CN112418872A - Commodity anti-counterfeiting system and commodity authenticity verification method based on radio frequency technology - Google Patents
Commodity anti-counterfeiting system and commodity authenticity verification method based on radio frequency technology Download PDFInfo
- Publication number
- CN112418872A CN112418872A CN201911311872.9A CN201911311872A CN112418872A CN 112418872 A CN112418872 A CN 112418872A CN 201911311872 A CN201911311872 A CN 201911311872A CN 112418872 A CN112418872 A CN 112418872A
- Authority
- CN
- China
- Prior art keywords
- commodity
- information
- verification
- verification information
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 305
- 238000000034 method Methods 0.000 title claims abstract description 68
- 238000005516 engineering process Methods 0.000 title claims abstract description 27
- 238000012856 packing Methods 0.000 claims abstract description 80
- 230000008569 process Effects 0.000 claims description 25
- 238000004806 packaging method and process Methods 0.000 claims description 13
- 238000013507 mapping Methods 0.000 claims description 8
- 230000000977 initiatory effect Effects 0.000 claims 2
- 235000013606 potato chips Nutrition 0.000 description 17
- 235000002595 Solanum tuberosum Nutrition 0.000 description 2
- 244000061456 Solanum tuberosum Species 0.000 description 2
- 238000005336 cracking Methods 0.000 description 2
- 230000003247 decreasing effect Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000032258 transport Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0029—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a commodity anti-counterfeiting system and a commodity authenticity verification method based on a radio frequency technology. The commodity authenticity verification method mainly comprises the following steps: 1) and verifying the authenticity of the RFID label. 2) The scanning device sends the verification information I and the dynamic position information I to the server. And the server matches preset position information with the dynamic position information I, and if the preset position information and the dynamic position information I are different, the commodity in the packing box is judged not to reach a selling area. 3) And at the server side, after the verification information I and the verification information II are successfully matched and verified, matching the dynamic position II with the preset position information, and if the dynamic position II and the preset position information are not matched, judging that the position of the commodity is in doubt. The invention effectively improves the safety of the RFID electronic tag anti-counterfeiting system and simultaneously improves the two-dimensional code anti-counterfeiting safety of the RFID electronic tag combination.
Description
Technical Field
The invention relates to the field of commodity anti-counterfeiting, in particular to a commodity anti-counterfeiting system and a commodity authenticity verification method based on a radio frequency technology.
Background
With the increasing development of mobile internet, the two-dimensional code-based 'one object and one code' is widely applied to the field of commodity tracing, and the two-dimensional code has the advantages of low cost, easiness in use and the like, but also has the problems of low security level, easiness in copying, counterfeiting, difficulty in distinguishing by consumers and the like. Compared with the two-dimension code, the RFID electronic tag has the advantages of higher safety and high copying and cracking cost, and simultaneously has the problems of high cost, terminal support verification and the like, and is difficult to apply to low-value commodities.
At present, the technical level of counterfeiting is also improved correspondingly, and a counterfeiter illegally obtains encrypted authentication data in the electronic tag and illegally copies the encrypted authentication data through various means such as decryption of the RFID electronic tag, so that the counterfeit electronic tag is counterfeited to achieve the purpose of counterfeiting. Therefore, the existing internet anti-counterfeiting authentication system needs to be improved and enhanced in terms of system security.
The traditional authentication system is mostly established based on an open-loop chain or tree encryption authentication theory system of A → B (→ C …) (readable and writable memory A → authentication server B), and the security of the traditional authentication system is often counterfeited due to the cracking of an authenticated label.
Disclosure of Invention
The present invention is directed to solving the problems of the prior art.
The technical scheme adopted for achieving the purpose of the invention is that the commodity anti-counterfeiting system based on the radio frequency technology is characterized by mainly comprising an RFID label arranged on a packing box of a commodity, a two-dimensional code label arranged on the commodity and a server.
The RFID label is provided with verification information I of the packing box.
The RFID tag mainly includes RFID, NFC, and/or RAS.
The two-dimensional code label has commodity verification information II.
The verification information I and the verification information II are in one-to-many mapping relation. The method for matching the verification information I and the verification information II comprises the following steps: and the server compares the verification information I with the verification information II, if the verification information II is the subset of the verification information I, the verification information I is matched, and if the verification information II is not the subset of the verification information I, the verification information I is not matched.
The verification information I is an RFID digital identity certificate Tjf. j is the commodity packing case number, j is 1, 2, … … m. f is the number of times the information is written by the RFID tag, and f is 1, 2, … … s.
The verification information II is a two-dimensional code digital identity certificate Ei. I is the serial number of the product, i is 1, 2, … … n.
S0A packing box is filled with a plurality of commodities, namely at the server end, the verification information I corresponding to the packing box, the verification information II of the commodities in the packing box and the preset position information are associated together.
S1, the scanning equipment scans the RFID label on the packing box and sends the verification information I and the dynamic position information I to the server.
The scanning device has a global satellite positioning system.
The merchant number or the e-commerce code is written into the scanning device.
The dynamic position information is geographical position information of the packing box and the commodity sales contained in the packing box, position information of scanning equipment, a merchant number or an e-commerce code.
The geographic information mainly comprises country, province, city, district, county, town, county, street and/or house number.
And S2 the server judges whether the dynamic position information I is a merchant number or an e-commerce code, if so, judges that the position of the commodity is in doubt, and if not, shifts to S3.
And S3, after the server side associates the verification information I with the preset position information, matching the preset position information with the dynamic position information I, and if the verification information I and the dynamic position information I are different, judging that the commodities in the packing box do not reach the selling area. And the server side records the dynamic position information I.
And S4, after unpacking, scanning the two-dimensional code label on the commodity and the RFID label on the packing box by the scanning equipment, and sending the verification information I, the verification information II and the dynamic position information II to the server.
And S5, matching the dynamic position II with the preset position information after the verification information I and the verification information II are successfully matched and verified at the server end, and judging that the position of the commodity is in doubt if the dynamic position II is not matched with the preset position information.
The questionable location means that all the items in the package are not sold in the sales area, that the items in one package are sold transregionally, and/or that the items may be counterfeit.
And after the commodity is sold after the commodity is unpacked, scanning the two-dimensional code of the commodity, obtaining the verification information II and the dynamic position information again, and verifying whether the commodity is across the district.
And if the verification information I is matched with the verification information II and the preset position information is consistent with the dynamic position information II, judging that the commodity is true.
After the commodity leaves the factory, the RFID tag verification information I and the two-dimensional code tag verification information II are bound again, namely the RFID tag on the packing box is converted into the RFID tag of the sales store, and at the moment, the two-dimensional code tag verification information II and the verification information I of the RFID tag of the sales store establish a one-to-many mapping relation.
The method for verifying the authenticity of a commodity by using a commodity anti-counterfeiting system based on a radio frequency technology mainly comprises the following steps:
1) the scanning equipment scans the RFID label on the commodity packaging box to be detected for the first time, and the authenticity of the RFID label is verified by using a closed-loop authentication method. And if the RFID label is false, judging that all the commodities in the packing box are false, displaying information that the commodities are false on a display screen of the scanning equipment, and finishing the authenticity verification of the commodities. And if the RFID label is true, the step 2 is carried out.
The method for verifying the authenticity of the commodity by using the closed-loop authentication method mainly comprises the following two methods:
the method comprises the following main steps:
I) the scanning equipment scans the RFID label on the packing box of the commodity to be detected and sends a request for verifying the authenticity of the commodity to be detected to the server.
And the scanning equipment sends the verification information I in the RFID label of the commodity to be detected to the server.
II) the server verifies the information I, namely the RFID digital identity certificate TjfCarrying out Hash operation to obtain information Hif。
Server sends information HjfAnd respectively carrying out comparison operation with each element in the commodity verification information set Q.
If the message HjfAnd if any element in the commodity verification information set Q is not matched, the RFID label is judged to be false, and the server sends the judgment result to the scanning equipment. The scanning device displays information T with a digital identity certificateifAll the commodities in the commodity packing case are false. And the server records the scanning time and the verification geographic information of the scanning equipment, finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
If the message HifAnd Q is divided from the commodity verification information set QjfAnd if other elements are matched, the RFID label is suspicious of true and false, and the server sends the judgment result to the scanning equipment. The scanning device displays information T with a digital identity certificateifAll the commodities in the commodity packing case are suspicious of true and false. And the server records the scanning time and the verification geographic information of the scanning equipment, finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
If the message HjfAnd Q in the commodity authentication information set QjfIf there is a match, then the RFID tag is true, and proceed to step III.
III) the authentication center generates digital identity certificate information Tj,f+1And transmitted to the scanning device. The scanning equipment converts the digital identity certificate information Tj,f+1Writing into the RFID label of the tested commodity judged to be true to replace the original Tj,f. The digital identity certificate information Tj,f+1The digital identity certificate information of the new commodity is used for verifying the authenticity of the commodity to be detected next time by the scanning equipment.
For digital identity certificate information Tj,f+1Carrying out Hash operation to obtain a commodity verification message Qj,f+1. The base database stores and message corresponds to Ej,f+1Commodity authentication message Q ofj,f+1That is, the product authentication information set is updated to Q ═ Qj,1、Qj,2、…、Qj,f、Qj,f+1}. The goods authentication message Qj,f+1And the product is used for verifying the authenticity of the next product.
Commodity authentication information Qj,fIs digital identity certificate information TjfAnd (4) carrying out hash operation on the obtained hash value.
The server finishes the commodity authenticity verification, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
The method II mainly comprises the following steps:
I) the scanning equipment scans the RFID label on the packing box of the commodity to be detected and sends a request for verifying the authenticity of the commodity to be detected to the server.
The scanning equipment is used for acquiring digital identity certificate information T in the RFID label of the commodity to be detectedifAnd sending to the server.
II) the server verifies the information I, namely the digital identity certificate information TjfCarrying out Hash operation to obtain information Hif。
Server sends information HjfAnd respectively carrying out comparison operation with each element in the commodity verification information set Q.
If the message HjfAnd if any element in the commodity verification information set Q is not matched, the RFID label is judged to be false, and the server sends the judgment result to the scanning equipment. The scanning device displays information T with a digital identity certificateifAll the commodities in the commodity packing case are false. And the server records the scanning time and the verification geographic information of the scanning equipment, finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
If the message HifAnd Q is divided from the commodity verification information set QjfAnd if other elements are matched, the RFID label is suspicious of true and false, and the server sends the judgment result to the scanning equipment. The scanning device displays information T with a digital identity certificateifAll the commodities in the commodity packing case are suspicious of true and false. And the server records the scanning time and the verification geographic information of the scanning equipment, finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
If the message HjfAnd Q in the commodity authentication information set QjfAnd if the two products are matched, the RFID label is true, the server finishes the authenticity verification of the product, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
2) The scanning device sends the verification information I and the dynamic position information I to the server.
3) The server side judges whether the dynamic position information I is a merchant number or an e-commerce code, if so, the position of the commodity is judged to be in doubt, if not, the server side associates the verification information I with the associated preset position information and matches the preset position information with the dynamic position information I, and if not, the commodity in the packing box does not reach a selling area. And the server side records the dynamic position information I.
4) The scanning equipment scans the two-dimension code label of the commodity to be detected and sends the read verification information I, verification information II and dynamic position information II to the server.
5) And the server compares the verification information II with the verification information I, if the verification information II is not matched with the verification information I, the commodity with the verification information I is judged to be false, and if the verification information I is matched with the commodity, the step 6 is carried out.
6) And at the server side, after the verification information I and the verification information II are successfully matched and verified, matching the dynamic position II with the preset position information, and if the dynamic position II and the preset position information are not matched, judging that the position of the commodity is in doubt.
The technical effect of the present invention is undoubted. The invention integrates the two-dimension code technology and the RFID electronic tag technology, utilizes the advantages of low cost, convenient use and the like of the two-dimension code, and simultaneously utilizes the high safety of the RFID to improve the whole anti-counterfeiting performance, thereby building an anti-counterfeiting verification system with low cost and high safety. The invention creates a closed-loop authentication encryption theory system A → (B →) A (authentication server A → readable and writable memory B → authentication server A), and well solves the safety problem caused by the fact that all links of the authentication system including the authenticated label are cracked. The invention combines closed-loop authentication to construct a brand-new authentication security architecture, so that the system authentication scheme reaches a new security height, the security of the RFID electronic tag anti-counterfeiting system is effectively improved, and the security of the two-dimensional code anti-counterfeiting of the RFID electronic tag combination is improved.
Drawings
Fig. 1 is a flow chart of commodity anti-counterfeiting verification.
Detailed Description
The present invention is further illustrated by the following examples, but it should not be construed that the scope of the above-described subject matter is limited to the following examples. Various substitutions and alterations can be made without departing from the technical idea of the invention and the scope of the invention is covered by the present invention according to the common technical knowledge and the conventional means in the field.
Example 1:
the commodity anti-counterfeiting system based on the radio frequency technology is characterized by mainly comprising an RFID label arranged on a packing box of a commodity, a two-dimensional code label arranged on the commodity and a server.
The RFID label is provided with verification information I of the packing box.
The RFID tag mainly comprises RFID (radio Frequency identification), NFC (near Field communication) and/or RAS (remote Access service).
The two-dimensional code label has commodity verification information II.
The verification information I and the verification information II are in one-to-many mapping relation. The method for matching the verification information I and the verification information II comprises the following steps: and the server compares the verification information I with the verification information II, if the verification information II is the subset of the verification information I, the verification information I is matched, and if the verification information II is not the subset of the verification information I, the verification information I is not matched.
The verification information I is an RFID digital identity certificate Tjf. j is the commodity packing case number, j is 1, 2, … … m. f is the number of times the information is written by the RFID tag, and f is 1, 2, … … s.
The verification information II is a two-dimensional code digital identity certificate Ei. I is the serial number of the product, i is 1, 2, … … n.
S0A packing box is filled with a plurality of commodities, namely at the server end, the verification information I corresponding to the packing box, the verification information II of the commodities in the packing box and the preset position information are associated together.
S1, the scanning equipment scans the RFID label on the packing box and sends the verification information I and the dynamic position information I to the server.
The scanning device has a global satellite positioning system.
The merchant number or the e-commerce code is written into the scanning device.
The dynamic position information is geographical position information of the packing box and the commodity sales contained in the packing box, position information of scanning equipment, a merchant number or an e-commerce code.
The geographic information mainly comprises country, province, city, district, county, town, county, street and/or house number.
And S2 the server judges whether the dynamic position information I is a merchant number or an e-commerce code, if so, judges that the position of the commodity is in doubt, and if not, shifts to S3.
And S3, after the server side associates the verification information I with the preset position information, matching the preset position information with the dynamic position information I, and if the verification information I and the dynamic position information I are different, judging that the commodities in the packing box do not reach the selling area. And the server side records the dynamic position information I.
And S4, after unpacking, scanning the two-dimensional code label on the commodity and the RFID label on the packing box by the scanning equipment, and sending the verification information I, the verification information II and the dynamic position information II to the server.
And S5, matching the dynamic position II with the preset position information after the verification information I and the verification information II are successfully matched and verified at the server end, and judging that the position of the commodity is in doubt if the dynamic position II is not matched with the preset position information.
The questionable location means that all the items in the package are not sold in the sales area, that the items in one package are sold transregionally, and/or that the items may be counterfeit.
And after the commodity is sold after the commodity is unpacked, scanning the two-dimensional code of the commodity, obtaining the verification information II and the dynamic position information again, and verifying whether the commodity is across the district.
And if the verification information I is matched with the verification information II and the preset position information is consistent with the dynamic position information II, judging that the commodity is true.
After the commodity leaves the factory, the RFID tag verification information I and the two-dimensional code tag verification information II are bound again, namely the RFID tag on the packing box is converted into the RFID tag of the sales store, and at the moment, the two-dimensional code tag verification information II and the verification information I of the RFID tag of the sales store establish a one-to-many mapping relation.
Example 2:
the method for verifying the authenticity of a commodity by using a commodity anti-counterfeiting system based on a radio frequency technology mainly comprises the following steps:
1) the scanning equipment scans the RFID label on the commodity packaging box to be detected for the first time, and the authenticity of the RFID label is verified by using a closed-loop authentication method. And if the RFID label is false, judging that all the commodities in the packing box are false, displaying information that the commodities are false on a display screen of the scanning equipment, and finishing the authenticity verification of the commodities. And if the RFID label is true, the step 2 is carried out.
The method for verifying the authenticity of the commodity by using the closed-loop authentication method mainly comprises the following two methods:
the method comprises the following main steps:
I) the scanning equipment scans the RFID label on the packing box of the commodity to be detected and sends a request for verifying the authenticity of the commodity to be detected to the server.
And the scanning equipment sends the verification information I in the RFID label of the commodity to be detected to the server.
II) the server verifies the information I, namely the RFID digital identity certificate TjfCarrying out Hash operation to obtain information Hif。
Server sends information HjfAnd respectively carrying out comparison operation with each element in the commodity verification information set Q.
If the message HjfAnd if any element in the commodity verification information set Q is not matched, the RFID label is judged to be false, and the server sends the judgment result to the scanning equipment. The scanning device displays information T with a digital identity certificateifAll the commodities in the commodity packing case are false. And the server records the scanning time and the verification geographic information of the scanning equipment, finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
If the message HifAnd Q is divided from the commodity verification information set QjfAnd if other elements are matched, the RFID label is suspicious of true and false, and the server sends the judgment result to the scanning equipment. The scanning device displays information T with a digital identity certificateifAll goods in the goods packing boxFalse suspicion. And the server records the scanning time and the verification geographic information of the scanning equipment, finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
If the message HjfAnd Q in the commodity authentication information set QjfIf there is a match, then the RFID tag is true, and proceed to step III.
III) the authentication center generates digital identity certificate information Tj,f+1And transmitted to the scanning device. The scanning equipment converts the digital identity certificate information Tj,f+1Writing into the RFID label of the tested commodity judged to be true to replace the original Tj,f. The digital identity certificate information Tj,f+1The digital identity certificate information of the new commodity is used for verifying the authenticity of the commodity to be detected next time by the scanning equipment.
For digital identity certificate information Tj,f+1Carrying out Hash operation to obtain a commodity verification message Qj,f+1. The base database stores and message corresponds to Ej,f+1Commodity authentication message Q ofj,f+1That is, the product authentication information set is updated to Q ═ Qj,1、Qj,2、…、Qj,f、Qj,f+1}. The goods authentication message Qj,f+1And the product is used for verifying the authenticity of the next product.
Commodity authentication information Qj,fIs digital identity certificate information TjfAnd (4) carrying out hash operation on the obtained hash value.
The server finishes the commodity authenticity verification, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
The method II mainly comprises the following steps:
I) the scanning equipment scans the RFID label on the packing box of the commodity to be detected and sends a request for verifying the authenticity of the commodity to be detected to the server.
The scanning equipment is used for acquiring digital identity certificate information T in the RFID label of the commodity to be detectedifAnd sending to the server.
II) the server checks the authentication information I,i.e. digital identity certificate information TjfCarrying out Hash operation to obtain information Hif。
Server sends information HjfAnd respectively carrying out comparison operation with each element in the commodity verification information set Q.
If the message HjfAnd if any element in the commodity verification information set Q is not matched, the RFID label is judged to be false, and the server sends the judgment result to the scanning equipment. The scanning device displays information T with a digital identity certificateifAll the commodities in the commodity packing case are false. And the server records the scanning time and the verification geographic information of the scanning equipment, finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
If the message HifAnd Q is divided from the commodity verification information set QjfAnd if other elements are matched, the RFID label is suspicious of true and false, and the server sends the judgment result to the scanning equipment. The scanning device displays information T with a digital identity certificateifAll the commodities in the commodity packing case are suspicious of true and false. And the server records the scanning time and the verification geographic information of the scanning equipment, finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
If the message HjfAnd Q in the commodity authentication information set QjfAnd if the two products are matched, the RFID label is true, the server finishes the authenticity verification of the product, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
2) The scanning device sends the verification information I and the dynamic position information I to the server.
3) The server side judges whether the dynamic position information I is a merchant number or an e-commerce code, if so, the position of the commodity is judged to be in doubt, if not, the server side associates the verification information I with the associated preset position information and matches the preset position information with the dynamic position information I, and if not, the commodity in the packing box does not reach a selling area. And the server side records the dynamic position information I.
4) The scanning equipment scans the two-dimension code label of the commodity to be detected and sends the read verification information I, verification information II and dynamic position information II to the server.
5) And the server compares the verification information II with the verification information I, if the verification information II is not matched with the verification information I, the commodity with the verification information I is judged to be false, and if the verification information I is matched with the commodity, the step 6 is carried out.
6) And at the server side, after the verification information I and the verification information II are successfully matched and verified, matching the dynamic position II with the preset position information, and if the dynamic position II and the preset position information are not matched, judging that the position of the commodity is in doubt.
Example 3:
a commodity authenticity verification method of a commodity anti-counterfeiting system based on a radio frequency technology mainly comprises the following steps:
1) the scanning equipment scans the RFID label on the commodity packaging box to be detected for the first time, and the authenticity of the RFID label is verified by using a closed-loop authentication method. And if the RFID label is false, judging that all the commodities in the packing box are false, displaying information that the commodities are false on a display screen of the scanning equipment, and finishing the authenticity verification of the commodities. And if the RFID label is true, the step 2 is carried out.
Preferably, the scanning device has a voice broadcast function, and broadcasts the commodity authenticity information in a voice mode.
Preferably, the scanning device has two different colored indicator lights, one color representing the merchandise as false and the other color representing the merchandise as true.
Preferably, the scanning device has a warning tone which is sounded if the article is false.
The method for verifying the authenticity of the commodity by using the closed-loop authentication method mainly comprises the following steps:
1.1) the scanning equipment scans the RFID label on the packing box of the commodity to be detected and sends a request for verifying the authenticity of the commodity to be detected to the server.
The scanning equipment is used for acquiring digital identity certificate information T in the RFID label of the commodity to be detectedifAnd sending to the server.
1.2) ServerThe digital identity certificate information TjfCarrying out Hash operation to obtain information Hif。
Server sends information HjfAnd respectively carrying out comparison operation with each element in the commodity verification information set Q.
If the message HjfAnd if any element in the commodity verification information set Q is not matched, the RFID label is judged to be false, and the server sends the judgment result to the scanning equipment. The scanning device displays information T with a digital identity certificateifAll the commodities in the commodity packing case are false. And the server records the scanning time and the verification geographic information of the scanning equipment, finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
If the message HifAnd Q is divided from the commodity verification information set QjfAnd if other elements are matched, the RFID label is suspicious of true and false, and the server sends the judgment result to the scanning equipment. The scanning device displays information T with a digital identity certificateifAll the commodities in the commodity packing case are suspicious of true and false. And the server records the scanning time and the verification geographic information of the scanning equipment, finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
If the message HjfAnd Q in the commodity authentication information set QjfAnd if the two products are matched, the RFID label is true, the server finishes the authenticity verification of the product, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment. . Commodity authentication information Qj,fIs digital identity certificate information TjfAnd (4) carrying out hash operation on the obtained hash value.
2) The scanning device sends the location information to the server.
3) Scanning equipment scans the two-dimension code label of the commodity to be detected and reads the two-dimension code digital identity certificate EiAnd sending the verified geographic information of the scanning device to the server.
4) ServiceTwo-dimensional code digital identity certificate E is compared to wareiAnd RFID digital identity certificate Tif. If not, judging that the two-dimensional code digital identity certificate E existsiIf the commodity is false, the step 5 is carried out.
5) The server compares the position information of the scanning device with the verification geographic information, if the position information is the same as the verification geographic information, the commodity is judged to be true, and if the position information is different from the verification geographic information, the commodity is judged to be false. And the server sends the commodity authenticity verification result to the scanning equipment.
Example 4:
the commodity anti-counterfeiting system based on the radio frequency technology is used for verifying the authenticity of the potato chips, and the main steps are as follows:
1) the manufacturer transports a number of boxes of potato chips to the Yonghui supermarket in the northern area of Chongqing river, with the code of A00000001. Each package has an RFID tag. 12 bags of potato chips are filled in one packaging box, and each bag of potato chips is provided with a two-dimensional code. The code is formed by combining letters and numbers, and the number of code bits can be increased or decreased according to actual needs.
After the supermarket receives the potato chips, the RFID labels on the potato chip packaging boxes are scanned for the first time, and the authenticity of the RFID labels is verified by using a closed-loop authentication method. And if the verification result is true, the scanning equipment sends the position information to the server. The position information is a merchant number or an e-commerce code A00000001 and/or an address of a permanent supermarket.
2) The supermarket unpacks the potato chips for sale, scans the two-dimensional codes of the potato chips by using the code scanning gun of the supermarket, and scans the digital identity certificate E of the two-dimensional codes by using a computer connected with the code scanning guniAnd the merchant number or the e-commerce code A00000001 and/or the address of the perpetual supermarket are sent to the server.
4) Server pair two-dimensional code digital identity certificate EiAnd RFID digital identity certificate TifMatching is carried out, and a digital identity certificate E of the two-dimensional code is foundiCorresponding RFID digital identity certificate TifAnd obtaining the RFID digital identity certificate TifThe location information of (1).
5) The server compares the position information of the scanning device with the verification geographic information, and the position information and the verification geographic information are the same, so that the potato chips are judged to be true.
Example 5:
the commodity anti-counterfeiting system based on the radio frequency technology is used for verifying the authenticity of the potato chips, and the main steps are as follows:
1) the manufacturer transports a number of boxes of potato chips to the Yonghui supermarket in the northern area of Chongqing river, with the code of A00000001. Each package has an RFID tag. 12 bags of potato chips are filled in one packaging box, and each bag of potato chips is provided with a two-dimensional code. The code is formed by combining letters and numbers, and the number of code bits can be increased or decreased according to actual needs.
After the supermarket receives the potato chips, the RFID labels on the potato chip packaging boxes are scanned for the first time, and the authenticity of the RFID labels is verified by using a closed-loop authentication method. And if the verification result is true, the scanning equipment sends the position information to the server. The position information is a merchant number or an e-commerce code A00000001 and/or an address of a permanent supermarket.
2) The supermarket unpacks the potato chips and places the potato chips on a selling shelf.
3) When Xiaoming purchases the potato chips, the two-dimension codes of the potato chips are scanned by using mobile phone software with a two-dimension code scanning function. The mobile phone software can be WeChat, Yonghui life app and the like, and can also be app or WeChat applet specially used for verifying the authenticity of the commodity.
The mobile phone is provided with a GPS positioning system.
The mobile phone locates itself and the two-dimension code digital identity certificate E through the networkiAnd sending the data to a server. Self-positioning is to verify the geographic information. The mobile phone is positioned in Beijing Fengcai.
4) Server pair two-dimensional code digital identity certificate EiAnd RFID digital identity certificate TifMatching is carried out, and a digital identity certificate E of the two-dimensional code is foundiCorresponding RFID digital identity certificate TifAnd obtaining the RFID digital identity certificate TifThe location information of (1).
5) The server compares the position information of the scanning device with the verification geographic information, and because the position information is in the Chongqing Jiangbai area and the mobile phone is positioned in the Beijing Fengcai area, the difference between the position information and the verification geographic information is too large, and the situation that low-price commodities are generally not transported from a warehouse to Chongqing and sold in Beijing does not exist. Therefore, the chip is judged to be false, and the mobile phone displays the chip as false and/or position information.
Example 6:
a commodity anti-counterfeiting system based on a radio frequency technology mainly comprises an RFID label arranged on a packing box of a commodity, a two-dimensional code label arranged on the commodity and k servers. k is an integer greater than 0.
The RFID label is provided with verification information I of the packing box.
The two-dimensional code label has commodity verification information II.
The verification information I and the verification information II are in one-to-many mapping relation. The method for matching the verification information I and the verification information II comprises the following steps: and the server compares the verification information I with the verification information II, if the verification information II is the subset of the verification information I, the verification information I is matched, and if the verification information II is not the subset of the verification information I, the verification information I is not matched.
The verification information I is an RFID digital identity certificate Tjf. j is the commodity packing case number, j is 1, 2, … … m. f is the number of times the information is written by the RFID tag, and f is 1, 2, … … s.
The verification information II is a two-dimensional code digital identity certificate Ei. I is the serial number of the product, i is 1, 2, … … n.
S0A packing box is filled with a plurality of commodities, namely at the server end, the verification information I corresponding to the packing box, the verification information II of the commodities in the packing box and the preset position information are associated together.
S1, the scanning equipment scans the RFID label on the packing box and sends the verification information I and the dynamic position information I to the server.
The scanning device has a global satellite positioning system.
The merchant number or the e-commerce code is written into the scanning device.
The dynamic position information is geographical position information of the packing box and the commodity sales contained in the packing box, position information of scanning equipment, a merchant number or an e-commerce code.
The geographic information mainly comprises country, province, city, district, county, town, county, street and/or house number.
And S2 the server judges whether the dynamic position information I is a merchant number or an e-commerce code, if so, judges that the position of the commodity is in doubt, and if not, shifts to S3.
And S3, after the server side associates the verification information I with the preset position information, matching the preset position information with the dynamic position information I, and if the verification information I and the dynamic position information I are different, judging that the commodities in the packing box do not reach the selling area. And the server side records the dynamic position information I.
And S4, after unpacking, scanning the two-dimensional code label on the commodity and the RFID label on the packing box by the scanning equipment, and sending the verification information I, the verification information II and the dynamic position information II to the server.
And S5, matching the dynamic position II with the preset position information after the verification information I and the verification information II are successfully matched and verified at the server end, and judging that the position of the commodity is in doubt if the dynamic position II is not matched with the preset position information.
The questionable location means that all the items in the package are not sold in the sales area, that the items in one package are sold transregionally, and/or that the items may be counterfeit.
And after the commodity is sold after the commodity is unpacked, scanning the two-dimensional code of the commodity, obtaining the verification information II and the dynamic position information again, and verifying whether the commodity is across the district.
And if the verification information I is matched with the verification information II and the preset position information is consistent with the dynamic position information II, judging that the commodity is true.
After the commodity leaves the factory, the RFID tag verification information I and the two-dimensional code tag verification information II are bound again, namely the RFID tag on the packing box is converted into the RFID tag of the sales store, and at the moment, the two-dimensional code tag verification information II and the verification information I of the RFID tag of the sales store establish a one-to-many mapping relation.
The commodity anti-counterfeiting system based on the radio frequency technology is used for verifying the authenticity of commodities and comprises the following main steps:
1) the scanning equipment scans the RFID label on the commodity packaging box to be detected for the first time, and the authenticity of the RFID label is verified by using a closed-loop authentication method. If the RFID label is false, the RFID digital identity certificate T is judgedjfAnd displaying the information that the commodities are false on a display screen of the scanning equipment if all the commodities in the corresponding packaging box are false, and finishing the authenticity verification of the commodities. If R isIf the FID tag is true, the process proceeds to step 2.
The method for verifying the authenticity of the commodity by using the closed-loop authentication method mainly comprises the following steps:
1.1) the scanning equipment scans the RFID label on the packing box of the commodity to be tested and sends a request for verifying the authenticity of the commodity to be tested to k servers. Wherein, a server is randomly arranged as an authenticity verification center. This embodiment sets k to 5. Wherein, the 1 st server is an authenticity verification center.
The scanning equipment is used for acquiring digital identity certificate information T in the RFID label of the commodity to be detectedifTo k servers.
1.2) k servers the digital identity certificate information TjfCarrying out Hash operation to obtain information Hif。
k servers will send information HjfAnd respectively carrying out comparison operation with each element in the commodity verification information set Q.
If the message HjfIf any element in the commodity verification information set Q is not matched with the RFID label, the RFID label is judged to be false, and digital identity certificate information T is generatedifThe verification information that all the commodities in the commodity packaging box are false.
If the message HifAnd Q is divided from the commodity verification information set QjfIf other elements are matched, the RFID label is judged to be true or false and suspicious, and digital identity certificate information T is generatedifAnd verifying information that all the commodities in the commodity packing box are doubtful in true and false.
If the message HjfAnd Q in the commodity authentication information set QjfAnd if the RFID tag is matched with the verification information, the RFID tag is true, and verification information that the RFID tag is true is generated.
Wherein, 4 servers judge the RFID tag to be true. The 1 server determines that the RFID tag is false.
1.3) the authenticity verification center receives the commodity verification information of all the servers and judges the authenticity of the RFID label according to the majority principle. And the authenticity verification center sends the authenticity result of the commodity to the scanning equipment.
If the RFID label is false, the method is usedScanning device displaying information T with digital identity certificateifAll the commodities in the commodity packing case are false. And the server records the scanning time and the verification geographic information of the scanning equipment, finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
If the RFID label is suspicious, the scanning equipment displays the information T with the digital identity certificateifAll the commodities in the commodity packing case are suspicious of true and false. And the server records the scanning time and the verification geographic information of the scanning equipment, finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
And if the RFID label is a genuine product, the step 1.4 is carried out. Commodity authentication information Qj,fIs digital identity certificate information TjfAnd (4) carrying out hash operation on the obtained hash value.
According to most principles, an RFID tag is genuine.
1.4) the authentication center generates digital identity certificate information Tj,f+1And transmitted to the scanning device. The scanning equipment converts the digital identity certificate information Tj,f+1Writing into the RFID label of the tested commodity judged to be true to replace the original Tj,f. The digital identity certificate information Tj,f+1The digital identity certificate information of the new commodity is used for verifying the authenticity of the commodity to be detected next time by the scanning equipment.
For digital identity certificate information Tj,f+1Carrying out Hash operation to obtain a commodity verification message Qj,f+1. The base database stores and message corresponds to Ej,f+1Commodity authentication message Q ofj,f+1That is, the product authentication information set is updated to Q ═ Qj,1、Qj,2、…、Qj,f、Qj,f+1}. The goods authentication message Qj,f+1And the product is used for verifying the authenticity of the next product.
The server finishes the commodity authenticity verification, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
2) The scanning device sends the verification information I and the dynamic position information I to the server.
3) The server side judges whether the dynamic position information I is a merchant number or an e-commerce code, if so, the position of the commodity is judged to be in doubt, if not, the server side associates the verification information I with the associated preset position information and matches the preset position information with the dynamic position information I, and if not, the commodity in the packing box does not reach a selling area. And the server side records the dynamic position information I.
4) The scanning equipment scans the two-dimension code label of the commodity to be detected and sends the read verification information I, verification information II and dynamic position information II to the server.
5) And the server compares the verification information II with the verification information I, if the verification information II is not matched with the verification information I, the commodity with the verification information I is judged to be false, and if the verification information I is matched with the commodity, the step 6 is carried out.
6) And at the server side, after the verification information I and the verification information II are successfully matched and verified, matching the dynamic position II with the preset position information, and if the dynamic position II and the preset position information are not matched, judging that the position of the commodity is in doubt.
Claims (15)
1. The commodity anti-counterfeiting system based on the radio frequency technology is characterized by mainly comprising an RFID label arranged on a packing box of a commodity, a two-dimensional code label arranged on the commodity and a server;
the RFID label is provided with verification information I of the packing box;
the two-dimensional code label has commodity verification information II;
s0, a packing box is filled with a plurality of commodities, namely, at the server end, the verification information I corresponding to the packing box, the verification information II of the commodities in the packing box and the preset position information are associated together;
s1, scanning the RFID label on the packing box by the scanning equipment, and sending the verification information I and the dynamic position information I to the server;
the dynamic position information is geographical position information of the packing box and the commodity sales contained in the packing box, position information of scanning equipment, a merchant number or an e-commerce code;
s2 the server judges whether the dynamic position information I is a merchant number or an e-commerce code, if yes, the position of the commodity is judged to be in doubt, and if not, the step is switched to S3;
s3, after the server side associates the verification information I with the preset position information, matching the preset position information with the dynamic position information I, and if the verification information I and the preset position information are different, judging that the commodities in the packing box do not reach a selling area; the server side records dynamic position information I;
s4, after unpacking, scanning the two-dimensional code label on the commodity and the RFID label on the packing box by the scanning equipment, and sending the verification information I, the verification information II and the dynamic position information II to the server;
and S5, matching the dynamic position II with the preset position information after the verification information I and the verification information II are successfully matched and verified at the server end, and judging that the position of the commodity is in doubt if the dynamic position II is not matched with the preset position information.
2. The commodity anti-counterfeiting system based on the radio frequency technology according to claim 1, characterized in that: the verification information I and the verification information II are in a one-to-many mapping relationship; the method for matching the verification information I and the verification information II comprises the following steps: and the server compares the verification information I with the verification information II, if the verification information II is the subset of the verification information I, the verification information I is matched, and if the verification information II is not the subset of the verification information I, the verification information I is not matched.
3. The commodity anti-counterfeiting system based on the radio frequency technology according to claim 1, characterized in that: the questionable location means that all the items in the package are not sold in the sales area, that the items in one package are sold transregionally, and/or that the items may be counterfeit.
4. The commodity anti-counterfeiting system based on the radio frequency technology according to claim 1, characterized in that: and after the commodity is sold after the commodity is unpacked, scanning the two-dimensional code of the commodity, obtaining the verification information II and the dynamic position information again, and verifying whether the commodity is across the district.
5. The commodity anti-counterfeiting system based on the radio frequency technology according to claim 1, characterized in that: and if the verification information I is matched with the verification information II and the preset position information is consistent with the dynamic position information II, judging that the commodity is true.
6. The commodity anti-counterfeiting system based on the radio frequency technology according to claim 1, characterized in that: the verification information I is an RFID digital identity certificate Tjf(ii) a j is the serial number of the commodity packing box, and j is 1, 2 and … … m; f is the number of times the information is written by the RFID tag, and f is 1, 2, … … s.
The verification information II is a two-dimensional code digital identity certificate Ei(ii) a I is the serial number of the product, i is 1, 2, … … n.
7. The commodity anti-counterfeiting system based on the radio frequency technology according to claim 1, characterized in that: the geographic information mainly comprises country, province, city, district, county, town, county, street and/or house number.
8. The commodity anti-counterfeiting system based on the radio frequency technology according to claim 1, characterized in that: the scanning device has a global satellite positioning system.
9. The commodity anti-counterfeiting system based on the radio frequency technology according to claim 1, characterized in that: the merchant number or the e-commerce code is written into the scanning device.
10. The commodity anti-counterfeiting system based on the radio frequency technology according to claim 1, characterized in that: after the commodity leaves the factory, the RFID tag verification information I and the two-dimensional code tag verification information II are bound again, namely the RFID tag on the packing box is converted into the RFID tag of the sales store, and at the moment, the two-dimensional code tag verification information II and the verification information I of the RFID tag of the sales store establish a one-to-many mapping relation.
11. The commodity anti-counterfeiting system based on the radio frequency technology according to claim 1, characterized in that: the RFID tag mainly includes RFID, NFC, and/or RAS.
12. The method for verifying the authenticity of a commodity by using the commodity anti-counterfeiting system based on the radio frequency technology as claimed in claims 1 to 11 is characterized by mainly comprising the following steps:
1) scanning the RFID label on the commodity packaging box to be detected for the first time by scanning equipment, and verifying the authenticity of the RFID label by using a closed-loop authentication method; if the RFID label is false, judging that all the commodities in the packing box are false, displaying information that the commodities are false on a display screen of the scanning equipment, and finishing the authenticity verification of the commodities; if the RFID label is true, the step 2 is carried out;
2) the scanning equipment sends the verification information I and the dynamic position information I to a server;
3) the server side judges whether the dynamic position information I is a merchant number or an e-commerce code, if so, the position of the commodity is judged to be in doubt, if not, the server side associates the verification information I with the associated preset position information and matches the preset position information with the dynamic position information I, and if not, the commodity in the packing box is judged not to reach a selling area; the server side records dynamic position information I;
4) scanning the two-dimensional code label of the commodity to be detected by the scanning equipment, and sending the read verification information I, verification information II and dynamic position information II to the server;
5) the server compares the verification information II with the verification information I, if the verification information II is not matched with the verification information I, the commodity with the verification information I is judged to be false, and if the verification information I is matched with the commodity, the step 6 is carried out;
6) and at the server side, after the verification information I and the verification information II are successfully matched and verified, matching the dynamic position II with the preset position information, and if the dynamic position II and the preset position information are not matched, judging that the position of the commodity is in doubt.
13. The method for verifying authenticity of a commodity according to claim 12, wherein: the method for verifying the authenticity of the commodity by using the closed-loop authentication method mainly comprises the following steps:
1) scanning the RFID label on the packaging box of the commodity to be detected by the scanning equipment, and initiating a request for verifying the authenticity of the commodity to be detected to the server;
the scanning equipment sends verification information I in the RFID label of the commodity to be detected to a server;
2) the server checks the verification information I, namely the RFID digital identity certificate TjfCarrying out Hash operation to obtain information Hif;
Server sends information HjfRespectively carrying out comparison operation with each element in the commodity verification information set Q;
if the message HjfIf the RFID tag is not matched with any element in the commodity verification information set Q, the RFID tag is judged to be false, and the server sends the judgment result to the scanning equipment; the scanning device displays information T with a digital identity certificateifAll commodities in the commodity packing case are false; the server records the scanning time and the verification geographic information of the scanning equipment, finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment;
if the message HifAnd Q is divided from the commodity verification information set QjfIf other elements are matched, the RFID label is suspicious of true or false, and the server sends the judgment result to the scanning equipment; the scanning device displays information T with a digital identity certificateifAll commodities in the commodity packing case are suspicious of true and false; the server records the scanning time and the verification geographic information of the scanning equipment, finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment;
if the message HjfAnd Q in the commodity authentication information set QjfIf the RFID tag is matched with the RFID tag, the RFID tag is true, and the step 3 is carried out;
3) the authentication center generates digital identity certificate information Tj,f+1And sending to the scanning device; the scanning equipment converts the digital identity certificate information Tj,f+1Writing into the RFID label of the tested commodity judged to be true to replace the original Tj,f(ii) a The digital identity certificate information Tj,f+1Is new commodity digital identity certificate information for theThe scanning equipment carries out authenticity verification on the commodity to be detected next time;
for digital identity certificate information Tj,f+1Carrying out Hash operation to obtain a commodity verification message Qj,f+1(ii) a The base database stores and message corresponds to Ej,f+1Commodity authentication message Q ofj,f+1That is, the product authentication information set is updated to Q ═ Qj,1、Qj,2、…、Qj,f、Qj,f+1}; the goods authentication message Qj,f+1The method is used for verifying the authenticity of the next commodity;
the server finishes the commodity authenticity verification, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
14. The method for verifying authenticity of a commodity according to claim 12, wherein: the method for verifying the authenticity of the commodity by using the closed-loop authentication method mainly comprises the following steps:
1) scanning the RFID label on the packaging box of the commodity to be detected by the scanning equipment, and initiating a request for verifying the authenticity of the commodity to be detected to the server;
the scanning equipment is used for acquiring digital identity certificate information T in the RFID label of the commodity to be detectedifSending to a server;
2) the server checks the verification information I, i.e. the digital identity certificate information TjfCarrying out Hash operation to obtain information Hif;
Server sends information HjfRespectively carrying out comparison operation with each element in the commodity verification information set Q;
if the message HjfIf the RFID tag is not matched with any element in the commodity verification information set Q, the RFID tag is judged to be false, and the server sends the judgment result to the scanning equipment; the scanning device displays information T with a digital identity certificateifAll commodities in the commodity packing case are false; the server records the scanning time and the verification geographic information of the scanning equipment, finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment;
if the message HifAnd Q is divided from the commodity verification information set QjfIf other elements are matched, the RFID label is suspicious of true or false, and the server sends the judgment result to the scanning equipment; the scanning device displays information T with a digital identity certificateifAll commodities in the commodity packing case are suspicious of true and false; the server records the scanning time and the verification geographic information of the scanning equipment, finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment;
if the message HjfAnd Q in the commodity authentication information set QjfAnd if the two products are matched, the RFID label is true, the server finishes the authenticity verification of the product, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the scanning equipment.
15. The method for verifying authenticity of a commodity according to claim 12, wherein: commodity authentication information Qj,fIs digital identity certificate information TjfAnd (4) carrying out hash operation on the obtained hash value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911311872.9A CN112418872A (en) | 2019-12-18 | 2019-12-18 | Commodity anti-counterfeiting system and commodity authenticity verification method based on radio frequency technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911311872.9A CN112418872A (en) | 2019-12-18 | 2019-12-18 | Commodity anti-counterfeiting system and commodity authenticity verification method based on radio frequency technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112418872A true CN112418872A (en) | 2021-02-26 |
Family
ID=74844007
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911311872.9A Pending CN112418872A (en) | 2019-12-18 | 2019-12-18 | Commodity anti-counterfeiting system and commodity authenticity verification method based on radio frequency technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112418872A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113723577A (en) * | 2020-09-29 | 2021-11-30 | 四川谦泰仁投资管理有限公司 | Association code system with multifunctional partitions |
-
2019
- 2019-12-18 CN CN201911311872.9A patent/CN112418872A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113723577A (en) * | 2020-09-29 | 2021-11-30 | 四川谦泰仁投资管理有限公司 | Association code system with multifunctional partitions |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109345264B (en) | Wine product traceability anti-counterfeiting system and method based on block chain | |
US8280817B2 (en) | Authentication and tracking system | |
US8421593B2 (en) | Apparatus, systems and methods for authentication of objects having multiple components | |
US10019530B2 (en) | ID tag authentication system and method | |
US8615470B2 (en) | Authentication and tracking system | |
US20180240129A1 (en) | Method and a system of electronic verification of reliability of goods introduced to the trade turnover and of transmission of data concerning the origin of goods | |
CN104835045B (en) | A kind of commodity antifake check method and system based on Internet of Things mark service | |
CN107292629A (en) | Anti-counterfeit tracking verification method based on block chain and the device using this method | |
CN104299140A (en) | Two-dimensional code anti-counterfeiting traceability system and method based on e-commerce | |
CN109583894A (en) | Offer, verification method and the device of two dimensional code | |
US8872622B2 (en) | Authentication of “source” for brands | |
EP2453398A1 (en) | Product authentication system | |
CN103123709A (en) | Bar-code-based information verification system | |
CN103824202A (en) | CPK (Combined Public Key) identification authentication technology based RFID (Radio Frequency Identification Device) and two-dimensional code composite truth-identification and anti-fake source-tracing method | |
CN105678369A (en) | Anti-counterfeiting-tag-based anti-counterfeiting method for commodity | |
US8335491B1 (en) | Mobilux system utilizing camera-equipped cellular telephones for anti-counterfeit authentication | |
CN103886469A (en) | Product two-dimension code generation and query system | |
CN104899775A (en) | Product anti-counterfeit method and product anti-counterfeit examining method as well as anti-counterfeit package | |
CN104299146A (en) | Product anti-counterfeiting inquiry system | |
CN102855577A (en) | Multiple merchandise anti-counterfeiting verification method based on cloud computing | |
JP2017527171A (en) | Send certification mark | |
US20140158754A1 (en) | Item authenticity | |
CN108082723A (en) | A kind of anti-fake bottle lid and its method of work based on CPU crypto chips | |
US20130024387A1 (en) | Systems and Methods for Tracking Assigned Code Strings | |
CN103065244A (en) | Two-dimensional barcode anti-counterfeiting, checking and service method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |