on the commodity;
For obtaining the chip features information for reading the read RF tag of equipment and the user described Read the device of the user password inputted in equipment;
For verifying the device of the chip features information and the user password;
It, will be with the verification result phase for the verification result according to the user password and the chip features information The relevant information of the corresponding commodity is sent to the device for reading equipment.
25. according to the network equipment described in clause 24, wherein the device for obtaining one or more user passwords is used In:
Obtain one or more user passwords set by user, wherein one or more of user passwords correspond to One or more commodity ordered by the user.
26. according to the network equipment described in clause 24, wherein the device for obtaining one or more user passwords is used In:
Determine one or more user password, wherein one or more of user passwords correspond to ordered by the user One or more commodity of purchase;
Wherein, the network equipment further include:
For one or more of user passwords to be sent to the device of user corresponding with the commodity.
27. the network equipment according to any one of clause 24 to 26, wherein for obtaining one or more radio frequencies The device of the chip features information of label is used for:
Read the chip features information of one or more RF tags, wherein the chip features information includes chip UID, the RF tag correspond to the commodity.
28. the network equipment according to any one of clause 24 to 26, wherein for obtaining one or more radio frequencies The device of the chip features information of label is used for:
The chip features information that RF tag is obtained from device is provided from chip features, wherein the chip features information Including chip UID, the RF tag corresponds to the commodity.
29. according to the network equipment described in clause 28, wherein for obtaining the chip features of one or more RF tags The device of information is used for:
According to commodity ordered by the user, provided from chip features corresponding with the commodity obtained from device with The chip features information of the corresponding RF tag of the commodity, wherein the chip features information includes chip UID.
30. according to the network equipment described in clause 28, wherein the network equipment further include:
For providing the chip features letter for obtaining one or more RF tags from device from one or more chips feature The device of breath, wherein the chip features information includes chip UID, and each RF tag corresponds to one or more commodity;
Wherein, it is used for for obtaining the device of the chip features information of one or more RF tags:
According to commodity ordered by the user, from the chip features information of acquired one or more RF tags Select chip features information corresponding with the commodity.
31. the network equipment according to any one of clause 24 to 30, wherein the chip features information further includes The firmware parameters information of the chip.
32. the network equipment according to any one of clause 24 to 31, wherein the network equipment further include:
For information to be verified corresponding to the commodity to be written to the device of the RF tag, wherein described to be tested Demonstrate,proving information includes the user password;
For obtaining transmitted by the reading equipment, the device of the verification result of the information to be verified;
Wherein, for the relevant information of the commodity corresponding with the verification result to be sent to the reading equipment Device be used for:
According to the network equipment to the verification result of the user password and the chip features information and described Equipment is read to the verification result of the information to be verified, by the relevant information of the commodity corresponding with the verification result It is sent to the reading equipment.
33. according to the network equipment described in clause 32, wherein the information to be verified further includes additional feature information.
34. the network equipment according to any one of clause 24 to 33, wherein for remembering among the network devices Record the commodity of the chip features information and the commodity corresponding to user password corresponding to the commodity, the commodity The device of information is used for:
It is described corresponding to user password, the commodity corresponding to commodity described in scrambled record among the network devices The merchandise news of chip features information and the commodity, the RF tag are attached on the commodity.
35. the network equipment according to any one of clause 24 to 24, wherein the RF tag be based on it is built-in or The mode of stickup is attached on the commodity.
36. a kind of reading equipment of user's interactive mode Internet of Things verifying based on RF tag, wherein the reading equipment Include:
For reading RF tag and obtaining the chip features information of the RF tag, and based on to the RF tag Reading, interacted with the user to obtain the device of the user password of user input, wherein the user Password to be the user set in order goods or as the network equipment be set by commodity ordered by the user and by The network equipment is sent to the user, and the chip features information includes chip UID, and the RF tag is attached to institute It states on commodity;
The chip features information of the user password and the RF tag for inputting the user is sent to The device of the network equipment;
For obtaining the verifying transmitted by the network equipment, with the user password and the chip features information As a result the device of the relevant information of the corresponding commodity.
37. according to reading equipment described in clause 36, wherein the chip features information further includes consolidating for the chip Part parameter information.
38. the reading equipment according to clause 36 or 37, wherein for reading RF tag and obtaining the radio frequency The chip features information of label, and based on the reading to the RF tag, it is interacted with the user to obtain the use The device of the user password of family input is used for:
Read RF tag and obtain the RF tag chip features information and the network equipment in the radio frequency mark The information to be verified being written in label, and based on the reading to the RF tag, it interacts with the user to obtain State the user password of user's input, wherein the information to be verified includes the user password;
Wherein, the reading equipment further include:
The letter to be verified whether user password for verifying user's input is written with the network equipment The device that user password in breath matches;
For the verification result of the information to be verified to be sent to the device of the network equipment;
Wherein, for obtaining transmitted by the network equipment, with the user password and the chip features information The devices of relevant information of the corresponding commodity of verification result be used for:
Obtain the verification result transmitted by the network equipment, with the user password and the chip features information And the equipment that reads is to the relevant information of the corresponding commodity of the verification result of the information to be verified.
39. a kind of system of user's interactive mode Internet of Things verifying based on RF tag, wherein the system comprises such as items The network equipment described in any one of money 24 to 35, and the reading equipment as described in any one of clause 36 to 38.
40. according to system described in clause 39, wherein the system also includes one or more RF tags.
41. according to system described in clause 40, wherein the system also includes frangible outer label, the frangible outer label It is capped to be pasted on the RF tag, and the frangible external standard is signed with unique sequence numbers;
Wherein, the network equipment further include:
For storing the device with the unique sequence numbers corresponding to the RF tag,
It, will be with the radio frequency for after the network equipment verifies the chip features information and the user password The corresponding unique sequence numbers of label are sent to the device for reading equipment.
42. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has meter Calculation machine readable instruction, when the computer-readable instruction is executed by one or more equipment, so that the equipment executes such as item Method described in any one of money 1 to 23.
43. a kind of system of user's interactive mode Internet of Things verifying based on RF tag, which is characterized in that the system packet Memory and processor are included, is stored with computer-readable instruction in the memory, when the computer-readable instruction is described When processor executes, the processor executes the method as described in any one of clause 1 to 23.

