CN1728162A - Method for anti false verification based on identification technique in radio frequency, and anti false system - Google Patents

Method for anti false verification based on identification technique in radio frequency, and anti false system Download PDF

Info

Publication number
CN1728162A
CN1728162A CN 200510027605 CN200510027605A CN1728162A CN 1728162 A CN1728162 A CN 1728162A CN 200510027605 CN200510027605 CN 200510027605 CN 200510027605 A CN200510027605 A CN 200510027605A CN 1728162 A CN1728162 A CN 1728162A
Authority
CN
China
Prior art keywords
product
information
digital
digital signature
index
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510027605
Other languages
Chinese (zh)
Other versions
CN100375111C (en
Inventor
王俊宇
闵昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fudan University
Original Assignee
Fudan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fudan University filed Critical Fudan University
Priority to CNB2005100276050A priority Critical patent/CN100375111C/en
Publication of CN1728162A publication Critical patent/CN1728162A/en
Application granted granted Critical
Publication of CN100375111C publication Critical patent/CN100375111C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

An antifalse system based on radio frequency technology comprises storage with electronic countermark of radio frequency identification, reader / writer and antifalse information service system. The said storage is divided to be four regions of basic information region, digital signature region for storing digital signature generated by ciphering with private key of manufacture, product history region for recording basic data of logistics tracking information, antifalse certifying server address indexing region for storing server address and address offset amount.

Description

A kind of anti-counterfeit authentication method and Antiforge system based on REID
Technical field
The invention belongs to the products antifake technique field, be specifically related to a kind of product false proof verification method and Antiforge system, relate in particular to a kind of anti-counterfeit authentication method and Antiforge system based on REID.
Background technology
The commodity forgery problem becomes the serious problems that the global economy field faces just day by day, and various countries' economy all is subjected to the invasion of counterfeit and shoddy goods in various degree.Commodity are forged and are not only appeared at music, field such as software and articles of price, from food, daily necessities to the means of production, from banknote, securities to various certificates, certificate, to new high-tech product, all be subjected to the impact of counterfeit and shoddy goods from product with low content of technology in various degree.The personation goods of packages printing are still at the speed increase with every year at least 20% in the world at present, and fake and inferior commodities mouth in world markets become to spreading unchecked, and become human public hazards.
Anti-counterfeiting technology commonly used at present mainly is to distinguish fake and inferior commodities by additional physical characteristics on commodity and packing or by digital false-proof technology.Wherein additional physical attribute mainly contains paper substrate anti-counterfeiting technology, printing ink base anti-counterfeiting technology, holographic security technology, intaglio printing anti-counterfeiting technology, telephone code anti-counterfeiting technology etc., and the anti-counterfeiting technology of additional physical attribute exists the defective that cost is higher, itself forges easily.In the digital false-proof technology commonly " center digital false-proof technology ", coding is finished by central database, and the anti-fake code of all networking products is stored in the central database, the database coding that is encoded in that sends when central database is inquired about the consumer compares, if have this coding in the storehouse, voice suggestion is a product coding of an established trade mark, otherwise prompts for code error, and beware of imitations.Same coding is if inquire about once more, and this coding of system prompt was inquired about, and beware of imitations.The center digital false-proof technology is cryptography and central database mating type digital anti-fake system.The anti-fake code of this type systematic directly produces on the production line of printing house that produces marker or manufacturing enterprise, and directly overlay on the marker or spray printing comes into the market on product, false proof center is memory encoding not, the coding that sends when it is only inquired about the consumer verifies that central database only writes down the coding of verifying and encrypts once more.The self-built Antiforge system of manufacturing enterprise.The coding of this type systematic is produced and is stored by enterprise oneself, and the consumer can carry out Antiforge inquiry by phone and internet.
The defective of digital false-proof technology is:
1) anti-counterfeiting mark itself is with low content of technology: the marker of numeral identification is the carrier of anti-fake code, and anti-fake code is to be identified on the product by marker.The antiforge function of marker own is very limited, and most of in the market numerical code anti-fake labels itself are forged easily, and antifalsification label is inexquisite, is not suitable as the product decals of packing instructions fineness.
2) inquiry rate is low; The inquiry rate is low to be the ubiquitous problem of present digital code anti-false.Market, shop do not provide query facility, and inquiry is inconvenient; In addition, the inquiry cost is too high, some anti-sham campany utilizes the main platform of information service center as consumer's inquiry, because the narrow range that covers, phone is less relatively, and great number voice message phone expense causes the inquiry rate low in addition, many anti-sham campanies have released the method for utilizing SMS functional inquiry commodity true and false at present, and the inquiry rate is expected to improve.
3) identification method is single: except the anti-sham campany of minority has realized directly beating the sign indicating number on production line, most companies only use a kind of identification method of antifalsification label, make, high-speed flow line production huge like this in quantity, can't use on the low value-added commodity, as beverage, pouch food, cigarette etc.
4) machine can't be distinguished: can satisfy the digital code anti-false identification of consumer's inquiry in the market, all can't carry out machine and read, greatly hinder the promotion and application of digital false-proof technology.
Above-mentioned two class technology all fail fundamentally technical solution easily by counterfeit, reuse problems such as packing and identification trouble.In order to reach the purpose of commodity counterfeit prevention, need address the problem: the authentication of antifalsification label; Commodity producers' non repudiation; The unforgeable of label itself; The security of Antiforge system.
In addition, present fake certification adopts the one-level anti-counterfeit server usually, along with the robotization of fake certification and the multiplication of fake certification quantity of information, certainly will cause the paralysis of server, so be necessary to seek the pressure that a kind of effective settling mode is alleviated main anti-counterfeit server.
Summary of the invention
Fundamental purpose of the present invention is to propose a kind of anti-counterfeit authentication method based on radio-frequency (RF) identification (RFID) technology, can carry out unique identification to commodity by unique coding techniques, RFID automatic identification technology, digital-scrambling techniques in conjunction with product, and self be not easy by counterfeit, and circulation history that can record product, and the source and the supply channel of commodity followed the tracks of, be a kind of effective way that solves the commodity counterfeit prevention problem; A kind of Comodity anti-fake system based on radio-frequency (RF) identification (RFID) technology is proposed simultaneously, adopt the mode of classification authentication, avoid the data of master server to stop up, by different plots is set, the size of the side-play amount of different stage and different side-play amounts just can be so that allocation index points to the anti-fake certificate server of different addresses, the benefit of doing like this is that the product that can avoid all need carry out fake certification is visited same anti-counterfeit server and the data that cause are stopped up, and is convenient to the false proof product of needs is carried out Classification Management.
The objective of the invention is to be achieved through the following technical solutions:
A kind of anti-counterfeit authentication method based on REID, the storer of radio frequency recognizing electronic label is divided at least: the historical district of basic information region, digital signature district and product; Basic information region, the storage products code, promptly unique coding comprises manufacturer code and the sequence number that can distinguish Individual Items; The digital signature district, storage manufacturer extracts and encrypts the digital signature that generates with private key to the product essential information; The historical district of product, the master data of record logistic track information, at product through in the supply chain during each predefined logistics link, will be through the read write line of authorizing in the relevant information of logistics information tracking area write operation, as the time of operation, the identifier of read write line (ID number) etc.;
The checking flow process comprises at least:
Step 1, the label initialization, the unique coding of essential information writes, and generates digital signature, sets up the history file of commodity;
Step 2, through each predefined logistics link the time, will be through the read write line of authorizing in the relevant information of logistics information tracking area write operation;
Step 3, read write line reads electronic tag, proposes inspection request to the authentication center that can trust, authentication center is by understanding digital signature, article identity is carried out digital authenticating,, then do not produce the fake product warning if do not conform to if digital signature conforms to and then carries out step 4;
Step 4, the information in the historical district of inquiry product judges then whether the logistic track information of this product conforms to predefined trace information, conforms to and then passes through, and does not conform to then to produce the fake product warning.
Described digital signature realizes by the combination of Digital Fingerprinting Technology and " public key technology ", locate in manufacturer, at first generate the digital digest of product coding with HASH function S HA-1, adopt RSA Algorithm digital digest to be encrypted then, generate digital signature with the private cipher key of manufacturer.
Public key technology is used a public keys and a private cipher key, and wherein public keys is open and private cipher key is maintained secrecy, and private cipher key is used for encrypting and signature, and public keys is used for deciphering; The private cipher key of manufacturer can only be used by manufacturer oneself, and public-key cryptography can be used by a plurality of certifying organization.
Described deciphering digital signature is carried out digital authenticating to article identity, comprises at least:
When carrying out fake certification, authentication uses HASH function S HA-1 to generate the digital digest 1 of the unique coding of product, utilize RSA Algorithm digital signature to be decrypted operation simultaneously with the public-key cryptography of manufacturer, obtain the digital digest 2 of the unique coding of product, if digital digest 1 is identical with digital digest 2, then signature effectively.
Described digital signature is locked after writing the storer of electronic tag, can only carry out read operation later on.
Described public keys and private cipher key must be produced by appointed equipment and security system.
The storage space in the historical district of product both can carry out read operation, also can carry out write operation.
The storer of described radio frequency recognizing electronic label also comprises anti-fake certificate server address index area, this allocation index district preserves the IP address of anti-fake certificate server and the index of IP address, by above-mentioned index, can indicate and preserve the server address that product detects message file, 0 grade of index refers to the IP address of direct sign anti-counterfeit server, and the allocation index more than 1 grade and 1 grade then comprises the plot of a retrieval and some grades side-play amount.
A kind of Antiforge system based on REID comprises storer, read write line and the anti-counterfeiting information service system of electronic tag at least; The storer of electronic tag comprises the historical district of basic information region, digital signature district, anti-fake certificate server address index area and product; The anti-counterfeiting information service system comprises product and detects message file and authentication information, and the content of record comprises by the time for reading of the coding of the product attribute of manufacturer's typing, label, label and carries out the read write line numbering of read operation, the environmental information of product etc.Information service system can be responsible for maintenance by the believable manufacturer or the third-party institution, it is characterized in that: N level anti-counterfeit server is set, the index of the IP address of authentication storage server and IP address in the storer of electronic tag in the information service system; 0 grade of index refers to the IP address of direct sign anti-counterfeit server, allocation index more than 1 grade and 1 grade then comprises the plot of a retrieval and some grades side-play amount, the commodity counterfeit prevention of N level index, can be by the server of visit plot sensing, it is logical that the side-play amount that refers again to the N level obtains the IP address of actual anti-counterfeit server, cross above-mentioned index, can indicate and preserve the final server address that product detects message file.
The numerical value of described IP address and IP allocation index is determined by the implementer of Antiforge system that in advance allocation index is locked after writing electronic tag, can only carry out read operation later on.
Employing RFID technology carries out commodity counterfeit prevention and safety management has following advantage:
1) itself has good security feature.Prior art is difficult to copy, and the cost height of counterfeit devices or means is very high to the requirement of imitated person's technical capability.Chip design and manufacturing technology be very complicated high sophisticated technology, must possess the high most advanced and sophisticated talent (culture period is more than 15 years), expensive design tool (hundreds of thousands is to up to ten million U.S. dollars), (investment of a wafer factory is normally 1,000,000,000 dollars in the world, is several hundred million Renminbi even if buy the investment of superseded production line in huge equipment investment.), complicated technology barrier and learning curve (be hundreds of thousands, very important in this field experience intellecture property quantity whole world every year of making the field at semi-conductor chip, and new hand's success ratio is not high).
2) can increase work efficiency by the means of automatic identification, have original advantage for the safety management of production line or personal management etc.
3) because be, be convenient to be convenient to information processing in conjunction with digital technology tectonic information service systems such as existing Internet technology, information security technologies with digital form transmission data.
Can solve defectives such as the means of identification of traditional anti-counterfeiting technology is backward, recognition rate is low preferably based on the Antiforge system of RFID, and itself be difficult for being forged.
Description of drawings
Fig. 1 is the Comodity anti-fake system block diagram based on RFID;
Fig. 2 is signature and verification process synoptic diagram;
Fig. 3 is the RFID Antiforge system data flow diagram that comprises the one-level index;
Fig. 4 is the Comodity anti-fake system workflow diagram based on RFID.
Embodiment
Describe technical scheme of the present invention in detail below in conjunction with accompanying drawing.
Based on the Comodity anti-fake system framework of RFID as shown in Figure 1.This system comprises the RFID ultimate system, enterprise application and information service system.Wherein the RFID ultimate system can be operated resource under the situation of authorizing, information service system comprises product and detects information and authentication information, the content of record comprises the product attribute by manufacturer's typing, the time for reading of the coding of label and the coding of read write line and label, the environmental informations of product etc., information service system can be responsible for maintenance by the believable manufacturer or the third-party institution.When commodity circulate in supply chain, the read write line of mandate will carry out read-write operation to electronic tag, and information such as the read write line numbering of execution aforesaid operations and running time will be recorded in the logistics information tracking area of electronic tag.
When the electronic tag initialization, the storer of label chip is divided into several region.The present invention carries out following subregion with the electronic tag storer: the historical district of basic information region, digital signature district, anti-fake certificate server address index area and product.
1) basic information region, the storage products code comprises manufacturer code and the sequence number that can distinguish Individual Items, is the unique identification of product.At first need to carry out assignment of code to each product, coding rule can perhaps according to the coding rule of industry, be set up the unique identification to Dan Pin according to general coding rule, and coding is write electronic tag.At present mainly contain EPC coding and UID at the coding rule of Dan Pin in the world and encode etc., but can design voluntarily by the goods producer for the coding of specialty goods.Essential information was written into the storer of electronic tag before setting up electronic tag and product related, and carried out lock operation, can only carry out read operation later on.
2) digital signature district, storage manufacturer carries out digital signature with private key to the product essential information.Digital signature generally realizes by the combination of Digital Fingerprinting Technology and " public key technology ", promptly adopts one-way function that the essential information of product is carried out the extraction of digital digest earlier, uses " public key technology " algorithm to encrypt then.Digital finger-print can only guarantee information integrality, but can not finish authentication.Can only guarantee information in transmission course, not be modified the source that band can not guarantee information by digital finger-print.Digital signature then not only can realize the integrality and the unforgeable of data, can also realize non repudiation, and guarantee information is from the sender of appointment, and this point is very important for false proof, and it can guarantee the accuracy of rule of origin.Digital signature is locked after writing, and can only carry out read operation later on.
So-called digital finger-print is meant by certain algorithm data message carried out the Serial No. of the regular length that COMPREHENSIVE CALCULATING obtains, it and content height correlation.Digital finger-print can be realized two purposes: data integrity, if the content of data block is changed, then its digital finger-print also can change; Unforgeable, information adulterator is difficult to forge such data message, makes the data fingerprint striking resemblances of its fingerprint and real information.Have many algorithms can finish digital finger-print and calculate, the present invention adopts SHA-1 algorithm (seeing note 1) to carry out the extraction of digital digest.
Typically " public key technology " has RSA Algorithm and DSA (seeing note 2) etc.Public key technology is used a public keys and a private cipher key, and wherein public keys is open and private cipher key is secret.If the information that someone sends to you is used your public-key encryption, have only so with your private cipher key and could correctly decipher, other people can't accomplish.Otherwise if you sign to information with your private cipher key, other people can check your signature with your public keys so, has only your signature could pass through checking, if information is modified or uses others' signature, check will be failed so.
The digital signature that combination by " public key technology " and Digital Fingerprinting Technology realizes has following feature: (1) receives the file person and can examine and send the signature of file person to file; (2) send the file person at the signature that can not deny file afterwards; (3) reception file person can not forge the signature to file.
The signature and the authentication process as shown in Figure 2, the present invention adopts the combination of SHA-1 hash function and RSA Algorithm to carry out the digital signature of product.At the manufacturer place, at first generate the digital digest of product coding with HASH function S HA-1, adopt RSA Algorithm digital digest to be encrypted then with the private cipher key of manufacturer, generate digital signature.On electronic tag, will preserve the coding of digital signature and product simultaneously.When carrying out fake certification, authentication uses HASH function S HA-1 to generate the digital digest 1 of product IDs number, utilize RSA Algorithm digital signature to be decrypted operation simultaneously with the public-key cryptography of manufacturer, obtain the digital digest 2 of product IDs number, if digital digest 1 is identical with digital digest 2, then signature effectively.
The key of manufacturer must be produced by appointed equipment and security system (private cipher key and public-key cryptography).The private cipher key of manufacturer can only be used by manufacturer oneself, must maintain secrecy.Public-key cryptography can be used by a plurality of certifying organization, when the distribution public-key cryptography, and does not require secretly, but must keep the integrality of public-key cryptography.Promptly can not give the chance of any replacement key value of assailant, because other side's that these keys are sides is trusted public-key cryptography, otherwise, the attack of following form just might be successful.Suppose that verification system A verifies the product that is carried out digital signature by the B of manufacturer, but at this moment, the forger has forged information and has signed with the private key of oneself, the public-key cryptography that has also replaced A B that system is thought with his public-key cryptography, A system (using wrong public-key cryptography) inspection that digital signature is carried out is thought correct certainly like this.Thus, the forger B that successfully disguised oneself as, thus make Antiforge system lose false proof effect.Authentication is the process of someone or certain object identity of proof, is the important measures that guarantee security of system.When server externally provides service, need to confirm visitor's identity, to satisfy its needs, the visitor also needs to confirm ISP's identity sometimes, in case have dust thrown into the eyes.
3) anti-fake certificate server address index area, this allocation index district preserves the IP address of anti-fake certificate server and the index of IP address, by above-mentioned index, can indicate and preserve the server address that product detects message file.Described allocation index can comprise 0 to N level.0 grade of index refers to the IP address of direct sign anti-counterfeit server, allocation index more than 1 grade and 1 grade then comprises the plot of a retrieval and some grades side-play amount, the commodity counterfeit prevention of 1 grade of index for example, can be by the server of visit plot sensing, refer again to the IP address that 1 grade side-play amount obtains actual anti-counterfeit server, the commodity counterfeit prevention of 2 grades of index can be by the server of visit plot sensing, then obtain the plot of 2 grades of servers with reference to 1 grade side-play amount, refer again to the IP address that 2 grades side-play amount obtains actual anti-counterfeit server, more multi-level index by that analogy.The anti-counterfeit server address lookup of 1 grade of index as shown in Figure 3.
The numerical value of plot and index is determined by the implementer of Antiforge system that in advance by different plots is set, the size of the side-play amount of different stage and different side-play amounts just can be so that allocation index points to the anti-fake certificate server of different addresses.The benefit of doing like this is that the product that can avoid all need carry out fake certification is visited same anti-counterfeit server and the data that cause are stopped up, and is convenient to the false proof product of needs is carried out Classification Management.Allocation index is locked after writing electronic tag, can only carry out read operation later on.
4) the historical district of product, the master data of record logistic track information, at product through in the supply chain during each predefined logistics link, will be through the read write line of authorizing in the relevant information of logistics information tracking area write operation, as the time of operation, the identifier of read write line (ID number) etc.The storage space in the historical district of product both can carry out read operation, also can carry out write operation.
Product detects message file and is kept in the anti-fake certificate data in server storehouse, and product detects information can carry out index by the numbering of product, and each product all has the product of a correspondence to detect message file.The detection message file of each product should comprise the information of three aspects at least, the essential information of (1) product; (2) tracking of products detects information; (3) Product Validation information.
The product essential information can comprise the date of manufacture of product, production unit is (more detailed, can preserve the producer of product), product appearance (size, color etc.), product attribute (material, weight etc.), shelf-life, and the specific (special) requirements (as the storage temperature of product, whether can be inverted etc.) of product in logistics progress.
Tracking of products detects the logistics link that information spinner will identify the necessary process of product institute, and concrete form is the simplest, can be ID number ordering of read write line.Supply chain design according to product, the link of the supply chain that must pass through in actual products is carried out verification operation with the read write line of authorizing, in product detection information, preserve to carry out the numbering and the order of the read write line of verification operation, be used for verifying that whether product is to transport and verify by normal channel.A common trait of the commodity of forging is: fake and forged product has been sneaked into normal supply chain channel, user cheating or consumer.To entering that the checking of supply chain and management help preventing counterfeiting merchandise, and help the approach determining to counterfeit merchandise and enter, supply chain operator is assessed and supervises.
Number of times and time that Product Validation information record product was verified, and the read write line id number of carrying out the product false proof checking.Help determining whether to exist the attack of malice like this.
Fake certification for product will be divided into two parts, and a part is the verification of digital signature, and another part is the tracking and the comparison of product history.
The encryption and decryption of digital signature adopts 1024 RSA Algorithm, the key of signature produces system or the release mechanism by appointment, the private cipher key of digital encryption is preserved by manufacturer, manufacturer utilizes private cipher key to produce digital signature on the electronic tag of product, and the manufacturer's of digital decrypted public keys is provided by the digital certificate of PKI system.The use public keys is decrypted and signs and can finish by the read write line of mandate or by the anti-fake certificate mechanism that can trust.Carry out the owner of the mandate read write line of fake certification will be in advance to believable digital certificate management mechanism application to get digital certificate, comprise the public keys of manufacturer in the certificate.In the data handling system that public keys can be kept at read write line links to each other, also can be kept in the SIM card that can insert the read write line specified interface, this moment, read write line needed specialized designs, can be for the fake certification special use.After carrying out false proof verification and be meant that the user utilizes read write line to read the anti-counterfeiting information of electronic tag by third-party anti-fake certificate mechanism, send the application of false proof verification to believable third party certification authority by communication network, carry out the operation of fake certification by third-party certification authority, and return the result of checking to the user.Contact method between user and the third party certification authority can comprise note, phone, Email, can be specifically designed to the communication protocol of fake certification or design each step that special embedded software is integrated checking by foundation at the read write line that is used for false proof verification, simplify proof procedure, make the process details of verifying user transparent.If digital signature by checking, is then assert the authenticity of product, if inconsistent, information then gives a warning.
The tracking of product history and the purpose of comparison mainly are the intermediate links of control product.Its basic verification process is as follows: the manufacturer of product lands the fake certification server and creates product detection message file after production is finished, and landfall process need carry out authentication.The first product detection information of setting up comprises the essential information of product, and tracking of products detects information.Product is each link (wholesale dealer through supply chain, home-delivery center, third-party logisticses etc.) time, write logistic track information by the read write line of authorizing in the logistics information district of electronic tag, described logistic track information can comprise the id number, write time, operator message of read write line etc.During false proof verification, verification side will be by the message reference fake certification server of the index area on the electronic tag, tracking of products detection information default in the product detection information on the information content in logistics information district and the anti-counterfeit server is compared, relatively content comprises id number of authorizing read write line and the time sequencing that writes, if comparing result unanimity, then assert the legitimacy of rule of origin, if inconsistent, information then gives a warning.In addition, Product Validation information will write down carries out the id number of read write line of fake certification and the time and the number of times of checking to product, and can provide its checking historical according to the requirement of authentication.
Based on the Comodity anti-fake system workflow of RFID as shown in Figure 4.The RFID electronic tag is attached on commodity in manufacturer, and each commodity will be endowed unique coding, and unique coding of commodity and manufacturer's digital signature will be written into the storer of label, and finish lock operation.The number of tags word signature is implemented when the label initialization, with label ID sign indicating number, manufacturer code and other correlation parameter, handle with the HASH algorithm, generate the digital finger-print sign indicating number, and carry out data encryption with the private cipher key of unsymmetrical key, and signature is produced by appointed equipment and security system with private key, and the root certificate that is used to authenticate leaves the authentication center that can trust in.The user can use the read write line of hand-held or the mobile phone of band RFID read-write capability to read electronic tag, to the authentication center that can trust inspection request is proposed by note, authentication center carries out digital authenticating by understanding digital signature to article identity, the authenticity of checking product; Manufacturer directly verifies the authenticity of product by authorizing the public keys that obtains the manufacturer.In addition, can be by the circulation history of record product on label, and compare with product detection information on the anti-counterfeit server, determine whether the process of circulation of product is up to specification, to replenish the authenticity of checking rule of origin.
Above-mentioned Comodity anti-fake system based on RFID has following four essential characteristics:
1) by product coding commodity is carried out unique identification.
The content of product code comprises manufacturer's code at least, product category code and product ID, and each commodity will obtain unique product coding.Before being attached to electronic tag on the product, above-mentioned code is write the storer of electronic tag, and lock, make that a product acquisition is not unique, the coding that can not revise.
2) carrying out product by the RFID technology discerns automatically.
Product coding is stored in the storer attached to the electronic tag on the product, electronic tag can by with the integrated environmental information of obtaining product of sensor, read the information of electronic tag in the anti-counterfeit recognition process by rfid interrogator, and can filter the electronic tag that repeats to read by the RFID middleware, the identification of realization multiple goal improves the efficient of identification greatly.The rfid interrogator of each manufacturer in the supply chain carries out read operation and deactivation operation to electronic tag under the situation of obtaining the authorization, the authorization message of read write line is kept in the believable information service system.
3) adopt guaranteeing data security property of digital signature and non repudiation
To preserve the product information and the product unique number of manufacturer's employing private key signature on electronic tag, digital signature will write electronic tag at the manufacturer place, and lock, and make it to make amendment.When carrying out fake certification, can decipher by the PKI of authentication center, and extract the HASH functional value of product information, compare, judge whether product is that this manufacturer produces with the HASH functional value of preserving in the label.
4) utilize the historical checking rule of origin that replenishes of product
The raw information of product and the environmental requirement of product etc. are provided by the manufacturer, and information service system is created a product for each product and detected message file when product export.Commodity will utilize rfid interrogator to write the product historical information in the historical district of the product of electronic tag through the supply chain manufacturer of authorizing in whole logistics progress, comprise read write line number and access time etc.Can be in advance product set several monitoring points in the supply chain of process, the read write line numbered list of check point will be kept in the database of authentication center, during anti-fake certificate, the default read write line numbering and the sequence of logistics information tracking area and authentication center will be compared, if comprise the read write line numbering of all the supply chain manufacturers that must pass through through this product of authorizing in the logistics information tracking area, meet the requirement of manufacturer simultaneously to Product transport and storage, then regard as trusted products, otherwise send false proof information.
It should be noted last that, above embodiment is only unrestricted in order to technical scheme of the present invention to be described, although the present invention is had been described in detail with reference to preferred embodiment, those of ordinary skill in the art is to be understood that, can make amendment or be equal to replacement technical scheme of the present invention, and not breaking away from the spirit and scope of technical solution of the present invention, it all should be encompassed in the middle of the claim scope of the present invention.
Note 1, RSA common key cryptosystem are to unite proposition by Rivest, Shamir and Adleman, the basis of RSA is the theorem of Euler of number theory, its security depends on the difficulty of the factor decomposition of big number, is considered to up to the present most promising a kind of common key cryptosystem.Document [1], [2] see reference.
Note 2, Secure Hash Algorithm (SHA-1) are a kind of hash functions (Hash) that Unite States Standard (USS) technology NIST of institute and the NSA of American National security bureau design together, its design is for matching used with Digital Signature Standard DSS, is the Hash function of the most anti-exhaustive attack (comprising birthday attack) in the Hash function of being analyzed at present.Document [3], [4], [5] see reference.
List of references:
[1]R.L.Rivest,A.Shamir,and?L.M.Adleman,“A?method?for?obtaining?digitalsignatures?and?public-key?cryptosystem.”Communication?ofthe?ACM.1978.21:pp.120~126.
[2]R.L.Rivest,A.Shamir,and?L.M.Adleman,“On?Digital?Signatures?and?Public-KeyCryptsystems,”MIT?Laboratory?for?Computer?Science,Technical?Report,MIT/LCS/TR-212.Jan?1979.
[3]Federal?Information?Processing?Standards(FIPS).Secure?Hash?Standard(SHA-1).Technical?Report?180-1,National?Institute?of?Standards?and?Technology(NIST),April?1995.supersedes?FIPS?PUT?180,1993.
[4]Alma?Technologies.SHA-1?Cores. http://www.alma-tech.com
[5]CAST?Inc.AES?and?SHA-1?Crypto?processor?Cores.http://www.cast-inc.com

Claims (9)

1, a kind of anti-counterfeit authentication method based on REID is characterized in that, the storer of radio frequency recognizing electronic label is divided at least: the historical district of basic information region, digital signature district and product; Basic information region, the storage products code, promptly unique coding comprises manufacturer code and the sequence number that can distinguish Individual Items; The digital signature district, storage manufacturer is to the digital signature of product essential information; The historical district of product, the master data of record logistic track information, at product through in the supply chain during each predefined logistics link, will be through the read write line of authorizing in the relevant information of logistics information tracking area write operation, as the time of operation, the identifier of read write line etc.;
The checking flow process comprises at least:
Step 1, the label initialization, the unique coding of essential information writes, and generates digital signature, sets up the history file of commodity;
Step 2, through each predefined logistics link the time, will be through the read write line of authorizing in the relevant information of logistics information tracking area write operation;
Step 3, read write line reads electronic tag, proposes inspection request to the authentication center that can trust, authentication center is by understanding digital signature, article identity is carried out digital authenticating,, then do not produce the fake product warning if do not conform to if digital signature conforms to and then carries out step 4;
Step 4, the information in the historical district of inquiry product judges then whether this trace information conforms to predefined trace information, conforms to and then passes through, and does not conform to then to produce the fake product warning.
2, anti-counterfeit authentication method according to claim 1, it is characterized in that, described digital signature realizes by the combination of Digital Fingerprinting Technology and " public key technology ", locate in manufacturer, at first generate the digital digest of product coding with HASH function S HA-1, adopt RSA Algorithm digital digest to be encrypted then, generate digital signature with the private cipher key of manufacturer;
Public key technology is used a public keys and a private cipher key, and wherein public keys is open and private cipher key is maintained secrecy, and private cipher key is used for encrypting and signature, and public keys is used for deciphering; The private cipher key of manufacturer can only be used by manufacturer oneself, and public-key cryptography can be used by a plurality of certifying organization.
3, anti-counterfeit authentication method according to claim 1 is characterized in that, described deciphering digital signature is carried out digital authenticating to article identity, comprises at least:
When carrying out fake certification, authentication uses HASH function S HA-1 to generate the digital digest 1 of the unique coding of product, utilize RSA Algorithm digital signature to be decrypted operation simultaneously with the public-key cryptography of manufacturer, obtain the digital digest 2 of the unique coding of product, if digital digest 1 is identical with digital digest 2, then signature effectively.
4, anti-counterfeit authentication method according to claim 1 and 2 is characterized in that, described digital signature is locked after writing the storer of electronic tag, can only carry out read operation later on.
5, anti-counterfeit authentication method according to claim 1 and 2 is characterized in that, described public keys and private cipher key must be produced by appointed equipment and security system.
6, anti-counterfeit authentication method according to claim 1 is characterized in that, the storage space in the historical district of product both can carry out read operation, also can carry out write operation.
7, anti-counterfeit authentication method according to claim 1, it is characterized in that, the storer of described radio frequency recognizing electronic label also comprises anti-fake certificate server address index area, this allocation index district preserves the IP address of anti-fake certificate server and the index of IP address, by above-mentioned index, can indicate and preserve the server address that product detects message file, 0 grade of index refers to the IP address of direct sign anti-counterfeit server, and the allocation index more than 1 grade and 1 grade then comprises the plot of a retrieval and some grades side-play amount.
8, a kind of Antiforge system based on REID is characterized in that this Antiforge system comprises electronic tag, read write line and anti-counterfeiting information service system at least; The storer of electronic tag comprises the historical district of basic information region, digital signature district, anti-fake certificate server address index area and product; The anti-counterfeiting information service system comprises product and detects message file and authentication information, the content of record comprises by the time for reading of the coding of the product attribute of manufacturer's typing, label, label and carries out the read write line numbering of read operation, the environmental information of product etc. that the information service system manufacturer or the third-party institution are responsible for maintenance; N level anti-counterfeit server is set, the index of the IP address of authentication storage server and IP address in the storer of electronic tag in the information service system; 0 grade of index refers to the IP address of direct sign anti-counterfeit server, allocation index more than 1 grade and 1 grade then comprises the plot of a retrieval and some grades side-play amount, the commodity counterfeit prevention of N level index, can be by the server of visit plot sensing, it is logical that the side-play amount that refers again to the N level obtains the IP address of actual anti-counterfeit server, cross above-mentioned index, can indicate and preserve the final server address that product detects message file.
9, the Antiforge system based on REID according to claim 8, it is characterized in that: the numerical value of described IP address and IP allocation index is determined by the implementer of Antiforge system in advance, allocation index is locked after writing electronic tag, can only carry out read operation later on.
CNB2005100276050A 2005-07-07 2005-07-07 Method for anti false verification based on identification technique in radio frequency, and anti false system Expired - Fee Related CN100375111C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100276050A CN100375111C (en) 2005-07-07 2005-07-07 Method for anti false verification based on identification technique in radio frequency, and anti false system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100276050A CN100375111C (en) 2005-07-07 2005-07-07 Method for anti false verification based on identification technique in radio frequency, and anti false system

Publications (2)

Publication Number Publication Date
CN1728162A true CN1728162A (en) 2006-02-01
CN100375111C CN100375111C (en) 2008-03-12

Family

ID=35927422

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100276050A Expired - Fee Related CN100375111C (en) 2005-07-07 2005-07-07 Method for anti false verification based on identification technique in radio frequency, and anti false system

Country Status (1)

Country Link
CN (1) CN100375111C (en)

Cited By (64)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101515334A (en) * 2009-04-07 2009-08-26 华中科技大学 Electronic tag data filtering method used for radio frequency identification middleware
CN101089871B (en) * 2006-06-14 2010-04-14 中国科学院自动化研究所 System and method for antiforge of article with certificate based on radio frequency technology
CN101765224A (en) * 2010-01-18 2010-06-30 彭保 Mutually unique mark implementation method for terminal of Internet of Things
CN101247230B (en) * 2008-02-28 2010-07-28 唐跃文 Anti-counterfeiting method based on non-contact IC card
CN101872460A (en) * 2010-05-27 2010-10-27 上海华彩科技有限公司 Treatment method of RFID online anti-counterfeiting system based on dynamic anti-counterfeiting mark
CN101882197A (en) * 2010-05-31 2010-11-10 北京航空航天大学 RFID (Radio Frequency Identification Device) inquiring-response safety certificate method based on grading key
CN101938740A (en) * 2009-07-02 2011-01-05 中兴通讯股份有限公司 Information issuing method and system for earthquake tsunami alarm system
CN101945123A (en) * 2010-08-24 2011-01-12 刘彤 RFID mobile phone and combination key technology-based authenticity identification method
CN101369306B (en) * 2008-08-29 2011-02-02 广东南方信息安全产业基地有限公司 Electronic label security system
CN101980271A (en) * 2010-10-15 2011-02-23 银川市高新电子应用技术研究所 Radio frequency identification technology-based commodity anti-counterfeiting system and method, and anti-counterfeiting electronic device
CN101277185B (en) * 2007-03-28 2011-04-27 联想(北京)有限公司 Authentication method, system based on wireless identification as well as wireless identification, server
CN102055587A (en) * 2010-04-01 2011-05-11 广州信睿网络科技有限公司 Digital signature method capable of being implemented on flow line
CN102063633A (en) * 2010-03-26 2011-05-18 广州信睿网络科技有限公司 Anti-counterfeiting method based on radio frequency identification technology
CN102122340A (en) * 2010-11-16 2011-07-13 北京中电华大电子设计有限责任公司 Method for preventing radio from being exposed in radio frequency identification system
CN101075340B (en) * 2007-03-28 2011-08-24 深圳先进技术研究院 Method and system for quarantining wooden packet
CN102222284A (en) * 2011-06-28 2011-10-19 河海大学 Article anti-counterfeiting system and anti-counterfeiting authentication control method based on radio frequency identification technology
CN102227108A (en) * 2011-06-20 2011-10-26 复旦大学 Electronic pedigree single point generation method with credible processes and verification method thereof
CN101622628B (en) * 2006-12-14 2012-05-02 香港理工大学 Physimetric authentication of physical object by digital identification (DID)
CN101847199B (en) * 2009-03-24 2012-06-06 复旦大学 Security authentication method for radio frequency recognition system
CN102496114A (en) * 2011-11-22 2012-06-13 成都天钥科技有限公司 Method and system for product counterfeiting prevention and method and device for identity information generation
CN102509147A (en) * 2011-10-18 2012-06-20 哈尔滨大东方卷烟材料科技开发有限责任公司 No-chip electronic anti-counterfeit label based on radio frequency identification technology and manufacturing method of no-chip electronic anti-counterfeit label
CN102542510A (en) * 2010-12-31 2012-07-04 贵州中烟工业有限责任公司 Cigarette production process monitoring system with RFID (Radio Frequency Identification Device) and monitoring method
CN102542310A (en) * 2011-12-30 2012-07-04 威海逸云数字传媒有限公司 Painting and calligraphy source-tracing instrumented method adopting electronic picture seal
CN102542427A (en) * 2010-12-31 2012-07-04 贵州中烟工业有限责任公司 Cigarette after-sale tracking system with RFID (Radio Frequency Identification Device) and tracking method
CN101236611B (en) * 2007-02-02 2012-07-18 成都西谷曙光数字技术有限公司 Intelligent electronic label system
CN102622624A (en) * 2012-03-21 2012-08-01 重庆科技学院 Commodity anti-counterfeiting identification system and commodity anti-counterfeiting identification method
CN102663596A (en) * 2012-04-05 2012-09-12 焦林 Network sale system tracking commodity in whole process and sale method thereof
CN102708469A (en) * 2012-05-25 2012-10-03 宁波志清实业有限公司 Supervising and tracking system and method of gas valve during manufacturing and use
CN102779284A (en) * 2012-01-30 2012-11-14 张楠 RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like
CN102790676A (en) * 2012-03-20 2012-11-21 黄志军 Remote identity identification or security method utilizing mobile phone with near field communication (NFC) function
CN102902995A (en) * 2012-09-28 2013-01-30 山东轻工业学院 Intelligent terminal control system
CN103413227A (en) * 2013-08-02 2013-11-27 四川航天系统工程研究所 Product fake prevention tracing system and method for implementing fake prevention tracing checking thereof
CN103456323A (en) * 2013-08-15 2013-12-18 广东南方信息安全产业基地有限公司 Optical disk recording and authorized using method
CN103489106A (en) * 2012-06-11 2014-01-01 陈昶任 Chip label anti-counterfeiting method and system matched with positioning
CN103516517A (en) * 2012-06-21 2014-01-15 Nxp股份有限公司 Production method, RFID transponder, authentication method, and reader device
CN103824202A (en) * 2014-03-21 2014-05-28 成都市易恒信科技有限公司 CPK (Combined Public Key) identification authentication technology based RFID (Radio Frequency Identification Device) and two-dimensional code composite truth-identification and anti-fake source-tracing method
CN103985043A (en) * 2013-02-08 2014-08-13 江苏东仁网络科技有限公司 Electronic encryption label, false proof label system, and article false proof system and method
US8963684B2 (en) 2008-03-27 2015-02-24 Ge Healthcare Bio-Sciences Corp Gamma sterilizable RFID system that prevents unauthorized operation of associated disposable bioprocess components
CN104375846A (en) * 2013-08-14 2015-02-25 深圳正峰印刷有限公司 Generation method and device of digital printed files
US8981935B2 (en) 2008-12-10 2015-03-17 Siemens Aktiengesellschaft Method and system for supplying target information
CN104766107A (en) * 2015-03-06 2015-07-08 中国十七冶集团有限公司 System utilizing RFID electronic product code to collect data in BIM
CN104809618A (en) * 2014-01-27 2015-07-29 上海高研明鉴信息技术有限公司 Radio frequency identification tag-based product anti-counterfeiting method
CN104881791A (en) * 2015-06-02 2015-09-02 石家庄开发区冀科双实科技有限公司 RFID-based efficient tracking and tracing method with privacy protection feature
CN104951837A (en) * 2014-03-31 2015-09-30 中国电信股份有限公司 Order generation method through short-distance wireless communication tag and system thereof
WO2015172352A1 (en) * 2014-05-15 2015-11-19 Seagate Technology Llc Storage device tampering detection
CN105160374A (en) * 2015-10-14 2015-12-16 哈尔滨宇龙自动化有限公司 Network management system, RFID (Radio Frequency Identification) industrial recognizer and management method
CN105187404A (en) * 2015-08-14 2015-12-23 罗周 Method and device for anti-fake inquiry of file based on cloud server
CN105404907A (en) * 2015-10-27 2016-03-16 上海象形通讯科技有限公司 RFID electronic license plate generation system, method, license plate recognition system and method
CN105844481A (en) * 2016-03-24 2016-08-10 胡金钱 System and method for performing digital signature and anticounterfeiting verification on contract
CN106599952A (en) * 2016-12-16 2017-04-26 广东优替信息科技股份有限公司 Method and device for acquiring article information based on electronic tag
CN107409043A (en) * 2015-01-23 2017-11-28 捷德移动安全有限责任公司 Distributed treatment of the data storage based on center encryption to product
CN107430755A (en) * 2014-12-05 2017-12-01 识库链公司 The encrypted authentication in source in supply chain
CN107730276A (en) * 2017-09-30 2018-02-23 浙江鑫泊新能源科技有限公司 It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method
CN108846458A (en) * 2018-06-27 2018-11-20 河南孚点电子科技有限公司 A kind of video electronic traceability system
CN109146024A (en) * 2018-07-26 2019-01-04 宁波大红鹰学院 Art work Anti-fake electronic label System and method for based on block chain
CN110008719A (en) * 2019-03-11 2019-07-12 新华三信息安全技术有限公司 A kind of file process, file test method and device
CN110575174A (en) * 2018-06-08 2019-12-17 塔塔咨询服务有限公司 Method and system for activity recognition and behavior analysis
CN112042153A (en) * 2018-04-30 2020-12-04 默克专利有限公司 Composite security marking and method and device for providing and reading a composite security marking
CN112585615A (en) * 2018-06-19 2021-03-30 锡克拜控股有限公司 Double material-digital anti-fake protection for article
CN112819111A (en) * 2019-10-31 2021-05-18 上海际链网络科技有限公司 Method and device for identifying authenticity of commodity, storage medium, terminal and server
CN112862047A (en) * 2021-02-06 2021-05-28 陈永林 Double-authorization intelligent anti-counterfeit label generation method
CN114830599A (en) * 2019-11-25 2022-07-29 国际商业机器公司 Managing physical objects using encrypted anchors
CN116452223A (en) * 2023-06-12 2023-07-18 酒仙网络科技股份有限公司 RFID-based original bottle imported wine information management system
CN117725954A (en) * 2024-02-18 2024-03-19 韶山盈芯物联网科技有限公司 Digital supply chain data management method and system based on RFID

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101609138B (en) * 2008-06-16 2011-12-07 苏州工业园区优频科技有限公司 Cargo tracking and monitoring system
CN102314662B (en) * 2011-09-23 2014-04-23 东华大学 Authorized distributor monitoring method based on mobile RFID
CN104346731A (en) * 2013-08-06 2015-02-11 全联斯泰克科技有限公司 Method and device for generating and verifying anti-counterfeit electronic tag based on CPK (Combined Public Key)
CN103971245B (en) * 2014-01-30 2017-06-27 四川谦泰仁投资管理有限公司 A kind of combined ciphering system false proof for electronic article
CN107665414A (en) * 2017-09-30 2018-02-06 浙江鑫泊新能源科技有限公司 A kind of band encrypted radio-frequency identifies active digital wiring board to kinds of goods back-tracing anti-fake method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050036620A1 (en) * 2003-07-23 2005-02-17 Casden Martin S. Encryption of radio frequency identification tags
CN1540583A (en) * 2003-10-27 2004-10-27 江苏瑞福智能科技有限公司 Method of safe using and anti false discriminating stored type electronic label

Cited By (94)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101089871B (en) * 2006-06-14 2010-04-14 中国科学院自动化研究所 System and method for antiforge of article with certificate based on radio frequency technology
CN101622628B (en) * 2006-12-14 2012-05-02 香港理工大学 Physimetric authentication of physical object by digital identification (DID)
CN101236611B (en) * 2007-02-02 2012-07-18 成都西谷曙光数字技术有限公司 Intelligent electronic label system
CN101277185B (en) * 2007-03-28 2011-04-27 联想(北京)有限公司 Authentication method, system based on wireless identification as well as wireless identification, server
CN101075340B (en) * 2007-03-28 2011-08-24 深圳先进技术研究院 Method and system for quarantining wooden packet
CN101247230B (en) * 2008-02-28 2010-07-28 唐跃文 Anti-counterfeiting method based on non-contact IC card
US8963684B2 (en) 2008-03-27 2015-02-24 Ge Healthcare Bio-Sciences Corp Gamma sterilizable RFID system that prevents unauthorized operation of associated disposable bioprocess components
CN107092950A (en) * 2008-03-27 2017-08-25 通用电气医疗集团生物科学生物方法公司 Prevent unauthorized operation be associated disposable biological process component can gamma sterilization RFID system
CN101369306B (en) * 2008-08-29 2011-02-02 广东南方信息安全产业基地有限公司 Electronic label security system
US8981935B2 (en) 2008-12-10 2015-03-17 Siemens Aktiengesellschaft Method and system for supplying target information
CN101847199B (en) * 2009-03-24 2012-06-06 复旦大学 Security authentication method for radio frequency recognition system
CN101515334A (en) * 2009-04-07 2009-08-26 华中科技大学 Electronic tag data filtering method used for radio frequency identification middleware
CN101938740B (en) * 2009-07-02 2016-12-07 中兴通讯股份有限公司 A kind of tsunami warning system information issuing method and system
CN101938740A (en) * 2009-07-02 2011-01-05 中兴通讯股份有限公司 Information issuing method and system for earthquake tsunami alarm system
CN101765224A (en) * 2010-01-18 2010-06-30 彭保 Mutually unique mark implementation method for terminal of Internet of Things
CN102063633A (en) * 2010-03-26 2011-05-18 广州信睿网络科技有限公司 Anti-counterfeiting method based on radio frequency identification technology
WO2011116653A1 (en) * 2010-03-26 2011-09-29 广州信睿网络科技有限公司 Anti-counterfeit method based on radio frequency identification technology
CN102055587A (en) * 2010-04-01 2011-05-11 广州信睿网络科技有限公司 Digital signature method capable of being implemented on flow line
CN102055587B (en) * 2010-04-01 2013-11-20 广州信睿网络科技有限公司 Digital signature method capable of being implemented on flow line
CN101872460A (en) * 2010-05-27 2010-10-27 上海华彩科技有限公司 Treatment method of RFID online anti-counterfeiting system based on dynamic anti-counterfeiting mark
CN101882197B (en) * 2010-05-31 2012-07-04 北京航空航天大学 RFID (Radio Frequency Identification Device) inquiring-response safety certificate method based on grading key
CN101882197A (en) * 2010-05-31 2010-11-10 北京航空航天大学 RFID (Radio Frequency Identification Device) inquiring-response safety certificate method based on grading key
CN101945123A (en) * 2010-08-24 2011-01-12 刘彤 RFID mobile phone and combination key technology-based authenticity identification method
CN101980271A (en) * 2010-10-15 2011-02-23 银川市高新电子应用技术研究所 Radio frequency identification technology-based commodity anti-counterfeiting system and method, and anti-counterfeiting electronic device
CN102122340A (en) * 2010-11-16 2011-07-13 北京中电华大电子设计有限责任公司 Method for preventing radio from being exposed in radio frequency identification system
CN102542510A (en) * 2010-12-31 2012-07-04 贵州中烟工业有限责任公司 Cigarette production process monitoring system with RFID (Radio Frequency Identification Device) and monitoring method
CN102542427A (en) * 2010-12-31 2012-07-04 贵州中烟工业有限责任公司 Cigarette after-sale tracking system with RFID (Radio Frequency Identification Device) and tracking method
CN102227108B (en) * 2011-06-20 2014-04-02 复旦大学 Electronic pedigree single point generation method with credible processes and verification method thereof
CN102227108A (en) * 2011-06-20 2011-10-26 复旦大学 Electronic pedigree single point generation method with credible processes and verification method thereof
CN102222284A (en) * 2011-06-28 2011-10-19 河海大学 Article anti-counterfeiting system and anti-counterfeiting authentication control method based on radio frequency identification technology
CN102509147A (en) * 2011-10-18 2012-06-20 哈尔滨大东方卷烟材料科技开发有限责任公司 No-chip electronic anti-counterfeit label based on radio frequency identification technology and manufacturing method of no-chip electronic anti-counterfeit label
WO2013075547A1 (en) * 2011-11-22 2013-05-30 熊楚渝 Product anti-forgery method and system, and product identity information generation method and device
CN102496114A (en) * 2011-11-22 2012-06-13 成都天钥科技有限公司 Method and system for product counterfeiting prevention and method and device for identity information generation
CN102542310A (en) * 2011-12-30 2012-07-04 威海逸云数字传媒有限公司 Painting and calligraphy source-tracing instrumented method adopting electronic picture seal
CN102779284A (en) * 2012-01-30 2012-11-14 张楠 RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like
CN102779284B (en) * 2012-01-30 2015-05-20 张楠 RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like
CN102790676A (en) * 2012-03-20 2012-11-21 黄志军 Remote identity identification or security method utilizing mobile phone with near field communication (NFC) function
CN102790676B (en) * 2012-03-20 2016-01-13 黄志军 A kind of with the identification of NFC functional mobile phone remote identity or false proof method
CN102622624A (en) * 2012-03-21 2012-08-01 重庆科技学院 Commodity anti-counterfeiting identification system and commodity anti-counterfeiting identification method
CN102663596A (en) * 2012-04-05 2012-09-12 焦林 Network sale system tracking commodity in whole process and sale method thereof
CN102708469A (en) * 2012-05-25 2012-10-03 宁波志清实业有限公司 Supervising and tracking system and method of gas valve during manufacturing and use
CN103489106B (en) * 2012-06-11 2016-08-10 陈昶任 Chip label anti-counterfeiting method and system matched with positioning
CN103489106A (en) * 2012-06-11 2014-01-01 陈昶任 Chip label anti-counterfeiting method and system matched with positioning
US10007815B2 (en) 2012-06-21 2018-06-26 Nxp B.V. Production method, RFID transponder, authentication method, reader device and computer program product
CN103516517A (en) * 2012-06-21 2014-01-15 Nxp股份有限公司 Production method, RFID transponder, authentication method, and reader device
CN102902995B (en) * 2012-09-28 2015-09-16 齐鲁工业大学 A kind of intelligent terminal control system
CN102902995A (en) * 2012-09-28 2013-01-30 山东轻工业学院 Intelligent terminal control system
CN103985043A (en) * 2013-02-08 2014-08-13 江苏东仁网络科技有限公司 Electronic encryption label, false proof label system, and article false proof system and method
CN103413227A (en) * 2013-08-02 2013-11-27 四川航天系统工程研究所 Product fake prevention tracing system and method for implementing fake prevention tracing checking thereof
CN103413227B (en) * 2013-08-02 2016-12-28 四川航天系统工程研究所 Product anti-counterfeiting tracing system and the false proof implementation method reviewing examination thereof
CN104375846B (en) * 2013-08-14 2017-07-28 深圳正峰印刷有限公司 The production method and its generation device of ePrint Archive
CN104375846A (en) * 2013-08-14 2015-02-25 深圳正峰印刷有限公司 Generation method and device of digital printed files
CN103456323B (en) * 2013-08-15 2016-12-28 广东南方信息安全产业基地有限公司 A kind of CD burning and the method licensed
CN103456323A (en) * 2013-08-15 2013-12-18 广东南方信息安全产业基地有限公司 Optical disk recording and authorized using method
CN104809618A (en) * 2014-01-27 2015-07-29 上海高研明鉴信息技术有限公司 Radio frequency identification tag-based product anti-counterfeiting method
CN104809618B (en) * 2014-01-27 2018-02-13 上海高研明鉴信息技术有限公司 Antifake method for products based on electronic tag
CN103824202A (en) * 2014-03-21 2014-05-28 成都市易恒信科技有限公司 CPK (Combined Public Key) identification authentication technology based RFID (Radio Frequency Identification Device) and two-dimensional code composite truth-identification and anti-fake source-tracing method
CN104951837A (en) * 2014-03-31 2015-09-30 中国电信股份有限公司 Order generation method through short-distance wireless communication tag and system thereof
US9984256B2 (en) 2014-05-15 2018-05-29 Seagate Technology Llc Storage device tampering detection
WO2015172352A1 (en) * 2014-05-15 2015-11-19 Seagate Technology Llc Storage device tampering detection
CN107430755A (en) * 2014-12-05 2017-12-01 识库链公司 The encrypted authentication in source in supply chain
CN107409043B (en) * 2015-01-23 2021-07-13 捷德移动安全有限责任公司 Distributed processing of products based on centrally encrypted stored data
CN107409043A (en) * 2015-01-23 2017-11-28 捷德移动安全有限责任公司 Distributed treatment of the data storage based on center encryption to product
CN104766107A (en) * 2015-03-06 2015-07-08 中国十七冶集团有限公司 System utilizing RFID electronic product code to collect data in BIM
CN104881791A (en) * 2015-06-02 2015-09-02 石家庄开发区冀科双实科技有限公司 RFID-based efficient tracking and tracing method with privacy protection feature
CN104881791B (en) * 2015-06-02 2018-07-06 河北省科学院应用数学研究所 The efficient tracking source tracing method for having secret protection characteristic based on RFID
CN105187404B (en) * 2015-08-14 2019-01-25 罗周 A kind of document security querying method and device based on Cloud Server
CN105187404A (en) * 2015-08-14 2015-12-23 罗周 Method and device for anti-fake inquiry of file based on cloud server
CN105160374A (en) * 2015-10-14 2015-12-16 哈尔滨宇龙自动化有限公司 Network management system, RFID (Radio Frequency Identification) industrial recognizer and management method
CN105404907B (en) * 2015-10-27 2018-08-21 上海象形通讯科技股份有限公司 RFID electronic license plates generate system, method and Vehicle License Plate Recognition System, method
CN105404907A (en) * 2015-10-27 2016-03-16 上海象形通讯科技有限公司 RFID electronic license plate generation system, method, license plate recognition system and method
CN105844481A (en) * 2016-03-24 2016-08-10 胡金钱 System and method for performing digital signature and anticounterfeiting verification on contract
CN106599952A (en) * 2016-12-16 2017-04-26 广东优替信息科技股份有限公司 Method and device for acquiring article information based on electronic tag
WO2019062530A1 (en) * 2017-09-30 2019-04-04 浙江鑫泊物流科技有限公司 Commodity tracing and anti-counterfeiting method and device
CN107730276A (en) * 2017-09-30 2018-02-23 浙江鑫泊新能源科技有限公司 It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method
CN112042153A (en) * 2018-04-30 2020-12-04 默克专利有限公司 Composite security marking and method and device for providing and reading a composite security marking
CN110575174A (en) * 2018-06-08 2019-12-17 塔塔咨询服务有限公司 Method and system for activity recognition and behavior analysis
CN110575174B (en) * 2018-06-08 2021-12-14 塔塔咨询服务有限公司 Method and system for activity recognition and behavior analysis
CN112585615A (en) * 2018-06-19 2021-03-30 锡克拜控股有限公司 Double material-digital anti-fake protection for article
CN112585615B (en) * 2018-06-19 2024-03-08 锡克拜控股有限公司 Dual material-digital anti-counterfeit protection for articles
CN108846458A (en) * 2018-06-27 2018-11-20 河南孚点电子科技有限公司 A kind of video electronic traceability system
CN109146024B (en) * 2018-07-26 2021-12-17 宁波财经学院 Artwork anti-counterfeiting electronic tag system and method based on block chain
CN109146024A (en) * 2018-07-26 2019-01-04 宁波大红鹰学院 Art work Anti-fake electronic label System and method for based on block chain
CN110008719A (en) * 2019-03-11 2019-07-12 新华三信息安全技术有限公司 A kind of file process, file test method and device
CN112819111A (en) * 2019-10-31 2021-05-18 上海际链网络科技有限公司 Method and device for identifying authenticity of commodity, storage medium, terminal and server
CN114830599A (en) * 2019-11-25 2022-07-29 国际商业机器公司 Managing physical objects using encrypted anchors
US11798342B2 (en) 2019-11-25 2023-10-24 International Business Machines Corporation Managing physical objects using crypto-anchors
CN114830599B (en) * 2019-11-25 2024-05-03 国际商业机器公司 Managing physical objects using encryption anchors
CN112862047B (en) * 2021-02-06 2023-09-15 陈永林 Dual-authorization intelligent anti-counterfeit label generation method
CN112862047A (en) * 2021-02-06 2021-05-28 陈永林 Double-authorization intelligent anti-counterfeit label generation method
CN116452223A (en) * 2023-06-12 2023-07-18 酒仙网络科技股份有限公司 RFID-based original bottle imported wine information management system
CN116452223B (en) * 2023-06-12 2023-09-22 酒仙网络科技股份有限公司 RFID-based original bottle imported wine information management system
CN117725954A (en) * 2024-02-18 2024-03-19 韶山盈芯物联网科技有限公司 Digital supply chain data management method and system based on RFID
CN117725954B (en) * 2024-02-18 2024-06-07 韶山盈芯物联网科技有限公司 Digital supply chain data management method and system based on RFID

Also Published As

Publication number Publication date
CN100375111C (en) 2008-03-12

Similar Documents

Publication Publication Date Title
CN100375111C (en) Method for anti false verification based on identification technique in radio frequency, and anti false system
CN110062940B (en) PUF-based composite security markings for protection against counterfeiting
CN110073430B (en) PUF-based composite security mark for anti-counterfeiting
JP7385663B2 (en) Method and system for preparing and performing object authentication
EP2002382B1 (en) Method and device for obtaining item information using rfid tags
CN102163291B (en) Laser marking multi-encrypted two-dimensional code fingerprint anti-counterfeit authentication method and system
US20090167489A1 (en) Anti-forgery method and apparatus based on cpk electronic tag
CN109726780B (en) Block chain-based packaging material verification method, device and system
CN101593265A (en) Antiforge system based on radio-frequency (RF) identification
TW201440017A (en) Method and apparatus for marking manufactured items using physical characteristic
CN104166871B (en) Anti-counterfeit label and anti-counterfeit method based on combination of two-dimension codes and RFID chips
CN101593264A (en) Method for anti-counterfeit based on radio-frequency (RF) identification
CN102930307A (en) Anti-counterfeiting authentication method for famous wine
US20190228420A1 (en) Method and system for verifying merchandise authenticity
CN102004965A (en) Double ant-counterfeiting method and system of product
CN106688205A (en) Method and system for marking manufactured items to detect unauthorised refilling
CN101527021A (en) RFID electronic tag reading and writing device used for product truth verification
CN108629603B (en) Commodity anti-counterfeiting method based on two-dimensional code
CN202870898U (en) Radio frequency-based commodity information identification system
CN1664836A (en) Merchandise multiple digitalized false proof technology
CN102867260A (en) Bluetooth-based commodity information identification method and system
CN101685493A (en) Method used for encrypting and verifying radio frequency identification (RFID) data
CN202870899U (en) Bluetooth-based commodity information identification system
CN201662818U (en) Anti-fake certification device with laser-marking and multi-encrypting two-dimensional code fingerprint
JP7456009B2 (en) Methods for authenticating items

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080312

Termination date: 20170707