CN114664174A - Irreversible electronic lead sealing and sealing method and terminal - Google Patents

Irreversible electronic lead sealing and sealing method and terminal Download PDF

Info

Publication number
CN114664174A
CN114664174A CN202210185432.9A CN202210185432A CN114664174A CN 114664174 A CN114664174 A CN 114664174A CN 202210185432 A CN202210185432 A CN 202210185432A CN 114664174 A CN114664174 A CN 114664174A
Authority
CN
China
Prior art keywords
electronic lead
lead seal
state bit
state
current electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210185432.9A
Other languages
Chinese (zh)
Inventor
李忠明
林阿霞
吕益清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Innov Electronics Tech Co ltd
Original Assignee
Xiamen Innov Electronics Tech Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Innov Electronics Tech Co ltd filed Critical Xiamen Innov Electronics Tech Co ltd
Priority to CN202210185432.9A priority Critical patent/CN114664174A/en
Publication of CN114664174A publication Critical patent/CN114664174A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F3/03Forms or constructions of security seals
    • G09F3/0305Forms or constructions of security seals characterised by the type of seal used
    • G09F3/0329Forms or constructions of security seals characterised by the type of seal used having electronic sealing means

Abstract

The invention discloses an irreversible electronic lead seal sealing method and a terminal, wherein a first state bit is used for marking the opening and closing of an electronic lead seal, a second state bit is used for marking the actual state of the electronic lead seal, and the initial value of the second state bit is set to be unlocked; the method comprises the steps of determining a second state bit of the current electronic lead seal according to a first state bit of the current electronic lead seal and a second state bit stored last time of the current electronic lead seal, and obtaining an actual state of the current electronic lead seal.

Description

Irreversible electronic lead sealing and sealing method and terminal
Technical Field
The invention relates to the field of RFID electronic lead sealing, in particular to an irreversible electronic lead sealing method and a terminal.
Background
The existing RFID electronic lead sealing seal can be repaired manually for secondary utilization after being detached, so that the function of the lead sealing is lost. The application limitation is large, the lead seal cannot be comprehensively guaranteed not to be damaged in practical application, and particularly in the field of high-standard requirements, the existing RFID electronic lead seal cannot achieve a good anti-dismantling function and a good monitoring effect.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: an irreversible electronic lead seal sealing method and a terminal are provided, which can avoid the used electronic lead seal from being recycled or maliciously tampered.
In order to solve the technical problems, the invention adopts the technical scheme that:
an irreversible electronic lead sealing and sealing method comprises the following steps:
marking a physical state of the electronic lead seal with a first state bit, the physical state comprising open and closed;
marking an actual state of the electronic lead seal by using a second state bit, wherein the actual state comprises unlocked, locked and tampered, and an initial value of the second state bit represents that the electronic lead seal is unlocked;
and determining the second state bit of the current electronic lead seal according to the first state bit of the current electronic lead seal and the second state bit stored last time of the current electronic lead seal to obtain the actual state of the current electronic lead seal.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
an irreversible electronic lead sealing terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
marking a physical state of the electronic lead seal with a first state bit, the physical state comprising open and closed;
marking an actual state of the electronic lead seal by using a second state bit, wherein the actual state comprises unlocked, locked and tampered, and an initial value of the second state bit represents unlocked;
and determining the second state bit of the current electronic lead seal according to the first state bit of the current electronic lead seal and the second state bit stored last time of the current electronic lead seal to obtain the actual state of the current electronic lead seal.
The invention has the beneficial effects that: marking the opening and closing of the electronic lead seal by using a first state bit, marking the actual state of the electronic lead seal by using a second state bit, and setting the initial value of the second state bit to be unlocked; the method comprises the steps of determining a second state bit of the current electronic lead seal according to a first state bit of the current electronic lead seal and a second state bit stored last time of the current electronic lead seal, and obtaining an actual state of the current electronic lead seal.
Drawings
Fig. 1 is a flow chart of a method for irreversible electronic lead sealing according to an embodiment of the present invention;
fig. 2 is a schematic view of an irreversible electronic lead seal terminal according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating steps of a method for irreversible electronic lead sealing according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of an online platform according to the second embodiment;
FIG. 5 is a verification diagram of the authorization verification ID of the second embodiment;
fig. 6 is a schematic diagram illustrating the locked electronic lead seal obtained by verification in the second embodiment;
fig. 7 is a schematic diagram of the second embodiment illustrating that the electronic lead seal is verified to be tampered;
FIG. 8 is a verification diagram of the authorization verification token in an offline state;
fig. 9 is a schematic diagram of the locked electronic lead seal verified in an off-line state;
fig. 10 is a schematic diagram of an electronic lead seal verified in an off-line state to be tampered;
description of reference numerals:
1. an irreversible electronic lead seal terminal; 2. a memory; 3. a processor.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Referring to fig. 1 and fig. 3, an embodiment of the invention provides an irreversible electronic lead sealing method, including the steps of:
marking a physical state of the electronic lead seal with a first state bit, the physical state comprising open and closed;
marking an actual state of the electronic lead seal by using a second state bit, wherein the actual state comprises unlocked, locked and tampered, and an initial value of the second state bit represents unlocked;
and determining the second state bit of the current electronic lead seal according to the first state bit of the current electronic lead seal and the second state bit stored last time of the current electronic lead seal to obtain the actual state of the current electronic lead seal.
As can be seen from the above description, the beneficial effects of the present invention are: marking the opening and closing of the electronic lead seal by using a first state bit, marking the actual state of the electronic lead seal by using a second state bit, and setting the initial value of the second state bit to be unlocked; the method comprises the steps of determining a second state bit of the current electronic lead seal according to a first state bit of the current electronic lead seal and a second state bit stored last time of the current electronic lead seal, and obtaining an actual state of the current electronic lead seal.
Further, the method comprises, before the first status bit according to the current electronic lead seal and the last stored second status bit of the current electronic lead seal:
and reading an authorized verification identifier of the electronic lead seal, and judging whether the authorized verification identifier can be inquired, wherein if yes, the electronic lead seal is true, otherwise, the electronic lead seal is fake, and the actual state of the electronic lead seal is not judged.
According to the description, the electronic lead seal is searched according to the authorization verification identification of the electronic lead seal, whether the electronic lead seal is real or not is identified, and the safety of electronic lead seal verification is improved.
Further, the marking the actual state of the electronic lead seal by using the second state bit includes:
if the second state bit is stored in the electronic lead seal, encrypting the second state bit of the electronic lead seal;
and if the second state bit is stored in the database, determining whether to encrypt the second state bit of the electronic lead seal according to the security requirement of the electronic lead seal.
As can be seen from the above description, when the second status bit is stored in the electronic lead seal, the second status bit needs to be encrypted to prevent the second status bit in the electronic lead seal from being tampered; when the second state bit is stored in the database, the second state bit determines whether encryption is needed according to the safety requirement of the electronic lead seal, so that the safety of the electronic lead seal is ensured.
Further, the determining the second state bit of the current electronic lead seal according to the first state bit of the current electronic lead seal and the second state bit stored last time of the current electronic lead seal to obtain the actual state of the current electronic lead seal includes:
if the first state bit of the current electronic lead seal represents disconnection and the second state bit stored last time of the current electronic lead seal represents unlocking, the second state bit of the current electronic lead seal represents unlocking;
if the first state bit of the current electronic lead seal represents closed and the second state bit stored last time of the current electronic lead seal represents unlocked, the second state bit of the current electronic lead seal represents locked;
if the first state bit of the current electronic lead seal represents closed and the second state bit stored last time of the current electronic lead seal represents locked, the second state bit of the current electronic lead seal represents locked;
if the first state bit of the current electronic lead seal represents disconnection and the second state bit stored last time of the current electronic lead seal represents locking, the second state bit of the current electronic lead seal represents tampering;
and if the second state bit stored last time in the current electronic lead seal represents that the electronic lead seal is tampered, the second state bit of the current electronic lead seal represents that the electronic lead seal is tampered.
According to the description, the second state bit of the current electronic lead seal is determined by combining the first state bit of the current electronic lead seal and the second state bit stored last time of the current electronic lead seal, so that the actual state of the electronic lead seal can be quickly obtained, and the identification of the tampering state of the electronic lead seal is realized through a common chip capable of identifying the opening and closing of the electronic lead seal.
Further, still include:
carrying out online verification on the authorization verification identifier and the first state bit of the current electronic lead seal through an online platform;
or, performing offline verification on the authorization verification identifier and the first state bit of the current electronic lead seal through an authorization database;
or the authorization verification identifier and the first state bit of the current electronic lead seal are verified through an online cloud authorization database.
As can be seen from the above description, the authorization check identifier and the first status bit of the current electronic lead seal can be verified in an online or offline state, and the actual status of the subsequent electronic lead seal is determined, so that the electronic lead seal can be verified in any network state.
Referring to fig. 2, another embodiment of the present invention provides an irreversible electronic lead sealing terminal, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the following steps:
marking a physical state of the electronic lead seal with a first state bit, the physical state comprising open and closed;
marking an actual state of the electronic lead seal by using a second state bit, wherein the actual state comprises unlocked, locked and tampered, and an initial value of the second state bit represents unlocked;
and determining the second state bit of the current electronic lead seal according to the first state bit of the current electronic lead seal and the second state bit stored last time of the current electronic lead seal to obtain the actual state of the current electronic lead seal.
As can be seen from the above description, the first status bit is used to mark the opening and closing of the electronic lead seal, the second status bit is used to mark the actual status of the electronic lead seal, and the initial value of the second status bit is set to be unlocked; the method comprises the steps of determining a second state bit of the current electronic lead seal according to a first state bit of the current electronic lead seal and a second state bit stored last time of the current electronic lead seal, and obtaining an actual state of the current electronic lead seal.
Further, the method comprises, before the first status bit according to the current electronic lead seal and the last stored second status bit of the current electronic lead seal:
and reading an authorized verification identifier of the electronic lead seal, and judging whether the authorized verification identifier can be inquired, wherein if yes, the electronic lead seal is true, otherwise, the electronic lead seal is fake, and the actual state of the electronic lead seal is not judged.
According to the description, the electronic lead seal is searched according to the authorization verification identification of the electronic lead seal, whether the electronic lead seal is real or not is identified, and the safety of electronic lead seal verification is improved.
Further, the marking the actual state of the electronic lead seal by using the second state bit includes:
if the second state bit is stored in the electronic lead seal, encrypting the second state bit of the electronic lead seal;
and if the second state bit is stored in the database, determining whether to encrypt the second state bit of the electronic lead seal according to the security requirement of the electronic lead seal.
As can be seen from the above description, when the second status bit is stored in the electronic lead seal, the second status bit needs to be encrypted to prevent the second status bit in the electronic lead seal from being tampered; when the second state bit is stored in the database, the second state bit determines whether encryption is needed according to the security requirement of the electronic lead seal, so that the security of the electronic lead seal is ensured.
Further, the determining the second state bit of the current electronic lead seal according to the first state bit of the current electronic lead seal and the second state bit stored last time of the current electronic lead seal to obtain the actual state of the current electronic lead seal includes:
if the first state bit of the current electronic lead seal represents disconnection and the second state bit stored last time of the current electronic lead seal represents unlocking, the second state bit of the current electronic lead seal represents unlocking;
if the first state bit of the current electronic lead seal represents closed and the second state bit stored last time of the current electronic lead seal represents unlocked, the second state bit of the current electronic lead seal represents locked;
if the first state bit of the current electronic lead seal represents closed and the second state bit stored last time of the current electronic lead seal represents locked, the second state bit of the current electronic lead seal represents locked;
if the first state bit of the current electronic lead seal represents disconnection and the second state bit stored last time of the current electronic lead seal represents locking, the second state bit of the current electronic lead seal represents tampering;
and if the second state bit stored last time in the current electronic lead seal represents that the electronic lead seal is tampered, the second state bit of the current electronic lead seal represents that the electronic lead seal is tampered.
According to the description, the second state bit of the current electronic lead seal is determined by combining the first state bit of the current electronic lead seal and the second state bit stored last time of the current electronic lead seal, so that the actual state of the electronic lead seal can be quickly obtained, and the identification of the tampering state of the electronic lead seal is realized through a common chip which can distinguish the open state and the closed state of the electronic lead seal.
Further, still include:
carrying out online verification on the authorization verification identifier and the first state bit of the current electronic lead seal through an online platform;
or, performing offline verification on the authorization verification identifier and the first state bit of the current electronic lead seal through an authorization database;
or, the authorization verification identifier and the first status bit of the current electronic lead seal are verified through an online cloud authorization database.
As can be seen from the above description, the authorization check identifier and the first status bit of the current electronic lead seal can be verified in an online or offline state, and the actual status of the subsequent electronic lead seal is determined, so that the electronic lead seal can be verified in any network state.
The above-mentioned irreversible electronic lead sealing method and terminal of the present invention are suitable for determining the actual state of the electronic lead seal in various network states, and can avoid the used electronic lead seal from being recycled or maliciously tampered, and the following description is made by specific embodiments:
example one
Referring to fig. 1 and 3, an irreversible electronic lead sealing method includes the steps of:
and S1, marking the physical state of the electronic lead seal by using the first state bit, wherein the physical state comprises opening and closing.
Specifically, in this embodiment, the first state bit is a pointer state bit, and the adopted hardware must require that the RFID chip has a GPIO pointer state bit function with 2 states, namely open and closed.
The product can be in any form, such as different product forms of a steel wire type lead seal, a wire connection type lead seal, a socket type lead seal and the like, and is characterized in that before the product is used, the connection Loop between the Tamper and the GND of the chip is Open and disconnected, when the seal is used, the Loop connection between the Tamper and the GND is Closed, and when the seal is removed, the connection between the Tamper and the GND is Open and disconnected.
Since the pointer status bit codes of different types of RFID chips are different, the temporary column of the present embodiment describes the pointer status bit: one is a chip with model number NXP G2IL +/G2IM +, Tamper-0040 represents open, and Tamper-8040/C040/4040 represents closed; the other is a chip with model number VBL CAB0/CAB1/VBL7, wherein Tamper-B0 FF represents open, and Tamper-B000 represents closed.
Thus, electronic lead seals for other chip types can simply modify the Tamper parameters to achieve the same effect.
And S2, marking the actual state of the electronic lead seal by using a second state bit, wherein the actual state comprises unlocked, locked and tampered, and the initial value of the second state bit is represented as unlocked.
Specifically, in this embodiment, the second state bit is a tamp bit state bit, which implements state quantity extension of the Tamper state bit, where tamp bit is 0/1/2, which respectively represents that the actual state is unlocked (unlocked)/locked (locked)/tampered (tamped), and the initial value of tamp bit is 0.
And S3, determining the second state bit of the current electronic lead seal according to the first state bit of the current electronic lead seal and the second state bit stored last time of the current electronic lead seal, and obtaining the actual state of the current electronic lead seal.
Specifically, in one embodiment, the TamperBit state bit of the last RFID electronic lead seal is encrypted and recorded in a chip of the electronic lead seal; in another embodiment, the TamperBit status bit of the last RFID electronic lead seal may be encrypted or not encrypted and then recorded in the database according to the security requirements of signing the lead seal. And judging the current actual state of the electronic lead seal by combining the physical Tamper state characteristics of the chip of the current electronic lead seal so as to confirm whether the lead seal is tampered or recycled.
Example two
Referring to fig. 4 to 7, a difference between the present embodiment and the first embodiment is that an application scenario for determining the electronic lead sealing state on line is provided, specifically:
when the Platform determines the electronic lead sealing state on line, an RFID lead sealing label including a pointer function, APP software and a Platform on-line authorization management Platform are required to be used. The platform server program can be common ASP, PHP and Think-PHP, the database matched with the platform can select ACCESS/MySQL, the unique TID/UID/EPC identification of the RFID electronic lead seal is led into the platform system database for authorization verification, and the real-time monitoring management of the lead seal use state is realized by matching with a TamperBit latching flag bit (0/1/2 respectively represents unlock/latched/sampled), and the visiws ACCESS Counter Visit Counter, and the detailed design description is as follows:
first, referring to fig. 4, before using the electronic lead seal, authorization authentication needs to be performed on the platform according to the TID/UID/EPC, and the latch status bit tamverbit is initialized to 0, which represents a completely new unused electronic lead seal.
Secondly, referring to fig. 5, when reading the electronic lead seal by the APP, the TID/UID/EPC and pointer data of the lead seal need to be read, then the 2 parameters are authorized and verified through the online platform to determine whether the electronic lead seal is true REAL or FAKE, and finally the APP generates a complete website link and displays the website link in the APP or WEB browser interface, where the website format is: domain name website + parameter, in this embodiment the website is: "http:// check. rf idtag world. com/index. htmlTID. xxxxx & Tamper. xxxx".
Further, the real authorized RFID electronic lead seal, along with the locking of the lead seal, is applied to supervision and frequent inspection of lead seal state detection at different time points in links such as logistics, transfer, circulation, receipt and inspection of goods, so as to prevent the electronic lead seal from being tampered, and the specific method for determining the actual state of the electronic lead seal at present is as follows:
1) when Tamper is B0FF (off), TamperBit is 0, representing UNLOCKED;
2) when the pointer is B000 (closed) and the pointer bit is 0, it represents that the lead seal is LOCKED, and at this time, it needs to synchronously change the pointer latch flag in the platform to 1, which represents that the platform is LOCKED;
3) when the Tamper is B000 (closed), and the TamperBit is 1, it represents that the lead-sealed LOCKED is checked for multiple times;
4) when the Tamper is B0FF (disconnected), the TamperBit is 1, which represents that the lead seal LOCKED is cut off later, i.e. represents that the lead seal is TAMPERED, and in order to prevent the lead seal from being used by malicious repair and tampering after being cut off, the TamperBit latch identifier in the platform needs to be synchronously changed to 2, which represents that the lead seal has been TAMPERED;
5) when the Tamper is B000 (closed), and the TamperBit is 2, the lead seal TAMPERED is repaired for use later, and the Tamper is secondarily TAMPERED with TAMPERED-TRIES;
6) when the Tamper is B0FF (off) and the TamperBit is 2, the sealed tamped-TRIES is cut again later, or the TaMPERED-TRIES are multiple tampering attempts.
EXAMPLE III
Referring to fig. 8 to 10, the difference between the present embodiment and the first and second embodiments is that an application scenario for determining the electronic lead sealing state offline is provided, specifically:
when the electronic lead sealing state is determined off-line, an RFID lead sealing label including a pointer function, APP software and an authorization database are required to be used. By reading the unique TID/UID/EPC of the RFID electronic lead seal, then comparing and checking in an authorized database, confirming whether the electronic lead seal is FAKE with FAKE or REAL with REAL, and simultaneously matching with a tampBit latch identification bit 0/1/2 respectively representing unlocked/latched/stamped to ensure that the latch identification bit format can adopt 0000, 0001 and 0002 to replace 0/1/2 in consideration of the operation convenience of a chip register so as to realize the REAL-time monitoring and management of the use state of the lead seal, and the detailed design description is as follows:
firstly, when the RFID electronic lead seal is authorized, the chip TamperBit register needs to be initialized to 0000, and meanwhile, the TID/UID/EPC of the electronic lead seal after initialization is created and generated to be an authorization database, so that the authenticity can be checked when the APP is used, and the encryption algorithm processing can be allowed.
Next, referring to fig. 8, when the APP reads the electronic lead seal, it needs to read TID/UID/EPC data, Tamper data, and TamperBit latch data of the RFID electronic lead seal. And then comparing the authorization database to confirm whether the electronic lead seal is REAL REAL or faKE.
Further, the method for judging the actual state of the current electronic lead sealing is the same as the online electronic lead sealing scheme. Real and authorized RFID electronic lead seal is also applied to supervision and frequent inspection of lead seal state detection at different time points in the links of logistics, transfer, circulation process, cargo signing and inspection and the like along with the locking of the lead seal, so that the lead seal is prevented from being distorted.
Example four
The difference between the present embodiment and the first to third embodiments is that an application scenario for determining the electronic lead sealing state by offline online combination is provided, specifically:
when the electronic lead sealing state is determined, an RFID lead sealing label with a pointer function, APP software and a cloud online authorization database are required to be used. By reading the unique TID/UID/EPC identification of the RFID electronic lead seal, comparison and verification are carried out in an online authorization database, whether the electronic lead seal is FAKE with FAKE or REAL with REAL is confirmed, meanwhile, a TamperBit latch identification bit 0/1/2 respectively representing unlock/latched/stamped is matched, and in consideration of the operation convenience of a chip register, the latch identification bit format can suggest to adopt 0000, 0001 and 0002 to replace 0/1/2, so as to realize the REAL-time monitoring and management of the use state of the lead seal, and the detailed design description is as follows:
firstly, referring to fig. 8, when the RFID electronic lead seal is authorized, the chip TamperBit register needs to be initialized to 0000, and the TID/UID/EPC of the electronic lead seal is initialized at the same time to generate the cloud online authorization database, so as to check authenticity when the APP is used, and allow encryption algorithm processing.
Secondly, when the APP reads the electronic lead seal, the TID/UID/EPC data, the Tamper data and the TamperBit latch data of the RFID electronic lead seal need to be read. And then, comparing by calling an online authorization database at the cloud end to confirm whether the electronic lead seal is a REAL REAL or FAKE FAKE.
Further, the current method for judging the actual state of the electronic lead seal is the same as the off-line electronic lead seal scheme. Real and authorized RFID electronic lead seal is also applied to supervision and frequent inspection of lead seal state detection at different time points in the links of logistics, transfer, circulation process, cargo signing and inspection and the like along with the locking of the lead seal, so that the lead seal is prevented from being distorted. The logic process is completely the same as that of an off-line electronic lead seal.
EXAMPLE five
Referring to fig. 2, an irreversible electronic lead sealing terminal 1 includes a memory 2, a processor 3, and a computer program stored on the memory 2 and executable on the processor 3, where the processor 3 implements the steps of an irreversible electronic lead sealing method according to one to four embodiments when executing the computer program.
In summary, according to the irreversible electronic lead seal sealing method and terminal provided by the present invention, the first status bit is used to mark the opening and closing of the electronic lead seal, the second status bit is used to mark the actual status of the electronic lead seal, and the initial value of the second status bit is set to be unlocked; firstly, searching according to an authorized verification identifier of the electronic lead seal, and identifying whether the electronic lead seal is real or not, so that the safety of electronic lead seal verification is improved; and then, according to the first state bit of the current electronic lead seal and the second state bit stored last time of the current electronic lead seal, determining the second state bit of the current electronic lead seal to obtain the actual state of the current electronic lead seal, so that the identification of the tampering state of the electronic lead seal is realized through a common chip capable of identifying the opening and closing of the electronic lead seal, the irreversible electronic lead seal is realized, and the used electronic lead seal is prevented from being recycled or maliciously tampered. And the authorization verification identifier and the first state bit of the current electronic lead seal can be verified in an online or offline state, and the actual state of the subsequent electronic lead seal is determined, so that the electronic lead seal can be verified in any network state.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (10)

1. An irreversible electronic lead sealing method is characterized by comprising the following steps:
marking a physical state of the electronic lead seal with a first state bit, the physical state comprising open and closed;
marking an actual state of the electronic lead seal by using a second state bit, wherein the actual state comprises unlocked, locked and tampered, and an initial value of the second state bit represents unlocked;
and determining the second state bit of the current electronic lead seal according to the first state bit of the current electronic lead seal and the second state bit stored last time of the current electronic lead seal to obtain the actual state of the current electronic lead seal.
2. The irreversible electronic lead sealing and sealing method as claimed in claim 1, wherein the first status bit according to the current electronic lead seal and the second status bit stored last time on the current electronic lead seal are preceded by:
and reading an authorized verification identifier of the electronic lead seal, and judging whether the authorized verification identifier can be inquired, wherein if yes, the electronic lead seal is true, otherwise, the electronic lead seal is fake, and the actual state of the electronic lead seal is not judged.
3. The irreversible electronic lead sealing and sealing method as claimed in claim 1, wherein the step of marking the actual state of the electronic lead seal with the second state bit comprises:
if the second state bit is stored in the electronic lead seal, encrypting the second state bit of the electronic lead seal;
and if the second state bit is stored in the database, determining whether to encrypt the second state bit of the electronic lead seal according to the security requirement of the electronic lead seal.
4. The irreversible electronic lead sealing and labeling method according to claim 1, wherein the determining the second status bit of the current electronic lead seal according to the first status bit of the current electronic lead seal and the second status bit stored last time of the current electronic lead seal, and the obtaining the actual status of the current electronic lead seal comprises:
if the first state bit of the current electronic lead seal represents disconnection and the second state bit stored last time of the current electronic lead seal represents unlocking, the second state bit of the current electronic lead seal represents unlocking;
if the first state bit of the current electronic lead seal represents closed and the second state bit stored last time of the current electronic lead seal represents unlocked, the second state bit of the current electronic lead seal represents locked;
if the first state bit of the current electronic lead seal represents closed and the second state bit stored last time of the current electronic lead seal represents locked, the second state bit of the current electronic lead seal represents locked;
if the first state bit of the current electronic lead seal represents disconnection and the second state bit stored last time of the current electronic lead seal represents locking, the second state bit of the current electronic lead seal represents tampering;
and if the second state bit stored last time in the current electronic lead seal represents that the electronic lead seal is tampered, the second state bit of the current electronic lead seal represents that the electronic lead seal is tampered.
5. The irreversible electronic lead sealing and sealing method as claimed in claim 2, further comprising:
carrying out online verification on the authorization verification identifier and the first state bit of the current electronic lead seal through an online platform;
or, the authorization verification identifier and the first state bit of the current electronic lead seal pass through an authorization database to be subjected to offline verification;
or the authorization verification identifier and the first state bit of the current electronic lead seal are verified through an online cloud authorization database.
6. An irreversible electronic lead sealing and sealing terminal, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the following steps when executing the computer program:
marking a physical state of the electronic lead seal with a first state bit, wherein the physical state comprises opening and closing;
marking an actual state of the electronic lead seal by using a second state bit, wherein the actual state comprises unlocked, locked and tampered, and an initial value of the second state bit represents unlocked;
and determining the second state bit of the current electronic lead seal according to the first state bit of the current electronic lead seal and the second state bit stored last time of the current electronic lead seal to obtain the actual state of the current electronic lead seal.
7. The irreversible electronic lead seal terminal of claim 6, wherein the first status bit according to the current electronic lead seal and the second status bit stored last time on the current electronic lead seal are preceded by:
and reading an authorized verification identifier of the electronic lead seal, and judging whether the authorized verification identifier can be inquired, wherein if yes, the electronic lead seal is true, otherwise, the electronic lead seal is fake, and the actual state of the electronic lead seal is not judged.
8. The irreversible electronic lead seal terminal of claim 6, wherein the marking the actual state of the electronic lead seal with the second status bit comprises:
if the second state bit is stored in the electronic lead seal, encrypting the second state bit of the electronic lead seal;
and if the second state bit is stored in the database, determining whether to encrypt the second state bit of the electronic lead seal according to the security requirement of the electronic lead seal.
9. The terminal of claim 6, wherein the determining the second status bit of the current electronic lead seal according to the first status bit of the current electronic lead seal and the second status bit stored last time of the current electronic lead seal comprises:
if the first state bit of the current electronic lead seal represents disconnection and the second state bit stored last time of the current electronic lead seal represents unlocking, the second state bit of the current electronic lead seal represents unlocking;
if the first state bit of the current electronic lead seal represents closed and the second state bit stored last time of the current electronic lead seal represents unlocked, the second state bit of the current electronic lead seal represents locked;
if the first state bit of the current electronic lead seal represents closed and the second state bit stored last time of the current electronic lead seal represents locked, the second state bit of the current electronic lead seal represents locked;
if the first state bit of the current electronic lead seal represents disconnection and the second state bit stored last time of the current electronic lead seal represents locking, the second state bit of the current electronic lead seal represents tampering;
and if the second state bit stored last time in the current electronic lead seal represents that the electronic lead seal is tampered, the second state bit of the current electronic lead seal represents that the electronic lead seal is tampered.
10. The irreversible electronic lead seal terminal of claim 7, further comprising:
carrying out online verification on the authorization verification identifier and the first state bit of the current electronic lead seal through an online platform;
or, performing offline verification on the authorization verification identifier and the first state bit of the current electronic lead seal through an authorization database;
or the authorization verification identifier and the first state bit of the current electronic lead seal are verified through an online cloud authorization database.
CN202210185432.9A 2022-02-28 2022-02-28 Irreversible electronic lead sealing and sealing method and terminal Pending CN114664174A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210185432.9A CN114664174A (en) 2022-02-28 2022-02-28 Irreversible electronic lead sealing and sealing method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210185432.9A CN114664174A (en) 2022-02-28 2022-02-28 Irreversible electronic lead sealing and sealing method and terminal

Publications (1)

Publication Number Publication Date
CN114664174A true CN114664174A (en) 2022-06-24

Family

ID=82027512

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210185432.9A Pending CN114664174A (en) 2022-02-28 2022-02-28 Irreversible electronic lead sealing and sealing method and terminal

Country Status (1)

Country Link
CN (1) CN114664174A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024065887A1 (en) * 2022-09-27 2024-04-04 厦门英诺尔信息科技有限公司 Tamper-proof electronic lead seal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180240371A1 (en) * 2017-02-17 2018-08-23 Nxp B.V. Electronic tamper detection device
US20190130714A1 (en) * 2015-05-04 2019-05-02 Noccela Oy A system, method and apparatuses for electronic article surveillance
CN110795951A (en) * 2019-10-12 2020-02-14 深圳中集智能科技有限公司 Container logistics safety information processing method and device
WO2021144035A1 (en) * 2020-01-17 2021-07-22 Stoba Ag Method for outputting a condition of at least one seal, seal and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190130714A1 (en) * 2015-05-04 2019-05-02 Noccela Oy A system, method and apparatuses for electronic article surveillance
US20180240371A1 (en) * 2017-02-17 2018-08-23 Nxp B.V. Electronic tamper detection device
CN110795951A (en) * 2019-10-12 2020-02-14 深圳中集智能科技有限公司 Container logistics safety information processing method and device
WO2021144035A1 (en) * 2020-01-17 2021-07-22 Stoba Ag Method for outputting a condition of at least one seal, seal and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024065887A1 (en) * 2022-09-27 2024-04-04 厦门英诺尔信息科技有限公司 Tamper-proof electronic lead seal

Similar Documents

Publication Publication Date Title
JP7385600B2 (en) Method and system for automatic object recognition and authentication
TWI702543B (en) Reader device for reading a marking comprising a physical unclonable function
Guin et al. Anti-counterfeit techniques: From design to resign
US8334757B2 (en) Controlling data access to and from an RFID device
DE112019001531B4 (en) Method of manufacturing an authenticated packaged product and system for verifying the authenticity of a packaged product
JP2018530806A (en) Systems and methods for asset and supply network integrity assurance
Lehtonen et al. Trust and security in RFID-based product authentication systems
US20100114780A1 (en) Workflow assurance and authentication system
US20100019026A1 (en) Product authentication system
EP2065849A1 (en) Detection of counterfeited products based on sensor measurements
CN103516520A (en) Data safe transmission system and method based on electronic tag
CN114664174A (en) Irreversible electronic lead sealing and sealing method and terminal
EP2677473A1 (en) Production method, rfid transponder, authentication method, reader device and computer program product
CN116029745A (en) Digital label anti-counterfeiting tracing method, device and system based on blockchain
US20110114718A1 (en) Secure partitioning
CN106339888A (en) RFID wine product all-round anti-fake monitoring method
CN106504007A (en) A kind of commodity counterfeit prevention management system based on NFC electronic tags
CN109886685A (en) A kind of commodity tracing system and method based on block chain
CN108694344A (en) A kind of cryptography electronic label
CN104680106A (en) Method and device for controlling safety command-based electronic seal
CN116091087A (en) Quantum encryption anti-counterfeiting tracing method and terminal based on blockchain and NFC
CN206757700U (en) A kind of false proof traceability system of logistics Means of Agricultural Production
CN108595974A (en) A kind of fast verification system of electronic product code
CN208488752U (en) A kind of cryptography electronic label
RU2814089C2 (en) Methods and systems for automatic object recognition and authenticity verification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination