CN115860037A - Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting component for gemstones and jades - Google Patents

Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting component for gemstones and jades Download PDF

Info

Publication number
CN115860037A
CN115860037A CN202310165434.6A CN202310165434A CN115860037A CN 115860037 A CN115860037 A CN 115860037A CN 202310165434 A CN202310165434 A CN 202310165434A CN 115860037 A CN115860037 A CN 115860037A
Authority
CN
China
Prior art keywords
information
terminal
binding
counterfeiting
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310165434.6A
Other languages
Chinese (zh)
Other versions
CN115860037B (en
Inventor
陈昱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Shanghai Baoyushi Trading Center Co ltd
Original Assignee
China Shanghai Baoyushi Trading Center Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Shanghai Baoyushi Trading Center Co ltd filed Critical China Shanghai Baoyushi Trading Center Co ltd
Priority to CN202310165434.6A priority Critical patent/CN115860037B/en
Publication of CN115860037A publication Critical patent/CN115860037A/en
Application granted granted Critical
Publication of CN115860037B publication Critical patent/CN115860037B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an anti-counterfeiting method, an anti-counterfeiting system and an anti-counterfeiting component of gem and jade, wherein the method comprises the steps of binding and matching two physical media of the anti-counterfeiting component and establishing binding information; setting a dynamic password lock for the physical medium based on the binding information and user information received from the terminal; verifying user information in response to a login request of a user received from a terminal; and responding to the unlocking application of the user received from the terminal, and sending a dynamic key corresponding to the dynamic coded lock and the tracing information of the gem and jade to the terminal. The system includes a matching module, an encryption module, a verification module, and a key module in communication with each other. The anti-counterfeiting component comprises two physical media, wherein the physical media comprise a substrate, a storage chip and an identification medium. The technical scheme of the invention can improve the physical security of the gem and jade in the import transportation process, and simultaneously carry out anti-counterfeiting and verification on all persons and goods in the property right by innovative encryption means, thereby realizing the comprehensive anti-counterfeiting purpose of the persons and the goods.

Description

Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting component for gemstones and jades
Technical Field
The invention relates to the technical field of gem and jade safety, in particular to an anti-counterfeiting method, an anti-counterfeiting system and an anti-counterfeiting component for gem and jade.
Background
The precious jade and jade are favored by a plurality of collectors due to high value and rarity, the traditional precious jade and jade trading market focuses on an off-line trading mode, the credit of a trader is very depended on, once a credit of one party is defective in a trading link, the precious jade and jade trading is caused to be risky, and the precious jade and jade are stolen or mistakenly circulated.
Therefore, the traditional mode of maintaining the safety of the gem and jade trade by relying on credit trust between people is easy to cause the participation aspect of the trade to face larger trade risk, the mode of maintaining the safety of the trade by relying on credit can be replaced by the application of the information security technology, the safety of the gem and jade trade is separated from the credit, an electronic key is provided for the gem and jade in a digital encryption mode, the participant of the gem and jade trade can be helped to identify the wrong participant in time, the occurrence of stolen or wrong circulation of the gem and jade is avoided, and the safety of the gem and jade trade is improved.
The information security technology applied to the gem and jade transaction security is mainly a product anti-counterfeiting tracing technology, an encrypted digital signature is generated by distributing a key and dynamic coding, the digital signature and the product anti-counterfeiting tracing information of the gem and jade are associated one by one and are written into an RFID (Radio Frequency Identification) tag carried by a product together, and a security card carrying the RFID tag is generally used as an entity anti-counterfeiting device. When the gem and jade trade is carried out, the participator can carry out anti-counterfeiting tracing and checking request on the gem and jade through the digital signature in the RFID of the privacy card, only if the system checks that the digital signature passes through, the participator can inquire the anti-counterfeiting tracing information of the gem and jade product, otherwise, the participator is rejected, and therefore the safety of the gem and jade trade is greatly improved.
However, the RFID technology can not completely prevent the occurrence of security risks in gem and jade transactions, along with the development of scientific technology, more and more decryption technologies can be used for decrypting security systems established by the RFID technology, and the problems of easy duplication, slightly single encryption form and content existing in the RFID technology are gradually exposed, so that a digital signature encrypted by the RFID technology is easily decrypted, and the reliability of independently confirming the legal identity of a user from a privacy card is also weak. Therefore, the RFID technology is increasingly difficult to ensure the security of gem and jade transactions with increasingly complex shapes.
Disclosure of Invention
One of the purposes of the present invention is to overcome the defects in the prior art, and to solve the problems of easy duplication and cracking of the gem and jade encryption technology and weak reliability of the entity anti-counterfeiting equipment in the prior art, provide an anti-counterfeiting method, an anti-counterfeiting system and an anti-counterfeiting component for gem and jade.
In order to achieve the above purpose, the invention is realized by the following technical scheme:
in a first aspect, the invention provides an anti-counterfeiting method for gem and jade, which comprises the following steps:
binding and matching two physical media of the anti-counterfeiting component to establish binding information;
setting a dynamic password lock for the physical medium based on the binding information and user information received from a terminal;
verifying user information in response to a login request of a user received from a terminal;
and responding to an unlocking application of a user received from a terminal, and sending a dynamic key corresponding to the dynamic coded lock and tracing information of the gem and jade to the terminal.
In a preferred embodiment of the present application, the binding and matching of two physical media of the anti-counterfeiting component to establish binding information specifically includes:
writing the tracing information of the gem and jade into two physical media of the anti-counterfeiting component;
binding and matching the two physical media according to the tracing information and the media information of the physical media;
and establishing and recording binding information of the two physical media according to the result of the binding matching.
In a preferred embodiment of the present application, in setting a dynamic password lock for the physical medium based on the binding information and user information received from the terminal, the method specifically includes:
acquiring user information;
the trace back information and the medium information read from the physical medium;
generating a dynamic coded lock of the physical medium based on the tracing information, the medium information, the user information and the binding information;
writing the dynamic password lock into the physical medium.
In a preferred embodiment of the present application, after the reading of the trace back information and the medium information from the physical medium, the method further includes:
and updating the dynamic coded lock of the physical medium to be a new dynamic coded lock based on the tracing information, the medium information, the user information and the binding information.
In a preferred embodiment of the present application, in responding to a login request of a user received from a terminal, verifying user information specifically includes:
receiving a login request of a user from a terminal, and acquiring login information of the user;
carrying out identity verification and authority verification on the login information;
and after the identity verification and the authority verification are passed, sending confirmation permission to the terminal.
In a preferred embodiment of the present application, after the identity check and the permission check both pass, and after sending a confirmation permission to the terminal, the method further includes:
receiving an identification request of a user for the two physical media from a terminal, and acquiring the binding condition of the two physical media;
based on the binding information, carrying out binding check on the binding condition;
and after the binding check is passed, sending confirmation permission to the terminal.
In a preferred embodiment of the present application, in responding to an unlocking application of a user received from a terminal, sending a dynamic key corresponding to the dynamic password lock and tracing information of gem and jade to the terminal, specifically, the method includes:
receiving an unlocking application of a user from a terminal;
generating a dynamic key corresponding to the dynamic coded lock according to the unlocking application;
sending the dynamic key to the terminal;
unlocking the dynamic secret key and the dynamic coded lock through the terminal;
after receiving a result of successful unlocking from a terminal, sending tracing information of the gem and jade to the terminal;
and displaying the tracing information through the terminal.
In a second aspect, the invention provides an anti-counterfeiting system for gem and jade, which comprises a matching module, an encryption module, a verification module and a key module, wherein the matching module, the encryption module, the verification module and the key module are communicated with each other;
the matching module is used for binding and matching two physical media of the anti-counterfeiting component to establish binding information;
the encryption module is used for setting a dynamic coded lock for the physical medium based on the binding information and user information received from a terminal;
the verification module is used for responding to a login request of a user received from a terminal and verifying user information;
and the key module is used for responding to an unlocking application of a user received from a terminal and sending a dynamic key corresponding to the dynamic coded lock and the tracing information of the gem and jade to the terminal.
In a preferred embodiment of the present application, the matching module is specifically configured to:
writing the tracing information of the gem and jade into two physical media of the anti-counterfeiting component;
binding and matching the two physical media according to the tracing information and the media information of the physical media;
and establishing and recording binding information of the two physical media according to the result of the binding matching.
In a preferred embodiment of the present application, the encryption module is specifically configured to:
acquiring user information;
the trace back information and the medium information read from the physical medium;
generating a dynamic coded lock of the physical medium based on the tracing information, the medium information, the user information and the binding information;
writing the dynamic password lock into the physical medium.
In a preferred embodiment of the present application, the encryption module is further specifically configured to:
and updating the dynamic coded lock of the physical medium to be a new dynamic coded lock based on the tracing information, the medium information, the user information and the binding information.
In a preferred embodiment of the present application, the verification module is specifically configured to:
receiving a login request of a user from a terminal, and acquiring login information of the user;
carrying out identity verification and authority verification on the login information;
and after the identity check and the authority check are passed, sending confirmation permission to the terminal.
In a preferred embodiment of the present application, the verification module is further specifically configured to:
receiving an identification request of a user for the two physical media from a terminal, and acquiring the binding condition of the two physical media;
based on the binding information, carrying out binding check on the binding condition;
and after the binding check is passed, sending a confirmation permission to the terminal.
In a preferred embodiment of the present application, the key module is specifically configured to:
receiving an unlocking application of a user from a terminal;
generating a dynamic key corresponding to the dynamic coded lock according to the unlocking application;
sending the dynamic key to the terminal;
unlocking the dynamic secret key and the dynamic coded lock through the terminal;
after receiving a result of successful unlocking from a terminal, sending tracing information of the gem and jade to the terminal;
and displaying the tracing information through the terminal.
In a third aspect, the invention provides an anti-counterfeiting component for gem and jade, which comprises two physical media, wherein the physical media comprise a substrate, a storage chip and an identification medium, the storage chip is arranged in the substrate, the identification medium is arranged on the surface of the substrate, and the identification medium and the storage chip execute the anti-counterfeiting method for gem and jade in the first aspect through the anti-counterfeiting system for gem and jade in the second aspect;
the memory chip is used for storing the tracing information of the gem and jade, the medium information of the physical medium and the dynamic coded lock generated by the anti-counterfeiting system of the gem and jade in the second aspect;
the identification medium is used for identifying login requests and unlocking applications from users at the terminal and verifying binding information of the two physical media.
In a preferred embodiment of the present application, each of the memory chips stores therein a half code segment of the dynamic password lock, and when the two physical media are bound together, the two half code segments form the dynamic password lock.
In a preferred embodiment of the present application, the physical medium is a security card or a security box.
In a preferred embodiment of the present application, the memory chip is a physically unclonable chip.
In a fourth aspect, the present invention provides a computer-readable storage medium having stored therein a computer program which, when run on a computer, causes the computer to execute the method for preventing forgery of a gem and jade according to the first aspect.
In a fifth aspect, the present invention provides a computer program product comprising a computer program which, when run on a computer, causes the computer to perform the method for preventing forgery of a gem and jade according to the first aspect.
The anti-counterfeiting method, the anti-counterfeiting system and the anti-counterfeiting component of the gem and jade disclosed by the invention can improve the physical security of the gem and jade in the import transportation process, and can simultaneously perform anti-counterfeiting and verification on all persons and goods in the property right by innovative encryption means, thereby realizing the comprehensive anti-counterfeiting purpose of the persons and the goods.
Drawings
The invention is described with the aid of the following figures:
FIG. 1 is a flowchart of an anti-counterfeit method for gem and jade in example 1 of the present invention;
FIG. 2 is a flowchart illustrating Step100 in the method for preventing forgery of gem and jade in example 1 of the present invention;
FIG. 3 is a flowchart illustrating the details of Step200 in the method for preventing forgery of gem and jade according to example 1 of the present invention;
FIG. 4 is another detailed flowchart of Step200 in the method for preventing forgery of gem and jade according to example 1 of the present invention;
FIG. 5 is a flowchart illustrating the details of Step300 in the method for preventing forgery of gem and jade according to example 1 of the present invention;
FIG. 6 is another detailed flowchart of Step300 in the method for preventing forgery of gem and jade according to embodiment 1 of the present invention;
FIG. 7 is a flowchart illustrating Step400 in the method for preventing forgery of gem and jade according to example 1 of the present invention;
FIG. 8 is a schematic block diagram of an anti-counterfeit system for gem and jade in accordance with embodiment 2 of the present invention;
fig. 9 is a schematic structural view of an anti-counterfeiting component of the gem and jade in embodiment 3 of the invention.
Reference numerals are as follows:
10-an anti-counterfeiting system; 11-a matching module; 12-an encryption module; 13-a check module; 14-a key module; 20-a security component; 21-a physical medium; 22-a substrate; 23-a memory chip; 24-identification media; 30-terminal.
Detailed Description
For better understanding of the technical solutions of the present application, the following detailed descriptions of the embodiments of the present application are provided with reference to the accompanying drawings.
It should be understood that the embodiments described are only a few embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The invention provides an anti-counterfeiting method, an anti-counterfeiting system and an anti-counterfeiting component, wherein a common RFID encryption technology on the market is changed, a dynamic password lock is arranged for each physical medium (carrier) for storing tracing information of the gem and jade, a dynamic key matched with the dynamic password lock is dynamically generated, the used dynamic encryption rule is an encryption form of randomly combining and encrypting various information related to the physical medium and the gem and jade, and the dynamic password lock and the dynamic key are updated and cannot be copied every time an unlocking operation is carried out. The verification of the user identity also has strict rules, and the defects of easy information copying, single encryption form and content, easy cracking and weak reliability in verifying the legal identity of the user existing in the prior RFID technology are overcome. The invention realizes the anti-counterfeiting means for verifying and identifying the authenticity by combining people and objects through the association and binding relations between carriers of the tracing information of the gemstones and the carriers and between the carriers and the system.
Example 1
The embodiment 1 of the invention discloses an anti-counterfeiting method of gem and jade, which is characterized in that the tracing information of the gem and jade stored in an anti-counterfeiting component is encrypted, when a user uses a terminal to inquire the tracing information of the gem and jade, the identity of the user is verified through the matching of the terminal and the anti-counterfeiting component, and the tracing information is obtained through the verification and unlocking authority of the user, so that the anti-counterfeiting purpose is realized.
Referring to fig. 1, the method includes:
step100: and binding and matching the two physical media of the anti-counterfeiting component to establish binding information.
In Step100, two physical media are bound together one to one, an anti-counterfeiting defense line is established in the anti-counterfeiting component, and the established binding information is recorded for matching verification with user information in subsequent identity verification and serving as a basis for establishing joint anti-counterfeiting between people and objects.
Step200: and setting a dynamic password lock for the physical medium based on the binding information and the user information received from the terminal.
In Step200, binding information is an anti-counterfeiting defense line established in the anti-counterfeiting component in the previous Step and is also a basis for verifying the identity of a user, so that a dynamic password lock is arranged for the anti-counterfeiting defense line, a second anti-counterfeiting defense line can be formed in the anti-counterfeiting component, an independent dynamic anti-counterfeiting mechanism which can be changed every time is formed on the first anti-counterfeiting defense line, and the problems that a single password is easy to copy and crack can be solved. The user information is information indicating the situation or information of the parties involved in the gem and jade trade, such as an Identity number of a person who is interested in participating in the gem and jade trade, a uniform social credit code of a company or an organization, or a specific ID (Identity number) set for each party in the gem and jade trade platform through a specific rule, or a combination of the two types. The dynamic coded lock is a code segment randomly generated by a dynamic encryption rule based on binding information and user information, and after a user accesses and unlocks every time, the dynamic coded lock can be changed and cannot be the same as any previous dynamic coded lock, so that the functions of non-copying and difficult cracking of a code are realized.
Step300: the user information is verified in response to a login request of the user received from the terminal.
In Step300, the login request of the user is different from the user information mentioned in the previous Step, and the login request may include partial contents of the user information, such as an individual identification number, a unified social credit code of a business or an organization, and the like, and may also include account information or other information of the user using the gem and jade trading platform. In the step, the verification of the user information is mainly used for verifying the authenticity of the user identity, whether the user is related to the gem or jade to be inquired and the like.
Step400: and responding to an unlocking application of the user received from the terminal, and sending a dynamic key corresponding to the dynamic coded lock and the tracing information of the gem and jade to the terminal.
In Step400, the unlocking request of the user is different from the login request of the previous Step, the unlocking request is only an instruction sent by the user from the terminal, the user obtains the permission to send the unlocking request after the user information is verified to be qualified, the instruction of the unlocking request is sent when the user wants to acquire the tracing information of the gem and jade, the dynamic key for unlocking the dynamic coded lock can be obtained, and the user can see the tracing information of the gem and jade after the terminal completes the unlocking operation. The dynamic password and the tracing information of the gem and jade can be simultaneously sent to the terminal and can also be respectively sent to the terminal.
Referring to fig. 2, in the anti-counterfeiting method according to this embodiment 1, step100 specifically includes:
step101: writing the tracing information of the gem and jade into two physical media of the anti-counterfeiting component;
step102: binding and matching the two physical media according to the tracing information and the media information of the physical media;
step103: and establishing and recording binding information of the two physical media according to the result of the binding matching.
Step101 and Step102 may be completed by a customized device having a read-write function and a matching function, or may be completed by a system executing an anti-counterfeiting method. The physical medium has a storage section for storing contents, such as a chip, a memory, etc., and the trace-back information is written into the storage section, which also stores medium information representing the physical medium. The tracing information of the gem and jade comprises the producing area, the attribute, the transaction node information, the processing condition information, the logistics transportation information and the like of the gem and jade. The trace back information may be recorded in only one physical medium or may be recorded in two physical media. The media information includes the number, specification, model, etc. of the physical media in the warehouse or batch. When Step102 is executed, binding and matching are carried out on various contents in the tracing information and the medium information according to a preset matching rule, the matching rule can correlate the contents in the tracing information and the medium information to form a unique one-to-one binding corresponding relation, so that when the anti-counterfeiting component is used, the binding of two physical media has uniqueness, and the anti-counterfeiting component cannot be confused with other physical media. When Step103 is executed, the binding matching result obtained at Step102 is changed into binding information which can be identified by a computer according to a preset information generation rule, wherein the binding information can be a specific combination of numbers or letters, can represent two physical media of the binding and has uniqueness.
Referring to fig. 3, in the anti-counterfeiting method according to the embodiment 1, step200 specifically includes:
step201: acquiring user information;
step202: the tracing information and the medium information read from the physical medium;
step203: generating a dynamic coded lock of the physical medium based on the tracing information, the medium information, the user information and the binding information;
step204: and writing the dynamic password lock into the physical medium.
When Step201 is executed, the user information can be obtained from the terminal of the user, the user information can be recorded when the user uses the terminal for the first time, and the user information can be called from the database in which the information of the gem and jade trading participants is stored when the user uses the terminal subsequently. When Step202 is executed, the contents of the trace-back information and the medium information in the storage unit are not changed by reading, and the read trace-back information may be all or part of the contents, several items of contents may be designated to be read, or several items of contents may be randomly read. When Step203 is executed, the acquired tracing information, medium information, user information and binding information are subjected to regular fusion and conversion through a dynamic encryption rule to form a unique and unique code, and the unique and unique code is stored in a storage component of a physical medium through Step 204. The dynamic coded lock is bound with two physical media, the keys of other anti-counterfeiting components cannot open the dynamic coded lock, and the keys of the anti-counterfeiting components cannot open other dynamic coded locks.
Referring to fig. 4, in the anti-counterfeiting method according to embodiment 1, after Step202 is executed, the method further includes:
step205: and updating the dynamic coded lock of the physical medium to a new dynamic coded lock based on the tracing information, the medium information, the user information and the binding information.
After the tracing information and the medium information are successfully read from the storage part of the physical medium, the dynamic coded lock in the physical medium is automatically updated, the original dynamic coded lock is abandoned, and the new dynamic coded lock is enabled. Therefore, the secret key which can unlock the original dynamic coded lock is also abandoned, the new dynamic coded lock cannot be unlocked, the new dynamic coded lock also keeps uniqueness and uniqueness, the secret key can be unlocked only through the new secret key, the secret keys of other anti-counterfeiting components cannot unlock the new dynamic coded lock of the anti-counterfeiting component, and the new secret key cannot unlock the dynamic coded lock of other anti-counterfeiting components.
Referring to fig. 5, in the anti-counterfeiting method according to this embodiment 1, step300 specifically includes:
step301: receiving a login request of a user from a terminal, and acquiring login information of the user;
step302: carrying out identity verification and authority verification on the login information;
step303: and after the identity verification and the authority verification are passed, sending confirmation permission to the terminal.
When Step301 is executed, a user usually uses a terminal login system to submit a login request, where the login request includes login information, and the login information mainly includes basic information, identity information, authority information, and the like of the user. When Step302 is executed, the identity verification is the first Step of verification and is used for verifying whether the identity information of the user is legal and compliant and meets the identity requirements of the gem and jade participants, and the authority verification is the second Step of verification and is used for verifying whether the authority information of the user reaches the qualification of accessing the system and inquiring the tracing information of the gem and jade. And finally, executing Step303 to finish the anti-counterfeiting process of the human body.
Referring to fig. 6, in the anti-counterfeiting method according to embodiment 1, after Step303 is executed, the method further includes:
step304: receiving an identification request of a user for two physical media from a terminal, and acquiring the binding condition of the two physical media;
step305: based on the binding information, carrying out binding check on the binding condition;
step306: and after the binding check is passed, sending confirmation permission to the terminal.
Wherein, after finishing the anti-counterfeiting of people, the combined anti-counterfeiting of people and objects is continuously carried out. When Step304 is executed, a user uses a terminal to communicate with two physical media in the anti-counterfeiting component firstly, the communication mode can be Bluetooth, a wireless network or code scanning and the like, after the terminal is connected with the two physical media, the terminal generates an identification request, the user uses the terminal to identify the two physical media, and the identification request comprises the binding condition of the two physical media connected with the terminal. Then Step305 is executed, binding check is carried out on the binding condition and the recorded binding information, and the binding check is a third Step check used for checking whether the two physical media are in one-to-one corresponding binding relationship in the system. And finally, executing Step306 to finish the combined anti-counterfeiting process of the person and the object.
It should be noted that, when Step305 is executed, a dynamic encryption lock for tracing information can be generated after verification is passed, the dynamic encryption lock is also encoded according to a dynamic encryption rule, and a layer is added on a given dynamic password lock to form a third anti-counterfeiting line, so that the security and the anti-counterfeiting function of the gem and jade are further enhanced.
Referring to fig. 7, in the anti-counterfeiting method according to the embodiment 1, step400 specifically includes:
step401: receiving an unlocking application of a user from a terminal;
step402: generating a dynamic key corresponding to the dynamic coded lock according to the unlocking application;
step403: sending the dynamic key to the terminal;
step404: unlocking the dynamic key and the dynamic coded lock through the terminal;
step405: after receiving a result of successful unlocking from the terminal, sending tracing information of the gem and jade to the terminal;
step406: and displaying the tracing information through the terminal.
After the three steps of checking Step301 to Step306 are completed, the user can access and inquire the tracing information of the gemstones and jades. And when Step401 is executed, the user operation terminal submits an unlocking application, wherein the unlocking application is an instruction for generating the dynamic key. When Step402 is executed, the system generates a dynamic key for unlocking the dynamic password lock generated in Step200 according to the dynamic encryption rule. If a dynamic encryption lock is generated for the tracing information when Step305 is executed, the dynamic secret key in Step402 corresponds to the dynamic encryption lock and is used for unlocking the dynamic encryption lock, and partial three anti-counterfeiting processes formed by the dynamic encryption lock on the tracing information can protect other information in the anti-counterfeiting component except the tracing information from being accessed by a user, so that the security of the anti-counterfeiting component is further enhanced. When Step403 is executed, the dynamic secret key is transmitted to the terminal through wireless communication, bluetooth and the like, and the user obtains the dynamic secret key. When Step404 is executed, the user operates the terminal to input the dynamic secret key, the matching and verification of the dynamic secret key and the dynamic password lock (or the dynamic encryption lock) are completed at the terminal, and the unlocking is completed after the verification is successful. Step405 is executed after successful unlocking, the terminal sends out a successful unlocking result and then receives the tracing information of the gem and jade, and the tracing information at the moment can be a part of the tracing information read when Step202 is executed or all the tracing information stored in the storage component. When Step406 is executed, the content of the tracing information is displayed on the interface of the terminal.
By the anti-counterfeiting method disclosed in embodiment 1, after the above steps are performed, the user with legal identity and access right qualification can query the tracing information of the gem and jade stored in the gem and jade transaction database. If the three-step verification fails due to the fact that the identity and the authority of the user or a physical medium held by the user have problems, the tracing information of the gem and the jade cannot be inquired, and therefore the anti-counterfeiting purpose is achieved.
Example 2
The embodiment 2 of the invention discloses an anti-counterfeiting system 10 for gem and jade, which is used for executing the anti-counterfeiting method disclosed in the embodiment 1, the tracing information of the gem and jade stored in the anti-counterfeiting component 20 is encrypted, when a user uses a terminal to inquire the tracing information of the gem and jade, the identity of the user is verified through the cooperation of the terminal and the anti-counterfeiting component 20, and the tracing information is obtained through unlocking authority of the user after verification, so that the anti-counterfeiting purpose is realized.
Referring to fig. 8, the anti-counterfeiting system 10 of the embodiment 2 includes a matching module 11, an encryption module 12, a verification module 13, and a key module 14, which are in communication with each other.
The matching module 11 is configured to bind and match two physical media 21 of the anti-counterfeit component 20 to establish binding information. The matching module 11 establishes an anti-counterfeiting defense line in the anti-counterfeiting component 20 by binding the two physical media 21 together one by one, and records the established binding information for matching verification with user information during subsequent identity verification, so as to be used as a basis for establishing joint anti-counterfeiting between people and objects.
The encryption module 12 is used to set a dynamic password lock for the physical medium 21 based on the binding information and the user information received from the terminal. The binding information is an anti-counterfeiting defense line established in the anti-counterfeiting component 20 in the previous step and is also a basis for verifying the identity of the user, so that the encryption module 12 sets a dynamic password lock for the anti-counterfeiting defense line, a second anti-counterfeiting defense line can be formed in the anti-counterfeiting component 20, an independent dynamic anti-counterfeiting mechanism which can be changed every time is formed on the first anti-counterfeiting defense line, and the problems that a single password is easy to copy and crack can be solved. The user information is information indicating the situation or information of the parties involved in the gem and jade trade, such as the Identity number of the person intentionally involved in the gem and jade trade, the uniform social credit code of the enterprise or the organization, or the specific ID (Identity identification number) set for each party in the gem and jade trade platform through specific rules, or the combination of the two types. The dynamic coded lock is a code segment randomly generated by a dynamic encryption rule based on binding information and user information, and after a user accesses and unlocks every time, the dynamic coded lock can be changed and cannot be the same as any previous dynamic coded lock, so that the functions of non-copying and difficult cracking of a code are realized.
The verification module 13 is configured to verify user information in response to a login request of a user received from a terminal. The login request of the user is different from the aforementioned user information, and the login request may include partial contents of the user information, such as an individual identification number, a unified social credit code of an enterprise or an organization, and the like, and may also include account information or other information of the user using the gem and jade trading platform. In the verification module 13, verification of the user information is mainly performed on the aspects of authenticity of the user identity, whether the user is related to the gem or jade to be queried, and the like.
The key module 14 is configured to send a dynamic key corresponding to the dynamic password lock and tracing information of the gem and jade to the terminal in response to an unlocking request of the user received from the terminal. The unlocking request of the user is different from the previous login request, the unlocking request is only an instruction sent by the user from the terminal, after the user information is verified to be qualified, the user obtains the permission of sending the unlocking request, the instruction of the unlocking request is sent when the user wants to know the tracing information of the gem and jade, the dynamic key for unlocking the dynamic coded lock generated by the key module 14 can be obtained, and the user can see the tracing information of the gem and jade after the terminal completes the unlocking operation. The dynamic password and the tracing information of the gem and jade can be simultaneously sent to the terminal and can also be respectively sent to the terminal.
In the anti-counterfeiting system 10 of this embodiment 2, the matching module 11 is specifically configured to: writing the tracing information of the gem and jade into two physical media 21 of the anti-counterfeiting component 20; binding and matching the two physical media 21 according to the tracing information and the media information of the physical media 21; binding information of the two physical media 21 is created and recorded according to the result of the binding matching.
The physical medium 21 has a storage unit for storing contents, such as a chip, a memory, etc., and the matching module 11 writes the trace-back information into the storage unit, which also stores medium information representing the physical medium 21. The tracing information of the gem and jade comprises the producing area, the attribute, the transaction node information, the processing condition information, the logistics transportation information and the like of the gem and jade. The trace back information may be recorded in only one physical medium 21, or may be recorded in two physical media 21. The media information includes the number, specification, model, etc. of the physical media 21 in the warehouse or batch. Then, the matching module 11 binds and matches the content in the trace back information and the media information according to a preset matching rule, and the matching rule can associate the content in the trace back information and the media information to form a unique and unique one-to-one binding correspondence, so that when the anti-counterfeiting component 20 is used, the binding of the two physical media 21 is unique and cannot be confused with other physical media 21. Then, the matching module 11 changes the previously obtained result of binding matching into binding information that can be recognized by a computer according to a preset information generation rule, wherein the binding information can be a specific combination of numbers or letters, can represent two physical media 21 of the binding and has uniqueness.
In the anti-counterfeiting system 10 of this embodiment 2, the encryption module 12 is specifically configured to: acquiring user information; trace back information and medium information read from the physical medium 21; generating a dynamic coded lock of the physical medium 21 based on the tracing information, the medium information, the user information and the binding information; the dynamic password lock is written in the physical medium 21.
The user information can be obtained from the terminal of the user, the user information can be recorded when the user uses the terminal for the first time, and the user information can be called from the database storing the information of the gem and jade trading participants when the user uses the terminal subsequently. The encryption module 12 does not change the contents of the trace-back information and the medium information in the storage unit by reading, and the read trace-back information may be all contents or part of contents, and may designate to read several contents or randomly read several contents. Then, the encryption module 12 performs regular fusion and conversion on the acquired trace back information, media information, user information and binding information through a dynamic encryption rule to form a unique and unique code, and stores the unique and unique code in the storage unit of the physical medium 21. The dynamic password lock is bound with two physical media 21, the key of other anti-counterfeiting components 20 cannot open the dynamic password lock, and the key of the anti-counterfeiting component 20 cannot open other dynamic password locks.
In the anti-counterfeiting system 10 of this embodiment 2, the encryption module 12 is further specifically configured to: the dynamic password lock of the physical medium 21 is updated to a new dynamic password lock based on the tracing information, the medium information, the user information, and the binding information.
After the encryption module 12 successfully reads the trace information and the medium information from the storage unit of the physical medium 21, the dynamic password lock in the physical medium 21 is automatically updated, the original dynamic password lock is abandoned, and the new dynamic password lock is enabled. Therefore, the secret key capable of unlocking the original dynamic password lock is also invalidated, the new dynamic password lock cannot be unlocked, the new dynamic password lock also keeps uniqueness and uniqueness, the secret key can only be unlocked through the new secret key, the secret keys of other anti-counterfeiting components 20 cannot unlock the new dynamic password lock of the anti-counterfeiting component 20, and the new secret key cannot unlock the dynamic password lock of other anti-counterfeiting components 20.
In the anti-counterfeit system 10 of this embodiment 2, the verification module 13 is specifically configured to: receiving a login request of a user from a terminal, and acquiring login information of the user; carrying out identity verification and authority verification on the login information; and after the identity verification and the authority verification are passed, sending confirmation permission to the terminal.
The user usually uses the terminal login system to submit a login request, where the login request includes login information, and the login information mainly includes basic information, identity information, and authority information of the user. Therefore, when the verification module 13 performs verification, the identity verification is a first step of verification for verifying whether the identity information of the user is legal and compliant and meets the identity requirements of the jade participant, and the authority verification is a second step of verification for verifying whether the authority information of the user reaches the qualification of accessing the system and inquiring the tracing information of the jade. And finally, after the identity verification and the authority verification are passed, the verification module 13 sends a confirmation permission to the terminal to finish the anti-counterfeiting process of the person.
In the anti-counterfeit system 10 of this embodiment 2, the verification module 13 is further specifically configured to: receiving an identification request of a user for two physical media 21 from a terminal, and acquiring the binding condition of the two physical media 21; based on the binding information, carrying out binding check on the binding condition; and after the binding check is passed, sending confirmation permission to the terminal.
After the verification module 13 finishes the human anti-counterfeiting, the human and object combined anti-counterfeiting is continuously carried out. The user uses the terminal to communicate with the two physical media 21 in the anti-counterfeiting component 20 first, the communication mode can be bluetooth, wireless network or code scanning, etc., after the connection is formed between the terminal and the two physical media 21, the terminal generates an identification request, the user uses the terminal to identify the two physical media 21, and the identification request includes the binding condition of the two physical media 21 connected with the terminal. Then, the checking module 13 performs binding check on the binding condition and the recorded binding information, where the binding check is a third step of check to check whether the two physical media 21 are in a one-to-one corresponding binding relationship in the system. And finally, after the binding verification is passed, sending a confirmation permission to the terminal to complete the combined anti-counterfeiting process of the person and the object.
It should be noted that, when the verification module 13 is used, the encryption module 12 can be used to regenerate a dynamic encryption lock for tracing information after the verification is passed, the dynamic encryption lock also carries out coding according to a dynamic encryption rule, and a layer is added on a given dynamic password lock to form a third anti-counterfeiting line, so that the security and the anti-counterfeiting function of the gem and jade are further enhanced.
In the anti-counterfeiting system 10 of this embodiment 2, the key module 14 is specifically configured to: receiving an unlocking application of a user from a terminal; generating a dynamic key corresponding to the dynamic coded lock according to the unlocking application; sending the dynamic key to the terminal; unlocking the dynamic key and the dynamic coded lock through the terminal; after receiving a result of successful unlocking from the terminal, sending the tracing information of the gems and jades to the terminal; and displaying the tracing information through the terminal.
After the three-step verification is completed by using the verification module 13, the user can access and inquire the tracing information of the gem and jade. And the user operation terminal submits an unlocking application, wherein the unlocking application is an instruction for generating the dynamic key. The key module 14 generates a dynamic key for unlocking the dynamic password lock according to the dynamic encryption rule. If the encryption module 12 generates a dynamic encryption lock for the trace information before, the dynamic key generated by the key module 14 corresponds to the dynamic encryption lock and is used for unlocking the dynamic encryption lock, and the dynamic encryption lock can protect information in the anti-counterfeiting component 20 except for the trace information from being accessed by a user through part of three anti-counterfeiting processes formed by the trace information, so that the security of the anti-counterfeiting component 20 is further enhanced. The dynamic key is transmitted to the terminal through wireless communication, bluetooth and the like, and the user obtains the dynamic key. Then, the user operates the terminal to input the dynamic secret key, the matching and the verification of the dynamic secret key and the dynamic password lock (or the dynamic encryption lock) are completed at the terminal, and the unlocking is completed after the verification is successful. After the unlocking is successful, the terminal sends a result of successful unlocking, and the key module 14 confirms that the tracing information of the gem and jade is sent to the terminal, wherein the tracing information at this time can be a part of the tracing information read by the encryption module 12 or all the tracing information stored in the storage component. Finally, the content of the tracing information sent by the key module 14 is displayed on the interface of the terminal.
Through the anti-counterfeiting system 10 disclosed in this embodiment 2, a user with legal identity and access right qualification can query the tracing information of the gem and jade stored in the gem and jade transaction database through the matching module 11, the encryption module 12, the verification module 13 and the key module 14. If the three-step verification fails due to the fact that the identity and the authority of the user or the physical medium 21 held by the user are in a problem, the tracing information of the gem and jade cannot be inquired, and therefore the anti-counterfeiting purpose is achieved.
Example 3
The embodiment 3 of the invention discloses an anti-counterfeiting component 20 of gem and jade, which is used for encrypting the tracing information of the gem and jade through the anti-counterfeiting system disclosed in the embodiment 2 when the anti-counterfeiting method disclosed in the embodiment 1 is executed, matching the anti-counterfeiting system with a terminal to verify the identity of a user when the user uses the terminal to inquire the tracing information of the gem and jade, obtaining anti-counterfeiting authority by the user after the verification is passed, and sending the tracing information to the terminal through the anti-counterfeiting system, thereby realizing the anti-counterfeiting purpose.
Referring to fig. 9, the anti-counterfeiting component 20 of this embodiment 3 includes two physical media 21, where the physical media 21 includes a substrate 22, a storage chip 23 and an identification medium 24, the storage chip 23 is disposed in the substrate 22, the identification medium 24 is disposed on the surface of the substrate 22, and the identification medium 24 and the storage chip 23 implement the anti-counterfeiting method for gem and jade disclosed in embodiment 1 through the anti-counterfeiting system for gem and jade disclosed in embodiment 2; the memory chip 23 is used for storing the tracing information of the gem and jade, the medium information of the physical medium 21 and the dynamic coded lock generated by the anti-counterfeiting system of the gem and jade disclosed in the embodiment 2; the identification medium 24 is used to identify login requests and unlock applications from the user at the terminal and to verify binding information of the two physical media 21.
The physical media 21 may be an anti-counterfeit card or an anti-counterfeit box, the size of the anti-counterfeit box is similar to that of the notepaper, and the two physical media 21 may be two anti-counterfeit cards or two anti-counterfeit boxes, or a combination of the anti-counterfeit cards and the anti-counterfeit boxes. When the anti-counterfeiting card is used, the anti-counterfeiting cards are mutually scanned, the anti-counterfeiting boxes are mutually scanned, and the anti-counterfeiting cards can be inserted into the anti-counterfeiting boxes to complete scanning. The user holds the anti-counterfeiting card or the anti-counterfeiting box, and can use the terminal to inquire the tracing information of the gemstones and jades through the anti-counterfeiting verification process. The substrate 22 is a physical carrier of the physical medium 21 for carrying the memory chip 23 and the identification medium 24. The memory chip 23 is a part of the physical medium 21 that stores information, and has functions of information recording, information transmission and reception, and logical operation. The storage chip 23 may be a Physically Unclonable Function (PUF) chip, and at the level that the anti-counterfeiting component 20 is used as a storage carrier for the tracing information of the gem and jade, a secret key or a storage secret key is not needed, and the authenticity of the user is judged by setting a dynamic password lock through an external system such as the anti-counterfeiting system of this embodiment 2, so as to implement the anti-counterfeiting verification. The identification medium 24 is a component of the physical medium 21 for communication connection with an external device, and can establish connection with the external device by means of bluetooth, wireless communication or code scanning. In the anti-counterfeiting component 20 of this embodiment 3, before the physical media 21 are not activated, the two physical media 21 may be stored together or stored separately without any binding relationship.
In the anti-counterfeit component 20 of this embodiment 3, each memory chip 23 stores a half code segment of the dynamic coded lock, and when two physical media 21 are bound together, the two half code segments form the dynamic coded lock. After the anti-counterfeiting system in embodiment 2 generates the dynamic password lock, the memory chips 23 of the two physical media 21 respectively store half of the dynamic password lock, and the dynamic password lock is complete and can be unlocked only after the two physical media 21 are authenticated with each other through the identification medium 24 and are combined into one.
Example 4
Embodiment 4 of the present invention discloses a computer-readable storage medium, in which a computer program is stored, and when the computer program runs on a computer, the computer is enabled to execute the method for preventing counterfeit of gem and jade as disclosed in embodiment 1.
Example 5
Embodiment 5 of the present invention discloses a computer program product, which comprises a computer program, and when the computer program runs on a computer, the computer executes the method for preventing forgery of gem and jade disclosed in embodiment 1.
The anti-counterfeiting method, the anti-counterfeiting system and the anti-counterfeiting component disclosed by the invention can improve the physical security of the gem and jade in the import transportation process, and can simultaneously perform anti-counterfeiting and verification on all persons and goods in the property right by innovative encryption means, thereby realizing the comprehensive anti-counterfeiting purpose of the persons and the goods.
It should be understood that the above description of specific embodiments of the present invention is only for the purpose of illustrating the technical lines and features of the present invention, and is intended to enable those skilled in the art to understand the contents of the present invention and to implement the present invention, but the present invention is not limited to the above specific embodiments. It is intended to cover in the appended claims all such changes and modifications that are within the scope of this invention.

Claims (20)

1. An anti-counterfeiting method for gem and jade is characterized by comprising the following steps:
binding and matching two physical media of the anti-counterfeiting component to establish binding information;
setting a dynamic password lock for the physical medium based on the binding information and user information received from a terminal;
verifying user information in response to a login request of a user received from a terminal;
and responding to an unlocking application of a user received from a terminal, and sending a dynamic key corresponding to the dynamic coded lock and tracing information of the gem and jade to the terminal.
2. The method according to claim 1, wherein the binding matching between the two physical media of the anti-counterfeiting component to establish the binding information specifically comprises:
writing the tracing information of the gem and jade into two physical media of the anti-counterfeiting component;
binding and matching the two physical media according to the tracing information and the media information of the physical media;
and establishing and recording binding information of the two physical media according to the result of the binding matching.
3. The method of claim 2, wherein setting a dynamic password lock for the physical media based on the binding information and user information received from the terminal specifically comprises:
acquiring user information;
the trace back information and the medium information read from the physical medium;
generating a dynamic coded lock of the physical medium based on the tracing information, the medium information, the user information and the binding information;
writing the dynamic password lock into the physical medium.
4. The method of claim 3, further comprising, after the reading of the trace back information and the media information from the physical media:
and updating the dynamic coded lock of the physical medium to be a new dynamic coded lock based on the tracing information, the medium information, the user information and the binding information.
5. The method according to claim 1, wherein the verifying the user information in response to the login request of the user received from the terminal specifically comprises:
receiving a login request of a user from a terminal, and acquiring login information of the user;
carrying out identity verification and authority verification on the login information;
and after the identity check and the authority check are passed, sending confirmation permission to the terminal.
6. The method of claim 5, wherein after the identity check and the permission check are both passed, and after sending a confirmation permission to the terminal, further comprising:
receiving an identification request of a user for the two physical media from a terminal, and acquiring the binding condition of the two physical media;
based on the binding information, carrying out binding check on the binding condition;
and after the binding check is passed, sending a confirmation permission to the terminal.
7. The method according to claim 1, wherein in response to an unlocking request of a user received from a terminal, sending a dynamic key corresponding to the dynamic password lock and tracing information of the gem and jade to the terminal, specifically comprises:
receiving an unlocking application of a user from a terminal;
generating a dynamic key corresponding to the dynamic coded lock according to the unlocking application;
sending the dynamic key to the terminal;
unlocking the dynamic secret key and the dynamic coded lock through the terminal;
after receiving a result of successful unlocking from a terminal, sending tracing information of the gemstones and jades to the terminal;
and displaying the tracing information through the terminal.
8. An anti-counterfeiting system for gemstones and jades is characterized by comprising a matching module, an encryption module, a verification module and a key module which are communicated with each other;
the matching module is used for binding and matching two physical media of the anti-counterfeiting component to establish binding information;
the encryption module is used for setting a dynamic coded lock for the physical medium based on the binding information and user information received from a terminal;
the verification module is used for responding to a login request of a user received from a terminal and verifying user information;
the key module is used for responding to an unlocking application of a user received from a terminal and sending a dynamic key corresponding to the dynamic coded lock and tracing information of the gem and jade to the terminal.
9. The system of claim 8, wherein the matching module is specifically configured to:
writing the tracing information of the gem and jade into two physical media of the anti-counterfeiting component;
binding and matching the two physical media according to the tracing information and the media information of the physical media;
and establishing and recording binding information of the two physical media according to the result of the binding matching.
10. The system of claim 9, wherein the encryption module is specifically configured to:
acquiring user information;
the trace back information and the medium information read from the physical medium;
generating a dynamic coded lock of the physical medium based on the tracing information, the medium information, the user information and the binding information;
writing the dynamic password lock into the physical medium.
11. The system of claim 10, wherein the encryption module is further specifically configured to:
and updating the dynamic coded lock of the physical medium to be a new dynamic coded lock based on the tracing information, the medium information, the user information and the binding information.
12. The system of claim 8, wherein the verification module is specifically configured to:
receiving a login request of a user from a terminal, and acquiring login information of the user;
carrying out identity verification and authority verification on the login information;
and after the identity check and the authority check are passed, sending confirmation permission to the terminal.
13. The system of claim 12, wherein the verification module is further specifically configured to:
receiving an identification request of a user for the two physical media from a terminal, and acquiring the binding condition of the two physical media;
based on the binding information, carrying out binding check on the binding condition;
and after the binding check is passed, sending a confirmation permission to the terminal.
14. The system of claim 8, wherein the key module is specifically configured to:
receiving an unlocking application of a user from a terminal;
generating a dynamic key corresponding to the dynamic coded lock according to the unlocking application;
sending the dynamic key to the terminal;
unlocking the dynamic secret key and the dynamic coded lock through the terminal;
after receiving a result of successful unlocking from a terminal, sending tracing information of the gem and jade to the terminal;
and displaying the tracing information through the terminal.
15. An anti-counterfeiting component of a gem and jade, which is characterized by comprising two physical media, wherein the physical media comprise a substrate, a memory chip and an identification medium, the memory chip is arranged in the substrate, the identification medium is arranged on the surface of the substrate, and the identification medium and the memory chip execute the anti-counterfeiting method of the gem and jade according to claims 1 to 7 through the anti-counterfeiting system of the gem and jade according to claims 8 to 14;
the memory chip is used for storing the tracing information of the gemstones and the medium information of the physical medium and the dynamic coded lock generated by the anti-counterfeiting system of the gemstones and the jades according to the claims 8 to 14;
the identification medium is used for identifying login requests and unlocking applications from users at the terminal and verifying binding information of the two physical media.
16. The security device of claim 15, wherein each of the memory chips stores a half-code segment of the dynamic password lock, and when the two physical media are bound together, the two half-code segments form the dynamic password lock.
17. The security device of claim 15, wherein the physical medium is a security card or a security box.
18. A security device according to claim 15, wherein the memory chip is a physically unclonable chip.
19. A computer-readable storage medium, wherein a computer program is stored in the computer-readable storage medium, which when run on a computer, causes the computer to execute the method for preventing forgery of gem and jade as set forth in any one of claims 1 to 7.
20. A computer program product, characterized in that it comprises a computer program which, when run on a computer, causes the computer to execute the method for the anti-counterfeiting of a gem and jade according to any one of claims 1 to 7.
CN202310165434.6A 2023-02-24 2023-02-24 Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting assembly for precious stones Active CN115860037B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310165434.6A CN115860037B (en) 2023-02-24 2023-02-24 Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting assembly for precious stones

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310165434.6A CN115860037B (en) 2023-02-24 2023-02-24 Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting assembly for precious stones

Publications (2)

Publication Number Publication Date
CN115860037A true CN115860037A (en) 2023-03-28
CN115860037B CN115860037B (en) 2023-06-06

Family

ID=85658906

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310165434.6A Active CN115860037B (en) 2023-02-24 2023-02-24 Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting assembly for precious stones

Country Status (1)

Country Link
CN (1) CN115860037B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090289107A1 (en) * 2008-05-26 2009-11-26 Wayne Douglas Prentice Multi-use durable goods card and system
WO2010099714A1 (en) * 2009-03-04 2010-09-10 深圳市众合联科技有限公司 Product identity digital identification apparatus, inspection apparatus, product and anti-counterfeiting inspection method
US20110096955A1 (en) * 2008-03-20 2011-04-28 Universite De Geneve Secure item identification and authentication system and method based on unclonable features
CN103413227A (en) * 2013-08-02 2013-11-27 四川航天系统工程研究所 Product fake prevention tracing system and method for implementing fake prevention tracing checking thereof
CN106850699A (en) * 2017-04-10 2017-06-13 中国工商银行股份有限公司 A kind of mobile terminal login authentication method and system
CN107316075A (en) * 2017-07-04 2017-11-03 上海宝玉石交易中心有限公司 Jewelry identity reviews the integral multidimensional binding method for anti-counterfeit of material evidence and external member
CN108171019A (en) * 2018-01-12 2018-06-15 陈征宇 Anti-counterfeit authentication method, fake certification system, fake certification equipment and storage medium
CN208207867U (en) * 2018-05-29 2018-12-07 成都川联芯创信息工程有限公司 A kind of automatic check system of jewelry
US20210004840A1 (en) * 2018-03-07 2021-01-07 Beijing Anxunben Technology Co., Ltd Product having dual layer identification codes, product traceability and anti-counterfeit authentication method and apparatus
US20210279736A1 (en) * 2018-06-04 2021-09-09 Tsinghua University Blockchain secure transaction method and device based on biomarker authentication
WO2022077135A1 (en) * 2020-10-15 2022-04-21 江苏图码信息科技有限公司 Anti-counterfeiting tracing system and application component for associated customized graphic code
CN218318364U (en) * 2022-11-06 2023-01-17 重庆五盾科技有限公司 Coded lock bottle cap sleeve with NFC dynamic encryption chip

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110096955A1 (en) * 2008-03-20 2011-04-28 Universite De Geneve Secure item identification and authentication system and method based on unclonable features
US20090289107A1 (en) * 2008-05-26 2009-11-26 Wayne Douglas Prentice Multi-use durable goods card and system
WO2010099714A1 (en) * 2009-03-04 2010-09-10 深圳市众合联科技有限公司 Product identity digital identification apparatus, inspection apparatus, product and anti-counterfeiting inspection method
CN103413227A (en) * 2013-08-02 2013-11-27 四川航天系统工程研究所 Product fake prevention tracing system and method for implementing fake prevention tracing checking thereof
CN106850699A (en) * 2017-04-10 2017-06-13 中国工商银行股份有限公司 A kind of mobile terminal login authentication method and system
CN107316075A (en) * 2017-07-04 2017-11-03 上海宝玉石交易中心有限公司 Jewelry identity reviews the integral multidimensional binding method for anti-counterfeit of material evidence and external member
CN108171019A (en) * 2018-01-12 2018-06-15 陈征宇 Anti-counterfeit authentication method, fake certification system, fake certification equipment and storage medium
US20210004840A1 (en) * 2018-03-07 2021-01-07 Beijing Anxunben Technology Co., Ltd Product having dual layer identification codes, product traceability and anti-counterfeit authentication method and apparatus
CN208207867U (en) * 2018-05-29 2018-12-07 成都川联芯创信息工程有限公司 A kind of automatic check system of jewelry
US20210279736A1 (en) * 2018-06-04 2021-09-09 Tsinghua University Blockchain secure transaction method and device based on biomarker authentication
WO2022077135A1 (en) * 2020-10-15 2022-04-21 江苏图码信息科技有限公司 Anti-counterfeiting tracing system and application component for associated customized graphic code
CN218318364U (en) * 2022-11-06 2023-01-17 重庆五盾科技有限公司 Coded lock bottle cap sleeve with NFC dynamic encryption chip

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
芦佳;卫强;陈兵;: "基于RFID技术的防伪平台的设计与实现", 计算机技术与发展, no. 05 *

Also Published As

Publication number Publication date
CN115860037B (en) 2023-06-06

Similar Documents

Publication Publication Date Title
US11018869B2 (en) Blockchain-based digital identity management (DIM) system
US11481768B2 (en) System and method of generating and validating encapsulated cryptographic tokens based on multiple digital signatures
CN102959559B (en) For the method producing certificate
US9516012B2 (en) Method and server of electronic safes with information sharing
EP1571525B1 (en) A method, a hardware token, and a computer program for authentication
US6904416B2 (en) Signature verification using a third party authenticator via a paperless electronic document platform
US11128604B2 (en) Anonymous communication system and method for subscribing to said communication system
KR102137115B1 (en) System and method for certificate easily submission service support
US20100241571A1 (en) System and method for cardless secure on-line credit card/debit card purchasing
US20040100363A1 (en) Birth and other legal documents having an RFID device and method of use for certification and authentication
CN109241726B (en) User authority control method and device
JPH10504150A (en) A method for securely using digital signatures in commercial cryptosystems
CN101110728A (en) Security validating system and method for RFID certificate of title
CN101022339A (en) Electronic sign stamp identifying method combined with digital centifi cate and stamp
US20200193420A1 (en) Data management systems and methods
CN101395625A (en) Identity theft mitigation
CN104166871A (en) Anti-counterfeit label and anti-counterfeit method based on combination of two-dimension codes and RFID chips
CN113450092A (en) Block chain network-based article safe and efficient transaction method, system and storage medium
JPH1188321A (en) Digital signature generation server
CN117426073A (en) Trusted chain of custody for verifiable credentials
US20020053028A1 (en) Process and apparatus for improving the security of digital signatures and public key infrastructures for real-world applications
CN109388923B (en) Program execution method and device
WO2023036143A1 (en) Decentralized zero-trust identity verification and authentication system and method
CN115860037B (en) Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting assembly for precious stones
CA2898587C (en) Digitised handwritten signature authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40090162

Country of ref document: HK