Claims (33)

1. a kind of method of user's interactive mode Internet of Things verifying based on RF tag, wherein method includes the following steps:
The network equipment obtains one or more user passwords, wherein one or more of user passwords correspond to the user Ordered one or more commodity;
The network equipment obtains the chip features information of one or more RF tags, wherein the chip features packet Chip UID is included, one or more of RF tags correspond respectively to one or more of commodity;
The network equipment is recorded among the network devices corresponding to user password corresponding to the commodity, the commodity The merchandise news of the chip features information and the commodity, wherein the RF tag is attached on the commodity;
The RF tag is written in information to be verified corresponding to the commodity by the network equipment, wherein described to be verified Information includes the user password;
When the user receives the commodity, reading equipment corresponding to the user reads the RF tag and obtains institute The information to be verified that the chip features information and the network equipment for stating RF tag are written, and based on to the radio frequency mark The reading of label is interacted with the user to obtain the user password of user's input;
It is to be tested whether the user password of the input of user described in the reading device authentication is written with the network equipment User password in card information matches;The user password, the radio frequency mark for reading equipment and inputting the user The verification result of the chip features information of label and the information to be verified is sent to the network equipment;
The network equipment verifies the chip features information and the user password;
Verification result and the reading according to the network equipment to the user password and the chip features information Equipment is to the verification result of the information to be verified, and the network equipment is by the commodity corresponding with the verification result Relevant information is sent to the reading equipment.
2. according to the method described in claim 1, wherein, the step of network equipment obtains one or more user passwords, includes:
The network equipment obtains one or more user passwords set by user, wherein one or more of user passwords pair One or more commodity ordered by user described in Ying Yu.
3. according to the method described in claim 1, wherein, the step of network equipment obtains one or more user passwords, includes:
The network equipment determines one or more user passwords, wherein one or more of user passwords correspond to the user Ordered one or more commodity;
Wherein, this method further include:
One or more of user passwords are sent to user corresponding with the commodity by the network equipment.
4. according to the method described in claim 1, wherein, the step of obtaining the chip features information of one or more RF tags Include:
The network equipment reads the chip features information of one or more RF tags, wherein the chip features packet Chip UID is included, the RF tag corresponds to the commodity.
5. according to the method described in claim 1, wherein, the step of obtaining the chip features information of one or more RF tags Include:
The network equipment provides the chip features information that RF tag is obtained from device from chip features, wherein the chip Characteristic information includes chip UID, and the RF tag corresponds to the commodity.
6. according to the method described in claim 5, wherein, the step of obtaining the chip features information of one or more RF tags Include:
Network equipment commodity according to ordered by the user provide device from chip features corresponding with the commodity Place obtains the chip features information of RF tag corresponding with the commodity, wherein the chip features information includes chip UID。
7. according to the method described in claim 5, wherein, this method further include:
The network equipment provides the chip spy that one or more RF tags are obtained from device from one or more chips feature Reference breath, wherein the chip features information includes chip UID, and each RF tag corresponds to one or more commodity;
Wherein, the step of chip features information of the one or more RF tags of acquisition includes:
Network equipment commodity according to ordered by the user, it is special from the chip of acquired one or more RF tags Selection chip features information corresponding with the commodity in reference breath.
8. method according to any one of claim 1 to 7, wherein the chip features information further includes the chip Firmware parameters information.
9. according to the method described in claim 1, wherein, the information to be verified further includes additional feature information.
10. method according to any one of claim 1 to 7, wherein the network equipment among the network devices into Row record the step of include:
User password, commodity institute corresponding to commodity described in scrambled record are right among the network devices for the network equipment The merchandise news of the chip features information and the commodity answered, the RF tag are attached on the commodity.
11. method according to any one of claim 1 to 7, wherein the RF tag is based on side that is built-in or pasting Formula is attached on the commodity.
12. a kind of method of user's interactive mode Internet of Things verifying based on RF tag, wherein method includes the following steps:
The network equipment obtains one or more user passwords, wherein one or more of user passwords correspond to the user Ordered one or more commodity;
The network equipment obtains the chip features information of one or more RF tags, wherein the chip features packet Chip UID is included, one or more of RF tags correspond respectively to one or more of commodity;
The network equipment is recorded among the network devices corresponding to user password corresponding to the commodity, the commodity The merchandise news of the chip features information and the commodity, wherein the RF tag is attached on the commodity;
The RF tag is written in information to be verified corresponding to the commodity by the network equipment, wherein described to be verified Information includes the user password;
When the user receives the commodity, reading equipment corresponding to the user reads the RF tag and obtains institute The information to be verified that the chip features information and the network equipment for stating RF tag are written, and based on to the radio frequency mark The reading of label is interacted with the user to obtain the user password of user's input;
It is to be tested whether the user password of the input of user described in the reading device authentication is written with the network equipment User password in card information matches;
If the user password for reading the input of user described in device authentication is written to be verified with the network equipment Information does not match that then the reading equipment determines that the RF tag is not through verifying;
If the user password for reading the input of user described in device authentication is written to be verified with the network equipment Information matches, then the chip for reading the user password and the RF tag that equipment inputs the user is special Reference breath is sent to the network equipment;And the network equipment verifies the chip features information and the user password, It, will be corresponding with the verification result described and according to the user password and the verification result of the chip features information The relevant information of commodity is sent to the reading equipment.
13. according to the method for claim 12, wherein the network equipment obtains the step of one or more user passwords and wraps It includes:
The network equipment obtains one or more user passwords set by user, wherein one or more of user passwords pair One or more commodity ordered by user described in Ying Yu.
14. according to the method for claim 12, wherein the network equipment obtains the step of one or more user passwords and wraps It includes:
The network equipment determines one or more user passwords, wherein one or more of user passwords correspond to the user Ordered one or more commodity;
Wherein, this method further include:
One or more of user passwords are sent to user corresponding with the commodity by the network equipment.
15. method described in any one of 2 to 14 according to claim 1, wherein the information to be verified further includes supplementary features Information.
16. a kind of network equipment of user's interactive mode Internet of Things verifying based on RF tag, wherein the network equipment includes:
For obtaining the device of one or more user passwords, wherein one or more of user passwords correspond to the use One or more commodity ordered by family;
For obtaining the device of the chip features information of one or more RF tags, wherein the chip features information includes Chip UID, one or more of RF tags correspond respectively to one or more of commodity;
For recording the chip corresponding to user password corresponding to the commodity, the commodity among the network devices The device of the merchandise news of characteristic information and the commodity, wherein the RF tag is attached on the commodity;
For information to be verified corresponding to the commodity to be written to the device of the RF tag, wherein the letter to be verified Breath includes the user password;
For obtaining the chip features information for reading the read RF tag of equipment and the user in the reading The device of the user password inputted in equipment;
For obtaining transmitted by the reading equipment, the device of the verification result of the information to be verified;
For verifying the device of the chip features information and the user password;
For according to the network equipment to the verification result of the user password and the chip features information and described Equipment is read to the verification result of the information to be verified, by the relevant information of the commodity corresponding with the verification result It is sent to the device for reading equipment.
17. the network equipment according to claim 16, wherein the device for obtaining one or more user passwords is used In:
Obtain one or more user passwords set by user, wherein one or more of user passwords correspond to described One or more commodity ordered by user.
18. the network equipment according to claim 16, wherein the device for obtaining one or more user passwords is used In:
Determine one or more user password, wherein one or more of user passwords correspond to ordered by the user One or more commodity;
Wherein, the network equipment further include:
For one or more of user passwords to be sent to the device of user corresponding with the commodity.
19. the network equipment according to claim 16, wherein for obtaining the chip features of one or more RF tags The device of information is used for:
Read the chip features information of one or more RF tags, wherein the chip features information includes chip UID, institute RF tag is stated corresponding to the commodity.
20. the network equipment according to claim 16, wherein for obtaining the chip features of one or more RF tags The device of information is used for:
The chip features information that RF tag is obtained from device is provided from chip features, wherein the chip features information includes Chip UID, the RF tag correspond to the commodity.
21. the network equipment according to claim 20, wherein for obtaining the chip features of one or more RF tags The device of information is used for:
According to commodity ordered by the user, provide device from chip features corresponding with the commodity from obtain with it is described The chip features information of the corresponding RF tag of commodity, wherein the chip features information includes chip UID.
22. the network equipment according to claim 20, wherein the network equipment further include:
For providing the chip features information of acquisition one or more RF tags from device from one or more chips feature Device, wherein the chip features information includes chip UID, and each RF tag corresponds to one or more commodity;
Wherein, it is used for for obtaining the device of the chip features information of one or more RF tags:
According to commodity ordered by the user, selected from the chip features information of acquired one or more RF tags Chip features information corresponding with the commodity.
23. the network equipment described in any one of 6 to 22 according to claim 1, wherein the chip features information further includes institute State the firmware parameters information of chip.
24. the network equipment according to claim 16, wherein the information to be verified further includes additional feature information.
25. the network equipment described in any one of 6 to 22 according to claim 1, wherein for recording among the network devices User password corresponding to the commodity, the letter of the commodity of the chip features information and the commodity corresponding to the commodity The device of breath is used for:
The chip corresponding to user password, the commodity corresponding to commodity described in scrambled record among the network devices The merchandise news of characteristic information and the commodity, the RF tag are attached on the commodity.
26. 6 to 22 described in any item network equipments according to claim 1, wherein the RF tag is based on built-in or pastes Mode be attached on the commodity.
27. a kind of reading equipment of user's interactive mode Internet of Things verifying based on RF tag, wherein the reading equipment includes:
Chip features information and the network equipment for reading RF tag and obtaining the RF tag is in the radio frequency mark The information to be verified being written in label, and based on the reading to the RF tag, it interacts with the user to obtain State the device of the user password of user's input, wherein the user password is that the user is set in order goods It or as the network equipment is to be sent to the user, the core ordered by the user set by commodity and by the network equipment Piece characteristic information includes chip UID, and the RF tag is attached on the commodity, and the information to be verified includes the use Family password;
In the information to be verified whether user password for verifying user's input is written with the network equipment The device that matches of user password;
The chip features information of the user password and the RF tag for inputting the user is sent to described The device of the network equipment;
For the verification result of the information to be verified to be sent to the device of the network equipment;
For obtaining the verification result transmitted by the network equipment, with the user password and the chip features information And the equipment that reads is to the device of the relevant information of the corresponding commodity of the verification result of the information to be verified.
28. reading equipment according to claim 27, wherein the chip features information further includes the firmware of the chip Parameter information.
29. a kind of system of user's interactive mode Internet of Things verifying based on RF tag, wherein the system comprises such as claims The network equipment described in any one of 16 to 26, and the reading equipment as described in claim 27 or 28.
30. system according to claim 29, wherein the system also includes one or more RF tags.
31. system according to claim 30, wherein the system also includes frangible outer label, the frangible outer label It is capped to be pasted on the RF tag, and the frangible external standard is signed with unique sequence numbers;
Wherein, the network equipment further include:
For storing the device with the unique sequence numbers corresponding to the RF tag,
It, will be with the RF tag for after the network equipment verifies the chip features information and the user password Corresponding unique sequence numbers are sent to the device for reading equipment.
32. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer can Reading instruction, when the computer-readable instruction is executed by one or more equipment, so that the equipment executes such as claim 1 To method described in any one of 15.
33. a kind of system of user's interactive mode Internet of Things verifying based on RF tag, which is characterized in that the system comprises storages Device and processor are stored with computer-readable instruction in the memory, when the computer-readable instruction is by the processor When execution, the processor executes the method as described in any one of claims 1 to 15.
CN201910612556.9A 2019-07-09 2019-07-09 The method, apparatus and system of user's interactive mode Internet of Things verifying based on RF tag Active CN110135542B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201910612556.9A CN110135542B (en) 2019-07-09 2019-07-09 The method, apparatus and system of user's interactive mode Internet of Things verifying based on RF tag
PCT/CN2020/086330 WO2021004125A1 (en) 2019-07-09 2020-04-23 Radio frequency tag-based user interactive internet of things verification method, apparatus and system
AU2020203171A AU2020203171A1 (en) 2019-07-09 2020-04-23 Method, apparatus and system for user interactive IoT verification based on radio frequency tag

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910612556.9A CN110135542B (en) 2019-07-09 2019-07-09 The method, apparatus and system of user's interactive mode Internet of Things verifying based on RF tag

Publications (2)

Publication Number Publication Date
CN110135542A CN110135542A (en) 2019-08-16
CN110135542B true CN110135542B (en) 2019-10-08

Family

ID=67566891

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910612556.9A Active CN110135542B (en) 2019-07-09 2019-07-09 The method, apparatus and system of user's interactive mode Internet of Things verifying based on RF tag

Country Status (1)

Country Link
CN (1) CN110135542B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021004125A1 (en) * 2019-07-09 2021-01-14 上海吾十吾信息技术有限公司 Radio frequency tag-based user interactive internet of things verification method, apparatus and system
CN111310872A (en) * 2020-01-17 2020-06-19 源源通科技(青岛)有限公司 Method and device for chip verification
CN115035642B (en) * 2021-03-03 2024-05-03 深圳市万普拉斯科技有限公司 Radio frequency parameter compatible method, electronic equipment and readable storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105849739B (en) * 2013-09-17 2020-10-30 香港物流及供应链管理应用技术研发中心 Authentication system and authentication method
CN104281876A (en) * 2014-07-10 2015-01-14 上海雅海网络科技有限公司 Anti-counterfeiting method based on chip hardware ID
CN105184576A (en) * 2015-07-17 2015-12-23 吕锦明 Electronic anti-fake system and electronic anti-fake method thereof
CN106779002A (en) * 2016-12-14 2017-05-31 北京龙贝世纪科技股份有限公司 Complex encryption authentication method based on Quick Response Code and radio frequency compound marking
CN109426970A (en) * 2017-08-31 2019-03-05 田保林 A kind of item tracing method for anti-counterfeit, service platform, user terminal and system

Also Published As

Publication number Publication date
CN110135542A (en) 2019-08-16

Similar Documents

Publication Publication Date Title
JP7275291B2 (en) Card tap to securely generate card data to copy to clipboard
CN110135542B (en) The method, apparatus and system of user's interactive mode Internet of Things verifying based on RF tag
US11676152B2 (en) Application-based point of sale system in mobile operating systems
CN103136678A (en) Identification method and device of intelligent terminal, processing method and device of identification information and identification system
KR20230173672A (en) On-demand applications for extending web services
JP2023548369A (en) Web-based activation of contactless cards
JP2023521997A (en) Determination of specific conditions for contactless card activation
US20220414648A1 (en) Server-side redirect of uniform resource locator generated by contactless card
KR20040085800A (en) contactless type communication tag and portable tag reader for verifying a genuine article
KR20240113462A (en) Autofill data based on account authentication using contactless cards
WO2021004125A1 (en) Radio frequency tag-based user interactive internet of things verification method, apparatus and system
US11250156B2 (en) System for encrypting and mailing sensitive information
KR20040104854A (en) Mobile phone capable of reading genuine article verifying information stored in a RF-tag and method for administrating service management executable in a computer communicating with the same phone
WO2024035529A1 (en) Methods and arrangements for proof of purchase
JP6318868B2 (en) Authentication system and portable communication terminal
US20230419295A1 (en) Mobile web browser authentication and checkout using a contactless card
CN109447203A (en) Two dimensional code encryption and decryption method, device, Cloud Server and system
JP2024502434A (en) Secure generation of one-time passcodes using contactless cards
CN105701402B (en) A kind of method and apparatus that monitoring and displaying is kidnapped
TWI850002B (en) Individual encrypted signature system and signing method thereof
CN113557753B (en) Flick card for securely generating card data for copying to clipboard
AU2020203171A1 (en) Method, apparatus and system for user interactive IoT verification based on radio frequency tag
CN114928839A (en) Anti-counterfeiting authentication system and method for NFC label
CN106713232A (en) Device and method of authenticating eID on mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant