CN1702669A - Digital short message counterfeit technique - Google Patents

Digital short message counterfeit technique Download PDF

Info

Publication number
CN1702669A
CN1702669A CN 200510021156 CN200510021156A CN1702669A CN 1702669 A CN1702669 A CN 1702669A CN 200510021156 CN200510021156 CN 200510021156 CN 200510021156 A CN200510021156 A CN 200510021156A CN 1702669 A CN1702669 A CN 1702669A
Authority
CN
China
Prior art keywords
code
server
algorithm
false proof
product
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200510021156
Other languages
Chinese (zh)
Inventor
冯轲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU OUPU INFORMATION NETWORK TECHNOLOGY Co Ltd
Original Assignee
CHENGDU OUPU INFORMATION NETWORK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU OUPU INFORMATION NETWORK TECHNOLOGY Co Ltd filed Critical CHENGDU OUPU INFORMATION NETWORK TECHNOLOGY Co Ltd
Priority to CN 200510021156 priority Critical patent/CN1702669A/en
Publication of CN1702669A publication Critical patent/CN1702669A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A false proof technique for digital note comprises the following steps: producing the unrepeatable product false proof coding; marking the coding on commodity as a disposal false proof mark; the consumer sends the false proof mark on commodity to the server for query by the note from mobile terminal through the mobile communication network to get the finally query result; the server sends the query result back to the consumer' s mobile terminal; in step a, making the 16 digital code through regulating means and hidden code algorithm encryption to get the product false proof coding; in step c, consumer sends the false proof coding, the coding gets a series of codes by regulating means and hidden code algorithm disclosing in server, and the sever compares the disclosed code with 16 digital code to get the query result, and stores the false proof coding automatically in server. This invention is convenient for the data management and tracking.

Description

A kind of digital short message counterfeit technique
Technical field
The present invention relates to antiforge method for commodities, relate in particular to a kind of digital short message counterfeit technique that utilizes mobile communication network that commodity counterfeit prevention is differentiated.
Background technology
In commodity society now, many lawless persons are arranged under the driving of huge commercial interest, imitated, personation famous brand and regular commodity, so not only the interests to the consumer have caused very big infringement, and the interests that producer is reached about having the people of intellecture property have also caused great infringement, this class situation is at medicine, tobacco, industry such as drinks and all kinds of publications shows relatively more rampantly, in order to resist and prevent counterfeit product, producer and relevant knowledge property right owner have to take multiple measure to realize false proof purpose, but DeGrain, because these false proof measures only are confined on the product external packaging, such as in external packing, pasting antifalsification label, though can increase some counterfeit difficulty, the counterfeiter finally can both separate brokenly this kind method for anti-counterfeit.Publication number is SMS (Short Messaging Service) method for anti-counterfeit and the system of CN1444178A, and this system generates unduplicated product false proof coding; And be stored in server database; Again with the product false proof coded markings on commodity, become disposable anti-false sign; When the short message of consumer by portable terminal sent to server retrieves through mobile communications network with the anti-fake code on the commodity, server drew result for retrieval; Last server returns result for retrieval consumer's portable terminal.In this system, owing to the unduplicated product false proof coding that generates will be preserved, just need to use the mode of data-base recording, so just need take a large amount of storage space of server, in case will produce a large amount of useless yard and waste resource during the anti-fake code that no one's active inquiry generates.
Summary of the invention
It is little to the purpose of this invention is to provide a kind of utilization of resources space, the digital short message counterfeit technique that economizes on resources.
In order to reach purpose of the present invention, technical scheme of the present invention is:
A kind of digital short message counterfeit technique may further comprise the steps:
A, the unduplicated product false proof coding of generation;
B, with the product false proof coded markings on commodity, become disposable anti-false sign;
C, consumer send to server lookup through mobile communications network with the anti-fake code on the commodity by the short message of portable terminal, finally obtain Query Result;
D, server return Query Result consumer's portable terminal;
In step a, 16 figure place sign indicating numbers through check code algorithm and private mark algorithm for encryption, are obtained the product code of string number, this product code is the product false proof coding; In step c, the product false proof that the consumer sends is coded in the server through check code algorithm and the deciphering of private mark algorithm, obtain a string number, this number is in the comparison of carrying out numerical digit authentication (rule of time range, kind information, the serial number of production relatively), server lookup record, finally obtain Query Result, and on server, store this anti-fake code automatically.Described 16 figure place sign indicating numbers are made of plain code section, private mark section, Hidden Codes section, wherein plain code Duan Weidi is 1 to the 2nd, 3 to the 14th of private mark Duan Weidi, 15 to the 16th of Hidden Codes Duan Weidi, key is made of two hop count word strings, and every hop count word string is managed respectively by manufacturer and packing manufacturer.
Described check code algorithm is that complementation more finally obtains 1 bit check sign indicating number with preceding 15 weighted sums of 16 figure place sign indicating numbers; Described private mark algorithm is that private mark and key are carried out computing, obtains one group of 12 random number, can carry out the computing of algorithm to private mark when decoding, also can verify the size of time position after the private mark decoding.
In the middle of step c, d, be to be connected between the short messaging gateway of server and mobile communications network by internet or public data network, data transmission adopts RSA cryptographic algorithms coded communication mode.
Query Result in step c, d is:
If the number after the deciphering meets the inspection of authentication of algorithm sum digit and query note, " this product the is a genuine piece " information of returning is to portable terminal, and server is also stored this anti-fake code automatically;
If the number after the deciphering does not meet the inspection of authentication of algorithm sum digit and query note, " this product the is a counterfeit goods " information of returning is to portable terminal.
Described mobile communications network is GSM or CDMA or GPRS.
The difference of the present invention and SMS (Short Messaging Service) method for anti-counterfeit and system:
1. be can database of record in the packing of product with digital application.
2. have only when digital when in note, using (inquiry/dash value) just can be with effective recording digital code database.
3. key is to allow to increase new key, and each key increases, and Hidden Codes Z1 can do corresponding variation, when decoding, can read Hidden Codes Z1 automatically and take out corresponding key.
4. key comprises following content: cipher key content, key timeliness, the corresponding relation of key and Z1.
5. algorithm comprises two cover algorithms, 1. check code algorithms, 2. private mark algorithms.
The present invention adopts the benefit of above-mentioned algorithm: 16 figure place sign indicating numbers not in the database of record, depend on the guarantee of algorithm when generating, use the mode of algorithm effectively to economize on resources, and are convenient to the management and the tracking of data.If use the mode of data-base recording, a large amount of useless sign indicating number that can produce and waste resource.Because the user of Query Information accounts for a very little part in the product number percent that dispatches from the factory, most of number of producing can not be used.The mode of algorithm only can carried out the mobile phone short message enquiry or the card of game points when supplementing with money consumer or game player, and this number just can be activated and enter the data that database becomes effect automatically, can effectively utilize resource like this and can not produce the problem of useless sign indicating number.
Description of drawings
Fig. 1 is a schematic network structure of the present invention;
Fig. 2 is a method flow diagram of the present invention.
Embodiment
A kind of digital short message counterfeit technique of the present invention is seen Fig. 1, Fig. 2, may further comprise the steps:
A, the unduplicated product false proof coding of generation;
B, with the product false proof coded markings on commodity, become disposable anti-false sign;
C, consumer send to server 1 inquiry through mobile communications network 2 with the anti-fake code on the commodity by the short message of portable terminal 3, finally obtain Query Result;
D, server 1 return Query Result consumer's portable terminal 3;
In step a, 16 figure place sign indicating numbers through check code algorithm and private mark algorithm for encryption, are obtained the product code of string number, this product code is the product false proof coding; In step c, the product false proof that the consumer sends is coded in the server through check code algorithm and the deciphering of private mark algorithm, obtain a string number, this number carries out the comparison of numerical digit authentication, server lookup record, finally obtain Query Result, Query Result is: if the number after the deciphering meets the inspection of authentication of algorithm sum digit and query note, " this product the is a genuine piece " information of returning is to portable terminal, and server is also stored this anti-fake code automatically; If the number after the deciphering does not meet the inspection of authentication of algorithm sum digit and query note, " this product the is a counterfeit goods " information of returning is to portable terminal.Described numerical digit authentication comprises that relatively the rule of time range, kind information, the serial number of production compares, and the time code of the number that time range obtains after relatively being meant and will deciphering and the time term of validity of key K compare; The kind code of the number that kind information obtains after being meant and will deciphering compares with the preceding 16 figure place sign indicating number kind codes that are provided with of deciphering, such as the kind information in the 16 figure place sign indicating numbers that are provided with before the deciphering is 1, if the kind information of the number that obtains after the deciphering surpasses 1, just can assert that this product is a counterfeit goods; The production sequence number code of the number that the rule of producing serial number obtains after relatively being meant and will deciphering compares with the production sequence number code of the preceding 16 figure place sign indicating numbers that are provided with of deciphering, and these codes all are provided with voluntarily.Whether the number that relatively being meant of server lookup record obtains after the inquiry deciphering is former inquired about and was recorded in the server, if the number that obtains after the deciphering was inquired about, can assert that this product is a counterfeit goods.In addition, if the number after the deciphering meets the inspection of authentication of algorithm sum digit and query note, " this product the is a genuine piece " information of returning is to portable terminal, server is also stored this anti-fake code automatically, and it is that exponential code meets check code algorithm and private mark algorithm in calculating process that the number after the deciphering described in this Query Result meets algorithm.
Described 16 figure place sign indicating numbers are made of plain code section, private mark section, Hidden Codes section, key, wherein plain code Duan Weidi is 1 to the 2nd, 3 to the 14th of private mark Duan Weidi, 15 to the 16th of Hidden Codes Duan Weidi, key is made of two hop count word strings, and every hop count word string is managed respectively by manufacturer and packing manufacturer.
Each the numeral definition of 16 figure place sign indicating numbers:
1, plain code section X (the 1st to the 2nd):
1 of kind, code description: (x1)
1 code description of machine number: (X2)
2, private mark section Y (the 3rd to 14):
2 of times, code description (y1 y2)
The moon day (converting 4 of fates to), code description (y3 y4 y5 y6)
Beat 4 of sign indicating number times, code description: (y7 y8 y9 y10)
Produce 4 of sequence numbers, code description (y11 y12 y13 y14)
3, Hidden Codes section Z (the 15th to the 16th):
2 of encryption type sign indicating numbers, code description (z1 z2)
Z1 counterpart keys relation
The check code of Z2 algorithm
4, key K: in the numeral of production manufacturer and packages printing producer preset in advance
Key is divided into two sections can be by manufacturer and the management of packing manufacturer, and the first hop count word string is K1; The second hop count word string is K2, can increase the management security of key like this.
Described check code algorithm is that complementation more finally obtains 1 bit check sign indicating number with preceding 15 weighted sums of 16 figure place sign indicating numbers; Described private mark algorithm is that private mark and key are carried out computing, obtains one group of 12 random number, can carry out the computing of algorithm to private mark when decoding, also can verify the size of time position after the private mark decoding.Describe at check code algorithm and private mark algorithm below:
The Z2 check code algorithm:
∑(ai×Wi)(mod?11)
I: expression number character is from by the position number that comprises check code to a left side;
Ai represents the locational number character value of i;
The locational weighting factor of Wi i, its numerical value Wi=mod (power (2, (n-1)), 11)
i?18?17?16?15?14?13?12?11?10?9?8?7?6?5?4?3?2?1
Wi?7?9?10?5?8?4?2?1?6?3?7?9?10?5?8?4?2?1
Corresponding check code:
∑(ai×WI)(mod?11)0?1?2?3?4?5?6?7?8?9?10
Check code character value ai 1098765432
The algorithm of private mark:
Private mark and key are carried out computing, obtain one group of 12 random number, when decoding, can carry out the computing of algorithm, after the private mark decoding, also can verify the size of time position to private mark
Such as minute position less than 60 days numerical digits less than 366 checkings such as grade
If: the private mark after the encryption is S2; Key is K1, K2; Private mark section before encrypting is S1; S11 is for taking out preceding 6 bit digital of S1; S11H is 16 system numbers of preceding 6 bit digital of S1; S12 is 6 bit digital behind the taking-up S1; S12H is 16 system numbers of 6 bit digital behind the S1;
S1 is the numeric string of 12 bit lengths
S11 (take out S1 preceding 6 bit digital), and S11 is converted to 16 system S11H, carry out the XOR processing with key K 1 then.
S12 (take out S1 after 6 bit digital), and S12 is converted to 16 system S12H, carry out XOR with key K 2 then and handle.
S11H and 16 new system character string S2H of S12H combination are converted to S2H 10 systems then and obtain 10 new system character string S2
S2=int((HEX(S11)XOR?K1)&(HEX(S12)XOR?K2))
In the middle of step c, d, be to be connected between the short messaging gateway of server and mobile communications network by internet or public data network, data transmission adopts RSA cryptographic algorithms coded communication mode.
Described mobile communications network is GSM or CDMA or GPRS.

Claims (6)

1, a kind of digital short message counterfeit technique may further comprise the steps:
A, the unduplicated product false proof coding of generation;
B, with the product false proof coded markings on commodity, become disposable anti-false sign;
C, consumer send to server lookup through mobile communications network with the anti-fake code on the commodity by the short message of portable terminal, finally obtain Query Result;
D, server return Query Result consumer's portable terminal;
It is characterized in that: in step a, 16 figure place sign indicating numbers through check code algorithm and private mark algorithm for encryption, are obtained the product code of string number, this product code is the product false proof coding; In step c, the product false proof that the consumer sends is coded in the server and deciphers through check code algorithm and private mark algorithm, obtains a string number, and this number carries out the comparison of numerical digit authentication, server lookup record, finally obtain Query Result, and on server, store this anti-fake code automatically.
2, a kind of digital short message counterfeit technique according to claim 1, it is characterized in that: described 16 figure place sign indicating numbers are made of plain code section, private mark section, Hidden Codes section, key, wherein plain code Duan Weidi is 1 to the 2nd, 3 to the 14th of private mark Duan Weidi, 15 to the 16th of Hidden Codes Duan Weidi, key is made of two hop count word strings, and every hop count word string is managed respectively by manufacturer and packing manufacturer.
3, a kind of digital short message counterfeit technique according to claim 1 is characterized in that: described check code algorithm is that complementation more finally obtains 1 bit check sign indicating number with preceding 15 weighted sums of 16 figure place sign indicating numbers; Described private mark algorithm is private mark and key to be carried out computing obtain one group of 12 random number, when decoding private mark is carried out computing, also can verify the size of time position after the private mark decoding.
4, a kind of digital short message counterfeit technique according to claim 1, it is characterized in that: in the middle of step c, d, between the short messaging gateway of server and mobile communications network is to be connected by internet or public data network, and data transmission adopts RSA cryptographic algorithms coded communication mode.
5, a kind of digital short message counterfeit technique according to claim 1, it is characterized in that: the Query Result in step c, d is:
If the number after the deciphering meets the inspection of authentication of algorithm sum digit and query note, " this product the is a genuine piece " information of returning is to portable terminal, and server is also stored this anti-fake code automatically;
If the number after the deciphering does not meet the inspection of authentication of algorithm sum digit and query note, " this product the is a counterfeit goods " information of returning is to portable terminal.
6, according to claim 1 or 4 described a kind of digital short message counterfeit techniques, it is characterized in that: described mobile communications network is GSM or CDMA or GPRS.
CN 200510021156 2005-06-27 2005-06-27 Digital short message counterfeit technique Pending CN1702669A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200510021156 CN1702669A (en) 2005-06-27 2005-06-27 Digital short message counterfeit technique

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200510021156 CN1702669A (en) 2005-06-27 2005-06-27 Digital short message counterfeit technique

Publications (1)

Publication Number Publication Date
CN1702669A true CN1702669A (en) 2005-11-30

Family

ID=35632408

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200510021156 Pending CN1702669A (en) 2005-06-27 2005-06-27 Digital short message counterfeit technique

Country Status (1)

Country Link
CN (1) CN1702669A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102197408A (en) * 2008-10-23 2011-09-21 罗克斯娱乐股份有限公司 System comprising a consumer item, an apparatus for detecting a code in the consumer item and a server, and method for carrying out an authenticity check
CN102890893A (en) * 2011-07-20 2013-01-23 广东广新信息技术产业发展有限公司 Anti-counterfeiting label for wine
CN104408637A (en) * 2014-12-04 2015-03-11 成都爱维科创科技有限公司 Method and system for identifying one-dimension code information
CN105160379A (en) * 2015-08-31 2015-12-16 浪潮软件股份有限公司 Identification code generation method and apparatus and identification code check method and apparatus
CN113052616A (en) * 2021-03-15 2021-06-29 北京金和网络股份有限公司 Cold chain product tracing method, device and system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102197408A (en) * 2008-10-23 2011-09-21 罗克斯娱乐股份有限公司 System comprising a consumer item, an apparatus for detecting a code in the consumer item and a server, and method for carrying out an authenticity check
CN102890893A (en) * 2011-07-20 2013-01-23 广东广新信息技术产业发展有限公司 Anti-counterfeiting label for wine
CN104408637A (en) * 2014-12-04 2015-03-11 成都爱维科创科技有限公司 Method and system for identifying one-dimension code information
CN105160379A (en) * 2015-08-31 2015-12-16 浪潮软件股份有限公司 Identification code generation method and apparatus and identification code check method and apparatus
CN113052616A (en) * 2021-03-15 2021-06-29 北京金和网络股份有限公司 Cold chain product tracing method, device and system

Similar Documents

Publication Publication Date Title
CN103729770B (en) A kind of anti-fake traceability system and its method
CN1702669A (en) Digital short message counterfeit technique
CN103886469A (en) Product two-dimension code generation and query system
CN1174642A (en) Digital document authentication system for providing certificate which authenticates and uniquely identifies document
CN101593265A (en) Antiforge system based on radio-frequency (RF) identification
CN111861461A (en) Transaction data tracing method and system based on block chain
CN106408065A (en) Two-dimensional code encoding method and apparatus
CN1648940A (en) Safety anti-fake system
CN1148694C (en) Bar code label antifalse hardware system and method
CN201741328U (en) Product label
CN1255757C (en) Multi-dimension antifraud code using positions and number of deformed characters to express characteristic value of code
CN115860768B (en) Source tracing method and device based on blockchain and electronic equipment thereof
CN112217627A (en) Layered encrypted commodity anti-counterfeiting code generation method
CN1924922A (en) Method for searching single product true-false using mobile phone and returning advertisement information
CN115375329A (en) Digital collection transaction traceability anti-counterfeiting management method and system
Khalifa A secure steganographic channel using DNA sequence data and a bio-inspired XOR cipher
CN107733899A (en) A kind of encryption method of the express delivery face list secret protection based on NFC
CN1150713C (en) method for processing digital signal in so-called secure communication system and use of this method for access control and/or binary signature
CN1492364A (en) Method for producing anti-fake label capable of inquiring random figure arrangement matrix
CN115311061B (en) Electronic transaction management method, device, equipment and storage medium based on digital authentication
CN1811812A (en) Anti-fake distinguishing system and method for commodities
CN114785525B (en) Blacklist library generation method, device, equipment and storage medium
CN2777640Y (en) Double code consulting anti-forge system
Jin et al. Research on Application of Internet of Things Information Security Using Blockchain Technology
Bharathi Devi et al. DNA Playfair Cryptosystem Based on 16× 16 Key Matrix Using DNA ASCII Table

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20051130