CN207851892U - Verify device - Google Patents

Verify device Download PDF

Info

Publication number
CN207851892U
CN207851892U CN201721275485.0U CN201721275485U CN207851892U CN 207851892 U CN207851892 U CN 207851892U CN 201721275485 U CN201721275485 U CN 201721275485U CN 207851892 U CN207851892 U CN 207851892U
Authority
CN
China
Prior art keywords
information
verification
product
uid
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201721275485.0U
Other languages
Chinese (zh)
Inventor
卓越
李冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens Ltd China
Original Assignee
Siemens Ltd China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens Ltd China filed Critical Siemens Ltd China
Priority to CN201721275485.0U priority Critical patent/CN207851892U/en
Application granted granted Critical
Publication of CN207851892U publication Critical patent/CN207851892U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The utility model discloses a kind of verification device, verification information storage unit is arranged in the utility model on product, stores verification information.In verification, reading unit reads the verification information stored in the verification information storage unit being arranged on product;Authentication unit verifies the verification information of reading, and obtain instruction verify whether by result information.Herein, the verification information includes a variety of verification informations of not modifiable unique mark (UID) and/or anti-fake content information, and multiple-authentication may be used, improve the reliability of product;In Product Validation, even if storage authorizes database delay machine or the collapse of UID, still can be verified according to other verification informations in verification information storage unit so that maintenance cost reduces.

Description

Verify device
Technical field
The utility model is related to computer technology, more particularly to a kind of verification device.
Background technology
The product that production firm produces in order to prevent is counterfeit, is usually verified using anti-counterfeiting technology to product.Currently, There are many anti-counterfeit authentication methods of product, for example uses following methods.
The first, Quick Response Code (QR-codes) anti-fake mode.Central server, storage is arranged in network side in setup phase Authorizing product identifies, and the two-dimension code label for being mapped with product identification is sprayed or is pasted onto on product.Qualify Phase, using two dimension Two-dimension code label on code scanning device scanning product, the product identification identified from two-dimension code label are uploaded to center service Device determines the product identification received whether in the authorizing product mark of storage, if it is, confirming by central server Product is true;If it is not, then confirming that product is to forge.
Second, near-field communication (NFC) anti-fake mode.Central server is arranged in setup phase, network side, and storage authorizes production Product identify, and product identification is mapped in NFC label, the NFC label is attached on product.Qualify Phase is set using NFC RFID tag on standby identification product, central server is uploaded to by the product identification identified from NFC label, genuinely convinced in Business device determines the product identification received whether in the authorizing product mark of storage, if it is, confirming that product is true;Such as Fruit is no, then confirms that product is to forge.
Using above-mentioned first way carry out product false proof verification, there are product false proof verification reliability it is not high lack It falls into:Adulterator can be attached on the product of forgery, by replicating two-dimension code label to be tested by the anti-fake of center processor Card.Using the above-mentioned second way, there are the higher defects of cost:It needs to spend a large amount of manpower and materials, maintenance centre's server The stable operation of the database of middle storage authorizing product mark, once the database delay machine or collapse, central server can not The fake certification of product is carried out again.
Utility model content
In view of this, the utility model proposes a kind of verification method, this method can be improved when realizing Product Validation Reliability and reduce cost.
The utility model also proposed a kind of verification device, which can improve reliably when realizing Product Validation Property and reduce cost.
The utility model is realized in this way:
A kind of verification device, including:
Reading unit 101, for reading the verification information stored in the verification information storage unit being arranged on product;
Authentication unit 103 is verified for the verification information to reading, and obtain instruction verify whether by Result information.
Preferably, the verification information storage unit is near-field communication NFC label, the verification information includes NFC marks At least one of unique mark UID and product false proof content information of label.
Preferably, the authentication unit 103 is used for:
It is verified according to the UID in the verification information, and obtains the result for indicating to be verified when being verified Information;Or
It is verified according to the product false proof content information in the verification information, and obtains instruction when being verified and test Demonstrate,prove the result information passed through;Or
Respectively according in the verification information UID and product false proof content information verified, and verification lead to respectively The out-of-date result information for obtaining instruction and being verified.
Preferably, the authentication unit 103 is used for:
Determine the UID in the verification information whether with the mandate UID lists in being stored in advance in authentication unit (103) In UID it is identical;
When determining that the UID in the verification information is identical as the UID in UID lists is authorized, obtains instruction and be verified Result information.
Preferably, the product false proof content information includes:With the relevant production information of production of the product and with institute The relevant sales information of sale of product is stated, the authentication unit 103 is used for:
Determine production information and sales information whether with the licensed-type production information being stored in advance in authentication unit (103) and Production line information in sales information list is identical with sales information;
When determining whether production information and sales information are believed with the production line in licensed-type production information and sales information list When breath is identical with sales information, the result information that instruction is verified is obtained.
Preferably, the product false proof content information is the information being encrypted with predetermined cryptographic algorithm, the verification is single Member 403 is used for:
The product false proof content information is decrypted using decipherment algorithm corresponding with scheduled Encryption Algorithm, with Product false proof content information after to decryption.
Preferably, described device further includes:
Communication unit 102 communicates to connect between reading unit 101 and authentication unit 103, and is used for reading unit 101 verification informations read are sent in authentication unit 103, and the instruction verification that reception is sent by authentication unit 103 is It is no by result information.
Described device further includes:
Notification unit 104, for receive the instruction from communication unit 102 verify whether by result information, and to User notifies.
A kind of verification terminal, the verification terminal include:
Reading unit 101, for reading the verification information stored in the verification information storage unit being arranged on product;
Reading unit 101 is communicatively connected to 103 in external authentication unit, is used for reading unit by communication unit 102 101 verification informations read are sent in authentication unit 103, and the instruction verification that reception is sent by authentication unit 103 is It is no by result information.
Preferably, the verification terminal further includes:
Notification unit 104, for receive the instruction from communication unit 102 verify whether by result information, and to User notifies.
A kind of verification method, the method includes:
Reading unit 101 reads the verification information stored in the verification information storage unit being arranged on product;
Authentication unit 103 verifies the verification information of reading, and obtain instruction verify whether by result Information.
Preferably, the verification information storage unit is near-field communication NFC label, the verification information includes NFC label Unique mark UID and at least one of product false proof content information.
Preferably, the verification information of described pair of reading includes the step of verification:
Authentication unit 103 is verified according to the UID in the verification information, and instruction verification is obtained when being verified By result information;Or
Authentication unit 103 is verified according to the product false proof content information in the verification information, and is being verified When obtain the result information that is verified of instruction;Or
Authentication unit 103 respectively according in the verification information UID and product false proof content information verified, and Verification respectively by when obtain the result information that is verified of instruction.
Preferably, the step of being verified according to the UID in the verification information includes:
Determine the UID in the verification information whether in the mandate UID lists in being stored in advance in authentication unit 103 UID it is identical;
When determining that the UID in the verification information is identical as the UID in UID lists is authorized, obtains instruction and be verified Result information.
Preferably, the product false proof content information includes:With the relevant production information of production of the product and with institute State the relevant sales information of sale of product;
The step of being verified according to the product false proof content information in the verification information include:
Determine production information and sales information whether with the licensed-type production information and pin that are stored in advance in authentication unit 103 The production line information sold in information list is identical with sales information;
When determining whether production information and sales information are believed with the production line in licensed-type production information and sales information list When breath is identical with sales information, the result information that instruction is verified is obtained.
Preferably, the product false proof content information is the information that predetermined cryptographic algorithm is encrypted;
The step of being verified according to the product false proof content information in the verification information include:
The product false proof content information is decrypted using decipherment algorithm corresponding with scheduled Encryption Algorithm, with Product false proof content information after to decryption.
Preferably, this method further comprises:
Between the reading unit 102 and authentication unit 103, further includes communication unit 102, reading unit 101 is read The verification information taken is sent in authentication unit 103, and is received the instruction sent by authentication unit 103 and verified whether to pass through Result information.
Preferably, the method further includes:
Notification unit 104 receive the instruction from communication unit 102 verify whether by result information, and to user into Row notice.
From said program as can be seen that verification information storage unit, storage verification letter is arranged in the utility model on product Breath.In verification, reading unit reads the verification information stored in the verification information storage unit being arranged on product;Verification is single Member verifies the verification information of reading, and obtain instruction verify whether by result information.Herein, described to test Card information includes a variety of verification informations of not modifiable unique mark (UID) and/or anti-fake content information, be may be used more Re-examination is demonstrate,proved, and the reliability of product is improved;In Product Validation, even if storage authorizes database delay machine or the collapse of UID, still It can be verified according to other verification informations in verification information storage unit so that maintenance cost reduces.
Description of the drawings
The preferred embodiment of the utility model will be described in detail by referring to accompanying drawing below, make the ordinary skill people of this field Member becomes apparent from the above and other feature and advantage of the utility model, in attached drawing:
Fig. 1 is verification apparatus structure schematic diagram provided by the utility model;
Fig. 2 is verification method flow chart provided by the utility model;
Fig. 3 provides the forming process schematic diagram of the ciphertext in NFC label for the utility model;
Fig. 4 is the specific example schematic diagram of the reliability of guarantee product false proof verification provided by the utility model.
Specific implementation mode
To keep the purpose of this utility model, technical solution and advantage clearer, by the following examples to the utility model It is further described.
The utility model may be used multiple-authentication, verification be arranged on product to improve the reliability of Product Validation Information memory cell stores verification information.In verification, reading unit reads the verification information storage unit being arranged on product The verification information of middle storage;The verification information of reading is sent to authentication unit by communication unit, and authentication unit according to Receive the verification information verified after, receive by the instruction that authentication unit is sent verify whether by result believe Breath.
Herein, the verification information includes a variety of of not modifiable unique mark UID and/or anti-fake content information Multiple-authentication may be used in verification information, improves the reliability of product;In Product Validation, even if storage authorizes UID's Database delay machine or collapse still can be verified so that dimension according to other verification informations in verification information storage unit Protect cost reduction.
In one embodiment of the utility model, verification information storage unit is NFC label, the anti-fake content information Encryption information is obtained using cipher mode, the encryption information can be encryption information, for example be formed in a manner of encrypting file, The encryption information is that UID and product information are calculated as input parameter using the Encryption Algorithm of setting.
Specifically, the method that the utility model one embodiment uses double anti-forge verification;And it is safeguarded to reduce Storage authorizes the cost of the database of UID, uses when storage authorizes database delay machine or the collapse of UID, is marked according to NFC Encryption information in label realizes Product Validation mode.In setup phase, in the NFC label for being attached to product, be arranged UID and Encryption information, the encryption information are calculated based on UID and product information using the Encryption Algorithm of setting, and database purchase is awarded The UID of power records list.In Qualify Phase, verification device reads the NFC label of product attachment, will read obtained UID and adds Confidential information uploads to network side, UID verifications whether is carried out in the UID lists of mandate according to UID by network side, and believe encryption Breath is verified, so that it is determined that whether product especially verifies the true and false of product by verification.
In the present invention, the NFC label of true product realizes that UID is actually NFC chips using NFC chip The intrinsic UID of hardware, can not by other fake products carry out NFC label change and duplication, it is ensured that tested in true and false product The reliability of card.In addition, anti-fake content information is stored by the way of encryption information in the software of NFC chip, in the true and false Various ways may be used when verifying the encryption information when Product Validation, for example determine whether the encryption information is repeated verification, It determines whether to be decrypted using the Encryption Algorithm of setting, or determines whether the product information of decryption is correct etc., from And confirm whether the ciphertext passes through verification.In this way, for NFC label, so that it may to be tested by hardware verification and software The double verification of card ensure that the reliability of Product Validation.
Further, the encryption information in NFC label is based on UID and product information using the Encryption Algorithm meter set It obtains, this is that the product information of product in order to prevent repeats and the reliability of subsequent product fake certification is reduced, institute To be also encrypted using the intrinsic UID of NFC label as an input parameter in encryption.
Fig. 1 is the verification device that the utility model embodiment provides, including:Reading unit 101 and authentication unit 103, In,
Reading unit 101, for reading the verification information stored in the verification information storage unit being arranged on product;
Authentication unit 103 is verified for the verification information to reading, and obtain instruction verify whether by Result information.
In the apparatus, the verification information storage unit is near-field communication NFC label, and the verification information includes should At least one of unique mark UID and product false proof content information of NFC label.
In the apparatus, the authentication unit 103 is used for:
It is verified according to the UID in the verification information, and obtains the result for indicating to be verified when being verified Information;Or
It is verified according to the product false proof content information in the verification information, and obtains instruction when being verified and test Demonstrate,prove the result information passed through;Or
Respectively according in the verification information UID and product false proof content information verified, and verification lead to respectively The out-of-date result information for obtaining instruction and being verified.
In the apparatus, the authentication unit 103 is used for:
Reading unit (101), for reading the verification information stored in the verification information storage unit being arranged on product;
Authentication unit (103) is verified for the verification information to reading, and is obtained instruction and verified whether to pass through Result information.
In the apparatus, the product false proof content information includes:With the relevant production information of production of the product and With the relevant sales information of sale of the product, the authentication unit 103 is used for:
Determine production information and sales information whether with the licensed-type production information being stored in advance in authentication unit (103) and Production line information in sales information list is identical with sales information;
When determining whether production information and sales information are believed with the production line in licensed-type production information and sales information list When breath is identical with sales information, the result information that instruction is verified is obtained.
In the apparatus, the product false proof content information is the information being encrypted with predetermined cryptographic algorithm, described to test Card unit 403 is used for:
The product false proof content information is decrypted using decipherment algorithm corresponding with scheduled Encryption Algorithm, with Product false proof content information after to decryption.
Specifically, the product false proof content information is to believe with UID, with the relevant production of the production of the product Breath and with the relevant sales information of sale of the product as input parameter, encrypt to obtain using the Encryption Algorithm of setting 's;
The authentication unit 103 is used for:The product false proof content information is decrypted using the Encryption Algorithm of setting, If can not decrypt, verifies and do not pass through;If successful decryption, to the relevant production information of the production of the obtained product, And it is verified with the relevant sales information of sale of the product.
In the apparatus, further include:Communication unit 102 communicates to connect between reading unit 101 and authentication unit 103, And for the verification information that reading unit 101 is read to be sent in authentication unit 103, and receive by authentication unit 103 The instruction of transmission verify whether by result information.
In the apparatus, described device further includes:
Notification unit 104, for receive the instruction from communication unit 102 verify whether by result information, and to User notifies.Herein, notification unit 104 may be used a variety of advice methods and carry out, for example be provided using display mode Or provided using voice broadcasting modes etc..
Fig. 2 is verification method flow chart provided by the utility model, the specific steps are:
Step 201, reading unit 101 read the verification letter stored in the verification information storage unit being arranged on product Breath;
Step 202, authentication unit 103 verify the verification information of reading, and obtain instruction and verify whether to lead to The result information crossed.
In the method, the verification information storage unit be NFC label, the verification information include NFC label only One mark at least one of UID and product false proof content information.
It is described according to the verification information of reception carry out Product Validation the step of include:
Authentication unit 103 is verified according to the UID in the verification information, and instruction verification is obtained when being verified By result information;Or
Authentication unit 103 is verified according to the product false proof content information in the verification information, and is being verified When obtain the result information that is verified of instruction;Or
Authentication unit 103 respectively according in the verification information UID and product false proof content information verified, and Verification respectively by when obtain the result information that is verified of instruction.
In the method, the step of being verified according to the UID in the verification information include:
Determine the UID in the verification information whether with the mandate UID lists in being stored in advance in authentication unit (103) In UID it is identical;
When determining that the UID in the verification information is identical as the UID in UID lists is authorized, obtains instruction and be verified Result information.
In the method, the product false proof content information includes:With the relevant production information of production of the product and With the relevant sales information of sale of the product;
The step of being verified according to the product false proof content information in the verification information include:
Determine production information and sales information whether with the licensed-type production information and pin that are stored in advance in authentication unit 103 The production line information sold in information list is identical with sales information;
When determining whether production information and sales information are believed with the production line in licensed-type production information and sales information list When breath is identical with sales information, the result information that instruction is verified is obtained.
In the method, the product false proof content information is the information that predetermined cryptographic algorithm is encrypted;
The step of being verified according to the product false proof content information in the verification information include:
The product false proof content information is decrypted using decipherment algorithm corresponding with scheduled Encryption Algorithm, with Product false proof content information after to decryption.
This method further comprises:Further include communication unit between the reading unit 102 and authentication unit 103 102, the verification information that reading unit 101 is read is sent in authentication unit 103, and receive and sent out by authentication unit 103 The instruction sent verify whether by result information.
In the method, the method further includes:
Notification unit 104 receive the instruction from communication unit 102 verify whether by result information, and to user into Row notice.Herein, notification unit 104 may be used a variety of advice methods and carry out, for example is provided or used using display mode Voice broadcasting modes offer etc..
In the method, the NFC label is realized using NFC label chip, for each NFC label chip in hardware Upper intrinsic UID, and the UID is registered in central server, that is, authorized UID and the UID authorized is stored in database In.Specifically, the NFC label chip of NXP NTAG21x standards can be used, the structure of the NFC label chip includes two Part, UID data blocks and read-write data block, the capacity of different data block is different, for example the capacity of NFC standard chip is 888 Byte, seven bytes therein are used for the storage of UID, other bytes distribute to read-write data block, are used for the read-write of ciphertext.
In the method, the forming process of the ciphertext in the NFC label is as shown in Figure 3:For each product, It is all attached to NFC label in before sales.The NFC label realizes there is UID numbers in the NFC label using NFC chip 300 According to block 301 and read-write data block 302, in UID data blocks 301 there is UID, the UID to have been authorized to and store.Read and write data block There is ciphertext, the ciphertext to be calculated, be adopted using the Encryption Algorithm of setting based on UID and product information in 302 Mode is that computer 303 is read UID intrinsic in NFC label using NFC editing machines 304, combination product information, as The Encryption Algorithm of parameter input setting is encrypted after obtaining ciphertext, is written back in NFC label by NFC editing machines 304.When So, the ciphertext stored in the NFC label can also be not encrypted anti-fake content information, and ciphertext may be The encryption information of other storage forms.
In the method, the reading unit and communication unit are integrated in the mobile terminal with NFC function, are read The NFC label is taken, and uploads the process for reading obtained UID and ciphertext, is all the application being arranged in the terminal It realizes, the application is downloaded and installed from central server.
In the method, it is logical by encrypting that the mobile terminal, which will read obtained information and be sent to central server, Believe what circuit was realized.
In the method, described to be verified as to described information:UID is verified, confirms that product is true;
Or anti-fake content information is verified, confirm that product is true;
Or UID and anti-fake content information are verified, confirm that product is true.
Illustrate for a specific example:Institute's authentication unit separately verifies the UID and ciphertext of reception, confirms product The process of the true and false be:
First step:It is confirmed whether to be stored with the UID of reception, if it is, second step is executed, if it is not, then Think that product is counterfeit;
Second step verifies ciphertext, if the verification passes, then it is assumed that product be it is genuine, otherwise, product It is counterfeit.
In second step verification process, first way is:Determine whether the encryption file is repeated verification, also It is the record list for encrypting file being verified that prestored, it is determined whether it is present in the record list, if it does, It then verifies and does not pass through, if it does not exist, then being verified;
The second way is:It determines whether that the encryption file is decrypted using the Encryption Algorithm of setting, if It is then to be verified, if it is not, then verification does not pass through;
The third mode is:The encryption file is decrypted using the Encryption Algorithm of setting, determines the product letter of decryption Whether breath is correct, if correctly, be verified, if incorrect, verify and does not pass through.To whether confirm the ciphertext Pass through verification.
Under Third Way, it can be previously stored with the product information of corresponding UID, judge that the UID is corresponding by solution Whether close product information is consistent with the product information of storage, if unanimously, be verified, if it is not, then verification does not pass through.
In the method, the ciphertext in NFC label may be considered the dispersion redundancy backup of the UID authorized Verify data, in this way, even if database delay machine or the collapse of the UID that storage has authorized, it can also be by verifying in NFC label Ciphertext realizes the authenticity verification to product.
In the method, mobile terminal needs to download the application of setting from central server, and the application monitoring is simultaneously real The now scheme of entire Product Validation, this makes it possible to the reliabilities for improving Product Validation.Even if the NFC label adhered to from product is multiple The ciphertext in NFC label has been made, can also make the verification of product that can not pass through in product false proof verification process.
It gives one example explanation, Fig. 4 is the concrete example of the reliability of guarantee product false proof verification provided by the utility model Sub- schematic diagram, as shown in the figure:The NFC label 401 of true product attachment realizes that the UID in NFC label is using NFC chip 405 0x1234, ciphertext Oxabcdef, the NFC label 402 of fake product attachment is using the realization of NFC chip 406, NFC label In UID be 0x5678, replicate obtain NFC label 401 ciphertext be Oxabcdef.Using verification device 403, read true UID in the NFC label 401 of product attachment is 0x1234, ciphertext Oxabcdef, is sent to central server 404 and tests Card, it is stored that central server 404, which verifies UID therein, and it is that UID is corresponded to decrypt the product information obtained after ciphertext Product information;Using verification device 403, it is 0x5678, encryption text to read the UID in the NFC label 402 of fake product attachment This is Oxabcdef, is sent to the verification of central server 304, due to true product and the intrinsic UID differences for fake product, center Server 404 does not store the UID of fake product, so product false proof verification can not pass through, further, works as central server The product information that is obtained after 404 decryption ciphertexts therein is nor UID is the corresponding product informations of 0x5678, product false proof Verification can not also pass through.
In the method, in order to realize product production and sale tracking, product attachment NFC label in reading Different information fields can be divided by writing data block, and each production stage of product is had recorded in different information fields Production information or/and sales information, in every level-one production information or sales information, have recorded production or sale timestamp, Production or sale identification code, and production or sales figure.Since these information fields are ciphertexts, encryption and subsequent test Card will ensure the correctness of these information.
As can be seen that the scheme of the Product Validation of the utility model when the verification information include unique mark UID and/or When anti-fake content information, in terms of high reliability is mainly reflected in following four:
The first aspect, the Double anti-counterfeit verification of the ciphertext of the intrinsic UID and setting of NFC label based on product attachment Mode improves the reliability of product false proof verification;
The second aspect, data base set Chinese style storages and product information of the UID authorized in central server are passed through In the distributed storage of NFC label after encryption, the reliability of product false proof verification is improved;
In terms of third, intrinsic UID ensure that NFC label can not be entirely replicated in the NFC label of product attachment, and NFC label chip is frangible used by realizing NFC label, can not be reused;
In terms of 4th, the product information in the ciphertext of the NFC label of product attachment contains production information and sale Information, so that the production and sale of product are traceable.
The low cost of the scheme of the Product Validation of the utility model is mainly reflected in following three aspects:
The first aspect, the NFC label chip used is the hardware of low cost;
The second aspect is easy to dispose, and need not change existing product, it is only necessary to adhere to NFC label in existing product It can be realized;
In terms of third, central server verifies the true and false of product by verifying the NFC label that product adheres to.
The above is only the preferred embodiment of the utility model only, is not intended to limit the utility model, all at this Within the spirit and principle of utility model, any modification, equivalent replacement, improvement and so on should be included in the utility model Protection domain within.

Claims (10)

1. a kind of verification device, which is characterized in that including:
Reading unit (101), for reading the verification information stored in the verification information storage unit being arranged on product;
Authentication unit (103) is verified for the verification information to reading, and obtain instruction verify whether by knot Fruit information.
2. device as described in claim 1, which is characterized in that the verification information storage unit is near-field communication NFC label, The verification information includes at least one of unique mark UID and product false proof content information of the NFC label.
3. device as claimed in claim 2, which is characterized in that the authentication unit (103) is used for:
It is verified according to the UID in the verification information, and obtains the result information for indicating to be verified when being verified; Or
It is verified according to the product false proof content information in the verification information, and obtains instruction verification when being verified and lead to The result information crossed;Or
Respectively according in the verification information UID and product false proof content information verified, and verification pass through respectively when Obtain the result information that instruction is verified.
4. device as claimed in claim 3, which is characterized in that the authentication unit (103) is used for:
Determine the UID in the verification information whether in the mandate UID lists in being stored in advance in authentication unit (103) UID is identical;
When determining that the UID in the verification information is identical as the UID in UID lists is authorized, the knot that instruction is verified is obtained Fruit information.
5. device as claimed in claim 3, which is characterized in that the product false proof content information includes:With the product Relevant production information and the relevant sales information of sale with the product are produced, the authentication unit (103) is used for:
Determine production information and sales information whether with the licensed-type production information and sale that are stored in advance in authentication unit (103) Production line information in information list is identical with sales information;
When determine production information and sales information whether in licensed-type production information and sales information list production line information and When sales information is identical, the result information that instruction is verified is obtained.
6. device as claimed in claim 3, which is characterized in that the product false proof content information be with predetermined cryptographic algorithm into The encrypted information of row, the authentication unit (103) are used for:
The product false proof content information is decrypted using decipherment algorithm corresponding with scheduled Encryption Algorithm, to be solved Product false proof content information after close.
7. device as described in claim 1, which is characterized in that described device further includes:
Communication unit (102) communicates to connect between reading unit (101) and authentication unit (103), and is used for reading unit (101) verification information read is sent in authentication unit (103), and receives the instruction sent by authentication unit (103) Verify whether by result information.
8. device as claimed in claim 7, which is characterized in that described device further includes:
Notification unit (104), for receives come from communication unit (102) instruction verify whether by result information, and to User notifies.
9. a kind of verification terminal, which is characterized in that the verification terminal includes:
Reading unit (101), for reading the verification information stored in the verification information storage unit being arranged on product;
Reading unit (101) is communicatively connected in external authentication unit (103) by communication unit (102), single for that will read The verification information that first (101) are read is sent in authentication unit (103), and receives the finger sent by authentication unit (103) Show verify whether by result information.
10. verification terminal as claimed in claim 9, which is characterized in that the verification terminal further includes:
Notification unit (104), for receives come from communication unit (102) instruction verify whether by result information, and to User notifies.
CN201721275485.0U 2017-09-29 2017-09-29 Verify device Expired - Fee Related CN207851892U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201721275485.0U CN207851892U (en) 2017-09-29 2017-09-29 Verify device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201721275485.0U CN207851892U (en) 2017-09-29 2017-09-29 Verify device

Publications (1)

Publication Number Publication Date
CN207851892U true CN207851892U (en) 2018-09-11

Family

ID=63426188

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201721275485.0U Expired - Fee Related CN207851892U (en) 2017-09-29 2017-09-29 Verify device

Country Status (1)

Country Link
CN (1) CN207851892U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110753104A (en) * 2019-10-16 2020-02-04 宁波信联云智能科技有限公司 Quality detection system
CN113239342A (en) * 2021-05-27 2021-08-10 广州众诺电子技术有限公司 Chip, verification device, chip verification method and chip verification system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110753104A (en) * 2019-10-16 2020-02-04 宁波信联云智能科技有限公司 Quality detection system
CN113239342A (en) * 2021-05-27 2021-08-10 广州众诺电子技术有限公司 Chip, verification device, chip verification method and chip verification system

Similar Documents

Publication Publication Date Title
CN108053001B (en) Information security authentication method and system for electronic warehouse receipt
CN102831529B (en) A kind of commodity information identification method based on radio frequency and system
CN102855577B (en) Multiple commodity antifake check method based on cloud computing
CN108460605A (en) A kind of trace to the source method for anti-counterfeit and the system of the papery art work based on block chain
CN104680389A (en) NFC mobile phone terminal anti-fake system and method based on time encryption
CN102855574A (en) Method and system for identifying commodity information based on NFC (Near Field Communication)
CN109756341A (en) Electronic signature method and device
CN104794626B (en) A kind of method for anti-counterfeit and device based on hardware information
CN110298180A (en) A kind of notarization management system based on block chain
CN102202051A (en) Credible two-dimensional code system and application method thereof
CN202870900U (en) NFC (Near Field Communication)-based commodity information identification system
CN109635610A (en) The read-write system and method for RFID tag data
CN108171019A (en) Anti-counterfeit authentication method, fake certification system, fake certification equipment and storage medium
WO2015154482A1 (en) One-time certificate anti-counterfeiting tracing system based on mobile terminal and rfid
Ferradi et al. When organized crime applies academic results: a forensic analysis of an in-card listening device
CN108880789B (en) Hardware product anti-counterfeiting tracing method, node equipment and system
CN207851892U (en) Verify device
CN108082723B (en) Anti-counterfeiting bottle cap based on CPU (Central processing Unit) password chip and working method thereof
US20180205714A1 (en) System and Method for Authenticating Electronic Tags
CN105849739A (en) A system and method for authentication
CN202870898U (en) Radio frequency-based commodity information identification system
CN112801660B (en) Secret subscription-free method and device of payment protocol
CN206961165U (en) A kind of NFC Antiforge systems
CN111950009B (en) Block chain-based method and device for detecting replacement sales data
CN112801677A (en) Anti-counterfeiting tracing method based on electronic tag

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180911